...The Anonymous Caller: Recognizing It’s a Fraud and Evaluating What to Do The ethic case study was about an anonymous caller who is the controller of a privately-held, small, start-up company. The company was experiencing a severe cash shortage and was required to present the quarterly financial statements to the local bank, in order to begin receiving funds for the line of credit again. She had concerns that the senior executives of the company provided the local bank with misstated financial statements. The caller was later informed that the accounts payable clerk was instructed to record sales transaction generated by the Chief Executive Officer (CEO) of the company. As a result, the sales and receivables accounts were overstated in the financial statements. Before returning to work Monday morning, the caller decided to contact her former accounting professor, Dr. Mitchell seeking advice on how she could possibly handle the situation. After listening to the anonymous caller’s situation, if I were Dr. Mitchell, I would first advise the caller to conduct a meeting with the senior executives of the company, in order to explain her concerns in reference to the submission of quarterly financial statements to the bank that overstated the sales and receivables account. Also, I would advise the caller to reiterate the consequences to the senior executives during their meeting, warning them of what could happen if their illegal procedures were noticed; such as pay a large fine or...
Words: 319 - Pages: 2
...The Anonymous Caller: Recognizing It’s a Fraud and Evaluating What to Do The ethic case study was about an anonymous caller who is the controller of a privately-held, small, start-up company. The company was experiencing a severe cash shortage and was required to present the quarterly financial statements to the local bank, in order to begin receiving funds for the line of credit again. She had concerns that the senior executives of the company provided the local bank with misstated financial statements. The caller was later informed that the accounts payable clerk was instructed to record sales transaction generated by the Chief Executive Officer (CEO) of the company. As a result, the sales and receivables accounts were overstated in the financial statements. Before returning to work Monday morning, the caller decided to contact her former accounting professor, Dr. Mitchell seeking advice on how she could possibly handle the situation. After listening to the anonymous caller’s situation, if I were Dr. Mitchell, I would first advise the caller to conduct a meeting with the senior executives of the company, in order to explain her concerns in reference to the submission of quarterly financial statements to the bank that overstated the sales and receivables account. Also, I would advise the caller to reiterate the consequences to the senior executives during their meeting, warning them of what could happen if their illegal procedures were noticed; such as pay a large fine or...
Words: 2050 - Pages: 9
...INTRODUCTION Anonymous is an American global human resource and related financial services consulting firm, headquartered in New York City. The firm operates internationally in more than 40 countries, with more than 18,000 employees, (www.anonymous.com/about) and is ranked as one of the most prestigious consulting firms in the world (www.vault.com). As a wholly owned subsidiary of Anonymous Companies, Inc., Anonymous provides access to the complementary services of its sibling companies. BACKGROUND I started my career at Investments, then an Anonymous company shortly after graduating from college in the early 2000s. At the time, Investments was a highly profitable investment management firm who offered defined contribution retirement plan administration services. This seemingly unlikely set of services were part of a brilliant, and wildly successful business strategy of bundling its own mutual fund investments into the retirement plans of its clients. This way, Investments was assured a constant and trapped source of investment into its own funds (much like Fidelity Investments does today). In 2005, after Investments was involved in insider-trading and market -timing scandals, the company was sold to Great West who was only interested on Investments’s investment management division. The retirement plan administration business was therefore not part of the sale and Anonymous decided to incorporate this line of business into Anonymous (for now own referred to as Anonymous Consulting...
Words: 2486 - Pages: 10
...An anonymous caller seeks help from her former university professor. The caller thinks that the company that he is working for only three and one-half month is committing a fraud. The main reason that the caller is worried is because he is the controller of the company and he has to sign the quarterly statement of his privately-held company. Those quarterly statements are for the bank that his company has the line of credit, those statements have to look good so that the bank approve their credit. There are two big problems in the case. The first one is the as he started on the company he had to sign the closing of the prior fiscal year. If the fraud was being made in the last year, he could be treated like an accessory to the fraud because he signs the statements. The other problem is that the CEO and CFO, the highest in command, are the ones that are committing the fraud. I would recommend that the caller has to report the fraud to the FASB. The Financial Accounting Standards Board (FASB) has been the designated organization in the private sector for establishing standards of financial accounting that governs the preparation of financial reports by nongovernmental organizations. Those standards are officially recognized as authoritative by the Securities and Exchange Commission (SEC) and the American Institute of Certified Public Accountants. If the caller continues to work in the company he could get caught committing the fraud and could go to jail. There are two risks if...
Words: 634 - Pages: 3
...Facts: On April 22, 1987, at approximately 3:00 pm Corporal Davis with the Montgomery, Alabama Police Department received an anonymous phone tip that Vanessa White would depart the Lynnwood Apartment complex at 4:00 pm and that she would be driving a brown station wagon with the right-tail light cracked. [1] The caller informed Corporal Davis that White would be going to the Doby Motel and would be in possession of cocaine in a brown portfolio. After the call, Davis and his partner drove to the apartment complex and set up surveillance. Officers then observed White leaves the complex and followed her to the motel. White's vehicle was stopped about 4:18 p.m. in front of the Jet Theatre. [2] Corporal Davis asked White to get out of her car and...
Words: 1241 - Pages: 5
...At any given moment, more than 1,100 trained volunteers are on duty and available to help victims at RAINN-affiliated crisis centers across the country. How does the National Sexual Assault Hotline work? The concept behind the hotline is simple. When a caller dials 1.800.656.HOPE, a computer notes the area code and first three digits of the caller's phone number. The call is then instantaneously connected to the nearest RAINN member center. If all counselors at that center are busy, the call is sent to the next closest center. The caller's phone number is not retained, so the call is anonymous and confidential unless the caller chooses to share personally-identifying information. Why was the hotline set up this way? When RAINN was founded, we surveyed the directors of dozens of rape crisis centers and state and national anti-sexual assault organizations as well as many victims of sexual violence. The advice was unanimous: The best support services for rape, sexual assault and incest victims are those offered at community rape treatment centers. Each local center is the best resource for victims in its community, not only for counseling but also for information about community resources and emergency protocols. In addition, because rape and sexual assault laws vary by state, local centers are in the best position to advise survivors on the legal aspects of the crime. RAINN found that while local centers were well equipped to handle the counseling, the lack of...
Words: 679 - Pages: 3
...VISHING: A RISING FORM OF IDENTITY THEFT Identity thieves often use fake Web sites and e-mails that appear so realistic they have tricked many people into providing their private financial information. But many identity thieves are also using a computer technology called Voice over Internet Protocol (VoIP) that enables them to make anonymous calls to your phone for a crime called “vishing.” For example, you may get a call from an identity thief saying that your credit card has been used illegally. You’re asked to dial a fake toll-free number in order to “confirm” your account details and credit card number. Once you provide this information to the thief, it is used to run up charges on your account and leave you with a financial mess to clean up. Your credit rating may also be affected. • If you receive a phone call asking you to “confirm,” “update” or “verify” credit card account numbers or other financial information, hang up even if the person claims to be from your credit card provider. Then, call the customer service number on the back of your card or your statement to check if the call was legitimate. If it was, they will know it. • When a caller asks for the three-digit security code on the back of your credit card, do not provide it unless you made the...
Words: 500 - Pages: 2
...The Anonymous Caller Recognizing It's a Fraud and Evaluating What to Do[1] Learning Objectives • After completing and discussing this case you should be able to • Appreciate real-world pressures for meeting financial expectations • Distinguish financial statement fraud from aggressive accounting • Identify alternative actions when confronted with suspected financial statement fraud • Develop arguments to resist or prevent inappropriate accounting techniques It was 9:30 A.M. on a Monday morning, one like a thousand others in the Naked City. I was sipping my cup of coffee, pondering Jake van der Kamp’s rant in the South China Morning Post when the call came through. "Hi Dr. Westland, do you have a minute?" "Sure," the professor replied. "I am one of your former students, but if you don't mind, I would prefer to remain anonymous. I think it is best for both of us if I not reveal my name or company to you. I am concerned that the senior executives of the company where I serve as controller just provided our local bank fraudulently misstated financial statements. I need some fast advice about what to do. Currently, I am on my car phone and need help evaluating my next step before I head to my office this morning. May I briefly describe what's going on and get some input from you?" she asked. "Go ahead, let me see if there is some way I can help," responded Dr. Westland. "I am the controller of a small start-up company...
Words: 1453 - Pages: 6
...intolerance is a definite example of an important and legitimate use of anonymity on the internet. 4. Doctors who are members of the on-line community often encourage their patients to connect with others and form support groups on issues about which they do not feel comfortable speaking about publicly. 5. It is essential to be able to express certain opinions without revealing your true identity. One relevant example of anonymity in the real world is the debate over Caller ID on telephones. 6. People had taken for granted that they could be anonymous if they wanted and were distressed at the idea of that anonymity being taken away. 7. There are many long-standing precedents for anonymity in publishing. The responsibility of a journalist not to reveal their sources is recognized almost universally. Many authors write under pen-names and there are still some cases where the true identity of the author has never been discovered. 8. Although some people will automatically discount any anonymous postings, other people don't care who wrote it, as long as it is intelligent or funny. Still others use anonymity specifically to allow their opinions to be judged on their merit, rather than by the name attached to...
Words: 289 - Pages: 2
...This thesis is about digital cash, a way to implement anonymous electronic payments in an environment of mutual mistrust between the bank and the system users. The present day payment systems fall into two large categories: account-based systems and token-based systems. Token-based systems such as paper cash, pre-paid phone cards or mail stamps, do not identify its users. A pre-paid phone card, for example, does not distinguish one caller from the other. Account-based systems such as checks, credit cards or bank accounts need, by design, to identify the system users and their transactions. People like to use paper cash because it is easy to carry around, they can make a payment with the received cash and they don’t need to ask a third party like a bank to perform their payments. Paper cash can, however, be stolen or lost and no one compensates for the lost or stolen money. Credit cards reduces risk of lost cash for people, but by using electronic money people are in the risk of losing their privacy. Annually, credit card companies and banks lose large sums of money since they are required to compensate for lost cards and the costs associated with fraud and human error. In light of the explosive increase of electronic services such as Internet, the need for more efficient electronic payments has become an essential fact. Since anonymity of payments is usually associated with anonymity of paper cash, an anonymous token-based electronic payment system is referred to...
Words: 308 - Pages: 2
...Services primarlily consist of: • • • IP Centrex/ IP PBX Hosted Business Business Trunking Enhanced Residential IP Centrex / IP PBX • Bring the power of a corporate PBX to enterprise customers who will no longer have to invest in PBX equipment or its maintenance • Works with analog phones as well as with IP Phones • Offer traditional PBX functionality plus a wide range of value added services not economically feasible with traditional solutions • Centralize communications services (National and International Long Distance, Local Calling, Local Phone Service, Hosted PBX) on a single bill IP Centrex Features 976/900 Block Abbreviated 2-digit dialing Anonymous Call Rejection Billing Codes Call Forward All Calls Call Forward Busy Call Forward No Answer Call Return Call Trace Call Waiting Call Waiting/ID Manager Caller ID Caller ID Block Classes of Service Direct Inward Dial (DID) Do Not Disturb Flexible Auto-Attendant Flexible Numbering Plan Forward to Voice Mail Group Pickup Hold Hold Music Hunt Groups Multi-call Park N-way Conference Off-Premises Stations Park & Park Pickup Permanent Per Call Block Priority Call Queues Redial Remote Call Forward to DID Selective Call Forward Selective Call Rejection Speed Dial TAPI Dialing Support Transfer, Blind & Guided Transfer to Voice Mail Urgent Call Virtual Ring Voice Mail System Default Star Codes Modifying Enable Codes (2- and 3-digit) Modifying Disable Codes 2- and 3-digit) Enhanced Business Features Nexogy IP Centrex features...
Words: 1276 - Pages: 6
...Information Technology Acts Marnie Trahan BIS/220 August 9, 2012 Mona Ristow Information Technology Acts In the 20th century everything is accessible to the people of the world through the worldwide web. Anything a person wants to find can search it online and if he or she cannot find it someone online can find it for the individual for a price. Everything in a person’s life is not as private as he or she thought it was; personal cell phones are not even off limits to privacy. I do not give out my cell phone number unless I know the person but recently I have been getting calls from phone numbers not even in my area code. The callers have the nerve to leave messages on my voicemail. Most of the voice messages left are recordings from machines. They are pre-recorded telemarketers leaving me messages about how my name popped up in their computers, so at this point I hit the delete button and I do not know what they called for. I am unsure about how these telemarketers got a personal cell phone number; I thought cell phone numbers were unpublished or unlisted. When I have tried looking up a cell phone number on the Internet the website usually wants me to pay for access to see the owner of the cell number’s information. So how do telemarketers get such easy access? The advances in information technology today have allowed the easy access to the individual’s personal lives and cell phones. A person orders something from a website he or she has to provide the website...
Words: 841 - Pages: 4
...Company Ethics Program Company X Ethics Program (A) Standards and Procedures 1. Courage, Dependability, Integrity and Respect are core values that Company X stands by. (a) Every customer/client will receive the utmost respect from our employees. Regardless of creed, ethnicity, race, religion or sexual orientation, the customer will be fairly treated. (b) Fellow employees will be treated with the same dignity and respect as they would the customer and/or client. (c) Gifts, favors, or money from customers or other employees will not be allowed for personal gain; therefore our employees will maintain a degree of decency. (d) During work hours personal use for social media will not be permitted on company computers. (e) Task will be finished based on each employee’s ability and completed in an opportune and productive method. (f) The backbone of the company is the employees. Employees will maintain professionalism through the mandated dress code described below: (1) Dress slacks in the color of black, blue of khaki will be worn by both men and women. (2) Solid colored long or short sleeve button down dress shirt will be the required attire for the men. A modest blouse in the color of black, blue or white will be worn by the women. Midriffs, tank tops or thin strapped shirts will not be allowed as appropriate clothing. (3) Approved shoes that will be worn by women are flats, pumps or slip resistant shoes and the men approved footwear includes loafers or oxfords, black...
Words: 1082 - Pages: 5
...___________________________________ ) Defendant’s trial brief in support of its motion to suppress evidence Michael K. Cutter Cutter and Associates, P.A. 1000 Anystreet Rd. Jacksonville, FL 32202 (904)-555-555 Attorneys for Defendant Bobby Lane QUESTION PRESENTED I. Whether the Court would erode the Fourth Amendment’s intent to protect citizens’ rights to be secure against unlawful arrest by admitting evidence when it was found on Defendant’s person subsequent to a warrantless arrest for which Defendant was wrongly suspected of being a Jewelry Store Burglar based on static details given by an anonymous caller and police observation that something “sparkly” was in Defendant’s van, further Defendant never “voluntarily” consented to the warrantless arrest, and most notably seizure for the arrest in question occurred inside the threshold of Defendant’s home? Table of Contents Page Question Presentedi. Table of authoritiesiii. Statement of the case1 summary of the argument2 Argument3 I. MR. BOBBY LANE’S FOURTH AMENDMENT RIGHTS WERE VIOLATED WHEN he was SIEZED INSIDE THE THRESHHOLD OF HIS HOME WITHOUT WARRANT, ABSENT PROBABLE CAUSE FOR THE JEWELRY BURGLARY, OR A CONCENT EXCEPTION. THEREFORE...
Words: 5468 - Pages: 22
...ABSTRACT The Internet has made large amounts of information available to the average computer user at home, in business and in education. For many people, having access to this information is no longer just an advantage, it is essential. Yet, connecting a private network to the Internet can expose critical or confidential data to malicious attack from anywhere in the world. This paper is intended to discuss an emerging threat vector which combines social engineering and technology. Utilizing Voice over Internet Protocol (VoIP) convenience combined with electronic mail phishing techniques, Vishing has the potential to be a highly successful threat vector. Vishing victims face identity theft and/or financial fraud. An increased awareness about these attacks will provide an effective means for overcoming the security issues. INDEX 1. Introduction 1 2. What is Vishing? 1 3. How Vishing works? 2 4. The Problem of Trust 4 5. Vishing Characteristics 5 5.1. Type of data prone to attack 5 5.2. Data usage by the attacker 6 6. Other Attacks 6 6.1. Dumpster diving 6 6.2. Card Owner Validation 7 6.3. Handset Blackmail 7 6.4. Exploit payloads 7 7. Overcoming Vishing 7 8. Conclusion 8 References 9 1. Introduction: Many of today’s widespread threats rely heavily on social engineering techniques, which are...
Words: 2502 - Pages: 11