Printer Friendly

Eye on intelligence.

In the coming years, a greater reliance will be placed on corporate security experts. This was a central theme of Lt. Col. Oliver North's (Ret.) speech at "Onto the 21st Century: Corporate Intelligence Concerns," a symposium held at Shenandoah University in Winchester, VA, April 23-25.

North, who is now chairman of Guardian Technologies International in McLean, VA, said, "It is more than just a matter of protecting the front door or back door." A security professional must know the vulnerabilities of his or her company's products or services to protect them from industrial espionage. He advised security professionals to learn about new technologies by subscribing to publications that deal with technologies such as smart cards and biometrics.

North also discussed trends that could affect security's role in the '90s and into the 21st century. One trend is the national and international growth of violent, rampant nationalists. Another is the breakdown of the Middle East peace process.

North predicted that the number of radical environmentalists will increase. In addition, these individuals or groups may pose significant long-term risks to certain American companies - particularly to the assets and resources necessary to these companies.

The last trend North discussed was an increase in economic espionage. It will become increasingly important for businesses, both from a collection and a protection perspective, to know what other businesses are doing, he said.

John Strauchs, CPP, principal Of Systech Group Inc. in Reston, VA, also spoke at the corporate intelligence symposium. Strauchs reinforced North's points by noting that companies will become active in intelligence or information gathering.

Strauchs noted that controlling exits is vital to protecting internal intelligence. He said, "It is important to know who goes where, when, and for how long." Strauchs also gave the following suggestions for protecting corporate intelligence:

* Use security systems that are difficult to counterfeit.

* For particularly sensitive areas in a facility, don't create signposts such as * restricted area" signs. Instead, use color coding.

* Keep electrical cabinets - mainly those that control security - locked and color coded.

* Use biometric technology for extremely sensitive areas in a facility.

* Implement a screening program for material leaving a facility.

Strauchs added that security professionals "must think that [intelligence gathering] will be surreptitious and no trace of the activity will be left."
COPYRIGHT 1992 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 1992 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:security consultants
Publication:Security Management
Date:Jul 1, 1992
Previous Article:Sometimes bigger is better.
Next Article:No biometric is an island.

Related Articles
New office set to gauge level of export interest.
Market research in Japan: it's one of the world's biggest consumer markets, but when it comes to market research, Japan is way behind. Now two...
Network Intelligence delivers next-gen security event management appliances.
What is homeland security?

Terms of use | Copyright © 2017 Farlex, Inc. | Feedback | For webmasters