4/e101052134101052318.rtf ) for students who wish to obtain their BSc degrees in Security and Safety Engineering. For some months, I've prepared the concentration Technology for Information Protection for students who in February 2011 will begin to study in order to obtain their MSc degrees in Security and Safety Engineering ( http://fedcba.ning.com/profiles/blogs/an-incentive-to-include-tscm ). During those preparations, I've been considering the course Competitive Counter-Intelligence. In order to settle whether Competitive Intelligence is really so "aggressive" that it requires "an effective security program" ( http://worldinstitute.org/wise/courses/cci/cci.html ), I've decided to join your social network. At first glance, Roman V. Romachev, Ellen Naylor, and August Jackson ( http://competitiveintelligence.ning.com/main/search/search?q=counterintelligence ) have already convinced me that counterintelligence occupies a considerable part in your interests. Maybe we could cooperate to build such concentration, including the few CI courses which can be studied in English at a distance by students all over the world. :-)
Best wishes,
Tad…
g the blended course Information security ( http://triton.cs.put.poznan.pl/platon/files/opisyPrzedmiotow/ib_dzi/4/e101052134101052318.rtf ), I am very interested in them.
Would you please confirm me in the conviction that we talk about counterintelligence in CI because defensive competitive intelligence includes some counterintelligence tasks subcontracted to companies by governmental counterintelligence secret services, especially to those companies where any pieces of classified information aren't present: hence aren't at risk? So, to sum up, CI professionals don't spy but they counterspy extensively, isn't that so? One more detailed question -- counterspying, CI professionals aren't the most ethical persons, are they? I mean Adrian's Operaciones de decepción en la contra-inteligencia ( http://inteligenciacompetitivaenar.blogspot.com/2007/08/operaciones-de-decepcin-en-la-contra.html ) where he recommends the book Engaños de Guerra by Francisco Marín to us. That Maskirovka ( http://www.historiamilitar.net/detalle.php?titulo=Enga%F1os+de+guerra&autor=Francisco+A.+Mart%EDn ) is ethically unambiguous enough ( http://www.nationmaster.com/encyclopedia/Maskirovka ) for persons who refuse double standards, isn't it? I'm afraid IC professionals cannot have their cake and eat it too.…
nyurl.com/sharp-book ). ;-) But, joking apart, would you please tell me more about "Countermeasures, enabling, 254-255" (p. 283)? Is your thought about those countermeasures similar to Douglas Bernhardt's thought about counterintelligence ["Counterintelligence should not only protect against aggressive and illegal information collection but also against open and legal collection efforts that can harm a company and affect its ability to compete in its market" ( http://www.ci2020.com/forum/topics/douglas-bernhardts-thought-on )] or even to the reverse expressed by John Nolan in his book Confidential: Business Secrets - Getting Theirs, Keeping Yours?…
hich is not addressed enough. It's kind of like how companies dodge counterintelligence in favor of focusing on CI collection. You gotta think about them both!
Looking forward to your words of wisdom, Marcia!…
Added by Ellen Naylor at 6:35pm on August 12, 2009
e.
But hundreds of companies and prominent citizens have sent just such information to the federal government, some detailing their biggest security worries. The reported dangers range from chilling to seemingly trivial: al Qaeda terrorists; animal-rights extremists; deranged stalkers; depressed gamblers; gas-price malcontents and aggressive autograph-seekers.
The threat information was contained in letters sent in 2011 to the Federal Aviation Administration but not made public until now. The letter-writers were stirred to action by a since-shelved FAA plan to allow the public to have greater real-time access to the flight paths of private aircraft.
Yeah, physical danger - sure.…
but struggles with its strategic competitive stance to such an extent that it sometimes feels like there are moles leaking your most precious intelligence outside your four walls? If so, join Wisconsin's SCIP chapter on Thursday, July 16th for a highly interactive training workshop on Counterintelligence and Security Countermeasures, held at the friendly confines of Green Bay's Lambeau Field.
Competitive threats to your business can be domestic or foreign, legal and illegal. Each category of threat poses the potential for large competitive losses and each requires a different response in the form of countermeasures. In this workshop, our facilitator Bill DeGenaro will outline a methodology for analyzing threats and evaluating the victims' vulnerabilities. The need for cultural empathy when dealing with foreign threats cannot be emphasized enough, although the most significant threat is legal domestic collection operations since they represent the largest activity. You'll also learn how intelligence professionals approach their targets and a systems model is presented as a recommendation for an organizational response. Countermeasure tips and references to cases provide a practical approach to counterintelligence and will provide you with the understanding of how to begin establishing a sound program.
Implementation of a Counterintelligence and Security Countermeasures program requires several key understandings, including:
•Business Intelligence: How do the pros work?
•Introduction to Warnings Intelligence
•Collection and Human Sources
•Introduction to Elicitation
•Counterintelligence....Thwarting a rivals attempts to gain knowledge about you.
Key Takeaways
What should be protected? What are "the family jewels" that if acquired by a competitor would cause serious damage? Additionally, what peripheral information would provide key indicators of the secret to competitors? What is the value of these secrets and how long must they be protected? Who has access to the information and what is the status of current protection procedures?
What is the threat? Who is interested in acquiring these secrets and what do we know about their intelligence capability, requirements and operations being run against your firm? What do they know about your firm?
What are your firm's vulnerabilities and how might they be exploited by competitors?
What are the recommended countermeasures necessary and appropriate to address the issues surfaced during the analysis?
Agenda
-Registration 9:00 AM - 9:30 AM
-Introduction and Initial Counter-Intelligence Training: 9:30 AM - 12:00 PM
-Buffet Lunch at Hall of Fame Grill: 12:00 - 12:45 PM
-Final Workshop Components & Key Takeaways: 12:45 - 3:00 PM
* Optional Atrium Tour and Historical Perspective of Lambeau Field: 3:15 - 4:00 PM
About the Speaker
William (Bill) DeGenaro has more than 30 years of strategic planning, intelligence and business management experience. He is President of DeGenaro & Associates and also an instructor of Business Intelligence at Michigan Tech Graduate School of Business & Economics. His career spans director level positions with 3M, as well as the Office of the Secretary of Defense for Counterintelligence and Security.
Registration Fees (Includes: Program, Lunch & Beverages)
-SCIP Member $85.00
-Non-member $95.00
NOTE: We have limited capacity to the first 50 registered attendees so be sure to register early.
Please contact Derek Johnson if you are interested in the optional Atrium Tour as advance tickets must be purchased.…
of CI in companies are similar to diminishing importance of OSINT in the Intelligence Community? Are today's methods of calculating the value of open sources' usefulness really so poor?
I'd like to thank Arthur S. Hulnick for the remark about Steven Aftergood (Ibidem, p. 15-16) whom I mentioned in two of the discussions [Rola dziennikarzy w dostępie do informacji publicznej and Dostęp do IP wg Petera Galisona i Robba Mossa ( http://geocities.com/eklezjastka/ester4w-3.html )] started for my Polish students who within the next three weeks will at last begin to study problems of Information security ( http://triton.cs.put.poznan.pl/platon/files/opisyPrzedmiotow/ib_dzi/4/e101052134101052318.rtf ). It seems that Arthur's frustration has lately worsened ( http://innovate-ideagora.ning.com/group/counterintelligence/forum/topics/between-too-much-secrecy-and ), doesn't it?
So, to sum up, is OSINT (and CI?) "worth the cost and effort to collect and analyze it" (Ibidem, p. 17)?…
lligence and CounterIntelligence. They mention it at http://www.iafie.org/journals.php and two members of IAFIE Board of Directors 2009-2011 ( http://www.iafie.org/directors.php ), namely Dr. Stephen Marrin and Dr. Mark Lowenthal, are members of IJIC Editorial Board ( http://www.tandf.co.uk/journals/journal.asp?issn=0885-0607&link... ).…