The need for industry intelligence gathering on eco-terrorism

With the rise and impact of eco-terrorism, industry needs to gather more intelligence to help it combat the threats. The Impact has reported how the FBI view eco-terrorism as the biggest domestic terror threat and the wide-ranging disruption caused by the Extinction Rebellion group is just one example of how climate issues can have a big impact.

According to foreignpolicy.com, “Climate activists certainly have a central grievance — a catastrophic, existential grievance that is supported by scientific research. Visit any of the environmentalist websites or blogs and you’ll find an endless run of protests, demos, marches, and planned civil disobedience.

At Insight Intelligence, we are not saying organisations like Extinction Rebellion are eco-terrorists per se or commenting on the issues surrounding climate change. The point is that someone wishing to damage an organisation’s reputation, production or revenue can use environmental issues as a platform to achieve it.

The potential impact of eco-terrorism is hardest felt on large corporates, especially in the energy, resources and insurance sectors as well as all levels of government. Information spreads more quickly that the fastest bushfire and has no respect for boarders, time zones or even thorough fact-checking.

The activities of eco-terrorists are typically two-fold. Firstly, from a direct perspective like organising demonstrations aimed at crippling commerce. Secondly, high-jacking communications surrounding an event, such as bushfires, and providing disinformation to cause damage.

The Guardian on 12 Jan 2020, ran a report on the Australian bushfire emergency and disinformation campaigns that resulted from it. The article stated, “Two pieces of disinformation stand out from the rest: that an “arson emergency”, rather than climate change, is behind the bushfires, and that “greenies” are preventing firefighters from reducing fuel loads in the Australian bush. Queensland University of Technology senior lecturer Timothy Graham, an expert in social media analysis, took a sample of tweets from the hashtag and analysed them for characteristics typically associated with bots and trolls. His findings suggested a clear “disinformation campaign.”

With the myriad of information and risks facing organisations, one of the major challenges is how to gather, analyse and act on intelligence efficiently. Insight Intelligence has developed a tested process that draws on its military intelligence know-how to help organisations manage their risks more effectively.

We recommend organisations take a three-step approach to industry intelligence gathering:
1. Develop a profile of likely threat sources – individuals, groups and relevant topics to the organisation such as coal mining or plastic packaging usage.
2. Gather information – through human intelligence tracking of individuals, monitoring published media content and social media conversations.
3. Analyse and distil information into a relevant, actionable report.

The organisation is then armed with the understanding of the information to enable it to develop an appropriate response. This may include further tracking of individuals and specific online conversations to discussions with authorities on dealing with planned protests. Typically, much of the action plan is focused around combating disinformation campaigns that threaten to ruin reputations, production, revenue or the broader economy.

In summary, it is important for organisations and governments to separate the risks of eco-terrorism from debates around climate change ideology. The need for industry intelligence gathering is an important risk management and mitigation exercise to respond to threats posed by individuals and groups. The threats are very real, need investigating and an appropriate response developed, to prevent an organisation damaging threat becoming a reality.

From bushfires to health scares – why we should be wary of eco-terrorism

The Australian bushfires and the Coronavirus outbreak are currently the talk of every media organisation in the world. Both events have led to demonstrations, challenges, heartache and massive financial losses. A number of people are questioning whether part of the impact has been as a result of eco-terrorists.

The FBI defines eco-terrorism as the use or threatened use of violence of a criminal nature against innocent victims or property by an environmentally oriented, subnational group for environmental-political reasons, or aimed at an audience beyond the target, often of a symbolic nature.

The new wave of extremists will be greens according to foreignpolicy.com. It discusses how any visit to environmentalist websites or blogs will yield an endless run of protests, demos, marches, and planned civil disobedience.

According to a representative the journalist spoke to from Friends of the Earth, an environmentalist group with chapters across the world, local anti-fracking groups have grown faster than anything he has ever witnessed in the green movement.

Irrespective of whether the current events have been influenced by eco-terrorism, government and corporations alike need to be aware of the potential threats and incorporate them into their risk management plans accordingly.

For over a decade, Insight Intelligence has been providing industry intelligence gathering to supporting corporations in understanding who and what are potential threats and how best to combat them. Governments and corporations need to know how to analyse the mass of information in the media and to prevent damaging events and disinformation that will damage reputations, production and the economy.

Climate change has become a cause célèbre across the globe. The rise of demonstrations and communications about the issue are major risks facing industry and governments. The Intercept reported earlier last year how eco-terrorism had become the FBIs number one domestic terror campaign.

The activities of eco-terrorists are typically two-fold. Firstly, from a direct perspective, for example organising demonstrations aimed at crippling commerce. Secondly, high-jacking communications surrounding an event, such as bushfires, and providing disinformation to cause damage.

The Australian bushfire disasters have seen a clear disinformation campaign according to Queensland University of Technology senior lecturer Timothy Graham. Even the well-respected publication, The Australian, ran an article that falsely claimed 183 arsonists had been arrested in the “current bushfire season” deflecting the arguments about climate change being a central cause.

As an ideology, climate-change is well accepted and so the actions of groups like Extinction Rebellion have strong support from the general public. For an organisation or individual to cause harm under the guise of climate change is comparatively easy. There are obvious activities like campaigning against coal mining as well as more subtle ones such as choosing a time and location for a demonstration that is specifically designed to harm an organisation.

Whilst not strictly in the ‘eco’ space, if the Coronavirus had been a deliberate act, and I’m not saying it was, it has resulted in a truly massive strike against the Chinese economy and the ability of its people to travel internationally. On 3 February 2020, the BBC reported China shares had suffered their biggest fall in four years, with the Shanghai index closing nearly 8% lower as investors weighed the impact of the outbreak.

As climate change activism continues to grow, so does the potential incidence of eco-terrorism. Behind many of the actions of climate change groups there is terrorism lurking. Corporations and governments need to be aware of potential threats and monitor the activities of organisations and individuals to help them develop the appropriate response.

Gaining a competitive business edge using information and some military intelligence know-how

Human Intelligence Applications and Methods

Successful companies win the hearts and minds of customers, shareholders and public opinion. When success starts to fade, it is often down to a lack of competitive business intelligence or intelligence being used more effectively by competitors.

There is a plethora of business information systems, with dashboards aplenty, offering to provide you with useful business analytics. These are all well and good, but with some human intelligence, and a little military know-how, you can gain an even greater competitive edge.
Gaining and keeping that competitive edge over competitors is a constant process, a bit like an endless war. It is hard to win the war if you do not identify and respond to threats by utilising competitive business intelligence methods and tools, in particular human intelligence.

Human Intelligence is an information collection discipline that, contrary to common belief, does not involve clandestine operations. “Intelligence is information that has been collected from open and sensitive sources that result in the production of value-added information available for use by decision-makers”

Information has a value, it can be tangible or intangible. Information can be stored or simply be an idea and every information has a source. The root source of that information is typically a person, not a piece of hardware or software.

Furthermore, we should define the ‘document’ related to the information in terms of its known source, author and validity.

Today’s internet driven world is an open market of information, accessible to anyone at any given moment. You can usually find as much as you’d like to know about someone and they as much about you at the touch of a button.

It is hard to hide information and the electronic collection of open source intelligence (OSINT) is usually combined with some data analysis software. We witness every day how, despite all this information, the global market can be unpredictable and volatile. Most corporations struggle to respond to critical situations and those that prevail have the right information about the product, company, country, economic situation and they know how to use it.

My military intelligence training showed me that gaining a winning competitive edge is not so much about super-fast computers and superior products, but about understanding the power of information and recognising the true value of key pieces.

Most large businesses deploy and utilise a vast amount of hardware and software to analyse open source information. The real question is whether that hardware and software can truly decide about Source reliability and Information Validity. Of course, they struggle and that is the point where the human intelligence discipline comes into its own.

When we talk about competitive business intelligence there are three types strategic, tactical and operational. Needless to say, the terms derive from military intelligence jargon, however some corporations will use more business terminology like forensic intelligence, field intelligence or investigative intelligence.

The three types of intelligence used by corporations, agencies, marketers and polling companies alike can be described as:

Strategic Intelligence – “seeing beyond horizon”, this type of intelligence provides insights which assist in creating responses, policies, procedures, marketing and sales. The prime usage of strategic intelligence is in creating successful long-term corporation objectives.
Operational Intelligence – is an intelligence product which support corporations in preventing fraud, IP theft and criminal activities as well as managing resources in order to achieve operational key objectives.

Tactical Intelligence – this type of intelligence supports immediate corporations’ requirements such as investigations or understanding a competitor’s move in the market which require an immediate response.

By adopting human intelligence as a part of competitive business intelligence in a corporation the process begins and ends with a decision maker. With the help of some military know-how, the human intelligence officer helps guide the decision-making process and highlight the truly key pieces of intelligence.

The result, the organisation is able to build and maintain a competitive advantage and have the winning edge over its competitors.

Mario Bekes
Director, Insight Intelligence

Don’t forget the human – fighting industrial espionage and cyber crime

Human Intelligence Applications and Methods

By Mario Bekes, Director Insight Intelligence

Industrial espionage has been in the news again recently with various reports about Huwaei’s activities1. At a time when businesses are investing multiple millions of dollars in data protection systems, are they overlooking some of the most basic forms of intelligence gathering devices – humans?

One way or another, people are often responsible for a loss, often inadvertently. Military intelligence has long used activities, often termed ‘social engineering’, to capture sources of information. These activities have since been adapted by both government intelligence organisations and corporate intelligence.

Social engineering is the art of manipulating people to obtain confidential information such as gathering data about a product, the financial position of the company, future projects and its development. This can be done in person or electronically and activities range from social media engagement, networking with employees, chatting at the gym, posing as a buyer or investor, contacting relatives or friends, looking at discarded documents or recovering data from old IT equipment.

In today’s corporate world you might recognise many of these behaviours as standard networking activities. Indeed, one of the rules for intelligence operatives it is to utilise networking events as much possible in order to create their own sources of information.

This is not to say that all networking type activities are bad, but people need to be aware of the risks. This can be particularly hard to manage when it comes to ex-employees talking about sensitive information.

The weakest link in the security chain is usually the human who accepts a person or scenario at face value and unwittingly becomes the source of information from which no IT security measures will be able to protect your blue prints, ideas and products.

At Insight Intelligence, we’ve found companies rarely spend 1% of their IT security budget on policies, procedures, awareness and education to improve people security. Some of the simplest elements of what we term a ‘human firewall’ to implement are:

  • Educate people about phishing and other dangerous emails
  • Only allow certain people access to sensitive information
  • Train employees to be aware of questions at meetings/networking events that may be suspicious
  • Reinforce company polices about safeguarding company information (and having a policy in the first place)

A human firewall should be one of your first defences. Just ask Mastercard and Disney. They were lucky that Visa is a good enough corporate citizen not purchase the sensitive information offered by a catering employee about a major deal being discussed by its main competitor, Mastercard2.

No matter how many thousands of dollars are spent on your IT security, these risk management steps, aimed at people, will significantly boost the effectiveness of your human firewall. Thus, helping better protect your assets, the future of your business and the livelihoods of your employees.

  1. https://www.wired.com/story/huaweis-many-troubles-bans-alleged-spies-backdoors/
  2. https://www.nytimes.com/2001/03/22/business/food-worker-is-accused-of-corporate-espionage.html

Trash Intelligence

All Intelligence is information, not all information is intelligence (Lowenthal, 2000)

Trash can be a valuable source of intelligence but how can it be of value and what are the dangers people and businesses need to watch out for? In this article, we look at how to structure the management of intelligence and what you need to know about Trash intelligence.

In today’s business and government environment, using intelligence is vital to make plans for the future and to predict, understand and spot/isolate threats. Intelligence consists of information, both tangible or intangible. These can be anything from blue prints, product information and client details to pricing and even ideas.

A vast amount of money is understandably poured into the IT sector in order safeguard intellectual property and other information. Often there is also an extensive effort directed to social media monitoring to learn who is who, who says what and to whom.

Despite the fact most information resides on clouds, servers and other forms of digital storage, we still print, make notes, and send messages, be it electronically or via paper.

What most companies and other sectors disregard is the Human Intelligence factor which also play a very crucial role in the society we live. One reason for this our focus on digital threats and ignorance about garbage. Garbage can be a very valuable source to people seeking intelligence.

So, what defines this garbage or trash? By trash we mean:

  • rubbish or waste, especially domestic refuse
  • seemingly worthless or meaningless material or ideas
  • unwanted data in a computer’s memory

Purpose of the Intelligence Cycle

The Intelligence Cycle is designed to assist intelligence agencies and analysts to gain useful information that can help identify threats. More sophisticated criminals also use forms of the intelligence cycle, typically for extortion-based crime.

The Intelligence Management Cycle consists of 5 elements:

  • Planning (deciding the key objective)
  • Collecting (how, when, who, where and why)
  • Analysing
  • Dissemination
  • Recommendations

The Intelligence Cycle differs from Counterintelligence due to its proactive approach, Counterintelligence is reactive in nature. The first step in the Intelligence Management Cycle is Planning. Planning is about deciding the key objective and then the Intelligence Management Cycle moves onto the next step of information collection.

There are a myriad of ways raw intelligence data is collected and then, through the intelligence cycle, it is analysed and converted into useful intelligence and presented to decision makers.

Trash Intelligence

This comes into play during the collection point of the Intelligence Management Cycle.

Typically, intelligence analysts (government, corporate or even criminal) will try to find the most inexpensive and reliable source of information.

Human Intelligence activity consists of different methods, surveillance, countersurveillance, intelligence operatives, informants, technical means, etc, and has one key objective that is to collect intelligence (information) based on the intelligence objective.

A method often overlooked, and one of the most inexpensive forms of intelligence gathering, is trash intelligence, or as we call it “TrashInt”. This is intelligence collection through searching someone else’s garbage or waste.

Most people will see garbage as having no value, hence it being considered trash.

There is a surprising range of things that end up in the trash, including tax file details, invoices, receipts, work documents, blue prints and digital storage devices. Trash intelligence includes digital items too. More than likely, we have all replaced our computer, phone or tablet. All digital devices contain data and this frequently remains on hard drives and devices. Research we carried out a few years ago found 15 out of 52 second-hand hard drives purchased on the open market contained highly sensitive personal data including bank account details, medical information and home addresses.

Trash Intelligence doesn’t only assist intelligence and law enforcement agencies in the profiling of suspects, but it can give criminals a considerable about of very personal or sensitive business data.

Legality of Trash Intelligence

In case you were wondering whether it is legal to search someone’s trash, if the bins are on a private/business premises then it is illegal without a search warrant. This is also true of secure, locked bins. However, once garbage is on a street or in a public premise, it is not illegal.

Conclusion

The most common approach in the protection of information, intellectual property and blue prints etc is through digital security. Clearly this is important, but we must not forget what the weakest link is often humans and what they leave unprotected.

Do not forget the human aspect. Understanding the way intelligence is gathered and used can assist in finding information or keeping it hidden. Not paying attention to your trash can make you extremely vulnerable to criminal activity that could easily find some of your most personal
information and use it against you.

Using military know-how to reduce your reputational risk

Reputational risk, and how to mitigate it, is a frequent topic at the boardroom table. It is a risk which could affect anyone, particularly high profile corporations and government agencies. The impacts are wide ranging including financial loss, lost revenue, increased operating and regulatory costs and most importantly loss of trust from the local community, stakeholders and customers.

Reputation damage is the highest rated risk according to 1,400 risk management professionals in 60 countries (Aon Global Risk Management Survey 2015)*. Many companies have put significant resources into reputational risk planning and there are large numbers of case studies highlighting both the good and bad in managing reputational issues.

We’ve all heard stories of the consequences of a damaged reputation. One of the most famous being when the CEO, Gerald Ratner of massive UK jewellery retailer, Ratners, called his products “total crap” – wiping GBP500m off the value of his business and bringing it to its knees. On the flip side, Halifax Bank of Scotland’s swiftly deployed its crisis management capabilities when false market rumours regarding liquidity issues at the UK bank caused shares to fall by 17% in just 10 minutes of trading led to a coordinated, global response. It enabled the bank to promptly and unambiguously deny the rumours, with the Bank of England moving to reject speculation of a liquidity crisis and reassure the marketplace. The share price recovered 10% by the end of the day.

There are sound templates available to help companies structure and manage risk issues and at leading commercial investigations firm, Insight Intelligence, we believe there are some keys areas where companies should place particular attention and help can come from a rather surprising source. Namely, military intelligence.

When your reputation spirals out of control, loss of revenue and brand become inevitable. According to a Wharton study, it takes a whopping 80 weeks for stock prices to recover from a sudden price drop^. The instant exchange of information in today’s social media society means managing reputations requires a cool head in times of crisis and some particular skills in deciphering the key information to focus on and how to respond.

Reputations can be diminished or even destroyed by just a few key strokes on social media, whether the original intentions are spiteful or not. The broader public applies little grading and valuation to the source of information, instead that information often becomes the ignition of speculation.

Here is where some military intelligence know-how comes into its own. Counterintelligence operatives are trained in the art of filtering information, determining its importance and developing the most appropriate response. Armed with this knowledge, organisations and high profile individuals are much better equipped to swiftly and effectively respond to a reputational threat.

For example, when you are getting dozens, if not hundreds, of social media comments from various places in the blink of an eye, a well-drilled plan that is executed with precision makes all the difference.

So, what does military intelligence help look like in practice? The following 5 key areas of reputational risk management are all improved by a ‘spy’s eye’:

1. Preparation

Expect the unexpected. Do not wait for crisis to escalate, instead prepare a risk management plan on how to deal with reputational risk and perform regular training with key staff and employees in general. You should aim to include a level of automation so you can deliver the maximum response with minimum impact. Remember, by acting immediately, as in the Halifax Bank of Scotland case, damage can be successfully minimised. Every minute is important, especially at the start of a crisis. Do not wait hours or days.

You probably don’t know when or where something will come from to damage your reputation but you can have your action plan ready to go.

2. Training

Carry out realistic training, something the military do constantly. Real scenario-based training has a massive impact on people’s understanding of the impact an event can have and how a clear, simple plan makes a massive difference. Companies should create a ‘War Room’, real and virtual, which can be fully dedicated, equipped and manned at any time.

3. Monitoring

Every organisation or public figure should develop tools which allow continuous monitoring of internal and external information flows. From this, projections are created on likely issues. Monitoring can be by software, investigative methods, surveillance, marketing surveys as well as building business relationships with social media companies.

4. Counterintelligence

Organise a team within your company which will be able to collect, analyse and disseminate data about reputational risks. The military use what they term an ‘intelligence cycle’ for this structured approach. Employing intelligence collection officers with experience of investigations and human intelligence will add a robust, effective winning edge in controlling information flows.

5. Social Media and Cyber Protection Responsibility

It is important for every company to build, develop and implement stronger policies and procedures to create a safe environment and strengthen IT infrastructure to reduce cyber threats. You need to include a process for regularly checking websites and social media accounts for hacking vulnerability. You also need to make sure you have all the passwords – it is surprising how many firms we see who’s passwords are left in the hands of a single, junior member of staff!

Every crisis situation could affect your reputation. However, every crisis also creates an opportunity to rebound and emerge stronger. Learning from mistakes is an important lesson, but just ask Gerald Ratner whether he would rather have not made his mistake in the first place!

Protecting company reputations is an ongoing task. It is hard but it is achievable. There is no 100% bulletproof system to prevent reputational risk damage, however organising and deploying a professional team of experts, preferably with the involvement of your insurance company, dramatically reduces its impact.

It may sound like something out of a movie script, but the tools and techniques that military intelligence has been honing for years should be harnessed by corporations. The Number One boardroom risk needs to be matched by a Number One response.

Understanding Key Intelligence Needs (Surveillance Investigations)

In our current environment the key to survival for an organisation depends on their ability to see the bigger picture and this is particularly so for insurance companies and claims agencies.

Claims are ongoing on a daily basis regardless if it is worker’s compensation, life insurance, public liability or third party and these will be a loss for the organisation in a monetary and or productivity level.

Insurance companies or any other corporation that has the need for surveillance investigation must prior to conducting a surveillance investigation need to determine what is the objective and what information is to be obtained from social engineering about the claimant in order to produce a quality intelligence finding that is the backbone for a successful investigation. Without determining what is the objective and what information is to be collected, any investigation not just the surveillance is set to fail and this will result in additional costs to the organisation.

Fraudulent claims are unfortunately a daily occurrence, it is happening and it will continue to happen. A fraudulent claimant will develop new skills, they work hard at getting new information, learning new techniques and tactics on how to avoid to be under surveillance, being undetected or how to go about ensuring that a surveillance becomes illegal.

Why are fraudulent claims not detected? It is very simple; they know what you need to see to approve their claim.

Saying that the claims managers must understand and must keep up to date with new trends on the market on how fraudulent claims occur. The claims managers need to know how the social environment and changes in the claimant’s social behaviour could be a fraudulent claim. By not being aware of these practices can create losses and increase costs for the corporations and insurance companies.

Surveillance Investigation is a most effective way of investigating POI’s (person of interest) and best way to not approve or decline the claim and recuperate losses via legal channels.

The most fundamental concept of an investigation for any organisation is the intelligence cycle: planning, gathering, analysis and dissemination. This cycle contains all of the elements required to produce actionable surveillance investigations.

By developing the Intelligence Cycle and Action Plan for Surveillance Investigations it will certainly create a new base for reducing fraudulent claims due to the fact that you will know more about how to analyse intelligence in preventing fraud and setting up a benchmark for your organisation in reducing losses and costs.

Planning investigation will consist mostly from tactical information collected. Tactical intelligence will not assist case managers in making the ultimate decision and that information will not predict future social behaviour or social environment of fraudulent claims, however it will determine the decision if surveillance investigation is needed and when to start.

Gathering intelligence or the collection plan is very important part of the intelligence cycle, due to the fact that case managers will collect information from open sources about the claimant and as well it is important to grade the intelligence information collected on whether it’s from a reliable source. It is very important that case managers be creative and not to rely on some sources of information as it can be deceiving.

Analysis Analysis is the intelligence process which converts raw data and information into intelligence making it available for analysis. Processing includes validating data and making key points about the claimant, social behaviour and environment. Analysed intelligence can be used later for actioning: comparing previous claims, trends, social behaviour etc.

Dissemination is the process where the case managers provide in the form of a referral on information about the claim, the claimant and the objective, precisely stipulating how and when the surveillance is to be conducted.

Applying Intelligence Cycle and Actioning Plan for Surveillance Investigations, will with no doubt bring results desirable for your organisation.

Information converted into intelligence can be used in Strategic Intelligence Cycle which will certainly make case managers jobs easier and prevent fraudulent cases and reduce costs and losses for the organisations and insurance companies