Tweet





Share

Lessons from NY Times investigative journalism: destroy your old computers - the Atlantic

Error in deserializing body of reply message for operation 'translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 1, position 8922.

A new article about the old dry case against a young Goldman banker offers some takeaways, but this one was the most interesting inadvertent intended

590 tourre Jim Young Reuters.jpg

The New York Times has a sprawling front page article today serving as an update on a year-old story. In April 2010, Goldman Sachs and one of its employees were sued by the Securities and Exchange Commission for fraud in conjunction with a complex security it sold to a client. Goldman settled the case, but it remains outstanding against the banker, who was in his late 20s at the time of the incident. This article's authors Louise Story and Gretchen Morgenson bill it as a hard hitting investigative piece, though it provides little surprising insight into the box. Instead, its biggest revelation comes from their investigative tactics.


The article essentially investigates the status of the SEC's case against Fabrice Tourre, the Goldman banker that was named only in the following. First, let's look at its four big takeaways, none of which are particularly shocking. Then, we'll look at its inadvertent takeaway that has commentators buzzing.


The Intended Takeaways


Tourre couldn't Have Acted Alone


An unnamed source who worked on the Goldman mortgage desk wonders why Tourre was the only one that the SEC went after, according to the Times. "I just can't even begin to tell you how junior and his role was insignificant," the source told the paper. The team worked very closely together, so others would have been aware and involved in the deal at the heart of the SEC case.


Although this news might surprise some readers, anyone familiar with Wall Street knew this already. For starters, investment banks structure their groups into deal teams. Goal Goldman, more than any other, is almost obsessive about the importance of teamwork: it even shapes its recruiting strategy to favor athletes who it believes better understand how to succeed in a team-based environment. So it's hard to call this news, but it does raise the question: why was the only one who the SEC Tourre went after if an entire team was likely aware of and involved with the deal?


Why Tourre Was the Sole Target


The NY Times answers that question too. And this is another answer that no one should be shocked to hear: Tourre wasn't careful with his email. You might remember all of the embarrassing and seemingly incriminating e-mails that were sent from the young banker that surfaced in the SEC filing a year ago. Someone with knowledge of the SEC case told the Times that Tourre's failure to be discreet made him an easy target.


There's little doubt that Wall Street has taken note of Tourre's mistakes. Any responsible investment banking managing director likely had a talk with his or her team about e-mail correspondence after the dry box became common knowledge. The message would be clear: do not put in writing anything that can come back to haunt you. In particular, any internal, strategic views of the market should be said, not written. If Tourre had been a little more careful, he'd still be making millions as a Goldman banker.


Thrown Under the Bus?


But he's not. He's on paid leave (which you can bet is just his measly six - figure salary, without any seven-figure bonuses). The Times reveals that Tourre decided not to use the legal counsel that Goldman offered, as their interests have diverged. At this point, Goldman has swept the whole incident aside, having paid its $550 million fine. The case ongoing for Tourre, however. While Tourre is trying to portray himself as part of a collaborative effort, Goldman says that he worked on a team goal that he was "principally responsible" for the deal, according to the Times.


Of course, this is ridiculous. He was a mid-level banker. There must have been at least two levels of approval that the deal went through before it was allowed to close, even if Tourre was running it. If those in upper management had signed off, then they're as guilty as he is - if not guiltier. Their greater expertise and legal counsel should have stopped the deal if it was unethical or illegal. So the lesson here is a good one for everyone, no matter their industry, to understand: a giant corporation will only have your back as long as it's in their best interest.


More Action May Follow


One last thing we already knew: authorities are hoping to take additional action against Goldman and probably other banks in regard to questionable actions taken during the housing boom and bust. When something like a housing bubble hits, there are surely some laws broken, whether on purpose or by accident. Any time a market booms, the rules come second to profits. The Times notes a few places where we might see additional charges brought.


The Inadvertent Takeaway: Destroy Your Old Computers


But perhaps the most interesting part of the story is the one the business journalists are buzzing about: where the Times got a fair portion of its information in this investigative article. It came from a laptop in the possession of artist-film maker Nancy Cohen. Here's where she got it:


The friend told her he had happened upon the laptop in discarded a garbage area in a downtown apartment building. E-mail messages for Mr. Tourre continued streaming into the device, but Ms. Cohen said she had ignored them until she heard Mr. Tourre's name in news reports about the S.E.C. box. She then provided the material to The Times.

This is amazing. Felix Salmon at Reuters speculates that the Times, Cohen, or her friend may have hacked this laptop to get those emails. Anyone reading this post has some experience with computers and e-mail addresses. Most computers are password protected, but all e-mail addresses are password protected. Passwords are also often changed, sometimes on a mandatory, set schedule. It's theoretically possible that this laptop was not password protected, that the password was stored in a browser or file, and that it remained unchanged during this time. If all those stars aligned, then the Times has incredible luck.


There are lessons here too - even for those of us who do not work for Goldman Sachs. First, secure your computer. While a good hacker might be able to breach any system, your average reporter or artist cannot. Even if you don't find yourself the target of an SEC investigation, you probably don't want your email or other personal information snooped through by someone who stumbles upon your old computer.


Of course, there's another way to avoid this: destroy your old hard drives. Whenever I throw away an old computer, I take pull out the hard drive and take a hammer to it - even if there's nothing particularly exciting to find, other than some great philosophy papers on Aristotle from college. While some truly gifted computer forensics expert might be able to reconstruct a demolished hard drive or obtain glimmers of information from its shares, the chances of that occurring are quite slim.


Image Credit: Jim Young / Reuters









Adobe Photoshop
Adobe Photoshop Lightroom 3 Student & Teacher Edition
by Adobe
Ranking has gone up in the past 24 hours 336 days in the top 100
Platform:   Windows XP / Vista / 7, Mac OS X Intel
4.1 out of 5 stars(54)

Buy new: $299.00 $79.99

 










Norton Internet
Norton Internet Security 2011 - 1 User/3 PC
by Symantec
261 days in the top 100
Platform:   Windows Vista / 7 / XP
4.2 out of 5 stars(370)

Buy new: $69.99 $32.24
80 used & new from $23.75

Get New Article Alerts In Your Inbox

Subscribe to Computers Knowledge Article Alerts to get daily notifications of our newest articles in your email for free. You can unsubscribe at any time. share your opinion about Lessons from NY Times investigative journalism: destroy your old computers - the Atlantic by comment on below post.

 

Thank you in advance.

Yours sincerely,

suyanto-signature


Bookmark to: Technorati   Bookmark to: Del.icio.us   Bookmark to: Google   Bookmark to: Yahoo   Bookmark to: Blinklist   Bookmark to: Digg   Bookmark to: Reddit

Related Posts :



0 komentar:

Posting Komentar

Categories

10100Mbps 156Inch 240GB 256MB 28GHz 2x120GB 384019003 412786001 418872001 419107001 463552003 519329002 5Port 608425002 608425003 609939001 7270FW 7Inch 80211g 920002555 about Access Accreditation Accreditations Accurate accused Acquires Adapter AdapterPower Advantage Advisor adware against Agency Alien Allows Altering Amazon AmericanStatesman AMZAZING Android Announce Announces Anyone appealDemocrat Apple arrested article Assessments Atlantic Atrix Attain Audio Austin Automation AutoMDIX Backlinks Bagleheads Barranco Based basics batteries Because Being Believe Benefits Better Black BlackBerry Bloomberg Bookmarking Books Boost Bottom Braces Bradleyaposs break bride Briefcase Brilliant bring browsing Budget Business businesses Busters Cable calculate Calculators Career Carrier CCCHSA0DSU01 CDROM CDRWDVD Certification Certifications change Changed charge Chatting cheap chest chips Choices Christian Clarksville Class Cleaner Clear Clearly clinical close cloud Combo coming commerants Common Commtouch companies Company Completely Computer ComputerActivecouk computers Computerworld computing ConceivablyTech Concept Connection Consumerization consumers Contemporary control Converter Cosmetic Costs could Courses CrossPlatform Cyber Cyberwar Dalvik daughter decision defpro Demystifying Dentistry dependency Depth design Desktop desktops destroy device devices Dewalt Diamond different digital Disable Dispatch disrupted documents domainB download Downs Droid DVDROM DWave Dwelling early Edgar Edition Education effective efficient Electronic Electronics Eliminate Elimination Elysium Embrace Enables engine engineer Ensure enyoy Eradicate escape Ethernet every exactly Examinations Excel expands Experts exploring extends Extension F7553D350 Facebook Factor faire Features Feeder Files Finest Finish Firefox Firewall first Flash Flyer Forbes Framework Freeze Freezes Friday function Fundamentals funding Fusion Gamers Games Gaming GDDR2 Geekzone Gerrit Getting GigaOm Globes Goodbye Google Googleaposs Government Gradual grande Greatest Guide hampel Hannspad Hannspree Harry hazard Heights hello Helps Herald Heres Hershey HewlettPackard Hints Homage homes hosting Huawei Huffington iCloud Immersion Imperio Importance Imports incarnate Increase India Industry infected infringement Inquirer Insider Inspire Instant Intel Intellectual intelligent InterinetSkim International Internet introducing Invest investigative iPhone Isnapost jargon joins Journal journalism Keyboard Kindle Kingston laptop laptops Laser Latest launches Leader leaks Learned Leelee Lessons Level Leveling Levels Lexington Lexmark Liliputing Limited Lindhurst Linksys LockheedMartin Logitech LogMeIn Lunch Magazine maintenant majorit majority Making malware management Managers Managing Manner Market Marketing MarketWatch Marketwire MctiviaFrom MD1024SD1333 Meadows media memory Menus Micro microSD Microsoft Midnight Might Million Minneapolis Mk550 Mobile Modern Module Monday Money Monitor Mortgage Mostly Mouse moving Mozilla MrExcelLiveLessons msnbccom MSPmentor mtiers Mueller Myths Needed Network networks newly NewsChannel Nextgov Nokia NoniPadTablet notebook Novel observer Office online Operating Optical OPTIMA optimization Oracle Ordinateurs Organization organizations ORourke outsource overtake Pages PanDigital Paperback Parents Particulars patents Payday Paying PC2700 people People percent perform Performance Permanently Personal Pfizer Philadelphia philippines Phillip phone PHOTOS Pinball Planning plans PocketCloud Pogoplug Points Polkast Popular Popularity Ports Potter Power PowerPoint Precaffeine press prices printing prints Produkt Professional Professionals Profitable Program promise promised Promote Property Prospects Protect prototype proven Provider public publishing punching purchasing purported Qosmio Qualification Qualifications quality Quarter quick Quickly Radeon rapidrelease Razer ready Reasons recall recovery Reflecting regarding register Registry relation release releases Relevance reliable Remote remotely Remove Reorganizes Replica Replication Reports Residence Restore restores Results Retail revealed Reviewed revolution right Ripping Rocket roots Router Running Samsung SanDisk Sapphires School schools Science Score Screen SDC2GB SDSDB8192A11 seamless search Seattle Second security Seeks Selling Sensation Sense Service services Setting Seven Short Shouldnt signs Sites sketches SlashGear Small smart Smartphone smartphones Smiles Smooth SN10T1 Sobieski Social Software solution Someones something Sorts Sound Spanish SPDIF special Specialists specs Spectacular Speed Sphere Spiralbound Spyware square StarTechcom Starting state Stealth SteelSeries Steve Stock Stocks Story Streaming Street student students Studies Superior supplier SupplyCord support surfing Switch Switcher system systems Table tablet tablets tagged Taiwan Tamas TE100S5 TechCrunch Techniques technology Tests Texts thefts Their Thinking THINTOS10 Threats Through Times TimesLeader timing Today Toshiba Toslink Total touch Toward transform Trend TRENDnet Trends trial Tribune Trust Turbine turbo Turning Tutorial Twitter Typical Ultimate Ultra understand Undertake Unique university Unveils Unwired Upgrade Upload Users Using Utica Value Vampire version Video Videonow Videos virus voice Warcraft Warrior Washington Watches Webcam WebOS Website websites wedding Weddings welcomes which White Wholesale Wilkes Window Windows Windowscompatible Wireless Wisdom Wizard Working World Worth Wrong X8300455NBK Xigmatek Yearold young yourself YouTube

 
Your Ad Here