27.12.2014 Views

Strategic Thought Transformation - The IIPM Think Tank

Strategic Thought Transformation - The IIPM Think Tank

Strategic Thought Transformation - The IIPM Think Tank

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

S T R A T E G I C I N S I G H T<br />

country of the acquisition agency].<br />

4. Investment [so as to get access to understanding<br />

of the trade secrets].<br />

5. Customer [so as to acquire samples of<br />

products and prototypes, as well as to<br />

learn about future development plans<br />

before they publicly are revealed].<br />

6. Acquisition [outright purchase of the<br />

target company (particularly popular<br />

for highly innovative target companies<br />

that are in start up mode).<br />

Cross Ownership: It is possible easily<br />

to hide the true ownership of a front<br />

company by making its ownership come<br />

from other front organizations who in turn<br />

are partially owned by other front organizations<br />

[in third countries], leading to a<br />

complex chain of ownership that is difficult<br />

to discover or understand without an<br />

extremely expensive and time-consuming<br />

investigation.<br />

Ownership Ambiguity: Since the transfer<br />

of trade secrets or other confidential<br />

information may take place within the context<br />

of negotiations [or other relationships]<br />

between companies, it becomes more<br />

problematical clearly to establish that the<br />

information was “stolen”; a good counterargument<br />

is that it was “given” within the<br />

context of the on-going [or purposefully<br />

terminated] business relationship. 12<br />

We have illustrated the “front company”<br />

model in Figure 3. Of course, the formation<br />

of front companies faces various barriers<br />

that might be imposed by the government<br />

of the country of the target company. In<br />

particular, it is necessary to get licensing<br />

and other approvals. <strong>The</strong>se are some of<br />

the difficulties:<br />

Incorporation: It is necessary to file incorporation<br />

papers and get them approved<br />

by the concerned regulatory authority. 13<br />

Staff Expense: Someone must be made<br />

available to be the staff of the company,<br />

and these persons must be highly trained<br />

enough to carry out the basic mission of<br />

theft of technology secrets.<br />

Long-Term Investment: Front companies<br />

require offices, leases, bank accounts,<br />

local staff, and so on, e.g., all of<br />

the paraphernalia of an office and a company.<br />

<strong>The</strong> practical implications of this is<br />

that the office must, if only as a matter of<br />

economy, be prepared always to conduct<br />

multiple industrial intelligence gathering<br />

operations.<br />

Liability: Should the operation be<br />

“blown”, then it may be relatively easy<br />

for the investigating authorities to locate<br />

the responsible parties associated with the<br />

front organization. 14<br />

Visibility: Since the incorporation papers<br />

by nature are in the public record, it is considerably<br />

easier for investigating counterintelligence<br />

groups to discover the nature<br />

<strong>The</strong> U.S. counterintelligence<br />

community has not<br />

been integrated to<br />

accomplish a<br />

national strategic<br />

mission<br />

of the ownership of the front organization.<br />

This problem can be overcome by means such<br />

as the systematic incorporation of such a large<br />

number of front organizations that it is impossible<br />

to keep track of, e.g., investigate, all of<br />

them. [<strong>The</strong> “massive front” approach.]<br />

Easily it is possible to see the resemblance<br />

between the “classical” model and the “front<br />

company” model. In the former most of the<br />

key tasks are carried out by individuals whereas<br />

in the latter, the key tasks are carried out<br />

by organizations.<br />

Systems of inter-locking corporate ownership<br />

structures, spanning many different<br />

banks, countries, types of companies, time<br />

zones, and relationships indeed is difficult<br />

to trace.<br />

<strong>The</strong> possible implication of that is that<br />

it is extraordinarily difficult to determine<br />

at any time who owns technology, where<br />

knowledge ultimately is supporting, and<br />

the ownership legitimacy of any information<br />

that is stolen.<br />

3. Prosecution<br />

According to Michelle Van Cleave, 15 the<br />

first national counter-intelligence executive:<br />

“We will never have leak-proof technology<br />

controls, just as we will never have<br />

protection against all threats at all times.<br />

... [We are threatened by] a diverse set of<br />

adversaries, many of whom have become<br />

highly skilled in using their intelligence<br />

services, especially their human collectors,<br />

to acquire U.S. national security secrets<br />

[including] technological and engineering<br />

secrets... <strong>The</strong> U.S. counter-intelligence<br />

community has not been organized or integrated<br />

to accomplish a national strategic<br />

mission.”[14]<br />

In the United States, the number of industrial<br />

espionage cases has been increasing,<br />

or at least the recognition of them.<br />

Ehrlich [6] notes that as early as 1994, the<br />

FBI was “investigating 800 cases involving<br />

23 countries”. 16<br />

One can conclude that the number of<br />

12<br />

This presents many legal problems in prosecuting a case.<br />

13<br />

In the United States, this generally is the Secretary of Commerce for the state in which incorporation is filed.<br />

14<br />

Assuming that the leadership of the organization itself is aware of the illicit activities [not always the case]<br />

15<br />

Until recently, Ms. Van Cleave reported directly to the U.S. Director of National Intelligence, John Negroponte. According to David Ensor [7], a few of the most important countries that have<br />

organized industrial espionage operations in the United States include (1) Russia, (2) India, (3) Pakistan, (4) Iran, (5) Japan, (6) France, (7) Israel, “and above all by far”, (8) China.<br />

16<br />

Also cited by Mosier [12]. 17 <strong>The</strong> data is based on investigations of several different Federal laws governing transfer of technology. <strong>The</strong>se include: (1) Arms Export Controls Act, (2)<br />

International Emergency Economic Powers Act, (3) Trading With the Enemy Act, (4) International Traffic in Arms Regulations, and (5) Export Administration Regulations. NB: In the first five years<br />

after passage of the Economic Espionage Act, only 23 cases were prosecuted. (See Carr & Gorman [1].)<br />

18<br />

Because it is reported or (less likely) because it is otherwise detected. Note: Based on 2004 data from the Office of the National Counterintelligence Executive reported byGrammas & Goodale [8].<br />

32<br />

STRATEGIC INNOVATORS<br />

An <strong>IIPM</strong> Intelligence Unit Publication

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!