{"title":"Confusing counterintelligence with security can wreck your afternoon","authors":"John A. Nolan III","doi":"10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","DOIUrl":null,"url":null,"abstract":"<p>Typically, there is little linkage between a firm's intelligence collection and security functions. Nevertheless, counterintelligence measures often are relegated to security personnel, if they're thought about at all. But while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures. An organized counterintelligence approach, such as the Business Intelligence Collection Model<sup>SM</sup> described here, can help ensure CI/counterintelligence integration. This process involves defining what needs to be protected, for how long, and from whom; assessing the rival's CI collection capabilities; testing and managing your firm's vulnerability to the rival's collection methods; developing and implementing aggressive countermeasures (including disinformation); analyzing the results; and integrating this information with data from the CI side of the process, thereby providing management with a more complete intelligence picture of the marketplace (revealing what the competition is trying to collect, for instance, is often an early indicator of where they're headed as a company). A case study is provided. © 1997 John Wiley & Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"53-61"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Intelligence Review","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C53%3A%3AAID-CIR12%3E3.0.CO%3B2-D","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Typically, there is little linkage between a firm's intelligence collection and security functions. Nevertheless, counterintelligence measures often are relegated to security personnel, if they're thought about at all. But while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures. An organized counterintelligence approach, such as the Business Intelligence Collection ModelSM described here, can help ensure CI/counterintelligence integration. This process involves defining what needs to be protected, for how long, and from whom; assessing the rival's CI collection capabilities; testing and managing your firm's vulnerability to the rival's collection methods; developing and implementing aggressive countermeasures (including disinformation); analyzing the results; and integrating this information with data from the CI side of the process, thereby providing management with a more complete intelligence picture of the marketplace (revealing what the competition is trying to collect, for instance, is often an early indicator of where they're headed as a company). A case study is provided. © 1997 John Wiley & Sons, Inc.
将反间谍与安全混为一谈可能会破坏你的下午
通常,公司的情报收集和安全职能之间几乎没有联系。尽管如此,反间谍措施往往被降级到安全人员,如果他们考虑的话。但是,尽管安全旨在通过政策、程序和实践的结合来保护公司的资产,但正确理解的反间谍旨在通过各种富有想象力、灵活和积极的措施来参与和压制竞争对手的收集工作。有组织的反间谍方法,如这里描述的商业情报收集模型SM,可以帮助确保CI/反间谍集成。这一过程包括确定需要保护的内容、保护时间和保护对象;评估竞争对手的CI收集能力;测试和管理您的公司对竞争对手收集方法的脆弱性;制定和实施积极的反措施(包括虚假信息);分析结果;并将这些信息与流程CI方面的数据集成,从而为管理层提供更完整的市场情报(例如,揭示竞争对手试图收集的信息往往是他们作为一家公司走向何方的早期指标)。提供了一个案例研究。©1997 John Wiley&;股份有限公司。
本文章由计算机程序翻译,如有差异,请以英文原文为准。