Skip to main content
Log in

HUMINT: Combating corporate crime with a counter-terrorism methodology

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

This study examines how corporations can employ HUMINT (that is, counter-terror intelligence techniques based on human sources) to identify corporate-wide fraud patterns. Embedded in the newly created HUMINT teams of two large corporations, the researchers collected data through in-depth interviews, on-site observations and document analysis. The findings highlight three lessons. First, the corporate HUMINT project's sponsor must be a senior executive who is held personally responsible for security breaches and who has tried many other methods with little success before adopting HUMINT. Second, the HUMINT team should focus on identifying corporate-wide fraud patterns rather than target individual perpetrators. To do so, the HUMINT team must develop its ‘knowledge networks’ early on and long before a specific security breach is identified. Finally, the HUMINT team must educate employees to provide only that information which they feel comfortable in sharing. The HUMINT team must also reach beyond the borders of the corporation and include former employees and vendors in its ‘knowledge networks.’ Additional research is needed to compare the success and failure of HUMINT projects with more traditional corporate anti-fraud programs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1

Similar content being viewed by others

Notes

  1. The Sarbanes–Oxley Public Accounting Reform and Investor Protection Act of 2002 mandated far-reaching reforms designed to combat corporate fraud. Today, the CEO and CFO of publicly traded companies must take personal responsibility for the efficacy of internal controls, fraud disclosure and certification of financial report accuracy. Moreover, according to Section 301 of the legislation, firms are now required to establish anonymous hotlines accessible to company employees as well as third parties (such as vendors) and consumers to report suspected unethical activities.

References

  • Agarwal, K.N. (2006) Competitive intelligence in business decisions – An overview. Competitive Forum 4 (2): 309–314.

    Google Scholar 

  • Association of Certified Fraud Examiners. (2006) Report to the nation on occupational fraud and abuse, http://www.Acfe.Com/Fraud/Report.Asp, accessed 17 September 2007.

  • Bond, P. (2004) Big brother likely to be the big boss. The Atlanta Journal-Constitution. Saturday, 27 March: 1.

  • Brindley, W.A. and Laomea, P.K. (1998) A war room can be heaven. The Journal of Business Strategy 19 (5): 47–50.

    Article  Google Scholar 

  • Caldwell, F. (2005) Sarbanes–Oxley compliance hits 15 percent of the 2006 IT budget, http://www.Gartner.com/DisplayDocument?id=487387, accessed 17 September 2007.

  • Cowan, D. (1994) Good information – Generals cannot do without it: Why do CEOs think they can? Marketing Intelligence & Planning 12 (11): 16–21.

    Article  Google Scholar 

  • Desouza, K.C. and Vanapalli, G. (2006) Securing knowledge in organizations: Lessons from the defense and intelligence sectors. International Journal of Information Management 25 (1): 85–98.

    Article  Google Scholar 

  • Durant, A. and Witts, A. (2004) The war on fraud. The Lawyer. Monday, 8 March: 29.

  • Fahey, L. (2007) Connecting strategy and competitive intelligence: Refocusing intelligence to produce critical strategy inputs. Strategy & Leadership 35 (1): 4–12.

    Article  Google Scholar 

  • Fahey, L. and Herring, J. (2007) Intelligence teams. Strategy & Leadership 35 (1): 13–20.

    Article  Google Scholar 

  • Frei, F.X. and Rodriguez-Farrar, H. (2001) Fraud Prevention at Omni Bank. HBS 9-602-068, http://www.hbsp.harvard.edu/hbsp/case_studies.jsp, accessed 17 September 2007.

  • Gilad, B. (2004) Early Warning – Using Competitive Intelligence to Anticipate Market Shifts, Control Risk and Create Powerful Strategies. New York: Amacom – American Management Association.

    Google Scholar 

  • Johnson, D. and Frank, J. (2006) Collaborative early warning. Competitive Intelligence Magazine 9 (1): 35–37.

    Google Scholar 

  • Kaplan, R.S. and Kiron, D. (2004) Accounting Fraud at Worldcom. HBS No. 9-104-071, http://www.hbsp.harvard.edu/hbsp/case_studies.jsp, accessed 17 September 2007.

  • Kolar, T. (2007) Military transformations and marketing strategy craftsmanship. International Journal of Management and Enterprise Development 4 (5): 552–561.

    Article  Google Scholar 

  • Marteniuk, J. (2003) How Do Companies Find the Best Balance Between the Technical and Personal in Effective Competitive Intelligence Systems? In: C.S. Fleisher and D.L. Blenkorn (eds.) Controversies in Competitive Intelligence: The Enduring Issues. Westport, CT: Praeger Publishers.

    Google Scholar 

  • Martin, A.P. (2002) Harnessing the Power of Intelligence, Counterintelligence & Surprise Events. Cambridge, MA: executive.Org.

    Google Scholar 

  • McCandless, B. (2003) What Key Learning Should Corporate Competitive Intelligence Specialists Acquire from their Military Intelligence Counterparts? In: C.S. Fleisher and D.L. Blenkorn (eds.) Controversies in Competitive Intelligence: The Enduring Issues. Westview, CT: Praeger Publishers.

    Google Scholar 

  • McDermott, R. (1999) Why information technology inspired but cannot deliver knowledge management. California Management Review 41 (41): 103–114.

    Article  Google Scholar 

  • McGee, K. (2004) Give me that real-time information. Harvard Business Review 82 (4): 26.

    Google Scholar 

  • McTamaney, R.A. (2002) The Sarbanes–Oxley Act of 2002: Will it prevent future ‘Enrons?’. Legal Backgrounder, http://www.Clm.Com/Docs/8-9-02mctamaney.Pdf, accessed 17 September 2007.

  • Niehoff, J.T. (2004) Preventive measures to detect fraud improve. Texas Lawyer 19 (44): 26.

    Google Scholar 

  • Nord, G.D., McCubbins, T.F. and Nord, J.H. (2006) E-monitoring in the workplace: Privacy, legislation, and surveillance software. Communications of the ACM 49 (8): 72–77.

    Article  Google Scholar 

  • Pech, R.J. and Durden, G.D. (2003) Manoeuvre warfare: A new military paradigm for business decision making. Management Decision 41 (2): 168–179.

    Article  Google Scholar 

  • Roberts, B. and Koumpis, A. (2004) A framework for situation room analysis and exploration of its application potential in the information technologies market. Management Decision 42 (7): 882–891.

    Article  Google Scholar 

  • Soo, C., Devinney, T., Midgley, D. and Deering, A. (2002) Knowledge management: Philosophy, processes, and pitfalls. California Management Review 44 (4): 129–150.

    Article  Google Scholar 

  • Sparks, J.D. (2004) We're watching you. Want some privacy? Don't leave your house. Dallas Observer News, 8 April, http://www.dallasobserver.com/2004-04-08/news/we-re-watching-you/, accessed 17 September 2007.

  • Stauffer, D. (2003) The power of competitive intelligence. Harvard Management Update 8 (10): 3–4.

    Google Scholar 

  • Stein, M. (2004) The Sarbanes–Oxley Act Of 2002: Compliance or opportunity for competitive advantage? DM Direct Newsletter, http://www.information-management.com/infodirect/20040611/1004810-1.html, accessed 17 September 2007.

  • Swartz, N. (2005) Competitive intelligence underutilized. Information Management Journal 39 (3): 10.

    Google Scholar 

  • Swartz, N. (2007) Gartner warns firms of ‘dirty data’. Information Management Journal 41 (3): 6.

    Google Scholar 

  • Tafti, A., Mithas, S. and Krishnan, M.S. (2007) Information technology and the autonomy–control duality: Toward a theory. Journal Information Technology and Management 8 (2): 147–166.

    Article  Google Scholar 

  • Watkins, S.S. (2003) Ethical conflicts in Enron: Moral responsibility in corporate capitalism. California Management Review 45 (4): 6–19.

    Article  Google Scholar 

  • Wen, H.J. and Gershuny, P. (2005) Computer-based monitoring in the American workplace: Surveillance technologies and legal challenges. Human Systems Management 24 (2): 165–173.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Peled, A., Dror, H. HUMINT: Combating corporate crime with a counter-terrorism methodology. Secur J 23, 320–331 (2010). https://doi.org/10.1057/sj.2008.24

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2008.24

Keywords

Navigation