将反间谍与安全混为一谈可能会破坏你的下午

John A. Nolan III
{"title":"将反间谍与安全混为一谈可能会破坏你的下午","authors":"John A. Nolan III","doi":"10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","DOIUrl":null,"url":null,"abstract":"<p>Typically, there is little linkage between a firm's intelligence collection and security functions. Nevertheless, counterintelligence measures often are relegated to security personnel, if they're thought about at all. But while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures. An organized counterintelligence approach, such as the Business Intelligence Collection Model<sup>SM</sup> described here, can help ensure CI/counterintelligence integration. This process involves defining what needs to be protected, for how long, and from whom; assessing the rival's CI collection capabilities; testing and managing your firm's vulnerability to the rival's collection methods; developing and implementing aggressive countermeasures (including disinformation); analyzing the results; and integrating this information with data from the CI side of the process, thereby providing management with a more complete intelligence picture of the marketplace (revealing what the competition is trying to collect, for instance, is often an early indicator of where they're headed as a company). A case study is provided. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"53-61"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","citationCount":"7","resultStr":"{\"title\":\"Confusing counterintelligence with security can wreck your afternoon\",\"authors\":\"John A. Nolan III\",\"doi\":\"10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Typically, there is little linkage between a firm's intelligence collection and security functions. Nevertheless, counterintelligence measures often are relegated to security personnel, if they're thought about at all. But while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures. An organized counterintelligence approach, such as the Business Intelligence Collection Model<sup>SM</sup> described here, can help ensure CI/counterintelligence integration. This process involves defining what needs to be protected, for how long, and from whom; assessing the rival's CI collection capabilities; testing and managing your firm's vulnerability to the rival's collection methods; developing and implementing aggressive countermeasures (including disinformation); analyzing the results; and integrating this information with data from the CI side of the process, thereby providing management with a more complete intelligence picture of the marketplace (revealing what the competition is trying to collect, for instance, is often an early indicator of where they're headed as a company). A case study is provided. © 1997 John Wiley &amp; Sons, Inc.</p>\",\"PeriodicalId\":100295,\"journal\":{\"name\":\"Competitive Intelligence Review\",\"volume\":\"8 3\",\"pages\":\"53-61\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Intelligence Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C53%3A%3AAID-CIR12%3E3.0.CO%3B2-D\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Intelligence Review","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C53%3A%3AAID-CIR12%3E3.0.CO%3B2-D","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

通常,公司的情报收集和安全职能之间几乎没有联系。尽管如此,反间谍措施往往被降级到安全人员,如果他们考虑的话。但是,尽管安全旨在通过政策、程序和实践的结合来保护公司的资产,但正确理解的反间谍旨在通过各种富有想象力、灵活和积极的措施来参与和压制竞争对手的收集工作。有组织的反间谍方法,如这里描述的商业情报收集模型SM,可以帮助确保CI/反间谍集成。这一过程包括确定需要保护的内容、保护时间和保护对象;评估竞争对手的CI收集能力;测试和管理您的公司对竞争对手收集方法的脆弱性;制定和实施积极的反措施(包括虚假信息);分析结果;并将这些信息与流程CI方面的数据集成,从而为管理层提供更完整的市场情报(例如,揭示竞争对手试图收集的信息往往是他们作为一家公司走向何方的早期指标)。提供了一个案例研究。©1997 John Wiley&;股份有限公司。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Confusing counterintelligence with security can wreck your afternoon

Typically, there is little linkage between a firm's intelligence collection and security functions. Nevertheless, counterintelligence measures often are relegated to security personnel, if they're thought about at all. But while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures. An organized counterintelligence approach, such as the Business Intelligence Collection ModelSM described here, can help ensure CI/counterintelligence integration. This process involves defining what needs to be protected, for how long, and from whom; assessing the rival's CI collection capabilities; testing and managing your firm's vulnerability to the rival's collection methods; developing and implementing aggressive countermeasures (including disinformation); analyzing the results; and integrating this information with data from the CI side of the process, thereby providing management with a more complete intelligence picture of the marketplace (revealing what the competition is trying to collect, for instance, is often an early indicator of where they're headed as a company). A case study is provided. © 1997 John Wiley & Sons, Inc.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信