Once it was announced, the board asked Keyworth to resign. At that point, Perkins also quit in a huff. But that was not all. He also launched a campaign in order to try and discredit Dunn, who he believed had betrayed his trust.
It seems that the charges brought against Dunn are largely the result of Perkins's disinformation and discrediting campaign against her. Perkins is an enormously wealthy, powerful individual, who not only sent out a mass e-mail attempting to discredit Dunn - an e-mail that was said to have influenced the media - but also went to law enforcement officials alongside his lawyers in order to convince them that she had orchestrated an investigation that included the use of pretexting as a method. In the words of Dunn, "If you have enough money and you're willing to spend enough, you can buy and sell somebody's reputation." Apparently, this is what Perkins did.
But is the situation really that cut and dry? Perkins was clearly enraged and took measures to have Dunn removed from the board, which is what he wanted to accomplish. But by taking the matter to law enforcement, he took the issue one step further.
While pretexting is obviously a violation of decent morality, since it was not clear whether or not Dunn was aware that it was being used - or, if she...
HP and Pretexting Back in 2006, Hewlett Packard's management got themselves into both legal and public relations trouble by the way in which they decided to investigate the source of leaks from their Board of Directors to the news media. The case brings about questions about confidentiality and ownership of personal information, its worth and the accountability not only of those who get hold of the information dishonestly, but also those
Perkins - who had retired at the age of 70 but was coming back on the board - had by this time muscled his way into a powerful position within the HP community; he and his powerful board ally, George Keyworth, held special "technology committee" meetings with key HP people the day before each board meeting. Stewart writes that Perkins' little group actually became a "board within a board," and
Social Engineering and Information Security We are in an age of information explosion and one of the most critical problems facing us is the security and proper management of information. Advanced hardware and software solutions are being constantly developed and refined to patch up any technical loopholes that might allow a hacker attack and prevent consequent breach of information security. While this technical warfare continues, hackers are now pursuing other vectors
Foreign Policy of China (Beijing consensus) Structure of Chinese Foreign Policy The "Chinese Model" of Investment The "Beijing Consensus" as a Competing Framework Operational Views The U.S.-China (Beijing consensus) Trade Agreement and Beijing Consensus Trading with the Enemy Act Export Control Act. Mutual Defense Assistance Control Act Category B Category C The 1974 Trade Act. The Operational Consequences of Chinese Foreign Policy The World Views and China (Beijing consensus) Expatriates The Managerial Practices Self Sufficiency of China (Beijing consensus) China and western world: A comparison The China (Beijing
Iraq War As the end of the year slowly approaches, there is an expected transition of power by the United States and its allies to allow the Iraqi people to govern themselves. The media has tried to convince us that we as a nation have liberated the country of Iraq from one of the most brutal dictators in the world's documented history. Saddam equated to a modern day Adolf Hitler. Saddam
Iran Contra and Drug Trafficking An Analysis of Our Government's Role in Drug Trafficking American foreign and domestic policy has long been shaped by more than what is reported in the mainstream media. Yet, sometimes events transpire that the mainstream press cannot ignore -- such as the Iran-Contra Affair in the 1980s. The Iran-Contra Affair revealed an intricate web of CIA black ops, arms and drug trading, smuggling, and regime change --
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now