27.12.2014 Views

Strategic Thought Transformation - The IIPM Think Tank

Strategic Thought Transformation - The IIPM Think Tank

Strategic Thought Transformation - The IIPM Think Tank

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

I N D U S T R I A L E S P I O N A G E<br />

Table 1 :<br />

How efficient is prosecution of<br />

industrial espionage<br />

Factor Number Percent<br />

Number of governments<br />

organizing industrial<br />

espionage<br />

100<br />

Number of investigations<br />

relating to illegal export of<br />

technology<br />

Number of arrests resulting<br />

from investigations<br />

Number of criminal<br />

indictiments<br />

Number of criminal<br />

convictions<br />

2,500<br />

146 5.84%<br />

97 3.88%<br />

79 3.16%<br />

cases being investigated should have been<br />

considerably higher, since these were cases<br />

involving a foreign government or an organization<br />

or individual sponsored by a<br />

foreign government. As such, the number<br />

excludes espionage activities that are conducted<br />

by one corporation, foreign or otherwise,<br />

against another, without support or<br />

active collaboration with a foreign government.<br />

Table 1 shows 2004 data compiled<br />

by the Office of the National Counter-intelligence<br />

Executive on industrial espionage.<br />

17 <strong>The</strong> data appears to indicate that<br />

if an industrial spy operation comes under<br />

investigation 18 there is a 97% chance that<br />

they will suffer no penalty.<br />

Many observers report however that<br />

crime statistics of this sort tend to grossly<br />

underestimate criminal activity because<br />

of reluctance on the part of companies [or<br />

other organizations] that suffer to reveal<br />

they have been subject to an attack. A conservative<br />

estimate is that less than 15% of<br />

organizations report. Using the reported<br />

starting point of 2,500 investigations, and<br />

assuming a optimistic reporting rate of<br />

20%, then more realistic number of attacks<br />

that match the reported data is 12,500, and<br />

this assumes that all reports of industrial<br />

espionage reported lead to an investigation<br />

[another optimistic assumption].<br />

Consequently, it is a realistic estimate that<br />

if one engages in industrial espionage, the<br />

chance of getting convicted is 0.632%, e.g.,<br />

there is less than one chance in a hundred<br />

of getting caught. Another way to say this is<br />

that there is a 99% chance of success!<br />

4. Implications for India<br />

It is clear that India is becoming a world<br />

leader in technology innovation. Consequently,<br />

it is reasonable to expect that more<br />

efforts will be made to steal Indian trade<br />

secrets. This raises several questions that<br />

might be addressed by Indian government<br />

and industry circles:<br />

In the Sansad: Are the laws on the<br />

books adequate to protect trade secrets<br />

For example, does the law clearly define<br />

trade secrets, and spell out adequate punishment<br />

In the Enterprise: What types of security<br />

measures might be taken in enterprises to<br />

protect against trade secret loss Should<br />

company security awareness campaigns<br />

be energized so employees know what to<br />

look out for<br />

In the CBI: What new investigative skills<br />

are needed by Government to protect<br />

against this new threat Are counterintelligence<br />

personnel receiving adequate<br />

training to track down agents engaged in<br />

industrial espionage<br />

In the Judicial Branch: Are the rules<br />

of evidence sufficiently clear to prosecute<br />

trade secret theft Are prosecutors sufficiently<br />

trained to investigate and respond<br />

References<br />

[1] Chris Carr and Larry Gorman. <strong>The</strong> revictimization<br />

of companies by the stock<br />

market who report trade secret theft<br />

under the Economic Espionage Act.<br />

Business Lawyer, 57:25, 2001. Cite:<br />

57 Bus.Law. 25.<br />

[2] Marjorie Chan. Corporate espionage<br />

and workplace trust/distrust. Journal<br />

ofBusiness Ethics, 42:45–58, 2003.<br />

[3] Michael T. Clark. Economic espionage:<br />

<strong>The</strong> role of the united states intelligence<br />

communnity. Journal of International<br />

Legal Studies, 3:253–291, Summer<br />

1997. Cite: 3 J.Int’l Legal Stud. 253.<br />

[4] Jacob E. Cooke. Tench coxe, alexander<br />

hamilton, and the encouragement of<br />

american manufactures. <strong>The</strong> William<br />

and Mary Quarterly, 32(3):369–392,<br />

July 1975. 3rd Ser.<br />

[5] Robin J. Enron. Secrets and spies:<br />

Extraterritorial application of the<br />

economic espionage act and the trips<br />

agreement. New York University Law<br />

Review, page 1475, October 2003. Cite:<br />

78 N.Y.U.L.Rev.1475.<br />

[6] Craig P. Ehrlich. Espionage turns economic:<br />

Ligitation as counter-espionage<br />

in the post-soviet era. Competitive Intelligence<br />

Review, 8(3):38–52, 1997.<br />

ehrlich@babson.edu.<br />

[7] David Ensor. Televised interview. In<br />

CNN: Live From. Transcript by FD-<br />

CHeMedia, Inc., June 3 2005. Ensor<br />

is the National Security correspondent<br />

for CNN.<br />

[8] George Grammas and Geo_rey M.<br />

Goodale. <strong>The</strong> dangers of illegal technology<br />

transfer and how to avoid them.<br />

Mondaq, September 29 2005.<br />

[9] Douglas A. Irwin. <strong>The</strong> aftermath of<br />

Hamilton’s “report on manufacturers”.<br />

<strong>The</strong> Journal of Economic History,<br />

64(3):800–821, September 2004. douglas.<br />

irwin@dartmouth.edu.<br />

[10] David I. Jeremy. Damming the flood:<br />

British government e_orts to check the<br />

outflow of technicians and machinery,<br />

1780–1843. <strong>The</strong> Business History Review,<br />

51(1):1–34, Spring 1977.<br />

[11] Scott Morrison. It fakes thought to<br />

cost companies $100bn a year. Financial<br />

Times, US Edition.:3, August 15<br />

2005. 15<br />

[12] Michael Mosier. Causes of action for<br />

foreign victims of economic espionage<br />

abroad by u.s. intelligence. Duke Journal<br />

of Comparative and International<br />

Law, 11:427–450, Spring/Summer<br />

2001. Cite: 11 Duke J. Comp. & Int’l<br />

L. 427.<br />

[13] Dan Raviv and Yossi Melman. Every<br />

Spy a Prince. Houghton Mi_in, New<br />

York, 1991<br />

Contact Information:<br />

Barraclough Legal Publishing<br />

135 East 54th Street 4B<br />

New York, N.Y. 10022-4509<br />

Tel: +01 (646) 416-6592<br />

Email: info@barracloughltd.com<br />

web: http://www.barracloughltd.com<br />

Edward M Roche is Director of Scientific<br />

Intelligence, Information Policy<br />

Institute, New York, USA;<br />

all rights reserved.<br />

An <strong>IIPM</strong> Intelligence Unit Publication STRATEGIC INNOVATORS 33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!