Feeds

Motorola's ex-CFO files whistleblower suit

'Treachery' tit-for-tat

Providing a secure and efficient Helpdesk

Who'd a thunk it? Behind Motorola's gloomy Q4 earnings report and corresponding sacking of its financial chief, Paul Liska, there was a tale of alleged treachery and intrigue.

Liska claimed in a court filing unsealed Thursday that his firing was a retaliation for warning the company's board of directors that Motorola's ailing mobile division was "intentionally or recklessly, materially misstating its 2009 forecasts and strategic plan."

But as Moto tells the story, Liska was a "treacherous officer" who caught wind management was displeased with his performance and concocted a "extortion-like scheme designed to portray himself as a whistle blower and demand millions in return for his silence."

The ex-executive filed suit against Motorola late February in Cook Country Circuit Court, Illinois. His claims, in which parts are redacted, says Motorola's Mobile Devices executives were giving forecasts "based on inaccurate or unsupportable financial assumptions."

Liska apparently confronted Motorola's board of directors over the division's flawed forecasts and claimed he was "worried" the unit didn't have a full 2009 business plan by the company's December 15 board meeting.

The company announced Liska's dismissal on February 3, 2009 as part of a quarterly earnings call. Later in an SEC filing, Motorola claimed the sacking was due to "serious misconduct and incompetence."

In Motorola's response - also unsealed today as reported by the Chicago Tribune - the company said its relationship with Liska went downhill as early as summer 2008, when Liska allegedly became jealous of the mobile unit's co-Chief Executive Sanjay Jha's generous compensation package. His claimed "vendetta" against Jha took the form of becoming "erratic, unprepared, abrasive, divisive — and simply absent and 'unavailable.'"

Motorola further alleges Liska tried to "fleece" Motorola by demanding a settlement of more than $37m after he threatened the retaliatory discharge suit.

Liska claims he never demanded a settlement or threatened the company with a lawsuit.

Truly bizarre. As if Motorola's mobile unit needed more things to worry about. ®

Security for virtualized datacentres

More from The Register

next story
Are you a fat boy? Get to university NOW, you PENNILESS SLACKER
Rotund types paid nearly 20% less than people who didn't eat all the pies
Emma Watson should SHUT UP, all this abuse is HER OWN FAULT
... said an anon coward who we really wish hadn't posted on our website
Japan develops robot CHEERLEADERS which RIDE on BALLS
'Will put smiles on faces worldwide', predicts corporate PR chief
Bruges Booze tubes to pump LOVELY BEER underneath city
Belgian booze pumped from underground
Oz carrier Tiger Air takes terror alerts to new heights
Don't doodle, it might cost you your flight
Amazon: Wish in one hand, Twit in the other – see which one fills first
#AmazonWishList A year's supply of Arran scotch, ta
Let it go, Steve: Ballmer bans iPads from his LA Clippers b-ball team
Can you imagine the scene? 'Hey guys, it's your new owner – WTF is that on your desk?'
Oi, London thief. We KNOW what you're doing - our PRECRIME system warned us
Aye, shipmate, it be just like that Minority Report
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.