The Intelligence Edge
The Intelligence Edge
The Intelligence Edge
THE
INTELLIGENCE
EDGE
How to Profit in the Information Age
George Friedman
Meredith Friedman
Colin Chapman
John S. Baker, Jr.
C R O W N P U B L I S H E R S , INC.
NEW Y O R K
DEDICATED TO
CONTENTS
W. Edward LeBard
Jonathan Friedman
Maximilian Chapman
Michelle Baker
Preface
VII
s.
17
56
84
114
142
ISBN 0-60<HK)075-3
10
9 8 7 6 5 4 3 2 1
First Edition
Contents
164
187
214
234
F R E FAC E
Appendix
Index
255
269
This book originated from a series of intercontinental conversations over an extended period of time. The issue was deceptively
simple: Do businesses actually know what they need to know in
order to make decisions? One of the authors, Colin Chapman, is a
longtime business journalist who has been collecting information
on businesses for decades. Two other authors, George and Meredith Friedman, had just emerged from the thickets of collecting
information on the military, during the course of which they had
discovered new sources and techniques that had heretofore been
inaccessible outside the national security community but which
were now pouring forth into die public domain. The question arose
whedier the methods used in tracking information about national
security and the techniques discovered while studying the military
and intelligence communities could be fruitfully applied to the
craft of business intelligence. We were particularly interested in the
new technologies that permitted die intelligence professional to go
beyond espionage to the efficient mining of the public domain.
One of the outcomes of this conversation was the forming of a
business, Strategic Forecasting, L.L.C., which applies these techniques on a daily basis. The other result was this book, which draws
both on our particular perspectives in hunting down information
and analyzing it as well as our experiences operating a business
intelligence service. It was because we were in business dial we real-
VII
viii
Preface
ized that any book on business intelligence that did not include a
word from a counsel was incomplete. Thus, we invited John Baker
to have the final say, making this a wholly realistic work. The purpose of this book is not to provide a comprehensive manual for
business intelligence operations but to create a framework for
thinking about the problem of transforming information into
knowledge. We have also provided some representative anecdotes
to give the reader a sense of the steps involved in this process. All of
the episodes recounted here represent actual cases in which we
have been involved. Since, however, confidentiality is a critical element in our chosen profession, particulars, including but not confined to industry and country, have been occasionally changed.
We would like to thank several people who have helped us in our
collective effort, including Chris Treadaway, Matt Baker, and others
of our staff at Strategic Forecasting who were indispensable in the
research for this book. We are also grateful to a number of members of the staff of the World Economic Forum and its founder and
president, Klaus Schwab. William Bradford Reynolds and Dave Marshall both read significant portions of the manuscript, and we thank
them for their helpful comments. And finally, we thank Bob
Grevemberg, who kept us from taking this too seriously.
THE I N T E L L I G E N C E EDGE
INTRODUCTION
The Knowledge Crisis
THE
N T E l_l_ I G E N C E
EDGE
Introduction
The hard-won lessons of the world's national intelligence services can now be applied to business, and not only large corporations. Any business that needs information about its operating
environmentwhat we call situational awarenesscan profit from
these techniques. What we are proposing is the logical next step in
the great global privatization wave under way since the 1980s: the
privatization of intelligence.
In the simplest sense, everyone in business is an intelligence
operative and analyst. Business is about locating opportunities and
risks, analyzing possible responses and acting on that analysis. Business lives and dies by information collection, management, and
analysis. The issue is not whether you will engage in business intelligence, but rather whether you will do it casually or meticulously,
ad hoc or systematically. Obviously, we think systematic and meticulous intelligence is more profitable than casual, ad hoc intelligence.
You may think otherwise. But doing intelligence is not a matter of
choice. It is what business is all about, and it is getting harder, rather
than easier, to do.
THE
INTELLIGENCE
EDGE
/Introduction
THE
NTEUL1GENCE
EDGE
In business today, we have had a massive breakdown in intelligence. To be more precise, the massive surge of information has so
overwhelmed the traditional collection and analysis systems that
businesses use, that most information is lost and wasted. Critically
important information is rarely acquired and even when acquired
rarely turned into knowledge. The information is out there somewhere, but businesses are still making critical and costly errors.
Modern business is facing a massive crisis of knowledge, rooted in
the failure of intelligence. To put it differently, businesses have
become quite sophisticated in turning data into information, but
they are not nearly as good at turning information into knowledge.
This is rooted in the failure of businesses to approach the problem
of knowledge with the same rigorous systems approach they used
in creating first data-processing systems and later informationmanagement systems. They have neglected to create intelligence
systems and to turn information into knowledge.
One solution that companies are turning to, and has been
widely publicized of late, has been the creation of knowledge managers. These people have been given a wide range of titles, from
Chief Knowledge Officer to Chief Learning Officer to Director of
Intellectual Capital and the like. This is becoming a widespread
phenomenon, particularly in large companies that are experiencing the problem first and most intensely because of the size and
complexity of their operations. These companies are not confined
to the computer industry. They include Coca-Cola, Monsanto,
Coopers & Lybrand, General Electric and others throughout the
business spectrum. These people have a common task: to organize,
control, manipulate, and exploit all of the information that has
been created inside the company and turn it into knowledge.
Whatever you call these new people, their mission is the same
as that of the head of any intelligence service: to maximize die efficiency of data collection, collation, and analysis. An intelligence
agency is an organization dedicated to collecting information and
turning it into knowledge. The reason a Central Intelligence
Agency was created, for example, was the conviction, born of experience in World War II, that not only was there tremendous inefficiency in American intelligence gathering during the war, but a
Itroduction
THE
INTELLIGENCE
EDGE
I Introduction
Now, there may be businesses that do not need to create intelligence systems. A business working with stable technology requiring
only expected, incremental updates; a business working in a circumscribed geographic region, where the laws, regulations, markets, and personalities are well known and changing only slowly;
businesses that are small enough that employees efficiendy share
information; businesses that operate in a stable environment where
the unexpected rarely occurs and time-critical decisions need not
be takensuch businesses, if they exist, would not need intelligence systems.
This is not intended to be ironic. There are, in fact, businesses
where managers are so intimately familiar with their environment
that they sense shifts almost intuitively. A real estate broker, operating in a fairly isolated market, is his own intelligence system. He
knows the few banks in the area personally, as well as the members
of the zoning board. He knows most of his clients personallyand
when he doesn't, he has friends who know them. He knows every
vacant lot, every developer, and knows when a house is likely to
come up for sale, sometimes before die owner does. Someone like
this doesn't need an intelligence system because he is his own intelligence system. His network of relationships, his recollections of
facts about his market and industry, his understanding of the techniques of the realtor substitute superbly for any formal system of
intelligence gathering.
10
THE
INTELLIGENCE
EDGE
still work. Mistakes begin to pile up. New markets are entered and
sales don't live up to expectations. Nobody within the company
notices new technologies. In the end, the company enters a period
of crisis. The crisis is simple: Intuition works extremely well when
you are intimately familiar with your environment. When success
brings you beyond the reach of intuition, knowledge declines and
information isn't gathered. Increasingly, the business flies blind
until it hits a mountain or runs out of fuel.
You know that informal intelligence systems won't do when
you haven't pliyed golfor pinochlewith most of your
customers.
This is increasingly the entrenched reality of the business
world. The crisis has two roots: geography and technology. Geographythe growth in the size of your company and growth in the
geographical scope of today's businessforces managers to shift
from intuitive to systematic information-gathering and knowledgeproducing techniques. As the network of suppliers and customers
expands, less and less of the market can be knowable. Events completely outside the scope of a manager's intuition can have a devastating effecta fire in a plant that supplies a key component to a
customer that causes a cancellation of orders to your business; a
takeover of a competitor by a large multinational corporation can
cause coronaries at your own shop, even though none of you had
ever heard of the multinational. Forces impinge from far beyond
die realm of expectations. But then, it is rare to be destroyed by the
expected and predictable.
This is one of the critical problems of modern business. Businessmen and -women are practical people. They focus on their own
business and their own work and regard overconcern about the big
world beyond as both extraneous and pointlessthere's not much
you can do about it. This is especially true of entrepreneurs and
those in small businesses. During the 1960s, most auto parts manufacturers focused on producing what General Motors and Ford
wanted. If someone went to them in 1975 and said, "Look, GM is
borrowing money at 13 percent while Japanese companies are bor-
production
11
12
THE
INTELLIGENCE
EDGE
ntroduction
13
as a facilitator in most human activities has made information a byproduct of everyday life. In a competitive environmentand who
isn't in a competitive environmentthe ability to utilize this infori mation better than your competitors can mean increased sales, new
'products to the market before others, effective joint ventures, avoiding regulatory threats and everything else that constitutes modern
business.
The same type of business, in different locations, generates
dramatically different needs in information. Consider the difference between the needs for information of a painting contractor,
working in a small town in Utah with well-known and slowly evolv* ing technology, who knows all of his customers and competitors,
' and the needs of a painting contractor in a suburb of Washington,
D.C. In Washington, everything is on a larger scale with millions of
potential customers and hundreds of competitors. Whereas the
contractor in Utah knows his competitors and customers personally, the D.C. contractor needs to know how to identify potential
customers, and how to find out what competitors are charging and
paying for help. In a market the size of Washington, D.C., it is not
easy to find out what new products are available, if any new environmental regulations affect contractors, or if there are new,
related businesses.
If you're a painting contractor with two trucks and three workers, you are certainly not going to set up a complex intelligence service, nor are you going to hire an intelligence consultant. But you
may want to think more systematically about the things you do need
to know, and more carefully about how you gather and analyze
information. This may take a little time, a little money, and some
effort in learning a few new tncks, but one or two new contracts,
one or two disasters avoided, and the effort will not only pay for
itself but possibly save your business. So whether you are a large
multinational corporation or a painting contractor with three
employees, you need to turn information into knowledge.
An intelligence system doos not mean an intelligence
department. It means what it says: a system for doing
intelligence.
14
THE
N T E L I- I G E N C E
EDGE
Introduction
,5
IB
HOW
THE
NATIONAL
INTELLIGENCE
EDGE
INTELLIGENCE
AGENCIES A R E O R G A N I Z E D
Intelligence has always been with us, but the modern intelligence
organization really emerged during the last hundred years. The
twentieth century saw intelligence gathering turn from an incidental activity carried out by diplomats, journalists, and travelers in the
course of their other activities, into a systematic, focused process
run by professionals for whom intelligence gathering was the main
activity of their lives. The reasons for this development are rooted
in two phenomena. Internally, the emergence of revolutionary parties meant that the state needed to systematically monitor the opposition in order to prevent or preserve the revolution. Externally, the
age of total war meant that monitoring potential threats to national
security required a systematic and focused approach to intelligence
gathering.
Revolution and total war combined to give rise to an extraordinary phenomenon: the intelligence organization. Unlike anything before in history, the intelligence organization was a vast
bureaucracy created for the sole purpose of gathering and understanding information of interest to the rulers of the nation-state.
Whatever one thinks of the purpose to which any particular
agencyor for that matter, all intelligence agenciesis put, the
sheer scope, the sheer ambition of organizations such as the CIA is
breathtaking. It had as its goal the ability to pursue all information
relevant to a nation's interestvast indeedthe ability to analyze
that information, and the ability to transmit the analysis to decision
makers in a timely and understandable fashion.
What is remarkable about these organizations is how well they
succeeded. We of course hear a great deal about intelligence failures, although many of the failures, such as the Bay of Pigs, were
less intelligence failures than political miscalculations. Yet the intelligence services of modern advanced industrial countries have
provided their political masters, day in and day out, with unprecedented situational awareness. An American president or a German
chancellor knows far more about what is going on inside or outside
his country than ever before in history. Mind you, this doesn't mean
19
that they are any better at ruling. A genius with limited information
will rule better than a dunderhead with encyclopedic knowledge.
!1
Nevertheless, all other things being equal, the information pro? vided by intelligence services proves historically to be of enormous value.
There is, therefore, much business can learn from these intelligence organizations. Business and government have this much in
common: both prosper through lots of information properly anas' lyzed and understood. Understanding how intelligence services
organize themselves will not give us a blueprint for business intelligenceGod knows that a local meat processor doesn't need the
overhead of the CIA. It may, however, give businesses a first glimpse
of what is possible through systematic intelligence practices.
Let's begin by considering what is not part of the intelligence
apparatus: security. The guards at the gate, the locks on the doors,
the bodyguards accompanying executives, even the firewalls protecting computers from hackers are part of an organization's security apparatus. They are certainly important and need to be done
but are not, properly speaking, part of intelligence. Guards and
intelligence agents are doing very different jobs with very different
goals. Putting them together is not useful.
In almost all countries, the intelligence agency charged with
collecting foreign intelligencethe nation-state's competitive intelligenceis kept very separate from the agency charged with stopping foreign intelligence agents from spying on them. In the
United States, the two functions are divided between the Federal
Bureau of Investigation (FBI), which does counterintelligence, and
the CIA, which collects and analyzes foreign intelligence. In Britain,
there is MI-5 and Scotland Yard stnd its Special Branch for internal
security, and there is MI-6 for foreign operations. Israel has Shin
Bet, the internal security and intelligence force, and Mossad, which
runs the foreign intelligencegathering operations.
There are two good reasons for keeping intelligence and security separate. The first is the nature of the people involved in each.
Security personnel, from top to bottom, are cops. They may be very
good at protecting property, penetrating criminal organizations,
and identifying security threats, but cops know little, and could care
even less, about matters of high policy. The FBI, under J. Edgar
Hoover, succeeded in capturing the famous gangster John
Dillinger, but had a great deal of trouble understanding the subtleties of Franklin Roosevelt's unfolding foreign policy. Hoover's
* best solution to the problem of Japanese intentions during World
War II was to arrest every ethnic Japanese in America.
21
GENERIC A R C H I T E C T U R E OF AN
INTELLIGENCE
ORGANIZATION
Cops enforce laws and arrest people. Political leaders, who are
an intelligence agency's customers, are not nearly as interested in
finding the guilty party as in understanding the capabilities of foreign nations, who may be friends one day and enemies the next,
Putting intelligence operations in the hands of the security people
may catch enemy spies, but it won't get you the kind of intelligence
you need to carry out a foreign policy. The two jobs call for very different types of people.
The second reason you want to keep security separate from
intelligence is to keep intelligence honest. By dividing the CIA from
the FBI, MI-6 from MI-5, Mossad from Shin Bet, you provide a
check on the honesty of the intelligence service. An intelligence
service, when it operates properly, can be a political leader's eyes
and earsand sometimes his brains as well. That means it's in the
interest of every enemy and competitor to blind you or make you
stupid. The best way to do this is to subvert your eyes, ears, and
brainsto turn them against you. This is the nightmare of every
intelligence agency. By keeping security and intelligence separate,
you spare your intelligence service from the responsibility of monitoring itself, allowing the chief executive officer (CEO) to sleep
much better at night. It's why you have both a chief financial officer
(CFO) and a comptroller.
Knowledge is power. Power corrupts. Think about it.
So, we begin with two premises. First, intelligence is not about
security. Second, intelligence must be kept separate from counterintelligence. This first sketch of the architecture is important so we
can begin defining precisely what might be useful to a business in
conducting its own intelligence operations. Organizations are not
shaped ehe way they are by accidenttheir form derives from function. If we can sketch the form, we can understand the function.
in*
INTELLIGENCE
EDGE
23
24
THE
INTELLIGENCE
EDGE
25
THE
I NTE1.LIGBNCE
EDGE
27
PROM N A T I O N A L INTELLIGENCE
TO BUSINESS INTELLIGENCE
The equivalents of political warfaresabotage, assassination, organized uprisingsand espionage have no place in business intelligence. As a result, most business executives feel that intelligence is
an exotic, but frankly irrelevant, part of their own business operations. This misconception derives from an overemphasis on these
more sexy and glamorous popularizations of the intelligence structure. It fails to recognize that the heart of intelligence, the mining
of open source data, is entirely applicable to businessand just
needs to be put into an appropriate business context. A business
intelligence organization chart would dispense with operational
functions and focus on open source intelligence, containing technical and human intelligence gathering in an even more powerful
form than most national intelligence agencies use.
The business intelligence service has as its customer the executive suitethe CEO, the chief financial officer, head of sales and
marketing, heads of strategic planning, legal, mergers and acquisitions, and so on. Each has different needs, obviously, but they each
have the same responsibility: the prosperity of the company. The
only responsibility that the head of intelligence has is to gather
open source intelligencethat is, information that is generally and
legally available. Open source information is either fully emitted
into the public domain or can be inferred from a variety of forms,
ranging from formal publication to gossip. This is true of all intelligence organizations, but for various reasons, ranging from cost to
the law, it is a fundamental rule for business intelligence.
Organizations constantly* release information: sometimes
planned and controlled releases, such as annual reports or press
releases, and other times they are uncontrolled emissions, such as
leaks to the press by discontented employees or subpoenaed documents. Sometimes emissions are forced during the normal course
of business, such as material submitted to a government agency
while seeking approval for a product or getting a patent. Information can also be released because of a completely legal, deliberate
manipuladon of the company by outsiders, like reporters or canny
business intelligence specialists.
THE
INTELLIGENCE
EDGE
THE BUSINESS I N T E L L I G E N C E
ORGANIZATION
COMPANY
EXECUTIVE
SUITE
INVESTIGATIONS
INTELLIGENCE
DlflECTOfl
SECURITY
HUMAN
TECHNICAL
29
is doing in a particular R&rD field, you may not be able to get copies
of their research, but you could go to professional conferences
where some of that company's staff researchers might present a
paper on an aspect of their research. When traces left by funding
organizations are tracked and show research grants given to this
company in the same area of research, you have matched enough
traces to safely calculate the information itself. This is not information in die fullest sense, but it is the traces that can be watched,
tracked, and from which the real intentions and capabilities of a
company can be inferred.
These emissions and traces are the quarry of business intelligence. Usually, like emissions from a smokestack, they are created,
emitted, and dissipated into the air, with no one collecting them
and thinking about what they mean. But when these emissions and
traces are tracked down and collected and taken together, they can
be interpreted and understood. Indeed, by being aware of what you
are learning about your competitors, your company can learn to
guard its own emissions and minimize your own traces as you go
about your business.
Locating information is less a matter of sleuthing than of
sorting. We live in a world of too much information rather than
too little.
OPEN SOURCE
COLLECTION
SEMIACTIVE
ACTIVE
me
INTELLIGENCE
EDGE
With passive sonar, no one knows that you are out there listening; you have the element of surprise. It also keeps the submarine safe from counterattack. Its weakness is that it relies on the
emissions of other ships. Active sonar, on the other hand, gives you
control over the situation. No matter how quietly the other boat is
running, no matter how carefully they control their emissions,
active sonar bounces off their hull. The cost is that by pinging away,
other submarines will be able to track down the location of your
transmitter.
The difference between active and passive intelligence is the
difference between actively going out and looking for information
and capturing the information that comes to you. It is the difference, for example, between reading a newspaper or walking into a
company, asking to speak to an official and asking him, point-blank,
to answer a question. The first won't get you noticed, and you'll
only learn what has been printed. The second may get you more
information, but it will also get you noticed. In the past thirty years
or so, the growth of technology has created an entirely new sphere
of electronic information that is passive intelligenceinformation
that makes its way to your door by itself. In effect, it captures emissions, uncovers traces, and delivers them to you.
All other things being equal, passive intelligence is much
cheaper than active intelligence. Passive intelligence, like passive
sonar, takes much less energy than active intelligence. It depends
on effective receivers that are always cheaper than effective scouts.
As soon as someone leaves the office to physically locate information, the clock starts running, the price goes up.
For practical purposes, we can divide passive and active intelligence between the kind of intelligence that can be carried out in
your own office and the kind of intelligence that requires you to
leave the office. In reality, we also use a third category we call semiactive, in which you reach out via phone or fax. It is still activethat
is, you can be trackedbut not as active as driving around looking
31
for things. And it is much less expensive dian that most expensive
and rareactivity, the investigation.
In a way, the distinction between passive and active intelligence can be restated as the distinction between human and technical intelligenceso long as it is understood that these are not
quite identical. Human, or active, intelligence is about spies and
recruiting spies. Technical intelligence gathering, or passive intelligence, concerns the use of technology to peer, without being seen,
into places that would otherwise be invisible.
INTELLIGENCE T E C H N I Q U E S
A N D TECHNOLOGY
Technical intelligence focuses on the means of collecting intelligence. There are, generally speaking, two types of technical intelligence gathering that were introduced by national intelligence
agencies: photographic and electronic. Photographic intelligence,
from satellite reconnaissance to airborne reconnaissance to some
guy with a Kodak Instamatic. allows you to see physical objects,
freezing them in time and space, allowing you to examine them at
your leisure and alongside other information. Electronic intelligence allows you to in tercept the electronic signals of the other guy.
This means everything from monitoring his radio talk show to listening in on his telephone calls, mapping his radar, or tapping into
his computer networkall of which the U.S. intelligence community does overseas.
Electronic intelligence is a huge task. Both the United States
and Britain have created separate agencies to carry out electronic
intelligence (the National Security Agency in the United States and
THE
INTELLIGENCE
EDGE
33
34
THE
INTELLIGENCE
EDGE
danced into the life of a French cabinet minister and became his
mistress, acquiring much information for the Germans before
being brought to court, convicted, and sentenced to death before a
French firing squad. She was able to collect more information
through her personal persuasions than any electronic means could
have done. She was said to have all the ingredients of the glamour
spy: a hedonistic love for life; intelligence; a powerful personality; a
capacity for deception; and an ability to crack or even break men's
hearts. The Mata Hari legend set a style for European intelligence
work that was to last for more than three decades.
Another advantage of using HUMINT is the fact that they can
network. Throughout the forties, fifties, and sixties, several thousand operativesknown as technology collection officers, working
under assignment in various parts of the world undercover as diplomats, trade officials, technical assistants to international bodies like
the United Nations, UNESCO (United Nations Educational, Scientific, and Cultural Organization), the International Labor Office,
the World Health Organization, and UNCTAD (United Nations
Conference on Trade and Development)pulled in, quite legally,
material from scientific and technological journals, used student
exchanges to gather facts, and attended large numbers of conferences. Conferences were of particular benefit because attendance
was upfront and legitimate. Apart from gathering and filing back
official papers, they provided an opportunity for networking and
identifying possible recruits for espionage. International trade
union meetings were especially useful as a venue for establishing
long-term contacts. The Warsaw Pact representatives often found
political sympathizers among the Western representatives present.
The Vietnam War during the 1960s, and its unpopularity among
intellectuals and left-leaning trade unionists, was frequently used as
an ice-breaker, allowing friendships to develop and documents to
be exchanged.
Human beings can do something no technical means of collection can: provide nuance. In 1973, Syria and Egypt built up their
forces on the Golan Heights and along the Suez Canal. Sharing the
American fondness for technical intelligence, Israel knew precisely
what the Arabs were doing. They used photo reconnaissance, signal
35
intelligence, electronic techniques, and all the rest to map the precise location of all Arab forces. What they did not know, what diey
could not know from technical intelligence, is why the Arabs were
doing it. The Egyptians and Syrians, fully aware of Israel's technical
capabilities, carefully screened their plans. Nothing was transmitted
electronically. All meetings were held in secured rooms where electronic probes were impossible. The Israelis did not have a spy who
had attended the meetings and briefings or slept with a secretary on
a general's staff; they did not have a spy who was in a position to
pick up the gossip in the Presidential Palace in Damascus. Israeli
intelligence knew what they were capable of doing but had to guess
as to the Arabs' intentions and what they were actually going to
doand guessed wrong, with nearly disastrous results. The Arabs
were able to mount a massive surprise attack in October 1973 that
nearly overwhelmed Israeli defenses.
Despite these obvious advantages of HUMINT, it is clear dial
technical intelligence is here to stay, and this is why it is now possible to speak about spinning off some of those capabilities into the
private sector. It is too expensive, time consuming, and in many
cases illegal for businesses to be running strings of human agents
or, for that matter, electronic and signal intelligence projects on
their opponents.
Finding a human being who actually knows valuable secrets
usually costs more than the secret is worth.
But technical intelligence is not only about intercepting messages; it is also about managing the vast array of information that is
now available in electronic form. Photography and radio, with the
ability to preserve images and the ability to transmit those images at
great distances, changed the entire structure of reality. With the
advent of these two technologies, it was possible to see what was
happening as it was happening, to hear what people were saying
without being there in person. More important, perhaps, it was possible to preserve the events in perpetuity. Still, this did not always
clearly tell us what had happened. The mere fact that the Kennedy
assassination had been photographed did not reveal the truth of
40
THB
INTELLIGENCE
EDGE
37
THE
INTELLIOENCE
EDGE
39
meant that if the material was saved into a database, all of it could
be searched and accessed in minutes. Vast databases such as LEXISNEXIS, Dow Jones, FT Profile, and Dialog sprang up. All they did
was provide containers for the electronic information dial was a byproduct of typesetting technology. They provided large computers,
databases to hold die data and permit queries to be made, and
modems so users could call in. Suddenly, the world of intelligence
was transformed.
The printing press created public domain; the computer
made public domain accessible. The huge volume of information
existing in what constitutes the public domain is contained in newspapers, scholarly journals, corporate annual reports, and television
and radio program transcripts. The problem is not the availability
of the information, it is finding it. Visit the Library of Congress in
Washington, D.C., or any other great archival library and try to find
something. The catalogs are now, thankfully, computerized, rendering the old card catalog system obsolete. They tell you about the
author, title, and the subjects under which the book is classified. But
even computerized catalogs don't tell you anything about what the
book contains.
Any knowledge worth having has some time and cost constraints imposed on it. Having access to material that will take two
years and $100,000 to find is the same as not having access. Intelligence agencies had a choice of mounting an intelligence operation
that had a 70 percent chance of finding the information in two
weeks at a cost of $50,000, or searching through a library that may
or may not have the material, which probably could not be found
hi under a year widi costs that could double or triple the cost of the
intelligence operation. It is no Surprise that the CIA and MI-6 chose
espionage over library research. It was more cost effective.
But the computerization of typesetting created a new and radically different reality. As with most of the computer revolution, its
origins were in the space program. Spacecraft needed computers
onboard to control the complex systems needed to carry out missions. The computers in use during the early 1960s were vast mainframes, many still driven by the vacuum tubes that had powered the
early ENIACS and UNIVACS. Obviously, these could not be taken
40
THE
INTELLIGENCE
EDGE
aboard spacecraft. NASA (National Aeronautics and Space Administration) needed to create an extremely small yet powerful computer. The solution was found in the microchip.
This deliberate creation of computers had another side effect.
During the 1960s, NASA and its military counterparts came to the
conclusion that they were falling behind the knowledge curve, that
they were not accessing all the material needed to keep abreast of
developments in the various scientific and engineering disciplines
needed to create spacecraft. The Advanced Systems Division of the
Lockheed Missile and Space Company, as it was known then, in
Sunnyvale, California (later to be known as Silicon Valley), grappled with this problem starting in the mid-1960s.
The solution they proposed was a radical idea: create a database that would contain data on articles published in all scientific
and engineering journals. Scientists working at Lockheed and in
the space community would be able to call in queries using key
words. Titles and abstracts would be searched and a bibliography of
relevant articles would be generated. There were many problems to
be overcome, ranging from data storage to the time it took early
computers to search databases to user interfaces and so on. But in
due course a database was created. In 1974, on the heels of the computerization of the printing industry, a new service was offered to
the public by Lockheed: Dialog Information Services.
Dialog was a dramatic breakthrough in the way information
was managed. For the first time, it was possible to skim articlesor
at least parts of themin order to locate items that might be of
interest. This meant scientists could locate needed information
more efficiently than ever before, with less risk of missing something critical. For the first time, the limits of the paper world were
overcome electronically. Not insignificantly, the breakthrough
came in a place noted for its secret "black" projects, including technical intelligence projects for the CIA and NSALockheed's Sunnyvale, California, facility. Dialog created a new capability, but it
was, at least initially, focused on a limited literaturescientific.
In the mid-1960s, a company named Data Corporation, based
in Dayton, Ohio, was doing quick turnaround contract work for
Wright-Patterson and Rome Air Force bases. By the late 1960s, it was
41
42
THE
INTELLIGENCE
EDGE
changed, as did the precision with which information could be targeted and retrieved.
Mead Data Central became a rnultibillion-dollar company and
was sold to Reed Elsevier in 1994 for about $1.5 billion. By then, an
entire industry of on-line databases had sprung up. Both Dialog
sold to Knight-Ridder in 1988 for $335 millionand LEXIS-NEXIS
had turned from creating their own databases to reselling databases
created by others. Other resellers had grown up, and database companies were swarming everywhere.
What we have seen in the past generation is both an explosion
in the extent and accessibility of the public domain. The geography
of business intelligence, as well as other types of intelligence, has
shifted dramatically as the focus of the intelligence world has also
been transformed from intelligence collection to management. For
the first time, a systematic and cost-effective approach to business
intelligence has become possible. Now the first search yields
enough for decision makers to make most decisions. Much more
important, the decrease in the time needed for information gathering, and the growing efficiencies of information management,
have increased the time available for understanding the material,
for hunting down the missing pieces, and for analysis, which is, after
all, the entire point of the intelligence process.
The Book of Genesis tells us the story of Joseph, who has been given
the gift of foretelling the future. This gift gets him into alotof trouble; his brothers sell him to a band of wandering Arabs as a reward
for being right too often. However, the gift also saves his neck, by
making him invaluable to his masters. How valuable was he? In the
first instance of commodity manipulation in recorded history,
Joseph corners the grain market for Pharaoh by interpreting one of
his dreams:
Behold, there come seven years of great plenty throughout all the land of Egypt. And there shall arise after them
seven years of famine Now therefore, let Pharaoh look
out a man discreet and wise and set him over the land of
Egypt. ...And let them gather all the food of these good
years that come and lay up corn under the hand of
Pharaoh for food in the cities and let them keep it. And
the food shall be for a store to the land against the seven
years of famineAnd he gathered up all the food of the
seven years which were in the land of Egypt and laid up
the food in the citiesAnd all countries came unto
Egypt to Joseph to buy com; because the famine was sore
in all the earth.
44
THE
INTELLIGENCE
EDGE
45
THE G E O G R A P H Y
OF
INFORMATION
Intelligence is always a matter of space and time: Where can information be found and how long will it take to find it? In the particular case of business intelligence, there is a third variable: money.
Every step of the business intelligence process is defined by these
three things. The ultimate luxury would be to find what you need
instandy, on top of your desk, for free. Life rarely makes it so easy.
More often, information takes a long time to find, especially if it's
on the other side of the world, costing so much that it is just not
worth going after. The core problem of business intelligence is to
develop the knowledge and skill to find information quickly and
easily, for as little money as possible.
Businesses and other organizations emit information. Often
the emission is intentional and planned; sometimes it is simply the
uncontrollable by-product of other activities; sometimes it is accidental. Each emission has a trajectory, originating in certain places,
traveling in a certain way, arriving in a certain form. Sometimes it
dissipates and disappears. Sometimes the information congeals, say
into a magazine article, and finds a permanent home in libraries.
Information has a life cycle. It may take a particular form early in its
existence, and over time, change form and location. Information
that is first emitted as gossip may become a confidential internal
46
THE
INTELLIGENCE
EDGE
47
INFORMATION ZONES
48
THE
INTELLIGENCE
EDGE
PROPRIETARY
AND
SECRET
49
50
THE
INTELLIGENCE
EDGE
a copy of some of his work. In reading his reports, and some other
material you may have, you suddenly realize in what area a competitor of yours is doing research and development. The life cycle
of every bit of information is unique. Some exist in different
domains simultaneously, while some exist in only one. Some are
permanent, others ephemeral, passing away with surprising rapidity. But all exist in one of these domains, and mastering them is vital
to doing business intelligence. And of all the skills of mastery, none
is more important than speed, since time really is money in business
intelligence.
THE
KNOWLEDGE C U R V E
51
3Z
THE
INTELLIGENCE
EDGE
TOTAL EXPENDITURES
53
MAXIMUM
RETURN
MINIMUM
REACTION TIME
54
THE
INTELLIGENCE
EDGE
CONCLUSION: B U Y I N G TIME,
CONTROLLING SPACE
The knowledge curve is, obviously, highly stylized. Its primary purpose is to call attention to the peculiarity of intelligence. It is less
about information than about time. In the end, almost anything
important becomes known. But the end can come after a business
has buckled from a catastrophe. The purpose of a national intelligence agency is to provide intelligence that can be acted onwhat
is called actionable intelligence. In a world where an intelligence
failure can cause almost limitless and catastrophic damage, cost is
no object. So, if you were looking at the CIA's knowledge curve, it
would lack the vertical line. It is no accident, therefore, that the
CIA's budget runs into the tens of billions. The earliest point on the
curve must be the access point.
For businesses, where the primary mission is making money,
the vertical line is critical. It represents the limits of effort. It is obviously easier to assert these limits than to calculate them ahead of
time. In later chapters we will discuss techniques of costing intelligence operations. Estimating reaction time is no easy matter either.
But the knowledge curve is the point on which business intelligence
must be fixated. The goal must be to spend enough to get hold of
information while it is still useful without spending so much that
the project's value is destroyed.
When looking at the knowledge curve, you can begin to
understand more clearly why business intelligence is possible today
in a way that wasn't possible even ten years ago. Imagine that Zone
1electronic informationdidn't exist. The steep slope after startup would not exist. Information accumulated in this zone would
have to be back-loaded into other zonespaper, gossip, gray, and
proprietary. Without the efficiencies of the electronic medium, the
curve would slump down and to the right. In most cases, the entire
curve would wind up below the reaction line and to the right of the
55
utting It Together
PUTTING IT TOGETHER
The Practice of Business Intelligence
The foundations of intelligence are discipline and an imposed honesty. An intelligence collector or analyst who lies, particularly to
himself, may as well not begin the process. Two of the deadliest lies
consist of hope and confidence. This is an odd thing to say, since a
positive attitude has always been regarded as one of the keys to success in business. But, in intelligence, as opposed to business in general, a positive attitude is dangerous. Optimism tends to skew your
judgment. The businessman or intelligence specialist doing the
intelligence work always wants to report positive, hopeful things. No
one wants to walk into a meeting and announce that he has just discovered that a new technology by a competing company has
destroyed a project his own company has been working on for two
years. Yet this is precisely the sort of news the intelligence specialist
all too often must report.
As a member of the team, you begin with shared enthusiasm
for a project. It is the intelligence specialist's job to lose his enthusiasm first, to doubtto be right when no one wants him to be
right, even when the careers of others are at stake. Pessimism is a
much harder discipline to maintain than optimism, especially in a
business environment. Yet few things have helped companies more
than doses of truthful pessimism at strategic moments.
Another mortal sin of the intelligence specialist is self-confidence, which can be akin to self-destructiveness. The ultimate discipline is to question your own doubts; to constantly ask if your facts
56
57
are sufficient, if there are any facts available that you haven't collected that would blow your analysis apart, if your analysis itself is
correct, and if your recommendations are on target. If you are
going with the consensus, you must question if you are doing it for
the sake of being one of the crowd. If you are going against the consensus, you must wonder whether you are taking that stand to be
ornery or to show off. And having taken a position, you must wonder continually whether it was the right oneand continue to collect information and evaluate it even after filing your report.
Ultimately, like an auditor about to file a troubling report, the
intelligence specialist has to have courage. Most of us, under pressure, are unpredictable. Accountants range from being Rambo to
being wimpsand sometimes we won't know which until the chips
are down. But when the chips are down, the accountant can fall
back on an accounting process that has enough precision in it to be
looked at and evaluated dispassionatelyit squeezes out hope and
misplaced self-confidence. The process even substitutes for
courage. Right or wrong, the process gives the practitioner something to hold on to. It disciplines, guides, and ultimately controls
him. Therefore, to be successful, we need a process to encourage
the ability to be appropriately negative.
Unlike accounting practices that have evolved over centuries,
business intelligence, as a formal discipline, is in its infancy. Therefore, the world of business intelligence will not have a body of rules
like those that support a lawyer or accountant. At this point, however, we can provide a fairly clearly denned, step-by-step approach
that can guide the intelligence processand that can serve as a
reality check. The intelligence process is not intended to be a straitjacket. Nothing is ever as neat as a flowchart would lead you to
believe. But it is intended to help clarify the processand to move
us from the theory to the practice of business intelligence.
This chart could have been complicated ad infinitum, and by
the time we finish, it will be more complicated. For now, we provide
a fairly simple schematic of the process (see page 58), and describe
a case we worked on showing how it fits into this process: the case
of the magnetic water treatment deviceour first example of a
complete business intelligence project.
58
THE
INTELLIGENCE
EDGE
BEFINE
THE
MISSION
IDENTIFY THE
KNOWLEDGE
BASE
ACQUIRE
INFORMATION
SELECT
THE
METHOD
OVEHLAV ON
KNOWLEDGE
BASE
RET ASK
THE
SYSTEM
ARCHIVE
AND
DATABASE
A client came to us who had put money into a company that manufactured and sold magnetic water treatment systems designed to
reduce the buildup of calcium scale. The company was having problems and he wanted to know if there was any point in putting more
money into it or if he should just cut his losses and run. He understood that this was an intelligence problem, because he felt that
he just didn't know enough about the deal to make an intelligent
judgment.
i'putting It Together
59
60
THE
I N T E 1_ l_ I G E N C E
EDGE
to touch are usually not worth touching. At first glance this seemed
a case where an investor, not himself a specialist in the field, had
taken a plunge and lost. It happens.
We went to the meeting in a suitable frame of mindskeptical. More than anything, this was a last-gasp meeting: Was there anything to be done before he pulled the plug? In such cases there is a
temptation to keep up the investor's hope; after all, hopeful
investors write checks to intelligence companies while hopeless
ones do not. This is a temptation we try not to indulge. To skew an
analysis in order to make money would not only sully our reputation, and the industry's, but in the long run will cost more money
than it earns. But let us not fool ourselves that these thoughts do
not cross our minds; the important thing is to realize their danger.
Always open an intelligence operation in a neutral to negative
frame of mind. It's marketing's job to lead the cheers, net
yeurs.
Our client was enthusiastic enough for both of us. This was fortunate, as we only had to sell our skills and not the value of the project. The conversation turned to the core issue: validation. This
product had the reputation of being fraudulent partiy because of
the involvement of a string of scam artists. To determine whether or
not to put more money into it, or write it off to experience, our
client needed to go back to reexamine the foundations of the business. That was our job: to gather the information he needed to
make his decision and to support his decision making with our
analysis. His initial investment hadn't been enormous. But if he
could produce and sell this product, the calcium buildup problem
he'd be solving would be sufficiently widespread to provide impressive multiplesand lots of money. And so we began our process.
Step 1: Defining the Mission
It was time to get down to work, and all work begins with clearly
defining what exactly we were going to be doing about the magnetic treatment of water. Most intelligence operations suffer from
Putting It Together
61
62
THE
INTELLIGENCE
EDGE
he's really after. Like the poorly trained dog, he keeps fetching
everything but the master's slipper. In the end, he is held responsible for the intelligence failures when in fact the real responsibility
lies with the CEO for not communicating honestly with his intelligence manageror worse, not trusting him. Basic rule; If you don't
trust the guy running your intelligence operation, why is he still
working for you? Keeping your intelligence people in the dark
makes as much sense as keeping your lawyer and accountant in
the dark.
Never accept an intelligence task where your client or bass
won't or can't let you into tha inner circleunless you really
need the job.
Define the mission and define your intelligence needs according to that mission. What was our client asking us to do? Well, he
knew the product workedit had been tested over and over again
and it did what it was supposed to do. He knew a lot of people could
save a lot of money using the product, but he also knew that hardly
anyone would buy the product.
The mission: Explain why people wouldn't buy the product
and what could be done about it.
The first part was easy. The problem was no one was buying the
product because the company had no hard proof that it worked,
only assertions. The industry was filled with sleazy hustlers who had
developed a reputation for making fabulous claims that never
panned out. The issue, therefore, was how do you prove that this
product works?
Our mission definition looked like this:
MISSION
1. Locate a pattern for validating technologies similar to
magnetic water treatment.
2. Determine what, if any, serious scientific work had
been done in the area of magnetic water treatment
that could be drawn on for validation.
jtting It Together
63
3. Determine if there was actually any interest in a product like this if validation were achieved.
4. Estimate the cost of validation and the probability of
successful validation.
In short, we were going back to the drawing boardto what ought
to have been done in the first placeto see if the project could be
quick-started.
At this point it was a knowledge problem. The investor didn't
know things: Mainly, he didn't know how to get validation. He
didn't know how much, if any, scientific information backed him up
or even if there was any real interest in the product, save his own
intuition and impressions. And he had no idea of the sort of costs
involved. What he needed was information. For example, if he
knew which scientists were involved in the field, he might he able to
cut a deal with them and make them his research and development
team. But first, he needed them identified. Intelligence comes in
early in the process, defining the parameters. It then hands off to
others.
This was, therefore, an intelligence project focused on technology. Our job was to find out about the science behind the
process: What science had been done and who had done it? Also,
we were to determine how scientific research in this field could be
used to reverse the bad image of magnetic treatment of water,
thereby convincing people that buying our client's product was a
good idea. What we were doing wasn't quite science and it wasn't
quite marketing; it was a littie of both.
^
64
THE
INTELLIGENCE
EDGE
jtting It Together
65
66
THE
INTELLIGENCE
EDGE
Splitting It Together
67
p how expensive will this be, what is the potential payoff, and how
probable is it that the payoff will occur?
68
THE
NTELUIGENCC
EDGE
utting It Together
69
THE
70
INTELLIGENCE
EDGE
fixed the time, and the initial investment in the intelligence work at
about $30,000, we would be in contact with the client as the operation was carried out, giving him the option of whether to invest
additional money for additional information.
Step 4: Targeting the Zone
utting It Together
71
72
THE
NTEL
G E N C E
EDGE
and the court-martial documents were available for the poor guy
who lost his ship because of it. Either way, a foray into the first two
zones was going to be the next step, followed by Zones 3 and 4, if
Zones 1 and 2 justified it.
Always do the simpler work first. It frequently saves you
having to do the hard work.
If we found conclusive scientific proof that the process not
only doesn't work, but that it can never work because it violates the
laws of nature and nature's God, well, we probably wouldn't have to
worry about the validation problem.
Step 5: Acquire the Information
Since we are going to devote most of the rest of this book to
detailed advice on acquiring information, we don't need to go into
it too much here, except as it affects our own little operation. First,
of course, we took a careful look at tbe material we had in hand. It
contained a few interesting articlesall of which contained footnotes. Those footnotes, in turn, yielded other articles from which
we figured we might be able to learn some things. It was an important start.
The most important thing in these articles, however, was not
facts or bibliography but language. Every field and subfield has its
own language. The first task in any operation is to master the languageparticularly the buzzwords that are used over and over
again. In this case, terms like rare earth magnets, flux fields, pressure
gradients all occurred and reoccurred. These were absolute gems for
us, but not because they, by themselves, yielded anything intellectuallyat least not at this stage. The value here was that they gave
us keywords to use in database searches. There were three places in
which we began our search, all in the electronic domain:
When in Rome, order in Italian. Every field has its basic
vocabulary that you'll quickly locate because of sheer
repetition. Those five or ten buzz words are your signposts.
(Putting It Together
73
74
THE
INTELLIGENCE
EDGE
lilting It Together
75
On the chart on page 58, retasking the system appears only once.
This is because we were getting tired of drawing loops. Retasking is
a regular process that repeats itself as often as needed. When you
have completed one set of assignments, you stop and evaluate what
you have, creating a new information inventory. At this point, ours
looks like this:
76
THE
INTELLIGENCE
EDGE
Findings
1. Research had been going on for fifty years.
2. Research centers were in the United States, Russia,
Israel, and Japan.
3. Lab results were uniformly promising.
4. Field tests with the navy and coast guard were generally
a failure.
Question
Putting It Together
77
78
THE
INTELLIGENCE
EDGE
The person at the other end will try to please you, first because it
breaks up a boring day, and second because he wants you to go away
and making you happy is the best way to achieve this.
On the whole, midlevel officials are more likely than not to be
helpful if you let them know that you are not a crank, if you
are polite, and if you behave as if you expect them to help you.
Make it clear that you're not going away.
We finally found the right official. He was in charge of bilge
water for the navy. No joke. We couldn't make this up.
He knew everything there was to know about the navy's
experience with magnets to treat calcification in water containers.
He was the navy's institutional memory on thisand the coast
guard's as well. They had clamped all sorts of magnets on pipes,
but they had no effect. He mentioned several studies, most of which
we had. He offered to send us some others. He was a delight to
speak to and most helpful. We were polite and genuinely interested
in his job.
He also told us that he wished the damned things would
work, as the navy has all sorts of problems with calcification, and
it costs a fortune to prevent it and repair the damage. But he
also said that the navy was not going to fund any more research
and development on the subject, and that the coast guard trials
were the last as far as he was concerned. He said that from here
on out, the navy would rely on private industry's validation of any
new technology. He named several trade and professional associations with national reflations that conduct tests on new concepts.
He told us that if one of those oversaw the tests, and the tests came
back positive, they would give the product another try. But he said
that he couldn't believe the successful studies we cited for him,
since they had tried these magnets over and over and they never
worked.
Second, we went to our literature and located the leading
researchers in the area. Deciding that our client probably would
not fund a trip to Japanand figuring the Japanese wouldn't talk
to us anywayand that we really didn't want a trip to Siberia, where
'Putting ll Together
79
We now had a final report, that could have looked like this:
FINDINGS
80
THE
INTELLIGENCE
EDGE
t
(Putting It Together
81
1. The only protection is to create and dominate a market before anyone notices.
2. Be prepared with full and substantial financing before
beginning.
3. Protect yourself against R&D/T&E failure, then blitz
on success.
Now, we could have handed in this one page and let it go at
that. But clients don't like to pay five figures for one page. So we
padded it out with really nice tables and charts, built an appendix,
went down to Office Depot and bought an attractive coverbut
this was ihe basic report. Either be prepared to blitz this with a lot
of financing in hand, or figure that you'll get eaten alive by a big
company who'll wait until you complete the research and development, see how the market develops, and if they like what they see,
beat you to it. It is important to remember that mondis of intelligence work can sometimes boil down to just a single word, "yes."
82
THE
INTELLIGENCE
EDGE
Pputting It Together
83
CONCLUSION
In taking you through the intelligence cycle and the story of the
magnetic water treatment, we wanted to pause and give you an
overview of the intelligence project. This is, of course, a particular
and idiosyncratic project. But that is the nature of every intelligence
project. We found that we could not think up one that was both useful and generic. There is a generic process, but not a generic project. Every business intelligence project is idiosyncratic.
That is why the process itself is so important. The process,
which obviously is not meant to be followed slavishly, is designed to
provide a method that can be used as a general template. And it is
designed to focus attention on some of the issues and trade-offs of
the intelligence process. Now we will examine various types of information and how to find them.
And what happened to the product? Our client understood
clearly what we were saving and bailed out. What we had said was
that there was real potential and lots of riskand that if you were
going to be in for a penny you had to be in for a pound. He decided
that he would rather put in pounds somewhere else, and he did.
We regarded this as successful work. More often than not, successful intelligence provides the decision maker with information
that dissuades him from doing something that he is not really comfortable with. We had shown him the extent of the needed commitment, he evaluated his interests and resources and decided not
to go. Our success lay in showing him what the total cost would look
like before he took the plunge. In many business ventures, the total
cost emerges only over the course of time, frequendy wrecking not
only the project but the finances of the principals. One of the
things intelligence does is save you from mission creep, the nasty
process in which a small hobby turns into a man-eating bear. Intelligence work is frequently more defense than offense. That's good
enough for us. And the check cleared.
[Find Yourself
FIND Y O U R S E L F
Tapping Internal Resources
The information explosion has left companies with a crisis of confidence. Companies of all sizes are aware of the enormous amount
of information available, and are terrified of making the wrong
decision because they missed an important fact. In a sense, this crisis of confidence was inevitable. The growing availability of information caught most businesses unaware. It was as if the sky had
suddenly starting raining information, but there were no buckets to
be found. Obviously, a three-man team with a makeshift bucket
would grab more money than a hundred men without a clue as to
what a bucket was.
The first reaction of many businesses was a stopgap measure
hiring consultants. When the Berlin Wall came tumbling down,
opening up the former Warsaw Pact countries to democracy and
Western investment, major multinationals immediately went seeking information about new and exciting opportunities. Most of
them used major consulting firms in the belief that they had more
intelligence and more insights. In many cases this proved not to be
the case; in fact, the consulting firms were busy hiring former KGB
officers or journalists to provide them with knowledge, much of it
out of date. There was also a plethora of conferences, but few of
them offered anything new. In the end, businesses would have to
develop bigger and better buckets of their own so that the information flowing into a company could be captured and stored. And
84
85
86
THE
INTELLIGENCE
EDGE
Find Yourself
87
88
THE
INTELLIGENCE
EDGE
package for another group. All he cares about is his girl and body
piercing. The vice president managing the deal doesn't know the
mail clerk, and if he did, it wouldn't occur to him to ask the boy
how his girlfriend is doing. So here we have a critical piece of information in the hands of a company employee who hasn't the slightest idea that it's important, and an executive who badly needs to
know this fact but is not in a position to issue an urgent plea to all
employees for information. First, this is a secret bid and asking
would mean blowing confidentiality, and second, he would be deluged with information and wouldn't be able to extract what was
important from the mess.
This is, in a sense, a classic problem of intelligence. The information is in the hands of a company employee, but light years away
from the decision maker.
Problem 2: The important information can be lost in the diffusion of
gossip.
Here is the paradox. Gossip is an extremely efficient method
for gathering information but an extremely inefficient way to distribute it. Gossip basically represents the diffusion of information in
a nearly undifferentiated soup. The mail clerk's conversation mentioned the late-night mission in accounts receivable, gossip about
some friends breaking up, night classes at the local community college, and a report of an upcoming concert by Night Crawlers. And
this is only one conversation of many in a day. A tremendous
amount of information is transferred with very little overhead.
The inefficiency cuts in during the diffusion process. As you
would expect, what is extracted depends on the interests of the discussant. Of the list above, the only thing the mail clerk cares about
is the inability of his girlfriend to go and pierce body parts that
night. So when the gossip is passed on from the mail room, the
most important news, from the company standpoint, is lost, filtered
out by the mail clerk's indifference. In the end, the low-overhead
collection process becomes a near total loss to the company.
The problem is not in collecting information, but in organizing and controlling it once it comes into the company. Consider
some examples:
nd Yourself
89
90
THE
INTELLIGENCE
EDGE
I Yourself
91
As a result, information comes into the company and dissifpates. Now, there is no perfect solution to this problem. Ideally,
f there would be a magic box into which everything known to everyone in a company would flowwith no additional cost to the company. Questions could be asked of the magic box and an answer
would be provided. But the perfect magic box is not going to be
created. The probability of the mail-room clerk having an important bit of information in a year is minimal, so die cost of debriefing him would probably outweigh the benefits produced and would
cripple the mail room. Nevertheless, the magic box idea is useful as
a tool for defining the problem and posing some less-than-perfect
solutions. The focus of such a system is not on collection but on
retention and distribution. This is the heart of the business intelligence problem, just as it is the heart of the national intelligence
problem. Critical information is either not recognized as important
or not transmitted to people who could act on it.
Consider one of the most famous examples. There were officials in Washington who had clear indication that the Japanese were
going to attack the United States. These were not the highestranking officials, but relatively minor intelligence officers. First,
they had trouble convincing themselves that the information was
valid. Then they had the devil of a time getting the attention of
senior officials in Washington. Then these senior officials were
unable to transmit sufficiently clear orders to Pearl Harbor. The
internal communication system, from receptors to decision makers
to key outposts, was simply not geared for the rapid internal transmission of information.
Focusing on the collection system, spies and satellites and the
other paraphernalia, is worthless unless the information they
gather can be sent to the appropriate points, analyzed, and distributed. Frankly, if we had to choose between tripling the efficiency of
collection or doubling the efficiency of internal dissemination,
we'd easily go with the latter.
In creating efficient intelligence, increases in internal
retention and distribution increase efficiency geometrically:
Increases in collection increase efficiency arithmetically.
THE
INTELLIGENCE
EDGE
93
[Find Yourself
BIST1IIUTEI
IHFBRMItTIIN
ACCUMULATED
IHFIIMITIOH
MLIECTES IHF1RMITIOH
All of which is an extremely pretentious way of saying that letting a lot of people look at a litde information is better than having
one person look at a lot of information. The key is in the efficient
distribution of informationeven more than it is on die collection
of information.
Companies naturally accumulate information. The value of
this information is rarely realized because the information realizes
its full value only when it is embedded in other information. The
more information matrices in which it is embedded, the more valuable the information becomes. Most information collected as a byproduct fails to accumulate anywhere in the company. It is collected
by a person who does not know enough to understand its value, and
its life ends there. It rarely diffuses to enough people to maximize
its value.
As a result of this, most companies look for information outside the company, not only for necessary information that is
unavailable in die company but for information in general. Most
companies might accept the premise that the people with the most
substantial knowledge of the business and its needs already work for
the company, but they also believe tiiat internally accumulated
information is so diffused that it cannot be harnessed efficiently.
94
THE
INTELLIGENCE
EDGE
COLLECTION,
INFORMATION,
KNOWLEDGE
We've all seen movies like 2001 and Three Days of the Condor, or TV
shows like "Star Trek." Each featured a magic box. You could ask virtually any question. It knew everything, including what it is that you
meant when you asked a question. For example, on "Star Trek," a
I1 find Yourself
95
That does not mean we have to tolerate the perpetual dissipation of information. Certain computer-based and human-based systems can be instituted to decrease, if not eliminate, the dissipation.
In our example of the mail-room clerk and his girlfriend, it is highly
unlikely that any system can be devised that would make bringing that information to the vice president's attention anything
more than a matter of luck. But creating routines for managing
accumulated data can decrease the amount of luck needed and
increase the probability that the right information can reach the
right person.
96
THE I N T E L L I G E N C E : EDGE
For many, indeed most, of these tasks, we will want to use computers. But before we leap to computers, it is important to think
about the process without computers.
One solution to this problem is to encourage everyone on
your staff to think about the value of things that they've learned and
voluntarily pass the information to those they think might be interested. This is certainly something that should be encouraged. Nor
is it a trivial improvement. Creating an atmosphere that encourages
the identification and dissemination of useful information is an
obvious, simple, and rewarding first step. And if you aren't prepared to do that, you might as well forget the rest.
But there is a problem here. It is difficult to recognize important information from the limited standpoint of any single job, particularly those that are uniquely situated to collect information. You
can encourage it, but given the limited amount of context, you risk
a garbage dump. With the best intentions in the world, people lacking context, who take it upon themselves to bombard others with
information they think is valuable, will quickly overwhelm the system with the trivial and the obvious with litde benefit. Sometimes
when we hire new people in our shop, they get enthusiasdc and
start dragging in articles from die front page of the New York Times
or Newsweek. They just don't have the context. They're cutefor
about a week.
This process needs to be brought under control, and this
begins with identifying people in the company who are likely to be
collecting information on a routine basis and encouraging them
to think more clearly about what they are finding. This also requires context, but to a more limited segment of the workforce, for
whom the time and money spent on creating a powerful contextual
sense about the company is likely to pay off. This is due to their
position in the company and the likelihood that they would remain with the company for an extended period of time, as well as
peculiar personal skills that managers can recognizelike being
gossips.
Sane people, by natire or function, are natural collectors.
Identify them and use them.
Yourself
97
98
THE
INTELLIGENCE
EDGE
I Yourself
99
too
THE
INTELLIGENCE
EDGE
Find Yourself
101
102
THE
INTELLIGENCE
EDGE
ind Yourself
103
means that the customer service rep is a prime information collec[ torand one with potentially enough context and nuance to sort
and distribute the information he collects.
Complaints are critically important intelligence. Just collecting
complaints, however, is obviously not enough. It is most important
not to let these complaints diffuse and get lost once they enter the
company. BA has a system to collect, track, and enter information
in its databasepassenger complaints as well as habits and wishes.
Instead of seeing complaints as a pain to deal with, or an area of failure, BA sees the customers as doing it a favor by reporting any problems they have had. How else are they going to know if they have
unhappy customers? They also try to deal with them efficiently,
responding as quickly as possible.
British Airways developed their own analytic side of the company that objectively evaluates the operations part. This B Team,
called a marketplace performance unit, is totally separate from the
marketing, selling, and operating part of the company. This unit
views BAfrom the perspective of the customer, independently judging and measuring its performance. It was recognized that the operational side of BA-the crew and staff who interact with the
customersneeded feedback on their service. But in the service
business it is hard to get reliable data. Apart from evaluation and
feedback from its B Team, BA gets customer feedback by handing
out survey cards to all their passengers and taking random samples
from diose who have arrived at their destination. This gives a customer an opportunity to comment on his experiences flying with
British Airways. The service director is the one in charge of the
cabin crew, and he and the c.rew use the information from the
filled-out cards to evaluate their strengths and weaknesses in meeting their goals for customer satisfaction.
British Airways uses its various clubs as collectors of information. What the British Airways Executive Club actually amounts to is
a very extensive and useful database. The airline knows where and
when you travel, whether you travel alone or with company, where
you live and work, where you stay when you're away on business or
pleasure, your nationality and passport number, the name and
address of your travel agent, the identity of your secretary, the type
104
THE
INTELLIGENCE
EDGE
of car you like to rent, and an assortment of other pieces of information, some of it useless but much of it relevant to route planning
and customer service. The basic data is, of course, gathered from
Executive Club application forms, which can be updated every time
you make a reservation. From time to time, mailings or conversations with a trained reservations agent will elicit more detailed personal information, such as where you would like to go for a
vacation.
A senior media person in a British company received a friendly
letter from a computer posing as a senior executive of the airline,
noting that he had often traveled in one direction on British Airways on any given trip but seldom in both directions. Was there
something wrong? To give him incentive to use BA for both legs of
any journey, the Executive Club offered him double air miles on his
next round-trip. A few weeks later his secretary received an invitation to join the BA executive travelers' Personal Assistant association. This provided a monthly newsletter detailing changes in
scheduling, a special reservations number, and the opportunity to
win free trips.
The airline's success in establishing and using its database system is all the more remarkable because it has been achieved at
modest cost. BA's chairman was astute when he recognized that the
development of new technologies would give the airlines more
competitive ability in real terms, at less cost, than they ever imagined. Everything is centered around the collection, storage, and
analysis of information to provide better-quality service for their
passengers, thereby ultimately increasing the company's profits.
As the British Airways example shows, data already being
created are often primarily numbers being crunchedand that's
extremely useful. What we are suggesting, however, goes a bit
beyond that. What is being tracked here is knowledge before it gets
loaded into computers, by tracking the traces of such knowledge.
This material can serve as the core of a magic box into which a wide
variety of material can be loaded.
Some of it is immediately usable, such as sales reports to track
the sales of your product in various regions and in various product
lines. But there is other information inside your company that you
ipnd Yourself
105
get regularly, use for certain purposes, and let go. For example,
think about your phone bill. You receive regular itemized records
of all your calls, either as a printout or, at your request, as computerized data. Accounting goes over the bills in order to make sure
that it's coming in within budget, that people aren't calling Tibet
on personal business, and to make certain that your phone company is giving you a good deal. This kind of prepackaged information comes in the door regularly and is available in formats that can
be fed directly into your personal computer (PC).
This is information that is generally computerized to begin
with, so there is little or no overhead cost involved in getting it
loaded up. In most companies, these datasets are used only for their
original purposeaccounting, sales, and such. They are rarely
made accessible to people outside those departments. This means
that while the direct utilization of information does occurand
occurs with a high degree of efficiencythe indirect use of information is neglected. Put a bit differendy: We create information for
a reason. But information can provide knowledge over and above
intentions, if it is made accessible.
Consider a fairly simple and straightforward case. One of the
biggest problems in any company is finding someone who knows
someone. Let's say you have decided to try to sell something to a
new company. Obviously, a cold call is not nearly as good as starting
with someone with whom you already have some sort of relationship. Finding such a contact is a critical part of the sales process.
Assume that no one on the marketing team has ever had any dealings with anyone at that company. In a large economy like the
American or European, this isn't unusual. The next step is to find
someone within your own company who has a contact. Sometimes
this works. Sometimes, particularly in larger companies, asking
around doesn't help.
The problem is the same as in our mail-room clerk/banker
example. Information may be present in a company, written in
someone's Rolodex, embedded in someone's brain. The owner of
the information doesn't know of the need for the information.
There may be somebody over in engineering whose closest friend is
in charge of buying the stuff that the marketing people want to sell.
106
THE
INTELLIGENCE
EDGE
Rnd Yourself
107
108
THE
INTELLIGENCE
EDGE
109
that you are collecting anywayso that it doesn't cost you anythingand from which you can infer other useful facts. The most
important of these facts is always expertise. Tapping into the knowledge base of your company should always be the first step in an
intelligence operation. First, the answer is probably right tfiere. Second, if anybody can find the information you need, it's the one who
already knows an awful lot about the system.
110
THE
INTELLIGENCE
EDGE
QUERYINfi
AND
TASKING
Find Yourself
in
INTERNAL INTELLIGENCE M A N A G E M E N T
112
THE
INTELLIGENCE
EDGE
Find Yourself
113
In 1995, the CIA held a competition. The test: who could gather the
most information on Burundi. The CIA had some of its own people
enter the competition, along with companies from the private sector. The winner, leaving the CIA's own team in the dust, was a private company called Open Source Solutions. OSS, as it's called,
produced, within twenty-four hours, a tremendous amount of information on Burundi, ranging from vital statistics to lists of scholars
who should be read and contacted. The CIA teamdead last in the
competitionbarely produced more material than that contained
in its own, quite useful but widely available, CIA World Factbook.
Apart from what this story tells us about private sector efficiency, the importance of the test was the coming-of-age of what is
called open source intelligence. As we have discussed before, open
source intelligence is material that is not secret informationneither treated as secret by the government nor as proprietary by private businesses. Open source information always dwarfs secret
information. Indeed, much of what is treated as secret by governments can be found in open source material. There are legends
about massive, covert operations that have managed to uncover
vital secretsonly to find that Time magazine had published the
same material six months before.
The advantage enjoyed by Open Source Solutions was diat it
had mastered the emerging electronic domain. The CIA, created in
114
115
116
THE
INTELLIGENCE
EDGE
services. Masses of material were included that the CIA would not
have regarded as directly pertinent but which were of tremendous value to businesses, making these new, open source databases
priceless.
117
O R G A N I Z A T I O N OF E L E C T R O N I C
INFORMATION
The definition of the electronic domain is, of course, that the material is maintained in an electronic format. That generally means
that you need a computer to access the material. The structure of
the electronic world is roughly as shown on page 117.
The electronic domain can be divided into three realms: commercial on-line services, the Internet, and CD-ROMs. In general,
these three have more characteristics in common than differences.
The data is in digital form. That means that in all three cases, the
material is searchable using tools appropriate to each realm. Basically, in mastering the techniques needed for operating in one
realm, you are mastering the techniques needed for all.
There are thousands of on-line services, hundreds of thousands of Internet sites, and countless CD-ROMs available. The fact
is, however, that for 90 percent of the information you are going to
need, a relative handful will suffice. The trick will be to locate the
really useful ones as quickly as possible and to hone your skills for
finding the 10 percent of information that you need that is not
readily available. But basically, you can use this rule of thumb:
About 60 percent of all information you need will be electronically
available, with the best and most predictable sources of information
118
THE
INTELLIGENCE
EDGE
119
120
THE
INTELLIGENCE
EDGE
O R I G I N S OF THE INTERNET
Let's begin with what we are all most familiar: the Internet. How
good is the Internet as an information provider? The answer is it's
OK, on average. But when we say average, we're reminded of the
old statistics joke: A man is lying on the ground, his head is encased
in ice, his feet are on fire. Asked how he's doing, he answers, "on
average, OK." That's the Internet. There is some great stuff out
there. And there is some incredible trash. The amount of time
you're going to spend sorting through the Internet to find what you
need will probably cost you more than going straight to proprietary
databases. The Internet is certainly going to evolve into something
critically important, but it isn't ready to support serious intelligence
needs.
Let's begin by understanding what the Internet consists of. It
originated as a Defense Department project in the early 1980s,
121
123
THE
INTELLIGENCE
EDGE
Build around Digital Equipment's computers, FIDOnet linked individual BBS together. SYSOPs would regularly log onto other BBS
and transfer messages, download new programs, exchange bulletin
board messages, and so on. FIDOnet was followed by other BBS networks, all built around slow1,200 baudmodems and telephone
lines. The result was a delightful anarchy.
At a certain point, the BBS system and the Internet system
merged. The critical moment was the introduction, at the University of Minnesota, of something called a gopherafter the school's
mascot. A gopher was a BBS that could be accessed via the Internet.
Among other things available on the Minnesota gopher was the university library's card catalog, now digitized, and a load of other
interesting stuff. Soon every university was creating gophers, with
on-line books, programs, and everything else. Then McGill University in Montreal, Canada, introduced Archie, which searched
Gopherspace for material you might want. Later, a more powerful
search engine, Veronica, came on line, and soon the University of
Minnesota and every other sane university was considering shutting
down access.
Then came the breakthrough from text to graphics, and from
mainframes back to the old BBS idea of PC-based nodes, or web
sites. By now, commercial vendors had come in to provide connectivity and anyone who had a PC and wanted to build a web site
could. This ability increased after a company called Netscape, with
one of the more bizarre and effective business plans in history, emulated the old SYSOPs and gave away software for building graphical,
PC-based web sites, and software for accessing or "browsing" those
web sites. The net result was the world wide web.
To call the web anarchy understates the matter. The web is a
zoo, and the animals have become the keepers. The key problem is
that no one really has control of what is on the web. In fact, since it
costs very little to get on the web, everyone has his or her own web
site. A complex and extremely worthy company web site has to compete for attention with Cousin Mathilda's shrine to her lost
love. The cheerful anarchy is not nearly as cheerful when you actually need to find something. But there are nuggets there to be
found.
123
Using the web for information gathering requires a browsersoftware for searching the neta search engine, and exquisite
patience. People are putting information on the web. The numberone reason: self-promotion, marketing. A great many businessoriented web sites are little more than digital brochures. The web
has become an extremely low-cost marketing tool. That means that
you need to sort through the hype, the come-on, simple errors, to
find what you are looking for. But the web does have one advantage:
Looking is free, and so is most of the information.
The key to using the web is using the web search engines. Normally, when you click on the search icon from either the Microsoft
or Netscape browser, you'll be brought to a window that allows you
to choose among various search engines.
Netscape offers access to twenty-one search engines, as well as
an add at the top of the page. These search engines are what allow
you to look for the information you need. All of them search by
matching the terms you select with the terms used in the sites that
are contained in the database. This can lead to some hilarious
results. Inputting Sahara in search of information on a desert can
c
OflwrSenlrtt:
bdascpk
Lyres
EJrlte
YJim;
=i Tfe Beclric l.fttar. SHARBWARF-COM
LxkStiurl
HolBol
ti
e&a Faar^l
ffihaWlierf?
GtT SaacrPagcs
WriCzawfer
OpenTtM Intel
Accufind
IQOliolWi* Silts
BigBagk
OWVILLAGI:
Afctrti
SenicM
WHOWHERE'
DIRECTORY Find,
Connect,
Communicate with
People and
Companies
Wortdwide
Copyright 199fi Netscape Communications Corp. Used with permission. All Rights Reserved.
This electronic file or page may not be reprinted or copied without the express written permission of Netscape.
124
THE
INTELLIGENCE
EDGE
lead to locating the web site of the Sahara Strip Club and Harry
Sahara's personal web page showing pictures of his pet lizard.
That's the weakness of search enginesthey're stupid. All they
know is the term you've selected, which they see as a string of Os and
Is. All they can do is locate identical Os and Is. Every search engine
is working to overcome this difficulty, and each does it in a somewhat different way. Search engines change so quickly that some of
this will be outdated by the time you read the book. You can find a
list of search engines, and our evaluations of them, in the appendix.
The best way to master the net and the various search engines
is by actually searching for something. Let's assume that you are
someone interested in getting involved in the pager business and
need some information on the technical aspects of pagers-just
what they do. How would you go about finding information on
the net?
The first step is to select the search engine. Let's begin with a
general search engine, like Infoseek.
When we asked Infoseek to search for information on
"pagers," what we got is shown on page 125. The first two were ads
for free pagersclearly companies hawking pager contracts. Then
there came two Motorola Bravoplus free pager offers. Then a free
pager marketing opportunity, and so on. As you can see, we didn't
find what we wanted here. Now, there were many more pages we
could look at, and buried among the come-ons there might well
have been information on pager technology useful to us in making
a decision on investment. But finding that would require a tremendous amount of time.
Notice that Infoseek, like most search engines, ranks sites by
what's called "relevance," which sounds more useful than it is. Infoseek ranks for relevance according to whether the query term is
found near the start of the document or in the tide; how many
times the term appears; and whether the term has a "high weight,"
which means that rare terms like interstitial have a higher weight
when they appear than the term pager. This shows dial relevance
means, on the whole, nothing, but it is the best that programmers
can come up witfi to screen the soup. The highest-ranking documents we found had values of 34 percent, which meant that pager
125
(Bize73K)
ui
^j
was a common word, appearing not all that frequently in the text
which means nothing. Relevance on the net is a case of false
precision.
On the Internet, nothing is more irrelevant than relevance.
126
THE
INTELLIGENCE
EDGE
and not quite as boring as they sound. Basic search engines allow
you to search for key words. Be sure to check the tips given when
using a particular search engine to see if it is case sensitivesome
are, some aren't, and it could make a difference. So, if you were to
input John Kennedy, every site where the terms John and Kennedy
showed up would be listednot very useful since you'd probably
find ads for Bill Kennedy the John cleaner in a non-case-sensitive
engine if you didn't specify. Boolean searches allow you to gain
greater control. You can specify, in the best engines, the distance
from each other that two words have to beso that you are only
interested in John Kennedy when they occur next to each other.
They can specify that you are interested in John Kennedy and Lee
Harvey Oswald, and only those sites containing both names will
appearor you can say that you are not interested in any site containing both names, in which case John Kennedy will only turn up
when Oswald isn't mentioned.
Between merging output and Boolean searches, the metasearch engines are much more powerful tools. What we got when
we input pagers this time is shown below. The first thing that
shows up is for an electronic mosquito repellent! We spent precious
minutes looking at that because...well, you've just got to, right?
And that's one of the real problems on the net. The ratio of inter-
127
wireless (WebCrawler)
_Mail (WsbCrawler)
Motorola m Seutschlan<ivAktrBj-aten i 93? (WebCrawler)
. (WebCrawfer)
Bravo
.14**
Reprinted wiih permission of SavySearch.
128
THE
INTELLIGENCE
EDGE
129
Date
1. 97/02/06
2. 97/02/06
3. 9 7 / 0 2 / 0 6
1. 97/02/05
S. S7/02/05
6. 91/02/05
7. 97/02/04
B. 9 7 / 0 2 / 0 4
9. 97/02/04
10. 97/02/04
11. 97/02/04
12. 37/02/04
13. 37/02/04
11. 97/02/01
15. 97/02/01
16. 9 7 / 0 2 / 0 4
inis*
Set
027
027
027
027
026
026
026
026
026
026
026
026
026
026
026
026
Subject
Newsgroup
Author
Jt
voyager IBrny.ni,
Vo vager Igniv. nr
Voyager Igmv . ni
"Perioua" <da '
"acs" <acspli\ .
twinapetespao
"inea" ^ineEp 1
Peter Nguven
n.Tne,=,Y -' - B^:->
-i-
^~-"----.i
130
THE
INTELLIGENCE
EDGE
131
':
O N - L I N E SERVICES
THE
130
INTELLIGENCE
KftGE
131
'
ON-LINE
SERVICES
132
THE
I N T E L L I G E N C E
EDGE
133
PG HUME
PG NRP1E
PC NOME
PG NBHE
Types
General
News - - Legal NEWS
1 LEGNEU 1
REGMUS 1 LEXPfll 4
TOPHUS 1
Financial
flCCTG 2
CCH1PMV
2
NfiBRS
2
BflNKNG 33
BUSF1N 33
CMPCOM 3
ENEHGV 33
ENTFRT
2
ENU1RN
2
INSUNE 3
MftRKET
1
PEOPLE 2
SPORTS 2
IRftNS
3
Reference
DUKHEF
3
PG NAME
Topics
PG DMArtE
- II nnft. ' I}
ASIflPC
Medical
DSIflPC
GENHED
GENMED 5 CANADA
EPIBftEE 5 DUTCH
MEDLME
MEDLNE 5 EUROPE
GERMflN
P o l i t i c a l P1DEAFR
ftPOLIT 6
MEXICO
CMPGM
6
NSflHER
EXEC
6 UK
LEG IK
& UKCtIRR
WORLD
ftssist:.
GUIDE
TERMS
PHftCT
PG
-7
5
B
7
77
7
7
B
7
5
5
7
8
8
8
-;or further explanation, pi-ess the H key (for HELP> and then the ENTER k e y .
This chart and those on pages 133 and 134 are reprinted with the permission of LLXIS-NFXIS,
a division of Keed Elscvier Inc. LEXIS and NF.XIS are registered trademarks of Reed Elseiier
Pro]>er!ies Inc.
in World, UK, People, and so on. You cannot search all of NEXIS
simultaneously. You must, rather, choose a particular library.
Each library is subdivided into individual files. These files can
be searched individually or collectivelyalthough sometimes some
files are excluded. Assume that we were interested in information
on particular companies. We would go into the Company Library,
which is reproduced on page 133. This gives you a series of options
from which to choose, including everything from bankruptcy
reports to mergers and acquisitions. You can also choose to search
for everything simultaneously.
Let's assume that we were to do a search on our pager problem in NEXIS. We would go, for example, into Alnews and do a general search on pagers. We were informed that over a thousand
articles would be available with the term pager. We therefore narrowed the search a bit to "pager manufacturer," which still gave us
485 stories (see page 134).
Notice the mix of press agency stories and industry media. It
now takes time and patience to sort through these stories, which are
full-text, and find what you are looking for. It is important to understand a little of how this works, because watching a computer sort
through literally millions of individual articles looking for the word
or combination of words you've put in, and then calling up the
story in well under a minute, is a pretty remarkable thingand the
VEXIS Survirr
132
THE
ol
INTELLIGENCE
EDGE
133
.. t j
, ... ...IT- L j.ur.try <r"'i uf>"> to <i->e To -.ee
d p.mti' t i |flih I ibiMi-y, ' vpe il -, P-"t'' nupiJier -tnd ' F^r> prei .
Nfi"i
1 I.J.GNFU
r LFXPflT
1
Pf: Nflhi.
H; wnriL
RHhKNI,
BDSUN
1
1
CMPCOH
LLTSRFF
'3'
i'b HUME
3
j
FNLKliY
LKIFRI
.1
2
PFOPLF
rcJ HftriL
ih^ DNnriF
- .1
GFNMED b
flSIBPC
FC
'!
flFDLNF
LLISOPL
(iFllflfIN
!'.J i .t ;. i ! riDFA}-H
spoLii
OIPCIN
t
K
FXLCLFCUS
6
t,
7
7
7
nm co 5
NsnntR 7
UK
UKCUfiR
IJORI.I)
i c FNJTR tli-- HfifM1 L>| I lie file yrm u.int to s e a j ' c h Ju see a d ^ " < - > - i ,
.1 .1 1 r l ' - r ypf! lUs fJ^ge nutiln'r .nul press rh.- T N I L K k e y .
Fll.Pi
I'HCL 1 of 16 <NFXI t'flliL t o r a d d i t i o n a l f i l e i >
Mflll
I 1 '! I'MiuKlf
Nfihl'
I'G DEECRIP
NftMF
PC, DtKCRIP
S
b
7
1
1
I
I
[
i tun;;
1 1"
Itiinkj'uptc y ft|it .
BUS R i . i H o y o r t s *
US Co Rpts
I n r l Cn Mjjts
naB Retort i
i fire r i im
IKhl'l
1 S t o c k Rr^i
V
I. I !' i: ir I! '/
'< l_Linu=
1 RFC full-Ie.t
1 tdgarPl'i'.
I Si-i- Online
1 Aere*^ IJK.ulo.'.
.i.-ji..,!!.
-2 US P v i u a t e Cos
1 Uis Public Cui
This chart anti those on pages 133 and 134 are reprinted with the permission of LEXIS-NEXIS,
a division of Reed Elsevier Inc. LEXIS and NEXIS are registered trademarks of Reed Elscvier
Properties IDC.
in World, UK, People, and so on. You cannot search all of NEXIS
simultaneously. You must, rather, choose a particular library.
Each library is subdivided into individual files. These files can
be searched individually or collectivelyalthough sometimes some
files are excluded. Assume that we were interested in information
on particular companies. We would go into the Company Library,
which is reproduced on page 133. This gives you a series of options
from which to choose, including everything from bankruptcy
reports to mergers and acquisitions. You can also choose to search
for everything simultaneously.
Let's assume that we were to do a search on our pager problem in NEXIS. We would go, for example, into Alnews and do a general search on pagers. We were informed that over a thousand
articles would be available with the term pager. We therefore narrowed the search a bit to "pager manufacturer," which still gave us
485 stories (see page 134).
Notice the mix of press agency stories and industry media. It
now takes time and patience to sort through these stories, which are
full-text, and find what you are looking for. It is important to understand a little of how this works, because watching a computer sort
through literally millions of individual articles looking for the word
or combination of words you've put in, and then calling up the
story in well under a minute, is a pretty remarkable thingand the
S... ^ K i . ' i i i h -
Sl.l.NUi;
1 Conpani; Nuns
ftLLflBS f, C^jiipari) flh^t
RllSUPf IS Intl Hiri. Opt
n ..I.:
CUILL
16 DC- i j-iplions
Tiles narked
NEXIS Service
134
THE
INTELLIGENCE
EDGE
135
HP
I.
Co input ergram International, January 31, 1997, No. 3990. 107 nurds. BANKS
I I B N D BY BANKRUPT PAGER rlOBILEMEDIB. IflC 06231375
I.
Neusbi'tes, January Ji. 1997, 610 words. MohileMeilia Files For Chapter 11
"rotection 01/31/97, IflC 06231840
I.
f l . j i ' M i r France Fresse, January 38, 1997, Financial pages, 208 words,
ipproues foreign projects worth 57 million dollars, NEW DELHI, Jan 30
India
NBA Loses
NFXTS Servire
found overlap between many of the more recent articles, but found
that LEXIS had a stronger historical base. Dow Jones is a good
choice if your needs are focused on fairly recent materialand it is
substantially cheaper to use than NEXIS-LEXIS.
There are alternatives to LEXIS-NEXIS and Dow Jones that are
powerful and cheaper. Eye Qis a smaller but still powerful on-line
sendee that focuses heavily on business needs. For a fee of $39 a
monthplus $3 per article retrievedEye Q provides a scaleddown version. Eye Q's business menu (shown on page 135) gives
you a sense.
Notice the simplified user interface. While generally desirable,
we find that simpler interfaces frequently gloss over the fact that the
search engine is less powerful or the data contained on-line is less
extensive. Powerful search engines and large, yet focused, libraries
seem to require complex interfaces.
Wben we ran our search on pagers, we found that we did not
get the kind of coverage that we got I'rom NEXIS, although we did
get decent information at a fraction of the price. One strength in
Eye Oj market reports that were not available on NEXIS. We spent
about $125 to $150 looking for pager information. Our results are
shown on page 136.
Among the cheapest sources and an interesting approach to
initial screening is E Library, which is primarily a newspaper and
136
THE
I N T E L L I G E N C E
EDGE
137
w^*"-
'*--
Research
WHAT psjBr
WHEN' This rr and Last ft,
WHEHE Global
paging industry
p**
MLWK
w.
in
2
SLMO 02/18/36
3
DLBJ
11/15/96
4
HOEJ
01/12/36
5 DAL
02/11/96
6 AAS 01/06/96
SLTH
VADT
JPOE
Vitw Selictinnt
Try it now and receive a free 30 day tnal Click here for details
BUSJRL
RINGING UP TEEN SALES CeUaf.
PV5PLRG
Pajei Pal is the latest in gunjfcigei
PAPMED
04/19/96 F*Th4tBeap!TagetheiStayitBn" FAPSML
08/01/96 Inda Pagng
" MAGOTH
09/02/36
idTrs^PJvKtanss nan
PAPSML
" Magazines
Hundreds of fgll-^eKt
Deliver, Srvic
Dictionanr wd
Maps
Hundreds available
. y " --'!'--
11
12
13
4
CTMA 05/16/ffi
AWEK 05/04/96
NWCP 01/1S/97
TBJP,
09/2?/36
lisues.PsgeirrwketitiholdspolenBal
BUSJOU
COMMUNICATIONS- BuWng a Belter
MAGNWS
MakingTheCaiWjthTwo-WavPsgng " 'TRODE
Paoer: Beyond mere beeping
BUSJOU
3
2
5
2
PrJvBte E ye
Conacton Question J
Books
P Pictures
Cloie
View Options:
FULL
UM1
138
THE
INTELLIGENCE
Business
EDGE
marketing/
sales
Company/Industry
ources
Dun S Biaditree:
Onfine
Deniograpftic
Research
Hoover's
Company Si tec I pry
siflii^rrfliEhfieh<ilderwBfl^aDc,V'JDrre.
4 Co. i/rt^rqecledbyihEWelfSbee'Jcrum
The iragKine wil pm ih* bannecf ad BI
TheNewVoikTime
Foruuu
\ Heir ? ^
Wlll-3
Hen
No Problem!
139
CONCLUSION:
REMEMBERING
THE T R I E D A N D TRUE'
In the end, the most extensive and cost-effective sources of information are the vast research libraries that until recently represented the sole information archive of our society. These
librariesand the books and journals they containremain and
will remain the foundation of our society's knowledge base. Paper
remains a powerful storage medium. It is durable and user-friendly.
The great weakness of paper is accessibility, and that is a problem
difficult to overcome.
Electronic sources can be searched by the word. Paper sources
140
THE
INTELLIGENCE
EDGE
cannot. It is impossible to know what is contained in a book or arlicle without reading it. Titles may or may not provide the needed
information. Subject headers hint content, but they are rarely
exhaustive and can even be inaccurate. Even author-prepared
abstracts of articles may not reveal information in which the author
was not interested but in which you might be. That is the crucial
problem with paper. Regardless of how powerful (he cataloging system might be, it only catalogs information about publications and
not the publications themselves.
There are plans to change this. Project Gutenberg is an academic project designed to digitize great books. The Library of Congress has a program under way to digitize its collection. All of these
will ultimately fail. Even today, far more information is being produced on paper than is being produced electronically, and the
transformation of the historical archive into a digital form will outstrip society's resources for a long time to come.
Businesses must, in their passive intelligence, master libraries
the way they are. Fortunately, the cataloging system for books
and periodicals has changed tremendously over the past twenty
EI*
1 O'Sliea, Dan
Paging becomes fl Two-Way Street.
2
Going Global or Staying Closer to Home.
3
(Telephony. 11/2B/
(Communications.
(Communications.
Outlook on the Paging Industry: 1995 Suruey Results
99/B1/
(Lan magazine.
99/81/9
(Communications.
Paging industry Surweji Operators Speak Out.
09/81/9
Internet B Work.
(Communications.
Wireless Forecast.
7
1 a/01/9
. . . 9VB1/9
FflX 1H
(Communications.
Paging Forecast Bright, with Widely Scattered Change..-
18/81/9
141
W O R K I N G THE SYSTEM
Semiactive Intelligence Gathering
143
consisting of a series of networks. In the part we discussed in Chapter 5, the individual works are embedded in systemscatalogs or
databasesthat point to them and describe them. So, a book on
marketing bananas is listed in electronic catalogs under marketing
and bananas and any other appropriate descriptor.
There is also information that is not organized this way. Much
of this is located in networks of information that don't have external pointers, but which mostly point to each other. For example,
specialists in bananas know each otherthe banana world is a small
one. They also know of informationstatistics, studies, specialists
on various subjectsthat is available. They also personally know a
great deal about marketing bananas. There is, however, no database
or card catalog listing their names and addresses. They are well
known to each other, but are almost invisible to outsiders. You cannot access them passively. You actually have to go out and find
them, and that isn't always easy. Yet the payoff, if in nothing else
than printed information, can be spectacular.
To give you a sense of just how vast and even exotic this
domain can be, consider the following examples.
A professor, working under a grant from the National Science Foundation, has created a database displaying the consumption and disposal of car batteries. The database is in the
public domain, since it was created with federal money, but
you need to find out that it exists in the first place in order to
ask to see it. There are thousands of databases like this on
every possible subject in existence. More are coming into
existence every day.
The Qatar Chamber of" Commerce and Industry has produced a computer disk called Commercial and Industrial
Directory, which it distributed at the Middle East Economic
Conference held in Cairo on November 12-14, 1996. The
information is formatted as an Excel file. Over eleven thousand businesses are listed, along with their phone and fax
numbers, addresses, and type of business. You'll find everything from A Lady Tailor to the Subarah Shop for Selling
Old Equipment, all accessible in various ways.
144
THE
INTELLIGENCE
EDGE
145
ducers and packagers of the information are eager to have you use
them and some may actually go to some effort to bring them to the
general public's attention.
There are many types of valuable business information that are not
to be found in even the best libraries and are rarely included in online services. Some kinds of nonarchived, noncataloged material
include:
Promotional material: Not brochures and come-onsalthough it
could include thatthis is a whole range of material whose production was motivated by parochial concerns. For example, let's say
that a developer wants to build a new shopping mall somewhere
and needs to convince the local authorities to permit the development. He creates a substantial study of the area's business environment, including demographic, environmental, and educational
data and other factors. In many cases, the study contains the best
data available on an area, and huge amounts of money have been
spent on it.
Obviously, the developer's motivation in producing the study
was promotionalto justify his own project. His conclusions will
reflect that. However, the data in the study and much of the analysis are both accurate and priceless; a superb window into a potential market. Now, the study has been distributed to town councils,
planning boards, and so on and is fully public, though it probably
has not found its way to the Library of Congress or onto a proprietary database. The developer wasn't motivated to do that and the
Library of Congress does not go hunting for this material. Nevertheless, if you can find out that it exists and find out who still has a
copy, it is probably yours for the asking. Promotional material can
include anything from proposals to planning boards to trade organization publications to brokerage reportsvast amounts of material produced by and about business but not readily available. For
146
147
THE
148
INTELLIGENCE
EDGE
some of this material. The mere Fact that you are in the business
means you are on enough mailing lists so that organizations seek
you out. And the network you've already developed in your industrysuppliers, customers, bankers, friendsfrequently alerts you
to interesting information, or yields up the answers you're looking
for. But equally obviously, the informal methods you currently use
are neither exhaustive nor particularly useful when you go a little
farther afieldlike looking for potential customers in Qatar, suppliers in Florida, or financing in Belgium.
What we are suggesting is a systematic approach to an activity
with which you are fairly familiar. A systematic approach is critical
in order to assure you that you have accumulated the critical mass
of information needed to make a decision. The key to the system
really is to understand it as the opposite side of the natural information accumulation process we discussed in Chapter 4. There, ihe
normal activities of a business gather together large amounts of
wide-ranging information, much of it surprising and unpredictable.
Here the goal is to use the same informal networks as well as other
techniques to seek out, identify, and acquire extremely specific
information.
Specificity is the key to semiactive intelligence that should be
used only after you have a fairly clear idea of what you're looking
for. Sequentially, it must follow a careful review of information
already available in the company, as well as a systematic and aggressive accumulation of information from the organized public
domain. A careful study of this material should be made to determine whether you have already accumulated the information you
need to reach a decision. In many cases, you will find that the cost
and effort of gathering additional information may not be worthwhile.
Whan you have been to all the web sites, downloaded all the
articles, ordered ill the hooks and magazine articlesread
them! It will also help to think about them before you go off
looking for more information.
We have noticed an interesting tendency in our own shop: info
lusta disease that afflicts the industrious. When we begin a proj-
149
ect, we start looking for information. Fair enough. We start gathering information. We look at catalogs, bibliographies, old studies,
our own databases. We start ordering tilings. We keep ordering
things. Things pile up, higher and higher. We order more things.
No one reads anything, theyjust keep finding more stuff. Then they
start calling around looking for more goodies. Finally, they run out
of time. They grab a few of the more likely looking pieces and try to
fake it. The poor souls who do this are suffering from info lust.
Notice, we are not calling it knowledge lustthere is no Faustian
legend here. They don't read the stuff, so they don't get any
smarter. Theyjust need information. We are gentle with these people, especially after the bills start coming in. Usually, warmth,
understanding, and counseling solve the problem. Executions are
not usually carried out until the second offense.
You must, absolutely must, read the material as it comes in, or
at least well before you start your second round of searches. You
must never pick up the phone to call around until after you have
absorbed the surge of passively obtained material. It is not only that
you won't know what you're looking for and might be wasting time,
but it is also directly harmful. Many times you find people who are
pleased to help you the first time you contact them, but they
become downright surly when repeatedly pestered. In many cases,
people are a wasting asset, at least in the short runanother call in
six months may not bother them as much as three calls in two days.
You really need to know what you're looking for before you start
making phone calls. Thus, a pause should take place at the end ol
the passive stagefor reading, thinking, figuring out whedier you
have everything you need, and deciding what it is you don't have.
Let's emphasize this point: The semiactive phase is missionoriented and task-driven. Its job is to fill in the blanks left over from
the passive phase. It is not the place to begin doing research nor is
it the place where the bulk of information is to be found. It is
| knowledge-driven. It should take place only after the information
gathered in the first phase has been transformed into knowledge.
^Otherwise, it is an opportunity for aimless schmoozing. But when
[it's knowledge-based, it's an extremely powerful phase of intelligence work.
We were once doing a study on the telecommunications indus-
TE L U I G E N C C
EDGE
try in the Middle East. Our client was another consulting firm that
was putting together an authoritative guide he hoped to the
region's telecommunications industry for his own clients. He
wanted to know how many satellite dish receivers there were in each
country at the present time. Simple question, not so simple to
answer. We hit all of our databases, but simply couldn't find the
answer. It didn't mean that there wasn't an answer, only that the
easy ways of finding it were not readily accessible.
We searched through our addled brains to find a way to answer
the question. OK, who did we know who knew about the Middle
East? Tons of folks. Who did we know who knew about satellite
dishes? Tons of folks. Who did we know who were members of both
groups? No one. This was turning into one of those killers that
cause our accountant to cry and gnash his teeth.
We had to think carefully. Who would we know in the telecommunications group who might be likely to know someone who knew
about the Middle East? OK, what group of telecommunications specialists was most likely to know people knowledgeable in the Middle
East? Bingo. Members of the U.S. military, people on the staff of
places like the Defense Information Systems Agency or the U.S.
Army's Communications and Electronic Command. Why? Because
the U.S. military spends tons of time in the Middle East. We called
a few and hit pay dirt on our third call. The guy over at the next
desk from the person we were speaking to had spent years handling
telecommunications for troops deploying in the Middle East. Did
he know the numbers? Well, the Defense Department had run a
study on telecommunications resources in the region. No, it wasn't
classified. Sure, he'd be happy to send me a copy. We didn't tell our
client that someone in DOD already had most of the study he was
doing sitting on his desk. It wouldn't have mattered, since his
clients didn't know about the DOD study and probably never
would. We wowed our client. He wowed his clients. Our accountant
smiled a rare event.
PEOPLE:
FROM
151
POINTERS TO SOURCES
One way in which semiactive intelligence is used is by finding people who know of the existence of", and can locate, informally published documents. But in semiactive intelligence we begin to reach
the point at which people themselves start to become valuable.
When dealing with people, we've discovered, we need to increase
the care we take to be systematic and focused. This is tough enough
when dealing with books and articles, all of them chock full of not
particularly useful information. People are even harder. Not only
are they interesting in and of themselves, but they will talk about
what interests them rather than what interests youand you can
sometimes forget what it is that you called about.
At this point in the process, it is very important to return to
some of the basics we discussed in Chapter 3. The process of semiactive intelligence is, of course, unpredictable. Ever}' business, every
body of knowledge has a different geography of information, and
therefore requires very different actions. But the key in every case
is recognizing what is in hand, what remains to be found, and what
the most likely procedure is for finding it. It is absolutely essential
that the Mission Statement and the Information Inventory, now
updated to include information acquired during the passive phase,
be studied and that a new Information Requirements sheet be generated.
Is
As you move into the samiactive and active modes, you are
maving into a much more undifferentiated information soup.
Remain focused or you will find yourself lost faster than you
think. Do not stop to smell the roses.
I
I
I
$,'
152
THE
INTELLIGENCE
EDGE
meant that it was usually one step ahead of creditors. Cash flow was
everything and an interruption of cash flow would be catastrophic,
regardless of legal remedies two years down the road.
MISSION: DETERMINE THE LIKELIHOOD OF DEFAULT
OR STRETCHING OUT OF PAYMENTS
153
154
THE
INTELLIGENCE
EDGE
155
156
THE
INTELLIGENCE
EDGE
157
which our client was involved so that he could personally revive his
finances. He needed a home run and this project was it. Now, in
most cases, this would be a recommendation to avoid involvement,
and had our client been an investor this might well have been our
recommendation. But he was only a contractor looking at a potentially lucrative contract. The paradox was that, in this case, Wildman
Joe's personal financial problems made this a more secure play. He
was using his company's resources to rebuild his personal finances.
He needed this project to work. He was far less likely to play games
with it during the early phases than jn his other projects.
Our recommendation was to go forward with the deal, trading
some long-term benefits for short payment schedules to protect
against the project getting into financial trouble, but expect Wildman Joe to work hard to get the project done. Moreover, he needs
you simply because a lot of other folks are not prepared to do business with him anymore and you are. Our client took our advice, did
the deal, and got what was owed him. Better still, Wildman Joe, a
born-again nice guy after his brush with disaster, throws as much
business to our client as he can handle, since he stuck with him
when no one else would. And he could stick because he had the
information needed to make an informed, rational decision.
This was a case in which information that we obtained passivelycourt recordsallowed us to determine clearly what we
needed to know, and also allowed us to locate individuals who had
the information and knowledge we needed to make a recommendation to our client and for him to make a decision. In many, if not
most, cases, this is true. Formally published, informally published,
and personal knowledge are so intertwined that accessing one part
of the information network will allow you access to all other subnetworkspeople, unpublished papers, and so on.
There are, of course, places where this doesn't work, particularly in areas that are new to you or in which you have allowed your
expertise to atrophy over time. We once had an assignment to produce an ethnic map of Slovakia. This was an intelligence project in
the full sense of the term, requiring us to pull together disparate
information and merge diem together with technology. Our problem: Since this took place right after the collapse of the Soviet
158
THE
INTELLIGENCE
EDGE
159
capture and sift lots of gossip, semiactive forays into gossip collection and into the gray area requires a high degree of clarity. In our
experience, premature entry into this realm can be disastrous.
Without clear grounding in the general area and in the questions
you need answered, you will inevitably run into increased rather
than decreased confusion. At least as important, you can quickly
become a victim of disinformationbeing given answers that, were
you more sophisticated, you would quickly recognize as, in some
sense, false. Without preparation, trading in gossip or semilegitimate data is a nifty way to become a victim.
A step-by-step approach is recommended:
Identify the missing pieces: Study the board. Assess what you have and
what question remains to be answered. Determine how valuable,
how necessary that information is in giving a final recommendation
or making a decision. Decide, beforehand, how much time and
money you would be willing to spend on it.
Identify the, likely location of the information: In one of our examples,
the likeliest location for what we needed was in the heads of lawyers
and clients, to be contacted by phone. In our other example, it was
in the heads of scholars, to be initially located via the Internet. By
the time you have reached the semiactive point in your research,
you should know where to access the needed information. If you
can't, you have more homework to do. This is a good test as to
whether you're ready for transition.
Task-suitabU personnel: You may not want to use your most intelligent
people here; they may, after all, be social asses. So focus on the most
congenial people you have. Indeed, if you are going to do this a lot,
you will want to make sure you have a group of diverse personality
types for each missionor at least people with the ability to act. In
some cases you want mature adults, male or female, to do the querying. In other cases, you want the young and innocent. It varies by
case and context. Remember, you are dealing in gossipa very personal and even intimate social process. If you need information
from the jefe of a Guatemalan village and you figure that he
160
THE
INTELLIGENCE
EDGE
responds best to an implicit sense of danger, don't have a nineteenyear-old woman contact him. On the other hand, if you want information from someone who will respond better if he feels he's doing
someone needy a favor, don't send an ex-cop to ask questions. Gossip is social in the sense that it is designed to elicit information
using socially powerful cues. These cues vary in time and place, and
cannot be subject to political correctness. We are in the real world,
which is inhabited by some very real and powerful stereotypes.
There are still things like pretty girls and tough guys in this realm.
That is the way it isand our apologies to political correctness.
Define means of contact: Today, there is a wide range of mechanisms
for contacting people. We have gone from mail to telephone to fax
to e-mail and to all of the more exotic emerging means. If you are
scoping out things in Silicon Valley, the web is both desirable and
logical. But if you want to contact owners of small clothing stores in
midwestern towns with populations under 25,000, you will probably
want to choose more traditional means. Always bear in mind that as
you move deeper and deeper into the information structure, personal contact becomes more and more important.
CONCLUSION: U N R A V E L I N G THE N E T W O R K
161
162
THE
INTELLIGENCE
EDGE
163
these networks. Rarely, but sometimes, all of die passive and semiactive intelligence won't do the trick. This is usually a time to hang
it up. Sometimes, however, you can't let go. This brings us to the
rarest, but for some perverse reason sexiest, aspect of intelligence:
the active operation.
165
and inferring from them underlying reasons using other information you have obtainedalso legally. If this all sounds a bit cloudy
and you are unclear as to what we are saying, then you are on the
right track, because this area of intelligence is murky and it's never
easy to follow what's going on.
Take some pretty famous examples. During the Cuban Missile
Crisis, reporters noticed limousines coming and going from the
White House. As old hands, they knew this was unusual activity.
From the license plates, they could figure out who was coming and
going. By noticing that the plates belonged to both Defense and
State Department officials, it was clear that a foreign policy crisis
was brewing. It didn't take much to figure out that it concerned
Cuba. The same thing happened during the Gulf War. Reuters
reporter Jacqueline Frank actually wrote a piece entitled "How
Tense Are U.S. War Planners? Just Count the Pizzas." On January
16, 1991, the day before the air campaign began, she noted that on
the previous night, Domino's Pizza had delivered fifty-five pizzas to
the White House between ten P.M. and two A.M. The average White
House order during that time frame was five pizzas. At the Pentagon, just over a hundred pizzas were ordered; at State, seventy-five,
up from one per night. The CIA, using their massive resources to
locate the leak, stopped ordering from Domino's. Frank shrewdly
grasped that the massive increase of pizzas being delivered late at
night meant that the number of people working late had increased.
She also understood that there was probably a reason lor this and
that this reason was probably not associated with a study of the
National Park system.
Now, the fact that there was a Cuban Missile Crisis was a secret,
as was the timing of the beginning of the air war on Iraq. Anyone
tapping phone conversations, reading secret documents, or blackmailing participants would be committing a serious crime. What
was not a crime, in the United States, was observing an uncontrolled emission of informationthe physical, visible presence of
official limos or of Domino's Pizza delivery cars. Those emissions,
placed into context by individuals possessing highly nuanced information from years of covering the White House, generated knowledge of what was going on that was every bit as clear as if the
166
TH
NTE
GE NCE
EDGE
167
168
THE
INTELLIGENCE
EDGE
169
170
THE
INTELLIGENCE
EDGE
Check out the rules for the specific country in which you are
working. Although there are numerous parts of the world where
photographing transportation or industrial facilities is illegal, there
are just as many countries where whatever can be seen in public can
be recorded. Photographic intelligence, while often not very useful,
can be extremely rewarding in specific cases. In countries where
photography is not a problem, it can open the door to any number
of possibilities. Take the following examples:
A critical issue for business and government alike is the trend
in the price of oil. During the early 1980s, a friend was flying
us to Long Island, east of New York City, in his private plane.
While flying from New Jersey to Long Island, we crossed over
the Atlantic approaches to New York harbor. I was startled to
see numerous oil tankers, none showing wakes, clearly
anchored for scores of miles outside New York harbor. I
researched the question and discovered that oil companies
frequently ordered tankers to stand at anchor waiting for
shifts in the spot market. Looking at that line-up outside the
harbor, we realized that the sellers were not entirely happy
with the price they were getting and were hoping to see it
rise. Also, so many tankers were piling up that it was unlikely
that the price would rise. In fact, we were seeing the beginning of the 1980s oil glut- Just looking at what was happening
in New York harbor could not justify my going short on oil
futuresafter all, a temporary breakdown in oft-loading facilities could have been the cause. Today, however, it is possible
to monitor off-loading activity in all of the world's leading
portsYokohama, Rotterdam, Houston, and so on. The end
of the Cold War has made commercial access to satellite
imagery available at surprisingly low prices. For example,
Russian Spin-2 satellite imagery with two-meter resolution
you can see carscosts $300 for a 2km x 2km fragment, supplied on CD-ROM or 8mm tape. The French sell synthetic
aperture radar shots at fine resolution for $1,850 for a 100km
x 100km swathjust right for tracking shipping. A rush
order can be processed in under a week, but costs extra.
171
172
THE
INTELLIGENCE
EDGE
173
174
THE
INTELLIGENCE
EDGE
175
176
THE
INTELLIGENCE
EDGE
was access the gossip domain to see what was being emitted into
that sphere by the new CEO, and we needed a collector in place
who would also serve as a screen over our activitya fancy way of
saying we needed to hear the gossip and the country club was a
great place to listen if we could recruit a member.
Again, we asked our staff: Did anyone know anyone who lived
in that particular town in New Hampshire? Not surprisingly, no one
did. We extended our query to some of our outside professional
supports, whom we frequently used as extended parts of our network. A partner in our accountant's firm came from that town. We
explained to our accountant, under the seal of professional confidentiality, what we were after and why. We made it clear that we
were not seeking anything illegal or even vaguely unethical. All we
wanted was information that was already public, if unpublished, in
that town. We made it clear to him that we did not want to be connected with the query in any way, but we did want to know what the
word was in that country club about our man's intentions. We
wanted no confidentialities violated, no secrets stolen. We merely
wanted a report back on what was being said publicly.
Our accountant agreed to serve as go-betweenhe liked
being our accountant and this was a service that would enhance his
value to us. Alsoand this is importantthere is a mystique in
covert intelligence gathering that excites the Walter Mitty in many
people. It is something that can be taken advantage of. Anyway, he
spoke to his partner, explaining what was needed. We had asked
him not to tell his partner about us, but this was a fairly empty
request. First, his partner could probably infer which of their clients
being handled by our accountant would make such a weird request.
Second, our accountant's loyalty to his own firm probably transcended his loyalty to us.
As soon as you tell someone that something is a secret, their
brains go into overdrive trying, to figure out what the secret is.
In going to our accountant, we were making a conscious decision to accept a calculated risk of leak. Face it: Every time you take
a matter to another human being, you run the risk of some degree
177
of betrayal, intended or otherwise. This is one of the great disadvantages of human intelligence. It is far easier to control security
breeches during technical intelligence projects than in human
intelligence. The very thing that gives human intelligence its
strengthcontext and nuancealso allows agents to see and
understand far more than you want them to or hope they do. It also
makes them unpredictable. Would our accountant tell his partner
who we were? Would the accountant guess? Would he guess who
our client was? Would he tell his wife? Would she tell her mother?
Would her mother tell his mother, who still lived in that town.
Would unexpected friendships or loyalties compromise our operation? Would he let all this slip unintentionallyor for personal
profit?
This was the hard part. We most emphatically did not want this
guy to know that we were investigating him. We were afraid of two
leaks. First, that anyone we approached in the club would tell him
what we were up to. Second, we were afraid that a leak would occur
during the course of our investigation, while questions were being
asked. We needed to proceed with maximum stealth. It was a risk we
hatedbut hadto take. At each stepthe query to our accountant, his query to his partner, and the partner's search for access to
country club gossipthe risk of leak and exposure grew.
The fewer the links, the more likely the operations will be
traced back to you. The more links, the more likely a leak will
occur somewhere.
In sensitive human intelligence matters, therefore, it is imperative to keep the number of links to the actual agent to a minimum
consistent with the need to shield yourself. One main reason is
security. The agent, the person actually gathering the information,
obviously must know what he's after. As with all collection systems,
context and nuance are essential. Transmitting that context to die
collector means transmitting it through each and every link. This
increases die knowledge embedded in the pipeline and increases
the damage caused by a leak. Thus, on the whole, the fewer links
the better.
178
THE
INTELLIGENCE
EDGE
179
180
THE
INTELLIGENCE
EDGE
181
The fat was now in the fire. But it was in the fire in such a way
that we probably weren't going to get splattered. There was no reason for the accountant's partner's friend to feel used, nothing to be
ashamed of, nothing illegal or unethical involved. The old friend
said that he would ask around. The accountant asked that the matter not be traced to him because he did not want to appear to be
stalking or harassing the guyplausible, reasonable, and surely
something a friend could do for an old friend. They talked about
family, reminisced, and swore that they had to get together soon.
We had our agent in the country club.
Now things were no longer in our control. This was not an
agent who could be controlled by us. We had to rely on him to actually ask around, ask the right questions, ask the questions with delicacy, understand the answers, and communicate them back to his
friend, our accountant's partner. But we had enough cutoffs
breaks between ourselves and die agentthat we had traded
minimal control for maximum distance. Fair trade, under the circumstances.
The old friend started to ask around. He had heard gossip but
had not paid much attention. In the information soup of the country club, this was not a matter of interest to him before. Out golfing
one Friday afternoon, he asked a golf partner if he knew the CEO
and if he knew what his plans were. His golf buddy said that he
didn't know him but he would ask around. No big deal. That night
at dinner, he asked another friend if he knew the story. He did. He
had heard that the CEO was extremely unhappy about having to
leave his job, because he felt he had a shot at becoming the CEO
therea much bigger company in his own area of interestbut
pressure from his wife and her family forced him to take the job.
But, he said, that was a few months ago, he might have adjusted to
the new situation. He'd ask around. His wife, hearing this, said that
she knew his sister well. She was going shopping with her next week
and would let him know what she found out.
Our agent now had two subagents without any direct knowledge working on the case, and a subagent with knowledge. One
subagent never panned out. He asked someone who didn't know
anything and gave up. The friend's wife asked the CEO's sister and
182
THE
INTELLIGENCE
EDGE
hit pay dirt. His dinner companion asked three people, two of
whom had information.
All of this came back to our agen t as follows: One person said
the CEO was pretty happy with his new position while two other
sources, including his sister, said that he was desperately unhappy.
The agent, without consulting us, dropped out the odd story and
gave us only the unnuanced tale: The CEO was unhappy, primarily
because the finances were a shambles and he was afraid that his reputation was going to go down with the company. He wanted out.
This came from the agent, through the accounting partner,
our accountant, to us, to our client. And it turned out that part of
it was true and part false. The CEO wanted out because he was
ambitious. But the finances of the company were not in shambles.
He was simply unhappy with his position and trying to build himself
up by bad-mouthing his father-in-law's managerial skills. But we had
our report.
[',
s"
'
|;
jj'
183
'. The key to active intelligence is the clear identification of the infor| mation being sought and a rigorous definition of where that inforI mation is likely to be found. In our operation, we knew what we
*' wanted to know and identified a location where that information
was to be found. With that clearly in hand, we figured out a way to
get someone into position to hear what we needed to hear. Once we
Heard what we needed to know, we terminated the project.
184
THE
INTELLIGENCE
EDGE
This can often be the most important rule to follow, the most
important part of the operation. Open-ended active collection
operations can get very expensive and very hairy. In this operation
we were very careful to "stay on the sidewalk." By this we mean that
the sidewalk is public property. If, while walking down the street,
you pick up something on the ground or see something taking
place, even on private property, you are still clearly within the law.
Staying on the sidewalk means staying within the public domain.
Widely circulating gossip is within the public domain. Finding out
what was being said in a social circle is perfectly legal, even if it
was rigorously planned and carefully targeted. And it can be cost
effective, precisely because it ended when we found out what we
needed.
Long-term, unending operations, in our experience, have a
nasty and frequently unintended consequence of going off the sidewalkinto private property. Let's say that you want to find out more
about what a competitor is doing. A neat way of doing this is to have
someone answer one of his help-wanted ads. Initial interviews can
be very revealing. You're OK since they are publicly broadcast, and
hopefully the interviewee is not being asked to sign confidentiality
agreements, but is openly stating that he's happy where he is but
wants to hear more about what this company is doing. But let's
assume that he's called for another interview or that he's offered a
job. You're on a slippery slope filled with temptationto mix
metaphors. You now have the opportunity to plant an agent directly
in the belly of the beastthe monster competing with you. Is there
any situation that would justify this?
It might help to remember a famous case in the world of investigative reporting. Two "Prime Time Live" producers applied for
and accepted jobs with Food Lion, a food-handling company, on
the basis of false employment records and references, then proceeded to tape and film the inside workings of the company using
hidden cameras and microphones. What did they get? A good story.
What did it cost them? When discovered, they were sued for fraud,
trespass, and breach of loyalty for their falsification of records to
obtain the jobs. Note: They were not sued for libel, so the information they obtained was probably accurate. Maybe their case wasn't
185
long term or unending, but it was certainly off the sidewalk. The
jury awarded Food Lion $5.5 million.
What are you going to get from using these methods? Your fantasy is drat you '11 get everything, but that's not likely, any more than
someone working for you is likely to get "everything" about you. Are
you going to get more than if you have someone hang out at the
coffeehouse where your competitor's employees go? Could the
"Prime Time Live" producers have accumulated the desired information any other way? Maybe not, but was it enough to justify the
cost and the risk? Well, if you are as vague as most people are about
what they are after, almost anything can be justified. But if you are
If as focused and specific as you need to be, then you'll probably realize that the risk isn't worth it.
Focus and specificity can save you from the worst thing in intelligence work: the unlikely outcome. Even with the best security you
can never tell how something will leak, how some extremely
unlikely coincidence will blow up in your face. We cherish the story
of one of our friends who lived in a small town in Pennsylvania, A
respectable fellow in most ways, he did have a lover. Once, on a business trip to Los Angeles, he arranged to take her along. He followed
security procedures in every way. She traveled on a different day on
a different airline. He checked into the hotel room only under his
name and she never answered the phone. Thousands of miles from
I home, they were anonymous, secure, safe. They went walking down
1 the street in Century City, hand in hand, very much in love. Sitting
I' on a bench, ten feet away from them, was his minister's wife, attends ing a convention for minister's wives in Century City. What were the
I odds of that happening? In our experience, too darn high.
Ongoing intelligence operations are going to blow up in your
face. Count on it. In a world governed by Murphy's Lawwhere
anything that can go wrong will go wrongextended and interminable intelligence operations are accidents waiting to happen.
The longer they go on, the more likely they'll go wrong. The
broader they are, the more likely they'll bump into something. You
I may think you don't care if people find out that you are spooking
around, but you do. By being known as a spook, people will throw
I up barriers to your most routine, passive, and semiactive questions.
186
THE
INTELLIGENCE
EDGE
Denied easy access to the public domain, you will find that, in the
long run, you will know less than you did before and at much
higher prices. Promiscuous active intelligence just doesn't pay. And
that goes triple for illegal active intelligencealso known as
espionage.
LUCKY GUESSES
The Art of Analysis
188
THE
N T E Ll_ I G E N C E
EDGE
an academic study, a search for truth that will withstand the test of
the ages. The sole purpose of business analysis is to provide the specific customer in the specific company what he needs in order to
make decisions. Please notice that we said "needs" rather than
wants. That is and always will be the crisis of the intelligence analystas it is the crisis of the doctor, lawyer, or accountant. What the
customer needs is not always what he wants. But an intelligence analyst who doesn't have the confidence of his customer is useless, and
the one who wins that confidence by giving his boss only what he
wants to hear is equally useless.
The intelligence analyst is only as good as his customer: This
is where the ultimate responsibility rests. Unfortunately, as
lawyers hnow only too well, it is easier for the customer to
blame the analyst than himself. And that, as we say, is life.
Every businessman is also an analyst. One of his jobs is trying
to figure out what is going to happen next, and to position his company to take advantage of it. So one of the first decisions in creating
an intelligence system is to define the manager's role in the overall
process. In a small business, where the entrepreneur is already acting as CEO and janitor, he or she will continue in the role of analysthopefully with some new insights about that role and die
process of collecting intelligence. But in larger companies, even
though it is prudent to minimize the cost of intelligence by dualtasking collection with normal business functions, separating analysis from operations remains an important thing to consider. We have
already touched on some of the reasons for such a separation, as
well as some of the arguments against it. In order to go into the question in more depth, we need to think about what is involved in analysis and then consider the necessary functions and skills of an analyst.
THE A R T A N D C R A F T OF A N A L Y S I S
Lucky Guesses
189
190
THE
INTELLIGENCE
EDGE
ing every bit of information provided to him. Indeed, ii'he did have
time to study every bit of information coming into his cockpit, he
would undoubtedly have a superior situational awareness. But trying to do so would paralyze him, making it impossible for him to fly
and fight his aircraft. So he has become increasingly dependent on
systems that analyze the information for him, fusing it into a single,
comprehensible, real-time situational awareness. The push for virtual reality in the cockpit is an attempt to force computerized analysis to its limits, creating an automated analogue of reality, which
fuses all incoming information into one useful, if not fully true, picture of what is happening out there.
Effective decision making requires that situational awareness
be effortless. Achieving an effortless sense of reality takes a
lot of work.
The fighter pilot requires someone or something else to do his
analysis for him, since the decision point passes well before he can
absorb the material. Left to his own devices, the pilot is too far
behind the knowledge curve.
What has happened in the cockpit, we would argue, is also
happening in the executive suiteif not in quite as dramatic a fashion. The time needed to fuse information into a knowledge of the
situational awareness is expanding dramatically. Obviously, business
executives would be substantially better off if this were not the case.
The optimal situation is always one in which the decision maker is
intimately familiar with every morsel of information before acting
on it. However, what is optimal is not always possible, both in the
head office and in the cockpit.
Just as the pilot needs tools to fuse information into a comprehensive situational awareness, so does the businessman, who, in
a sense, lives in a much more complex, less orderly, and unpredictable environment. The variables that are matters of life and
death for the pilot are fairly well defined, more predictable, and
mosdy physical. While engaging a MiG fighter, it is unlikely that he
will be seriously effected by Japan's new import regulations.
The businessman, however, can be affected by virtually any-
Lucky Guesses
191
THE
ANALYST
192
THE
INTELLIGENCE
EDGE
Lucky Guesses
193
194
THE
INTELLIGENCE
EDGE
what others think of him. This allows him to stand free of trends. It
also frees him from the need to be an iconoclastallowing him to
go with the trend when that seems reasonable to him. Honesty and
courage are the critical elements, along with deep-seated ambition.
There are many businessmen whose driving ambition is to be average, to do as well as everyone else. They would rather be wrong than
alone. The real intelligence analyst is different: He has to be indifferent to whether he is alone or in good company. He has to be
more obsessed with whether he is right than widi whether his boss
likes him.
Intelligence analysts are strange people. You may invite them
to the office party, hut it is doubtful that you want one
marrying your brother or sister.
Intellectually, the intelligence analyst is caught in a two-dimensional struggle. On one hand, situational awareness requires that he
be a generalist; on the other hand, mastering specifics requires that
he master narrow areas of expertise as well. That is one dimension
of the struggle. The other is a struggle between the discipline of
believing only what he knows to be true and the need to be intuitive, or guessing successfully at the parts he doesn't or can't know.
The intelligence analyst's mind must be synthetic: It is an artifact
that the analyst has to craft for himself, as if he were crafting any
other tool of the trade. It is also synthetic because its task is to synthesize, to pull together all the diverse strands that constitute the
situation.
The best analysts we know try very hard to be stupid and sirnpleminded. Sophisticated, well-connected people are bad analysts
because, being well connected, they start to think like the people
around them. Bright and sophisticated people believe they know a
great deal: They are intimately connected with highly placed
friends, they go to meetings, get invited to give talks. They are in the
know, so to speak. They know what Henry Kissinger and Alan
Greenspan are saying at cocktail parties. They attend conferences at
the Harvard Business School. They speak with partners at Goldman
Sachs. They even speak with people at Microsoft. They are the best
and the brightest.
Lucky Guesses
195
196
THE
INTELLIGENCE
EDGE
power of the Arab world and with basic assumptions about the ecology to reach a basic consensus: We were entering an epoch of permanent oil shortage. It was agreed that with demand growing,
spaceship earth (they really talked that way) had a fixed amount of
crude oil available. Therefore, the price of oil would continue to
rise indefinitely. Indeed, the argument went, this applied not only
to oil but to all sorts of primary commodities like food and ores.
The age of expansionary industrial economies was over.
It followed, therefore, diat investment in an industrial plant
put you on the short end of the stick. People producing cars were
at the mercy of people producing oil. It made sense to put your
money into extractive industry and farmland, and avoid investing in
industrial infrastructure. Since most undeveloped raw materials
were to be found in the third world, it made more sense to invest in
die third world than to invest in advanced industrial countries.
An analyst who uses the phrase "as everybody knows" aught
ta look for a new career, probably in the food-service industry
as a party planner.
So, during the 1970s, huge amounts of money were invested in
Mexican, Nigerian, and Indonesian oil and other commodities,
while the Arabs seemed about to gobble up die West's industries. If
you wanted to build a plant in the United States, you went to Riyadh
or Dubai.
The problem was that the consensus was wrong in a fundamental way. The assumption was that we had discovered all the oil
there was to discover. With the price of crude soaring, the world
went crazy hunting for oil. And they found it. By the early 1980s, the
price of oil, and of all other commodities, was plunging. Oil-tanker
owners and third-world refineries built on the assumption that oil
would be selling for over $40 a barrel and up to $100 a barrel went
bankrupt as the price of oil plunged. And third-world governments,
which had borrowed huge amounts on the assumption that the
loans would be paid back from oil and other mineral revenues,
defaulted on billions of dollars' worth of loans. People who bought
Iowa farmland in the 1970s were bankrupt in 1985.
Lucky Guesses
197
198
THE
INTELLIGENCE
EDGE
METHODS OF A N A L Y S I S
Lucky Guesses
199
200
THE
INTELLIGENCE
EDGE
Lucky Guesses
201
202
THE
INTELLIGENCE
EDGE
Lucky Guesses
203
The analyst can never be certain that he has all the information available. By definition, it is impossible to know what you
don't know. And since what you don't know could very well
kill you, the analyst is always inclined to continue the search
for more information, always afraid that the next report will
contain information invalidating everything. Putting off
reporting out of fear of surprise is an occupational hazard.
The analyst is caught up in a continual interplay between
information gatherers and decision makers. Decision makers want
answers and they want correct answers. The analyst in turn puts
pressure on gatherers to collect more and better information. The
point at which the analyst has all the information he can reasonably
expect to collect arrives long before he has gathered all the information that it was cost effective to gather. But how can the analyst
know that he has reached this point?
We have a simple, if not always reliable, rule of thumb. Most
research refers to other research and almost all business information refers to other business information. We reach a point in our
work where we are familiar with all the references being made. The
bibliography in an article refers to other articles we've already read.
Most experts refer to other expertsexperts we contact refer us to
experts we already talked to. Reaching this point seems to happen
quite suddenly: One day we realize we have exhausted the accessible information.
It does not mean that there isn't anything else to know, nor
that this material might not be useful. But it does mean that the
common network of discourse has been exhausted. From here on
out, we are in no-man's-land, where even the experts with whom
we've been dealing haven't gone. There may be some important
information that hasn't been networked into the publications and
expertise of people, but it is unlikely. This is the analyst's decision
point: Move ahead, or let it slide. There is no science to this point
it is the art of analysis.
Part of the problem here is the extent to which an analyst will
rely on expertise. Do the experts in a field really know what is going
on in that field? A distinction must be made here between expertise
204
THE
INTELLIGENCE
EDGE
Lucky Guesses
205
be impossible or absurd, let's consider a group of intelligence analysts who already do this on a daily basis: financial analysts predicting which stocks will go up or down.
FINANCIAL. A N A L Y S T S A S
INTELLIGENCE A N A L Y S T S
206
THE
INTELLIGENCE
EDGE
meet as many people as possible, and also meet the company's competitors. The besl analysts will also want to visit at least some of the
company's operations or factories to make an assessment of their
efficiency. Herein lies the danger. The financial analyst has to make
sure he is not suborned by a new breed of flack, known as the investment relations consultant. The job of this person is to put a favorable spin on a corporation's financials, to try and ensure that the
analyst only meets the "right" people, and to keep the share price
as high as possible.
Investor relations managers tend to have generous expense
accounts. They are at their most active in Wall Street and in the
financial capitals of Europe, and they spend considerable energy
and charm in courting the analysts. This is the financial analyst's
equivalent of the sophisticated, well-connected source. Both those
close to the decision makers and the investor relations manager
types have a definite personal interest in presenting the best picture
about their organization or country.
Financial analysts are both role models and sources. But
beware. Contrary to their self-image, they are still human
and fall in love with their own advice.
The lesson here for those gathering business intelligence
about subsidiary companies or overseas operations that are secretive about their activities is to look at analyst's reports on their
major business partners, especially if these partners are based
in Europe or the United States, where analysts are most active
and where reporting requirements from the share markets are
rigorous.
In any attempt to project the future, the key question that must be
asked is: What will determine the future? Answering that question
will, in turn, determine what information will be required to get
a sense of the future. We can divide the factors determining
Lucky Guesses
207
208
THE
INTELLIGENCE
EDGE
plans in existence for at least the coming year, and probably more,
for new openings. So, at first glance, an analyst would decide that
this project is dependent on personal inclinations and focus on
penetrating the planning cell, which may or may not be possible.
If you look at the matter a little more carefully, however, you
can see that there are two types of impersonal forces at work. First,
while planners have the power to select, the selections are clearly
going to be made not arbitrarily but by some predefined criteria.
Now, you can try to steal the document that contains those criteria,
or you can reverse engineer the document. You know where the
giants have opened stores in the past and you have an awful lot of
statistics available on those locations. You can take a look at where
they have gone and deduce ihe criteria they must be looking at.
Then it is a matter of looking at your own market and seeing if it fits
those criteria. This isn't foolproof, and, obviously, you cannot
absolutely predict the future, but past performance is a pretty good
indicator in this case.
There is a second set of impersonal categories you might look
at. The giants have been expanding heavily. This fact alone does not
mean that they will continue to expand at the same rate. Thev
might become more or less aggressive. To a very large extent, this
will not depend on them. More precisely, all businesses live in a
world of constraints, and they make decisions within the context of
those constraints. What does the company's balance sheet look like?
Expansion requires borrowing. How much more can they borrow?
They've had a massive expansion. Is their management holding up
or are they having problems? What does die retail book environment look like? Are computer games, the Internet, and other things
cutting into the market, ruining some of the projections they were
operating under? Are they going to be able to carry out any more
expansions?
In other words, an analyst, trying to figure out what all of the
information means, can go after the intentions or the capabilities of
the subject. This is the oldest dilemma in intelligence analysis and
one that will never be solved. If you focus on capabilities, you find
out what the other side can do, not what they will do. If you focus
on intentions, you are focusing on what they would like to do, not
Lucky Guesses
209
what they can do. Obviously, the answer is to focus on both. Still,
even in this simple case, you can get tripped up. Here are some
possibilities:
The giant's management is ignorant of its own limitations
and overexpands. Yes, they wind up in Chapter XI eighteen
months from now, but not before they expand into your market, wrecking your bookstore. The argument to focus on
capabilities assumes that your subject reads his capabilities
the same way you do. This is, then, a case where management's personal defect meant that they would be misreading
constraints and acting in a less than optimal fashion.
The giant's management has concluded that rather than
putting all their eggs in one basket, they would rein in their
bookstore expansion and diversify in sushi bars. This is a personal decision based on impersonal analysis. However, the
analyst's own impersonal analysis wasn't extended to include
the entire universe of optionsit never occurred to him to
study the relative rate of return on investments in bookstores
versus sushi bars. The bookstore closed and no giant bookstore ever showed up. We have here a case where personal
information controlled the area of impersonal knowledge
that had to be mastered.
The giant has generated more accurate data than the analyst
has available and is aware of that fact. The analyst's data
shows that the community is unsuited for a giant bookstore.
However, the data the analyst is working from is drawn from
a census area that is defined too narrowly. With better data
showing that shopping patterns in the region justify a much
broader geography, they have decided to move into the
region. So this is a case where the best available data, defined
by the depth of the business's pockets, simply isn't good
enough.
The giant has been growing at a rate of 20 percent increases
in square footage for three years. Everyone inside and outside die company expects that to continue indefinitely. The
210
THE
INTELLIGENCE
EDGE
Lucky Guesses
211
212
THE
INTELLIGENCE
EDGE
their own minds and can't predict what they themselves will do,
(c) the best-laid plans of mice and men..., and (d) some people are
idiotseven CEOs of major companies.
For all these reasons and more, we are major advocates of
impersonal studies of capabilities. While never definitive, they tell
us more about what people can do than about the fantasies in
which people indulge. And diey give us a sense of the limitations
that are imposed on people by reality.
In the end, it comes down to this. If having lunch with a CEO
would tell you what his company's stock is going to do, we'd all be
rich. CEOs themselves don't know what is going to happen to dieir
stock or even their industry. If they did, none of them would ever
be fired. Since they don't know, talking to them is useful only if they
are treated as indicatorsfrequently as contrarians.
Analysis is the art of the probable: What will probably happen
and when will it happen? It is not a game of certainties. Neither
being a CEO's best friend nor spotting a pattern repeating itself for
the eighty-third time in history guarantees that, on the eightyfourth time, you will be able to figure out what you are doing. The
very best you can achieve is something the trade calls the weight of
evidence. When everything is laid side by side, every fact is culled,
and you've sent out for all the information you need and have gotten it, the best you can do is take a walk, weigh everything, see
where most of the evidence lies, and trymore often than notto
be right. If you can be right, at least more often than others, you will
have done your business a great service and justified your existence
and salary.
CONCLUSION
Lucky Guesses
213
Taking Cover
215
T A K I N G COVER
Counterintelligence
These activities have resulted in losses to IBM in the billions. Settlement agreements, jtidicial mandates, and
commitments to third parties preclude us from discussing the specifics of many of these cases, which
include the theft of personal computer-related technologies, theft of trade secrets critical to our mainframe systems, theft of information by governments for their own
use and by their indigenous hardware and software suppliers, and counterfeiting of our trademark on hardware
and software.
One of the most critical IBM proprietary elements
of our PC technology is software known as the Basic
Input/Output System, or BIOS. The BIOS controls key
output operations, such as interactions between the computer and diskette drives, fixed disk drives and the keyboard. This copyrighted software has been deliberately
and repetitively misappropriated by many domestic and
foreign companies seeking to manufacture inexpensive
copiesor clonesof the IBM PC.
Confirmation that Russia has been one of the countries stealing proprietary information came in testimony to the same committee from Stanislav Levchenko, a former KGB intelligence officer
from Moscow whose previous jobs included planting forgeries of
foreign government documents. He said that far from the end of
the Cold War meaning the end of espionage, there was a new target: American industrial corporations:
The remnants of the secret police are still there [F]or
decades political intelligence was the number one priority. Now high-tech intelligence and economic intelligence
is the most important priority of die headquarters and of
the residences abroad. The economic situation of Russia
216
THE
I N T E L L I G E N C E
EDGE
ness.
Bavernments remain the first threat to your information.
Former governments are the second.
Nor, as Microsoft's Dr. Nathan Myhrvold reminded us, is die
issue only "about super computers for Uncle Sam, or paranoid
management information systems personnel at a bank."
It goes far beyond the issue of foreign economic espionage. Instead it ultimately is about every PC. It is about
doctors protecting the confidentiality of medical records
that they store in computers radier than on paper. It is
about preparing tax forms on a home computer and then
transmitting them electronically to the IRSwithout fear
Taking Cover
217
218
THE
INTELLIGENCE
EDGE
nesses. Consider this: A highly centralized intelligence agency, controlled by a government, is going to focus on matters of the highest
national priority. Now, even if that no longer means focusing on
plans for weapons systems, it does mean focusing on technologies
critically important to the nation as a whole in its international competition. The United States and France are locked in a bitter competition in the passenger aircraft industry. That means that French
and American intelligence, tasked with supporting their respective
aircraft industries, will focus their attention there. Relatively little
will be left over for the countless other secrets in the countless
other industries.
National economic espionage will therefore focus on big-ticket
items, simply because that is the only cost-effective way to operate,
and because the political and bureaucratic realities dictate that sort
of approach. At this time, therefore, the focus of industrial espionage, from the state level, is on the top of the pyramid, and people operating in less salient, less exposed industries are safe from
the concerted and effective intentions of professional espionage
organizations. But they should not feel comforted by this.
The intelligence industry, worldwide, is experiencing a massive downturn. Two factors have come together to create a massive
economic crisis and layoffs. One is the general tendency to downsize governments worldwide. The other is that the end of the Cold
War and growing peace in the Middle East have thrown countless
sophisticated, top-of-the-line spooks out on the streets. Former KGB
agents, agents formerly employed by Eastern European Communist
states, now frequently outcasts at home; retired Israeli military and
foreign intelligence officials; CIA and DIA agents taking early
retirement or being RIFed (reduction in force), have created an
army of unemployed spooks. All of them have one thing to sell
their expertise.
And in most cases, their expertise is not in the modern areas
of passive intelligence in the electronic domain but in the older,
Cold War crafts of breaking and entering, wiretapping, tailing,
videotaping, and so on. Indeed, those who specialized in computer
espionage, information management and analysis, and such are the
ones most likely to remain employed. They are needed far more
Taking Cover
219
than those with older skills. So, since 1991, the world has had
hordes of nasties released on it. And all of them are looking
for work.
If a Ukrainian national conn* ta you with a deal and he speaks
perfect English, and his resume* says that he worked for the
Soviet Ministry of Agriculture as agricultural attache in Cairn,
you cauld do worse than pass on the deal. A lot worse.
We were involved in a couple of cases recently pointing in this
direction. In one, a Ukrainian national approached a client looking
to purchase some technology. It turned out that he was less interested in purchasing it than in stealing it. In another, similar case,
some Hungarians were looking to sell some chemicals in the West.
It turned out that they were dealing on die come: If they got an
order, they'd then go out and steal it. In both cases, we were clearly
dealing with former spooks, out of a job, trying to husde a living for
diemselves in the New World Order.
In many, if not most, cases these people live on the edgeor
over the edgeof the law. They work with and frequendy become
part of organized crime. In a sense, they are not nearly as dangerous as they appear, simply because their approach is not particularly
subtle; they have become thieves and extortionists more than intelligence agents. The threat here is less industrial espionage than the
increasing threat of organized crime on a global basis. The downsizing of intelligence services coupled with massive social instability
in the former Communist world has generated an entirely new,
increasingly global organized crime system. Less integrated into the
culture of international business than the old Italian Mafia has
become, they pose real, physical danger. But it is simple criminality
more than espionage.
The average businessman rarely faces a threat from a national
intelligence agency, and most mobsters are less interested in stealing intellectual property than in making you an offer you can't
refuse. The real threat that most businessmen face comes from the
same forces that have given them, in our opinion, their tremendous
intelligence opportunity. Digitization of information has allowed
220
TM
INTELLIGENCE
EDGE
SECURITY
A N D SECRECY
Taking Cover
221
tomer of another division; one division might be undertaking a project identical to one another division undertookwith disastrous
results.
Secrecy protects information by limiting information's mobility. Sometimes it's simply confined to use by a few people. In other,
more extreme cases, it's broken up, compartmentalized, as the jargon would have it. In compartmentalization, the information itself
is broken up into pieces so that even those with access don't get to
see the whole. These moves work. They decrease die chance that
anyone outside die company will find out what is going on inside.
Secrecy also increases the probability that people inside the company don't find out what's going on.
Secrecy and security are cosdy. The major cost is inefficiency.
Duplicated effort, insufficiendy exploited capabilities, and lack of
synergy in carefully compartmentalized projects dramatically
increase costs for businesses. Part of the cost is the sheer expense of
physical security systems, from those on computers to those on
doors. Part of the expense is timetime spent accessing information. And part of die expense is the cost of failing to squeeze the last
ounce of utility out of a piece of information. The classic example
of all of fhis was the old Soviet Union. It had superb security yet
collapsed into inefficiency. The right hand didn't know what
the left hand was doing, because they weren't cleared to see the
information. The United States leaked like a sieve. Yet connections
were made between bits of information that generated entire
industriesprecisely because the information was not compartmentalized.
Secrecy and security carry with them another danger. When
information is held tightly, that means that fewer people know
what's going on. It also, therefore, means that those fewer people
are in a much more powerful position both within that organization
and in being able to betray the organization. By concentrating
information at certain pointsnot necessarily at the top of the
pyramid, with the chairman or even the CEO, but at the top of the
functional pyramid, in the hands of those individuals controlling
operationssecrecy increases the cost of security failures.
The digitization of information increases the possibility of
222
THE
INTELLIGENCE
EDGE
Taking Cover
223
state of Lower Saxony. At fifty-nine, Lopez could have been contemplating a peaceful and lucrative retirement. Instead, as the
breakfast ended, he was handed a contract. According to The European newspaper, there was a blank space left for Lopez to enter his
own salary.
Within days, Lopez and three GM colleagues were established
in Wolfsburg with the mission to plan a new VW assembly plant
codenamed "B" in the Spanish Basque country. The plant was to be
die embodiment of the principles Lopez had followed at GM. Autos
were to be slotted together like a child's Lego set from prepackaged
modules rather than from hundreds of small components. The
workers engaged to slot these modules together would be supplied
from outside contractors at lower rates than those normally paid to
employees on an assembly line. The concept was remarkably similar to GM's aborted Project X.
Three months later, GM began a legal action against Lopez
alleging industrial espionage, its Opel unit in Germany claiming
that Lopez and the members of his team who had defected with
him had carried away crates of secret information that was copied
and entered into VW computers. So serious were the charges that
the German government began its own investigation, which led,
three years later, on December 13, 1996, to Lopez being formally
indicted. Charged along with him for industrial espionage, in a fiftyeight-page indictment, were colleagues Jorge Alvarez, Jose Manuel
Gutierrez, and Rosario Piazza.
When a top executive moves over to his competitor, having
someone sort of watch while he packs his office is net being
too pushy.
This was in many ways a classic case. An executive at one company moves to another company. He takes not only his know-how
and experience but also documents. Hard to protect against under
any circumstance, how do you keep your purchasing head in the
I dark about what's going on? One way for GM to have protected
itself was to compartmentalize information, to keep Lopez from
j1 knowing everything there was to know about what was going on.
224
THE
INTELLIGENCE
EDGE
The price for that, of course, would have been a secure, but paralyzed, GM. Youjust can't do that.
Lopez's crime was made easier, and much more damaging
than it would have been twenty years ago, by the invention of the
floppy disk. Assume that you had taken a filing cabinet full of documents. No matter how important they might be, a filing cabinet
could not possibly contain the totality of Project X, in all of its complexity and subtlety. But digitized data... well, a briefcase could easily contain the keys to the kingdom.
Taking Cover
225
not have very deep penetration. So it was a pity, from our friend's
point of view, but no major cause for concern. It would all be forgotten shortly.
Unfortunately, this was not the case. This particular wire was
archived on several major on-line databases, including Lexis-Nexis
and FT Profile. This meant that every time someone put our
friend's name into one of these databases, this story, with the implication of wrongdoing, would come up. Since it was a minor story,
and basically inaccurate as well, there would be no follow-up. But
for as long as on-line services carried Reuterswhich is to say for at
least our friend's lifetimethere would be a story in there, along
with all his successes and awards, clearly implying that our friend
may well be a bit of a scoundrel.
Ever since Gutenberg laid the groundwork for mass media,
one solace has been paper's short legs and memory. Not only would
a newspaper story in South Africa not be known outside the circulation area of that newspaper, but would usually not even be
remembered in South Africa. And if it was vaguely remembered by
someone, who could possibly find it, even a few months after publication? There was a comforting element of forgetfulness about the
media. You could live things down.
This was no longer the case. Our friend came to the United
States trying to arrange financing for a new project. He was
approaching some major American banks where he wasn't well
known. He had good introductions, so he was being taken seriously,
but naturally, his hosts wanted to know a litde more about him, so
they checked his name in some, on-line services. The last story on
himit was the most recent and therefore the first to come up
was the story about the investigation. Plus, it turned out that
another British newspaper, picking up on the Reuters story, had
mentioned his name in another obscure, but archived, publication.
It appeared to his hosts, not knowing any better, that he had
recendy run into some serious regulatory problems back home that
hadn't yet been cleared up. Fortunately for him, one of the bankers
he was meeting with had the courtesy to mention the problem to
him, allowing him to not only explain it but to call his office and
arrange for his attorneys to gather some exculpatory material. But
226
THE
INTELLIGENCE
Taking Cover
EDGE
I
I
I
227
228
THE
INTELLIGENCE
EDGE
Taking Cover
229
In the olden daysabout ten years agomost companies maintained safes in which vital and sensitive documents were stored.
Today, the most valuable information in a company exists in endless, unlocked litde cubicles called hard drives. What is amazing
about our hard drives is not only how much utterly invaluable information these drives contain, but how little most managements
know of what is contained on them or where. The only thing more
amazing is how utterly insecure these drives are.
Any effective security and counterintelligence system must
begin with the hard drive. First, companies must, once and for all,
develop systems for finding out what employees are keeping on
their drives. This is not a matter of making certain that employees
are not playing Doom on company time, but of developing an effective inventory of a company's knowledge base, increasingly present
on the hard drive more than anywhere else. Tools are now becoming available to allow managers to access hard drives. Windows 95,
for example, provides connectivity between the hard drives. One
result is that, for the first time since personal computers swept into
offices, it has become possible to take inventory. It also becomes
easier to tap into other people's hard drives and make off with what
they have.
The hard drive isn't a stockroom. You can't take physical
230
THE
NTELUIGENCE
EDGE
Taking Cover
231
act of deleting a file does not erase it. The data is still there and can
still be read, sometimes by simple utilities designed to undelete
and sometimes by more sophisticated means. All deleting a file does
is tell the operating system that the space occupied by the file is
now available for use. Until the space is actually used, the file is
still there.
Consider this: While you are clicking away in Microsoft Word
or Corel Word Perfect, backups are taking place. Every fifteen minutes or so, whatever you are working on is backed up. Fifteen minutes later, the backup file is deleted and another one is created.
Every time you print the file, a print file is created on your hard
drive. In the course of writing a fifteen-page proposal, literally hundreds of copies of that file have been created and deleted. That
means that for weeks or even months after you have mailed out the
proposal, deleted it from your drive, and forgotten about it, enough
copies of that proposal remain on your drive that it can be reconstructed with not very sophisticated means. The larger your hard
drive, the more free space it has, the more likely past secrets and
indiscretions are still sitting on your hard driveeverything from
e-mail to secret sketches of your newest project.
First off, tie down your central processing units (CPUs) and
put strong, serious locks on them so that your computers can't take
a walk or have a hard drive lifted out of them. Second, put in place
a systematic scrubbing approach. Using software like "defraggers,"
which consolidate files on hard drives, it is possible to overwrite all
unused sectors, thereby eliminating old files. But bear in mind that
recent thinking is that a single overwrite will still allow sophisticated
systems to "read" your files. Plan to overwrite several times. This is
a bit time consuming, but it will mean that even a stolen computer
won't yield your most valuable or dangerous secrets.
The network is the next problem. Again, the very way in which
it has made life easier also makes information more vulnerable. An
unscrupulous employee, for example, can e-mail your secret business plan to your competitor, going into the server drive where it is
stored and shipping it out. Some simple rules are essential:
Access to server drives is a great convenience. Creating multiple real or virtual drives and controlling and limiting access
232
THE
INTELLIGENCE
EDGE
Taking Cover
233
CONCLUSION
In our view, businesses are threatened far less by the theft of their
information than by their own people giving that information away.
A casual remark in the hands of an analyst with context and nuance
is more dangerous to your business plan than fifty former Mossad
agents. And no amount of legal protectionnot copyrights,
patents, or confidentiality agreementswill protect you from the
careful collector and the meticulous listener.
This is the shift that is taking place in business intelligence.
The threat does not come from espionage but from intelligence;
not from breaking and entering as from leaking and gossiping; not
from unscrupulous former employees as much as from loyal current employees. And it poses a fundamental challengeand opportunityto modern business. The challenge is to protect your own
material and the opportunity is to see what your competitor
is doing.
The problem here is that the solutionstrict controls on the
movement of information within a companyposes a tremendous
price for business. Inefficiency grows out of secrecy, and inefficiency can destroy a company. The problem facing business today is
securing information without capitulating to secrecy. It is a far
graver challenge than the KGB ever posed.
The solution is twofold. First, it is cultural, recognizing that
loose lips do indeed sink ships. Imposing a culture is difficult, but
less difficult than imposing secrecy. Second, the solution is technological. Emerging, but not yet present, technologies will allow us to
tag information and know who has seen it and what they have done
with it. As information grows more precious, tracking its movements will become the solution to a problem that cannot help
but grow.
Well, it's that time againtime to visit with the lawyer. Always an
interesting experience. Notice how he starts; the very first line: " 'Is
it legal?' That's the basic question people have about law and corporate intelligence." How do we convince him that this is most
emphatically not the basic question? The basic question is how can
I find out what I need to know and riot get into trouble? There's a
world of difference between the two questions.
The world of intelligence is a world of ambiguity and risk
you are never quite sure what the rules are but you've got to act anyway. In the world of law, you never act until you are sure of your
ground. But how can anyone be sure of his ground on a project
involving Somali and Chinese oil? What groundwe're in a swamp!
The lawyer's solution: Wait while he researches the legal aspects.
Our answer: Do it and let the lawyers sort it out later. Visits from
legal counsel are, in our world, exciting moments indeed.
We don't have contempt for the law. What we have is a real
problem! At any moment the law can shut anything down, and we
can't afford to be shut down. In a world where there are countries
in which asking about rice production can get you put in jail, we
need to find a way to do what we have to do without going away in
handcuffs. So the legal question is important but, from our point of
view, ultimately subsidiary. It's something that you need to ask to be
a responsible citizen, even if you get a long, convoluted answer that
basically says: "Maybe, but don't hold me to that."
234
235
THE L E G A L CONTEXT
BY JOHN S. B A K E R , JR.
"Is it legal?" That's the basic question people have about law and
corporate intelligence. The question can be asked in a way that
implies criminality: "Isn't corporate espionage a. crime?" However the
question js phrased, though, a competent, cautious lawyer typically
might answer: "Each situation is different, depending on the facts.
In many areas, the law is unclear. You should consult an attorney
with your specific questions."
There you have it; an answer that is perfectly accurate...and
completely useless! Worse than useless, however, is the answer of
the less-than-competent lawyer who, like many accountants, simply
says: 'Just don't do it!" That way, of course, the lawyer cannot be
blamed if anything goes wrong.
Without here providing legal advice, we can offer some useful
guidance to the reader first by pursuing some clarifying questions:
(1) Is intelligence gathering the same as criminal espionage?
(2) Even if not criminal, is intelligence gathering a legitimate corporate activity? (3) How does one recognize a criminal or illegal
corporate practice? Intertwined with these questions is another
one: Are we talking about American law, the law of some other
country, or both?
The terms intelligence gathering and espionage suggest that the
236
THE
INTELLIGENCE
EDGE
main legal issues involve criminal law, when actually the most significant issues involve intellectual property and trade secret law.
The United States, in particular, has focused on protecting innovation and preventing what is deemed to be unfair competition.
Among its many firsts, the U.S. Constitution authorizes Congress to
grant exclusive rights to authors and inventors. Congress has long
given patent and copyright protection for intellectual property and
more recendy has protected trade secrets that were already generally protected under state laws.
The Economic Espionage Act of 1996 criminalizes the theft of
trade secrets. What makes either intelligence gathering or espionage criminal under this law is the misuse of trade secrets. If the
crime is an act committed on behalf of a foreign government, it is
labeled economic espionage. Otherwise, the crime is theft of trade
secrets. If trade secrets are not involved, someone who employs
"espionage" techniques does not commit the crime of economic
espionageeven though the person is "spying" on economic activity. Thus, in the United States, "espionage" and intelligence gathering need not be criminal nor illegal.
Few countries, besides the United States, protect trade secrets
as such. Of course, a foreign government might charge theft or
embezzlement in a case involving trade secrets, as was filed in Germany against former General Motors executive Jose Ignacio Lopez
de Arriortua. Nevertheless, outside the United States, the secrets of
a private corporation do not have the same protection as they do
within the United Stales. Taking economic "secrets" from a foreign
government or a government-owned corporation will, however, very
likely be considered not merely theft but criminal espionage.
In less free countries, the scope of espionage is quite broad. A
country may treat as state secrets matters which in the United States
would be public information. Basic statistics about a country, such
as population and industrial output, are still technically illegal to
obtain in many areas of the world. In former Soviet bloc countries,
such laws may or may not be enforced. A practical way of gauging a
country's interpretation and enforcement of criminal espionage as
to basic economic data may he to assess the degree of freedom
afforded journalists and lawyers to practice their professions. A
237
country such as China, which has had very few lawyers and whose
government greatly restricts and sometimes arrests journalists, is
not a hospitable place to conduct private intelligence gathering
at least on the ground.
Lawyers, as well as reporters, around the world routinely
engage in intelligence gathering. American trial lawyers call such
fact-finding or investigation "discovery," a process governed by rules
and enforced by courts. Any lawyer or reporter who does not adequately investigate before making allegations acts irresponsibly. For
lawyers and journalists, intelligence gathering must be considered
obligatory.
If intelligence gathering is permissible when done lawfully by
lawyers and journalists, should it be any less so when done by corporations? If there seems to be a difference, the explanation may lie
in the labeling rather than in any analysis. Legal and journalistic
research may seem more legitimate than corporate espionage
because lawyers and journalists, although acting in a private capacity, claim to advance the public interest. Is there really any difference, though, in what these professions in fact do and what
businesses do when it comes to intelligence gathering?
What is the difference, actually, between some forms of
research and espionage? Is it research or spying (or both) when an
insurance company investigator videotapes the physical activities of
a person who has made a claim for injuries allegedly resulting in
permanent disability? Is it research if directed by the lawyer but spying if done by the corporation? Are the labels at all meaningful?
Cannot the intelligence gathering done by a corporation benefit
the public, just as it can when done by a lawyer or journalist?
Intelligence gathering, practiced legally, is part of the competitive enterprise. A person or corporation that is the object of intelligence gathering may call it corporate espionage. But what if that
corporation takes defensive security measures? Aren't both corporations then gathering intelligence on each other? Are they both
engaged in corporate espionage? Is one or both of them engaged
merely in market or competitive research? The answer given at the
beginning of this chapter by "the competent, cautious lawyer"
that is, "it all depends"has this virtue: It resists the tyranny of
238
THE
INTELLIGENCE
EDGE
239
240
THE
INTELLIGENCE
EDGE
have changed the landscape. The same computers both make private intelligence gathering cost effective and also make illegal copying much more cosily to the owners of information. One does not
imply the other, however. Intelligence gathering does not require
illegal copying.
Normally, mere reading of (at least, nonclassified) information raises no legal issues. Certainly this holds true when reading a
book or other printed publication. Unless you have stolen the publication, you need no legal permission to read and thereby obtain
information. Stating the obvious would not serve any point, but for
the fact that the same treatment almost did not apply to electronic
materials.
In December 1996, treaty negotiators reached two new international agreements on changes in copyright protection. Negotiators rejected attempts to make reading copyrighted material on a
computer screen a violation of copyright law. Few people would
think it should be. But there were those who would have made
anyoneincluding schoolchildren at their librarycopyright
infringers for even looking at the copyrighted material on a computer screen.
What makes research done on-line different from that drawn
from a book? With a book, the acts of publishing, reading, and
copying are clearly distinguishable. The publishing of a book is
complete before the ordinary reader has the opportunity to read it.
If the reader copies part or all of the book by hand or using a copy
machine, he clearly must make the decision to do soregardless of
whether the act of copying is or is not permissible.
In electronic publishing, the lines separating publishing, reading, and copying are blurred. If you access a commercial on-line service such as LEXIS-NEXIS, you pay a fee that may include only
reading, both reading and copying ("downloading"), or separate
fees for each. You may be paying to read materials that you might
otherwise read without cost in hard copy, but it may be difficult or
time-consuming to get the information. So you pay for instant
access. Paying the service provider effectively satisfies whatever
financial obligations are due the copyright holder (or other owner
if the material cannot be copyrighted). The provider pays the copyright holder.
241
242
THE
INTELLIGENCE
EDGE
1995, the SPA's toll-free telephone line has been receiving a hundred tips per week, generally from disgruntled employees, identifying use of illegally copied software. The SPA verifies reports by
checking whether the targeted company has registered with the
software publisher. If the company has not, the SPA will seek a voluntary audit in which the company agrees to allow the SPA to
inspect its computers for pirated copies. In doing its audit, the SPA
uses special software that can detect whether any software has been
deleted.
Why would any company allow the SPA such access? It's quite
simple. As a result of amendments to the copyright act in 1992, the
burden of proof rests on the software user. The user must, by
receipts and/or other records, prove its right to use the software. If
the company does not agree to a voluntary audit, the SPA can seek
a court order for an involuntary audit. When that occurs, the SPA
arrives with federal marshals to execute a search warrant to inspect
the computers. Either way, if the company is using illegally copied
software, it will pay fines. If the company resists, officers and/or
managers may suffer criminal prosecution.
Intelligence gathering involves the use and creation of databases. Copyright protection does not cover facts, only the manner
in which they are compiled. The user would prefer that databases
not be copyrighted, and courts have traditionally restricted severely
the scope of database copyright. That allows users of data more
freedom to create new databases. When the user creates a new database that has commercial value, however, the user-turned-creator
may now have second thoughts about copyright coverage.
The 1996 Geneva conference on copyright failed to expand
copyright protection to databases. Compilers of databases would
like the same protection for their work product as is currently provided only for creative materials. Like software producers, database
owners can and do charge for access. Without copyright protection
for a database, however, the user is not barred from copying,
manipulating, and/or redistributing the dataunless restricted by
agreement.
Database creators may be able to restrict their use by contract,
but the protection may still be lacking for some. Market conditions
243
and the database owner's marketing strategy will determine its ability contractually to impose the conditions. The distribution requirements of certain databases preclude charging fees, much less
imposing other conditions. Obviously, for example, the New York
Stock Exchange must continue to distribute its information to millions without charge and therefore cannot contractually impose
restrictions on those who read its quotes in newspapers. With copyright protection it could continue to distribute to the same audience without charge, but the law would impose a restriction on
copying, manipulation, and redistribution without permission of
the copyright holder, which presumably would involve a charge.
Theoretically, copyright protection and the ability to charge
should stimulate the creation of more databases, thereby increasing
the sources from which to gather intelligence. Increased supply and
competition supposedly should more than compensate for the fact
that some currently available free sources of information would
carry a charge. On the other hand, with or without a charge, databases would become less generally accessible. Although lawfully
obtained, databases, like stock exchange statistics, would no longer
automatically be available for incorporation into newly created
databases. The ease and cost of accessing and creating databases is
central to passive intelligence gathering.
244
THE
INTELLIGENCE
EDGE
245
246
THE
N T E
G E N C E
EDGE
247
248
THE
NTEULIGENCE
EDGE
249
250
THE
INTELLIGENCE
EDGE
251
252
THE
INTELLIGENCE
EDGE
ican lawsuit by the British liquidator, even though the litigation was
blocked in part by a British court. Also in 1984, in order to avoid an
antitrust lawsuit from the newly launched, privately owned Virgin
Adantic Airways, the then-government-owned British Airways asked
for and received a letter of assurance from the Justice Department
diat certain proposed fares did not pose a possible antitrust violation. Since being privatized in 1987, British Airways has been sued
by Virgin Adantic Airways in a New York federal court. The court
rejected various legal arguments by British Airways that it should
decline jurisdiction and send Virgin Atlantic to a court in the
United Kingdom. Certainly, the American airline industry has had
a significant impact on the British airline industry not merely due
to the market but due to enforcement of American antitrust law.
The European Union (EU) may soon be exerting a strong
influence on American practices regarding the use of data not
through criminal law but through contracts necessitated by the EU's
privacy rules. Countries in Europe have adopted "data-protection
laws" designed to restrict the disclosure of personal information. As
a result, several countries have begun restricting the export of data
to persons or entities in countries that do not have sufficient protection for personal data. The United States is not considered as having sufficient privacy protection for personal data. A recent study of
U.S. law prepared for the Commission of the European Communities recommends solving the problem of inadequate and inconsistent standards in the United States not by blocking the flow of data
to the United States but by strict liability on European companies
for adherence to the European standards.
In summary, whether you are doing business in your local community or overseas, intelligence is a necessity. Wherever you do
business, law is a reality. To the question "Is intelligence gathering
legal?," the answer is "Yes, depending..."depending on what you
are trying to find out, where you are looking for it, and how you
plan to get it. In general, passive techniques in the advanced industrial countries are going to be legal. Passive techniques in some less
developed countries may be illegal, but as long as what you do is
passive, you're probably going to be safe from retribution. Legal
problems develop as you become increasingly active. First, you face
253
dangers because you must act rather than simply absorb. Second,
you come into direct conflict with others who may use the law as an
instrument to stop you. This is particularly true in the United States,
the most litigious nation on earth. The legality of intelligence gathering intersects with the likelihood of a lawsuit merely to deter you
from pursuing the truth. So, intelligence gathering is legal, but...
Consult your attorney.
CONCLUSION
254
THE
INTELLIGENCE
EDGE
exist. Unfortunately, you can't wait for the law to define itself in
order to do your business. Your work goes on regardless of ambiguity.
This is the ultimate problem faced in dealing with the law. The
fact that business intelligence techniques are at the cutting edge of
a technological change that the law has not yet caught up with; the
new global nature of business intelligence; the intersection of business intelligence with fundamental international disputes and fault
linesall mean that the law is not a particularly faithful guide.
No matter what you do, somewhere, somehow, it may be illegal. And yet you must gather information or die.
Where neither law nor custom is a guide, we urge common
sense.
Be aware of the ambiguous position you are in.
In collecting information, try to make sure that you really
need it.
In collecting information, try to make certain that you are
not stepping on the toes of people who are extremely powerful in countries where the law isn't taken seriously, and where
you have no choice but to visit.
Try, for as long as possible, to stay with passive techniques in
the electronic and paper domain.
Not a very strong position, but the best available at this point
in time.
APPENDIX
The Yellow Bonk Leadership Directories arc another excellent scries of directories
of key personnel in the U.S. federal, state, and local government; foreign business
and government representation in the^U.S.; and U.S. corporate, legal, financial,
association, and news media fields.
YELLOW BOOK LEADERSHIP DIRECTORIES SERIES
Leadership Directories, Inc.
104 Fifth Avenue, 2nd Floor
New York, NY, 10011
Phone:212-627-4140
Fax: 212-645-0931
$190-$265 each; $1,460-$1,600 complete library
A couple of good collections of web-based phone and fax listings are Kapitol and
the Reference Shelf. Kapitol includes a number of more obscure linkssuch as
the fax directory of Sierra Leoneand rates all their links by ease of use, completeness, and reliability.
255
Appendix
256
KAPITOL
31 Rue E. Gossart
B-1180 Brussels - Belgium
Phone: +32-2-344-42-42
Fax: +32-2-344-22-96
E-mail: kapitol@infobel.be
THE REFERENCE SHELF
http: / /www .synapse.net/ -radio/ refe re nc .h tni
KapitolInternational Directories
ht tp: / / www. infobel.be / i nfobel / i n fobclworld. h tml
Most military contacts can he located through two sources: the U.S. military's
Defense Link on the web, or Jane's annuals, available in prim or on CD-ROM.
DEFENSELINKhup://www.dtic.dla.mil:80/defenselink/index.htnil
Links to nearly all publicly accessible U.S. military web sites
JANE'S ANNUALS AND JOURNALS
http: / / www.j an es.com/janes.html
http: / /www. thomson.com/janes/default.html
JANE'S CANADA
Van we 11 Publishing, Ltd.
1 Northrup Crescent
P.O. Box 2131, Stations
St. Catherines, Ontario L2M 6P5
Canada
Phone: 905-937-3100
Fax: 905-937-1760
JANE'S UK
Sentinel House
163 Brighton Road
Coulsdon, Surrey
CR5 2NH
UK
Phone: 44-181-700-3700
Fax: 44-181-763-1006
JANE'S U.S.
1340 Braddock Place, Suite 300
Alexandria, VA 22314-1651
Phone: 703-683-3700
Fax: 800-836-0297
JANE'S WEST COAST
17310 Redhill Avenue, Suite 370
Irvine, CA 92714
Phone: 714-724^868
Fax: 714-724-1576
Besides the information available from the directory clearinghouses listed above,
the U.S. government is well represented on the web. A comprehensive starting
Appendix
257
point can he found at the FedWorld site, while the individual branches of government have excellent sites of their own.
FEDWORLD h tip://www.fedworld.gov/
OFFICE OF THE PRESIDENT http://www.whitehouse.gov/
U.S. HOUSE OF REPRESENTATIVES http://www.house.gov/
U.S. SENATE http://www.senate.gov/
The Foundation Center is an excellent source of directories arid information
about U.S. and international foundations.
THE FOUNDATION CENTER
79 Fifth Avenue, 8th Floor
New York, NY 10003-3076
Tel: 212-620-4230
Fax; 212-691-1828
http://fdncenter.org/
In addition to the directories available through Gale Research and U.S. West, contact information for foreign governments, businesses, finances, and associations
can be found at the sources listed below.
EUROPEAN UNION
Delegation of the European Commission to the United States
2300 M Street, NW
Washington, DC 20037
Phone: 202-862-9500
Fax: 202-429-1766
http: / / www. eurunion .org/
INTERNATIONAL MONETARY FUND (IMF)
External Relations Department
Washington, DC 20431
Phone: 202-623-7300
Fax: 202-623-6278
h ttp: / /www .irnf.org/
KR ONDISC Worldwide Government and Defense Directory on CD-ROM
$2,900 (includes 4 quarterly updates)
(Includes: Worldwide Government Directory, Worldwide Directory of Defense Authorities,
and Profiles of WorUuride Government Leaders.)
258
Appendix
Belgium
Fax: 32-2-646.05.25.
E-mail: weblist@uia.be.
hitp: / /www. uia.org/
Tens of thousands of organizations listed on-line, with contact points. The UIA
also offers the four-volume Yearbook of International Organizations in print and
CD-ROM versions. Print version: USf 875.
THE UNITED NATIONS
New York, NY 10017
Phone: 212-963-1234
http: / /www. un.org/
THE WORLD BANK GROUP
1818 H Street, NW
Washington, DC 20433
http: / /www. wo rldban k. org/
Web site contains contact phone numbers by topic,
WORLDWIDE GOVERNMENT DIRECTORIES, INC.
7979 Old Georgetown Road
Bethesda, MD 20814
Phone; 301-718-8770 or 800-332-3535
Fax: 301-718-8494
h tip: / / www. wgd .com/
1,450 pages, $347
There are a Urge number of trade and business directories available in print and
electronic form. Many of these are available from Gale Research or U.S. West.
Other excellent sources of information include Dun & Bradstreet's large number
of publications and services and the Thomas Register. International Thomson
Publishing, which owns Jane's and Gale Research, also offers a large number of
CD-ROM, on-line, and diskette directories related to international business.
DUN & BRADSTREET INFORMATION SERVICES
3 Sylvan Way
Parsippany, NJ 07054-3896
Phone: 201-605-6000 or 800-234-3867
Fax; 201-605-6930
h ttp: / /www. dnbcorp.com/
DUN & BRADSTREET, LTD.
Ho liners Farm Way
High Wycombe
Buckinghamshire HPI2 4UL
England
Phone: 44-494-423-600
Fax: 44-494-423-595
DUN & BRADSTREET ONLINE SOLUTIONS http://www.dbisna.com/
INTERNATIONAL THOMSON PUBLISHING
Informalion/Reference Group
835 Penobscot Building
Appendix
259
USENET?
1DVJUKEI
SUICH?
EASE
CONTENT
SPEED
n/a
Keyword. Boolean
for advanced
search.
n/a
Names.
n/a
Names.
n/a
Names, regions,
states, etc.
Keyword or
newsgroup
classification.
Dopgpile (meta)
http://ww w. dogpi le.com
Keyword. Boolean
searching,
INPUT
COMMENTS
Names.
(people finder)
http://w ww .abii.com/lookupusa/ada/ada. htm
individual engines.
Excite (general)
n/a
n/a
Keyword. Boolean
for advanced
searching.
Names, countries,
states, cities,
domains.
Keyword. Boolean
and menu-driven.
Galaxy (general)
http://galaxy.tra dawave.com/galaxy. htm I
motherload/insane
Highway 61 (meta)
http://www.highway61.com
HotBot (general)
http://www.hotbot.com
Infohiway (general)
Http ://ww w. i nfohi way. com
Keyword.
Infoaeek (general)
http://ww w. infoseek.com
Natural language
or keyword.
n/a
Names,
addresses.
n/a
Names,
organizations,
domain name,
or e-mail
address.
O)
USENET?
AOVANCEI
SEAHCN?
EASE
CONTENT
SPEC!
n/a
Lycos (general)
http: //www. lycos, com
Magellan (general)
http.7/www .mckinley.com
10
SEARCH ENGINE NAME, TTFE, ADDRESS
INPUT
COMMENTS
Keyword with
menu-driven
functions for
search refining.
Category search
drives hits.
Keyword.
Keyword.
Boolean with
menu -driven
search.
Keyword and
menu-driven
options.
Keyword.
Boolean
Pathfinder (general)
http: //www. pathfinder.com
Keyword with
clickable options.
Reference (newsgroup)
http ://w ww .reference.com
Keyword with
Boolean searches.
iiMfcfc___
^^BHMi^A^^^^^^^^^^^^^^^^^^^^^^^^^^^^
pjPpP^^B^Pp^gppa^pg^^^^g^^$^l|iulw..jAjm w
HP^BJ^WP^^Bi^^^W^^^^WrBWJW111-- -
SawySearch (mrta)
http://guatalili.cs.colostate.edu: 2000/f orm
n/a
Tilanet (newsgroup)
http: //tile.n et/ne ws/search . html
n/a
n/a
OJ
Keyword, Boolean
is menu-driven.
Name and
category driven.
Keyword.
Boolean.
Yahool (general)
hp;//www. yahoo, com
n/a
Keyword. Boolean
is menu -driven.
Boolean, keyword
searching.
Names.
Keyword.
Name, location,
domain name.
Keyword o r
location search.
265
Appendix
MONTHLY ON-LINE USA6E COST
O
Based on 10 hours of on-line time, 100 search queries, and 100 document downloads or prints.
1-
cc
m
S
'-
*f
rt
tO
r**
5-
S
O
1
(D
ri
0?
o!>
?
S
o
r^
fn
ffi
rt
rJTJJ co co ft r3
0
6
6
0
^ o o o o
415-254-7000
DZ
214-951-7171
uj
UJ
CO
11 1
in
OJ
CO
CO
Csl
6
(O
6
o
CD
in
CM
ey
Q!
0*
PI
(O
N
0
J*1!
in
CD
5
PI
in
6 6
6
o S
o
u
K
S
o
o
o3
fl
u
ij
Dialog*
Dow Jones*
EyeQ
FT Profile
LexU-Nexis (per use)
Lexis-Nexis (flat rate)
Profound
Pro quest Direct*
TIME
$530
free
$39
$240
$360
$4250 (flat rate!
$898
DOWI*
DOWNLOADS/SEARCHES
TOTAL
$407
$937
$1121
$1121
$450*
500
$4000
$200
free
$383
$489
740
$4360
$4450
$898
c
^ u
.c
_c
01
'S
S
C ft
UJ ? S | i S
Z
UJ
e
'-^
S I1 t t f
^
-E
-f
a.
"
* fS
t
*
j
u "3,
S"
umi.com
-^
o
=
i s t
J i s
-? -f -?
n'S
CL
fl- * t
!9
C K
LJ
=5 "S
eg qj
"
d t*-i
o
i
D
. ii
1
.s
*
o
UJ
UJ
FT Profile
Dow Jones
_^
Dialog
- S * 8 > r
3 s s" "a S
i 1 5 E 1 3
1*3
1 e1 e*
S
_l
Q-
O.
The sample below was determined on ease of use, content, and updates of information. When dealing with foreign libraries, most especially in Europe, there is a
serious lag problem that reduces the site's usefulness. These are lihraries that we
like to use.
CJ
"E j:
k-
"Service charges vary depending on source accessed. Esdmates are based on averages taken
from a representative sampling of sources.
o 5
-a
profound.com
--^
-a
,
^.
lexisnexis.com
0
CB
2
E
Tl
o
"
i
?
Z
f
^
?
I
(Q
01
<
S C
S '-
i 1I
o
tJ
5 "u
*^
.f
S
) wj ones . co m/on I i ne
dialog.com
a
u
tn
u
z
j
B
z
o D
264
HIGH-END ON-LINE
SERVICES
^
(A
U
U
H" 3
a. a
v qj
W 3
United States
BRIGHAM YOUNG UNIVERSITY
Telnet: library.byu.edu
,
128.187.11.10
NOTE: Select vtlOO terminal and select "a" on Gateway menu.
Has unlimited number of returns, plus full citation.
GEORGETOWN UNIVERSITY
Telnet: library.Iausys.georgeiown.edu
141.161.93.5
NOTE: Log-in is george.
Access law and medical library, but limited display of information.
HARVARD UNIVERSITY
Telnet: hollis.harvard.edu
128.103.60.31
NOTE: At prompt, lype hollis.
One of die bestplus you can e-mail your results back to yourself.
266
Appendix
Telnet: LJbrary.nadn.navy.mil
131.121.1881
NOTE: Log-in is library.
UNIVERSITY OF CALIFORNIA
Telnet: melvyl.ucop.edu
192.35.222.222
NOTE: Set vtlOO or Help when prompted.
Access the California system. Some subject area databases are useful to
businesses. Sends result to you via e-mail.
UNIVERSITY OF NOTRE DAME
Telnet: irishmvs.cc.nd.edu
129.74.4.5
NOTE: At Enter command or Help prompt enter library.
UNIVERSITY OF TEXAS AT AUSTIN
Telnet: utxuts.dp.utexas.edu
128.83.216.12
NO re: Log-in is utcat.
Appendix
Australia
UNIVERSITY OF SYDNEY'
Telnet: Iib7.fisher.su.oz.au
129-78.72.7
NOTE: Log-in is library.
Lots of Pacific basin material.
Hong Kong
CHINESE UNIVERSITY OF HONG KONG
Telnet) library.cuhk.edu.hk
202.40.216.17
United Kingdom
CAMBRIDGE UNIVERSITY
Telnet: nl.cam.ac.uk
131.111.164.59
OXFORD UNIVERSITY
Telnet: library.ox.ac.uk
129.67.1.46
267
INDEX
Actionable intelligence, 50, 54, 109
Active intelligence, 77
cost of, 30, 164, 166, 167, 168
and gossip, 166-67, 175-82, 184
and human intelligence, 169,
171-83
and legal issues, 242, 243-53
limitations of, 183-86
and location of information, 169,
183
and mission, 169, 183
and offering money, 180
open ended, 184, 185-86
operational aspects of, 168-73
passive intelligence compared with,
147, 166-67, 182-83
and public domain, 184-85
right person for, 172-82, 183
and security, 166, 177-82, 185
and technical intelligence, 169-71,
172
uses of, 164, 183-86
See aki> Espionage; Human
intelligence
America Online (AOL), 14, 119, 137,
138
Analysis, 2, 7,42, 168, 169
art and craft of, 188-91
customers' role in, 187-88
and expcro, 203-4
financial, 205-6
as fortune-telling, 193, 204-12
and gathering information, 199,
203
of intenial resources, 112-13
and issue-driven projects, 200
and knowledge curve, 190, 191
methods of, 198-202
of operating environment, 200201
operational intelligence
distinguished from, 23-24
operations versus. 188
and personal relationships, 210-12
purpose of, 188, 189, 191
and searching for unanticipated,
201
Index
270
88
Data, 4, 5, 252. See aha Databases
Data Corporation, 41^42
Databases, 14, 71, 106, 113, 115
as archives of information, 81-82
and binary code, 38
of British Airways, 103-4
government, 138-39
law about, 242-43
and public domain access, 38-42
searching of, 38-42, 47, 72
Sef ahn On-line services; specific
database
Defense Technical Information
Center (DT1C), 73-74, 138-39
Dialog Information Services, 39, 40,
42, 73, 138-39
Diffusion of information, 87-94, 112
Digital information, 117, 141, 214,
217, 219-20, 221-22, 224-32
Direct information, 109
"Discovery", 237, 238
Discrete operations curve, 67-68
Disinformation, 159, 168, 226
Dissemination of information, 7,
87-94,96, 109-10, 111-13
Dissipation of information, 87-94, 95
Dow Jones news service, 39, 133-34,
135, 138
Index
E Library, 134-35
E-mail, 119, 137, 230, 231, 232
Economic Espionage Act (1996), 236,
248
Efficiency, 90, 91, 93, 104-5, 163,
223-24, 235
Electronic copying, 239-41, 249-50
Electronic intelligence (zone 1)
as category of technical
intelligence, 31-33
chart about, 48
and counterintelligence, 225-27
efficiencies of, 55
and espionage, 3435, 36
examples of sources for, 143-45
and information management, 32,
33, 35-36
as information zone, 47, 55
and knowledge curve, 54-55
and legal issues, 254
management of, 32, 33
and national intelligence agencies,
31-33
open source, 116-20
and passive intelligence, 30, 158,
254
searching for, 33, 38-42, 139-40,
141
and semiacdvc intelligence, 142,
144, 158
storage of, 33, 36-39
Set also Computers; Databases;
Internet; specific database
Electronic typesetting, 37, 38-42
Employees
and countermtelligenee, 227-28,
233
indoctrination of, 101-4
.,
nondisclosure agreements for, 249
See also Internal resources
Encryption, 217, 230, 232, 244, 250
Espionage, 1-2, 27, 49, 91, 238
and electronic intelligence, 34-35,
36
and human intelligence, 31, 33-34
as legal issues, 186, 235-38
See also Central Intelligence Agency
(CIA); Counterintelligence;
Covert operations; National
intelligence agencies
Executive News Service (ENS), 137
271
228, 236
Geography. 10-11, 12, 42, 45-47, 52,
69-70, 144
Globalism, 3-8, 253-54
Gossip (zone 3), 9, 72, 233
accessing, 52
and active intelligence, 166-67,
175-82, 184
and diffusion of information, 88-90
as information zone, 48, 52, 54
and internal resources, 159
and knowledge curve, 54
and semiactive intelligence, 142,
158-59. 160
272
Index
as specialization, 78
See aho Espionage; type of intelligence
Intelligence agency, definition of, 6
Intelligence directors, 6, 7, 22-23, 27,
62
Intelligence process
chart of, 57, 58
computers as workhorses of,
118-19
cost of, 100-101
first task in building, 1011
as generic, 82
and geography of information,
69-70
goal of, 61
honesty as core of, 14-15
informal, 8-15, 148
information inventory/re-inventory
in, 65, 66-67, 75-76
integrity of, 57
and knowledge curve, 67-70
magnetic water conditioner case as
example of, 58-82
mission of, 107
overview of, 82-83
project as distinct from, 82-83
and size of business, 13
steps in, 60-82
Intelligence projects, 53, 82-83
Intelligence specialists, 56-57
Internal resources, 148, 159
chart about, 93, 110
and collectors of information,
96-101, 112, 113
cost of tapping, 94
and diffusion/dissipation of
information, 87-94, 112
and dissemination of information,
88, 109-10, 111-13
evaluation of, 112-13
and gathering information, 85-109
and knowledge curve, 109
location of information within, 98,
104-9
management of intelligence from,
95, 111-13
and storage of information, 109,
110, 113
and users of intelligence, 111-12
Internal Revenue Service, U.S., 32
Internet, 14, 144,232, 241
Index
applications chart for, 123
content of, 120, 129-30
cost of, 129-30
and electronic intelligence, 47,
116-21
and legal issues, 249-50
libraries accessible on, 139, 141
modem as connection to, 119-20
and on-line services, 137, 149
origins of, 120-22
and passive intelligence, 120-32
and semiactive intelligence, 158,
159
using the, 123-30
See also World wide web
Intimacy. See Informal intelligence
systems
Intuition. See Informal intelligence
systems
Iran, personal contacts in, 210-11
Israeli intelligence, 17, 19, 20, 218
Issue-driven projects, 200
Joseph (biblical person), 43-44, 187,
193
Kinko case, 239
Knowledge
computers as means to, 5
crisis of, 1-15, 84
definition of, 45
domains of, 47-50
as power, 20
See also Knowledge curve; specific
information zone
Knowledge curve, 50-55, 67-70, 109,
148, 190, 191
Knowledge generation cycle, 7
Knowledge managers, 6, 7, 22-23,'27,
62
Laker Airways, 251-53
Leaks, 166, 177-78, 185, 221-22,
224-26, 227, 233
Legal issues
and active intelligence, 242, 243-53
and bribery, 245-46
and classified information, 244-45
and computers, 249-50
in context of intelligence, 235-38
and copyrights, 239-43, 245
273
274
Index
Networks, 34, 160-63
New company contact case, 105-9
New Hampshire company case,
175-82
New York Times, 37, 38
News services, 136-37
Newsgroups, 127-28, 129, 158
NEXIS, 39, 41-42, 59, 131-32, 133,
134, 135-37, 139, 225, 227, 240
Nondisclosure agreements, 249
On-line services, 116-21, 130-39, 142,
224-27, 228-29, 240-41
Online Computer Library Center,
Inc. (OCLC), 74
Open source intelligence. 26, 27, 114,
115-20. See also type of intelligence
Open Source Solutions (OSS), 114,
116
Operating environment, analysis of,
200-201
Operational intelligence, 23-26
Operations, analysis versus, 188
Organized crime, 219
Pager case, 124-29, 132-33, 134, 138,
139, 198
Paper intelligence (zone 2), 47, 54,
74, 139-40, 142, 144, 158, 254
Passive intelligence
active intelligence compared with,
29-31, 147, 166-67, 182-83
and CIA, 114-16
cost of, 30
and electronic intelligence, 116-20,
158, 254
and Internet, 120-32
legal risks in, 238-43, 253, 254
and on-line services, 116-21, 13039
and paper intelligence, 158, 254
searching for, 147
and steps in intelligence process,
76-77
and Wildman Joe case, 157
See also Technical intelligence
Passwords, 230, 232
People
and info lust, 149
and personal relationships, 194-97,
210-12
Index
245, 249
Proquest, 136
Public domain, 36-42, 142-51,
184-85, 245
Quark Research Group, 247
Querying, 110, 113, See also Searching
Recommendation, as step in
intelligence process, 80-81
Reed Elsiveer, 42
Requesting information, 244-46
Research, and espionage, 238
Retrieval of information, and tapping
internal resources, 87-90
Russian company case, 172-73
"
Satellites, 150-51, 170-71. See
also Signal Intelligence
Sawysearch, 125
Scrubbing disks, 230-31
Search engines, 123-30, 132-33, 141
Searching
and active intelligence. 147
Boolean, 125-28, 135
of databases, 38-42, 47
for electronic intelligence, 33,
38-42, 117, 118, 139-40
275
of Internet, 123-30
key words for, 72-73
in Library of Congress, 141
of on-line services, 130-39
of paper sources, 13940
and passive intelligence, 147
software for, 118
for unanticipated, 201
See also Libraries
Secrecy, 49, 114, 115-16,164-65,
220-24, 232, 233. See also
Proprietary information
Security, 19-20, 166, 177-82, 185,
224-32. See aha
Counterintelligence
Semiactive intelligence
characteristics of, 30-31
contact means in, 160
and contact records, 163
cost of, 148, 156, 161
and efficiency, 161
and electronic intelligence, 142,
144, 158
examples of sources for, 145-47,
162
and experts, 161
focusing in, 159
function of, 149-50
and geography of information, 144
and gossip, 142, 158-59, 160
and gray area, 158, 159
and info lust, 148-49
and informal networks, 148
and internal resources, 148
and Internet, 158, 159
and knowledge curve, 148
and legal issues, 242, 243-53
and location of information, 159
as mission-oriented, 149, 151, 152
and networks, 160-63
and paper intelligence, 142, 144,
158
and people, 147, 149, 151-60
and proprietary intelligence, 142
and public domain, 142-44, 145-51
step-by-step approach for, 159-60
and steps in intelligence process,
76-77
as task-driven, 149
and time, 148, 156
and tracking, 144
Index
276