![]() Because of an international criminal act, you can get a cheap morning latte. Historically, the country of Yemen had a monopoly on coffee, forbidding the export of the plants and seeds-their intellectual property. However, in 1616, a Dutch merchant managed to smuggle out a few coffee plants from the city of Mocha in Yemen. Holland then began its own coffee empire in the Dutch colony of Java, and coffee spread around the world. 1 As a result, Yemen lost its competitive advantage and is currently one of the Arab world’s poorest nations. From Black Cube to Fusion GPS, the operatives-for-hire industry has recklessly exploded. Trade secrets can indeed be a matter of national security.įormer FBI director Louis Freeh once said, “Economic Espionage is the greatest threat to our national security since the cold war.” 3 Why? The theft of intellectual property (IP) is estimated to be a $600 billion loss each year to America. 4 This is a not a new threat but still a very relevant one for cyber defenders. bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means and (B) does not include reverse engineering, independent derivation, or any. In a 2015 FBI survey, half of the 165 surveyed companies claimed to be victims of economic espionage or theft of trade secrets. The special master appointed by the court shall agree to be bound by a non-disclosure agreement approved by the court. 5 It’s likely this number is far higher since many companies either aren’t aware this is happening or don’t report the loss to law enforcement.Įconomic espionage is the theft of IP by agents of foreign powers, as opposed to the theft being committed by independent criminals. ![]() Foreign governments, aligned overtly or covertly with their national industries, will intentionally target advanced technologies to give themselves a competitive advantage in the world marketplace. The state actor involvement makes this not an average criminal matter. Consequently, the FBI investigates these cases under its counterintelligence division and gives them a higher priority. Note also that these cases differ from typical espionage, where spies target political or military secrets. Chi Mak, a defense contractor engineer, stole sensitive technology secrets.Xiaodong Sheldon Meng tried to sell his defense contractor fighter-pilot simulation software.Economic espionage is always about using theft to obtain scientific and technological advantages for a foreign government’s industries.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |