MANAGER LIABILITY You’Re in Their Sights a STEP TOO FAR? REPUTATIONS at RISK Some Just Don’T Care

Total Page:16

File Type:pdf, Size:1020Kb

MANAGER LIABILITY You’Re in Their Sights a STEP TOO FAR? REPUTATIONS at RISK Some Just Don’T Care JULY 2015 | THE OFFICIAL MAGAZINE OF THE GRC INSTITUTE SCHEMES AND SCAMS You’re in their sights MANAGER LIABILITY A STEP TOO FAR? REPUTATIONS AT RISK Some just don’t care MOBILE TIME BOMBS The danger of BYODs COUNTRY SNAPshot Doing business in Indonesia RANSOMWARE RISING To pay or not to pay? FINANCIAL CRIMES Accounting scandal rocks Toshiba, CEO under fire THE GRC INSTITUTe’s 19TH ANNUAL CONFERENCE The GRC2015 conference 3 day program features inspirational leaders exploring topics across the change management spectrum at an organisational and individual level. CONFERENCE GRC2015 provides an exciting opportunity for 28–30 Oct 2015 • MelbOurne networking and professional development and exposure for commercial partners to consolidate crOwn Conference centre in the GRC marketplace. To book your seat at this exceptional event or for sponsorship opportunities please visit: www.grcconference.com.au CHANGE CATALYST GOVERNANCE • RISK • COMPLIANCE GRCI’s Graduate Certificate in Compliance Management 91517 NSW has been designed exclusively for senior governance, risk and GOVERNANCE • RISK • COMPLIANCE compliance professionals looking to further develop skills for career progression to the most senior level. Considered the benchmark accreditation GRADUATE for compliance professionals, this course is a nationally accredited qualification. CERTIFICATE GRADUATEIN This course offers you a career advantage through demonstrable skill development over COMPLIANCE an intense study period of four days. You will CERTIFICalso AbecomeTE part INof a strong network of professionals supported by GRCI, including MANAGEMENTCOMPLIANspecial eventsC Eexclusively for CCP alumni. 91517 NSW Next available certificate courses: Certified Compliance ProfessionalMA (CCP)NA GSydney,EMENT 7-11 October 2015 91517 NSW New Zealand, 10-13 November 2015 Certified ComplianceFor more informationProfessional and bookings (CCP) please visit: www.thegrcinstitute.org or email [email protected] GOVERNANCE • RISK • COMPLIANCE Contents PRESIDENT’S MESSAGE X page 5 Contact us COVER STORY READER POLL X page 6 NEWS X page 8 NEWS features X page 10 FINANCIAL CRIMES 12 NEWS X page 17 GRC Professional is the official monthly publication of GRCI in Australia, New Ransomware exacting a high toll Zealand, Hong Kong & South-East Asia. Manager liability Individuals and organisations alike are edges closer falling victim to a sophisticated new way to extort money. X page 19 GRC Institute As Britain gears for the introduction of a hard-line approach to making The rise and rise of scamming President: Alf Esteban individuals personally liable for Scams have become synonymous with Vice President: Carolyn Hanson corporate misconduct, others question the internet, but they can be countered Treasurer: Gillian Kinder by common sense. X page 20 Director: Susan Cretan the viability of trying to scare people into Director: David Morris behaving ethically. Director: Stephen Luk Fear, loathing and malicious intent Director: Lois McCowan There might be a maturing appreciation Director: Kellie Powell of the risks that can arise from gross misconduct in the workplace, and the Managing Director: hugely negative impact it can have on Martin Tolar [email protected] corporate reputation, but still some just don’t seem to care. X page 26 National Manager: Naomi Burley Mobile time bombs [email protected] BYODs are now ubiquitous in the Ph: +61 2 9290 1788 workplace, and if left unmanaged Fax: +61 2 9262 3311 can be a serious threat to business www.thegrcinstitute.org continuity. X page 30 GPO BOX 4117 Sydney NSW 2001 Australia Doing business in Indonesia In the first in a series of articles examining the risks facing organisations GRC Professional looking to embark on business Editor: activities in different parts of the Mark Phillips Asia Pacific region,GRC Professional +61 2 8245 0704 looks at Indonesia. X page 33 [email protected] Advertising: Lost privacy costing big time Naomi Burley Open-plan offices are taking a +61 2 9290 1788 heavy toll on workers’ engagement, [email protected] creativity and wellbeing – and one of the reasons is that they know Big Brother is watching. X page 37 Disclaimer: While GRCI uses its best endeavours in preparing and ensuring the accuracy of the content of this publication, it makes no representation or warranty with respect to the accuracy, applicability, fitness, legal correctness or completeness of any of the contents of this publication. Information contained in this publication is strictly for educational purposes only and should not be considered legal advice. Readers must obtain their own independent legal advice in relation to the application of any of the material published in this journal to their individual circumstances. The Institute disclaims any liability to any party for loss or any damages howsoever arising from the use of, or reliance upon, any of the material contained in this publication. 4 GRC Professional • July 2015 PRESIDENT’S MESSAGE Changes at the Institute MARtiN TOLAR, MANAGING DIRECtoR OF THE GRC INstitUTE, advised the Board in early July of his intention to resign with effect end August to pursue interests outside of the GRC sector. The Board has accepted his resignation and has implemented the agreed succession plan by promoting Naomi Burley to lead the GRC Institute through to our next phase. Martin has led the GRC Institute for the past nine years. During this time he has led our expansion internationally with over 15 per cent of members now based outside of Australia; the establishment of the GRC Institute as a Registered Training Organisation, allowing for the Associate and CCP courses to be accredited to the level of Certificate IV and Graduate Certificate respectively; the rebranding and repositioning of the then ACI to the GRC Institute, recognising the close interaction between the compliance and risk professions and the growing membership from the risk profession; and working with Standards Australia and our membership in transforming the AS/NZS 3806 Compliance Management standard to become the ISO 19600 Compliance Management standard. On behalf of the Board and members, I wish Martin the best in the next stage of his career and thank him for his efforts over the past nine years. The change in leadership at the GRC Institute has enabled the Board to undertake a full review of operations of the organisation as well as a reassessment of our strategy and direction, working closely with Naomi Burley in her upgraded role. This review is currently underway, led by our former Director and Treasurer Robert Emery. The review is anticipated shortly and any material changes to our operations and direction will be communicated to members. In the meantime, it is business as usual at the GRC Institute under Naomi’s direction. The traditional End of Financial Year networking events will be held in Sydney, Melbourne, Brisbane, Perth and Auckland in August. This is a great opportunity to meet your fellow risk and compliance professionals in a casual environment, share insights in our profession, make new friends and reacquaint with old ones. I encourage you to attend these events which are free for members and a small fee for non-members. Places are strictly limited so I recommend that you register soon to avoid disappointment. Registration forms and additional details are available in the Events section of the GRC Institute website. The EOFY Networking event is but one of the many benefits available from your membership to the GRC Institute. Existing members will have received their membership renewal notifications and I am pleased with the response to date in the level of renewals and the new member applications received. The GRC Institute Annual Conference will be held in Melbourne from 28 to 30 October at the Crown Conference Centre. The theme of this year’s conference is “Change Catalyst” and our line-up of inspirational speakers will explore topics across the change management spectrum at an organisational and individual level. The feature of our conference is on the focus of practical insights from senior practitioners in governance, risk and compliance. Back by popular demand, we will be running a change management simulation as well as a series of breakout sessions. Along with our gala dinner, graduation ceremony and annual awards presentation our conference again promises to be the must-attend event of the 2015 conference season. Additional information on GRC 2015, the 19th Annual GRC Institute Conference, is available on the website (www.grcconference.com.au). I look forward to seeing you at what will be the conference event of the year for risk and compliance professionals. Alf Esteban CCP, President, GRCI 5 Reader Poll Last month’S Poll Best from around the web Reader Poll BYODs These were the stories being discussed at the GRC Institute this month: Is manager AS WE OUTLINE IN OUR stoRY on page 31, how easy would it be for your liability a employees to grab a client list and forward it TALK ABOUT SHOOTING to themselves or others or copy it onto a USB YOURSELF IN THE FOOT! X step too far? memory stick and walk out the door? Organisations can spend years developing AS WE REpoRT ON paGE 12, THERE templates, operations manuals, procedures, TOO LATE TO SAY SORRY X is a huge divide in opinion on whether internal software and client data. Many can making managers personally liable for their take the value of this for granted and it is actions will have any real impact on ethical not until a breach occurs that management behaviour. realises that if the material is passed to the DOES MY INSURANCE This month we’re asking for your opinion opposition, they could lose vital business. COVER THIS? X on the matter, but before doing so check Hence, last month we asked whether your out our story, because as Britain gears for firm has a strict policy on Bring Your Own the introduction of a hard-line approach Devices (BYODs) into the workplace.
Recommended publications
  • An Analysis of the Nature of Groups Engaged in Cyber Crime
    International Journal of Cyber Criminology Vol 8 Issue 1 January - June 2014 Copyright © 2014 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January – June 2014, Vol 8 (1): 1–20. This is an Open Access paper distributed under the terms of the Creative Commons Attribution-Non- Commercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime Roderic Broadhurst,1 Peter Grabosky,2 Mamoun Alazab3 & Steve Chon4 ANU Cybercrime Observatory, Australian National University, Australia Abstract This paper explores the nature of groups engaged in cyber crime. It briefly outlines the definition and scope of cyber crime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups. The paper gives examples of known cases that illustrate individual and group behaviour, and motivations of typical offenders, including state actors. Different types of cyber crime and different forms of criminal organization are described drawing on the typology suggested by McGuire (2012). It is apparent that a wide variety of organizational structures are involved in cyber crime. Enterprise or profit-oriented activities, and especially cyber crime committed by state actors, appear to require leadership, structure, and specialisation. By contrast, protest activity tends to be less organized, with weak (if any) chain of command. Keywords: Cybercrime, Organized Crime, Crime Groups; Internet Crime; Cyber Offenders; Online Offenders, State Crime.
    [Show full text]
  • December 2013 Feature Article: the Year of Surviving Dangerously: Highlights from We Live Security 2013
    December 2013 Feature Article: The Year of Surviving Dangerously: Highlights from We Live Security 2013 Table of Contents The Year of Surviving Dangerously: Highlights from We Live Security 2013 .............................................................3 2013: a Scammer’s Eye View ................................................................................................................................... 11 ESET Corporate News .............................................................................................................................................. 18 The Top Ten Threats ................................................................................................................................................ 18 Top Ten Threats at a Glance (graph) ....................................................................................................................... 21 About ESET .............................................................................................................................................................. 22 Additional Resources ............................................................................................................................................... 22 This month we decided to present a retrospective of all 2013, pertained to Java vulnerability CVE-2013-0422 being added to a so we develop and delve into the most prominent threats that couple of popular exploit packs, thus making it more accessible each month had. Also published an article that specifically
    [Show full text]
  • Technical Report RHUL–MA–2014– 2 01 September 2014
    Leveraging knowledge sharing for preventing and investigating on-line banking frauds: On-line Fraud Centre Salvatore Camillo Zammataro Technical Report RHUL–MA–2014– 2 01 September 2014 Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, United Kingdom www.ma.rhul.ac.uk/tech Salvatore Camillo “Toto” Zammataro Leveraging knowledge sharing for preventing and investigating on-line banking frauds: On-line Fraud Centre MSc Information Security Project Report Supervisor: Dr John Austen Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. 1 EXECUTIVE SUMMARY For social, technological and political reasons electronic transactions are now the most used payment method in Europe. As such, fraudsters have been focusing on On-Line transactions to gain money through Phishing and Crimeware. These kind of frauds generates losses for EU citizen of an estimated value of 250M€/year. Banks and Law Enforcement Agencies are engaged in the prevention, detection and prosecution of this crime. Some limit of actual legislation (i.e. Data Protection, International Treaties on cyber-crime, Fraud prosecution laws), low speed of communication between Banks and LEAs, and the fraudster’s speed in taking advantage of weaknesses of the system leave the space for improvement. To improve the countermeasures that Banks and LEAs have deployed, this paper suggests the adoption of an InfoSharing Service between national banking system and Law Enforcement Agencies. This service uses a “hub-and-spoke” framework, where LEA is the hub and banks are the spokes. Target of the service is to shorten the time needed to communicate from Banking Fraud Managers to LEAs, and to share the relevant information on fraudster accounts in the whole banking industry.
    [Show full text]
  • Computer Group Webinar Session 1 Handout (Online/Internet Fraud)
    NORTH KENT MIND – COMPUTER GROUP WEBINAR SESSION 1 HANDOUT (ONLINE/INTERNET FRAUD) In this session, we will be covering online fraud (internet fraud) and how to protect you against it. What is Online/ Internet Fraud? Internet fraud is a type of fraud or deception, which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. The most common online frauds include: Greeting Card Scams Whether it’s Christmas or Easter, we all get all kind of holiday greeting cards in our email inbox that seem to be coming from a friend or someone we care. Greeting card frauds are another old Internet scams, If you open such an email and click on the card, you usually end up with malicious software that is being downloaded and installed on your operating system. The malware may be an annoying program that will launch pop- ups with ads, unexpected windows all over the screen. If this happens, your computer may also start sending private data and financial information to a fraudulent server controlled by IT criminals. Greeting Card Scam Example: 1 North Kent Mind – Computer Group Webinar Session 1 Handout Phishing Email Scams Phishing is a type of online scam where criminals send an email that appears to be from a legitimate company and ask you to provide sensitive information. This is usually done by including a link that will appear to take you to the company’s website to fill in your information – but the website is a clever fake and the information you provide goes straight to the crooks behind the fraud.
    [Show full text]
  • Dark Market Report: the New Economy
    2020 DARK MARKET REPORT: THE NEW ECONOMY DARK MARKET REPORT | THE NEW ECONOMY CONTENT INTRODUCTION 3 PRICES FOR HACKER GOODS AND SERVICES 5 CYBERCRIME SERVICES 8 Ecommerce Services .................................................................................................................................................. 8 Dark Web Advertising ................................................................................................................................................. 9 Money Laundering, DDOS, SMS Bombing ............................................................................................................... 10 Bulletproof Hosting ..................................................................................................................................................... 14 Commercial Software ................................................................................................................................................. 15 Customer Service ........................................................................................................................................................ 15 UNDERGROUND MARKETPLACE PRODUCTS 17 Business Fullz .............................................................................................................................................................. 17 Financial Loans ............................................................................................................................................................ 18
    [Show full text]
  • Targeting Scams Report of the ACCC on Scam Activity 2009 Foreword
    Targeting scams Report of the ACCC on scam activity 2009 Foreword The Australian Competition and Consumer Commission has seen a substantial increase in the number of scams being reported over the last few years. Complaints to the ACCC about scams climbed by 16 per cent in 2009 and many consumers reported substantial losses. The ACCC hopes this report will stimulate discussion about how we can best confront the challenges posed by scams. The report explains key trends in scam activity and highlights the impact of scams on the community. Importantly, the report highlights the cooperative work undertaken by Peter Kell, Chairman, Australasian the ACCC, other regulators and law enforcement agencies to disrupt Consumer Fraud Taskforce scams and educate consumers. This cooperative work, through organisations such as the Australasian Consumer Fraud Taskforce (ACFT), involves agencies in Australia and overseas. Scams can be sophisticated and difficult to identify. Many victims feel embarrassed and can suffer considerable losses as they are fleeced of many thousands of dollars. Increasingly, victims are targeted online, which is why the ACFT has focused on this area for its 2010 Fraud Week campaign: Online Offensive—Fighting Fraud Online. To complement the theme of the 2010 Fraud Week, the ACCC has invited a number of businesses and community and government agencies to partner with the ACFT for its online campaign. Online businesses have a particularly vital role to play in combating scams. The online businesses that scammers may target (for example, dating websites, online auctions, classifieds and social networking websites) have great potential to assist in detecting new scams and alert consumers most at risk.
    [Show full text]
  • Protecting Consumers Online
    A Report From the Federal Trade Commission Staff December 1999 The FTC’s First Five Years Protecting Consumers Online www.ftc.gov FEDERAL TRADE COMMISSION, 1999 ROBERT PITOFSKY, Chairman SHEILA F. ANTHONY, Commissioner MOZELLE W. THOMPSON, Commissioner ORSON SWINDLE, Commissioner THOMAS B. LEARY, Commissioner TABLE OF CONTENTS Executive Summary .................................................... i In the Beginning... .................................................... 1 A Blueprint for the Commission .................................... 1 Rapid Changes in the Marketplace .................................. 2 Stopping Fraud, Deception and Unfair Practices ............................. 4 Technology as a Tool ............................................. 4 Consumer Sentinel ......................................... 4 Internet Lab .............................................. 5 Surf Days ................................................ 6 Law Enforcement ................................................ 7 Technology-Based Scams ................................... 8 Traditional Scams ........................................ 10 Traditional Advertising ..................................... 14 Rules and Guides ......................................... 15 Education ..................................................... 16 For Consumers ........................................... 16 For Business ............................................. 18 Protecting Consumers’ Privacy Online .................................... 19 Globalization .......................................................
    [Show full text]
  • Improving Internet Usability – a Framework for Domain Name Policy Evaluation
    Improving Internet Usability – A Framework For Domain Name Policy Evaluation By Joshua Rowe B. App. Sci. (Comp. Sci.) School of Business Information Technology Faculty of Business October 2008 DomainUsability.com A thesis submitted in partial fulfilment of the requirements for the degree Master of eBusiness from RMIT University Improving Internet Usability – A Framework For Domain Name Policy Evaluation Declaration I certify that except where due acknowledgement has been made, the work is that of the author alone; the work has not been submitted previously, in whole or in part, to qualify for any other academic award; the content of the thesis is the result of work which has been carried out since the official commencement date of the approved research program; and, any editorial work, paid or unpaid, carried out by a third party is acknowledged. __________________________ Joshua Luke Rowe Dated Saturday, 25 October 2008 ii Improving Internet Usability – A Framework For Domain Name Policy Evaluation Copyright Licence I hereby grant to the RMIT University or its agents the right to archive and to reproduce and communicate to the public my thesis or appropriate durable record in whole or in part in the University libraries in all forms of media, now or hereafter known. I retain ownership of copyright and all other proprietary rights, such as patent rights. I also retain the right to use in future works (such as articles or books) all or part of this thesis. __________________________ Joshua Luke Rowe Dated Saturday, 25 October 2008 iii Improving Internet Usability – A Framework For Domain Name Policy Evaluation Acknowledgements Internet co-inventors such as Vint Cerf, Tim Berners-Lee and Ray Tomlinson provided me with the canvas on which I could begin my professional career that has centred on the commercial use of the Internet.
    [Show full text]
  • Taking Down Websites to Prevent Crime
    Taking Down Websites to Prevent Crime Alice Hutchings, Richard Clayton and Ross Anderson Computer Laboratory University of Cambridge Cambridge CB3 0FD Email: fi[email protected] Abstract—Website takedown has been used to disrupt criminal affected [35], [36]. Moore and Clayton [33] examined the activities for well over a decade. Yet little is known about its effects of website takedown on phishing, and found that it overall effectiveness, particularly as many websites can be re- is helpful, but it cannot completely mitigate phishing attacks placed rapidly and at little cost. We conducted lengthy interviews with a range of people actively engaged in website takedown, as it will never be instantaneous. including commercial companies that offer specialist services, organisations targeted by criminals, UK law enforcement and II. RESEARCH QUESTIONS service providers who respond to takedown requests. We found We interviewed key players who are actively engaged in that law enforcement agencies are far less effective at takedown than commercial firms, who get an awful lot more practice. the website takedown process to explore the issues with it in We conclude that the police must either raise their game, or depth. The questions we tackle in this research are: subcontract the process. 1) How do websites differ according to their criminal purpose? I. INTRODUCTION 2) What organisations are involved in website takedown? Website takedown is a key tool used by financial institutions 3) How are websites taken down? to defend against ‘phishing’ – the use of fraudulent websites 4) What are the challenges with website takedown? to steal customer credentials [33].
    [Show full text]
  • UC San Diego UC San Diego Electronic Theses and Dissertations
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Investigating Large-Scale Internet Abuse Through Web Page Classification Permalink https://escholarship.org/uc/item/8jp0z4m4 Author Der, Matthew Francis Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Investigating Large-Scale Internet Abuse Through Web Page Classification A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science by Matthew F. Der Committee in charge: Professor Lawrence K. Saul, Co-Chair Professor Stefan Savage, Co-Chair Professor Geoffrey M. Voelker, Co-Chair Professor Gert Lanckriet Professor Kirill Levchenko 2015 Copyright Matthew F. Der, 2015 All rights reserved. The Dissertation of Matthew F. Der is approved and is acceptable in quality and form for publication on microfilm and electronically: Co-Chair Co-Chair Co-Chair University of California, San Diego 2015 iii DEDICATION To my family: Kristen, Charlie, David, Bryan, Sarah, Katie, and Zach. iv EPIGRAPH Everything should be made as simple as possible, but not simpler. | Albert Einstein Sic transit gloria . glory fades. | Max Fischer v TABLE OF CONTENTS Signature Page . iii Dedication . iv Epigraph . v Table of Contents . vi List of Figures . ix List of Tables . xi Acknowledgements . xiii Vita . xviii Abstract of the Dissertation . xix Chapter 1 Introduction . 1 1.1 Contributions . 4 1.2 Organization . 6 Chapter 2 Background . 8 2.1 The Spam Ecosystem . 8 2.1.1 Spam Value Chain . 9 2.1.2 Click Trajectories Finding . 10 2.1.3 Affiliate Programs .
    [Show full text]
  • Corporate Policy Template V1.0
    Fraud Policy North Wales Police Fraud Policy Governance: Operations Committee Policy Owner: DCI Fraud Lead Department: Local Policing Services Policy Writer: LPS Fraud Lead Policy Number: 151 Version: 1.0 Effective Date: 12/12/2018 Review Date: 12/12/2020 CHANGE HISTORY Version Author Changes Ratification No: 1.0 Brian Kearney Contents 1. WHY IS THIS POLICY REQUIRED? ..................................................................................................... 3 2. WHO SHOULD USE THIS POLICY? .................................................................................................... 3 3. WHAT SHOULD I CONSIDER WHEN USING THIS POLICY? ................................................................ 4 4. ROLES & RESPONSIBILITIES ............................................................................................................. 4 4.1 Force Control Room .......................................................................................................................... 4 4.2 Any Officer receiving a report of a fraud .......................................................................................... 4 4.3 FASO (Financial Abuse Safeguarding Officer) ................................................................................... 4 4.4 NWP Investigation Support Team .................................................................................................... 4 4.5 Fraud SPOC’s ...................................................................................................................................
    [Show full text]
  • ACKNOWLEDGMENTS September 16, 2021
    ACKNOWLEDGMENTS September 16, 2021 Since the beginnings of its a development in 1983, the 211 LA County Taxonomy (formally titled A Taxonomy of Human Services: A Conceptual Framework with Standardized Terminology and Definitions for the Field) has benefited from the generous assistance of many people who have shared their expertise with us and helped us identify distinct human service concepts, the appropriate placement of those concepts in the hierarchy and clear, concise and accurate wording for preferred terms and definitions. A variety of authoritative publications have also been used in the design of both the structure and the contents of the Taxonomy, and many publishers have given us permission to quote, sometimes extensively, from their copyrighted materials. Also utilized in our research were brochures produced by agencies providing a targeted service; a variety of other human service taxonomies, thesauri and dictionaries; and, of course, all of the very useful websites that are available on the Internet. Below are the acknowledgments for those resources. Please note that we often use multiple sources to develop definitions which may not be word-for-word quotations from any one of the listed sources. Note also that some of the websites were accessed a number of years ago and the links may no longer be viable. When a dead link is identified, we attempt to find the document at another address and add the viable link, but because we still want to acknowledge our use of the material, we have not removed any of the references. In most cases, a note is added explaining the situation.
    [Show full text]