An extensive 7- day workshop that will provide an overview of intelligence gathering and countermeasures, which covers strategic and tactical intelligence as the Israeli intelligence specialist from the civil and law enforcement communities understands it, as well as the broad issues involved with competitive intelligence and countermeasures.
Information/intelligence is a "Progressive Force" in the business "Battlefield".
The vision of information/intelligence is at our fingertips, at any given time or place, which both induces and slows down processes. It is the dream of each and every businessman and organization, whether public or institutional.
Everything begins when information/intelligence falls into the right or wrong hands, and thus influences the process of decision making.
Information/intelligence of this kind can lead to the rise or fall of corporations and organizations, may hinder business transactions, or alternatively, may give a critical advantage to the opposition and competition.
The Nightmare of any leader/manager/owner is the threat of infiltration of competitors from outside and from the circle close to you, into the home field – discussions, decisions, professional secrets, conversations, phone calls (linear, cellular, fax), bids, computer, vehicle, home and family.
The major and immediate advantage in the competitive intelligence world is the tight security of information/intelligence that prevails in your business or organization, resulting from the numerous and varying threats of which we are unaware in our everyday routine, and preventing tremendous damage to your business, organization and to you, the manager/owner, on a personal level.
Critical information/intelligence is worth a lot. Companies, institutions and organizations invest high budgets in two parallel channels:
- Keeping the existing information/intelligence from leaking out, thus preventing a significant advantage to the opposition.
- Obtaining information/intelligence in order to create an advantage over the competition/opposition, according to the universal saying:
"The best defense is offence".
Security in terms of protection and collection of information/intelligence is an array of protection circles. The core of this array is a combination of procedures, skills and advanced technologies. The outer circles must account for all aspects of physical security, including entry control, communications control and infrastructure (linear, data, cellular), computer systems and network infrastructure, departmentalization, employee control, guest control, internal and external maintenance control as well as issues such as organizational awareness and employment of tools for gathering information.
Your ability to recognize and define imminent threats to the assets you are protecting, and to decide on an appropriate operational response is essential.
True professional experience in the field of information/intelligence protection is both rare and unique. Our professional experience has been accumulated through years of service to various branches of the Israeli security establishment, including:
- The Israeli Security Agency (Secret service “Shabac”)
- The “Mossad”
- Private businesses
- Political organizations
Operative intelligence gathering methods & means
Module - “HUMINT - The Human Side of Intelligence”
This module will focus on the human factor in the collection of intelligence. It will cover both open and clandestine sources of information.
- Open sources of information include newspapers, magazines, commercial news clipping services, court transcripts and filings, libraries, and public records.
- Clandestine sources will analyze the history and current status of undercover agents, their recruitment, training, management, evaluation and control.
- Before the gained information can be put to work for the organization’s relevant departments, verification is necessary to ascertain its accuracy.
- Undercover activity: Building and adapting a cover, protection against undercover operators.
- Operative actions: Covert searches + information gathering from target +obtaining documents
- Recruitment and “running” of operatives: Finding, recruiting, and “running” the candidate.
- How to prevent mishaps, pre-hiring checks.
- Planting an operative: How it is done?
Module – Social engineering
Module – questioning, overt- covert, interrogation
Module - Surveillance
In this module the student will get acquainted with the techniques of physical and technical surveillance, for the purpose of obtaining information and/or evidence while conducting an investigation. The student will learn the difference between covert vs. overt surveillance and the means by which they are carried out depending upon the situation.
The module will cover the various methods used in the field as well as the applications of modern technology to expand the field agent's reach.
Module – Technical surveillance equipment &electronic countermeasures
- Covert vs. overt surveillance
- Types of surveillance
- Observation - day/night, quiet/crowded area, urban/suburban area
- Surveillance on foot and per vehicle
- Stationary surveillance and observation posts
- Operational disguises and make-up
- Communication - overt/covert, concealed on person or in vehicle, familiarity with equipment and its operation
- Surveillance technology
- Identification - by picture or description
- Report writing
In this module, different surveillance methods will be reviewed, including mechanical, electronic, visual and optical attacks. Mechanical attacks comprise everything from tape recording to physical capture of the information through oral or written form. Visual and optical attacks perhaps present the most common, least suspected form of intelligence collection.
- Various countermeasures to RF and wave transmitters, including infrared, laser and air techniques for intelligence collection.
- Detection, through systematic methods of conducting a physical search, electronic countermeasures and nullification including a practical understanding of how to conduct electronic sweeps to detect radio transmitters.
- How to conduct a physical search.
- Nullification of all surveillance methods.
Module – Phone line tapping countermeasures
- Basic electricity and measurement, transmitters, overt and clandestine, telephone analyzers, and non-linear junction detectors.
- Electronic switching systems, central office procedures, telephone testing, line tapping and tracing.
- Telephone system design, security practices, and devices like scramblers.
- Effective methods of nullification and all methods of telephonic intercepts.
Module -Covert video technology and sting operations
This module will teach the student basic theory, application and the technology available for covert video surveillance.
- Equipment, from light source to final monitoring, recording and printing for legal documentation.
- Developments in video technology miniaturization and remote transmission, video motion detectors, VCRs and frame storage devices.
- The practical application of video surveillance in retail stores as well as open-air surveillance.
- "Sting operations": how they are set up, site selection, security operatives, video camera selection and operation, identification of suspects, evidence preservation and documentation. (While the course is focused on criminal surveillance for the law enforcement community, there are numerous private security applications of sting operations).
Module - Electronic tracking technology
- Tracking theory and its application in an urban environment, field-tracking problems, placement of transmitters, and re-acquisition of lost signals.
- New technologies and their potential use in the security field such as satellite communication networks. Such technologies have potential use for tracking everything from stolen property to kidnap victims.
Module - Computer intelligence collection and security
Intelligence collection by computer is a rapidly expanding technology and service that is readily available to a growing number of private investigators, security officers and law enforcement investigators.
This module will cover many databases that can be accessed by computer, including: personal and business records, assets location and local address searches.
- The essentials of computer security, including security software programs, operational security systems, protection of hardware devices, protection of software and data, transmission security, audit trails and standard practice procedures for computer systems.
Module – Internal security
This module will cover issues including personnel, document and physical security.
- Personnel security refers to the policies and procedures intended to determine that an individual is not currently a security risk, and are not likely to become one. A personnel security program is intended to prevent criminal activities by employees, espionage attempts by external intelligence forces and unintentional acts by employees that could lead to a compromising situation.
- Document security, classification management, reproduction, disposal and transmission of sensitive or classified documents.
- Physical security includes issues like access control, security patrols, personnel identification and visitor control, as well as methods of detecting unauthorized intrusion or activity, alarm systems and facility clearances.
- Simulative drills and practice of information, Data and knowledge protection planning (field exercises)