Douglas Bernhardt's thought on counterintelligence - Competitive Intelligence2024-03-28T11:54:39Zhttp://competitiveintelligence.ning.com/forum/topics/douglas-bernhardts-thought-on?commentId=2036441%3AComment%3A24131&feed=yes&xn_auth=noHi, Graeme, for some years, e…tag:competitiveintelligence.ning.com,2010-05-17:2036441:Comment:329422010-05-17T18:24:37.011ZTadeusz Lemańczykhttp://competitiveintelligence.ning.com/profile/TadeuszLemanczyk
Hi, Graeme, for some years, e-lecturers have been as usual as e-tutors and e-students [<i>Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student Perspectives</i> ( <a href="http://www.computer.org/portal/web/csdl/doi/10.1109/ICITA.2005.114" target="_blank">http://www.computer.org/portal/web/csdl/doi/10.1109/ICITA.2005.114</a> )]. At present, with the help of <a href="http://fedcba.ning.com/group/bi" target="_blank">http://fedcba.ning.com/group/bi</a> ,…
Hi, Graeme, for some years, e-lecturers have been as usual as e-tutors and e-students [<i>Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student Perspectives</i> ( <a href="http://www.computer.org/portal/web/csdl/doi/10.1109/ICITA.2005.114" target="_blank">http://www.computer.org/portal/web/csdl/doi/10.1109/ICITA.2005.114</a> )]. At present, with the help of <a href="http://fedcba.ning.com/group/bi" target="_blank">http://fedcba.ning.com/group/bi</a> , <a href="http://fedcba.ning.com/group/oifsb" target="_blank">http://fedcba.ning.com/group/oifsb</a> , and <a href="http://fedcba.ning.com/group/wpb" target="_blank">http://fedcba.ning.com/group/wpb</a> , I give e-lectures on <i>Information security</i> ( <a href="http://triton.cs.put.poznan.pl/platon/files/opisyPrzedmiotow/ib_dzi/4/e101052134101052318.rtf" target="_blank">http://triton.cs.put.poznan.pl/platon/files/opisyPrzedmiotow/ib_dzi/4/e101052134101052318.rtf</a> ), on <i>Organization and functioning of security and safety systems</i> ( <a href="http://triton.cs.put.poznan.pl/platon/files/opisyPrzedmiotow/ib_dzi/5/e101052135101052422.rtf" target="_blank">http://triton.cs.put.poznan.pl/platon/files/opisyPrzedmiotow/ib_dzi/5/e101052135101052422.rtf</a> ), and on <i>Contemporary Security & Safety problems</i> ( <a href="http://triton.cs.put.poznan.pl/platon/files/opisyPrzedmiotow/ib_zmu/1/e101052531101052563.rtf" target="_blank">http://triton.cs.put.poznan.pl/platon/files/opisyPrzedmiotow/ib_zmu/1/e101052531101052563.rtf</a> ). Nevertheless, I took my first e-steps in 1997 ( <a href="http://www.lemant.user.icpnet.pl/tad/report98.html" target="_blank">http://www.lemant.user.icpnet.pl/tad/report98.html</a> ). :-)<br />
<br />
Best,<br />
Tad How do you become an E-Lectur…tag:competitiveintelligence.ning.com,2010-05-17:2036441:Comment:329402010-05-17T13:56:08.739ZGraeme Dixonhttp://competitiveintelligence.ning.com/profile/GraemeDixon
How do you become an E-Lecturer? Seems an unusual title thats all.
How do you become an E-Lecturer? Seems an unusual title thats all. Also my message TSCM included…tag:competitiveintelligence.ning.com,2010-05-15:2036441:Comment:328802010-05-15T07:52:36.386ZTadeusz Lemańczykhttp://competitiveintelligence.ning.com/profile/TadeuszLemanczyk
Also my message <i>TSCM included in Operation of Surveillance and CSURV Devices</i> ( <a href="http://fedcba.ning.com/group/bs/forum/topics/tscm-included-in-operation-of" target="_blank">http://fedcba.ning.com/group/bs/forum/topics/tscm-included-in-operation-of</a> ), in which I quote this discussion thread, has been resent ( <a href="http://competitiveintelligence.ning.com/xn/detail/2036441:Comment:32739">http://competitiveintelligence.ning.com/xn/detail/2036441:Comment:32739</a> ).
Also my message <i>TSCM included in Operation of Surveillance and CSURV Devices</i> ( <a href="http://fedcba.ning.com/group/bs/forum/topics/tscm-included-in-operation-of" target="_blank">http://fedcba.ning.com/group/bs/forum/topics/tscm-included-in-operation-of</a> ), in which I quote this discussion thread, has been resent ( <a href="http://competitiveintelligence.ning.com/xn/detail/2036441:Comment:32739">http://competitiveintelligence.ning.com/xn/detail/2036441:Comment:32739</a> ). I'd like to thank you, Steve,…tag:competitiveintelligence.ning.com,2009-07-01:2036441:Comment:243632009-07-01T04:29:56.285ZTadeusz Lemańczykhttp://competitiveintelligence.ning.com/profile/TadeuszLemanczyk
I'd like to thank you, Steve, for your willingness to help us better understand relations between Competitive Intelligence and Competitive Counter-Intelligence. I owe such better understanding to my students at least in connection with Bernardus Johannes Odendaal's dissertation <i>Competitive Intelligence with specific reference to the challenges facing the Competitive Intelligence Professional in South Africa</i> (…
I'd like to thank you, Steve, for your willingness to help us better understand relations between Competitive Intelligence and Competitive Counter-Intelligence. I owe such better understanding to my students at least in connection with Bernardus Johannes Odendaal's dissertation <i>Competitive Intelligence with specific reference to the challenges facing the Competitive Intelligence Professional in South Africa</i> ( <a href="http://upetd.up.ac.za/thesis/available/etd-02092005-112230/" target="_blank">http://upetd.up.ac.za/thesis/available/etd-02092005-112230/</a> ) used by me in one of the discussions with them ( <a href="http://fedcba.ning.com/group/bi/forum/topics/kontrwywiadowcza-samoobrona" target="_blank">http://fedcba.ning.com/group/bi/forum/topics/kontrwywiadowcza-samoobrona</a> ), in connection with dissertation where you and Douglas along with Peet Venter and Chris Jordaan have been interviewed by the author ( <a href="http://upetd.up.ac.za/thesis/available/etd-02092005-112230/unrestricted/00dissertation.pdf" target="_blank">http://upetd.up.ac.za/thesis/available/etd-02092005-112230/unrestricted/00dissertation.pdf</a> ).<br />
<br />
Regards from Poznań (being now rainy too),<br />
Tad Collection of Information - E…tag:competitiveintelligence.ning.com,2009-07-01:2036441:Comment:243622009-07-01T03:25:19.651ZVivek Raghuvanshihttp://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
Collection of Information - EXTRACTION OF INFORMATION<br />
------------------------------------<br />
<br />
Using the most feared and the revered tool: MICE<br />
<br />
M - MONEY<br />
<br />
I - IDEOLOGY<br />
<br />
C- COMPROMISE<br />
<br />
E- EGO<br />
<br />
I believe when extraction of Information is done using MICE, counter- intelligence ie the defense- shield is vulnerable.
Collection of Information - EXTRACTION OF INFORMATION<br />
------------------------------------<br />
<br />
Using the most feared and the revered tool: MICE<br />
<br />
M - MONEY<br />
<br />
I - IDEOLOGY<br />
<br />
C- COMPROMISE<br />
<br />
E- EGO<br />
<br />
I believe when extraction of Information is done using MICE, counter- intelligence ie the defense- shield is vulnerable. See my name being mentioned.…tag:competitiveintelligence.ning.com,2009-06-30:2036441:Comment:243562009-06-30T23:06:22.222ZSteve Whiteheadhttp://competitiveintelligence.ning.com/profile/SteveWhitehead
See my name being mentioned. I have written much on the topic of counterintelligence and you are welcome to contact me shuld you rewuire any additional information. Regards from a rainy Adelaide! Steve Whitehead
See my name being mentioned. I have written much on the topic of counterintelligence and you are welcome to contact me shuld you rewuire any additional information. Regards from a rainy Adelaide! Steve Whitehead Vivek, asking "How will Count…tag:competitiveintelligence.ning.com,2009-06-30:2036441:Comment:243522009-06-30T15:14:06.036ZTadeusz Lemańczykhttp://competitiveintelligence.ning.com/profile/TadeuszLemanczyk
Vivek, asking "<i>How will Counter Intelligence take care of MICE?</i>" you mean companies protected by some CI professionals against other CI professionals who working for rival companies try to search the former companies without permission given by their management, don't you? ;-) How can they therefore protect their companies more effectively? The answer to this question we can find in chapter ninth (<i>Counterintelligence: the other side of the coin</i>) of Douglas Bernhardt's book…
Vivek, asking "<i>How will Counter Intelligence take care of MICE?</i>" you mean companies protected by some CI professionals against other CI professionals who working for rival companies try to search the former companies without permission given by their management, don't you? ;-) How can they therefore protect their companies more effectively? The answer to this question we can find in chapter ninth (<i>Counterintelligence: the other side of the coin</i>) of Douglas Bernhardt's book (<i>Competitive Intelligence--How to acquire and use corporate intelligence and counter-intelligence</i>), chapter written mainly by Steve Whitehead ( <a href="http://www.esnips.com/doc/4157d765-4b6a-4b4b-926c-c9aedaf75a9e/Competitive-Intelligence---Douglas-Bernhardt" target="_blank">http://www.esnips.com/doc/4157d765-4b6a-4b4b-926c-c9aedaf75a9e/Competitive-Intelligence---Douglas-Bernhardt</a> , p. 83), a member of this CI social network ( <a href="http://competitiveintelligence.ning.com/profile/SteveWhitehead" target="_blank">http://competitiveintelligence.ning.com/profile/SteveWhitehead</a> ).<br />
<br />
Incidentally, there is also James A. Schweitzer cited, including the words "<i>poor security often reflects both weak policies and inadequate forethought</i>" (Ibidem, p. 96). You call those companies searched without permission "<i>MICE</i>" because they are as "<i>quiet, nervous, and fearful</i>" as those "<i>small furry animals</i>", don't you? :-)<br />
<br />
Best,<br />
Tad<br />
<a href="http://fedcba.ning.com/" target="_blank">http://fedcba.ning.com/</a> Vivek, I think you would be w…tag:competitiveintelligence.ning.com,2009-06-30:2036441:Comment:243492009-06-30T07:36:14.834ZSheila Wrighthttp://competitiveintelligence.ning.com/profile/SheilaWright
Vivek, I think you would be well advised to understand the cliche you are quoting here which is somewhat of a wild overstatement if ever I saw one. It is just that the merit of discussing the meaning behind one paragraph, taken entirely out of context, in a 109 page report is totally lost on me and I am amazed that people find time to waste on such things. I expect that readers who value the opinion of Douglas Bernhardt on this subject, would read the whole report, especially the section from…
Vivek, I think you would be well advised to understand the cliche you are quoting here which is somewhat of a wild overstatement if ever I saw one. It is just that the merit of discussing the meaning behind one paragraph, taken entirely out of context, in a 109 page report is totally lost on me and I am amazed that people find time to waste on such things. I expect that readers who value the opinion of Douglas Bernhardt on this subject, would read the whole report, especially the section from which the quote has been extracted and the conclusion on Pg 96. When this report ws first published in 2003, the publisher saw fit to charge £99 per copy for it. Now it is free on the internet. Things have moved on since 2003 and I shall retire from this discussion as I need to get some real work done. Dear Mr Lemanczyk,
Hell hath…tag:competitiveintelligence.ning.com,2009-06-30:2036441:Comment:243482009-06-30T03:26:50.342ZVivek Raghuvanshihttp://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
Dear Mr Lemanczyk,<br />
<br />
Hell hath no fury like a woman scorned!<br />
<br />
How will Counter Intelligence take care of MICE?<br />
<br />
I wonder!
Dear Mr Lemanczyk,<br />
<br />
Hell hath no fury like a woman scorned!<br />
<br />
How will Counter Intelligence take care of MICE?<br />
<br />
I wonder! Sheila, you can mobilize us.…tag:competitiveintelligence.ning.com,2009-06-28:2036441:Comment:243242009-06-28T11:32:04.959ZTadeusz Lemańczykhttp://competitiveintelligence.ning.com/profile/TadeuszLemanczyk
Sheila, you can mobilize us. :-) What is the topic of our conversation in this discussion thread? Let's return to Douglas Bernhardt's words ["<i>Counterintelligence should not only protect against aggressive and illegal information collection but also against open and legal collection efforts that can harm a company and affect its ability to compete in its market</i>." (…
Sheila, you can mobilize us. :-) What is the topic of our conversation in this discussion thread? Let's return to Douglas Bernhardt's words ["<i>Counterintelligence should not only protect against aggressive and illegal information collection but also against open and legal collection efforts that can harm a company and affect its ability to compete in its market</i>." ( <a href="http://www.esnips.com/doc/4157d765-4b6a-4b4b-926c-c9aedaf75a9e/Competitive-Intelligence---Douglas-Bernhardt" target="_blank">http://www.esnips.com/doc/4157d765-4b6a-4b4b-926c-c9aedaf75a9e/Competitive-Intelligence---Douglas-Bernhardt</a> , p.88)]. Are those "<i>open and legal collection efforts</i>" not ethical enough? Are Competitive Intelligence professionals too greedy what Vivek Raghuvanshi has seemed to suggest?<br />
<br />
Best,<br />
Tad