Category Archives: Author Post
Continuing with the theme of setting each book in a different sector, the Fraudster Series moves to the media industry in the fourth book. Conspirator begins with a hedonistic party thrown by a media mogul in Coorg. Mingling and conniving away from prying eyes and ears, is an intriguing cross-section of powerful men and women – politicians, businessmen, celebrities, and even a blackmailer and a purveyor of fake news.
Things go awry when murder strikes, and very soon, Inspector Dhruvi Kishore finds herself in the bewildering world of fake news, paid new and tailored new.
Be it the west or India, the last year or two have been roiled by fake and disingenuous news. Fake news and dubious social media posts are said to have played a major role in the 2016 US presidential elections. Russia is said to have been involved in it too (Russia has denied the allegation). National boundaries are, of course, meaningless in our digital world.
Closer home, I recently came across a WhatsApp message that seemed to have a particularly malicious intent. The message purported to be a “letter” from a senior director of a global manufacturer of breakfast cereals and snacks to a customer. This purported letter “acknowledged” that the company uses pork and beef gelatin in their products. The malicious message sought to tarnish a global brand in India by taking a leaf out of the Sepoy Mutiny of 1857.
To my horror, I found educated and “enlightened” people forwarding and spreading the message. Even the learned, it appears, fall for such obvious ploys and become unwitting abettors of this insidious mendacity. This is especially so on WhatsApp, where messages can’t be traced back to the originator (unlike Facebook and Twitter).
Clearly, politics is not the only field where fake news rears its ugly head. The business world too is tailor-made for it – tons of money can be made from it. And there are haunts other than politics and business too.
Conspirator distinguishes between three shades of this malaise – fake news, paid news and tailored new. The last is perhaps the most debauched of the three. It happens when trusted journalists (in newspapers, TVs or websites) customise headlines and content to suit private interests – political, commercial or any other. The guardians of truth stoop to cheat and betray the trust they enjoy.
The ones who do this are sly, intelligent people who practice their deceit in a way that makes it difficult for the unsuspecting reader/viewer to realise that what she is reading/watching is tailored news. It sneaks in under her guard and corrupts her perception and beliefs.
Conspirator is the story of such people and their craft. The greatest intangible asset of the media is their ability to influence opinions and choices. The antagonists in the story make use of it to the hilt.
Let me state at the outset that I believe the current uproar about Facebook (FB) and Cambridge Analytica (CA) is justified. Whether it leads to anything substantial or not, a public conversation about how private data is harvested and used was long overdue.
Of course, a key reason it has garnered so much attention is that it was a US election that was allegedly meddled with. Many other elections may have been manipulated in the past as this article suggests, but little notice has been taken of the matter.
With that context, here is a perspective:
As long as there is money to be made by influencing individual choices, people will try to shape those choices, both overtly and covertly. FB and CA are just recent instances. It may well have been some other firm. Even if these two firms are “dealt with”, the future will see more firms misusing our private data. To that extent, FB and CA are almost incidental. As long as there are ways to pry into our lives and manipulate us, people will attempt to do so.
Consequently, it is up to us voters and consumers to guard against it, and not take the easy option of assigning the entire blame to FB or CA. Yes, there is an urgent need for an entirely new set of standards around how private information is harvested and used. And hopefully, we will see something on that very soon.
Meanwhile, as a private individual, I have little or no ability to influence what Facebook, Google and their like do with my data. Nor can I meaningfully influence what our lawmakers will come up with. My only way forward is to look inward and reassess my own response. And be less gullible.
But first, let me take a step back.
Influencing voters is not new. It has been happening for as long as politics has been around. Be it strident TV anchors drowning our views with their clamour, or wily columnists putting out polished pieces that appear balanced and objective, or whisper-campaigners insidiously biasing us, manipulating our choices has been an established occupation for a long time. The issue under discussion is just the next chapter in the same sordid drama.
Stripped of jargon and technology, isn’t CA also doing the same old thing? They too tried to influence voters, just as some in the established media have been doing. Some have even gone to the extent of setting up fake think-tanks and trying to manipulate Wikipedia’s content to boost one person’s reputation and tarnish another’s. This is in addition to “placing” articles and op-ed in the traditional press.
Are such machinations the preserve of any one part of the political spectrum? I think not. Some employ crude methods because they know no better. Others take a nuanced and a less obvious approach, wherein they appear erudite and independent (and therefore more credible). And a few even resort to planting crass posts that have ostensibly been authored by their opponents.
At the end of the day, we, the voters and consumers, are the victims of it all. This flood of duplicity will take newer forms as time goes by. Our best defence would be to develop the ability to see through such manipulations and to erect mental defences.
The first step is to become sceptical – even cynical – about anything I receive on social media or through the traditional media. I must not accept something just because it is neatly typed out and formatted. Nor should I blindly accept opinions without first understanding the writer’s and/or the publisher’s predispositions.
Among the most virulent of campaigns are the ones executed on messaging platforms such as WhatsApp, where there is no practical way of tracing back malicious posts to their sources. Anonymity, we have seen, spawns irresponsibility.
Unfortunately, many of us knowingly abet this malice. We don’t think twice before forwarding (and thereby propagating) venomous messages that resonate in our own echo chambers. Sometimes, our conscience troubles us just enough for us to add “forwarded as received” to the message, and we hold ourselves absolved.
This deception is not the preserve of politics. A WhatsApp message has been circulating over the past year about a certain breakfast cereal brand. The message tries to malign the brand by suggesting that the manufacturer uses pork and beef gelatine in its products. Who authored such a message, is anyone’s guess. But the person who stands to gain the most would be a competitor.
In summary, this is not just about FB or CA – they are mere examples. The issue is much larger. Trust is rapidly becoming a scarce commodity in this hyper-connected world of ours. Publishers, platforms and content creators are adapting to this changed reality (and opportunity).
So should we, as voters and consumers. In this endeavour, scepticism would probably be our best ally.
Composed by a reader and a well-wisher in verse form!
A banker, she dies, soon after she has deposed
A chairman, he dies, in him trust was reposed
A server, it’s hacked, in it untold secrets composed
Illicit finance and crime coalesce in a thriller proposed
Will all be unravelled as Inspector Ranade disposed?
A roller coaster ride, if ever there was one
A corporate thriller with twists that get undone
Criminals and crooks with scruples none
Keeps you riveted, as the culprits are on the run
Try solving this locked room mystery, it’s fun!
As cash crunches strike e-tailers, valuations plummet and down-rounds loom large, the stark reality facing e-commerce unicorns become clear for all to see. Protestations that all is well, and attempts to talk up valuations become less credible by the day. As boardroom conflicts escalate and the day of reckoning fast approaches, a shake-out in the sector becomes imminent. The e-commerce sector becomes a pressure cooker.
Against this backdrop, take a hypothetical e-tailer unicorn that is facing a cash crunch. What if the e-tailer suddenly discovers bugs in its offices and finds that it is the target of corporate espionage? To make matters worse, an investor disappears and a massive data theft follows.
The all-important funding round stalls.
As the stakes escalate and risk surges inexorably, murder follows.
This is the fictional tale narrated in SABOTEUR, the latest corporate thriller set in Bangalore. As bots mimic humans in the Indian cyberspace, men risk millions in Hong Kong. A story of a wounded unicorn and its venture fund investors.
Insider trading, I’ve often thought, must be one of the easiest white-collar crimes to pull off. Even easier than procurement fraud, which must be one of the most pervasive.
Someone in the accounts department of a listed company tells his friend or relative: ‘We’ve done better than expected this quarter. We’ll beat market expectations.’ The friend promptly buys a hundred shares of the company. And when the results come out and the share price surges, the friend is a few thousand rupees richer.
Now, how do prosecutors even begin to establish that price-sensitive information was used to profit from the trade? Unless, of course, the insider was foolish enough to put his tip on an email or a text message. Not only is insider trading easy to pull off (at least on a small scale), it is also horrendously difficult to prove.
There are tens of thousands of people in listed companies who possess such price-sensitive information from time to time. It’s not just the blokes in the accounts department, but also others too – both employees and outsiders (auditors, consultants, I-Bankers, advisors, etc.).
During my tenure at the Big Four audit/consulting firms, this was something we had to constantly look out for. The law explicitly prevents auditors and consultants from divulging such information – inadvertently or otherwise – to any party who may benefit from it. And we were prohibited from owning stocks of companies we audited or advised. Independence/propriety is indeed a big deal at these firms.
Be that as it may, many do believe that insider trading is prevalent in India. On a small scale, at least.
A couple of years back, I was wondering how insider trading could be ‘institutionalized’ (by a hypothetical Indian Prof. Moriarty, if you will) and scaled up. I sat down and ‘designed’ a suitable mechanism. To my delight, I found the scheme eminently workable, and reasonably watertight. And more importantly, it could be implemented with simple technology that is widely available.
I then put on another hat (that of an investigator or SEBI), and began looking at how one would go about discovering and unraveling the insider trading scheme once it was implemented. Clearly, that would require sifting through tons of stock market data, and possibly the use of analytics.
Once I had both ends of the scheme figured out, I built a murder mystery around it. That became Insider, the novel that Hachette has just released. If you do get to read it, please drop me a note. I’d like to hear what you think of the workability of the little scheme.
The Reserve Bank Governor is spot on when he says that Indian banking is in the midst of a revolution. The Unified Payment Interface (UPI) launched yesterday is nothing short of revolutionary.
Mobile banking so far has been about doing a few things with your bank account using your mobile phone. It is largely restricted to the bank in which you have your account. UPI now takes it to a new level – it cuts across banks. You can now have a single identifier that can be used across all banks.
The positives are many, as can be gleaned from today’s business newspapers. It can potentially replace digital wallets that impose boundaries on where you can use them. Paytm, for instance, can be used to pay for Uber rides, but not Ola. UPI, once rolled out, will enable you to make mobile-based payments for virtually anything.
But along with this unprecedented convenience comes unprecedented responsibility.
Until a few years ago, your physical signature was your identifier. The advantage was that it couldn’t be ‘stolen’ from you. Yes, a forger could duplicate your signature, but that called for uncommon forging skills. Unfortunately in the digital era, your digital signature can be stolen and replicated if you happen to be careless. And money can vanish in seconds.
Access to our mobile numbers and emails are rapidly taking on a central role in our digital ids, for that is what financial institutions use to validate our identities. Be careless about these, and you will leave yourself open to unprecedented levels of fraud.
One would do well to understand the risks that come with UPI, as there are any number of ways to steal your digital identity. Make sure that you know your way about before jumping headlong into UPI.
For much of the 40-odd years that I have been devouring fiction, the imaginary worlds I journeyed to have been divorced from the real world I lived in. Be it the nineteenth century London of Conan Doyle and Edgar Wallace, or the mid-twentieth century England of Agatha Christie and Enid Blyton, or Perry Mason’s California, they were all a far cry from the Indian city life I was immersed in.
What were moors and mews that Christie and Doyle revelled in? What were these mouth-watering scones and tarts that peppered Enid Blyton’s pages? I had never seen a scone in my middle-class life of the seventies. Nothing I read seemed to have much in common with the real world around me. While they were not as alien as Tolkien’s Middle Earth or Asimov’s Trantor, they were nonetheless unfamiliar.
Why didn’t we have fiction from our own world, I wondered. Was that why RK Narayan appealed to so many of us? Apart from the undeniable craft he possessed, one could relate to his characters and locales. They seemed real; they felt as if they were from our world. Admittedly, what we read was limited by what local libraries stocked and Sunday second-hand book shops offered.
When I gave up studenthood to enter the corporate world, another question popped into my head. Why was so little fiction set where I spent the largest chunk of my waking hours? Why did so few authors write about the corporate world? Surely, there was no shortage of conflict and emotion in the workplace? And the stakes were high too; far higher than in private lives. Talk about motive for crime, and there was ambition, collusion, malfeasance, corruption, love, lust, frustration – you name it!
Yet, there was very little ‘corporate crime fiction’.
Wouldn’t it be great to have good crime fiction set in India? Well-crafted plots that we can relate to; familiar victims we can empathise with; recognisable antagonists we can heartily hate? With more Indians turning to writing, will we see a surge of crime fiction set in India? Above all, wouldn’t it be great to read gripping narratives written by Indian hands for Indian eyes?
Then, the penny dropped. While I waited for others to do it, why not take a shot at it myself?
I had already made a beginning with writing epic fantasy, and I had loads of material from my three decades in the corporate world. I had seen ambition and greed at close quarters, and had witnessed sharp minds cross the thin line that separated the two. Opportunities for crime were aplenty, with many readymade for crime fiction.
I did take a shot at it, and the attempt became Fraudster. I am happy that one of the Big Five global publishing houses decided to back the novel. Fraudster is about greed and temptation in banking, which is a very thin sliver of larger corporate India. There is space for a lot more stories; tons of them. I hope better writers than I turn to it too.
This blog was originally published as a guest post at Printasia.
A question I frequently get asked is whether I had any specific purpose behind writing Fraudster. Was I irked by the atmosphere in corporate India, one newspaper journalist asked. Did I want to expose their wrongdoings, another interviewer wanted to know.
The answer is an unequivocal ‘No’.
I’ve had lots of fun during my three decades in the corporate world, and some of my best experiences have been there. Not to mention some of the brightest minds and the finest human beings I met, and the many friends I made there. Far from being irked, I am thankful to the corporate world for showing me an avenue in which to try my creativity.
Why then did I choose to write a novel about some murky realities of the banking world?
The fact of the matter is that the corporate world is a fertile ground for stories – inspirational or fictional. It is a melting pot of many types of people; men and women driven by different sets of values, priorities and motivations. Each one has a different worldview, and the environment has far more than fifty shades of grey.
It has a fascinating interplay of every emotion one can think of, and every kind of conflict. Fiction, after all, is about emotive conflict. Consequently, the corporate world lends itself wonderfully to crime fiction.
The stakes are high too. A person who is worth a million dollars in his private life may be running a 500 million dollar business. A banker who may be worth even less, could be handling a loan portfolio worth billions. A peculiarity of banking is that ordinary men and women handle vast amount of other people’s wealth. Billions upon billions of dollars of it.
If a banker falls to temptation and siphons off a small part of the money he oversees, he can gain a lot more than he can hope to gain by any deception in his private life. The potential payoffs for crime, especially white-collar crime, is huge.
That, in turn, provides one of the essential ingredients for crime – motive.
That’s not all. The corporate world also provides a virtually unlimited supply of the other two key ingredients as well – opportunity and means. With all three main elements covered, it becomes an ideal milieu for crime fiction.
But merely setting a murder in a corporate office, or robbing an ATM, does not make it a corporate crime. The nature of the deception and the modus operandi of the crime must have business processes at its heart. It must find or construct credible loopholes in the way businesses are run, and must take advantage of them.
To do that, a writer must have spent sufficient time in the corporate world and observed its failings. There must be millions of people who have done that, but yet, we have very little corporate crime fiction in bookstores. Apart from John Grisham, there are very few authors who write good fiction of this variety. I wonder why?
The previous post made the case for banks to focus on the proverbial elephant in the room, i.e. fraudulent loans. With loan frauds touching 12% of PSU banks’ net profit, the case cannot be clearer.
Consider the following incidents:
- The stock in a warehouse is pledged for three different loans, and none of the banks knows that the stock is pledged to others.
- A loan is given to ‘ABC Cables’ for factory renovation, but the factory remains shut. The watchman says that the promoter can be found only at the newly refurbished ‘ABC Bar & Restaurant’.
- A property worth 20 crores bears a valuation certificate showing its value as 40 crores.
- An expensive new CNC machine is hypothecated to three different banks, but the machine in reality is a 25-year old fourth-hand wreck.
- The collateral for a loan is stock, but the actual stock is one-fifth of what it is on paper. And the bank doesn’t have keys to the warehouse.
- Newly supplied cartons of computers have only stones and thermocol.
- An auditor certifies the finished goods inventory to be three times the actual inventory.
None of these is of the scale of the alleged Syndicate Bank scam, but few of these, if any, would be unfamiliar to seasoned bankers. It is such frauds, along with some sophisticated ones, that have cost the banking sector Rs. 16,690 crores between 2010 and 2013.
How did this happen? The problem lies as much within banks as in the wider ecosystem, and the weaknesses are both behavioural in nature and systemic.
Basic banking tenets are ignored when operating staff view a bank’s requirements as blind procedures to be followed, or when supervisors pressurise their staff to cut corners. Some are happy to tick the boxes without doing the necessary due diligence. A good part of loan frauds is due to sheer negligence or lack of tools, but another part involves collusion.
While frauds are discovered only when repayment default occurs, their causes lie in weaknesses in the earlier stages of the loan process.
As with any malaise, prevention is better than cure. To do this, we need to improve operating effectiveness within banks, and at the same time, we must implement a central anti-fraud mechanism that can be shared by banks
Improving operational effectiveness
While processes may vary across banks, some key aspects of the loan life cycle are common, and need close attention (see graphic below).
The idea is to make bankers at all levels more accountable and less susceptible to pressure from their bosses. The operating level person who gathers information claims innocence, as he was not the person who had approved the fraudulent loan. At the same time, the bank’s management disclaims responsibility, saying that their decisions are only as good as the information they get. Who then, is responsible? Clearly, it must be both.
According to Deloitte’s Indian banking fraud survey, the top two reasons for frauds are lack of supervision (73%) and pressure to meet targets (50%). This suggests that the management is as responsible as the staff. Unless both are held accountable, provided appropriate tools, and incentivised, it is difficult to see the situation changing.
A bank afflicted by loan frauds must take several steps.
- Firstly, it must commission a fraud risk assessment of the loan process, which will help identify weak areas and take corrective measures.
- Next, it must institute a practice of conducting independent external audits on a random sample of loans. These audits must include surprise physical verification of collaterals, and independent validation of documentation and valuations.
- Third, whenever a fraud occurs, it must trace the histories of colluding employees to identify frauds they may have earlier been perpetrated.
- And finally, it needs to modify employee appraisal systems to bring frauds into focus, and make fraud management central to a bank’s balance scorecard. This must be supplemented with disciplinary action that includes criminal charges.
Even after implementing these steps, the work would only be half done. The other half involves anti-fraud tools.
Do bankers have the necessary tools to detect potential loan frauds? How do they profile loan applicants? How do they inquire into a promoter’s past loan history? How do they know that a collateral is not already pledged elsewhere? For this, we must turn to the second set of actions: implementing a centralised anti-fraud mechanism.
A central anti-fraud system
While RBI has a central fraud monitoring cell, it does not have the necessary tools to prevent frauds. RBI (or some other central agency) must build a centralised system that enables banks to catch potentially fraudulent loans in time by exchanging information on frauds, collaterals, defaults and fraudsters.
Just as a shared claims register helps insurance companies fight duplicate claims, a shared facility will help banks prevent sanctioning fraudulent loans. And if one is sanctioned, it can prevent the disbursal of funds. The central anti-fraud system should have details of all frauds, loans, defaults, defaulters, failed companies, promoters, their close associates, collaterals and fraud schemes. But it must be done in a way that doesn’t compromise the privacy of borrowers.
A promoter or an employee who hits upon a successful fraud scheme is unlikely to stop with one fraud. A shared facility will help nip it in the bud. Similarly, a valuer who overvalues collaterals can be caught sooner rather than later. Wilful defaulters can be pushed out of the banking system.
It is also important to maintain an ‘incident register’ with details of suspicious incidents that are yet to be declared fraudulent. These incidents may be under investigation or under a legal process, but it is critical that other banks are made aware of suspicious activity at the earliest. This incident register must be designed carefully to ensure that privacy and legal rights of customers are not violated. A metadata approach may prove useful in this regard.
The above graphic outlines the concept of a central anti-fraud system. The system must be adaptive, and should be able to flag high-risk promoters, companies and loan applications, after taking into consideration the linkages mentioned in the graphic. In time, it should be able to take in loan application details and give it a risk rating.
Powerful analytic tools are now available, but for them to be effective, they need to be imaginatively combined with an understanding of the fraudster’s methods and the vulnerabilities of our banking systems. Sound design will be key, and the system must have the inbuilt ability to learn on the job. With fraudsters staying a step or two ahead of banks, we will need some sharp minds to participate in this initiative.
There will be those who will seek to thwart the initiative, but the time has come for the banking sector to take some serious steps to fight fraudulent loans.
Here is a stunning statistic: banking fraud has grown eleven times faster than banks’ profits have. PSU banks saw fraud grow at a CAGR of 102% between 2010 and 2013, when their profits grew at 9%.
One may be tempted to think that this unprecedented malaise must be due to across-the-board vulnerabilities in banks. It is not. Banks have contained certain kinds of fraud very well, but have been spectacularly unsuccessful in dealing with some others.
Shareholder wealth eroded
Disaggregated data on frauds for individual banks is not easily available. However, a recent article by S Pai and M Venkatesh, which was based on RTI data, offers an interesting insight. When their information is combined with IBA’s bank performance data, the impact of fraud becomes visibly shocking (see chart below).
One bank has lost more to fraud than its entire profit. Even the country’s largest bank lost a large chunk of its profits to fraud. The banks in between, which are smaller and earn less, have fared worse. But are these banks representative of the banking sector? Or, are they just outliers that make sensational news? What then is the situation in the sector as a whole?
Combining data from RBI and IBA shows that frauds in PSU banks as a whole stood at 12% of their combined profits in 2013. In any company, the management would be willing to go to great lengths to bring 12% additional profitability. Surely, there is a case for banks to look at frauds seriously?
Projecting the impact of this malaise further, we find that effective fraud management could potentially add a whopping Rs 52,000 crores to shareholder wealth. To put it in perspective, that’s more than the GDPs of 40% of India’s states! This is most likely an underestimate, as the market would reward increased diligence with a higher PE ratio.
Further, bear in mind that RBI’s data includes only reported frauds. Even if we assume that all detected frauds were reported, these figures do not include undetected frauds. Nor does it include incidents that are under investigation, or have not yet been declared fraudulent. Bringing all frauds into the equation would only paint a darker picture.
The elephant in the room
But what kind of frauds are we talking about? Bring up the topic of fraud, and what gets spoken about are phishing, credit card misuse, account hacking, and online/ATM frauds – i.e. technology related frauds. With billions of automated transactions taking place every month, it is not humanly possible to monitor such volumes. Banks therefore turn to technology for a solution, and rightly so.
Software vendors have taken note of this. They offer real time fraud detection tools for online banking, sophisticated pattern recognition algorithms, and a whole range of software products to combat technology fraud. This is indeed welcome, as we need these tools.
To be fair, we have not done badly in mitigating technology fraud risk. In some ways, online credit card transactions are safer in India than elsewhere. The additional authentication factor of sending an OTP to the customer’s mobile phone, for instance, has made online transactions considerably safer in India. This additional authentication factor is missing in many countries. If an overseas merchant’s website is hacked, tens of thousands of customers are immediately at risk.
But in all this discussion, we are missing the elephant in the room.
While technology related frauds account for a whopping 98% of the fraud cases reported, they contribute to a mere 2% of the value. The real elephant in the room is what RBI calls ‘advance related frauds’ – i.e. fraudulent loans.
Between 2010 and 2013, we had 1.12 lakh cases of technology fraud adding up to Rs. 357 crore, whereas a mere 2,760 cases of loan fraud set the sector back by a staggering Rs. 16,690 crore. The loan fraudster is enjoying an unprecedented run.
Technology fraud, on which we focus much of our attention, is now a relative fleabite. It is so because of the attention it has received. Banks have waged war on technology fraud, and have succeeded. But in focussing on technology, we have neglected another vulnerable area – loans. It is in the loans and advances business of banks that the fraudster now stalks.
This disparity between the two kinds of frauds is a result of two things. Firstly, the supply base of tools for fighting technology fraud is well developed. Unfortunately, this is not the case with loan frauds – there are few software products that banks can buy off the shelf. Secondly, the human element (along with the vagaries and moral hazards that come with it) is considerably larger with loan frauds, and the fraudster is seldom alone.
Technology fraudsters are like mosquitoes – they come into your house through windows and cracks, but their damage is limited. But the loan fraudster is a burglar – he breaks in through the back door and makes off with the family silver.
The banking sector has done well in mitigating the technology fraud risk, but hasn’t done enough on the loans front. This has left residual vulnerability in the system that fraudsters have exploited. It is to this that the sector must now turn its attention.
This dire need is underlined by a glance back at RBI’s data. While loan related frauds grew at an astonishing CAGR of 87%, technology frauds have been almost static with a mere 2% growth. Besides, a typical loan fraud is a thousand times larger than a technology fraud.
Tackling loan frauds will be a lot tougher than combating technology frauds. Issues of governance, collusion, negligence and a host of moral hazards will need to be addressed. Software packages that are so effective in mitigating technology fraud risk may be of limited assistance. Further, an unprecedented level of cooperation between banks will be called for.
Part 1 of this article has attempted to make the case for banks to turn the spotlight on loan frauds. Part 2 will discuss what they and the RBI must do to combat this malaise.