Forty ways of embezzlement

March 2013 News & Events, Government and Parastatal (Industry)

Individuals that man a nation’s government have followed well-known though not always well-understood trajectories for their lives, almost unchanged from ancient times. At one end are the conscientious workers, with moderate lifestyles and meager pensions, and at the other, those that exploit the system for ruthless personal gain and decadent lifestyles, and often neglecting their work to the detriment of others.

Despite comprehensive understanding of the psychological and sociological aspects of all this today – whether under democracy or dictatorship, left or right leaning, and in developed or developing economies, while the modes and appearances may vary – such misuse of position continues, often with impunity, despite laws and controls, and in some societies moral strictures being firmly in place.

In the last few decades, the problem has been compounded with the advent of computer networks, and you come across legendary tales of cyber-fraud – from those skimming decimals of cents, to those re-directing billions to their own accounts for personal gain. As much as greed, it is often said that the identity crisis of an anonymous government job prompts individuals to assert themselves in such a manner.

With the advent of technology for identity management, its deployment within governments is considered to be an important paradigm shift. However, with this has also come what is termed as the Online Dis-inhibition Effect, a syndrome that is now frequently observed on social media sites, of individuals faking themselves for their own or others’ appeasement.

Another critical aspect is that increasingly more vital military data as well as valuable business IP resides within computer networks. Hacking is one thing, but to willingly part with such information can be fatal and tragic for a nation and its people.

Beyond identity management, security solutions in the government are often configured around norms of human behaviour based on Game Theory. One such example goes by the popular name of the Prisoners Dilemma and is formulated thus: two prisoners of the same gang, arrested for the same crime, are held in separate cells, and each promised a different level of punishment if s/he testifies (or does not) against the other. Studies today thus measure typical human averages for connivance, altruism and selfishness, and explain why two keys to a safe (or two access codes in cyberspace) are safer than one, and help devise even more secure strategies in the real world. However, beyond this sophistication of information technology, tokens, biometrics and configuring them all as intelligently as possible, there is only the deterrence of harsh punishment, or social stigma – as in many countries like China and India.

The ultimate fear is that individual moral decadence of those trusted to protect, is how the final breakdown of the mightiest of empires often takes place. Similarly in cyberspace, nearly nine out of 10 crimes are committed by insiders. Can technology provide answers?

The question of effectively managing the right conduct of government employees in vast and far-flung bureaucracies has been meticulously addressed, in the ancient treatises of the old empires: in both China and in India. Shang Yang (390–338 BC) worked for Emperor Qin, and is probably represented as one of his many terracotta warriors. Chanakya (370-283 BC) worked for the powerful Maurya emperors of his time, and left behind a 15-volume magnum-opus on politics, economy and government – the Arthashashtra – and of which an entire book is dedicated to government employees. Among others, Chapter IX lists out 40 different ways of embezzlement in the government, and how one can prevent, control and punish many of them. The list reads astonishingly relevant even today. In these chapters are also the descriptions of paperwork, accounts, audits, seals and codes, and above all on the need for an indispensible network of spies and counter-spies.

In a world where some things change little – maybe there is a lesson for us all – today, and even for the cyberspace of tomorrow.

For more information contact Sanjay Dharwadker, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Workforce Consortium to reskill 95 million people
Editor's Choice News & Events AI & Data Analytics
ICT Workforce Consortium of global leaders has come together, committing to train and upskill 95 million people over the next 10 years, as 92% of jobs analysed are expected to undergo either high or moderate transformation due to advancements in AI.

Read more...
Tech Trailblazers seeks the most innovative and diverse investors in enterprise tech
News & Events
This year, the global enterprise tech startup awards, the Tech Trailblazers, is looking for the most innovative and diverse VCs as well as its usual hunt for groundbreaking tech start-ups.

Read more...
ONVIF standards drive growth in physical security market
News & Events
ONVIF has announced that more than 30 000 product models in the $120  billion global physical security market meet the ONVIF conformance requirements for interoperability.

Read more...
Western Digital reveals new solutions
Products & Solutions News & Events Infrastructure
Western Digital unveiled new solutions and technology demonstrations at the Future of Memory and Storage Conference 2024. The innovations cater to diverse market segments, from hyperscale cloud to automotive and consumer storage.

Read more...
Challenges in SMME financing and support
News & Events Financial (Industry)
In a step towards empowering small, medium, and micro enterprises (SMMEs), a recent forum was held in KwaZulu-Natal aimed at developing and growing SMMEs through public-private collaboration.

Read more...