SlideShare a Scribd company logo
1 of 17
ETHICS IN INTELLIGENCE AND
INFORMATION SECURITY
Lesson 8 – August 19th, 2011
LECTURER: Isabel Santos
CURSO: “INTELIGÊNCIA ESTRATÉGICA
GERIR A MUDANÇA OBSERVANDO OS SEUS SINAIS”
Discussing Ethics in SI/CI
• “In Corporate Warfare an action of a competitor in one
country may be construed as industrial espionage and in
another country it may amount to terrorism, whereas in
certain countries this may just be the usual practice in
which they gather information on competitors”.
Vivek Raghuvanshi, CI Practitioner
Isabel Santos ©
DON’TS
- Not false job interviews
- Misrepresent ourselves
- Compromise Proprietary information
Isabel Santos ©
Fédération des Professionnels de l'Intelligence Economique (FEPIE)
• N'accepter que des missions pour lesquelles nous disposons de la compétence professionnelle requise
ou pour lesquelles nous sommes en mesure de monter les équipes de travail répondant au besoin
• Ne fournir que des informations accessibles par des moyens légaux, quel que soit le lieu d'application
de l'activité.
• Ne délivrer et n'utiliser que des informations dont nous avons vérifié la véracité et la crédibilité de la
source.
• Assurer une totale confidentialité concernant les informations et données fournies par le client et celles
recueillies à son profit au cours de la mission.
• Ne pas travailler pour deux sociétés concurrentes sur des problématiques similaires risquant d'entraîner
un conflit d'intérêt.
• Ne pas porter atteinte aux intérêts fondamentaux de la France. Les termes de la mission doivent alors
être modifiés ou la mission refusée.
Isabel Santos ©
• Competitors’ brochures, Annual, Gov. Reports
• Court Records, Articles and news on internet
• Monitoring archives belonging to the competitor
• Collecting open source information
• Mapping competitors by finding their partners,
vendors and customers by searching internet
for pages with links to the competitor
• Mapping competitors customers on social
media platforms
• Searching through archives and Google News
and newspapers home pages for keywords that
are connected to the company being monitored
• Publications from competitors sometimes give
very detailed information about what they have
bought or sold or joint venture, M&A.
Ethical Sources and Procedures in Intelligence
Market surveys and consultants’ reports
 Financial reports, and brokers’ research surveys
 Trade fairs and competitors’ brochures
 Analysis of competitors’ products
 Overt surveillance
 Meetings with suppliers (‘grey area’ )
 Trade shows
 Sales force meetings
 Seminar / conferences
 Recruiting ex-employees of competitors (‘grey area’ )
 Discussion with shared competitors
 Social contact with competitors
 Advertising campaigns and Promotions
 Tenders and Patent applications
SOURCE: Vivek Raghuvanshi
Other sources and Ning CI community
Isabel Santos ©
SI/CI Ethics(Competitors)
• Grey Area: A ‘grey area’ is a Competitive Intelligence activity
(normally related with information collection) that raises ethical
doubts or questions for a practitioner.
For example: What ethical questions emerge in these specific situations?
• Elicitation of information using email and telephone calls in the form of disclosures made by
competitors’
• Legitimate employment interviews with people who worked for competitor
• Disguised questioning and ‘drawing out’ of competitors’ employees at technical meetings
• Hiring competitors employees to acquire specific know how
• Mapping competitors internal networks in connection with projects or consultancy
Isabel Santos ©
•
• Trespassing on competitors premises
• Bribing competitors employees and suppliers
• Inserting a fake employee in competitors
organization
• Blackmail
• Extortion
• Industrial Espionage (Proprietary Information)
• Phony job interviews
• Using private investigators and detectives to
extract specific information
• Fake negotiations with competitors for license
• Covert surveillance
• Accessing competitors internal pages on
internet with a false identity or an identity used
by the competitor’s customers
Forbidden Practices in Intelligence (Conc.)
Source: Ning CI and others
Isabel Santos ©
Industrial Espionage: Some Methods
• Hacking
– System Hacking
– Remote Hacking
– Physical Hacking
• Social Engineering
– Managing/ Manipulating Human
Behaviour
(passwords, corporate information)
Isabel Santos ©
• Dumpster Diving
(company phone books, organizational charts,
memos, company policy manuals, calendars of
meetings, events and vacations, system manuals,
printouts of login names and passwords, printouts
of source code, disks and tapes, company
letterhead and memo forms, and
outdated hardware)
• Phone Eavesdropping
(fax and telephone transmissions)
(SANS INSTITUTE, 2007)
SANS Institute Report (2007):
• Marketing Plans
• Source Code
• Customers Profiles
• Product Development Plans
• Production Process Manuals
• Data on Geographic Markets
• Manufacturing Facility Plants and Plans
• Location of Factories and Commercial Branches
• Description of Organizational Process and Procedures
• Corporate Web Sites
• Suppliers, Distributors, others Stakeholders
Isabel Santos ©
Information Target by Industrial Espionage
Isabel Santos ©
• Contracts (details about pricing, costs, product
delivery, distribution, etc)
• Information about Mergers & Aquisitions
• Advertising Campaigns.
• Strategy and Strategic Goals
• Organograms
• Employees’s Salaries and Wages
• Human Resources Policies and Procedures
• Finantial Data: Profits Forecasts, Cost Structure,
Departaments Bugdets.
• Team Profiles, Skills and Competences
and….
Isabel Santos ©
Information Target by Industrial Espionage
Isabel Santos ©
Personal Data
• Home Adresses
• Phone Numbers
• Names of Family Members
• Medical Records
• Tax Payer and National Insurance Numbers
• Employees Performance Evaluation
• Confidential Finantial Data (Credit Card Numbers, Bank
extracts, etc)
Isabel Santos ©
Information Target by Industrial Espionage
Isabel Santos ©
Competitive Intelligence & Counterintelligence
1 - Identificar Necessidades de Informação
2 - Mapear Fontes;
Recolher Informação
3 - Análise
4 - Comunicação
1 – Definir Requisitos de Protecção
de Informação
Avaliar a Concorrência
Avaliar as Vulnerabilidades
Desenvolver e Aplicar
Contra medidas
Análise
Comunicação
Isabel Santos ©
“The strategic goal of the Economic Security Program (PSE) is to defend and protect the portuguese
economic assets and investments from foreign threats”
Isabel Santos ©
LÍDER
Obter Apoio
e Recursos
Para Onde
Olhar?
CONTEXTO
AMPLO
PEAST
Ferramentas
Definir os
Parâmetros de
Comunicação
Colaboradores
5 Forças
de Porter
Questão
de Invest.
Fontes
FCS
KITs
Para Onde
Olhar?
INDÚSTRIA
Envolver a
Organização
Gestores I. .
Investigador(es) de Intelligence
(Requisitos)
Sensibilizar
Vender a ideia
Captar Apoio
• Conhecer a Organização
• Conhecer a Indústria
• Dominar Métodos
• Apetência pela Pesquisa &
Investigação
• Curiosidade ‘Renascentista’
• Atento/ Interessado no que
ocorre Fora das Fronteiras formais
da Empresa
• Criativo / Pensar ‘algo’ fora da
Caixa
• ‘Atitude’ e Apetência para
pesquisar, descobrir informação
exclusiva, trazer ‘novidades’ do
terreno (sobre os clientes, sobre
um fornecedor, a partir de
eventos, etc.)
• Capacidade de consumir e
absorver grandes quantidades de
informação
14
Apresentar logo um
‘Serviço’
Ex: Vigilância de um concorrente
Análise
INTELLIGENCE
• Definir outros Focos:
• Monitorizar sistematicamente um
Concorrente (desempenho, vendas,
promoção, canais de distribuição,
etc.), Clientes existentes ou
potenciais, Recursos Humanos,
Fornecedores, Campanhas de
Comunicação,
• Aplicar Ferramentas
& Técnicas
Sensibilização e Cultura
Organizacional
Sensibilizar para a Partilha de
Informação
Sensibilizar para proteger
informação sensível e evitar
comportamentos de risco.
Formação ‘in house’ ou fora.
Recursos de Aprendizagem
Definir procedimentos e meios:
Identificação e Participação em Eventos
Subscrição de Serviços/BD informação
Orçamento? Tecnologias genéricas: Intranet
Email, ‘caixa de ideias’ Wikis, outros
Periodicidade de Pesquisa e Reporting
Modo de Comunicar e Instrumentos de apoio
- Quem?
- Sobre o Que?
- Periodicidade
- Informação
Actualizada
- Forma
- Canal
Isabel Santos ©
IMPLEMENTING AN “INTELLIGENCE FUNCTION”
What is needed?
15
Environmental scanning is the (1) acquisition and use of information about events, trends, and
relationships in an organization’s external environment, (2) the knowledge of which would assist
management in planning the organization’s future course of action (Aguilar 1967, Choo and
Auster 1993). Organizations scan the environment in order to understand the external forces of
change so that they may develop effective responses which secure or improve their position in the
future. (3) They scan in order to avoid surprises, identify threats and opportunities, gain competitive
advantage, and improve long- and short-term planning (Sutton 1988). To the extent that an (4)
organization’s ability to adapt to its outside environment is dependent on knowing and interpreting
the external changes that are taking place, environmental scanning constitutes a primary mode of
organizational learning. (5) Environmental scanning includes both looking at information (viewing)
and looking for information (searching). It could range from a casual (6) or a conversation at the
lunch table or a chance observation of an angry customer, to a formal market research program
scenario planning exercise. (CHOO,2001)
STRATEGIC INTELLIGENCE:
Uma definição integrada enquanto actividade de Exploração
do Meio Ambiente (ENVIROMENTAL SCANNING)
Isabel Santos ©
Caso 1 –Concorrência Crédito ao Consumo (2007)
Empresa do Crédito ao Consumo no mercado português actuando no Financiamento
Automóvel, Crédito Pessoal e Crédito Consolidado (este último composto junto com o
Crédito Habitação, o Crédito Hipotecário)
Encomenda um Identificação da Concorrência do sector
Bancos SFACs Marcas
Automóveis
Financeiras Concessionários
Consultores Individuais
Franchising (Banca
Estrangeira)
Clubes de Futebol
Novos Concorrentes
Produtos
Condições
Preços
Produtos
Condições
Preços
ATENÇÃO
- Aumento da Pressão dos
Consumidores
- Volúme de Queixas em
Reguladores e Associações
- Directiva EU em aprovação
“Protecção ao Consumidor”
- REVISÃO + RESTRITIVA DA
LEGISLAÇÃOIsabel Santos ©
REFERENCES
• Chun, Wei Choo. “Environmental scanning as
information seeking and organizational learning”. Faculty
of Information. University of Toronto. Available at:
http://choo.fis.utoronto.ca/ir/choo/choo.html
• Fédération des Professionnels de l'Intelligence
Economique (FEPIE). http://www.synfie.fr/
• Ning Competitive Intelligence Community.
http://competitiveintelligence.ning.com
• Programa de Segurança Económica. Available at:
http://www.pse.com.pt
• SANS Institute (2007) “Corporate Espionage 201”.
Report.
Isabel Santos ©

More Related Content

Similar to Ethics in Competitive Intelligence

Competitive Intelligence
Competitive IntelligenceCompetitive Intelligence
Competitive IntelligenceElijah Ezendu
 
Competitive Intelligence Management
Competitive Intelligence ManagementCompetitive Intelligence Management
Competitive Intelligence ManagementHendry Hartono
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Glenn Villanueva
 
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...jonesbs1357
 
Gather DATA to identify business requirements.pptx
Gather DATA to identify business requirements.pptxGather DATA to identify business requirements.pptx
Gather DATA to identify business requirements.pptxgashawmekonnen4
 
Market / Competitive Intelligence Usage and Allocation
Market / Competitive Intelligence Usage and AllocationMarket / Competitive Intelligence Usage and Allocation
Market / Competitive Intelligence Usage and AllocationIgnacio Feller
 
Making less risky business decisions with Market Intelligence
Making less risky business decisions with Market Intelligence Making less risky business decisions with Market Intelligence
Making less risky business decisions with Market Intelligence VINCIT SPRL - STRATEGY
 
1.2 science and scientific research
1.2 science and scientific research1.2 science and scientific research
1.2 science and scientific researchtellstptrisakti
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Knowledge audit sikm leaders forum march 2019
Knowledge audit sikm leaders forum march 2019Knowledge audit sikm leaders forum march 2019
Knowledge audit sikm leaders forum march 2019plambe
 
Intelligence-Driven Innovation & Product Development: an Exercise-Driven, Int...
Intelligence-Driven Innovation & Product Development: an Exercise-Driven, Int...Intelligence-Driven Innovation & Product Development: an Exercise-Driven, Int...
Intelligence-Driven Innovation & Product Development: an Exercise-Driven, Int...Arik Johnson
 
Competitve Intelligence
Competitve IntelligenceCompetitve Intelligence
Competitve Intelligencevinod63
 
Intelligence Analysis & Deliverables
Intelligence Analysis & DeliverablesIntelligence Analysis & Deliverables
Intelligence Analysis & DeliverablesElijah Ezendu
 
SMARI Capabilities Packet
SMARI Capabilities PacketSMARI Capabilities Packet
SMARI Capabilities PacketKatie Ittenbach
 
Capabilities Packet-7-for-Web
Capabilities Packet-7-for-WebCapabilities Packet-7-for-Web
Capabilities Packet-7-for-WebAngelina Iturrian
 
SMARI Capabilities Packet
SMARI Capabilities PacketSMARI Capabilities Packet
SMARI Capabilities PacketMichael D. Ross
 

Similar to Ethics in Competitive Intelligence (20)

Competitive Intelligence
Competitive IntelligenceCompetitive Intelligence
Competitive Intelligence
 
Competitive Intelligence Management
Competitive Intelligence ManagementCompetitive Intelligence Management
Competitive Intelligence Management
 
2014 Jan Meeting - Competitive Intelligence
2014 Jan Meeting - Competitive Intelligence2014 Jan Meeting - Competitive Intelligence
2014 Jan Meeting - Competitive Intelligence
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
SLA Best Practices Ci
SLA Best Practices   CiSLA Best Practices   Ci
SLA Best Practices Ci
 
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...
Rethinking The Conventions Of Market Research_Orc Consumer Deck presented to ...
 
Gather DATA to identify business requirements.pptx
Gather DATA to identify business requirements.pptxGather DATA to identify business requirements.pptx
Gather DATA to identify business requirements.pptx
 
Market / Competitive Intelligence Usage and Allocation
Market / Competitive Intelligence Usage and AllocationMarket / Competitive Intelligence Usage and Allocation
Market / Competitive Intelligence Usage and Allocation
 
Making less risky business decisions with Market Intelligence
Making less risky business decisions with Market Intelligence Making less risky business decisions with Market Intelligence
Making less risky business decisions with Market Intelligence
 
1.2 science and scientific research
1.2 science and scientific research1.2 science and scientific research
1.2 science and scientific research
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Knowledge audit sikm leaders forum march 2019
Knowledge audit sikm leaders forum march 2019Knowledge audit sikm leaders forum march 2019
Knowledge audit sikm leaders forum march 2019
 
Intelligence-Driven Innovation & Product Development: an Exercise-Driven, Int...
Intelligence-Driven Innovation & Product Development: an Exercise-Driven, Int...Intelligence-Driven Innovation & Product Development: an Exercise-Driven, Int...
Intelligence-Driven Innovation & Product Development: an Exercise-Driven, Int...
 
Competitve Intelligence
Competitve IntelligenceCompetitve Intelligence
Competitve Intelligence
 
Intelligence Analysis & Deliverables
Intelligence Analysis & DeliverablesIntelligence Analysis & Deliverables
Intelligence Analysis & Deliverables
 
Research introduction
Research   introductionResearch   introduction
Research introduction
 
SMARI Capabilities Packet
SMARI Capabilities PacketSMARI Capabilities Packet
SMARI Capabilities Packet
 
Capabilities Packet-7-for-Web
Capabilities Packet-7-for-WebCapabilities Packet-7-for-Web
Capabilities Packet-7-for-Web
 
SMARI Capabilities Packet
SMARI Capabilities PacketSMARI Capabilities Packet
SMARI Capabilities Packet
 

Recently uploaded

GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607dollysharma2066
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementTulsiDhidhi1
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 

Recently uploaded (20)

GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 

Ethics in Competitive Intelligence

  • 1. ETHICS IN INTELLIGENCE AND INFORMATION SECURITY Lesson 8 – August 19th, 2011 LECTURER: Isabel Santos CURSO: “INTELIGÊNCIA ESTRATÉGICA GERIR A MUDANÇA OBSERVANDO OS SEUS SINAIS”
  • 2. Discussing Ethics in SI/CI • “In Corporate Warfare an action of a competitor in one country may be construed as industrial espionage and in another country it may amount to terrorism, whereas in certain countries this may just be the usual practice in which they gather information on competitors”. Vivek Raghuvanshi, CI Practitioner Isabel Santos ©
  • 3. DON’TS - Not false job interviews - Misrepresent ourselves - Compromise Proprietary information Isabel Santos ©
  • 4. Fédération des Professionnels de l'Intelligence Economique (FEPIE) • N'accepter que des missions pour lesquelles nous disposons de la compétence professionnelle requise ou pour lesquelles nous sommes en mesure de monter les équipes de travail répondant au besoin • Ne fournir que des informations accessibles par des moyens légaux, quel que soit le lieu d'application de l'activité. • Ne délivrer et n'utiliser que des informations dont nous avons vérifié la véracité et la crédibilité de la source. • Assurer une totale confidentialité concernant les informations et données fournies par le client et celles recueillies à son profit au cours de la mission. • Ne pas travailler pour deux sociétés concurrentes sur des problématiques similaires risquant d'entraîner un conflit d'intérêt. • Ne pas porter atteinte aux intérêts fondamentaux de la France. Les termes de la mission doivent alors être modifiés ou la mission refusée. Isabel Santos ©
  • 5. • Competitors’ brochures, Annual, Gov. Reports • Court Records, Articles and news on internet • Monitoring archives belonging to the competitor • Collecting open source information • Mapping competitors by finding their partners, vendors and customers by searching internet for pages with links to the competitor • Mapping competitors customers on social media platforms • Searching through archives and Google News and newspapers home pages for keywords that are connected to the company being monitored • Publications from competitors sometimes give very detailed information about what they have bought or sold or joint venture, M&A. Ethical Sources and Procedures in Intelligence Market surveys and consultants’ reports  Financial reports, and brokers’ research surveys  Trade fairs and competitors’ brochures  Analysis of competitors’ products  Overt surveillance  Meetings with suppliers (‘grey area’ )  Trade shows  Sales force meetings  Seminar / conferences  Recruiting ex-employees of competitors (‘grey area’ )  Discussion with shared competitors  Social contact with competitors  Advertising campaigns and Promotions  Tenders and Patent applications SOURCE: Vivek Raghuvanshi Other sources and Ning CI community Isabel Santos ©
  • 6. SI/CI Ethics(Competitors) • Grey Area: A ‘grey area’ is a Competitive Intelligence activity (normally related with information collection) that raises ethical doubts or questions for a practitioner. For example: What ethical questions emerge in these specific situations? • Elicitation of information using email and telephone calls in the form of disclosures made by competitors’ • Legitimate employment interviews with people who worked for competitor • Disguised questioning and ‘drawing out’ of competitors’ employees at technical meetings • Hiring competitors employees to acquire specific know how • Mapping competitors internal networks in connection with projects or consultancy Isabel Santos ©
  • 7. • • Trespassing on competitors premises • Bribing competitors employees and suppliers • Inserting a fake employee in competitors organization • Blackmail • Extortion • Industrial Espionage (Proprietary Information) • Phony job interviews • Using private investigators and detectives to extract specific information • Fake negotiations with competitors for license • Covert surveillance • Accessing competitors internal pages on internet with a false identity or an identity used by the competitor’s customers Forbidden Practices in Intelligence (Conc.) Source: Ning CI and others Isabel Santos ©
  • 8. Industrial Espionage: Some Methods • Hacking – System Hacking – Remote Hacking – Physical Hacking • Social Engineering – Managing/ Manipulating Human Behaviour (passwords, corporate information) Isabel Santos © • Dumpster Diving (company phone books, organizational charts, memos, company policy manuals, calendars of meetings, events and vacations, system manuals, printouts of login names and passwords, printouts of source code, disks and tapes, company letterhead and memo forms, and outdated hardware) • Phone Eavesdropping (fax and telephone transmissions) (SANS INSTITUTE, 2007)
  • 9. SANS Institute Report (2007): • Marketing Plans • Source Code • Customers Profiles • Product Development Plans • Production Process Manuals • Data on Geographic Markets • Manufacturing Facility Plants and Plans • Location of Factories and Commercial Branches • Description of Organizational Process and Procedures • Corporate Web Sites • Suppliers, Distributors, others Stakeholders Isabel Santos © Information Target by Industrial Espionage Isabel Santos ©
  • 10. • Contracts (details about pricing, costs, product delivery, distribution, etc) • Information about Mergers & Aquisitions • Advertising Campaigns. • Strategy and Strategic Goals • Organograms • Employees’s Salaries and Wages • Human Resources Policies and Procedures • Finantial Data: Profits Forecasts, Cost Structure, Departaments Bugdets. • Team Profiles, Skills and Competences and…. Isabel Santos © Information Target by Industrial Espionage Isabel Santos ©
  • 11. Personal Data • Home Adresses • Phone Numbers • Names of Family Members • Medical Records • Tax Payer and National Insurance Numbers • Employees Performance Evaluation • Confidential Finantial Data (Credit Card Numbers, Bank extracts, etc) Isabel Santos © Information Target by Industrial Espionage Isabel Santos ©
  • 12. Competitive Intelligence & Counterintelligence 1 - Identificar Necessidades de Informação 2 - Mapear Fontes; Recolher Informação 3 - Análise 4 - Comunicação 1 – Definir Requisitos de Protecção de Informação Avaliar a Concorrência Avaliar as Vulnerabilidades Desenvolver e Aplicar Contra medidas Análise Comunicação Isabel Santos ©
  • 13. “The strategic goal of the Economic Security Program (PSE) is to defend and protect the portuguese economic assets and investments from foreign threats” Isabel Santos ©
  • 14. LÍDER Obter Apoio e Recursos Para Onde Olhar? CONTEXTO AMPLO PEAST Ferramentas Definir os Parâmetros de Comunicação Colaboradores 5 Forças de Porter Questão de Invest. Fontes FCS KITs Para Onde Olhar? INDÚSTRIA Envolver a Organização Gestores I. . Investigador(es) de Intelligence (Requisitos) Sensibilizar Vender a ideia Captar Apoio • Conhecer a Organização • Conhecer a Indústria • Dominar Métodos • Apetência pela Pesquisa & Investigação • Curiosidade ‘Renascentista’ • Atento/ Interessado no que ocorre Fora das Fronteiras formais da Empresa • Criativo / Pensar ‘algo’ fora da Caixa • ‘Atitude’ e Apetência para pesquisar, descobrir informação exclusiva, trazer ‘novidades’ do terreno (sobre os clientes, sobre um fornecedor, a partir de eventos, etc.) • Capacidade de consumir e absorver grandes quantidades de informação 14 Apresentar logo um ‘Serviço’ Ex: Vigilância de um concorrente Análise INTELLIGENCE • Definir outros Focos: • Monitorizar sistematicamente um Concorrente (desempenho, vendas, promoção, canais de distribuição, etc.), Clientes existentes ou potenciais, Recursos Humanos, Fornecedores, Campanhas de Comunicação, • Aplicar Ferramentas & Técnicas Sensibilização e Cultura Organizacional Sensibilizar para a Partilha de Informação Sensibilizar para proteger informação sensível e evitar comportamentos de risco. Formação ‘in house’ ou fora. Recursos de Aprendizagem Definir procedimentos e meios: Identificação e Participação em Eventos Subscrição de Serviços/BD informação Orçamento? Tecnologias genéricas: Intranet Email, ‘caixa de ideias’ Wikis, outros Periodicidade de Pesquisa e Reporting Modo de Comunicar e Instrumentos de apoio - Quem? - Sobre o Que? - Periodicidade - Informação Actualizada - Forma - Canal Isabel Santos © IMPLEMENTING AN “INTELLIGENCE FUNCTION” What is needed?
  • 15. 15 Environmental scanning is the (1) acquisition and use of information about events, trends, and relationships in an organization’s external environment, (2) the knowledge of which would assist management in planning the organization’s future course of action (Aguilar 1967, Choo and Auster 1993). Organizations scan the environment in order to understand the external forces of change so that they may develop effective responses which secure or improve their position in the future. (3) They scan in order to avoid surprises, identify threats and opportunities, gain competitive advantage, and improve long- and short-term planning (Sutton 1988). To the extent that an (4) organization’s ability to adapt to its outside environment is dependent on knowing and interpreting the external changes that are taking place, environmental scanning constitutes a primary mode of organizational learning. (5) Environmental scanning includes both looking at information (viewing) and looking for information (searching). It could range from a casual (6) or a conversation at the lunch table or a chance observation of an angry customer, to a formal market research program scenario planning exercise. (CHOO,2001) STRATEGIC INTELLIGENCE: Uma definição integrada enquanto actividade de Exploração do Meio Ambiente (ENVIROMENTAL SCANNING) Isabel Santos ©
  • 16. Caso 1 –Concorrência Crédito ao Consumo (2007) Empresa do Crédito ao Consumo no mercado português actuando no Financiamento Automóvel, Crédito Pessoal e Crédito Consolidado (este último composto junto com o Crédito Habitação, o Crédito Hipotecário) Encomenda um Identificação da Concorrência do sector Bancos SFACs Marcas Automóveis Financeiras Concessionários Consultores Individuais Franchising (Banca Estrangeira) Clubes de Futebol Novos Concorrentes Produtos Condições Preços Produtos Condições Preços ATENÇÃO - Aumento da Pressão dos Consumidores - Volúme de Queixas em Reguladores e Associações - Directiva EU em aprovação “Protecção ao Consumidor” - REVISÃO + RESTRITIVA DA LEGISLAÇÃOIsabel Santos ©
  • 17. REFERENCES • Chun, Wei Choo. “Environmental scanning as information seeking and organizational learning”. Faculty of Information. University of Toronto. Available at: http://choo.fis.utoronto.ca/ir/choo/choo.html • Fédération des Professionnels de l'Intelligence Economique (FEPIE). http://www.synfie.fr/ • Ning Competitive Intelligence Community. http://competitiveintelligence.ning.com • Programa de Segurança Económica. Available at: http://www.pse.com.pt • SANS Institute (2007) “Corporate Espionage 201”. Report. Isabel Santos ©