sive and illegal information collection but also against open and legal collection efforts that can harm a company and affect its ability to compete in its market." ( http://www.esnips.com/doc/4157d765-4b6a-4b4b-926c-c9aedaf75a9e/Competitive-Intelligence---Douglas-Bernhardt , p.88)]. Are those "open and legal collection efforts" not ethical enough? Are Competitive Intelligence professionals too greedy what Vivek Raghuvanshi has seemed to suggest?
Best,
Tad…
e Centre for Counterintelligence and Security Studies (CI Centre) in Washington D.C. (See www.cicentre.com) You should seriously consider him in the future to talk at one of your SCIP conferences. He is an excellent speaker and a walking encyclopedia on World events and the role that counterintelligence can play in the modern business environment.
Major was supported by three other American subject matter experts and eight South African speakers.
The conference was held over three days with everybody checking in on the Sunday afternoon at the game lodge. This was followed by a welcome reception and dinner. Some people arriving at the lodge on the Sunday afternoon were lucky to see a huge lion right at the entrance gate!
The conference programme started on the Monday morning and various speakers (including myself) explained to the attendees the concept of business counterintelligence and how it differs from traditional security and IT security practices and how business can benefit. Major gave a strategic overview of what is happening in the World, supporting it with case studies, facts and figures that are compiled by the CI Centre.
Others spoke about the scope of the threat, human vulnerabilities, the insider threat, motivational factors such as M.I.C.E., how to counter elicitation and social engineering attacks, the dark side of social media, the importance of having a robust technical surveillance countermeasures (TSCM) programme, vetting, testing the robustness of your own security programmes, countering competitive intelligence, etc.
There were also a few technical demonstrations highlighting telephone insecurities, the vulnerabilities of cellular telephones and other modern communication devices.
In between the presentations there were a number of networking opportunies, a game drive into the Pilanesberg natioanal park and on the final evening an African bush boma "braai" (barbeque) in the park.
We had attendees from five different countries and we have been requested to repeat the conference next year.
My recommendation is that businesses should seriously consider understanding how this discipline can help to safeguard their crown jewels. If you do not "pay now you will pay later" which could be far worse.
Please let me know if anybody requires additional information. I will post some of the photos in the next few days.
We have also formally launched BECSA, our new counterespionage assiciation during the conference. To read more about Business Espionage Countermeasures South Africa go to www.becsa.co.za…
rade show, setting up a CI process, CTI, ethics since each chapter is written by a different person. I like Fahey's Competitor's book for diagrams of how processes work. I like the books that Carolyn Vella and John McGonagle wrote too. I am a "bookie". They're my little friends.
For people just starting I recommend Larry's Kahaner's CI book since he's a journalist and it's easy to read. Likewise I recommend The Analyst's Cookbook by Kristan Wheaton & a couple of his students at Mercyhurst. This is a quick read and does a good job just explaining a number of analytical tools. Not as exhaustive as Bensoussan/Fleisher, which I use a lot and are reference material. It's just down and practical in a spiral. The other one is Competitive Intelligence by the APQC for good benchmarking of CI processes...I think I recommended that one to you in another of your chats last night.
The other thing I do is download the CI Mag articles I like and organize them by area of interest like counterintelligence, sales/marketing, etc. I last did this for the BOK task force and went back to the first issues. It only goes to 2007, and I was picky since I was choosing articles for our consultants to read who were not versed in CI to get them up to speed quickly. It's here. I look at these articles all the time since they're a quick read.
Happy reading!
Ellen…
mpany and affect its ability to compete in its market."
Sir, lets look at it from Corporate Warfare perspective when corporations worldwide use Information Warfare to: Protect, Exploit, Corrupt, Deny / Destroy, information or information resources in order to achieve a significant advantage / objective / victory over a competitor in the marketplace.
I'll say we use SOPs such as Passive Intelligence then Semi-Active Intelligence and then Active Intelligence at the Collection phase. [ OSINT + HUMINT }
I agree with Arthur on "The Right mix of OSINT and HUMINT" at Collection phase and then generate Insight to get cutting edge.…
intel.mercyhurst.edu/content/graduate_studies ). However, they don't state that "Upon completion of the Master of Science degree program in Applied Intelligence, students will be expected to: [...] Posses a competency in using CI tools". I'll meet the same problem at Poznan University of Technology -- even students studying Security and Safety Engineering won't be acquainted with all branches of technology. Some of them will work also in intelligence and counterintelligence organizations but they will work there professionally only because they will be (already as MSc in Security and Safety Engineering alumni) still trained both in needed foreign languages and in needed technological devices.…
at another competitor will not use the information, and you cannot be sure that co-workers in other departments will not use the material. As a result you could potentially cede a competitive edge to other market players, and undermine your standing with co-workers as an authoritative source of intelligence.
The CI practitioner will add value through analysis, dissemination, and counterintelligence. A leaked document is raw intelligence that needs to be interpreted, and passed along to the right people in a timely manner. The opportunity for deception and misinformation through “leaked” documents is a real possibility that the CI practitioner can look out for.…
Added by Trip Krant at 10:14am on February 24, 2011
e but I would like to ask you if you know about any experiences of how profiling has been used for identifying and mapping strategic partners or actors for an intelligence project.
I would also like to hear your suggestions on what tools and sources do you use for profiling tasks (e.g. forms, biography websites, etc...)
Thanks for your advice
George Maha
Clip & Clipping Comunicação …