Strategic Thought Transformation - The IIPM Think Tank
Strategic Thought Transformation - The IIPM Think Tank
Strategic Thought Transformation - The IIPM Think Tank
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
I N D U S T R I A L E S P I O N A G E<br />
Table 1 :<br />
How efficient is prosecution of<br />
industrial espionage<br />
Factor Number Percent<br />
Number of governments<br />
organizing industrial<br />
espionage<br />
100<br />
Number of investigations<br />
relating to illegal export of<br />
technology<br />
Number of arrests resulting<br />
from investigations<br />
Number of criminal<br />
indictiments<br />
Number of criminal<br />
convictions<br />
2,500<br />
146 5.84%<br />
97 3.88%<br />
79 3.16%<br />
cases being investigated should have been<br />
considerably higher, since these were cases<br />
involving a foreign government or an organization<br />
or individual sponsored by a<br />
foreign government. As such, the number<br />
excludes espionage activities that are conducted<br />
by one corporation, foreign or otherwise,<br />
against another, without support or<br />
active collaboration with a foreign government.<br />
Table 1 shows 2004 data compiled<br />
by the Office of the National Counter-intelligence<br />
Executive on industrial espionage.<br />
17 <strong>The</strong> data appears to indicate that<br />
if an industrial spy operation comes under<br />
investigation 18 there is a 97% chance that<br />
they will suffer no penalty.<br />
Many observers report however that<br />
crime statistics of this sort tend to grossly<br />
underestimate criminal activity because<br />
of reluctance on the part of companies [or<br />
other organizations] that suffer to reveal<br />
they have been subject to an attack. A conservative<br />
estimate is that less than 15% of<br />
organizations report. Using the reported<br />
starting point of 2,500 investigations, and<br />
assuming a optimistic reporting rate of<br />
20%, then more realistic number of attacks<br />
that match the reported data is 12,500, and<br />
this assumes that all reports of industrial<br />
espionage reported lead to an investigation<br />
[another optimistic assumption].<br />
Consequently, it is a realistic estimate that<br />
if one engages in industrial espionage, the<br />
chance of getting convicted is 0.632%, e.g.,<br />
there is less than one chance in a hundred<br />
of getting caught. Another way to say this is<br />
that there is a 99% chance of success!<br />
4. Implications for India<br />
It is clear that India is becoming a world<br />
leader in technology innovation. Consequently,<br />
it is reasonable to expect that more<br />
efforts will be made to steal Indian trade<br />
secrets. This raises several questions that<br />
might be addressed by Indian government<br />
and industry circles:<br />
In the Sansad: Are the laws on the<br />
books adequate to protect trade secrets<br />
For example, does the law clearly define<br />
trade secrets, and spell out adequate punishment<br />
In the Enterprise: What types of security<br />
measures might be taken in enterprises to<br />
protect against trade secret loss Should<br />
company security awareness campaigns<br />
be energized so employees know what to<br />
look out for<br />
In the CBI: What new investigative skills<br />
are needed by Government to protect<br />
against this new threat Are counterintelligence<br />
personnel receiving adequate<br />
training to track down agents engaged in<br />
industrial espionage<br />
In the Judicial Branch: Are the rules<br />
of evidence sufficiently clear to prosecute<br />
trade secret theft Are prosecutors sufficiently<br />
trained to investigate and respond<br />
References<br />
[1] Chris Carr and Larry Gorman. <strong>The</strong> revictimization<br />
of companies by the stock<br />
market who report trade secret theft<br />
under the Economic Espionage Act.<br />
Business Lawyer, 57:25, 2001. Cite:<br />
57 Bus.Law. 25.<br />
[2] Marjorie Chan. Corporate espionage<br />
and workplace trust/distrust. Journal<br />
ofBusiness Ethics, 42:45–58, 2003.<br />
[3] Michael T. Clark. Economic espionage:<br />
<strong>The</strong> role of the united states intelligence<br />
communnity. Journal of International<br />
Legal Studies, 3:253–291, Summer<br />
1997. Cite: 3 J.Int’l Legal Stud. 253.<br />
[4] Jacob E. Cooke. Tench coxe, alexander<br />
hamilton, and the encouragement of<br />
american manufactures. <strong>The</strong> William<br />
and Mary Quarterly, 32(3):369–392,<br />
July 1975. 3rd Ser.<br />
[5] Robin J. Enron. Secrets and spies:<br />
Extraterritorial application of the<br />
economic espionage act and the trips<br />
agreement. New York University Law<br />
Review, page 1475, October 2003. Cite:<br />
78 N.Y.U.L.Rev.1475.<br />
[6] Craig P. Ehrlich. Espionage turns economic:<br />
Ligitation as counter-espionage<br />
in the post-soviet era. Competitive Intelligence<br />
Review, 8(3):38–52, 1997.<br />
ehrlich@babson.edu.<br />
[7] David Ensor. Televised interview. In<br />
CNN: Live From. Transcript by FD-<br />
CHeMedia, Inc., June 3 2005. Ensor<br />
is the National Security correspondent<br />
for CNN.<br />
[8] George Grammas and Geo_rey M.<br />
Goodale. <strong>The</strong> dangers of illegal technology<br />
transfer and how to avoid them.<br />
Mondaq, September 29 2005.<br />
[9] Douglas A. Irwin. <strong>The</strong> aftermath of<br />
Hamilton’s “report on manufacturers”.<br />
<strong>The</strong> Journal of Economic History,<br />
64(3):800–821, September 2004. douglas.<br />
irwin@dartmouth.edu.<br />
[10] David I. Jeremy. Damming the flood:<br />
British government e_orts to check the<br />
outflow of technicians and machinery,<br />
1780–1843. <strong>The</strong> Business History Review,<br />
51(1):1–34, Spring 1977.<br />
[11] Scott Morrison. It fakes thought to<br />
cost companies $100bn a year. Financial<br />
Times, US Edition.:3, August 15<br />
2005. 15<br />
[12] Michael Mosier. Causes of action for<br />
foreign victims of economic espionage<br />
abroad by u.s. intelligence. Duke Journal<br />
of Comparative and International<br />
Law, 11:427–450, Spring/Summer<br />
2001. Cite: 11 Duke J. Comp. & Int’l<br />
L. 427.<br />
[13] Dan Raviv and Yossi Melman. Every<br />
Spy a Prince. Houghton Mi_in, New<br />
York, 1991<br />
Contact Information:<br />
Barraclough Legal Publishing<br />
135 East 54th Street 4B<br />
New York, N.Y. 10022-4509<br />
Tel: +01 (646) 416-6592<br />
Email: info@barracloughltd.com<br />
web: http://www.barracloughltd.com<br />
Edward M Roche is Director of Scientific<br />
Intelligence, Information Policy<br />
Institute, New York, USA;<br />
all rights reserved.<br />
An <strong>IIPM</strong> Intelligence Unit Publication STRATEGIC INNOVATORS 33