You are previewing Corporate Security Intelligence and Strategic Decision Making.
O'Reilly logo
Corporate Security Intelligence and Strategic Decision Making

Book Description

Despite a clear and compelling need for an intelligence-led approach to security, operational, and reputational risks, the subject of corporate security intelligence remains poorly understood. An effective intelligence process can directly support and positively impact operational activity and associated decision-making and can even be used to drive the firm’s business in key markets. Corporate Security Intelligence and Strategic Decision-Making outlines the basic theory and supplies practical solutions for implementing an effective intelligence process in any commercial organization.

The main areas covered include how intelligence in the corporate security environment relates to strategic decision-making; the factors that drive the requirement for corporate security intelligence, as well as the main legislative and ethical imperatives; and how intelligence-led processes can not only prevent loss but also support business growth and revenue generation. Detailed topics include:

  • Fundamental and theoretical ideas underlying intelligence work in the public and private sector
  • The collection, validation, collation, and analysis of intelligence
  • The effective and safe dissemination of intelligence material and the different reporting formats available
  • The use of operational models to help guide structures, processes, and the deployment of resources
  • How to implement an effective intelligence function in a corporate environment

The topics include real-life examples of where intelligence has been used to support corporate operations and demonstrate how the theory applies to these practical examples, based on years of experience. While corporate security is the natural home of intelligence, the tools and techniques outlined are of course equally applicable for any decision-support process—making this book valuable reading for any leader.

Table of Contents

  1. Preliminaries
  2. Foreword
  3. Introduction and Acknowledgments
  4. About the Author
  5. Section I: Rationale
    1. Chapter 1 - What Is Corporate Security Intelligence?
      1. Chapter Objectives
      2. Introduction
      3. Intelligence Defined
      4. Introducing Decision Advantage
      5. The Corporate Security Environment
      6. The History of Corporate Intelligence
      7. A Typical Corporate Security Department
      8. Challenges to Effective Corporate Security
      9. Overcoming These Challenges: The “Business of Resilience”
      10. The Role of Intelligence in Enterprise Risk Management
      11. Conclusion: Toward Truly Intelligent Security and Businesses?
    2. Chapter 2 - The Corporate Security Operating Environment
      1. Chapter Objectives
      2. Introduction
      3. Geopolitical Risk
        1. Unknown Unknowns
      4. Terrorism
      5. Cyber Issues
        1. State-Level Threats
        2. Cyber Crime
        3. Cyber Activism
        4. A New Paradigm
      6. Conventional Espionage and the “Insider Threat”
      7. Single-Issue Activism and Political Violence
        1. The Move toward All Liberation Struggles Being “As One”
        2. Secondary Targeting of Customers, Suppliers, and Shareholders
        3. Internationalization of Single-Issue Campaigns
        4. Political Extremism
        5. Use of Social Media in Single-Issue Protest and Political Activism
      8. Organized Crime
        1. The Wide Reach of Serious Organized Crime
        2. Threats to Corporate Security
      9. Emerging Threats—What’s Next?
      10. Conclusion: A Complex and Multifaceted World
    3. Chapter 3 - Legal Drivers for Corporate Security Intelligence
      1. Chapter Objectives
      2. Introduction
        1. Protecting the Heath, Safety, and Security of Employees: An Employer’s Duty of Care
        2. Relevant Laws in the United States
        3. Relevant Laws in the United Kingdom
        4. Relevant Laws in the European Union
        5. Developing Causes of Action: Negligent Failure to Plan
        6. Duty of Care: Summary
      3. Corporate Responsibility, Compliance, and Business Ethics Concerns
        1. US Law: The Foreign Corrupt Practices Act
        2. United Kingdom Law: The UK Bribery Act
        3. Sanctions Regimes in the United States and United Kingdom
        4. Corruption, Compliance, and Sanctions—Summary
      4. Conclusion: The Legal Imperative
    4. Chapter 4 - Operational Drivers for Corporate Security Intelligence
      1. Chapter Objectives
      2. Introduction
      3. General Corporate Security Intelligence Operating Framework
      4. Risk-Management Standards
      5. How Corporate Security Intelligence Saves Money
      6. How Corporate Security Intelligence Makes Money
      7. Conclusion: Intelligence and the Four Ps
  6. Section II - Theory
    1. Chapter 5 - The Fundamentals of Intelligence
      1. Chapter Objectives
      2. Introduction
      3. The Information Hierarchy
      4. The Intelligence Cycle
        1. Criticism of the Intelligence Cycle
        2. A Suggested Model for the Corporate Security Intelligence Cycle
      5. Principles of Intelligence: CROSSCAT
      6. Dramatis Persona: Roles and Responsibilities
        1. Intelligence Manager
        2. Collectors
        3. Collators
        4. Analysts
        5. Administrators
        6. Consumers
      7. Types of Intelligence
      8. The Systems Approach
      9. Predicting, Forecasting, and Probability
      10. Conclusion: All Parts in a Harmonious Whole
    2. Chapter 6 - Management and Direction
      1. Chapter Objectives
      2. Introduction
      3. Intelligence Requirements and Product Definition
      4. Managing People and Processes
      5. Managing Clients and Promoting the Role of Intelligence in the Business
      6. Knowledge Management
      7. Conclusion: An Essential Juggling Act
    3. Chapter 7 - Intelligence Collection
      1. Chapter Objectives
      2. Introduction
      3. Sources
      4. OSINT: The Open World
        1. The Internet and Security: An Intelligence Perspective
        2. Social Media: Networks within a Network
        3. News Media: A Similar Perspective
      5. HUMINT: The Human Element
      6. Company Sources
      7. The Collection Management Process
        1. Planning
        2. Execution
        3. Source Gathering Techniques: OSINT
        4. Source Gathering Techniques: HUMINT
        5. Source Gathering Techniques: Company
        6. Information Archiving
        7. Verification
        8. The Review Process
      8. Conclusion: Better Equipped than Ever?
    4. Chapter 8 - Collation
      1. Chapter Objectives
      2. Introduction
      3. Key Principles
      4. Structured versus Unstructured Data
      5. Databases and Automated Collation
      6. Big Data
      7. GIS
      8. Conclusion: Getting the Ducks in a Row
    5. Chapter 9 - Analysis
      1. Chapter Objectives
      2. Introduction
      3. Three Models of Corporate Intelligence Processing
      4. Decomposing the Task
      5. Assessing Sources
      6. Collation
      7. Intelligence Analysis in the Corporate Sector
      8. The Role of the Analyst
      9. Ensuring Credibility and Access
      10. Analytical Techniques and Thought Processes
      11. Analytical Fallacies and Psychological Traps
      12. Avoiding the Pitfalls
        1. Articulation and Testing of Assumptions
      13. Asserting Conclusions and Forecasting
      14. Conclusion
    6. Chapter 10 - Dissemination
      1. Chapter Objectives
      2. Introduction
      3. Why Do We Disseminate Material?
      4. Balancing Operational Security
      5. Report Formats
      6. Writing Guidance
      7. Presentation Guidance
      8. Quality Assurance
      9. Showing Return on Investment
      10. Conclusion
  7. Section III - Practice
    1. Chapter 11 - Operational Models
      1. Chapter Objectives
      2. Introduction
      3. A Corporate Solution: The Security Intelligence Decision Advantage Research Model (SIDeARM)
      4. What Does SIDeARM Consist Of?
        1. Management
        2. Direction
        3. Collection
        4. Collation
        5. Analysis
        6. Dissemination
        7. Clients
        8. Other Factors
      5. Countering Crime: The National Intelligence Model (NIM)
        1. NIM at a Glance
        2. NIM in Practice
        3. NIM Considered
      6. Conclusion
    2. Chapter 12 - Implementing the Function: The Intelligence Estimate
      1. Chapter Objectives
      2. Introduction
      3. A Suggested Approach: The Intelligence Estimate
      4. Task Analysis
        1. What Are We Seeking To Do and Why?
        2. What Are the Key Timings?
        3. Who Are the Key Decision Makers/Clients?
      5. Environmental Analysis
        1. Where Do We Operate, How, and Why?
        2. What Are Our Known Risks?
        3. What Is the Threat Environment?
        4. What Are Our Initial Intelligence Requirements?
      6. Self-Analysis
        1. Who Are Our Potential Partners/Allies?
        2. What Sources Are Available to Us?
        3. What Are Our Current Resources?
        4. Who Are Our Customers?
        5. What Constraints Are There upon Our Freedom of Action?
      7. Courses of Action Development
        1. What Are the Actions/Effects We Are Seeking to Achieve?
        2. How Best Can We Achieve Each Action/Effect?
        3. What Resources Are Required Best to Achieve Each Action/Effect?
        4. Develop Courses of Action
      8. Control Measures
        1. What Are the Touch Points with Other Processes?
        2. What New Processes Do We Require?
        3. How Will We Regulate Ourselves?
        4. How Will We Maintain Operational Security?
      9. Implementation Plan
        1. What Are Our “Quick Wins”?
        2. How Will We Measure Success?
        3. How Do We Position and Sell the Intelligence Function?
        4. How Will We Run the Project?
      10. Conclusion
    3. Chapter 13 - Corporate Security Intelligence Use Cases and Examples
      1. Chapter Objectives
      2. Introduction
      3. Travel Security
      4. New Market Entry
      5. Scenario Planning
      6. Depth Due Diligence
        1. Screening
        2. Enhanced Due Diligence
        3. Investigative Due Diligence
      7. Power Mapping
      8. Country/Geopolitical Risk Analysis
      9. Executive and Event Protection
      10. Exercises and “Red-Teaming”
      11. Crisis Support
      12. Threat and Reputational Monitoring
      13. Summary
  8. Chapter 14 - Conclusion: Reinforcing Intelligent Security
  9. References
    1. Case Law References
      1. Statute Law References