Strategic Thought Transformation - The IIPM Think Tank
Strategic Thought Transformation - The IIPM Think Tank
Strategic Thought Transformation - The IIPM Think Tank
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
S T R A T E G I C I N S I G H T<br />
country of the acquisition agency].<br />
4. Investment [so as to get access to understanding<br />
of the trade secrets].<br />
5. Customer [so as to acquire samples of<br />
products and prototypes, as well as to<br />
learn about future development plans<br />
before they publicly are revealed].<br />
6. Acquisition [outright purchase of the<br />
target company (particularly popular<br />
for highly innovative target companies<br />
that are in start up mode).<br />
Cross Ownership: It is possible easily<br />
to hide the true ownership of a front<br />
company by making its ownership come<br />
from other front organizations who in turn<br />
are partially owned by other front organizations<br />
[in third countries], leading to a<br />
complex chain of ownership that is difficult<br />
to discover or understand without an<br />
extremely expensive and time-consuming<br />
investigation.<br />
Ownership Ambiguity: Since the transfer<br />
of trade secrets or other confidential<br />
information may take place within the context<br />
of negotiations [or other relationships]<br />
between companies, it becomes more<br />
problematical clearly to establish that the<br />
information was “stolen”; a good counterargument<br />
is that it was “given” within the<br />
context of the on-going [or purposefully<br />
terminated] business relationship. 12<br />
We have illustrated the “front company”<br />
model in Figure 3. Of course, the formation<br />
of front companies faces various barriers<br />
that might be imposed by the government<br />
of the country of the target company. In<br />
particular, it is necessary to get licensing<br />
and other approvals. <strong>The</strong>se are some of<br />
the difficulties:<br />
Incorporation: It is necessary to file incorporation<br />
papers and get them approved<br />
by the concerned regulatory authority. 13<br />
Staff Expense: Someone must be made<br />
available to be the staff of the company,<br />
and these persons must be highly trained<br />
enough to carry out the basic mission of<br />
theft of technology secrets.<br />
Long-Term Investment: Front companies<br />
require offices, leases, bank accounts,<br />
local staff, and so on, e.g., all of<br />
the paraphernalia of an office and a company.<br />
<strong>The</strong> practical implications of this is<br />
that the office must, if only as a matter of<br />
economy, be prepared always to conduct<br />
multiple industrial intelligence gathering<br />
operations.<br />
Liability: Should the operation be<br />
“blown”, then it may be relatively easy<br />
for the investigating authorities to locate<br />
the responsible parties associated with the<br />
front organization. 14<br />
Visibility: Since the incorporation papers<br />
by nature are in the public record, it is considerably<br />
easier for investigating counterintelligence<br />
groups to discover the nature<br />
<strong>The</strong> U.S. counterintelligence<br />
community has not<br />
been integrated to<br />
accomplish a<br />
national strategic<br />
mission<br />
of the ownership of the front organization.<br />
This problem can be overcome by means such<br />
as the systematic incorporation of such a large<br />
number of front organizations that it is impossible<br />
to keep track of, e.g., investigate, all of<br />
them. [<strong>The</strong> “massive front” approach.]<br />
Easily it is possible to see the resemblance<br />
between the “classical” model and the “front<br />
company” model. In the former most of the<br />
key tasks are carried out by individuals whereas<br />
in the latter, the key tasks are carried out<br />
by organizations.<br />
Systems of inter-locking corporate ownership<br />
structures, spanning many different<br />
banks, countries, types of companies, time<br />
zones, and relationships indeed is difficult<br />
to trace.<br />
<strong>The</strong> possible implication of that is that<br />
it is extraordinarily difficult to determine<br />
at any time who owns technology, where<br />
knowledge ultimately is supporting, and<br />
the ownership legitimacy of any information<br />
that is stolen.<br />
3. Prosecution<br />
According to Michelle Van Cleave, 15 the<br />
first national counter-intelligence executive:<br />
“We will never have leak-proof technology<br />
controls, just as we will never have<br />
protection against all threats at all times.<br />
... [We are threatened by] a diverse set of<br />
adversaries, many of whom have become<br />
highly skilled in using their intelligence<br />
services, especially their human collectors,<br />
to acquire U.S. national security secrets<br />
[including] technological and engineering<br />
secrets... <strong>The</strong> U.S. counter-intelligence<br />
community has not been organized or integrated<br />
to accomplish a national strategic<br />
mission.”[14]<br />
In the United States, the number of industrial<br />
espionage cases has been increasing,<br />
or at least the recognition of them.<br />
Ehrlich [6] notes that as early as 1994, the<br />
FBI was “investigating 800 cases involving<br />
23 countries”. 16<br />
One can conclude that the number of<br />
12<br />
This presents many legal problems in prosecuting a case.<br />
13<br />
In the United States, this generally is the Secretary of Commerce for the state in which incorporation is filed.<br />
14<br />
Assuming that the leadership of the organization itself is aware of the illicit activities [not always the case]<br />
15<br />
Until recently, Ms. Van Cleave reported directly to the U.S. Director of National Intelligence, John Negroponte. According to David Ensor [7], a few of the most important countries that have<br />
organized industrial espionage operations in the United States include (1) Russia, (2) India, (3) Pakistan, (4) Iran, (5) Japan, (6) France, (7) Israel, “and above all by far”, (8) China.<br />
16<br />
Also cited by Mosier [12]. 17 <strong>The</strong> data is based on investigations of several different Federal laws governing transfer of technology. <strong>The</strong>se include: (1) Arms Export Controls Act, (2)<br />
International Emergency Economic Powers Act, (3) Trading With the Enemy Act, (4) International Traffic in Arms Regulations, and (5) Export Administration Regulations. NB: In the first five years<br />
after passage of the Economic Espionage Act, only 23 cases were prosecuted. (See Carr & Gorman [1].)<br />
18<br />
Because it is reported or (less likely) because it is otherwise detected. Note: Based on 2004 data from the Office of the National Counterintelligence Executive reported byGrammas & Goodale [8].<br />
32<br />
STRATEGIC INNOVATORS<br />
An <strong>IIPM</strong> Intelligence Unit Publication