Difference between revisions of "Industrial espionage" - New World Encyclopedia

From New World Encyclopedia
 
 
(17 intermediate revisions by 6 users not shown)
Line 1: Line 1:
 
[[Category:Politics and social sciences]]
 
[[Category:Politics and social sciences]]
 
[[Category:Law]]
 
[[Category:Law]]
 +
[[Category:Industry and business]]
 +
{{Copyedited}}{{Paid}}{{Approved}}{{Images OK}}{{Submitted}}
  
 +
'''Industrial espionage''', '''economic espionage''', and '''corporate espionage''' are phrases used to describe [[espionage]] conducted for commercial and economic purposes, as opposed to national security purposes. Methods such as [[bribery]], [[blackmail]], [[theft]], technological surveillance, and even occasional violence are used to illegally obtain private information for economic gain. Such activities have led to the advancement of [[technology]] in many sectors, and countries, at a rate far in excess of what would have been achieved without such information. However, these activities assume that cooperation among those with the same goal, involving sharing of information and dialogue regarding challenges to overcome, is not a viable option. For human society to reach its full potential, such harmonious cooperation based on trust offers an alternative to the unethical and illegal activities of industrial espionage.
 +
{{toc}}
 +
==Types of Information Stolen==
 +
Any information that might be of value to a competitor is a target for ''industrial espionage''. This may include client lists, information about future mergers or acquisitions, supplier agreements, research documents, prototype plans, or [[trade secret]]s.
  
'''Industrial espionage''' and '''corporate espionage''' are phrases used to describe [[espionage]] conducted for [[commerce|commercial]] purposes instead of [[national security]] purposes.
+
A ''trade secret'' is defined by the Uniform Trade Secrets Act as:
  
At the most innocuous level, the term is applied to the legal and mundane methods of examining corporate publications, web sites, [[patent]] filings, and the like to determine the activities of a corporation (though this is normally referred to as [[business intelligence]]), through to illegal methods such as [[bribe]]ry, [[blackmail]], technological surveillance and even occasional violence.  As well as spying on commercial organizations, governments can also be targets of commercial espionage—for example, to determine the terms of a tender for a government contract so that another tenderer can underbid.
+
{{Quotation|Information, including a formula, pattern, compilation, program, device, method, technique or process that:<br/>
 +
(a) Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and<br/>
 +
(b) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy (U.T.S.A. §1).|Uniform Trade Secrets Act|<ref>{{cite web|url=http://library.findlaw.com/1999/Aug/1/126360.html |title=Protection of Trade Secrets a Comparison: the Economic Espionage Act of 1996 and the Uniform Trade Secrets Act |accessdate=January 14 |accessyear=2008 |author=Ryan, Swanson & Cleveland, PLLC |publisher=FindLaw}}</ref>| }}
  
==Information==
+
One of the most well-known trade secrets is the formula for ''Coca-Cola''. Only two executives know the formula for the famous soft drink, which is kept in a bank vault. Another famous trade secret is the formula for ''Kentucky Fried Chicken'''s "Eleven Herbs and Spices." Efforts to keep this proprietary blend secret include mixing partial blends at separate locations, and then combining them at a third location.<ref>{{cite web|url=http://www.snopes.com/cokelore/formula.asp| title=Have a Cloak and a Smile |accessdate=January 14 |accessyear=2008 |publisher=Snopes.com}}</ref>
Information can make the difference between success and failure; if a [[trade secret]] is stolen, the competitive playing field is levelled or even tipped in favor of a competitor.
 
  
Although a lot of information gathering is accomplished by combing through public records (public [[database]]s and [[patent]] filings), at times corporations feel the best way to get information is to take it. Corporate espionage is a threat to any business whose livelihood depends on information. The information competitors seek may be client lists, [[Supply and demand|supplier]] agreements, personnel records, [[research]] documents, or [[prototype]] plans for a new product or service.
+
==Industrial Espionage in History==
  
==Other==
+
One of the longest lasting attempts at industrial espionage in history involved the attempt by [[Europe]]ans to acquire the closely guarded secret of [[China]]'s [[porcelain]] manufacturing process. Porcelain, which had been manufactured in China since the seventh century, was brought to Europe at the end of the thirteenth century, and became greatly prized by the wealthy and elite. Due to China's [[monopoly]] on the product, porcelain was exorbitantly expensive, and Europeans tried in vain to discover the secret of its manufacture. During the eighteenth century, a Catholic priest named d'Entrecolles was able to gain access to Kin Te-chen, the "secret city" of royal porcelain manufacturing, and sent detailed accounts of his observations to Europe. Despite tight security, he also managed to send a sample of the [[clay]] used to make porcelain, and it was not long before China lost its lucrative porcelain monopoly.<ref>{{cite web|url=http://www.nbh.hu/english/bmenu94.htm |title=History - Pioneers of Industrial Espionage |accessdate=January 14 |accessyear=2008 |publisher=The National Security Office of Hungary}}</ref>
In recent years, corporate espionage has taken on an expanded definition. For instance, attempts to sabotage a corporation may be considered corporate espionage; in this sense, the term takes on the wider connotations of [[espionage|its parent word]]. In some cases, [[malware]] and [[spyware]] has even entered the arsenal of the warfare known as corporate espionage.[http://www.newsfactor.com/story.xhtml?story_id=103000029V6L] [http://news.zdnet.com/2100-1009_22-6033129.html]
 
  
The government of [[France]] has conducted ongoing industrial espionage against American aerodynamics and satellite companies [http://www.hanford.gov/oci/maindocs/ci_r_docs/frenchesp.pdf] and vice versa.
+
During the 1800s, [[rubber]] exploded onto the world market. New manufacturing processes and inventions meant that rubber quickly became ubiquitous. At the time, the only exporter of raw rubber was [[Brazil]], who was very protective of their valuable national resource. In 1876, the [[Great Britain|British]] managed to [[smuggling|smuggle]] out some rubber-tree seeds, and used them to develop more disease-resistant varieties that were used to start rubber plantations in the Asian British Colonies. These man-made plantations were more productive than Brazil's wild-rubber harvesting techniques, and Brazil soon found itself unable to compete for rubber sales.<ref>{{cite web|url=http://www.iisrp.com/WebPolymers/00Rubber_Intro.pdf |title=Brief History & Introduction of Rubber |accessdate=January 14 |accessyear=2008 |publisher=International Institute of Synthetic Rubber Producers, Inc}}</ref>
  
The development of the [[Tupolev Tu-144]] [[supersonic]] aircraft, with its rapid design and similarity to [[Concorde]], was one of the most prominent examples of industrial espionage in the 20th century.
+
==Protecting Information==
  
==In popular culture==
+
In order to protect trade secrets and other confidential information, companies are required to take internal and external security measures. Often, this involves limiting access to confidential information, as well as having employees sign confidentiality agreements and submit to comprehensive exit interviews.  
In the film ''[[Batman (1989 film)|Batman]]'', [[Joker (comics)|Jack Napier]] is sent to destroy evidence prior to a police raid, being told it will look instead like corporate espionage.
 
  
The film ''[[Cypher (film)|Cypher]]'', revolves around industrial espionage in a sci-fi setting, using an extreme form of deep-cover surveillance to question notions of the self.
+
Technological advancements, such as the increased use of cell phones and [[computer]]s, have made companies more vulnerable to information [[theft]]. Bugging devices and spyware, once installed, can provide an ongoing wealth of information to a corporate spy. Experts claim that bugging devices are found in as many as five percent of British companies that ask for checks. In some cases, these devices may have been in place for years.<ref>{{cite web|url=http://news.bbc.co.uk/1/hi/business/3853913.stm |date=2004 |title=Industrial espionage 'real and out there' |accessdate=January 14 |accessyear=2008 |author=Smale |publisher=BBC News}}</ref>
  
==Further reading==
+
In addition to electronic devices, companies must also guard against physical theft. When important information is left accessible, it is possible for competitors to [[bribery|bribe]] cleaning staff or low-level employees to take a picture or copy a document. The most obvious way to prevent such theft is to keep documents in locked files.  
* Barry, Marc and Penenberg, Adam L. ''Spooked: Espionage in Corporate America''. Perseus Books Group, December 5, 2000. ISBN 0-7382-0271-1
 
* Fink, Steven. ''Sticky Fingers: Managing the Global Risk of Economic Espionage''. Dearborn Trade, January 15, 2002. ISBN 0-7931-4827-8
 
* Rustmann, F.W. Jr. ''CIA, INC.: Espionage and the Craft of Business Intelligence''. Potomac Books, November 2002. ISBN 1-57488-520-0
 
* Winker, Ira. ''Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It''. Prima Lifestyles, April 9, 1997. ISBN 0-7615-0840-6
 
  
==See also==
+
Until 1996, economic espionage in the [[United States]] was primarily governed by state law and the Uniform Trade Secrets Act (UTSA). In 1996, Congress passed the Economic Espionage Act (EEA). Before this, federal prosecutors were limited to using laws like the Interstate Transportation of Stolen Property Act and the Computer Fraud and Abuse Act to prosecute economic espionage.<ref>{{cite web|url=http://rf-web.tamu.edu/security/SECGUIDE/T1threat/Legal.htm#Economic%20Espionage |title=Espionage Law |accessdate=January 14 |accessyear=2008 |author=Smale |publisher=Research Foundation}}</ref> Despite this additional federal legislation, most cases of industrial espionage continue to be prosecuted in civil court under state law. While the EEA is a criminal statute and can impose more potentially severe [[punishment]] (including hefty fines, forfeiture of [[profit]]s, and [[prison|imprisonment]] up to 15 years), unlike the UTSA, it requires theft to be proven beyond a reasonable doubt, and is therefore more difficult to prosecute.
* [[Business intelligence]]
+
 
* [[Trade secret]]
+
==Economic Espionage in Government==
 +
 
 +
Economic espionage is not limited to the corporate world; government agencies are routinely involved with the theft of economic information. Throughout the [[Cold War]], [[Soviet Union|Soviet]] [[KGB]] agents attempted to steal a vast amount of information from the [[United States]]. While much of this information pertained to weapons systems, some was purely economic. For example, in the early 1970s, the Soviets used economic espionage to negotiate favorable terms on large [[wheat]] purchases.
 +
 
 +
Pierre Marion, former head of the French external intelligence service, bragged about efforts to spy on American companies. The [[Israel]]is, [[Japan]]ese, [[Germany|Germans]], and [[South Korea]]ns have also been accused of economic espionage.<ref>{{cite web|url=http://web.nps.navy.mil/~relooney/4141_58.htm |title=Economic Espionage |accessdate=January 14 |accessyear=2008 |publisher=Naval Postgraduate School}}</ref> [[China]] has been accused of stealing industrial and technological secrets from [[Canada]] and the United States, in an attempt to acquire competitive status in today's technological world. Former head of [[FBI]] counterintelligence, David Szady, claimed that espionage helped Beijing acquire a decade's worth of [[technology]] in only a couple years.
 +
 
 +
==Notes==
 +
<references/>
 +
 
 +
==References==
 +
 
 +
*Barry, Marc and Adam L. Penenberg. 2000. ''Spooked: Espionage in Corporate America''. Perseus Books Group. ISBN 0738202711
 +
*Fink, Steven. 2002. ''Sticky Fingers: Managing the Global Risk of Economic Espionage''. Dearborn Trade. ISBN 0793148278
 +
*Rustmann, F.W. Jr. 2002. ''CIA, INC.: Espionage and the Craft of Business Intelligence''. Potomac Books. ISBN 1574885200
 +
*Winker, Ira. 1997. ''Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It''. Prima Lifestyles. ISBN 0761508406
  
 
==External links==
 
==External links==
* [http://www.newsfactor.com/story.xhtml?story_id=103000029V6L Spyware as Corporate Espionage Threat]. NewsFactor Network, July 19, 2005.
+
All links retrieved March 2, 2018.
* [http://www.expertlaw.com/experts/Investigators/Corporate_Espionage.html Directory] of Corporate Espionage detectives at ExpertLaw
 
* [http://samvak.tripod.com/pp144.html Recent cases and future of industrial espionage]
 
* [http://www.taskforcefalcon.com/default.aspx?pageid=5 Task Force Falcon-Competitive Intelligence Experts]
 
 
 
  
 +
*[http://samvak.tripod.com/pp144.html The Industrious Spies: Industrial Espionage in the Digital Age]
 +
*[http://www.ipwatchdog.com/tradesecret/ What is a Trade Secret? ] by Eugene R. Quinn, Jr.,  ''IPWatchdog''
  
{{Credit1|Industrial_espionage|89039493|}}
+
{{Credit|Industrial_espionage|89039493|Trade_secret|85921319|}}

Latest revision as of 00:13, 3 March 2018


Industrial espionage, economic espionage, and corporate espionage are phrases used to describe espionage conducted for commercial and economic purposes, as opposed to national security purposes. Methods such as bribery, blackmail, theft, technological surveillance, and even occasional violence are used to illegally obtain private information for economic gain. Such activities have led to the advancement of technology in many sectors, and countries, at a rate far in excess of what would have been achieved without such information. However, these activities assume that cooperation among those with the same goal, involving sharing of information and dialogue regarding challenges to overcome, is not a viable option. For human society to reach its full potential, such harmonious cooperation based on trust offers an alternative to the unethical and illegal activities of industrial espionage.

Types of Information Stolen

Any information that might be of value to a competitor is a target for industrial espionage. This may include client lists, information about future mergers or acquisitions, supplier agreements, research documents, prototype plans, or trade secrets.

A trade secret is defined by the Uniform Trade Secrets Act as:

Information, including a formula, pattern, compilation, program, device, method, technique or process that:

(a) Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and
(b) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy (U.T.S.A. §1).

Uniform Trade Secrets Act, [1]

One of the most well-known trade secrets is the formula for Coca-Cola. Only two executives know the formula for the famous soft drink, which is kept in a bank vault. Another famous trade secret is the formula for Kentucky Fried Chicken's "Eleven Herbs and Spices." Efforts to keep this proprietary blend secret include mixing partial blends at separate locations, and then combining them at a third location.[2]

Industrial Espionage in History

One of the longest lasting attempts at industrial espionage in history involved the attempt by Europeans to acquire the closely guarded secret of China's porcelain manufacturing process. Porcelain, which had been manufactured in China since the seventh century, was brought to Europe at the end of the thirteenth century, and became greatly prized by the wealthy and elite. Due to China's monopoly on the product, porcelain was exorbitantly expensive, and Europeans tried in vain to discover the secret of its manufacture. During the eighteenth century, a Catholic priest named d'Entrecolles was able to gain access to Kin Te-chen, the "secret city" of royal porcelain manufacturing, and sent detailed accounts of his observations to Europe. Despite tight security, he also managed to send a sample of the clay used to make porcelain, and it was not long before China lost its lucrative porcelain monopoly.[3]

During the 1800s, rubber exploded onto the world market. New manufacturing processes and inventions meant that rubber quickly became ubiquitous. At the time, the only exporter of raw rubber was Brazil, who was very protective of their valuable national resource. In 1876, the British managed to smuggle out some rubber-tree seeds, and used them to develop more disease-resistant varieties that were used to start rubber plantations in the Asian British Colonies. These man-made plantations were more productive than Brazil's wild-rubber harvesting techniques, and Brazil soon found itself unable to compete for rubber sales.[4]

Protecting Information

In order to protect trade secrets and other confidential information, companies are required to take internal and external security measures. Often, this involves limiting access to confidential information, as well as having employees sign confidentiality agreements and submit to comprehensive exit interviews.

Technological advancements, such as the increased use of cell phones and computers, have made companies more vulnerable to information theft. Bugging devices and spyware, once installed, can provide an ongoing wealth of information to a corporate spy. Experts claim that bugging devices are found in as many as five percent of British companies that ask for checks. In some cases, these devices may have been in place for years.[5]

In addition to electronic devices, companies must also guard against physical theft. When important information is left accessible, it is possible for competitors to bribe cleaning staff or low-level employees to take a picture or copy a document. The most obvious way to prevent such theft is to keep documents in locked files.

Until 1996, economic espionage in the United States was primarily governed by state law and the Uniform Trade Secrets Act (UTSA). In 1996, Congress passed the Economic Espionage Act (EEA). Before this, federal prosecutors were limited to using laws like the Interstate Transportation of Stolen Property Act and the Computer Fraud and Abuse Act to prosecute economic espionage.[6] Despite this additional federal legislation, most cases of industrial espionage continue to be prosecuted in civil court under state law. While the EEA is a criminal statute and can impose more potentially severe punishment (including hefty fines, forfeiture of profits, and imprisonment up to 15 years), unlike the UTSA, it requires theft to be proven beyond a reasonable doubt, and is therefore more difficult to prosecute.

Economic Espionage in Government

Economic espionage is not limited to the corporate world; government agencies are routinely involved with the theft of economic information. Throughout the Cold War, Soviet KGB agents attempted to steal a vast amount of information from the United States. While much of this information pertained to weapons systems, some was purely economic. For example, in the early 1970s, the Soviets used economic espionage to negotiate favorable terms on large wheat purchases.

Pierre Marion, former head of the French external intelligence service, bragged about efforts to spy on American companies. The Israelis, Japanese, Germans, and South Koreans have also been accused of economic espionage.[7] China has been accused of stealing industrial and technological secrets from Canada and the United States, in an attempt to acquire competitive status in today's technological world. Former head of FBI counterintelligence, David Szady, claimed that espionage helped Beijing acquire a decade's worth of technology in only a couple years.

Notes

  1. Ryan, Swanson & Cleveland, PLLC. Protection of Trade Secrets a Comparison: the Economic Espionage Act of 1996 and the Uniform Trade Secrets Act. FindLaw. Retrieved January 14, 2008.
  2. Have a Cloak and a Smile. Snopes.com. Retrieved January 14, 2008.
  3. History - Pioneers of Industrial Espionage. The National Security Office of Hungary. Retrieved January 14, 2008.
  4. Brief History & Introduction of Rubber. International Institute of Synthetic Rubber Producers, Inc. Retrieved January 14, 2008.
  5. Smale (2004). Industrial espionage 'real and out there'. BBC News. Retrieved January 14, 2008.
  6. Smale. Espionage Law. Research Foundation. Retrieved January 14, 2008.
  7. Economic Espionage. Naval Postgraduate School. Retrieved January 14, 2008.

References
ISBN links support NWE through referral fees

  • Barry, Marc and Adam L. Penenberg. 2000. Spooked: Espionage in Corporate America. Perseus Books Group. ISBN 0738202711
  • Fink, Steven. 2002. Sticky Fingers: Managing the Global Risk of Economic Espionage. Dearborn Trade. ISBN 0793148278
  • Rustmann, F.W. Jr. 2002. CIA, INC.: Espionage and the Craft of Business Intelligence. Potomac Books. ISBN 1574885200
  • Winker, Ira. 1997. Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It. Prima Lifestyles. ISBN 0761508406

External links

All links retrieved March 2, 2018.

Credits

New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:

The history of this article since it was imported to New World Encyclopedia:

Note: Some restrictions may apply to use of individual images which are separately licensed.