Competitive Intelligence

Tactical, Operational & Strategic Analysis of Markets, Competitors & Industries

Douglas Bernhardt's thought on counterintelligence

Are you as much interested in counterintelligence as I am [conducting the blended course Information security ( ) for my students there ( )]? Members of Competitive Intelligence social network have been already interested in discussing counterintelligence problems by Ellen Naylor [on May 6, 2009 at 6:47pm ( )], Alessandro Comai [on May 24, 2009 at 4:13pm ( )], August Jackson [ on July 30, 2008 at 7:55am ( )], and me [on January 23, 2009 at 3:10am ( ), on February 18, 2009 at 3:53am ( )].

As an e-lecturer preparing the e-course Operation of Surveillance and CSURV Devices ( ), I'm interested mainly in Douglas Bernhardt's thought on Technical surveillance countermeasures (TSCM) [Competitive Intelligence: Acquiring and using corporate intelligence and counterintelligence, published in 2003 by FT Prentice Hall, p. 94]. However, most of you will be possibly interested in the following aspect of counterintelligence emphasized by Douglas Bernhardt.

Counterintelligence should not only protect against aggressive and illegal information collection but also against open and legal collection efforts that can harm a company and affect its ability to compete in its market.
Ibidem, p. 88

Am I right? :-)


Views: 240

Reply to This

Replies to This Discussion

See my name being mentioned. I have written much on the topic of counterintelligence and you are welcome to contact me shuld you rewuire any additional information. Regards from a rainy Adelaide! Steve Whitehead
I'd like to thank you, Steve, for your willingness to help us better understand relations between Competitive Intelligence and Competitive Counter-Intelligence. I owe such better understanding to my students at least in connection with Bernardus Johannes Odendaal's dissertation Competitive Intelligence with specific reference to the challenges facing the Competitive Intelligence Professional in South Africa ( ) used by me in one of the discussions with them ( ), in connection with dissertation where you and Douglas along with Peet Venter and Chris Jordaan have been interviewed by the author ( ).

Regards from Poznań (being now rainy too),
Collection of Information - EXTRACTION OF INFORMATION

Using the most feared and the revered tool: MICE





I believe when extraction of Information is done using MICE, counter- intelligence ie the defense- shield is vulnerable.
Also my message TSCM included in Operation of Surveillance and CSURV Devices ( ), in which I quote this discussion thread, has been resent ( ).
How do you become an E-Lecturer? Seems an unusual title thats all.
Hi, Graeme, for some years, e-lecturers have been as usual as e-tutors and e-students [Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student Perspectives ( )]. At present, with the help of , , and , I give e-lectures on Information security ( ), on Organization and functioning of security and safety systems ( ), and on Contemporary Security & Safety problems ( ). Nevertheless, I took my first e-steps in 1997 ( ). :-)



Free Intel Collab Webinars

You might be interested in the next few IntelCollab webinars:

RECONVERGE Network Calendar of Events

© 2024   Created by Arik Johnson.   Powered by

Badges  |  Report an Issue  |  Terms of Service