Abstract
This study examines how corporations can employ HUMINT (that is, counter-terror intelligence techniques based on human sources) to identify corporate-wide fraud patterns. Embedded in the newly created HUMINT teams of two large corporations, the researchers collected data through in-depth interviews, on-site observations and document analysis. The findings highlight three lessons. First, the corporate HUMINT project's sponsor must be a senior executive who is held personally responsible for security breaches and who has tried many other methods with little success before adopting HUMINT. Second, the HUMINT team should focus on identifying corporate-wide fraud patterns rather than target individual perpetrators. To do so, the HUMINT team must develop its ‘knowledge networks’ early on and long before a specific security breach is identified. Finally, the HUMINT team must educate employees to provide only that information which they feel comfortable in sharing. The HUMINT team must also reach beyond the borders of the corporation and include former employees and vendors in its ‘knowledge networks.’ Additional research is needed to compare the success and failure of HUMINT projects with more traditional corporate anti-fraud programs.
Similar content being viewed by others
Notes
The Sarbanes–Oxley Public Accounting Reform and Investor Protection Act of 2002 mandated far-reaching reforms designed to combat corporate fraud. Today, the CEO and CFO of publicly traded companies must take personal responsibility for the efficacy of internal controls, fraud disclosure and certification of financial report accuracy. Moreover, according to Section 301 of the legislation, firms are now required to establish anonymous hotlines accessible to company employees as well as third parties (such as vendors) and consumers to report suspected unethical activities.
References
Agarwal, K.N. (2006) Competitive intelligence in business decisions – An overview. Competitive Forum 4 (2): 309–314.
Association of Certified Fraud Examiners. (2006) Report to the nation on occupational fraud and abuse, http://www.Acfe.Com/Fraud/Report.Asp, accessed 17 September 2007.
Bond, P. (2004) Big brother likely to be the big boss. The Atlanta Journal-Constitution. Saturday, 27 March: 1.
Brindley, W.A. and Laomea, P.K. (1998) A war room can be heaven. The Journal of Business Strategy 19 (5): 47–50.
Caldwell, F. (2005) Sarbanes–Oxley compliance hits 15 percent of the 2006 IT budget, http://www.Gartner.com/DisplayDocument?id=487387, accessed 17 September 2007.
Cowan, D. (1994) Good information – Generals cannot do without it: Why do CEOs think they can? Marketing Intelligence & Planning 12 (11): 16–21.
Desouza, K.C. and Vanapalli, G. (2006) Securing knowledge in organizations: Lessons from the defense and intelligence sectors. International Journal of Information Management 25 (1): 85–98.
Durant, A. and Witts, A. (2004) The war on fraud. The Lawyer. Monday, 8 March: 29.
Fahey, L. (2007) Connecting strategy and competitive intelligence: Refocusing intelligence to produce critical strategy inputs. Strategy & Leadership 35 (1): 4–12.
Fahey, L. and Herring, J. (2007) Intelligence teams. Strategy & Leadership 35 (1): 13–20.
Frei, F.X. and Rodriguez-Farrar, H. (2001) Fraud Prevention at Omni Bank. HBS 9-602-068, http://www.hbsp.harvard.edu/hbsp/case_studies.jsp, accessed 17 September 2007.
Gilad, B. (2004) Early Warning – Using Competitive Intelligence to Anticipate Market Shifts, Control Risk and Create Powerful Strategies. New York: Amacom – American Management Association.
Johnson, D. and Frank, J. (2006) Collaborative early warning. Competitive Intelligence Magazine 9 (1): 35–37.
Kaplan, R.S. and Kiron, D. (2004) Accounting Fraud at Worldcom. HBS No. 9-104-071, http://www.hbsp.harvard.edu/hbsp/case_studies.jsp, accessed 17 September 2007.
Kolar, T. (2007) Military transformations and marketing strategy craftsmanship. International Journal of Management and Enterprise Development 4 (5): 552–561.
Marteniuk, J. (2003) How Do Companies Find the Best Balance Between the Technical and Personal in Effective Competitive Intelligence Systems? In: C.S. Fleisher and D.L. Blenkorn (eds.) Controversies in Competitive Intelligence: The Enduring Issues. Westport, CT: Praeger Publishers.
Martin, A.P. (2002) Harnessing the Power of Intelligence, Counterintelligence & Surprise Events. Cambridge, MA: executive.Org.
McCandless, B. (2003) What Key Learning Should Corporate Competitive Intelligence Specialists Acquire from their Military Intelligence Counterparts? In: C.S. Fleisher and D.L. Blenkorn (eds.) Controversies in Competitive Intelligence: The Enduring Issues. Westview, CT: Praeger Publishers.
McDermott, R. (1999) Why information technology inspired but cannot deliver knowledge management. California Management Review 41 (41): 103–114.
McGee, K. (2004) Give me that real-time information. Harvard Business Review 82 (4): 26.
McTamaney, R.A. (2002) The Sarbanes–Oxley Act of 2002: Will it prevent future ‘Enrons?’. Legal Backgrounder, http://www.Clm.Com/Docs/8-9-02mctamaney.Pdf, accessed 17 September 2007.
Niehoff, J.T. (2004) Preventive measures to detect fraud improve. Texas Lawyer 19 (44): 26.
Nord, G.D., McCubbins, T.F. and Nord, J.H. (2006) E-monitoring in the workplace: Privacy, legislation, and surveillance software. Communications of the ACM 49 (8): 72–77.
Pech, R.J. and Durden, G.D. (2003) Manoeuvre warfare: A new military paradigm for business decision making. Management Decision 41 (2): 168–179.
Roberts, B. and Koumpis, A. (2004) A framework for situation room analysis and exploration of its application potential in the information technologies market. Management Decision 42 (7): 882–891.
Soo, C., Devinney, T., Midgley, D. and Deering, A. (2002) Knowledge management: Philosophy, processes, and pitfalls. California Management Review 44 (4): 129–150.
Sparks, J.D. (2004) We're watching you. Want some privacy? Don't leave your house. Dallas Observer News, 8 April, http://www.dallasobserver.com/2004-04-08/news/we-re-watching-you/, accessed 17 September 2007.
Stauffer, D. (2003) The power of competitive intelligence. Harvard Management Update 8 (10): 3–4.
Stein, M. (2004) The Sarbanes–Oxley Act Of 2002: Compliance or opportunity for competitive advantage? DM Direct Newsletter, http://www.information-management.com/infodirect/20040611/1004810-1.html, accessed 17 September 2007.
Swartz, N. (2005) Competitive intelligence underutilized. Information Management Journal 39 (3): 10.
Swartz, N. (2007) Gartner warns firms of ‘dirty data’. Information Management Journal 41 (3): 6.
Tafti, A., Mithas, S. and Krishnan, M.S. (2007) Information technology and the autonomy–control duality: Toward a theory. Journal Information Technology and Management 8 (2): 147–166.
Watkins, S.S. (2003) Ethical conflicts in Enron: Moral responsibility in corporate capitalism. California Management Review 45 (4): 6–19.
Wen, H.J. and Gershuny, P. (2005) Computer-based monitoring in the American workplace: Surveillance technologies and legal challenges. Human Systems Management 24 (2): 165–173.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Peled, A., Dror, H. HUMINT: Combating corporate crime with a counter-terrorism methodology. Secur J 23, 320–331 (2010). https://doi.org/10.1057/sj.2008.24
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2008.24