Menu
Kevin Roy Mawer

Kevin Roy Mawer review: Inappropriate behaviour by IP 52

M
Author of the review
5:39 pm EDT
Resolved
The complaint has been investigated and resolved to the customer’s satisfaction.
Featured review
This review was chosen algorithmically as the most valued customer feedback.

Kevin Mawer is an insolvency practitioner who is based in Leeds and apparently was sacked from 2 previous posts before working for Begbies Traynor where he is now. There are hundreds of complaints about him using underhanded, fraudulent, dishonest, unethical, threatening and uses improper techniques to conduct his business but in the process has allegedly badly treated people and used allegedly unethical attempts to misrepresent and to create cases which allows him to make money claims - even if they are untrue and when he gets caught out he amends claims or withdraws to get out of it, exploiting whatever loop holes he has bee accustomed to. He has ruined a lot of peoples lives (some of which were already ruined) and have acted as a parasite would, do draw whats left of them so he can take for himself and it concerns him and his creditors although the creditors normally get nothing after he has taken everything.

Update by Mawer Informer
Aug 15, 2012 6:05 pm EDT

In my dealings he has been completely dishonest and the more people that share their honest experiences the better it will be so people are armed with the correct information that they need to inform them of the potential issues and how best to deal with errant IPs that cause misery and more less only for their own gain

Resolved

The complaint has been investigated and resolved to the customer’s satisfaction.

52 comments
Add a comment
I
I
Interception of Communications
, MY
Aug 21, 2012 9:19 pm EDT
Verified customer This comment was posted by a verified customer. Learn more

On another forum MawerPawer posted on 11 August that Mawers up to his old tricks again. A subsequent post by the same #1599 was deleted. Can someone repost here exactly what was said?

I
I
Interception of Communications
, MY
Aug 21, 2012 9:07 pm EDT
Verified customer This comment was posted by a verified customer. Learn more

Re-posted due to Internet interruption.

I speak from personal experience. When going through the trauma of this IPs vindictiveness, I was unable to fathom how he invariably seemed one step ahead. He even knew exactly what I had written in court documents. I knew this for certain because once, he made reference to specific comments contained in the (emailed) court papers, and this was before they had been downloaded by the court clerk or forwarded to his solicitor! Disconcertingly, he also had the ability to know where I would be at any given time (ie away from home). He also took pleasure in repeating intensely personal comments that took place between my partner and I, during private phone conversations. It transpired that our mobiles had been cloned. Although this sounds complicated, it is not that difficult to arrange: the perpetrator just needs access to the right equipment. Once in place, whenever the target makes a connection via wifi (as opposed to an Ethernet connection), it is indeed this what makes you vulnerable to prying eyes (and ears).

Now, it goes without saying that the equipment needed to carry out this type of activity is sophisticated and costs thousands of pounds. Officially, only the Police can do this (ie legally), and only if authorised by a district judge, when applying for a warrant (ie if you are the subject of a Police investigation). Contrary to what one might think, in order to put this covert action into operation, virtual access to your home is not a requirement, as it is carried out externally. Unbeknownst to the target, each subsequent time they log onto the Internet, they are logging on via proxy servers. In other words, the target is no longer logging on via their usual IP address (and who normally takes notice of this?). For obvious reasons, the proxy IP addresses on further log-ins change daily, and bounce all around the UK and even Europe. Literally, every single page the victim accesses on the Internet is being mirrored (and recorded for posterity), on another computer. The equipment records EVERY keystroke made, which enables all passwords to be recorded. Therefore, every email received and sent; as well as every account accessed, is being viewed. Changing passwords, or changing your mobile handset/sim makes no difference whatsoever, as the vulnerability lies in the fact that your original IP address has been compromised: simply by the action of connecting wirelessly. There are no measures that can be taken to counteract this, except to stop accessing the Internet, in any format.

Also, when speaking of vulnerability, it seems that most people utilise their iphones as a calendar. But what most don’t realise is, that iphone calendars are electronically (and automatically) mirrored (as are a users notes), directly into their email accounts (although this can be switched off, in the iphone settings). This is simply a sure way (along with the ability to listen to phone conversations and read text messages), to be able to gauge when the target will be away from home. You wont know it, but a mundane trip out can also coincide with the first break-in to your home, whereupon the alarm is overridden (with a simple contraption), and a copy key (usually to the rear of the premises) is made, so that at any future date, (when the enemy wants to be updated with all the latest data from your computer hard-drive for instance), another break-in occurs and the simple action of copying your data to a USB is deployed. Of course, the victim does not know about this until something alerts them, like the intruder making a simple but obvious mistake, such as removing the USB device in a hurry leaving behind an error message on screen. Or, when the enemy gets ahead of themselves and cant resist boasting of what they have done. Once the pieces are put together (and the real terror kicks in), the target then has to go to the trouble of having COVERT CCTV installed, which becomes a necessity but unwarranted expense. Financial misery has already been bestowed upon them as invariably, they have already been forced into bankruptcy, just so a certain IP can be appointed their Trustee. Shortly after the covert CCTV is operating, the targets arrive home with trepidation, and their abject fear and paranoia is confirmed, when viewing back the evidence, they see an intruder letting them self in, WITH THEIR OWN BACK DOOR KEY! Of course, the targets then have no option but to go to the expense of having OVERT CCTV installed, to the outside of the house. Although this serves to deter any further illegal entries (by the same source), it in no way obviates that their IP address may have still been hijacked, or their mobile(s) remain cloned.

Oh, and if you happen to be involved in any family disputes, ensure (with all your might) that no evidence of this emotional fallout is kept on your computer, (and NEVER, EVER be tempted to communicate anything of such a personal nature to that relative by email). If careless, one day you might find yourself in the unbelievable position of discovering that your close – but estranged – family member might have been covertly approached (by a certain IP no less), in an attempt to extract detrimental information from them, (about YOU!). He really will go to these depths, but doesn’t quite comprehend the extent of brotherly love (and family loyalties). But that doesn’t stop him trying.

The IP referred to is not an intelligent man (makes many mistakes and to his detriment is afflicted by the awful trait of bragging), but he is driven in a way that most people with blood running through their veins don’t understand. Personal remuneration is not his motivation either, and he often satisfies his employees by not charging out his time (to them), for all the endless hours he spends pursuing his victims. Sounds strange (for sure), but it is all true, and whilst he adores the kudos of the cut and thrust of his job, it really is like someone else closely associated with him has already imparted on another forum, he positively thrives on the chase AND the kill.

Take heed: if you are not mad before he targets you, you will be on the verge of it by the time he has finished, but there is only ever one truly mad one, and it is him.

I
I
Interception of Communications
, MY
Aug 21, 2012 8:53 pm EDT
Verified customer This comment was posted by a verified customer. Learn more

I speak from personal experience. When going through the trauma of this IP’s vindictiveness, I was unable to fathom how he invariably seemed one step ahead. He even knew exactly what I had written in court documents. I knew this for certain because once, he made reference to specific comments contained in the (emailed) court papers, and this was before they had been downloaded by the court clerk or forwarded to his solicitor! Disconcertingly, he also had the ability to know where I would be at any given time (ie away from home). He also took pleasure in repeating intensely personal comments that took place between my partner and I, during private phone conversations. It transpired that our mobiles had been ‘cloned’. Although this sounds complicated, it’s not that difficult to arrange: the perpetrator just needs access to the right equipment. Once in place, whenever the target makes a connection via ‘wifi’ (as opposed to an Ethernet connection), it is indeed this what makes you vulnerable to prying eyes (and ears).

Now, it goes without saying that the equipment needed to carry out this type of activity is sophisticated and costs thousands of pounds. Officially, only the Police can do this (ie legally), and only if authorised by a district judge, when applying for a warrant (ie if you are the subject of a Police investigation). Contrary to what one might think, in order to put this covert action into operation, virtual access to your home is not a requirement, as it’s carried out externally. Unbeknownst to the target, each subsequent time they log onto the Internet, they are logging on via ‘proxy’ servers. In other words, the target is no longer logging on via their usual IP address (and who normally takes notice of this?). For obvious reasons, the proxy IP addresses on further log-ins change daily, and bounce all around the UK and even Europe. Literally, every single page the victim accesses on the Internet is being ‘mirrored’ (and recorded for posterity), on another computer. The equipment records EVERY keystroke made, which enables all passwords to be recorded. Therefore, every email received and sent; as well as every account accessed, is being viewed. Changing passwords, or changing your mobile handset/sim makes no difference whatsoever, as the vulnerability lies in the fact that your original IP address has been compromised: simply by the action of connecting wirelessly. There are no measures that can be taken to counteract this, except to stop accessing the Internet, in any format.

Also, when speaking of vulnerability, it seems that most people utilise their iphones as a calendar. But what most don’t realise is, that iphone calendars are electronically (and automatically) ‘mirrored’ (as are a users ‘notes’), directly into their email accounts (although this can be switched off, in settings). This is simply a sure way (along with the ability to listen to phone conversations and read text messages), to be able to gauge when the target will be away from home. You wont know it, but a mundane trip out can also coincide with the first break-in to your home, whereupon the alarm is overridden (with a simple contraption), and a copy key (usually to the rear of the premises) is made, so that at any future date, (when the enemy wants to be updated with all the latest data from your computer hard-drive for instance), another break-in occurs and the simple action of copying your data to a USB is deployed. Of course, the victim doesn’t know about this until something alerts them, like the intruder making a simple but obvious mistake, such as removing the USB device in a hurry leaving behind an “error” message on screen. Or, when the enemy gets ahead of themselves and cant resist boasting of what they’ve done. Once the pieces are put together (and the real terror kicks in), the target then has to go the trouble of having COVERT CCTV installed, which becomes a necessity but unwarranted expense. Financial misery has already been bestowed upon them as invariably they have already been forced into bankruptcy, just so a certain IP can be appointed their Trustee. Shortly after the covert CCTV is operating, the target arrives home with trepidation, and their fears of paranoia are confirmed, when viewing back the evidence, they see an intruder letting them self in, WITH THEIR OWN BACK DOOR KEY! Of course, the targets then have no option but to go to the expense of having OVERT CCTV installed, to the outside of the house. Although this serves to deter any further illegal entries (by the same source), it in no way obviates that their IP address may have still been hijacked, or their mobile(s) remain cloned.

Oh, and if you happen to be involved in any family disputes, ensure (with all your might) that no evidence of this emotional fallout is kept on your computer, (and NEVER, EVER be tempted to communicate anything of such a personal nature to that relative by email). If careless, one day you might find yourself in the unbelievable position of discovering that your close – but estranged – family member might have been covertly approached (by a certain IP no less), in an attempt to extract detrimental information from them, (about YOU!). He really will go to these depths, but doesn’t quite comprehend the extent of brotherly love (and family loyalties). But that doesn’t stop him trying.

The IP referred to is not an intelligent man (makes many mistakes and to his detriment is afflicted by the awful trait of bragging), but he is driven in a way that most people with blood running through their veins don’t understand. Personal remuneration isn’t his motivation either, and he often satisfies his employees by not charging out his time (to them), for all the endless hours he spends pursuing his victims. Sounds strange (for sure), but it’s all true and whilst he adores the kudos of the cut and thrust of his job, it really is like someone else closely associated with him has already imparted on another forum, he positively thrives on “the chase AND the kill.”

Take heed: if you’re not mad before he targets you, you’ll be on the verge of it by the time he’s finished, but there’s only ever one truly mad one, and it’s him. which makes him dangerous.

O
O
Opinions of Kevin
, GB
Aug 21, 2012 5:36 pm EDT

There are over 1750 licenced insolvency practitioners in the U.K and as with all industries you get a few people that bring the profession into disrepute. If 99.5 percent of IPs are good and even as low as half a percent are bad or unfit then that is around 8 people. Could the practitioner who is the most complained about/discussed be in the the top of the 8, or just 1 of the 8 or not at all? It would be difficult to imagine it's the latter but hard to say? It will always be more difficult to 'prove' wrong doing because when working on contentious issues there is always a much stronger defence to rest against, as he has probably convinced people that his niche naturally attracts more criticism, giving wider scope to allow practices that would not be generally acceptable or legitimate and probably the reason that it has gone undetected for so long and gone unpunished even (if you don't consider being terminated or being forced to move practice as punishment). Most people he would deal with would not have the means or knowledge to make formal complaints or are already overwhelmed with the situation they are in so that complaining or legal action is not at the top of their list. When they are out of it then it normally results in a settlement that prevents complaints or they are so relived to be out of it that they do not complain formally. These are all very valid possibilities why unethical behaviour can go undetected. IP complaints are not published so therefore there is not the same type of scrutiny that there is with Solicitors and Accountants.

It does appear strange as 'Mawer Prisoner' has pointed out that the IAECW would allow a person on their panel to rule on disciplinary issues involving other professionals when by default, it would appear he has brought his profession and personal reputation into questionable territory, if not disrepute An internet search would demonstrate that no other members of that panel have any such similar negativity and it would allow the defendants in any such disciplinaries to protest or appeal a decision on the basis it included an opinion by an individual who may not or who is alleged to be unfit to practice and highly suprising if it continues. It may be they are unaware of the various multiple sites and threads which hold complaints and if it was brought to their attention that may change perception as it is surprising to say the least.

S
S
Sharing any Mawer news
, GB
Aug 21, 2012 5:23 pm EDT

There are hundreds of posts about Kevin Mawer over several years and from dozens of different people and they are ongoing. There are about 50 deleted posts where you could guess removed following complaints (maybe too close to the mark)

What must the people at Begbies Traynor be thinking when they took him on with all of this history out there. He appears to have continued in the same manner as always and It is probably only a matter of time before the trail of devastation that he leaves in his path will carry through to him there (as it already appears to be) and Kevin Mawer may well drag their names into the mud if his allegedly questionable, bad behaviour continues. Read for yourselves:

http://www.topix.com/forum/uk/maidenhead/TVG5D7HHCCV72RE32/p32

S
S
Sharing any Mawer news
, GB
Aug 21, 2012 5:16 pm EDT

and this one about Kevin Mawer:

''If the above 2 posts are about Kevin Mawer then its 100% spot on.

The man is a total bell end that has not only tried to ruin many people's careers and lives, but has succeeded in ruining his own career and life, not once, but twice.

He was sacked as a partner from Grant Thornton, then He crawled into KPMG at a much lower pay grade level and was again sacked from KPMG after he overstepped the line on the willmetts case this thread refers too

There is no better word to describe the man other than a total liability for any employer, his ego outways his ability and intelligence

S
S
Sharing any Mawer news
, GB
Aug 21, 2012 5:11 pm EDT

The below post was posted by someone else on another site by someone called Victims of Mawer. If it is true then it is shocking and appalling:

''In response to a previous deleted post, where ‘normal’ people are concerned the obvious route would be to expose the IP, starting with a coherent and irrefutable complaint to their Ruling Body. But where this IP is concerned normal rules don’t apply.
Of all the IP's in this country, there appears to be no other, whose conduct and proclivities, are comparable to the one discussed so acutely on here, and another forum. It’s true; he has brought his profession into disrepute. It’s also a fact that he resigned from the distinguished global firm that once was his ticket to freewill. And, in the interest of fair mindedness, along the way he will no doubt have encountered some dubious individuals.

However, what separates him from the norm’, is that he has been given a free license to pursue certain individuals, who end up being his victims. They generally are financial bereft by the time he has wangled his way into being appointed as their Trustee, because he is inevitably responsible for steering them into bankruptcy during the preceding years, with the burden of legal fees (that’s his aim). Manipulating an appointment such as this is not for the fainthearted, and requires skill and dogged determination, as well as forward planning. Once in his position of power however, the warped game really begins and when accused of wrongdoing, the victims naturally defend themselves. Part of the thrill (for him) is to dive straight in and accuse people of outlandish claims (all part of his well honed plan), and his excitement is derived from how the intended react/handle him. He can quite literally procure ‘evidence’ against them (by ridiculously accusing them of masquerading as someone else for example), and because he is governed by CIVIL rules, the authorities turn a blind eye. If any of his investigative powers, and accusations were conducted under CRIMINAL law, the majority of his inane, vacuous claims wouldn’t make it past first base. Not least, because there would be (criminal) legal redress against him by his innocent victims. The information shared about him clearly resonates with other individuals he has targeted, although this doesn’t bring any of them comfort.

BTW, the Insolvency Service grants the Ruling Bodies of IP’s a license, NOT individual IP’s (far too contentious), so they cannot intervene.

Something evidently is going off at a much higher level that none of us can quite fathom (including his peer group). Everyone reading can be assured that his licensing Body has received substantive complaints (dossiers) on him, along with irrefutable evidence to back the claims. This includes (but is not limited to) his regular access to a victims email accounts, including the IP’s own reference to this breach, (in written communications) to one of his victims. In once instance, the same breach was confirmed in a letter to the same victim, from the IP’s former colleague, (the Joint Trustee). Also, covert tape recordings exist of (just some) of the IP’s conversations, during which he repeated specific comments made during the private conversations of two of his victims. This intimate knowledge could only have been garnered via the activity of an illicit recording (read as ‘cloned’), mobile phone. Bare in mind, sensitivity is not this IP’s strong suit, and he does not possess the requisite emotional sensitivity to be psychic; he requires electronic assistance and that doesn't come cheap!

So to conclude, we all know he possesses the hide of a rhino and indisputable balls of steel but still, knowing what they do, why does he still have a license to operate and HOW can his governing Body permit him to be an elected member of their Disciplinary Panel? As Toyah once sang “it’s a mystery.” ''

P
P
Prisoner of Mawer
, US
Aug 21, 2012 3:57 pm EDT

Where ‘normal’ people are concerned the obvious route would be to expose the IP, starting with a coherent and irrefutable complaint to their Ruling Body. But where this IP is concerned normal rules don’t apply. Of all the IP's in this country, there appears to be no other, whose conduct and proclivities, are comparable to the one discussed so acutely on here, and another forum. It’s true; he has brought his profession into disrepute. It’s also a fact that he resigned from the distinguished global firm that once was his ticket to freewill. And, in the interest of fair mindedness, along the way he will no doubt have encountered some dubious individuals.

However, what separates him from the norm’, is that he has been given a free license to pursue certain individuals, who end up being his victims. They generally are financial bereft by the time he has wangled his way into being appointed as their Trustee, because he is inevitably responsible for steering them into bankruptcy during the preceding years, with the burden of legal fees (that’s his aim). Manipulating an appointment such as this is not for the fainthearted, and requires skill and dogged determination, as well as forward planning. Once in his position of power however, the warped game really begins and when accused of wrongdoing, the victims naturally defend themselves. Part of the thrill (for him) is to dive straight in and accuse people of outlandish claims (all part of his well honed plan), and his excitement is derived from how the intended react/handle him. He can quite literally procure ‘evidence’ against them (by ridiculously accusing them of masquerading as someone else for example), and because he is governed by CIVIL rules, the authorities turn a blind eye. If any of his investigative powers, and accusations were conducted under CRIMINAL law, the majority of his inane, vacuous claims wouldn’t make it past first base. Not least, because there would be (criminal) legal redress against him by his innocent victims. The information shared about him clearly resonates with other individuals he has targeted, although this doesn’t bring any of them comfort.

BTW, the Insolvency Service grants the Ruling Bodies of IP’s a license, NOT individual IP’s (far too contentious), so they cannot intervene.

Something evidently is going off at a much higher level that none of us can quite fathom (including his peer group). Everyone reading can be assured that his licensing Body has received substantive complaints (dossiers) on him, along with irrefutable evidence to back the claims. This includes (but is not limited to) his regular access to a victims email accounts, including the IP’s own reference to this breach, (in written communications) to one of his victims. In once instance, the same breach was confirmed in a letter to the same victim, from the IP’s former colleague, (the Joint Trustee). Also, covert tape recordings exist of (just some) of the IP’s conversations, during which he repeated specific comments made during the private conversations of two of his victims. This intimate knowledge could only have been garnered via the activity of an illicit recording (read as ‘cloned’), mobile phone. Bare in mind, sensitivity is not this IP’s strong suit, and he does not possess the requisite emotional sensitivity to be psychic; he requires electronic assistance and that doesn't come cheap!

So to conclude, we all know he possesses the hide of a rhino and indisputable balls of steel but still, knowing what they do, why does he still have a license to operate and HOW can his governing Body permit him to be an elected member of their Disciplinary Panel? As Toyah once sang “it’s a mystery.”

P
P
Prisoner of Mawer
, US
Aug 17, 2012 5:50 am EDT

This IP is the very same one who in his role as a current member of the ICAEW's 'Disciplinary Committee', recently stood in judgement of a fellow accountant who was fined £1250 + costs when he was found liable to disciplinary action for what basically amounted to failing to respond to an email from another chartered accountant. Him, standing in judgment of anybody is bloody outrageous and to do so in a formal capacity with the backing of his professional body beggars belief, (the same governing body incidentally that has received expansive formal complaint(s) about him with corresponding evidence of his wrongdoings).

What is it that he offers that makes him so seemingly untouchable?