Difference between revisions of "Industrial espionage" - New World Encyclopedia

From New World Encyclopedia
m ({{Contracted}})
 
(15 intermediate revisions by 6 users not shown)
Line 1: Line 1:
 
[[Category:Politics and social sciences]]
 
[[Category:Politics and social sciences]]
 
[[Category:Law]]
 
[[Category:Law]]
{{Contracted}}
+
[[Category:Industry and business]]
 +
{{Copyedited}}{{Paid}}{{Approved}}{{Images OK}}{{Submitted}}
  
'''Industrial espionage''' and '''corporate espionage''' are phrases used to describe [[espionage]] conducted for [[commerce|commercial]] purposes instead of [[national security]] purposes.
+
'''Industrial espionage''', '''economic espionage''', and '''corporate espionage''' are phrases used to describe [[espionage]] conducted for commercial and economic purposes, as opposed to national security purposes. Methods such as [[bribery]], [[blackmail]], [[theft]], technological surveillance, and even occasional violence are used to illegally obtain private information for economic gain. Such activities have led to the advancement of [[technology]] in many sectors, and countries, at a rate far in excess of what would have been achieved without such information. However, these activities assume that cooperation among those with the same goal, involving sharing of information and dialogue regarding challenges to overcome, is not a viable option. For human society to reach its full potential, such harmonious cooperation based on trust offers an alternative to the unethical and illegal activities of industrial espionage.
 +
{{toc}}
 +
==Types of Information Stolen==
 +
Any information that might be of value to a competitor is a target for ''industrial espionage''. This may include client lists, information about future mergers or acquisitions, supplier agreements, research documents, prototype plans, or [[trade secret]]s.  
  
At the most innocuous level, the term is applied to the legal and mundane methods of examining corporate publications, web sites, [[patent]] filings, and the like to determine the activities of a corporation (though this is normally referred to as [[business intelligence]]), through to illegal methods such as [[bribe]]ry, [[blackmail]], technological surveillance and even occasional violence.  As well as spying on commercial organizations, governments can also be targets of commercial espionage—for example, to determine the terms of a tender for a government contract so that another tenderer can underbid.
+
A ''trade secret'' is defined by the Uniform Trade Secrets Act as:
  
==Information==
+
{{Quotation|Information, including a formula, pattern, compilation, program, device, method, technique or process that:<br/>
Information can make the difference between success and failure; if a [[trade secret]] is stolen, the competitive playing field is levelled or even tipped in favor of a competitor.
+
(a) Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and<br/>
 +
(b) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy (U.T.S.A. §1).|Uniform Trade Secrets Act|<ref>{{cite web|url=http://library.findlaw.com/1999/Aug/1/126360.html |title=Protection of Trade Secrets a Comparison: the Economic Espionage Act of 1996 and the Uniform Trade Secrets Act |accessdate=January 14 |accessyear=2008 |author=Ryan, Swanson & Cleveland, PLLC |publisher=FindLaw}}</ref>| }}
  
Although a lot of information gathering is accomplished by combing through public records (public [[database]]s and [[patent]] filings), at times corporations feel the best way to get information is to take it. Corporate espionage is a threat to any business whose livelihood depends on information. The information competitors seek may be client lists, [[Supply and demand|supplier]] agreements, personnel records, [[research]] documents, or [[prototype]] plans for a new product or service.
+
One of the most well-known trade secrets is the formula for ''Coca-Cola''. Only two executives know the formula for the famous soft drink, which is kept in a bank vault. Another famous trade secret is the formula for ''Kentucky Fried Chicken'''s "Eleven Herbs and Spices." Efforts to keep this proprietary blend secret include mixing partial blends at separate locations, and then combining them at a third location.<ref>{{cite web|url=http://www.snopes.com/cokelore/formula.asp| title=Have a Cloak and a Smile |accessdate=January 14 |accessyear=2008 |publisher=Snopes.com}}</ref>
  
===Trade Secret===
+
==Industrial Espionage in History==
  
A '''trade secret''' is a [[formula]], [[practice]], [[process]], [[design]], [[Legal instrument|instrument]], [[pattern]], or compilation of [[information]] used by a [[business]] to obtain an advantage over competitors within the same [[industry]] or [[profession]]. In some [[jurisdiction]]s, such secrets are referred to as "confidential information", while in others they are a subset or example of confidential information.
+
One of the longest lasting attempts at industrial espionage in history involved the attempt by [[Europe]]ans to acquire the closely guarded secret of [[China]]'s [[porcelain]] manufacturing process. Porcelain, which had been manufactured in China since the seventh century, was brought to Europe at the end of the thirteenth century, and became greatly prized by the wealthy and elite. Due to China's [[monopoly]] on the product, porcelain was exorbitantly expensive, and Europeans tried in vain to discover the secret of its manufacture. During the eighteenth century, a Catholic priest named d'Entrecolles was able to gain access to Kin Te-chen, the "secret city" of royal porcelain manufacturing, and sent detailed accounts of his observations to Europe. Despite tight security, he also managed to send a sample of the [[clay]] used to make porcelain, and it was not long before China lost its lucrative porcelain monopoly.<ref>{{cite web|url=http://www.nbh.hu/english/bmenu94.htm |title=History - Pioneers of Industrial Espionage |accessdate=January 14 |accessyear=2008 |publisher=The National Security Office of Hungary}}</ref>
  
 +
During the 1800s, [[rubber]] exploded onto the world market. New manufacturing processes and inventions meant that rubber quickly became ubiquitous. At the time, the only exporter of raw rubber was [[Brazil]], who was very protective of their valuable national resource. In 1876, the [[Great Britain|British]] managed to [[smuggling|smuggle]] out some rubber-tree seeds, and used them to develop more disease-resistant varieties that were used to start rubber plantations in the Asian British Colonies. These man-made plantations were more productive than Brazil's wild-rubber harvesting techniques, and Brazil soon found itself unable to compete for rubber sales.<ref>{{cite web|url=http://www.iisrp.com/WebPolymers/00Rubber_Intro.pdf |title=Brief History & Introduction of Rubber |accessdate=January 14 |accessyear=2008 |publisher=International Institute of Synthetic Rubber Producers, Inc}}</ref>
  
 +
==Protecting Information==
  
A company can protect its confidential information through non-compete non-disclosure contracts with its employees. The law of protection of confidential information effectively allows a perpetual monopoly in secret information - it does not expire as would a [[patent]]. The lack of formal protection, however, means that a third party is not prevented from independently duplicating and using the secret information once it is discovered.  
+
In order to protect trade secrets and other confidential information, companies are required to take internal and external security measures. Often, this involves limiting access to confidential information, as well as having employees sign confidentiality agreements and submit to comprehensive exit interviews.  
  
The sanctioned protection of such type of information from public disclosure is viewed as an important legal aspect by which a society protects its overall economic vitality.
+
Technological advancements, such as the increased use of cell phones and [[computer]]s, have made companies more vulnerable to information [[theft]]. Bugging devices and spyware, once installed, can provide an ongoing wealth of information to a corporate spy. Experts claim that bugging devices are found in as many as five percent of British companies that ask for checks. In some cases, these devices may have been in place for years.<ref>{{cite web|url=http://news.bbc.co.uk/1/hi/business/3853913.stm |date=2004 |title=Industrial espionage 'real and out there' |accessdate=January 14 |accessyear=2008 |author=Smale |publisher=BBC News}}</ref>
A company typically invests time and energy (work) into generating information regarding refinements of process and operation. If competitors had access to the same knowledge, the first company's ability to survive or maintain its [[market dominance]] would be impaired.
 
Where trade secrets are recognised, the creator of property regarded as a "trade secret" is ''entitled'' to regard such "special knowledge" as [[intellectual property]].
 
  
The precise language by which a trade secret is defined varies by jurisdiction (as do the particular types of information that are subject to trade secret protection). However, there are three factors that (though subject to differing interpretations) are common to all such definitions: a trade secret is some sort of information that:
+
In addition to electronic devices, companies must also guard against physical theft. When important information is left accessible, it is possible for competitors to [[bribery|bribe]] cleaning staff or low-level employees to take a picture or copy a document. The most obvious way to prevent such theft is to keep documents in locked files.  
* is not generally known to the relevant portion of the public;
 
* confers some sort of economic benefit on its holder (where this benefit must derive ''specifically'' from its not being generally known, not just from the value of the information itself);
 
* is the subject of reasonable efforts to maintain its secrecy.
 
  
Trade secrets are not protected by law in the same manner as [[trademark]]s or [[patent]]s. Probably one of the most significant differences is that a trade secret is protected ''without'' disclosure of the secret.
+
Until 1996, economic espionage in the [[United States]] was primarily governed by state law and the Uniform Trade Secrets Act (UTSA). In 1996, Congress passed the Economic Espionage Act (EEA). Before this, federal prosecutors were limited to using laws like the Interstate Transportation of Stolen Property Act and the Computer Fraud and Abuse Act to prosecute economic espionage.<ref>{{cite web|url=http://rf-web.tamu.edu/security/SECGUIDE/T1threat/Legal.htm#Economic%20Espionage |title=Espionage Law |accessdate=January 14 |accessyear=2008 |author=Smale |publisher=Research Foundation}}</ref> Despite this additional federal legislation, most cases of industrial espionage continue to be prosecuted in civil court under state law. While the EEA is a criminal statute and can impose more potentially severe [[punishment]] (including hefty fines, forfeiture of [[profit]]s, and [[prison|imprisonment]] up to 15 years), unlike the UTSA, it requires theft to be proven beyond a reasonable doubt, and is therefore more difficult to prosecute.
  
 +
==Economic Espionage in Government==
  
To acquire rights in a trademark under U.S. law, one simply uses the mark in the course of business. (It is possible to register a trademark in the U.S. but, though registration confers some advantages including stronger protection in certain respects, it is not required in order to get protection at all. Other nations have different trademark regimes and the following remarks may not apply to them.) Assuming the mark in question meets certain other standards of protectibility, it is protected from infringement on the grounds that other uses might confuse consumers as to the origin or nature of the goods once the mark has been associated with a particular supplier. (Similar considerations apply to service marks and trade dress.) By definition, a trademark enjoys no protection (''qua'' trademark) until and unless it is "disclosed" to consumers, for only then are consumers able to associate it with a supplier or source in the requisite manner. (That a company plans to ''use'' a certain trademark might itself be protectible as a trade secret, however, until the mark is actually made public.)
+
Economic espionage is not limited to the corporate world; government agencies are routinely involved with the theft of economic information. Throughout the [[Cold War]], [[Soviet Union|Soviet]] [[KGB]] agents attempted to steal a vast amount of information from the [[United States]]. While much of this information pertained to weapons systems, some was purely economic. For example, in the early 1970s, the Soviets used economic espionage to negotiate favorable terms on large [[wheat]] purchases.  
  
 +
Pierre Marion, former head of the French external intelligence service, bragged about efforts to spy on American companies. The [[Israel]]is, [[Japan]]ese, [[Germany|Germans]], and [[South Korea]]ns have also been accused of economic espionage.<ref>{{cite web|url=http://web.nps.navy.mil/~relooney/4141_58.htm |title=Economic Espionage |accessdate=January 14 |accessyear=2008 |publisher=Naval Postgraduate School}}</ref> [[China]] has been accused of stealing industrial and technological secrets from [[Canada]] and the United States, in an attempt to acquire competitive status in today's technological world. Former head of [[FBI]] counterintelligence, David Szady, claimed that espionage helped Beijing acquire a decade's worth of [[technology]] in only a couple years.
  
To acquire a patent, full information about the method or product has to be supplied to the patent bureau and will then be available to all. After expiration of the patent, competitors can copy the method or product legally. The temporary [[monopoly]] on the subject matter of the patent is regarded as a ''[[quid pro quo]]'' for thus disclosing the information to the public.
+
==Notes==
 
+
<references/>
 
 
Trade secrets are by definition ''not'' disclosed to the world at large. Instead, owners of trade secrets seek to keep their special knowledge out of the hands of competitors through a variety of civil and commercial means, not the least of which is the employment of [[non-disclosure agreement]]s (NDA) and [[non-compete clause]]s. In exchange for the opportunity to be employed by the holder of secrets, a worker will sign an agreement not to reveal his prospective employer's proprietary information.  Often, he will also sign over rights to the ownership of his own intellectual production during the course (or as a condition) of his employment.  Violation of the agreement generally carries stiff financial penalties, agreed to in writing by the worker and designed to operate as a disincentive to going back on his word. Similar agreements are often signed by representatives of other companies with whom the trade secret holder is engaged, e.g. in licensing talks or other business negotiations.
 
 
 
Trade secret protection ''can'', in principle, extend indefinitely and in this respect offers an advantage over patent protection (which lasts only for a specifically delimited period, for example twenty years in the U.S.). (One company that has no patent for its formula and has been very effective in protecting it for many more years than a patent would have is [[Coca Cola]].) However, the "down side" of such protection is that it is comparatively easy to lose (for example, to [[reverse engineering]], which a patent will withstand but a trade secret will not) and comes equipped with no ''minimum'' guaranteed period of years.
 
 
 
Historically, trade secrets have been with us after a fashion since early times in the form of keeping advanced military technology from one's enemies - and in more recent times, in keeping [[Industrial Revolution]]-era technology secret.
 
 
 
 
 
Companies often try to discover one another's trade secrets through lawful methods of [[reverse engineering]] on one hand and less lawful methods of [[industrial espionage]] on the other. Acts of industrial espionage are generally illegal in their own right under the relevant governing laws, of course. The importance of that illegality to trade secret law is as follows: if a trade secret is acquired by improper means (a somewhat wider concept than "illegal means" but inclusive of such means), the secret is generally deemed to have been ''misappropriated''. Thus if a trade secret has been acquired via industrial espionage, its acquirer will probably be subject to legal liability for acquiring it improperly. (The holder of the trade secret is nevertheless obliged to protect against such espionage to some degree in order to safeguard the secret. As noted above, under most trade secret regimes, a trade secret is not deemed to exist unless its purported holder takes reasonable steps to maintain its secrecy.)
 
 
 
 
 
A relatively recent development in the USA is the adoption of the UTSA, the ''[[Uniform Trade Secrets Act]]'', which has been adopted by approximately 40 states as the basis for trade secret law.  It is believed that a measure of uniformity among different states' laws will strengthen business' claims on their trade secrets.
 
 
 
Another significant development in U.S. law is the [[Economic Espionage Act of 1996]] (18 U.S.C. §§ 1831-1839), which makes the theft or misappropriation of a trade secret a federal crime. This law contains two provisions criminalizing two sorts of activity. The first, 18 U.S.C. § 1831(a), criminalizes the theft of trade secrets to benefit foreign powers; the second, 18 U.S.C. § 1832, criminalizes their theft for commercial or economic purposes. (The statutory penalties are different for the two offenses.)
 
 
 
In [[Commonwealth of Nations|Commonwealth]] [[common law ]] jurisdictions, confidentiality and trade secrets are regarded as an [[equitable]] right rather than a [[property]] right (with the exception of [[Hong Kong]] where a judgment of the High Court indicates that confidential information may be a property right). The English Court of Appeal in the case of ''Saltman Engineering Co Ltd'' v. ''Campbell Engineering Ltd'', (1948) 65 P.R.C. 203 held that the action for breach of confidence is based on a principle of preserving "good faith".
 
 
 
The test for a cause of action for breach of confidence in the common law world is set out in the case of ''Coco'' v.  ''A.N. Clark (Engineers) Ltd'', (1969) R.P.C. 41 at 47:
 
 
 
* the information itself must have the necessary quality of confidence about it;
 
 
 
* that information must have been imparted in circumstances imparting an obligation of confidence;
 
 
 
* there must be an unauthorised use of that information to the detriment of the party communicating it.
 
 
 
The "quality of confidence" highlights that trade secrets are a legal concept.  With sufficient effort or through illegal acts (such as break and enter), competitors can usually obtain trade secrets.  However, so long as the owner of the trade secret can prove that reasonable efforts have been made to keep the information confidential, the information remains a trade secret and generally remains legally protected as such.  Conversely, trade secret owners who cannot evidence reasonable efforts at protecting confidential information, risk losing the trade secret, even if the information is obtained by competitors illegally.  It is for this reason that trade secret owners shred documents and do not simply recycle them.  Presumably an industrious competitor could piece together the shredded documents again.  Legally the trade secret remains a trade secret because shredding the document is considered to have kept the quality of confidence of the information.
 
 
 
A successful plaintiff is entitled to various forms of [[judicial relief]], including:
 
 
 
* an [[injunction]]
 
* an [[account of profits]] or an award of [[damages]]
 
* a [[Declaration (law)|declaration]]
 
 
 
 
 
 
 
==Other==
 
In recent years, corporate espionage has taken on an expanded definition. For instance, attempts to sabotage a corporation may be considered corporate espionage; in this sense, the term takes on the wider connotations of [[espionage|its parent word]]. In some cases, [[malware]] and [[spyware]] has even entered the arsenal of the warfare known as corporate espionage.[http://www.newsfactor.com/story.xhtml?story_id=103000029V6L] [http://news.zdnet.com/2100-1009_22-6033129.html]
 
 
 
The government of [[France]] has conducted ongoing industrial espionage against American aerodynamics and satellite companies [http://www.hanford.gov/oci/maindocs/ci_r_docs/frenchesp.pdf] and vice versa.
 
 
 
The development of the [[Tupolev Tu-144]] [[supersonic]] aircraft, with its rapid design and similarity to [[Concorde]], was one of the most prominent examples of industrial espionage in the 20th century.
 
 
 
==In popular culture==
 
In the film ''[[Batman (1989 film)|Batman]]'', [[Joker (comics)|Jack Napier]] is sent to destroy evidence prior to a police raid, being told it will look instead like corporate espionage.
 
 
 
The film ''[[Cypher (film)|Cypher]]'', revolves around industrial espionage in a sci-fi setting, using an extreme form of deep-cover surveillance to question notions of the self.
 
 
 
==Further reading==
 
* Barry, Marc and Penenberg, Adam L. ''Spooked: Espionage in Corporate America''. Perseus Books Group, December 5, 2000. ISBN 0-7382-0271-1
 
* Fink, Steven. ''Sticky Fingers: Managing the Global Risk of Economic Espionage''. Dearborn Trade, January 15, 2002. ISBN 0-7931-4827-8
 
* Rustmann, F.W. Jr. ''CIA, INC.: Espionage and the Craft of Business Intelligence''. Potomac Books, November 2002. ISBN 1-57488-520-0
 
* Winker, Ira. ''Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It''. Prima Lifestyles, April 9, 1997. ISBN 0-7615-0840-6
 
  
 +
==References==
  
 +
*Barry, Marc and Adam L. Penenberg. 2000. ''Spooked: Espionage in Corporate America''. Perseus Books Group. ISBN 0738202711
 +
*Fink, Steven. 2002. ''Sticky Fingers: Managing the Global Risk of Economic Espionage''. Dearborn Trade. ISBN 0793148278
 +
*Rustmann, F.W. Jr. 2002. ''CIA, INC.: Espionage and the Craft of Business Intelligence''. Potomac Books. ISBN 1574885200
 +
*Winker, Ira. 1997. ''Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It''. Prima Lifestyles. ISBN 0761508406
  
 
==External links==
 
==External links==
* [http://www.newsfactor.com/story.xhtml?story_id=103000029V6L Spyware as Corporate Espionage Threat]. NewsFactor Network, July 19, 2005.
+
All links retrieved March 2, 2018.
* [http://www.expertlaw.com/experts/Investigators/Corporate_Espionage.html Directory] of Corporate Espionage detectives at ExpertLaw
 
* [http://samvak.tripod.com/pp144.html Recent cases and future of industrial espionage]
 
* [http://www.taskforcefalcon.com/default.aspx?pageid=5 Task Force Falcon-Competitive Intelligence Experts]
 
 
 
* [http://www.ipwatchdog.com/tradesecret.html Trade Secret Law] by Eugene R. Quinn, Jr. (IPWatchdog)
 
 
 
 
 
  
 +
*[http://samvak.tripod.com/pp144.html The Industrious Spies: Industrial Espionage in the Digital Age]
 +
*[http://www.ipwatchdog.com/tradesecret/ What is a Trade Secret? ] by Eugene R. Quinn, Jr.,  ''IPWatchdog''
  
 
{{Credit|Industrial_espionage|89039493|Trade_secret|85921319|}}
 
{{Credit|Industrial_espionage|89039493|Trade_secret|85921319|}}

Latest revision as of 00:13, 3 March 2018


Industrial espionage, economic espionage, and corporate espionage are phrases used to describe espionage conducted for commercial and economic purposes, as opposed to national security purposes. Methods such as bribery, blackmail, theft, technological surveillance, and even occasional violence are used to illegally obtain private information for economic gain. Such activities have led to the advancement of technology in many sectors, and countries, at a rate far in excess of what would have been achieved without such information. However, these activities assume that cooperation among those with the same goal, involving sharing of information and dialogue regarding challenges to overcome, is not a viable option. For human society to reach its full potential, such harmonious cooperation based on trust offers an alternative to the unethical and illegal activities of industrial espionage.

Types of Information Stolen

Any information that might be of value to a competitor is a target for industrial espionage. This may include client lists, information about future mergers or acquisitions, supplier agreements, research documents, prototype plans, or trade secrets.

A trade secret is defined by the Uniform Trade Secrets Act as:

Information, including a formula, pattern, compilation, program, device, method, technique or process that:

(a) Derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and
(b) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy (U.T.S.A. §1).

Uniform Trade Secrets Act, [1]

One of the most well-known trade secrets is the formula for Coca-Cola. Only two executives know the formula for the famous soft drink, which is kept in a bank vault. Another famous trade secret is the formula for Kentucky Fried Chicken's "Eleven Herbs and Spices." Efforts to keep this proprietary blend secret include mixing partial blends at separate locations, and then combining them at a third location.[2]

Industrial Espionage in History

One of the longest lasting attempts at industrial espionage in history involved the attempt by Europeans to acquire the closely guarded secret of China's porcelain manufacturing process. Porcelain, which had been manufactured in China since the seventh century, was brought to Europe at the end of the thirteenth century, and became greatly prized by the wealthy and elite. Due to China's monopoly on the product, porcelain was exorbitantly expensive, and Europeans tried in vain to discover the secret of its manufacture. During the eighteenth century, a Catholic priest named d'Entrecolles was able to gain access to Kin Te-chen, the "secret city" of royal porcelain manufacturing, and sent detailed accounts of his observations to Europe. Despite tight security, he also managed to send a sample of the clay used to make porcelain, and it was not long before China lost its lucrative porcelain monopoly.[3]

During the 1800s, rubber exploded onto the world market. New manufacturing processes and inventions meant that rubber quickly became ubiquitous. At the time, the only exporter of raw rubber was Brazil, who was very protective of their valuable national resource. In 1876, the British managed to smuggle out some rubber-tree seeds, and used them to develop more disease-resistant varieties that were used to start rubber plantations in the Asian British Colonies. These man-made plantations were more productive than Brazil's wild-rubber harvesting techniques, and Brazil soon found itself unable to compete for rubber sales.[4]

Protecting Information

In order to protect trade secrets and other confidential information, companies are required to take internal and external security measures. Often, this involves limiting access to confidential information, as well as having employees sign confidentiality agreements and submit to comprehensive exit interviews.

Technological advancements, such as the increased use of cell phones and computers, have made companies more vulnerable to information theft. Bugging devices and spyware, once installed, can provide an ongoing wealth of information to a corporate spy. Experts claim that bugging devices are found in as many as five percent of British companies that ask for checks. In some cases, these devices may have been in place for years.[5]

In addition to electronic devices, companies must also guard against physical theft. When important information is left accessible, it is possible for competitors to bribe cleaning staff or low-level employees to take a picture or copy a document. The most obvious way to prevent such theft is to keep documents in locked files.

Until 1996, economic espionage in the United States was primarily governed by state law and the Uniform Trade Secrets Act (UTSA). In 1996, Congress passed the Economic Espionage Act (EEA). Before this, federal prosecutors were limited to using laws like the Interstate Transportation of Stolen Property Act and the Computer Fraud and Abuse Act to prosecute economic espionage.[6] Despite this additional federal legislation, most cases of industrial espionage continue to be prosecuted in civil court under state law. While the EEA is a criminal statute and can impose more potentially severe punishment (including hefty fines, forfeiture of profits, and imprisonment up to 15 years), unlike the UTSA, it requires theft to be proven beyond a reasonable doubt, and is therefore more difficult to prosecute.

Economic Espionage in Government

Economic espionage is not limited to the corporate world; government agencies are routinely involved with the theft of economic information. Throughout the Cold War, Soviet KGB agents attempted to steal a vast amount of information from the United States. While much of this information pertained to weapons systems, some was purely economic. For example, in the early 1970s, the Soviets used economic espionage to negotiate favorable terms on large wheat purchases.

Pierre Marion, former head of the French external intelligence service, bragged about efforts to spy on American companies. The Israelis, Japanese, Germans, and South Koreans have also been accused of economic espionage.[7] China has been accused of stealing industrial and technological secrets from Canada and the United States, in an attempt to acquire competitive status in today's technological world. Former head of FBI counterintelligence, David Szady, claimed that espionage helped Beijing acquire a decade's worth of technology in only a couple years.

Notes

  1. Ryan, Swanson & Cleveland, PLLC. Protection of Trade Secrets a Comparison: the Economic Espionage Act of 1996 and the Uniform Trade Secrets Act. FindLaw. Retrieved January 14, 2008.
  2. Have a Cloak and a Smile. Snopes.com. Retrieved January 14, 2008.
  3. History - Pioneers of Industrial Espionage. The National Security Office of Hungary. Retrieved January 14, 2008.
  4. Brief History & Introduction of Rubber. International Institute of Synthetic Rubber Producers, Inc. Retrieved January 14, 2008.
  5. Smale (2004). Industrial espionage 'real and out there'. BBC News. Retrieved January 14, 2008.
  6. Smale. Espionage Law. Research Foundation. Retrieved January 14, 2008.
  7. Economic Espionage. Naval Postgraduate School. Retrieved January 14, 2008.

References
ISBN links support NWE through referral fees

  • Barry, Marc and Adam L. Penenberg. 2000. Spooked: Espionage in Corporate America. Perseus Books Group. ISBN 0738202711
  • Fink, Steven. 2002. Sticky Fingers: Managing the Global Risk of Economic Espionage. Dearborn Trade. ISBN 0793148278
  • Rustmann, F.W. Jr. 2002. CIA, INC.: Espionage and the Craft of Business Intelligence. Potomac Books. ISBN 1574885200
  • Winker, Ira. 1997. Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It. Prima Lifestyles. ISBN 0761508406

External links

All links retrieved March 2, 2018.

Credits

New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:

The history of this article since it was imported to New World Encyclopedia:

Note: Some restrictions may apply to use of individual images which are separately licensed.