fbpx
Wikipedia

Industrial espionage

Industrial espionage, economic espionage, corporate spying, or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.[1]

Teapot with Actresses, Vezzi porcelain factory, Venice, c. 1725. The Vezzi brothers were involved in a series of incidents of industrial espionage. It was these actions that led to the secret of manufacturing Meissen porcelain becoming widely known.

While political espionage is conducted or orchestrated by governments and is international in scope, industrial or corporate espionage is more often national and occurs between companies or corporations.[2]

Forms of economic and industrial espionage edit

Economic or industrial espionage takes place in two main forms. In short, the purpose of espionage is to gather knowledge about one or more organizations. It may include the acquisition of intellectual property, such as information on industrial manufacture, ideas, techniques and processes, recipes and formulas. Or it could include sequestration of proprietary or operational information, such as that on customer datasets, pricing, sales, marketing, research and development, policies, prospective bids, planning or marketing strategies or the changing compositions and locations of production.[3] It may describe activities such as theft of trade secrets, bribery, blackmail and technological surveillance. As well as orchestrating espionage on commercial organizations, governments can also be targets – for example, to determine the terms of a tender for a government contract.

Target industries edit

 
During testing, automakers commonly disguise upcoming car models with camouflage paint patterns designed to obfuscate the vehicle's lines. Padded covers or deceptive decals are also often used. This is also to prevent motoring media outlets from spoiling the model before its planned reveal.

Economic and industrial espionage is most commonly associated with technology-heavy industries, including computer software and hardware, biotechnology, aerospace, telecommunications, transportation and engine technology, automobiles, machine tools, energy, materials and coatings and so on. Silicon Valley is known to be one of the world's most targeted areas for espionage, though any industry with information of use to competitors may be a target.[4]

Information theft and sabotage edit

Information can make the difference between success and failure; if a trade secret is stolen, the competitive playing field is leveled or even tipped in favor of a competitor. Although a lot of information-gathering is accomplished legally through competitive intelligence, at times corporations feel the best way to get information is to take it.[5] Economic or industrial espionage is a threat to any business whose livelihood depends on information.

In recent years, economic or industrial espionage has taken on an expanded definition. For instance, attempts to sabotage a corporation may be considered industrial espionage; in this sense, the term takes on the wider connotations of its parent word. That espionage and sabotage (corporate or otherwise) have become more clearly associated with each other is also demonstrated by a number of profiling studies, some government, some corporate. The United States government currently has a polygraph examination entitled the "Test of Espionage and Sabotage" (TES), contributing to the notion of the interrelationship between espionage and sabotage countermeasures.[6] In practice, particularly by "trusted insiders", they are generally considered functionally identical for the purpose of informing countermeasures.

Agents and the process of collection edit

Economic or industrial espionage commonly occurs in one of two ways. Firstly, a dissatisfied employee appropriates information to advance interests or to damage the company. Secondly, a competitor or foreign government seeks information to advance its own technological or financial interest.[7] "Moles", or trusted insiders, are generally considered the best sources for economic or industrial espionage.[8] Historically known as a "patsy", an insider can be induced, willingly or under duress, to provide information. A patsy may be initially asked to hand over inconsequential information and, once compromised by committing a crime, blackmailed into handing over more sensitive material.[9] Individuals may leave one company to take up employment with another and take sensitive information with them.[10] Such apparent behavior has been the focus of numerous industrial espionage cases that have resulted in legal battles.[10] Some countries hire individuals to do spying rather than the use of their own intelligence agencies.[11] Academics, business delegates, and students are often thought to be used by governments in gathering information.[12] Some countries, such as Japan, have been reported to expect students to be debriefed on returning home.[12] A spy may follow a guided tour of a factory and then get "lost".[9] A spy could be an engineer, a maintenance man, a cleaner, an insurance salesman, or an inspector: anyone who has legitimate access to the premises.[9]

A spy may break into the premises to steal data and may search through waste paper and refuse, known as "dumpster diving".[13] Information may be compromised via unsolicited requests for information, marketing surveys, or use of technical support or research or software facilities. Outsourced industrial producers may ask for information outside the agreed-upon contract.[14]

Computers have facilitated the process of collecting information because of the ease of access to large amounts of information through physical contact or the Internet.[15]

History edit

Origins edit

 
The work of a European priest, Father Francois Xavier d'Entrecolles to reveal to Europe the manufacturing methods of Chinese porcelain in 1712, is sometimes considered an early case of industrial espionage.[16]

Economic and industrial espionage has a long history. Father Francois Xavier d'Entrecolles, who visited Jingdezhen, China in 1712 and later used this visit to reveal the manufacturing methods of Chinese porcelain to Europe, is sometimes considered to have conducted an early case of industrial espionage.[16]

Historical accounts have been written of industrial espionage between Britain and France.[17] Attributed to Britain's emergence as an "industrial creditor", the second decade of the 18th century saw the emergence of a large-scale state-sponsored effort to surreptitiously take British industrial technology to France.[17] Witnesses confirmed both the inveigling of tradespersons abroad and the placing of apprentices in England.[18] Protests by those such as ironworkers in Sheffield and steelworkers in Newcastle,[clarification needed] about skilled industrial workers being enticed abroad, led to the first English legislation aimed at preventing this method of economic and industrial espionage.[19][18] This did not prevent Samuel Slater from bringing British textile technology to the United States in 1789. In order to catch up with technological advances of European powers, the US government in the eighteenth and nineteenth centuries actively encouraged intellectual piracy.[20][21]

American founding father and first U.S. Treasury Secretary Alexander Hamilton advocated rewarding those bringing "improvements and secrets of extraordinary value"[22] into the United States. This was instrumental in making the United States a haven for industrial spies.

20th century edit

East-West commercial development opportunities after World War I saw a rise in Soviet interest in American and European manufacturing know-how, exploited by Amtorg Corporation.[23] Later, with Western restrictions on the export of items thought likely to increase military capabilities to the USSR, Soviet industrial espionage was a well known adjunct to other spying activities up until the 1980s.[24] BYTE reported in April 1984, for example, that although the Soviets sought to develop their own microelectronics, their technology appeared to be several years behind the West's. Soviet CPUs required multiple chips and appeared to be close or exact copies of American products such as the Intel 3000 and DEC LSI-11/2.[25][a]

"Operation Brunnhilde" edit

Some of these activities were directed via the East German Stasi (Ministry for State Security). One such operation, "Operation Brunnhilde," operated from the mid-1950s until early 1966 and made use of spies from many Communist Bloc countries. Through at least 20 forays, many western European industrial secrets were compromised.[26] One member of the "Brunnhilde" ring was a Swiss chemical engineer, Dr. Jean Paul Soupert (also known as "Air Bubble"), living in Brussels. He was described by Peter Wright in Spycatcher as having been "doubled" by the Belgian Sûreté de l'État.[26][27] He revealed information about industrial espionage conducted by the ring, including the fact that Russian agents had obtained details of Concorde's advanced electronics system.[28] He testified against two Kodak employees, living and working in Britain, during a trial in which they were accused of passing information on industrial processes to him, though they were eventually acquitted.[26]

According to a 2020 American Economic Review study, East German industrial espionage in West Germany significantly reduced the gap in total factor productivity between the two countries.[29]

Soviet spetsinformatsiya system edit

A secret report from the Military-Industrial Commission of the USSR (VPK), from 1979–80, detailed how spetsinformatsiya (Russian: специнформация, "special records") could be utilised in twelve different military industrial areas. Writing in the Bulletin of the Atomic Scientists, Philip Hanson detailed a spetsinformatsiya system in which 12 industrial branch ministries formulated requests for information to aid technological development in their military programs. Acquisition plans were described as operating on 2-year and 5-year cycles with about 3000 tasks underway each year. Efforts were aimed at civilian and military industrial targets, such as in the petrochemical industries. Some information was gathered to compare Soviet technological advancement with that of their competitors. Much unclassified information was also gathered, blurring the boundary with "competitive intelligence".[24]

The Soviet military was recognised as making much better use of acquired information than civilian industries, where their record in replicating and developing industrial technology was poor.[b][24]

Legacy of Cold War espionage edit

Following the demise of the Soviet Union and the end of the Cold War, commentators, including the US Congressional Intelligence Committee, noted a redirection amongst the espionage community from military to industrial targets, with Western and former communist countries making use of "underemployed" spies and expanding programs directed at stealing such information.[30][31]

The legacy of Cold War spying included not just the redirection of personnel but the use of spying apparatus such as computer databases, scanners for eavesdropping, spy satellites, bugs and wires.[32]

Industrial espionage as part of US foreign policy edit

According to an article from news website theintercept.com, "potentially sabotaging another country's hi-tech industries and their top companies has long been a sanctioned American strategy." The article was based on a leaked report issued from former U.S. Director of National Intelligence James R. Clapper's office that evaluated a theoretical scenario on how intelligence could be used to overcome a loss of the United States' technological and innovative edge. The report did not show any actual occurrence of U.S. conducted industrial espionage, and when contacted the Director of National Intelligence office responded with, "the United States—unlike our adversaries—does not steal proprietary corporate information to further private American companies' bottom lines", and that "the Intelligence Community regularly engages in analytic exercises to identify potential future global environments, and how the IC could help the United States Government respond". The report, he said, "is not intended to be, and is not, a reflection of current policy or operations".[33]

Former CIA Director Stansfield Turner stated in 1991 "Nevertheless, as we increase emphasis on securing economic intelligence, we will have to spy on the more developed countries-our allies and friends with whom we compete economically-but to whom we turn first for political and military assistance in a crisis. This means that rather than instinctively reaching for human, on-site spying, the United States will want to look to those impersonal technical systems, primarily satellite photography and intercepts".[34]

Former CIA Director James Woolsey acknowledged in 2000 that the United States steals economic secrets from foreign firms and their governments "with espionage, with communications, with reconnaissance satellites". He also stated it is "not to provide secrets, technological secrets to American industry." He listed the three reasons as understanding whether sanctions are functioning for countries under sanction, monitoring dual-use technology that could be used to produce or develop weapons of mass destruction, and to spy on bribery to uphold the Foreign Corrupt Practices Act.[35]

In 2013 The United States was accused of spying on Brazilian oil company Petrobras. Brazil's President Dilma Rousseff stated that it was tantamount to industrial espionage and had no security justification.[36]

In 2014 former US intelligence officer Edward Snowden stated that America's National Security Agency was engaged in industrial espionage and that they spied on German companies that compete with US firms. He also highlighted the fact the NSA uses mobile phone apps such as Angry Birds to gather personal data.[37]

In September 2019, security firm Qi An Xin published report linking the CIA to a series of attacks targeting Chinese aviation agencies between 2012 and 2017.[38][39]

Israel's economic espionage in the United States edit

Israel has an active program to gather proprietary information within the United States. These collection activities are primarily directed at obtaining information on military systems and advanced computing applications that can be used in Israel's sizable armaments industry.[40][41]

Israel was accused by the US government of selling US military technology and secrets to China.[42]

In 2014 American counter-intelligence officials told members of the House Judiciary and Foreign Affairs committees that Israel's current espionage activities in America are "unrivaled".[43]

Use of computers and the Internet edit

Personal computers edit

Computers have become key in exercising industrial espionage due to the enormous amount of information they contain and the ease at which it can be copied and transmitted. The use of computers for espionage increased rapidly in the 1990s. Information has commonly been stolen by individuals posing as subsidiary workers, such as cleaners or repairmen, gaining access to unattended computers and copying information from them. Laptops were, and still are, a prime target, with those traveling abroad on business being warned not to leave them for any period of time. Perpetrators of espionage have been known to find many ways of conning unsuspecting individuals into parting, often only temporarily, from their possessions, enabling others to access and steal information.[44] A "bag-op" refers to the use of hotel staff to access data, such as through laptops, in hotel rooms. Information may be stolen in transit, in taxis, at airport baggage counters, baggage carousels, on trains and so on.[13]

The Internet edit

The rise of the Internet and computer networks has expanded the range and detail of information available and the ease of access for the purpose of industrial espionage.[45] This type of operation is generally identified as state backed or sponsored, because the "access to personal, financial or analytic resources" identified exceed that which could be accessed by cybercriminals or individual hackers. Sensitive military or defense engineering or other industrial information may not have immediate monetary value to criminals, compared with, say, bank details. Analysis of cyberattacks suggests deep knowledge of networks, with targeted attacks, obtained by numerous individuals operating in a sustained organized way.[45]

Opportunities for sabotage edit

The rising use of the internet has also extended opportunities for industrial espionage with the aim of sabotage. In the early 2000s, it was noticed that energy companies were increasingly coming under attack from hackers. Energy power systems, doing jobs like monitoring power grids or water flow, once isolated from the other computer networks, were now being connected to the internet, leaving them more vulnerable, having historically few built-in security features.[46] The use of these methods of industrial espionage have increasingly become a concern for governments, due to potential attacks by terrorist groups or hostile foreign governments.

Malware edit

One of the means of perpetrators conducting industrial espionage is by exploiting vulnerabilities in computer software. Malware and spyware are "tool[s] for industrial espionage", in "transmitting digital copies of trade secrets, customer plans, future plans and contacts". Newer forms of malware include devices which surreptitiously switch on mobile phones camera and recording devices. In attempts to tackle such attacks on their intellectual property, companies are increasingly keeping important information off network, leaving an "air gap", with some companies building Faraday cages to shield from electromagnetic or cellphone transmissions.[47]

Distributed denial of service (DDoS) attack edit

The distributed denial of service (DDoS) attack uses compromised computer systems to orchestrate a flood of requests on the target system, causing it to shut down and deny service to other users.[48] It could potentially be used for economic or industrial espionage with the purpose of sabotage. This method was allegedly utilized by Russian secret services, over a period of two weeks on a cyberattack on Estonia in May 2007, in response to the removal of a Soviet era war memorial.[49]

Notable cases edit

British East India Company edit

In 1848, the British East India Company broke Qing China's global near-monopoly on tea production by smuggling Chinese tea out of the nation and copying Chinese tea-making processes.[50] The British Empire had previously run a considerable trade deficit with China by importing the nation's tea and other goods. The British attempted to rectify the deficit by trading opium to the Chinese, but encountered difficulties after the Daoguang Emperor banned the opium trade and the First Opium War broke out. To avoid further issues in trading tea with China, the East India Company hired Scottish botanist Robert Fortune to travel to China under the guise of a Chinese nobleman and obtain Chinese trade secrets and tea plants for replanting. Infiltrating Chinese tea-making facilities, Fortune recorded the Chinese process for creating tea and smuggled tea leaves and seeds back to the East India Company.[51] These tea plants were later introduced into India, helping it surpass China as the world's largest tea producer.[52]

France and the United States edit

Between 1987 and 1989, IBM and Texas Instruments were thought to have been targeted by French DGSE with the intention of helping France's Groupe Bull.[53] In 1993, U.S. aerospace companies were also thought to have been targeted by French interests.[54] During the early 1990s, France was described as one of the most aggressive pursuers of espionage to garner foreign industrial and technological secrets.[53] France accused the U.S. of attempting to sabotage its high tech industrial base.[53] The government of France has been alleged to have conducted ongoing industrial espionage against American aerodynamics and satellite companies.[55]

Volkswagen edit

In 1993, car manufacturer Opel, the German division of General Motors, accused Volkswagen of industrial espionage after Opel's chief of production, Jose Ignacio Lopez, and seven other executives moved to Volkswagen.[10] Volkswagen subsequently threatened to sue for defamation, resulting in a four-year legal battle.[10] The case, which was finally settled in 1997, resulted in one of the largest settlements in the history of industrial espionage, with Volkswagen agreeing to pay General Motors $100 million and to buy at least $1 billion of car parts from the company over 7 years, although it did not explicitly apologize for Lopez's behavior.[56]

Hilton and Starwood edit

In April 2009, Starwood accused its rival Hilton Worldwide of a "massive" case of industrial espionage. After being acquired by The Blackstone Group, Hilton employed 10 managers and executives from Starwood. Starwood accused Hilton of stealing corporate information relating to its luxury brand concepts, used in setting up its Denizen hotels. Specifically, former head of its luxury brands group, Ron Klein, was accused of downloading "truckloads of documents" from a laptop to his personal email account.[57]

Google and Operation Aurora edit

On 13 January 2010, Google announced that operators, from within China, had hacked into their Google China operation, stealing intellectual property and, in particular, accessing the email accounts of human rights activists.[58][59] The attack was thought to have been part of a more widespread cyber attack on companies within China which has become known as Operation Aurora.[59] Intruders were thought to have launched a zero-day attack, exploiting a weakness in the Microsoft Internet Explorer browser, the malware used being a modification of the trojan "Hydraq".[47] Concerned about the possibility of hackers taking advantage of this previously unknown weakness in Internet Explorer, the governments of Germany and, subsequently France, issued warnings not to use the browser.[60]

There was speculation that "insiders" had been involved in the attack, with some Google China employees being denied access to the company's internal networks after the company's announcement.[61][62] In February 2010, computer experts from the U.S. National Security Agency claimed that the attacks on Google probably originated from two Chinese universities associated with expertise in computer science, Shanghai Jiao Tong University and the Shandong Lanxiang Vocational School, the latter having close links to the Chinese military.[63]

Google claimed at least 20 other companies had also been targeted in the cyber attack, said by the London Times, to have been part of an "ambitious and sophisticated attempt to steal secrets from unwitting corporate victims" including "defence contractors, finance and technology companies".[59][58][60] Rather than being the work of individuals or organised criminals, the level of sophistication of the attack was thought to have been "more typical of a nation state".[58] Some commentators speculated as to whether the attack was part of what is thought to be a concerted Chinese industrial espionage operation aimed at getting "high-tech information to jump-start China's economy".[64] Critics pointed to what was alleged to be a lax attitude to the intellectual property of foreign businesses in China, letting them operate but then seeking to copy or reverse engineer their technology for the benefit of Chinese "national champions".[65] In Google's case, they may have (also) been concerned about the possible misappropriation of source code or other technology for the benefit of Chinese rival Baidu. In March 2010 Google subsequently decided to cease offering censored results in China, leading to the closing of its Chinese operation.

USA v. Lan Lee, et al. edit

The United States charged two former NetLogic Inc. engineers, Lan Lee and Yuefei Ge, of committing economic espionage against TSMC and NetLogic, Inc. A jury acquitted the defendants of the charges with regard to TSMC and deadlocked on the charges with regard to NetLogic. In May 2010, a federal judge dismissed all the espionage charges against the two defendants. The judge ruled that the U.S. government presented no evidence of espionage.[66]

Dongxiao Yue and Chordiant Software, Inc. edit

In May 2010, the federal jury convicted Chordiant Software, Inc., a U.S. corporation, of stealing Dongxiao Yue's JRPC technologies and used them in a product called Chordiant Marketing Director. Yue previously filed lawsuits against Symantec Corporation for a similar theft.[67]

Concerns of national governments edit

Brazil edit

Revelations from the Snowden documents have provided information to the effect that the United States, notably vis-à-vis the NSA, has been conducting aggressive economic espionage against Brazil.[68] Canadian intelligence has apparently supported U.S. economic espionage efforts.[69]

China edit

The Chinese cybersecurity company Qihoo 360 accused the Central Intelligence Agency of the United States of an 11-year-long hacking campaign[70] that targeted several industries including aviation organizations, scientific research institutions, petroleum firms, internet companies, and government agencies.[71]

United States edit

A 2009 report to the US government, by aerospace and defense company Northrop Grumman, describes Chinese economic espionage as comprising "the single greatest threat to U.S. technology".[45] Blogging on the 2009 cyber attack on Google, Joe Stewart of SecureWorks referred to a "persistent campaign of 'espionage-by-malware' emanating from the People's Republic of China (PRC)" with both corporate and state secrets being "Shanghaied" over the past 5 or 6 years.[72] The Northrop Grumman report states that the collection of US defense engineering data stolen through cyberattacks is regarded as having "saved the recipient of the information years of R&D and significant amounts of funding".[45] Concerns about the extent of cyberattacks on the US emanating from China has led to the situation being described as the dawn of a "new cold cyberwar".[73]

According to Edward Snowden, the National Security Agency spies on foreign companies.[74] In June 2015 Wikileaks published documents about the National Security Agency spying on French companies.[75]

United Kingdom edit

During December 2007, this was suddenly revealed that Jonathan Evans, head of the United Kingdom's MI5, had sent out confidential letters to 300 chief executives and security chiefs at the country's banks, accountants and legal firms warning of attacks from Chinese 'state organisations'.[76] A summary was also posted on the secure website of the Centre for the Protection of the National Infrastructure, accessed by some of the nation's 'critical infrastructure' companies, including 'telecoms firms, banks and water and electricity companies'.[77] One security expert warned about the use of 'custom trojans,' software specifically designed to hack into a particular firm and feed back data.[77] Whilst China was identified as the country most active in the use of internet spying, up to 120 other countries were said to be using similar techniques.[77] The Chinese government responded to UK accusations of economic espionage by saying that the report of such activities was 'slanderous' and that the government opposed hacking which is prohibited by law.[78]

Germany edit

German counter-intelligence experts have maintained the German economy is losing around €53 billion or the equivalent of 30,000 jobs to economic espionage yearly.[79]

In Operation Eikonal, German BND agents received "selector lists" from the NSA – search terms for their dragnet surveillance. They contain IP addresses, mobile phone numbers and email accounts with the BND surveillance system containing hundreds of thousands and possibly more than a million such targets.[80] These lists have been subject of controversy as in 2008 it was revealed that they contained some terms targeting the European Aeronautic Defence and Space Company (EADS), the Eurocopter project[81] as well as French administration,[82][80] which were first noticed by BND employees in 2005.[81] After the revelations made by whistleblower Edward Snowden, the BND decided to investigate the issue whose October 2013 conclusion was that at least 2,000 of these selectors were aimed at Western European or even German interests which has been a violation of the Memorandum of Agreement that the US and Germany signed in 2002 in the wake of the 9/11 terror attacks.[80] After reports emerged in 2014 that EADS and Eurocopter had been surveillance targets the Left Party and the Greens filed an official request to obtain evidence of the violations.[80][83]

The BND's project group charged with supporting the NSA investigative committee in German parliament set up in spring 2014, reviewed the selectors and discovered 40,000 suspicious search parameters, including espionage targets in Western European governments and numerous companies. The group also confirmed suspicions that the NSA had systematically violated German interests and concluded that the Americans could have perpetrated economic espionage directly under the Germans' noses.[80][84] The investigative parliamentary committee was not granted access to the NSA's selectors list as an appeal led by opposition politicians failed at Germany's top court. Instead the ruling coalition appointed an administrative judge, Kurt Graulich [de], as a "person of trust" who was granted access to the list and briefed the investigative commission on its contents after analyzing the 40,000 parameters.[85][86] In his almost 300-paged report[87] Graulich concluded that European government agencies were targeted massively and that Americans hence broke contractual agreements. He also found that German targets which received special protection from surveillance of domestic intelligence agencies by Germany's Basic Law (Grundgesetz) − including numerous enterprises based in Germany – were featured in the NSA's wishlist in a surprising plenitude.[88]

Competitive intelligence and economic or industrial espionage edit

"Competitive intelligence" involves the legal and ethical activity of systematically gathering, analyzing and managing information on industrial competitors.[89] It may include activities such as examining newspaper articles, corporate publications, websites, patent filings, specialised databases, information at trade shows and the like to determine information on a corporation.[90] The compilation of these crucial elements is sometimes termed[by whom?] CIS or CRS, a Competitive Intelligence Solution or Competitive Response Solution, with its roots in market research. Douglas Bernhardt has characterised "competitive intelligence" as involving "the application of principles and practices from military and national intelligence to the domain of global business";[91] it is the commercial equivalent of open-source intelligence.

The difference between competitive intelligence and economic or industrial espionage is not clear; one needs to understand the legal basics to recognize how to draw the line between the two.[92][93]

See also edit

Notes edit

  1. ^ These technologies, however, wren't streamlined or industrialized. Some of these findings were applied on plants used to produce chips for military purposes.
  2. ^ This may be explained by the fact that the defense industry was supported better than a civil one.

References edit

  1. ^ "Unusual suspects: Cyber-spying grows bigger and more boring". The Economist. 25 May 2013. Retrieved 25 May 2013.
  2. ^ Nasheri 2005, p. 10.
  3. ^ Nasheri 2005, pp. 8, 10, 73.
  4. ^ Nasheri 2005, p. 9.
  5. ^ Scalet 2003, p. 3.
  6. ^ Department of Defense 2002.
  7. ^ Nasheri 2005, p. 7.
  8. ^ Nasheri 2005, pp. 80–81.
  9. ^ a b c Palmer 1974, p. 12.
  10. ^ a b c d Reuters 1996.
  11. ^ Nasheri 2005, p. 80.
  12. ^ a b Nasheri 2005, p. 88.
  13. ^ a b Nasheri 2005, p. 82.
  14. ^ Nasheri 2005, p. 84.
  15. ^ "What are the advantages of using a computer?". www.computerhope.com. Retrieved 1 February 2022.
  16. ^ a b Rowe & Brook 2009, p. 84.
  17. ^ a b Harris 1998, p. 7.
  18. ^ a b Harris 1998, p. 9.
  19. ^ Harris 1998, p. 8.
  20. ^ Ben-Atar, Doron (2004). Trade Secrets: Intellectual Piracy and the Origins of American Industrial Power. Yale University Press. ISBN 9780300100068.
  21. ^ "The Spies Who Launched America's Industrial Revolution". www.history.com. 10 January 2019.
  22. ^ Hamilton, Alexander (1791). Report on manufactures. United States.
  23. ^ Zelchenko, Henry L. (February 1952). "Stealing America's Know-How: The Story of Amtorg". American Mercury. 74 (338): 75–84.
  24. ^ a b c Hanson 1987.
  25. ^ Heuertz, Ruth (April 1984). "Soviet Microprocessors and Microcomputers". BYTE. p. 348. Retrieved 23 October 2013.
  26. ^ a b c Palmer 1974, p. 13.
  27. ^ Wright 1987, p. 183.
  28. ^ Wright 1987, p. 184.
  29. ^ Glitz, Albrecht; Meyersson, Erik (2020). "Industrial Espionage and Productivity". American Economic Review. 110 (4): 1055–1103. doi:10.1257/aer.20171732. hdl:10230/33897. ISSN 0002-8282. S2CID 27286076.
  30. ^ Nodoushani & Nodoushani 2002.
  31. ^ Nasheri 2005, p. 53.
  32. ^ Nasheri 2005, pp. 53–54.
  33. ^ Greenwald, Glenn (5 September 2014). "The U.S. Government's Secret Plans to Spy for American Corporations". The Intercept.
  34. ^ Goldsmith, Jack (23 March 2015). "The Precise (and Narrow) Limits on U.S. Economic Espionage". www.lawfareblog.com.
  35. ^ Woolsey, James (7 March 2000). "Intelligence Gathering and Democracies: The Issue of Economic and Industrial Espionage". Federation of American Scientists.
  36. ^ "NSA spying on Petrobras, if proven, is industrial espionage: Rousseff". Reuters. 9 September 2013.
  37. ^ "NSA 'engaged in industrial espionage' - Snowden". BBC. 26 January 2014.
  38. ^ "美国中央情报局网络武器库分析与披露". qianxin.
  39. ^ "Chinese infosec firm accuses CIA-backed group of numerous hacks". itwire.com.
  40. ^ "US Officials: Israel Spying on America Has Reached 'Terrifying' Levels". Business Insider.
  41. ^ Clarke, Duncan L. (1998). "Israel's Economic Espionage in the United States". Journal of Palestine Studies. 27 (4): 20–35. doi:10.2307/2538128. JSTOR 2538128.
  42. ^ Cockburn, patrick (13 October 1993). "Israel accused of selling US secrets to China". The Independent.
  43. ^ Stein, Jeff (8 May 2014). "ISRAEL'S AGGRESSIVE SPYING IN THE U.S. MOSTLY HUSHED UP". Newsweek.
  44. ^ Boggon 1996.
  45. ^ a b c d DeWeese et al. 2009.
  46. ^ Piller 2002.
  47. ^ a b Lohr 2010.
  48. ^ Nasheri 2005, p. 112.
  49. ^ Anderson 2007.
  50. ^ Twilley, Nicolla; Graber, Cynthia (2 August 2017). "Britain's Great Tea Heist". The Atlantic. Retrieved 30 September 2022.
  51. ^ Rose, Sarah. "The Great British Tea Heist". Smithsonian Magazine. Retrieved 30 September 2022.
  52. ^ "The Scottish Spy Who Stole China's Tea Empire". NPR. Retrieved 30 September 2022.
  53. ^ a b c The New York Times 1991.
  54. ^ Jehl 1993.
  55. ^ John A. Nolan. "A Case Study in French Espionage: Renaissance Software" (PDF). US Department of Energy: Hanford.
  56. ^ Meredith 1997.
  57. ^ Clark 2009.
  58. ^ a b c Harvey 2010.
  59. ^ a b c Branigan 2010.
  60. ^ a b Ahmed 2010.
  61. ^ Beaumont 2010.
  62. ^ Reuters 2010.
  63. ^ Markoff & Barboza 2010.
  64. ^ Lawson 2010.
  65. ^ Rogin 2010.
  66. ^ Levine 2010.
  67. ^ Dongxiau Yue, et al., v. Chordiant Software, Inc. 2010.
  68. ^ "NSA spying on Petrobras, if proven, is industrial espionage: Rousseff". Reuters. 9 September 2013.
  69. ^ "Brazil-Canada espionage: Which countries are we spying on?". Canadian Broadcasting Corporation. 9 October 2013.
  70. ^ "CIA agents have been hacking China for 11 years, security firm claims". The Next Web. 4 March 2020.
  71. ^ "The CIA Hacking Group (APT-C-39) Conducts Cyber-Espionage Operation on China's Critical Industries for 11 Years". 360 Core Security.
  72. ^ Stewart 2010.
  73. ^ Navarro & Autry 2010.
  74. ^ "Edward Snowden says NSA engages in industrial espionage". Canadian Broadcasting Corporation. 26 January 2014.
  75. ^ "Wikileaks-Enthüllung: NSA soll auch französische Wirtschaft bespitzelt haben". Der Spiegel. 29 June 2015.
  76. ^ "British firms told of China cyber spying". The Seattle Times. Associated Press. 2 December 2007. Retrieved 15 April 2020.
  77. ^ a b c Blakely 2007a.
  78. ^ Blakely 2007b.
  79. ^ Connolly, Kate. "Germany accuses China of industrial espionage". Guardian News and Media Limited. Retrieved 22 July 2009.
  80. ^ a b c d e "Spying Close to Home: German Intelligence Under Fire for NSA Cooperation - SPIEGEL ONLINE - International". Der Spiegel. 24 April 2015. Retrieved 4 January 2017.
  81. ^ a b Dehmer, Dagmar; Haselberger, Stephan (4 May 2015). "BND und NSA: Die Chronologie des Spionageskandals – Politik". Der Tagesspiegel (in German).
  82. ^ "Wie die NSA europäische Unternehmen ausspionierte". Süddeutsche.de (in German). 24 April 2015.
  83. ^ "Bundesverfassungsgericht - BVerfG, Beschluss des Zweiten Senats vom 13. n". bundesverfassungsgericht.de (in German). 13 October 2016. Retrieved 4 January 2017.
  84. ^ Denkler, Thorsten. "Geheimdienst-Affäre: NSA jubelte BND deutsche Spähziele unter". Süddeutsche Zeitung (in German). Retrieved 4 January 2017.
  85. ^ "German Constitutional Court rules out access to NSA's 'selectors' list". Deutsche Welle. Retrieved 4 January 2017.
  86. ^ Meiritz, Annett (July 2015). "Designierter NSA-Sonderermittler: Ein Mann, 40.000 brisante Daten". Der Spiegel. Retrieved 4 January 2017.
  87. ^ "Der Graulich-Abschlussbericht" (PDF). Retrieved 4 January 2017.
  88. ^ Baumgärtner, Maik; Knobbe, Martin (30 October 2015). "Geheimdienstaffäre: Sonderermittler spricht von klarem Vertragsbruch der NSA". Der Spiegel. Retrieved 4 January 2017.
  89. ^ Nasheri 2005, p. 73.
  90. ^ Nasheri 2005, p. 74.
  91. ^ Walker, Nick (19 December 1995). "Marketing: Know your enemy". Indy/Life. The Independent. Retrieved 30 January 2019. 'Competitive intelligence involves the application of principles and practices from military and national intelligence to the domain of global business. It is where the art and disciplines of both intelligence and strategic management converge. Competitive intelligence is the flip side of the strategy coin,' stresses Douglas Bernhardt, author of Perfectly Legal Competitor Intelligence.
  92. ^ "The Economic Espionage Act: The Rules Have Not Changed, Competitive Intelligence Review, July/August 1998" (PDF). Retrieved 12 February 2012.
  93. ^ "Competitive Intelligence, Law, and Ethics: The EEA Revisited Again (and Hopefully for the Last Time), Competitive Intelligence Magazine, July/September 2011" (PDF). Retrieved 12 February 2012.

Bibliography edit

Books edit

  • DeWeese, Steve; Krekel, Bryan; Bakos, George; Barnet, Christopher (9 October 2009). (PDF). McLean, Virginia, USA: Northrop Grumman Corporation. Archived from the original (PDF) on 3 February 2011.
  • Harris, John (1998). Industrial Espionage and Technology Transfer: Britain and France in the Eighteenth Century. Aldershot: Ashgate Publishing Limited. p. 680. ISBN 0-7546-0367-9.
  • Nasheri, Hedieh (2005). Economic Espionage and Industrial Spying. Cambridge: Cambridge University Press. p. 270. ISBN 0-521-54371-1.
  • Navarro, Peter; Autry, Greg (15 January 2010). "China's war on the U.S. economy". San Francisco Chronicle. Retrieved 31 January 2010.
  • Rowe, William; Brook, Timothy (2009). China's Last Empire: The Great Qing. Cambridge, Massachusetts: The Belknap Press of Harvard University Press. p. 368. ISBN 978-0-674-03612-3.
  • Wright, Peter (1987). Spycatcher. New York: Viking. p. 270. ISBN 0-521-54371-1.

Newspapers and journals edit

  • Ahmed, Murad (18 January 2010). "Google cyber-attack from China 'an inside job'". The Times. Retrieved 22 January 2010.
  • "Chinese stealth fighter jet may use US technology". The Guardian. London. Associated Press. 23 January 2011. Retrieved 23 January 2011.
  • Beaumont, Claudine (18 January 2010). . The Daily Telegraph. Archived from the original on 3 December 2010. Retrieved 30 January 2010.
  • Blakely, Rhys (1 December 2007). "MI5 alert on China's cyberspace spy threat". The Times. Retrieved 30 January 2010.
  • Blakely, Rhys (5 December 2007). "China says it is cyber-espionage victim". The Times. Retrieved 30 January 2010.
  • Boggon, Steve (1 January 1996). "The spy who loved me (and my laptop)". The Independent. London. Retrieved 13 February 2010.
  • Branigan, Tania (13 January 2010). "Google to end censorship in China over cyber attacks". The Guardian. Retrieved 22 January 2010.
  • Clark, Andrew (17 April 2009). "Starwood sues Hilton for 'stealing trade secrets'". The Guardian. London. Retrieved 24 February 2010.
  • Dongxiau Yue, et al., v. Chordiant Software, Inc., No. C08-00019 JW U.S. (In the United States District Court for the Northern District of California San Jose Division. 2010-05-14).
  • Hanson, Philip (April 1987), "Soviet industrial espionage", Bulletin of the Atomic Scientists, 43 (3): 25–29, Bibcode:1987BuAtS..43c..25H, doi:10.1080/00963402.1987.11459504
  • Palmer, Raymond (1974), "Espionage threat to British industry: Spies don't only operate in books and films. They can be for real. And their target might be your industrial secrets", Industrial Management and Data Systems, 74 (7/8)
  • Piller, Charles (8 July 2002). "Hackers Target Energy Industry". Los Angeles Times. Retrieved 24 February 2010.
  • "Volkswagen Sues GM for $6.6 Million, Accusing U.S. Firm of Defamation". Los Angeles Times. Reuters. 12 May 1996. Retrieved 24 February 2010.
  • "Google probes possible inside help on China attack". The Globe and Mail. Toronto. Reuters. 13 January 2010. Retrieved 22 January 2010.
  • Rogin, Josh (14 January 2010). "China's expansion of economic espionage boils over". Foreign Policy. Retrieved 5 April 2010.
  • . The New York Times. 14 September 1991. Archived from the original on 16 October 2015. Retrieved 13 February 2010.
  • Nodoushani, Omid; Nodoushani, Patricia A (April 2002), "Industrial Espionage: The Dark Side of the "Digital Age"", Competitiveness Review, 12 (2): 96–101, doi:10.1108/eb046445
  • Harvey, Mike (16 January 2010). "China accused of cyber attack on Google and 'global industrial targets'". The Times. Retrieved 30 January 2010.
  • Jehl, Douglas (30 April 1993). "U.S. Expanding Its Effort to Halt Spying by Allies". The New York Times. Retrieved 13 February 2010.
  • Lawson, Dominic (17 January 2010). "Be afraid, China, the Google dragon stirs". The Times. Retrieved 22 January 2010.
  • Lohr, Steve (18 January 2010). "Companies Fight Endless War Against Computer Attacks". The New York Times. Retrieved 22 January 2010.
  • Markoff, John; Barboza, David (18 February 2010). "2 China Schools Said to Be Tied to Online Attacks". The New York Times. Retrieved 6 April 2010.
  • Meredith, Robyn (9 January 1997). "VW Agrees To Pay G.M. $100 Million in Espionage Suit". The New York Times. Retrieved 24 February 2010.

Web edit

  • Levine, Dan (24 May 2010). "Federal Judge Trashes Novel Economic Espionage Case". Law.com. Retrieved 11 December 2010.
  • Scalet, Sarah D (1 May 2003). "Corporate Spying: Snooping, by Hook or by Crook" (web page). CSO Security and Risk. Retrieved 21 March 2010.
  • Stewart, Joe (19 January 2010). "Operation Aurora: Clues in the Code". Secureworks.com. Secureworks. Retrieved 9 March 2016.
  • Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence). "Annual Polygraph Report to Congress (2002 Fiscal Year)". Department of Defense. Retrieved 3 April 2010.{{cite web}}: CS1 maint: multiple names: authors list (link)
  • Anderson, Nate (14 May 2007). "Massive DDoS attacks target Estonia; Russia accused". Ars Technica. Retrieved 5 April 2010.

Further reading edit

  • Barry, Marc; Penenberg, Adam L (2000). Spooked: Espionage in Corporate America. Cambridge, Massachusetts: Perseus Publishing. p. 208. ISBN 978-0-7382-0593-9.
  • "Stuxnet worm hits Iran nuclear plant staff computers". BBC News. BBC. 26 September 2010. Retrieved 27 September 2010.
  • Fink, Steven (2002). Sticky Fingers: Managing the Global Risk of Economic Espionage. Chicago: Dearborn Trade. p. 368. ISBN 978-0-7931-4827-1.
  • Fitchett, Joseph (19 July 1995). . The New York Times. Archived from the original on 11 May 2013. Retrieved 13 February 2010.
  • Guynn, Jessica (15 January 2010). "Chinese hackers pose a growing threat to U.S. firms". Los Angeles Times. Retrieved 31 January 2010.
  • Byron, Betty (2013). The Iris Covenant. New York: Tate Publishing. p. 454. ISBN 978-1-62295-014-0.
  • Helft, Miguel; Markoff, John (13 January 2010). "In Rebuke of China, Focus Falls on Cybersecurity". The New York Times. Retrieved 30 January 2010.
  • Javers, Eamon (2010). Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage. New York: Harper Collins Business. p. 320. ISBN 978-0-06-169720-3.
  • Keizer, Gregg (9 December 2010). "Pro-WikiLeaks cyber army gains strength; thousands join DDoS attacks". Computerworld. Retrieved 11 December 2010.
  • Kennedy, John (10 December 2010). "Is your kid part of the 'Operation Payback' army?". Silicon Republic. Retrieved 11 December 2010.
  • Macartney, Jan (9 February 2010). "Chinese police arrest six as hacker training website is closed down". The Times. Retrieved 13 February 2010.
  • Murphy, Samantha (9 December 2010). "WikiLeaks Hactivism is Not Cyberwarfare, Experts Say". Tech News Daily. Retrieved 11 December 2010.
  • Pitorri, Peter (2010). Counterespionage for American Business. Chicago: Butterworth-Heinemann Limited. p. 144. ISBN 978-0-7506-7044-9.
  • Rustmann, F.W. Jr. (2002). CIA, INC.: Espionage and the Craft of Business Intelligence. Dulles, VA: Potomac Books. p. 240. ISBN 978-1-57488-520-0.
  • Swinford, Steven (10 December 2010). "WikiLeaks hackers threaten British Government". The Daily Telegraph. London. Retrieved 11 December 2010.
  • Winker, Ira. (1997). Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It. Darby, PA: Darby, PA. p. 240. ISBN 978-0-7881-6529-0.

industrial, espionage, economic, espionage, corporate, spying, corporate, espionage, form, espionage, conducted, commercial, purposes, instead, purely, national, security, teapot, with, actresses, vezzi, porcelain, factory, venice, 1725, vezzi, brothers, were,. Industrial espionage economic espionage corporate spying or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security 1 Teapot with Actresses Vezzi porcelain factory Venice c 1725 The Vezzi brothers were involved in a series of incidents of industrial espionage It was these actions that led to the secret of manufacturing Meissen porcelain becoming widely known While political espionage is conducted or orchestrated by governments and is international in scope industrial or corporate espionage is more often national and occurs between companies or corporations 2 Contents 1 Forms of economic and industrial espionage 2 Target industries 3 Information theft and sabotage 4 Agents and the process of collection 5 History 5 1 Origins 5 2 20th century 5 2 1 Operation Brunnhilde 5 2 2 Soviet spetsinformatsiya system 5 3 Legacy of Cold War espionage 5 4 Industrial espionage as part of US foreign policy 5 5 Israel s economic espionage in the United States 6 Use of computers and the Internet 6 1 Personal computers 6 2 The Internet 6 3 Opportunities for sabotage 6 4 Malware 6 5 Distributed denial of service DDoS attack 7 Notable cases 7 1 British East India Company 7 2 France and the United States 7 3 Volkswagen 7 4 Hilton and Starwood 7 5 Google and Operation Aurora 7 6 USA v Lan Lee et al 7 7 Dongxiao Yue and Chordiant Software Inc 8 Concerns of national governments 8 1 Brazil 8 2 China 8 3 United States 8 4 United Kingdom 8 5 Germany 9 Competitive intelligence and economic or industrial espionage 10 See also 11 Notes 12 References 13 Bibliography 13 1 Books 13 2 Newspapers and journals 13 3 Web 14 Further readingForms of economic and industrial espionage editEconomic or industrial espionage takes place in two main forms In short the purpose of espionage is to gather knowledge about one or more organizations It may include the acquisition of intellectual property such as information on industrial manufacture ideas techniques and processes recipes and formulas Or it could include sequestration of proprietary or operational information such as that on customer datasets pricing sales marketing research and development policies prospective bids planning or marketing strategies or the changing compositions and locations of production 3 It may describe activities such as theft of trade secrets bribery blackmail and technological surveillance As well as orchestrating espionage on commercial organizations governments can also be targets for example to determine the terms of a tender for a government contract Target industries edit nbsp During testing automakers commonly disguise upcoming car models with camouflage paint patterns designed to obfuscate the vehicle s lines Padded covers or deceptive decals are also often used This is also to prevent motoring media outlets from spoiling the model before its planned reveal Economic and industrial espionage is most commonly associated with technology heavy industries including computer software and hardware biotechnology aerospace telecommunications transportation and engine technology automobiles machine tools energy materials and coatings and so on Silicon Valley is known to be one of the world s most targeted areas for espionage though any industry with information of use to competitors may be a target 4 Information theft and sabotage editInformation can make the difference between success and failure if a trade secret is stolen the competitive playing field is leveled or even tipped in favor of a competitor Although a lot of information gathering is accomplished legally through competitive intelligence at times corporations feel the best way to get information is to take it 5 Economic or industrial espionage is a threat to any business whose livelihood depends on information In recent years economic or industrial espionage has taken on an expanded definition For instance attempts to sabotage a corporation may be considered industrial espionage in this sense the term takes on the wider connotations of its parent word That espionage and sabotage corporate or otherwise have become more clearly associated with each other is also demonstrated by a number of profiling studies some government some corporate The United States government currently has a polygraph examination entitled the Test of Espionage and Sabotage TES contributing to the notion of the interrelationship between espionage and sabotage countermeasures 6 In practice particularly by trusted insiders they are generally considered functionally identical for the purpose of informing countermeasures Agents and the process of collection editEconomic or industrial espionage commonly occurs in one of two ways Firstly a dissatisfied employee appropriates information to advance interests or to damage the company Secondly a competitor or foreign government seeks information to advance its own technological or financial interest 7 Moles or trusted insiders are generally considered the best sources for economic or industrial espionage 8 Historically known as a patsy an insider can be induced willingly or under duress to provide information A patsy may be initially asked to hand over inconsequential information and once compromised by committing a crime blackmailed into handing over more sensitive material 9 Individuals may leave one company to take up employment with another and take sensitive information with them 10 Such apparent behavior has been the focus of numerous industrial espionage cases that have resulted in legal battles 10 Some countries hire individuals to do spying rather than the use of their own intelligence agencies 11 Academics business delegates and students are often thought to be used by governments in gathering information 12 Some countries such as Japan have been reported to expect students to be debriefed on returning home 12 A spy may follow a guided tour of a factory and then get lost 9 A spy could be an engineer a maintenance man a cleaner an insurance salesman or an inspector anyone who has legitimate access to the premises 9 A spy may break into the premises to steal data and may search through waste paper and refuse known as dumpster diving 13 Information may be compromised via unsolicited requests for information marketing surveys or use of technical support or research or software facilities Outsourced industrial producers may ask for information outside the agreed upon contract 14 Computers have facilitated the process of collecting information because of the ease of access to large amounts of information through physical contact or the Internet 15 History editOrigins edit nbsp The work of a European priest Father Francois Xavier d Entrecolles to reveal to Europe the manufacturing methods of Chinese porcelain in 1712 is sometimes considered an early case of industrial espionage 16 Economic and industrial espionage has a long history Father Francois Xavier d Entrecolles who visited Jingdezhen China in 1712 and later used this visit to reveal the manufacturing methods of Chinese porcelain to Europe is sometimes considered to have conducted an early case of industrial espionage 16 Historical accounts have been written of industrial espionage between Britain and France 17 Attributed to Britain s emergence as an industrial creditor the second decade of the 18th century saw the emergence of a large scale state sponsored effort to surreptitiously take British industrial technology to France 17 Witnesses confirmed both the inveigling of tradespersons abroad and the placing of apprentices in England 18 Protests by those such as ironworkers in Sheffield and steelworkers in Newcastle clarification needed about skilled industrial workers being enticed abroad led to the first English legislation aimed at preventing this method of economic and industrial espionage 19 18 This did not prevent Samuel Slater from bringing British textile technology to the United States in 1789 In order to catch up with technological advances of European powers the US government in the eighteenth and nineteenth centuries actively encouraged intellectual piracy 20 21 American founding father and first U S Treasury Secretary Alexander Hamilton advocated rewarding those bringing improvements and secrets of extraordinary value 22 into the United States This was instrumental in making the United States a haven for industrial spies 20th century edit East West commercial development opportunities after World War I saw a rise in Soviet interest in American and European manufacturing know how exploited by Amtorg Corporation 23 Later with Western restrictions on the export of items thought likely to increase military capabilities to the USSR Soviet industrial espionage was a well known adjunct to other spying activities up until the 1980s 24 BYTE reported in April 1984 for example that although the Soviets sought to develop their own microelectronics their technology appeared to be several years behind the West s Soviet CPUs required multiple chips and appeared to be close or exact copies of American products such as the Intel 3000 and DEC LSI 11 2 25 a Operation Brunnhilde edit Some of these activities were directed via the East German Stasi Ministry for State Security One such operation Operation Brunnhilde operated from the mid 1950s until early 1966 and made use of spies from many Communist Bloc countries Through at least 20 forays many western European industrial secrets were compromised 26 One member of the Brunnhilde ring was a Swiss chemical engineer Dr Jean Paul Soupert also known as Air Bubble living in Brussels He was described by Peter Wright in Spycatcher as having been doubled by the Belgian Surete de l Etat 26 27 He revealed information about industrial espionage conducted by the ring including the fact that Russian agents had obtained details of Concorde s advanced electronics system 28 He testified against two Kodak employees living and working in Britain during a trial in which they were accused of passing information on industrial processes to him though they were eventually acquitted 26 According to a 2020 American Economic Review study East German industrial espionage in West Germany significantly reduced the gap in total factor productivity between the two countries 29 Soviet spetsinformatsiya system edit A secret report from the Military Industrial Commission of the USSR VPK from 1979 80 detailed how spetsinformatsiya Russian specinformaciya special records could be utilised in twelve different military industrial areas Writing in the Bulletin of the Atomic Scientists Philip Hanson detailed a spetsinformatsiya system in which 12 industrial branch ministries formulated requests for information to aid technological development in their military programs Acquisition plans were described as operating on 2 year and 5 year cycles with about 3000 tasks underway each year Efforts were aimed at civilian and military industrial targets such as in the petrochemical industries Some information was gathered to compare Soviet technological advancement with that of their competitors Much unclassified information was also gathered blurring the boundary with competitive intelligence 24 The Soviet military was recognised as making much better use of acquired information than civilian industries where their record in replicating and developing industrial technology was poor b 24 Legacy of Cold War espionage edit Following the demise of the Soviet Union and the end of the Cold War commentators including the US Congressional Intelligence Committee noted a redirection amongst the espionage community from military to industrial targets with Western and former communist countries making use of underemployed spies and expanding programs directed at stealing such information 30 31 The legacy of Cold War spying included not just the redirection of personnel but the use of spying apparatus such as computer databases scanners for eavesdropping spy satellites bugs and wires 32 Industrial espionage as part of US foreign policy edit According to an article from news website theintercept com potentially sabotaging another country s hi tech industries and their top companies has long been a sanctioned American strategy The article was based on a leaked report issued from former U S Director of National Intelligence James R Clapper s office that evaluated a theoretical scenario on how intelligence could be used to overcome a loss of the United States technological and innovative edge The report did not show any actual occurrence of U S conducted industrial espionage and when contacted the Director of National Intelligence office responded with the United States unlike our adversaries does not steal proprietary corporate information to further private American companies bottom lines and that the Intelligence Community regularly engages in analytic exercises to identify potential future global environments and how the IC could help the United States Government respond The report he said is not intended to be and is not a reflection of current policy or operations 33 Former CIA Director Stansfield Turner stated in 1991 Nevertheless as we increase emphasis on securing economic intelligence we will have to spy on the more developed countries our allies and friends with whom we compete economically but to whom we turn first for political and military assistance in a crisis This means that rather than instinctively reaching for human on site spying the United States will want to look to those impersonal technical systems primarily satellite photography and intercepts 34 Former CIA Director James Woolsey acknowledged in 2000 that the United States steals economic secrets from foreign firms and their governments with espionage with communications with reconnaissance satellites He also stated it is not to provide secrets technological secrets to American industry He listed the three reasons as understanding whether sanctions are functioning for countries under sanction monitoring dual use technology that could be used to produce or develop weapons of mass destruction and to spy on bribery to uphold the Foreign Corrupt Practices Act 35 In 2013 The United States was accused of spying on Brazilian oil company Petrobras Brazil s President Dilma Rousseff stated that it was tantamount to industrial espionage and had no security justification 36 In 2014 former US intelligence officer Edward Snowden stated that America s National Security Agency was engaged in industrial espionage and that they spied on German companies that compete with US firms He also highlighted the fact the NSA uses mobile phone apps such as Angry Birds to gather personal data 37 In September 2019 security firm Qi An Xin published report linking the CIA to a series of attacks targeting Chinese aviation agencies between 2012 and 2017 38 39 Israel s economic espionage in the United States edit Israel has an active program to gather proprietary information within the United States These collection activities are primarily directed at obtaining information on military systems and advanced computing applications that can be used in Israel s sizable armaments industry 40 41 Israel was accused by the US government of selling US military technology and secrets to China 42 In 2014 American counter intelligence officials told members of the House Judiciary and Foreign Affairs committees that Israel s current espionage activities in America are unrivaled 43 Use of computers and the Internet editPersonal computers edit Computers have become key in exercising industrial espionage due to the enormous amount of information they contain and the ease at which it can be copied and transmitted The use of computers for espionage increased rapidly in the 1990s Information has commonly been stolen by individuals posing as subsidiary workers such as cleaners or repairmen gaining access to unattended computers and copying information from them Laptops were and still are a prime target with those traveling abroad on business being warned not to leave them for any period of time Perpetrators of espionage have been known to find many ways of conning unsuspecting individuals into parting often only temporarily from their possessions enabling others to access and steal information 44 A bag op refers to the use of hotel staff to access data such as through laptops in hotel rooms Information may be stolen in transit in taxis at airport baggage counters baggage carousels on trains and so on 13 The Internet edit The rise of the Internet and computer networks has expanded the range and detail of information available and the ease of access for the purpose of industrial espionage 45 This type of operation is generally identified as state backed or sponsored because the access to personal financial or analytic resources identified exceed that which could be accessed by cybercriminals or individual hackers Sensitive military or defense engineering or other industrial information may not have immediate monetary value to criminals compared with say bank details Analysis of cyberattacks suggests deep knowledge of networks with targeted attacks obtained by numerous individuals operating in a sustained organized way 45 Opportunities for sabotage edit The rising use of the internet has also extended opportunities for industrial espionage with the aim of sabotage In the early 2000s it was noticed that energy companies were increasingly coming under attack from hackers Energy power systems doing jobs like monitoring power grids or water flow once isolated from the other computer networks were now being connected to the internet leaving them more vulnerable having historically few built in security features 46 The use of these methods of industrial espionage have increasingly become a concern for governments due to potential attacks by terrorist groups or hostile foreign governments Malware edit One of the means of perpetrators conducting industrial espionage is by exploiting vulnerabilities in computer software Malware and spyware are tool s for industrial espionage in transmitting digital copies of trade secrets customer plans future plans and contacts Newer forms of malware include devices which surreptitiously switch on mobile phones camera and recording devices In attempts to tackle such attacks on their intellectual property companies are increasingly keeping important information off network leaving an air gap with some companies building Faraday cages to shield from electromagnetic or cellphone transmissions 47 Distributed denial of service DDoS attack edit The distributed denial of service DDoS attack uses compromised computer systems to orchestrate a flood of requests on the target system causing it to shut down and deny service to other users 48 It could potentially be used for economic or industrial espionage with the purpose of sabotage This method was allegedly utilized by Russian secret services over a period of two weeks on a cyberattack on Estonia in May 2007 in response to the removal of a Soviet era war memorial 49 Notable cases editBritish East India Company edit In 1848 the British East India Company broke Qing China s global near monopoly on tea production by smuggling Chinese tea out of the nation and copying Chinese tea making processes 50 The British Empire had previously run a considerable trade deficit with China by importing the nation s tea and other goods The British attempted to rectify the deficit by trading opium to the Chinese but encountered difficulties after the Daoguang Emperor banned the opium trade and the First Opium War broke out To avoid further issues in trading tea with China the East India Company hired Scottish botanist Robert Fortune to travel to China under the guise of a Chinese nobleman and obtain Chinese trade secrets and tea plants for replanting Infiltrating Chinese tea making facilities Fortune recorded the Chinese process for creating tea and smuggled tea leaves and seeds back to the East India Company 51 These tea plants were later introduced into India helping it surpass China as the world s largest tea producer 52 France and the United States edit Between 1987 and 1989 IBM and Texas Instruments were thought to have been targeted by French DGSE with the intention of helping France s Groupe Bull 53 In 1993 U S aerospace companies were also thought to have been targeted by French interests 54 During the early 1990s France was described as one of the most aggressive pursuers of espionage to garner foreign industrial and technological secrets 53 France accused the U S of attempting to sabotage its high tech industrial base 53 The government of France has been alleged to have conducted ongoing industrial espionage against American aerodynamics and satellite companies 55 Volkswagen edit In 1993 car manufacturer Opel the German division of General Motors accused Volkswagen of industrial espionage after Opel s chief of production Jose Ignacio Lopez and seven other executives moved to Volkswagen 10 Volkswagen subsequently threatened to sue for defamation resulting in a four year legal battle 10 The case which was finally settled in 1997 resulted in one of the largest settlements in the history of industrial espionage with Volkswagen agreeing to pay General Motors 100 million and to buy at least 1 billion of car parts from the company over 7 years although it did not explicitly apologize for Lopez s behavior 56 Hilton and Starwood edit In April 2009 Starwood accused its rival Hilton Worldwide of a massive case of industrial espionage After being acquired by The Blackstone Group Hilton employed 10 managers and executives from Starwood Starwood accused Hilton of stealing corporate information relating to its luxury brand concepts used in setting up its Denizen hotels Specifically former head of its luxury brands group Ron Klein was accused of downloading truckloads of documents from a laptop to his personal email account 57 Google and Operation Aurora edit On 13 January 2010 Google announced that operators from within China had hacked into their Google China operation stealing intellectual property and in particular accessing the email accounts of human rights activists 58 59 The attack was thought to have been part of a more widespread cyber attack on companies within China which has become known as Operation Aurora 59 Intruders were thought to have launched a zero day attack exploiting a weakness in the Microsoft Internet Explorer browser the malware used being a modification of the trojan Hydraq 47 Concerned about the possibility of hackers taking advantage of this previously unknown weakness in Internet Explorer the governments of Germany and subsequently France issued warnings not to use the browser 60 There was speculation that insiders had been involved in the attack with some Google China employees being denied access to the company s internal networks after the company s announcement 61 62 In February 2010 computer experts from the U S National Security Agency claimed that the attacks on Google probably originated from two Chinese universities associated with expertise in computer science Shanghai Jiao Tong University and the Shandong Lanxiang Vocational School the latter having close links to the Chinese military 63 Google claimed at least 20 other companies had also been targeted in the cyber attack said by the London Times to have been part of an ambitious and sophisticated attempt to steal secrets from unwitting corporate victims including defence contractors finance and technology companies 59 58 60 Rather than being the work of individuals or organised criminals the level of sophistication of the attack was thought to have been more typical of a nation state 58 Some commentators speculated as to whether the attack was part of what is thought to be a concerted Chinese industrial espionage operation aimed at getting high tech information to jump start China s economy 64 Critics pointed to what was alleged to be a lax attitude to the intellectual property of foreign businesses in China letting them operate but then seeking to copy or reverse engineer their technology for the benefit of Chinese national champions 65 In Google s case they may have also been concerned about the possible misappropriation of source code or other technology for the benefit of Chinese rival Baidu In March 2010 Google subsequently decided to cease offering censored results in China leading to the closing of its Chinese operation USA v Lan Lee et al edit The United States charged two former NetLogic Inc engineers Lan Lee and Yuefei Ge of committing economic espionage against TSMC and NetLogic Inc A jury acquitted the defendants of the charges with regard to TSMC and deadlocked on the charges with regard to NetLogic In May 2010 a federal judge dismissed all the espionage charges against the two defendants The judge ruled that the U S government presented no evidence of espionage 66 Dongxiao Yue and Chordiant Software Inc edit In May 2010 the federal jury convicted Chordiant Software Inc a U S corporation of stealing Dongxiao Yue s JRPC technologies and used them in a product called Chordiant Marketing Director Yue previously filed lawsuits against Symantec Corporation for a similar theft 67 Concerns of national governments editBrazil edit Revelations from the Snowden documents have provided information to the effect that the United States notably vis a vis the NSA has been conducting aggressive economic espionage against Brazil 68 Canadian intelligence has apparently supported U S economic espionage efforts 69 China edit The Chinese cybersecurity company Qihoo 360 accused the Central Intelligence Agency of the United States of an 11 year long hacking campaign 70 that targeted several industries including aviation organizations scientific research institutions petroleum firms internet companies and government agencies 71 United States edit A 2009 report to the US government by aerospace and defense company Northrop Grumman describes Chinese economic espionage as comprising the single greatest threat to U S technology 45 Blogging on the 2009 cyber attack on Google Joe Stewart of SecureWorks referred to a persistent campaign of espionage by malware emanating from the People s Republic of China PRC with both corporate and state secrets being Shanghaied over the past 5 or 6 years 72 The Northrop Grumman report states that the collection of US defense engineering data stolen through cyberattacks is regarded as having saved the recipient of the information years of R amp D and significant amounts of funding 45 Concerns about the extent of cyberattacks on the US emanating from China has led to the situation being described as the dawn of a new cold cyberwar 73 According to Edward Snowden the National Security Agency spies on foreign companies 74 In June 2015 Wikileaks published documents about the National Security Agency spying on French companies 75 United Kingdom edit During December 2007 this was suddenly revealed that Jonathan Evans head of the United Kingdom s MI5 had sent out confidential letters to 300 chief executives and security chiefs at the country s banks accountants and legal firms warning of attacks from Chinese state organisations 76 A summary was also posted on the secure website of the Centre for the Protection of the National Infrastructure accessed by some of the nation s critical infrastructure companies including telecoms firms banks and water and electricity companies 77 One security expert warned about the use of custom trojans software specifically designed to hack into a particular firm and feed back data 77 Whilst China was identified as the country most active in the use of internet spying up to 120 other countries were said to be using similar techniques 77 The Chinese government responded to UK accusations of economic espionage by saying that the report of such activities was slanderous and that the government opposed hacking which is prohibited by law 78 Germany edit German counter intelligence experts have maintained the German economy is losing around 53 billion or the equivalent of 30 000 jobs to economic espionage yearly 79 In Operation Eikonal German BND agents received selector lists from the NSA search terms for their dragnet surveillance They contain IP addresses mobile phone numbers and email accounts with the BND surveillance system containing hundreds of thousands and possibly more than a million such targets 80 These lists have been subject of controversy as in 2008 it was revealed that they contained some terms targeting the European Aeronautic Defence and Space Company EADS the Eurocopter project 81 as well as French administration 82 80 which were first noticed by BND employees in 2005 81 After the revelations made by whistleblower Edward Snowden the BND decided to investigate the issue whose October 2013 conclusion was that at least 2 000 of these selectors were aimed at Western European or even German interests which has been a violation of the Memorandum of Agreement that the US and Germany signed in 2002 in the wake of the 9 11 terror attacks 80 After reports emerged in 2014 that EADS and Eurocopter had been surveillance targets the Left Party and the Greens filed an official request to obtain evidence of the violations 80 83 The BND s project group charged with supporting the NSA investigative committee in German parliament set up in spring 2014 reviewed the selectors and discovered 40 000 suspicious search parameters including espionage targets in Western European governments and numerous companies The group also confirmed suspicions that the NSA had systematically violated German interests and concluded that the Americans could have perpetrated economic espionage directly under the Germans noses 80 84 The investigative parliamentary committee was not granted access to the NSA s selectors list as an appeal led by opposition politicians failed at Germany s top court Instead the ruling coalition appointed an administrative judge Kurt Graulich de as a person of trust who was granted access to the list and briefed the investigative commission on its contents after analyzing the 40 000 parameters 85 86 In his almost 300 paged report 87 Graulich concluded that European government agencies were targeted massively and that Americans hence broke contractual agreements He also found that German targets which received special protection from surveillance of domestic intelligence agencies by Germany s Basic Law Grundgesetz including numerous enterprises based in Germany were featured in the NSA s wishlist in a surprising plenitude 88 Competitive intelligence and economic or industrial espionage edit Competitive intelligence involves the legal and ethical activity of systematically gathering analyzing and managing information on industrial competitors 89 It may include activities such as examining newspaper articles corporate publications websites patent filings specialised databases information at trade shows and the like to determine information on a corporation 90 The compilation of these crucial elements is sometimes termed by whom CIS or CRS a Competitive Intelligence Solution or Competitive Response Solution with its roots in market research Douglas Bernhardt has characterised competitive intelligence as involving the application of principles and practices from military and national intelligence to the domain of global business 91 it is the commercial equivalent of open source intelligence The difference between competitive intelligence and economic or industrial espionage is not clear one needs to understand the legal basics to recognize how to draw the line between the two 92 93 See also editAmerican Economic Espionage Act of 1996 Business intelligence Corporate warfare Cyber spying FBI Genetically modified maize Corporate espionage History of tea in India Labor spying in the United States Reverse engineeringNotes edit These technologies however wren t streamlined or industrialized Some of these findings were applied on plants used to produce chips for military purposes This may be explained by the fact that the defense industry was supported better than a civil one References edit Unusual suspects Cyber spying grows bigger and more boring The Economist 25 May 2013 Retrieved 25 May 2013 Nasheri 2005 p 10 Nasheri 2005 pp 8 10 73 Nasheri 2005 p 9 Scalet 2003 p 3 Department of Defense 2002 Nasheri 2005 p 7 Nasheri 2005 pp 80 81 a b c Palmer 1974 p 12 a b c d Reuters 1996 Nasheri 2005 p 80 a b Nasheri 2005 p 88 a b Nasheri 2005 p 82 Nasheri 2005 p 84 What are the advantages of using a computer www computerhope com Retrieved 1 February 2022 a b Rowe amp Brook 2009 p 84 a b Harris 1998 p 7 a b Harris 1998 p 9 Harris 1998 p 8 Ben Atar Doron 2004 Trade Secrets Intellectual Piracy and the Origins of American Industrial Power Yale University Press ISBN 9780300100068 The Spies Who Launched America s Industrial Revolution www history com 10 January 2019 Hamilton Alexander 1791 Report on manufactures United States Zelchenko Henry L February 1952 Stealing America s Know How The Story of Amtorg American Mercury 74 338 75 84 a b c Hanson 1987 Heuertz Ruth April 1984 Soviet Microprocessors and Microcomputers BYTE p 348 Retrieved 23 October 2013 a b c Palmer 1974 p 13 Wright 1987 p 183 Wright 1987 p 184 Glitz Albrecht Meyersson Erik 2020 Industrial Espionage and Productivity American Economic Review 110 4 1055 1103 doi 10 1257 aer 20171732 hdl 10230 33897 ISSN 0002 8282 S2CID 27286076 Nodoushani amp Nodoushani 2002 Nasheri 2005 p 53 Nasheri 2005 pp 53 54 Greenwald Glenn 5 September 2014 The U S Government s Secret Plans to Spy for American Corporations The Intercept Goldsmith Jack 23 March 2015 The Precise and Narrow Limits on U S Economic Espionage www lawfareblog com Woolsey James 7 March 2000 Intelligence Gathering and Democracies The Issue of Economic and Industrial Espionage Federation of American Scientists NSA spying on Petrobras if proven is industrial espionage Rousseff Reuters 9 September 2013 NSA engaged in industrial espionage Snowden BBC 26 January 2014 美国中央情报局网络武器库分析与披露 qianxin Chinese infosec firm accuses CIA backed group of numerous hacks itwire com US Officials Israel Spying on America Has Reached Terrifying Levels Business Insider Clarke Duncan L 1998 Israel s Economic Espionage in the United States Journal of Palestine Studies 27 4 20 35 doi 10 2307 2538128 JSTOR 2538128 Cockburn patrick 13 October 1993 Israel accused of selling US secrets to China The Independent Stein Jeff 8 May 2014 ISRAEL S AGGRESSIVE SPYING IN THE U S MOSTLY HUSHED UP Newsweek Boggon 1996 a b c d DeWeese et al 2009 Piller 2002 a b Lohr 2010 Nasheri 2005 p 112 Anderson 2007 Twilley Nicolla Graber Cynthia 2 August 2017 Britain s Great Tea Heist The Atlantic Retrieved 30 September 2022 Rose Sarah The Great British Tea Heist Smithsonian Magazine Retrieved 30 September 2022 The Scottish Spy Who Stole China s Tea Empire NPR Retrieved 30 September 2022 a b c The New York Times 1991 Jehl 1993 John A Nolan A Case Study in French Espionage Renaissance Software PDF US Department of Energy Hanford Meredith 1997 Clark 2009 a b c Harvey 2010 a b c Branigan 2010 a b Ahmed 2010 Beaumont 2010 Reuters 2010 Markoff amp Barboza 2010 Lawson 2010 Rogin 2010 Levine 2010 Dongxiau Yue et al v Chordiant Software Inc 2010 NSA spying on Petrobras if proven is industrial espionage Rousseff Reuters 9 September 2013 Brazil Canada espionage Which countries are we spying on Canadian Broadcasting Corporation 9 October 2013 CIA agents have been hacking China for 11 years security firm claims The Next Web 4 March 2020 The CIA Hacking Group APT C 39 Conducts Cyber Espionage Operation on China s Critical Industries for 11 Years 360 Core Security Stewart 2010 Navarro amp Autry 2010 Edward Snowden says NSA engages in industrial espionage Canadian Broadcasting Corporation 26 January 2014 Wikileaks Enthullung NSA soll auch franzosische Wirtschaft bespitzelt haben Der Spiegel 29 June 2015 British firms told of China cyber spying The Seattle Times Associated Press 2 December 2007 Retrieved 15 April 2020 a b c Blakely 2007a Blakely 2007b Connolly Kate Germany accuses China of industrial espionage Guardian News and Media Limited Retrieved 22 July 2009 a b c d e Spying Close to Home German Intelligence Under Fire for NSA Cooperation SPIEGEL ONLINE International Der Spiegel 24 April 2015 Retrieved 4 January 2017 a b Dehmer Dagmar Haselberger Stephan 4 May 2015 BND und NSA Die Chronologie des Spionageskandals Politik Der Tagesspiegel in German Wie die NSA europaische Unternehmen ausspionierte Suddeutsche de in German 24 April 2015 Bundesverfassungsgericht BVerfG Beschluss des Zweiten Senats vom 13 n bundesverfassungsgericht de in German 13 October 2016 Retrieved 4 January 2017 Denkler Thorsten Geheimdienst Affare NSA jubelte BND deutsche Spahziele unter Suddeutsche Zeitung in German Retrieved 4 January 2017 German Constitutional Court rules out access to NSA s selectors list Deutsche Welle Retrieved 4 January 2017 Meiritz Annett July 2015 Designierter NSA Sonderermittler Ein Mann 40 000 brisante Daten Der Spiegel Retrieved 4 January 2017 Der Graulich Abschlussbericht PDF Retrieved 4 January 2017 Baumgartner Maik Knobbe Martin 30 October 2015 Geheimdienstaffare Sonderermittler spricht von klarem Vertragsbruch der NSA Der Spiegel Retrieved 4 January 2017 Nasheri 2005 p 73 Nasheri 2005 p 74 Walker Nick 19 December 1995 Marketing Know your enemy Indy Life The Independent Retrieved 30 January 2019 Competitive intelligence involves the application of principles and practices from military and national intelligence to the domain of global business It is where the art and disciplines of both intelligence and strategic management converge Competitive intelligence is the flip side of the strategy coin stresses Douglas Bernhardt author of Perfectly Legal Competitor Intelligence The Economic Espionage Act The Rules Have Not Changed Competitive Intelligence Review July August 1998 PDF Retrieved 12 February 2012 Competitive Intelligence Law and Ethics The EEA Revisited Again and Hopefully for the Last Time Competitive Intelligence Magazine July September 2011 PDF Retrieved 12 February 2012 Bibliography editBooks edit DeWeese Steve Krekel Bryan Bakos George Barnet Christopher 9 October 2009 Capability of the People s Republic of Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US China Economic and Security Review Commission PDF McLean Virginia USA Northrop Grumman Corporation Archived from the original PDF on 3 February 2011 Harris John 1998 Industrial Espionage and Technology Transfer Britain and France in the Eighteenth Century Aldershot Ashgate Publishing Limited p 680 ISBN 0 7546 0367 9 Nasheri Hedieh 2005 Economic Espionage and Industrial Spying Cambridge Cambridge University Press p 270 ISBN 0 521 54371 1 Navarro Peter Autry Greg 15 January 2010 China s war on the U S economy San Francisco Chronicle Retrieved 31 January 2010 Rowe William Brook Timothy 2009 China s Last Empire The Great Qing Cambridge Massachusetts The Belknap Press of Harvard University Press p 368 ISBN 978 0 674 03612 3 Wright Peter 1987 Spycatcher New York Viking p 270 ISBN 0 521 54371 1 Newspapers and journals edit Ahmed Murad 18 January 2010 Google cyber attack from China an inside job The Times Retrieved 22 January 2010 Chinese stealth fighter jet may use US technology The Guardian London Associated Press 23 January 2011 Retrieved 23 January 2011 Beaumont Claudine 18 January 2010 Google China hacks a possible inside job The Daily Telegraph Archived from the original on 3 December 2010 Retrieved 30 January 2010 Blakely Rhys 1 December 2007 MI5 alert on China s cyberspace spy threat The Times Retrieved 30 January 2010 Blakely Rhys 5 December 2007 China says it is cyber espionage victim The Times Retrieved 30 January 2010 Boggon Steve 1 January 1996 The spy who loved me and my laptop The Independent London Retrieved 13 February 2010 Branigan Tania 13 January 2010 Google to end censorship in China over cyber attacks The Guardian Retrieved 22 January 2010 Clark Andrew 17 April 2009 Starwood sues Hilton for stealing trade secrets The Guardian London Retrieved 24 February 2010 Dongxiau Yue et al v Chordiant Software Inc No C08 00019 JW U S In the United States District Court for the Northern District of California San Jose Division 2010 05 14 Hanson Philip April 1987 Soviet industrial espionage Bulletin of the Atomic Scientists 43 3 25 29 Bibcode 1987BuAtS 43c 25H doi 10 1080 00963402 1987 11459504 Palmer Raymond 1974 Espionage threat to British industry Spies don t only operate in books and films They can be for real And their target might be your industrial secrets Industrial Management and Data Systems 74 7 8 Piller Charles 8 July 2002 Hackers Target Energy Industry Los Angeles Times Retrieved 24 February 2010 Volkswagen Sues GM for 6 6 Million Accusing U S Firm of Defamation Los Angeles Times Reuters 12 May 1996 Retrieved 24 February 2010 Google probes possible inside help on China attack The Globe and Mail Toronto Reuters 13 January 2010 Retrieved 22 January 2010 Rogin Josh 14 January 2010 China s expansion of economic espionage boils over Foreign Policy Retrieved 5 April 2010 Air France Denies Spying on Travellers The New York Times 14 September 1991 Archived from the original on 16 October 2015 Retrieved 13 February 2010 Nodoushani Omid Nodoushani Patricia A April 2002 Industrial Espionage The Dark Side of the Digital Age Competitiveness Review 12 2 96 101 doi 10 1108 eb046445 Harvey Mike 16 January 2010 China accused of cyber attack on Google and global industrial targets The Times Retrieved 30 January 2010 Jehl Douglas 30 April 1993 U S Expanding Its Effort to Halt Spying by Allies The New York Times Retrieved 13 February 2010 Lawson Dominic 17 January 2010 Be afraid China the Google dragon stirs The Times Retrieved 22 January 2010 Lohr Steve 18 January 2010 Companies Fight Endless War Against Computer Attacks The New York Times Retrieved 22 January 2010 Markoff John Barboza David 18 February 2010 2 China Schools Said to Be Tied to Online Attacks The New York Times Retrieved 6 April 2010 Meredith Robyn 9 January 1997 VW Agrees To Pay G M 100 Million in Espionage Suit The New York Times Retrieved 24 February 2010 Web edit Levine Dan 24 May 2010 Federal Judge Trashes Novel Economic Espionage Case Law com Retrieved 11 December 2010 Scalet Sarah D 1 May 2003 Corporate Spying Snooping by Hook or by Crook web page CSO Security and Risk Retrieved 21 March 2010 Stewart Joe 19 January 2010 Operation Aurora Clues in the Code Secureworks com Secureworks Retrieved 9 March 2016 Office of the Assistant Secretary of Defense Command Control Communications and Intelligence Annual Polygraph Report to Congress 2002 Fiscal Year Department of Defense Retrieved 3 April 2010 a href Template Cite web html title Template Cite web cite web a CS1 maint multiple names authors list link Anderson Nate 14 May 2007 Massive DDoS attacks target Estonia Russia accused Ars Technica Retrieved 5 April 2010 Further reading editBarry Marc Penenberg Adam L 2000 Spooked Espionage in Corporate America Cambridge Massachusetts Perseus Publishing p 208 ISBN 978 0 7382 0593 9 Stuxnet worm hits Iran nuclear plant staff computers BBC News BBC 26 September 2010 Retrieved 27 September 2010 Fink Steven 2002 Sticky Fingers Managing the Global Risk of Economic Espionage Chicago Dearborn Trade p 368 ISBN 978 0 7931 4827 1 Fitchett Joseph 19 July 1995 French Report Accuses U S of Industrial Sabotage Campaign The New York Times Archived from the original on 11 May 2013 Retrieved 13 February 2010 Guynn Jessica 15 January 2010 Chinese hackers pose a growing threat to U S firms Los Angeles Times Retrieved 31 January 2010 Byron Betty 2013 The Iris Covenant New York Tate Publishing p 454 ISBN 978 1 62295 014 0 Helft Miguel Markoff John 13 January 2010 In Rebuke of China Focus Falls on Cybersecurity The New York Times Retrieved 30 January 2010 Javers Eamon 2010 Broker Trader Lawyer Spy The Secret World of Corporate Espionage New York Harper Collins Business p 320 ISBN 978 0 06 169720 3 Keizer Gregg 9 December 2010 Pro WikiLeaks cyber army gains strength thousands join DDoS attacks Computerworld Retrieved 11 December 2010 Kennedy John 10 December 2010 Is your kid part of the Operation Payback army Silicon Republic Retrieved 11 December 2010 Macartney Jan 9 February 2010 Chinese police arrest six as hacker training website is closed down The Times Retrieved 13 February 2010 Murphy Samantha 9 December 2010 WikiLeaks Hactivism is Not Cyberwarfare Experts Say Tech News Daily Retrieved 11 December 2010 Pitorri Peter 2010 Counterespionage for American Business Chicago Butterworth Heinemann Limited p 144 ISBN 978 0 7506 7044 9 Rustmann F W Jr 2002 CIA INC Espionage and the Craft of Business Intelligence Dulles VA Potomac Books p 240 ISBN 978 1 57488 520 0 Swinford Steven 10 December 2010 WikiLeaks hackers threaten British Government The Daily Telegraph London Retrieved 11 December 2010 Winker Ira 1997 Corporate Espionage What It Is Why It s Happening in Your Company What You Must Do About It Darby PA Darby PA p 240 ISBN 978 0 7881 6529 0 Retrieved from https en wikipedia org w index php title Industrial espionage amp oldid 1200996767, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.