Generational Dynamics |
|
Forecasting America's Destiny ... and the World's | |
HOME WEB LOG COUNTRY WIKI COMMENT FORUM DOWNLOADS ABOUT | |
She says that middle-level (Gen-X) managers extorted executive (Boomer) management.
I've been relentlessly critical, on this web site, of economists, analysts, journalists, politicians and bloggers who cannot seem to grasp even the simplest, most obvious generational interpretation of what's going on.
I'm still baffled how economists can be so totally dense about the cause of the dot-com bubble of the late 1990s, almost as if they have a brain defect. The dot-com bubble began at precisely the time that the risk-averse survivors of the Great Depression all disappeared (retired or died), all at once, leaving incompetent Boomers in charge as senior managers of financial firms. (See "System Dynamics and the Failure of Macroeconomics Theory" and "Markets fall as investors are increasingly unsettled by bad economic news" for detailed discussions.)
After the dot-com bubble collapsed in the early 2000s, the Generation-Xers began entering middle-management, and the massive credit bubble was launched by means of the creation of fraudulent "toxic assets" that were sold by the trillions of dollars worth to innocent investors. This was possible, as I've written many times, because of the lethal combination of greedy, nihilistic Gen-Xers, combined with greedy, incompetent Boomer bosses. (See yesterday's article, "SEC charges former Countrywide CEO Angelo Mozilo with fraud," for a discussion and illustration.)
Mainstream journalists, economists, analysts, politicians and bloggers are all totally oblivious to such generational explanations, no matter how utterly obvious they are.
So we're pleased to be able to report on a small victory.
Yves Smith, of the highly popular Naked Capitalism blog, has written an article that closely adopts the generational model that I described above.
Smith does not refer to the Gen-X and Boomer generations, but it's clear that she's referring to the generational split when she says that "middle level (meaning MD but not executive level) employees were effectively able to extort management." I've written about the power that Gen-Xers have been able to exert over Boomers (and, particularly, that Gen-X women have found Boomer men particularly easy to manipulate), but Smith adds to this model by referring to it as "extortion."
Here's what Smith wrote:
As a result of 1-5, middle level (meaning MD but not executive level) employees were effectively able to extort management. Think of what would happen in a nuclear reactor if the staff who knew how to run it could go on strike. So collectively they were able to get themselves overpaid, often in the form of getting to run bigger risks than they should have (ie, the payout norms may on the surface not have change, in terms of ratio of pay relative to apparent production/profitability, but if you are running much bigger risks, you've increased your personal top line to the detriment of the enterprise).
And the top level guys had reason not to question it because:
I have spoken to some experts who believe this fact pattern to be true, but as of 2-3 years ago could not prove it.
I believe that this probably cannot be established in a rock-solid fashion without having access to internal data (and policies), but I wonder whether readers can point to any anecdotes or case examples (in the public domain, say in Institutional Investor, The Deal, other industry publications) supporting the logic chain above."
It's worth repeating a couple of paragraphs from my recent article on the SEC charges against Countrywide's Angelo Mozilo:
Mozilo's crime, according to the allegations, is that, having discovered the fraudulent activities were going on, he attempted to conceal these activities, and he didn't direct his employees to stop them; and that, having discovered the activities, he engaged in insider trading to benefit from them.
If we now apply Smith's "logic chain" to the SEC's indictment, then we can suggest that Mozilo didn't simply neglect to stop his employees from defrauding investors. The implication is that he couldn't stop the fraud because he was being extorted by his employees. What I call a "culture of complicity" can now be called a "culture of extortion."
There's a certain amusing historical irony to all this.
As I've written before, I've often heard the following from Gen-Xers: "We were working for Boomers, and we did what they told us to do, because we had to, or we would have been fired." This is a modern version of the Nuremberg defense.
I usually answer, "If your Boomer boss asked you to kill his wife, would you do that too?"
But now, with Smith's insight, we have a kind of "reverse Nuremberg defense": the executive management of these financial firms can start to claim that they went along with the the massive fraud by their employees because of extortion.
To which I might ask, "If your employees were committing murder, would you go along with that too?"
Any employee whose job involves committing crimes always has the choice of leaving his job. A person making a six and seven digit salary by defrauding thousands of investors can certainly find a job making a five digit salary doing an honest day's work.
Instead, what we have had are huge numbers of nihilistic Gen-X financial engineers and middle managers, combined with incompetent Boomer executive managers, people with no moral and ethical bearings at all, who knowingly defrauded investors for their own financial gain, and destroyed the global financial system along the way.
(Comments: For reader comments, questions and discussion,
see the Financial Topics thread of the Generational Dynamics forum. Read
the entire thread for discussions on how to protect your money.)
(7-Jun-2009)
Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004