Working on planes is not smart – here’s why

We are all dependent on portable devices for our work and our social lives. Using them in public settings, especially airports, planes and trains provides the perfect opportunity for criminals to access your information – and they don’t even need your passwords. Recent trips of mine have confirmed how the best cyber security arrangements count for once employees leave their taxis and enter airports to get on planes.

As restrictions are starting to relax, we are seeing commuting for both work and personal reasons start to increase again. After two years of working from home, people are seizing the opportunity for face-to-face meetings with clients, peers and employees.

Working from home has seen its own privacy challenges with more people using their own networks and devices that are typically outside the company’s firewall. We saw an increased number of fraudulent activities from identity theft, hacking accounts and phishing – the list goes on.

The restart of business travel brings with it the privacy challenges of using portable devices on the move.

It is important to know the modus operandi for how perpetrators access your information.

Information theft usually occurs out of sight. It will happen outside of your peripheral view. Due to most people’s lack of interest in the environment around them, for example on a plane, they can be particularly vulnerable.

As soon as businesspeople start traveling, perpetrators have easier access to you and the information you are carrying. One method is via social engineering (malicious activities accomplished through human interactions) and another is from observing your screen and perhaps utilising some type of surveillance method (video, imagery, eavesdropping).

Things become more interesting as soon as two or more people from a company travel together. They inevitably openly discuss work, share documents and other information in the cabin. For those sitting close, it is almost impossible not to learn sensitive information. Just think of your last flight, I bet you inadvertently found yourself listening to a work conversation or watching someone working on a laptop.

I see corporations spend tremendous amounts of money on the technical and mechanical protection of company information (cyber security), while neglecting one of oldest and best field-tested form of intelligence gathering operations – human intelligence.

If you couple social engineering, which occurs way more than you realise, together with a lack of employee training, education and preventative methods, there is no doubt in my mind that working at an airport, on a plane, train or bus will be a heightened focus for perpetrators.

After all, if information theft occurs on plane or at an airport, it is most likely to never be discovered or investigated. Most importantly corporations will not know how to implement processes to

protect data when they do not know how it has been compromised. In these environments, perpetrators do not need your password, after all you are willingly sharing your screen and having conversations/calls about sensitive information.

Recent trips of mine just confirmed how few prevention techniques are being followed once employees happily leave their taxis at the airport and move through onto the aeroplane. The investigation of information theft is a difficult and costly process. You should be your own strongest link by being more aware of your environment and being your own human firewall to prevent information theft.

 

 

Social Media Platforms and Information Response

Many of you will remember December 2010, when a Tunisian produce vendor set himself on fire and sparked what became known as the Arab Spring. The name stemmed from the ‘People’s Spring’ and ‘Prague Spring’ that described movements towards democracy, rather than the time of year per se.

The success of the Arab uprising is often put down to the social media platforms used by the citizens of Tunisia, Egypt and other countries, to share their experiences of tyranny and turmoil. However, social media was just a one of many tools which inspired millions to revolt against their governments.

On 28 January 2011, the Egyptian government shut down social media platforms and later the entire internet, but the revolution and uprising continued to spread like wildfire.

So, how did the uprising continue despite the shutting down of social media platforms and the internet taking away the major tools of the uprising?

To answer this question, we can go further into history and analyse how the Prague Spring developed in Czechoslovakia, despite the absence of social media and with the State’s tight control of media and newspapers.

The answer is simple, today we depend on social media platforms to be educated, informed and to share our opinions or disagreements. What social media platforms miss are the true opinion of the populous. For example, few of us would consider a social media poll to be 100% truthful, so, you never know exactly what people are thinking.

Both the Prague and Arab uprisings shared common information dissemination. That is ‘analogue’ intelligence, the discussions between humans at places and times where people gather over drinks or social engagements. That is how information was disseminated without the assistance of social media platforms. Word of mouth is also more powerful for one reason.

Words are converted into information and when spoken from person to person they can be weaponised by adding emotions.

I remember as a kid in what was then communist Yugoslavia, my father used to hide in the bath, under blankets, to listen to the Voice of America to learn what was happening in Poland during its martial law in 1981. He would then quietly speak with a few neighbours during the

day, to discuss how to get rid of communism in Yugoslavia. That is how information was transferred from one person to another.

Even today, the power of information is not only on social media platforms. Every information has a source which is human. Regardless of how it is positioned on social media, the question needs to be what is the value of that information, the validity of its source validity and its reliability?

In recent history, we saw how the social media platforms that helped start the Red Shirt movement in Thailand, become a threat. They ended up building their own electronic logistical network for sharing and disseminating information to their followers.

If you compare the world 30 or 40 years ago when social media platforms literally didn’t exist, much information would have been passed from person to person in social environments such a workplace, homes, family gatherings, making it hard for communist countries, like the one I was brought up in, to monitor what and who said what.

Information that was placed into the broader public with intent was the most damaging, which was why communist states intelligence was inaccurate or misleading.

Decision making should be based on the elements of validity and the reliability of the source and to take into consideration the fact that every source is human. Social media platforms are only a tool for information distribution.

Those looking to understand public sentiment for corporate or government use, through the recording of information, its sources, validity and reliability should always include field intelligence methods and not simply rely on electronic media.

It is also important to understand that information collected today may not be valid tomorrow.

The success of this information collation to organisations depends on how you collect and analyse the source and reliability, to drive strategic planning and inform the tactical response of your organisation.

 

 

Disinformation and Misinformation – the dark sides of information

Mainstream media and social channels are awash with conversations and disagreements about misinformation and disinformation and what they are. The pandemic and Trump’s presidency have added considerable fuel to these debates.

Definitions of disinformation and misinformation are easy to find. The important distinction between the two is the intent that sits behind them.

Misinformation is the sharing or publishing of information that is more or less accurate. It can be spread by anyone, by any means and without the intent to deceive. We see this daily on our social media platforms, through the continuous arguments and counter arguments, which may even include some facts.

Disinformation, on the other hand, is created deliberately with the intent to deceive. Its deceptive nature is designed to cause problems within countries, organisations and the general public. It is often directed against prominent members of society and is a common tactic employed by foreign countries and their intelligence agencies, who use friendly, reliable supporters to help distribute disinformation on large scale.

We can look back in history at some of the origins of disinformation. One of most famous examples of disinformation is Grigory Potemkin (1739-1791) who orchestrated the building of fake villages to impress his former lover, Empress Catherine the Great, when she visited newly conquered territories in 1787.

It is a beautiful story, but a fake one. The idea of Potemkin villages was designed to disinform the Ottoman Empire into believing that Russia Empire was weak and that they just built wooden facades. It encouraged the Ottoman Empire to go to war with Russia over Crimea and they lost, resulting in the Treaty of Jassy that confirmed Crimea as a part of the Russian Empire.

There are many examples of disinformation from both sides during World War II. Both set up fake airfields and model planes to trick the enemy. The allies even dropped fake paratroopers the night before the D-Day invasion to make the Germans think the invasion was in a different location.

Modern age disinformation was widely adopted by the USSR under the term, dezinformatsiya. According to Ion Mihai Pacepa, a high-ranking official in Romania’s secret police, who defected in 1978, there were many examples of how USSR utilised disinformation against West.

Misinformation, particularly online, is all around us. It has shown how vulnerable we are as a society, particularly during the Covid19 pandemic, where truthful and fact checked information has in some cases become a rare commodity.

Disinformation is usually based on true event, so, it will include facts around which a false story will be built. These typically use sources, like social media platforms, where misinformation is flowing.

Disinformation is part of daily life, alongside misinformation. It is important for corporations to understand the modus operandi of both in order to protect their brands and reputations by maximising trust and confidence within their consumer and supplier communities.

Organisations invest heavily in their IT risk management frameworks, while the weakest link and potentially the best firewall, humans, are often forgotten.

Information risk management must include employees and policies around information risk management should be implemented for employees to help them understand what information is, how to access, analyse and record information for decision making.

 

 

Key Drivers influencing industrial and economic espionage

During the Covid19 crisis, the typical workplace is no longer a company office, protected by technical, mechanical and physical security with access controls and an IT/cyber security manager physically sitting next to employees.

In contrast, the workplace has become the kitchen table or spare room, with many of IT devices also being used by household family members, partners or kids. Companies who were already set up for home working will typically have stronger security protocols than those who were forced to respond rapidly to home working and have kept utilising the same approach they did from day one.

With this transition of the workplace from offices to home set-ups, it is much easier for industrial or economic espionage operations to be performed successfully. The world has suddenly become flat.

Flat in sense that access to information can be done via an internet cable, Wi-Fi or email. There is no longer the need for an operative to be present in person, however that does not mean an existing intelligence operative may not be in the vicinity of your staff member or executive etc.

It is important to acknowledge that even if you decide to investigate a breach in your corporation due industrial or economic espionage type activity, it will be difficult to successfully complete your investigations for one simple reason – the perpetrators will be hundreds or thousands of kilometres away having learned and explored your organisation’s weaknesses.

 

So, what are most common drivers for successful industrial or economic espionage?

 

Human Factors:

Recruitment of informants or insiders to perform industrial or economic espionage is nothing new, however the Money, Ideology, Coercion, Ego (MICE) methodology for recruitment during Covid19 will be on rise due to these two key indicators:

• Money – Covid19 lockdowns have caused distress on many families, employees and business owners who will seek a way to continue the lifestyle they had prior to pandemic or even to enhance a lavish lifestyle. Uncertain economic recovery and limited markets will drive individuals to seek monetary remedies based on previous work, R&D and current exposure to defence, government and other valuable information.

• Ideology – all modern western society is blend of many different cultures, often firmly embedded into society. It is certain that many unknown individuals are part of larger overseas intelligence networks, sent to the host country either as an immigrants, students or workers and patriotism will always prevail over lifestyle – patriotism was favourite model for recruiting informants in the socialist communist countries of the Eastern Bloc.

 

Technical Factors:

Access to classified information via technology and cyber espionage is the main modus operandi of industrial and economic espionage.

Most of the technology devices used in the day-to-day life of corporations and households are built-in third-party countries, including components of the telecommunications, PC’s, laptops and electric vehicles.

Importantly, this technology purchased from other countries could be possibly manufactured in a way to collect information without the consumer suspecting. (Samantha Hoffman and Elsa Kania, 2018)

Adding to the weight of the technical factor driver, is the possibility of easier access to information via hacking. Social engineering, the art of manipulating people to obtain confidential information, is made easier with corporate employees preferring to work from home. When you add the challenges of securing information in a home environment, this makes hacking more straightforward.

Despite legislations and various actions by countries to prevent cyber espionage and sanction those who commit it, there are strong drivers for foreign countries to utilise their existing ideology-based, informant network and recruit individuals from different corporations.

(Rowel.B.I., 2020) stated in her article that the danger of State-sponsored cyber espionage is that that any foreign intelligence agency will not prosecute or extradite those who are organised and financially supported to perform cyber espionage, instead they will deny, to minimise the exposure that anything happened.

(Samantha Hoffman and Elsa Kania, 2018) stated, “Any organisation and citizen shall, in accordance with the law, support, provide assistance, and cooperate in national intelligence work, and guard the secrecy of any national intelligence work that they are aware of,” concluding that the Chinese intelligence agencies will support and demand Chinese telecommunication companies to assist in cyber espionage when requested.

To summarise, Covid19 has increased the vulnerability of organisations to industrial and economic espionage. With espionage activities becoming increasingly sophisticated, organisations need to address both the human and technology factors that are increasing the risk of damaging infiltrations.

 

 

Revising our Understanding of Industrial and Economic Espionage

Economic and industrial espionage come from a different base, but their activities are similar.

(Button, 2020) in his article quoted definitions from Wagner’ (Wagner, E.R., 2011) to explain and distinguish the differences between economic and industrial espionage:

• “Economic espionage refers to targeting or acquiring trade secrets from domestic companies or government entities to knowingly benefit a foreign state’”.

• “Industrial espionage is the same as economic espionage, except that rather than benefiting a foreign government, it benefits another private entity’.”

 

Industrial and economic espionage are clearly interrelated.

In previous pieces, I have discussed industrial and economic espionage along with the purpose and examples of those activities. However, here I want to examine two key elements of why industrial or economic espionage is successful and how competitors or foreign countries exploit them.

 

1. Human Factor – by nature this is either the strongest or simultaneously the weakest link in preventing espionage activities

2. Technical Factor – which explores vulnerabilities of IT and Cyber Security

 

Globalisation has enabled the world to evolve at an incredible speed, with new technologies emerging on a daily basis. Right now, we can divide our way of living and working in two main categories. Firstly, Pre-Covid and a new category, Covid WFH (working from home). Going forward, there is likely to be a third category, that of Post-Covid. I’m going to focus on the two known categories.

The reason for dividing the world into these two main categories is that technology, particularly IT technology, has evolved tremendously in the past two decades, leading to information being scattered around the globe in different locations and in different types of protective environments. This is a major factor, that according to (AUSTLII, 2000) means, “Criminals will organise themselves, adopting all those strategic information technologies useful in order to retrieve, manage and communicate important information.”

In other words, perpetrators of industrial or economic espionage will adopt and learn new emerging technologies to obtain information. This activity also needs the human factor to substantiate the validity and usefulness of the data.

If we take into consideration that in Pre-Covid era employees primarily worked in offices and the security around information management was more easily monitored and controlled. The massive increase in working from home has led to a corresponding reduction in the effectiveness of risk management and information security.

A logical conclusion is that the Covid WFH category has increased the opportunities for organisations to be the target of industrial and economic espionage. Organisations need to adopt human and technology-based intelligence processes to prevent damaging impact from these activities.

 

 

The Modus Operandi of Industrial and Economical Espionage

 

“The life of spies is to know, not to be known”

George Herbert

 

A stolen recipe in ancient Greece led to one of the first cases of industrial espionage.

This, and other historical precedents, are discussed in relation to contemporary industrial espionage by (Tarantola, A , 2020) who analysed the events that took place in the ancient Greek city of Sybaris.

Another well-known example occurred in the 1800s, when the British East India Company hired the botanist, Richard Fortune, to smuggle tea cuttings out of China. These were used to cultivate the Indian tea industry, which eclipsed that of the Chinese in a few decades. (Rose 2010)

In short, it would seem that the earliest example of industrial espionage was based around the theft of intellectual property, more specifically, a recipe. From this, we can make a tentative inference about the structural forces at play that underpin contemporary equivalents. That is, people have an insatiable desire to know how, why and what their competitors have that is giving them a business edge.

By nature, both industrial and economic espionage, are simultaneously aggressive and defensive. They are aggressive in the sense that steps are taken to pursue and achieve a competitive advantage over competitors by utilising methods of operational intelligence gathering, as well as methods of sabotage and subversion. Both types of espionage are also defensive, and this is seen in activities that concentrate on the use of deception of competitors and/or foreign intelligence services by utilising methods such as information warfare and counterintelligence processes.

Industrial and economic espionage are considered illegal activities. However, it would be an inaccurate characterisation to say that most industrial and economic espionage activities that take place are, strictly speaking, illegal. The majority of such activities are performed using methods that are mainly legal. For example, collecting information about a competitor or product via open-source information, friendly discussions with a competitor’s employees, purchases of a competitor’s product (which are then used to attempt to reverse engineer its design), or head-hunting key employees in the hope that they can be enticed into breaking their exit contract with their previous employer.

Countries and States will utilise illegal means to conduct information/intelligence gathering operations regarding the economic capabilities of other countries, as well as the products of private entities, so long as doing so is to their benefit and it is deemed an acceptable risk relative to the potential gains afforded.

Cyber crime is one of the common examples of State-sponsored espionage. Indeed, the head of the UK’s secret service revealed back in 2012, how a UK company had suffered an AU$1.5bn loss from a state-sponsored cyber-attack in lost intellectual property and disadvantages in contract negotiations (Shah 2012).

In his article (Webb, T, 2011) provided a comprehensive list of industrial and economic espionage cases which involved corporations. The main scope of industrial espionage was information. The author outlined that industrial espionage evolved in terms of re-selling information to third parties or back to the owner of information.

The above-mentioned article illustrates that industrial and economic espionage represent a diverse umbrella of different activities with the key objective being to require information which puts a certain industry, corporation or a country in a better competitive position. In doing this, it can simultaneously, cause tremendous financial losses to the corporation which has been breached and information stolen.

Fierce global competition can drive corporations and countries to bend rules and start analysing competitors including their defence capabilities, production and economic survival.

The task of industrial espionage is not only to gather information but to explore the vulnerabilities of the competitor and the economic assessment of countries.

In summary, much industrial and economic espionage is not technically illegal but can stray into grey areas. Reverse engineering a product or hiring employees from competitors is commonplace and legal, whereas covert surveillance and hacking crosses the line.

Companies should be aware of competitors’ activities and the opportunities that can be created through legal and effective intelligence gathering methods as well as illegal ones.

 

 

1. Rose, S. 2010. For all the tea in China. Westminster: Penguin. Google Scholar

2. Shah, S. (2012). Corporate espionage on ‘an industrial scale’ targeting the UK. Retrieved from https://www.computing.co.uk/ctg/news/2187123/corporate-espionage-an-industrial-scale-targeting-uk.

Economic Espionage – Warp Speed in Crisis

Organisations need to act now and prepare for the growing prevalence of economic espionage in Australia and the damage it causes.

To understand what we mean by economic espionage, the FBI (2021) describe it as, “foreign power-sponsored or coordinated intelligence activity” while ASIO (2021) define it as, “Espionage is the theft of Australian information by someone either acting on behalf of a foreign power or intending to provide information to a foreign power which is seeking advantage.”

As evidenced by the word ‘economic’, this form of clandestine behaviour is directed towards the business sector in order to extract information and also to destabilise the market and impact productivity.

In an article by Tom Uren, “China’s cyber espionage surge in Australia”, he clearly describes how Chinese State Security carried out cyber espionage in order to steal technology so a Chinese state-owned company could benefit by building their own airliner.

The first time you become aware that you have been a victim of espionage is often when we find out someone has discovered and utilised information that you have not made public.

Espionage has come a long way since the days of the US/Soviet Cold War with its micro dots, secret cameras and advanced technologies of the mid to late 1900s. Then, as now, the key commodity was information. Espionage has continued to evolve, reaching new heights and dimensions. Although the way different countries behave towards each other has changed over time, it is clear some countries and corporations are utilising sophisticated, high tech methods, along with less glamorous techniques such as analogue human intelligence, to extract information, blueprints and product knowledge or destabilise economies.

A question most corporations often forget to ask or include as part of their risk framework, is around the prevention of economic espionage. This is understandable given the general feeling that this would not affect them and that they are safe behind their firewalls and data encryptions. Cyber espionage is often at the end of the espionage processes; (intelligence or counterintelligence cycle).

One of the most crucial parts of any economic espionage is the human link and human activities. After all, no intelligence agency or corporate sector launches activities against a company purely from seeing a solitary post on social media.

The easiest way to learn, adopt and exploit an organisation’s vulnerabilities is to read and study how an individual employee’s activities on websites and social media. Information about products, blueprints, production or simply ideas always start with humans.

We all have experienced working from home during the COVID crisis with the remoteness and distance from other colleagues, peers and managers it creates. It has become a largely unsupervised work environment to which we can add people’s uncertainty, anxiety, loss of income and so many other elements of changes to our day-to-day life.

The environment this has created plays into the hands of economic espionage perpetrators as a part of hybrid warfare and espionage as well as country, state or company destabilisation.

Without going into depth around intelligence methods, their operations and applications, organisations need to study how economic espionage is carried out. They should concentrate not only on the prevention of hacking and online surveillance by others, but on how to develop a human firewall. After all, humans are the first and last line of defence.

The weakest link in the security chain is often the human who accepts a person or scenario at face value and unwittingly becomes the source of information, from which no IT security measures will be able to protect your blueprints, ideas and products.

Economic espionage is a very real, growing threat. Prevention is the key to combat this espionage by utilising human intelligence methods and training your staff not only on IT security related issues but how to recognise when they may potentially be an unwitting ‘target’ of foreign services or competitor exploitation.

Equally important, is to develop counterintelligence processes and respond to possible threats of economic espionage. A one size fits all solution does not work when it comes to protection from economic espionage, particularly not in moment of crisis. The history of Cold War espionage can teach us valuable lessons that we can apply to today’s modern environment.

 

References:

 

 

Communication and Information Warfare

We know advertisers and politicians try to persuade us to believe a certain viewpoint. The power of communication as a type of warfare is often undervalued. Influencing your ‘enemy’ is a key part of winning any battle. Being able to analyse misinformation has become a critical skill for armies, businesses and citizens alike.

You may remember that prior to the invasion of Iraq in 2003, there was a slogan, “Winning hearts and minds in the war on terrorism” that used extensively. The slogan is not the weapon in military terms, it doesn’t cause human fatalities and body injuries. But, communication, translated into carefully chosen words, along with military might, cause a deep emotional effect on military personnel and civilians on other side of the front line.

There are so many examples of how leaders, or wannabe leaders, have looked for the most effective ways to influence others through communication (words, public speaking and even subversive methods). One of the first people to document how to influence others was Greek philosopher Socrates, with his ingenious methods of delivering messages to the public.

In order to delve into his students’ view, he would ask them questions until any contradictions were exposed. The Socratic method used typically seeks to ask a series of questions to lead people to think in a certain way. Critical thinking skills are key to effectively resisting this approach. ( https://www.alu.edu/alublog/understanding-the-socratic-method-of-teaching/ 03.02.2021)

The key objective of communication warfare is to infiltrate the minds of large populations, not just particular groups. The endless possibilities of social media make these processes more powerful and effective. We all enjoy the benefits of connecting with people on social media but have you stopped to think how it may have altered your behaviour, mood and decision making.

The work of Nicollo Machiavelli in the 1500s is still relevant when it comes to understanding how communication can be used to influence people. His book ‘The Prince’ has been used for both good and bad for centuries. Machiavelli’s thinking can be summed up by the quotes from the book, “Everyone sees what you appear to be, few experience what you really are” and “Never attempt to win by force what can be won by deception.”

Words used in communications can be weaponised with emotions which are designed to lead the listener to create distorted conclusions or perceptions on the topic published. You should never take this kind of information lightly. It is important to understand the message and learn how to decode the meaning behind it.

When making decisions based on communications, decision makers need to recognise misinformation and disinformation to understand not only who said what but why it was said and the choice of language used.

Communications professionals usually adjust words and language to suit particular demographics and countries in order to elicit emotional responses from listeners or readers.

Most communication professionals are trying to help people understand the truth. However, when misinformation and disinformation are deliberately used in business communications then the corporate world needs to correctly analyse them.

The power of technology is being used to help create algorithms to categorise and make decisions on information. This has some merit and advantages but a true analysis using human intelligence will provide you with accuracy and source reliability for decision making.

Decision making in corporations and the business world, as well in private life, should be based on the reliability of the source and validity of the information. Relying on social media is definitely not a reliable approach.

With so much talk about misinformation and disinformation being communicated from previously trusted sources, business need to put more resources into the valuable commodity of information and develop critical thinking strategies. 2020 has taught us that many of the solutions to our problems are best found using new ways of thinking and enhanced risk management tools.

Your world as you know it is over

We can argue and discuss how life, business and social interactions were in the Pre-COVID world, however, none of this changes the fact that the world we know is over and we need to refocus our activity on positive things.

To enable us to continue to go about our daily lives and enjoy family, health and business, we now have to fully concentrate on things we can control. From a business perspective, it is about how we can assist our clients, peers, employees and contractors.

We all witnessed in pre-COVID world how many gurus and ‘prophets’ there were seeking to charge you to listen to their success stories. We should not be focusing our efforts on them.

So, who am I? Who are you? You are true unsung business heroes, true disciples of success and above all, determined to be on the front foot of life and business. I am a businessman who in my early years experienced the horrors of war and how it effects people. It also proved to me that I was capable of creating my own destiny.

That old way of life and thinking is over, you don’t need prophets, gurus and high paid executives to tell you how to run your business. You now have the full authority and credibility to share your wisdom and knowledge to others on how to stay afloat.

When you wake up in the morning, instead rushing to the internet and being fed bad news about the virus, crime or natural disasters, do yourself a favour. Wake up and say to yourself, “Today will be a great day” followed by putting on the biggest smile and then ask yourself, “what do I truly want from life” – after all you may be the only person who will never lie to you!

Say hello to your family, ask them how they are. Say hello to your neighbours, whether you like them or not. Say hello, they will feel alive or perhaps they will tell you to FO, who knows.

Come into your office, or have your team zoom call, and say hello to your peers and employees. Maybe buy them an occasional coffee if you are together in person. Not because you are a charity but to show gratitude. Why are you doing this? To show respect, kindness and motivate your employees. They will appreciate it, trust me.

Reply to your emails, don’t keep your clients and suppliers waiting. Pick up the phone and call few clients and ask them how they are. They will welcome it. Don’t ask them for work, just smile and ask them how their day is.

Open that journal of yours with ideas, concepts and blueprints. Choose some to follow through. Sit next to employees and ask them what they are doing today and how you can help them. Then relax, you are already showing leadership qualities and displaying courage that no gurus can teach you.

Try to feed that starving feeling for business development inside of you through networking. Be targeted, chose whom you spend time with, as not all introductions are made equal.

Take the time to go to gym, see your GP to get a for blood exam and to check your blood pressure. Show up to our meetings feeling healthy. Repeat this action so often that it becomes a discipline. The healthy leader in you will project to clients that you are present, reliable and dedicated. Ask for and help instill this into your employees.

No one can promise you what your tomorrow will be like. Work on creating your own legacy and empire. Write books, diaries, blogs and share your wisdom or whatever you fancy, but do it so that others can learn from your mistakes.

Life is risky, after all, it is so risky that no one will live forever. Many of your old risk management processes are now more or less useless and you need to create new ones. Adapt to this crisis and the constantly changing situation. Do not collect your information from social media and sensationalist websites, as these will sidetrack you. Instead use local newspapers, coffee shops and conversations with real people. Do not rely on social media influencers and their ‘awesome’ tips.

Life is about living and for you to keep winning, you need to minimise strategic thinking. Instead, take a tactical approach by focusing on your local market and things you can control. You are clearly winning and when you win, your clients win, your employees get paid and everyone will see you as a person they can rely on.

Deliver services and goods that you know you can deliver using logistics that you can see and feel. That may sound obvious but when you challenge yourself, you may not be doing this.

While in combat, I was taught to use my senses and intuition along with my formal training, and business is all about what you can see, touch, smell, hear or taste. That’s what this new COVID business model is all about. Welcome to the new world.

Creating a perfect economic strategy with information and Intelligence

Corporations strive to be successful in their chosen markets. Trying to win the hearts and minds of consumers is a relentless, on-going battle that can be both costly and exhausting. Organisations can learn from military strategists and use information to develop successful economic strategies.

There are plenty of examples from military strategists past and present. Many have a similar theme – fight wars on your own terms. Do not spend hundreds of thousands of dollars just to achieve a single victory that only results in creating a vengeful enemy.

A little-known historic example of this comes from Queen Elizabeth I and her battle with Spain. The full extent of her strategy is often overlooked and not applied as much as it should be.

The Queen and her kingdom had been devastated by civil war. The treasury just did not have enough money, despite her idea to create a prosperous kingdom.

At the same time, King Phillip II of Spain had been threatening to invade. In 1588, 130 ships formed the Spanish Armada and set sail to try and defeat the far smaller English army and navy.

So how did Queen Elizabeth achieve victory?

Most accounts of the English victory focus on the speed of the ships and the exploits of Sir Francis Drake. However, Elizabeth I also had a secret weapon in Sir Francis Walsingham, who was popularly remembered as her "spymaster". He built up an ongoing spy network by utilising the merchant fleet and passing information back to England about intentions and preparedness of Spanish Armada.

Queen Elizabeth I also utilised a new type of warfare, economic. She knew that Spain had a weak economy and that shipping routes between Spain and her Colonies had been successfully compromised by Sir Francis Drake.

 

Translating this to today’s business environment, it is clear the size of a competitor does not always mean they are in a stronger position. Strength can be gained through knowing more about a competitor’s intentions, finances, in-house morale, centralised control and other important elements.

Knowing your limits as organisation is the imperative, regardless how wealthy and logistically strong you are. History has proved that less financially viable opponents are more likely to improvise and utilise fewer logistics and spend less money to prevail in the market.

In today fast-moving world, one thing that is accessible to everyone is information, regardless of how strong you are as a corporation. Furthermore, the reduction in physical travelling and increased use of video link platforms, make the perfect scenario for intelligence operatives. The source of information is no longer inside corporate offices but residing with individuals. This creates additional risks that are hard to manage within a traditional risk management matrix.

Corporations should choose carefully which competitors and markets they are seeking to dominate as there will inevitably be some losses along the way.

The true danger lies with miscalculation and misinterpretation of the available intelligence – or
valuable information. Where it is not possible to verify the source and validity of information, it is quite likely the information can be part of a planned deception by a competitor to sidetrack you and get you to ‘fight’ them on their own terms.

In the world where information is power, success can come from applying and utilising investigative intelligence with human intelligence methods and applications to help prepare the organisation for the battles and counterattacks that lie ahead. Creating an intelligence and counter-intelligence cycle through harnessing human intelligence will assist in the execution of winning corporate strategies.