Economic Espionage

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 963 Experts worldwide ranked by ideXlab platform

Tony Piltzecker - One of the best experts on this subject based on the ideXlab platform.

  • Real Spyware—Crime, Economic Espionage, and Espionage
    Combating Spyware in the Enterprise, 2006
    Co-Authors: Brian Baskin, Tony Bradley, Jeremy Faircloth, Craig A. Schiller, Ken Caruso, Paul Piccard, Lance James, Tony Piltzecker
    Abstract:

    This chapter examines the darkest side of spyware—that is, spyware in the hands of criminals, corporate Espionage agents, and government Espionage agents. Early hacking was mostly harmless and included things such as ASCII Christmas trees, funny messages, practical jokes, and, later, hacked Web pages. Over the past decade, more malevolent code has emerged in the form of worms, Denial of Service (DOS) attacks, and Distributed DOS attacks. A few individuals used their skills for their own benefit, but most individuals still followed the “Hacker ethic.” More recently, organized crime and unscrupulous marketing companies have generated lucrative markets for various schemes for generating revenue through hacking. These schemes include ransomware, theft of financial account information, identity theft, and storage of illegal files. To this list, governments and global corporation have added intelligence gathering, Economic or industrial Espionage, and information warfare. Phishing is multimedia spyware and botnet is a highly distributed spyware, and both these spyware differ from most spyware in that they can be targeted.

  • real spyware crime Economic Espionage and Espionage
    Combating Spyware in the Enterprise, 2006
    Co-Authors: Brian Baskin, Tony Bradley, Jeremy Faircloth, Craig A. Schiller, Ken Caruso, Paul Piccard, Lance James, Tony Piltzecker
    Abstract:

    This chapter examines the darkest side of spyware—that is, spyware in the hands of criminals, corporate Espionage agents, and government Espionage agents. Early hacking was mostly harmless and included things such as ASCII Christmas trees, funny messages, practical jokes, and, later, hacked Web pages. Over the past decade, more malevolent code has emerged in the form of worms, Denial of Service (DOS) attacks, and Distributed DOS attacks. A few individuals used their skills for their own benefit, but most individuals still followed the “Hacker ethic.” More recently, organized crime and unscrupulous marketing companies have generated lucrative markets for various schemes for generating revenue through hacking. These schemes include ransomware, theft of financial account information, identity theft, and storage of illegal files. To this list, governments and global corporation have added intelligence gathering, Economic or industrial Espionage, and information warfare. Phishing is multimedia spyware and botnet is a highly distributed spyware, and both these spyware differ from most spyware in that they can be targeted.

Duncan L. Clarke - One of the best experts on this subject based on the ideXlab platform.

  • Israel's Economic Espionage in the United States
    Journal of Palestine Studies, 1998
    Co-Authors: Duncan L. Clarke
    Abstract:

    Israel has conducted an aggressive campaign of Economic Espionage in the United States since 1948. This campaign has been critical to sustaining and modernizing Israel9s nuclear weapons program and an array of its most advanced conventional weapons even while it has caused American firms to lose valuable proprietary information and unfairly advantaged Israeli companies in the international arms market. While other countries conduct Economic Espionage against the United States, Israel is the only major recipient of U.S. foreign aid to do so.

  • Economic Espionage and interallied strategic cooperation
    Thunderbird International Business Review, 1998
    Co-Authors: Duncan L. Clarke, Robert J. Johnston
    Abstract:

    Incidents of Economic Espionage by foreign governments against US corporations, persons, and institutions are numerous and very costly. Meeting this challenge has become a high national priority, and several significant measures have been taken by Washington that affect the business community directly and indirectly. Allies of the United States are among the principal culprits. This raises a potentially serious issue: How to pursue mutually beneficial, essentially cooperative, interallied strategic relations while Economic relations among allies are acquiring a sharper competitive edge? Thus far, Economic Espionage has not jeopardized traditional security ties. © 1998 John Wiley & Sons, Inc.

Edwin Fraumann - One of the best experts on this subject based on the ideXlab platform.

  • Economic Espionage security missions redefined
    Public Administration Review, 1997
    Co-Authors: Edwin Fraumann
    Abstract:

    Introduction Throughout history, Espionage has generally been viewed as an activity conducted by spies to obtain the military secrets of an enemy. Some of the most successful and well-known examples of Espionage include England's use of spies to uncover the military information that helped to defeat the Spanish Armada in 1588; the use of spies by the Allies during World War 11 to defeat the Axis powers; and the Soviet Union's use of spies to steal atomic bomb secrets from their former allies, the United States and Britain. In the post Cold War era, however, increasing international Economic competition has redefined the context for Espionage as nations link their national security to their Economic security. Spying conducted by intelligence services is expanding from its primary focus on military secrets to collecting Economic secrets, i.e., to conducting Economic Espionage. The United States is particularly vulnerable to the changing focus of international Espionage agencies since so many American corporations and research centers rely heavily on communications systems, computer networks, and electronic equipment to process and to store information. Over 50 countries have covertly tried to obtain advanced technologies from United States industries (U.S. Senate, 1996a). In 1995, the annual cost of Economic Espionage to corporate America was conservatively estimated to be at least $50 billion. If intellectual property theft and unrestricted technology transfer are included, the estimate rises up to $240 billion (Perry, 1995, 3). A wide range of federal statutes provide the authority for activities that counter Economic Espionage. These activities are undertaken by at least nine federal agencies, including the FBI, which has the dominant role. However, given the extent of the problem, it was obvious that existing initiatives had not been effective in preventing the theft of Economic secrets. In recognition of the growing threat of Economic Espionage and the inability of existing legislation to deal with it, the Economic Espionage Act of 1996 (18 U.S.C. secs. 1831-1839) was signed into law on October 11, 1996, creating a new federal crime -- the theft of trade secrets. The Department of justice now has sweeping authority to prosecute the theft of trade secrets in the United States. The act, intended to crack down on Economic Espionage by foreign and domestic competitors, makes it illegal to steal a competitor's "proprietary" Economic information and imposes stiff new penalties for these thefts. Section 1831 of the act addresses Economic Espionage provisions and agents of foreign powers. Section 1832 of the act makes it a federal crime for any person to convert a trade secret to his own benefit or the benefit of others knowing that the offense will injure the owner of the trade secret. Although the problem of Economic Espionage had become extensive and was the subject of debate in Congress, few people outside of those fighting it and those affected by it were aware of its scope and impact. This article attempts to close this information gap by providing a working definition of Economic Espionage and trade secrets, describing the methods that are used to obtain trade secrets from American corporations and research centers, and summarizing the technological capabilities of selected countries to conduct Economic Espionage against the United States. The article also addresses public-sector initiatives in the United States to protect its Economic interests. Economic Espionage: What Are We Talking About? According to the FBI, "Economic Espionage means foreign-power sponsored or coordinated intelligence activity directed at the U.S. Government or U.S. corporations, establishments, or persons for the purpose of unlawfully obtaining proprietary Economic information" (FBI, 1995, 2). In Section 1839 of the Economic Espionage Act of 1996 "trade secret" is defined to mean all forms and types of financial, business, scientific, technical, Economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing. …

James D. Gaisford - One of the best experts on this subject based on the ideXlab platform.

  • an inquiry into the rationale for Economic Espionage
    International Economic Journal, 1999
    Co-Authors: Merrill E Whitney, James D. Gaisford
    Abstract:

    Economic Espionage can yield desirable strategic effects as well as cost savings for firms in a spying country. The spying country will typically gain even though counter-Espionage operations will often be conducted by target countries. When two producing countries spy on each other, it is possible that both will be better off because of the technology transfer which is implicit in Espionage. Economic Espionage is generally beneficial to consumers. [F12, O031]

  • Economic Espionage as strategic trade policy
    Canadian Journal of Economics, 1996
    Co-Authors: Merrill E Whitney, James D. Gaisford
    Abstract:

    In an interview on NBC's Expose in September 1991, Pierre Marion, a former Director of the French intelligence service, stated that: "It would not be normal that we do spy on the (United) States in political matters; we are really allied. But in the Economic competition, in the technological competition, we are competitors; we are not allied" (Security Management 1992). Is it "4normal" for competing nations to conduct Economic Espionage? This paper will show that there may be indirect strategic benefits from spying that go beyond the obvious direct benefits from access to valuable Economic secrets. In such situations, Economic Espionage acts as a form of strategic trade policy that shifts profits from foreign firms to domestic firms and potentially improves national welfare. Porteous (1993) has sketched a similar argument. Many types of sensitive information may be obtained by means of Economic Espionage. If spying unearths the blueprints of a prodluct or the source code of software, the fixed costs associated with research and development can be reduced for domestic firms. In such a case, there are direct benefits for domestic firms, but no strategic benefits because the behaviour of the domestic firms in global markets will remain unchanged. On the other hand, information on contract bids, marketing plans, or costs of rival foreign firms may give rise to strategic benefits in global markets even though there are no direct benefits. Finally, if the production technology of foreign firms is obtained, there will be both a direct benefit from lower total costs for domestic firms and a strategic benefit on global markets due to lower marginal costs. This paper will focus on Espionage performed to obtain marginal-cost reducing production technologies. While this paper considers Espionage by the government on behalf of domestic firms, the analysis could easily be adapted to allow for spying by

Brian Baskin - One of the best experts on this subject based on the ideXlab platform.

  • Real Spyware—Crime, Economic Espionage, and Espionage
    Combating Spyware in the Enterprise, 2006
    Co-Authors: Brian Baskin, Tony Bradley, Jeremy Faircloth, Craig A. Schiller, Ken Caruso, Paul Piccard, Lance James, Tony Piltzecker
    Abstract:

    This chapter examines the darkest side of spyware—that is, spyware in the hands of criminals, corporate Espionage agents, and government Espionage agents. Early hacking was mostly harmless and included things such as ASCII Christmas trees, funny messages, practical jokes, and, later, hacked Web pages. Over the past decade, more malevolent code has emerged in the form of worms, Denial of Service (DOS) attacks, and Distributed DOS attacks. A few individuals used their skills for their own benefit, but most individuals still followed the “Hacker ethic.” More recently, organized crime and unscrupulous marketing companies have generated lucrative markets for various schemes for generating revenue through hacking. These schemes include ransomware, theft of financial account information, identity theft, and storage of illegal files. To this list, governments and global corporation have added intelligence gathering, Economic or industrial Espionage, and information warfare. Phishing is multimedia spyware and botnet is a highly distributed spyware, and both these spyware differ from most spyware in that they can be targeted.

  • real spyware crime Economic Espionage and Espionage
    Combating Spyware in the Enterprise, 2006
    Co-Authors: Brian Baskin, Tony Bradley, Jeremy Faircloth, Craig A. Schiller, Ken Caruso, Paul Piccard, Lance James, Tony Piltzecker
    Abstract:

    This chapter examines the darkest side of spyware—that is, spyware in the hands of criminals, corporate Espionage agents, and government Espionage agents. Early hacking was mostly harmless and included things such as ASCII Christmas trees, funny messages, practical jokes, and, later, hacked Web pages. Over the past decade, more malevolent code has emerged in the form of worms, Denial of Service (DOS) attacks, and Distributed DOS attacks. A few individuals used their skills for their own benefit, but most individuals still followed the “Hacker ethic.” More recently, organized crime and unscrupulous marketing companies have generated lucrative markets for various schemes for generating revenue through hacking. These schemes include ransomware, theft of financial account information, identity theft, and storage of illegal files. To this list, governments and global corporation have added intelligence gathering, Economic or industrial Espionage, and information warfare. Phishing is multimedia spyware and botnet is a highly distributed spyware, and both these spyware differ from most spyware in that they can be targeted.