Trade Secret Theft, Industrial Espionage, and the China Threat

Overview

Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world—focusing on the mass scale in which information is being taken for China's growth and development.

Supplying a current look at...

See more details below
Hardcover
$65.28
BN.com price
(Save 6%)$69.95 List Price
Other sellers (Hardcover)
  • All (7) from $62.40   
  • New (5) from $62.40   
  • Used (2) from $92.44   
Sending request ...

Overview

Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world—focusing on the mass scale in which information is being taken for China's growth and development.

Supplying a current look at espionage, the book details the specific types of information China has targeted for its collection efforts in the past. It explains what China does to prepare for its massive collection efforts and describes what has been learned about China's efforts during various Congressional hearings, with expert advice and details from both the FBI and other government agencies.

This book is the product of hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation and various government agencies. Within the text, you will learn the rationale and techniques used to obtain information in the past. You will see a bit of history over centuries where espionage has played a role in the economy of various countries and view some cases that have come to light when individuals were caught.

The book supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect their information and assets, both at home and abroad.

Read More Show Less

Product Details

  • ISBN-13: 9781439899380
  • Publisher: CRC Press
  • Publication date: 12/9/2013
  • Pages: 320
  • Sales rank: 1,250,834

Meet the Author

Carl A. Roper is a retired government official who—as a Security Specialist with the Department of Defense Security Institute (DoDSI)—was a lead instructor providing general and specialized security training across the spectrum of government agencies and industry. He developed the DoDSI Risk Management course and was instrumental in enhancing other courses. Mr. Roper is also a retired U.S. Army Counterintelligence Special Agent. As a professional author, he has written numerous magazine articles and security books. He holds a BA from The American University, Washington, D.C., and an MSA from Central Michigan University, and is currently a Security Consultant and Trainer.

Read More Show Less

Table of Contents

China: The Red Dragon of Economic Espionage
Protecting US Intellectual Property Overseas
Background of the Problem
London Speaks Out
What Does China Desire to Be?
The US Stand on the Nation’s Economy
China’s Industrial Espionage
Project 863
Guidance Projects
National High-Tech R&D Program
Getting the Data
Economic Collection and Industrial Espionage
A US View—Background of the Problem
References

We Are Not Alone: Economic Espionage and the World
Examples of Attempts to Obtain Economic Information
Renewed Focus on China
References

The Background of Economic Espionage
Espionage as a Means of Nation Building
History
References

PRC Acquisition of US Technology: An Overview and Short History
The PRC Government Structure
COSTIND: The CCP’s Use of Corporations for Military Aims
CCP Supremacy over the State, the PLA, and the Economy
Development of the CCP’s Technology Policies
The 863 and Super 863 Programs: Importing Technologies for Military Use
The 16-Character Policy: "Give Priority to Military Products"
The PRC’s Use of Intelligence Services to Acquire US Military Technology
Overview of Methods Used by the PRC to Acquire Advanced US Military Technology
Acquisition of Military Technology from Other Governments
Joint Ventures with US Companies
Acquisition and Exploitation of Dual-Use Technologies
Front Companies
Direct Collection of Technology by Non-Intelligence Agencies and Individuals
Illegal Export of Military Technology Purchased in the United States
PRC Incentives for US Companies to Advocate Relaxation of Export Controls
China’s Efforts to Assimilate Advanced US Military Technology

Chinese Product Piracy and Counterfeiting
The Film Industry and Pirated DVDs
China’s Loose IP Protection Concerns
IP Theft
IP Rights
The Plight of the Copyright Industries Due to Piracy in China
The Business Software Industry
The Motion Picture Industry
The Entertainment Software Industry
The Book Publishing Industry
The Recording Industry
Congressional Hearings on Chinese Piracy
Breadth of the Counterfeiting Problem

Who, What, and How China Targets
Targeted Information and Technologies
Methods Used to Conduct Such Espionage
Other Economic Collection Methods
Other Economic Collection Efforts
Case Study of a Chinese Collector
Other Interesting Cases of Chinese Espionage
Case 1
Case 2
Case 3
Case 4
Case 5
References

The China Spy Guide and Open-Source Information
Chinese Intelligence Operations
Chinese Intelligence Collection Organizations
Chinese Collection Operations
Chinese Intelligence Collection Trends
Open-Source Collection
Benefits of Open-Source Information Collection
The Changing Nature of Open-Source Information
Traditional Open-Source Assets
Electronic Databases
Commercial Imagery
Closing Comments
References

The Intelligence Cycle and Collection Effort
Defining Intelligence
Collection Disciplines
HUMINT
SIGINT
MASINT
IMINT
OSINT
Computer Intrusion for Collection Operations
Reference

Corporate Rivals
Nature of the Information
References

Sources of Information
Open Sources of Information
Classified Government Information
Paper Shredding
The Direction of the Collection Effort
References

The Economic Espionage Act
Overview of the EEA of 1996
Elements Common to 18 U.S.C. §§ 1831, 1832
Specification of Trade Secrets
Disclosure Effects of a Trade Secret
Common Issues and Challenges in Trade Secret and EEA Cases
Primary Objectives
Three Parts to Trade Secrets
Intellectual Property Cases
References

The U.S. Response to Economic Espionage
US Government Awareness
NACIC Background and the Change to the Office of the NCIX
An Expanded Outreach to the Private Sector
No Electronic Theft Act
Militarily Critical Technologies List
Espionage and Illicit Acquisition of Proprietary Information
Policy Functions and Operational Roles
US Government Support to Private Industry
Options for Consideration
CI Community Efforts to Protect Technology
References

The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign
Targeting of US Technologies
Background
Threat Entities
DSS Key Findings
Targeted Technology Concerns
Overall DOD Concerns—A Summary
References

Intellectual Property Rights: Patents, Copyrights, and Trade Secrets
Patents
Types of Patents
Trademark and Service Marks
US Trademark Act and Trade Dress
Copyright
What Does a Copyright Protect?
Trade Secrets
Trade Secret Protection
China’s IPR Enforcement System
References

Internet Exploitation: The Web, Your Computer, Your IT System
Federal Information Security Management Act
Sensitive US Internet Traffic Sent to Chinese Servers
China’s Thinking and Capabilities in Cyberspace
The Deterrence Effect on the United States
References

Protecting Your Data
Espionage and Foreign Travel
Elicitation: What Is It?
Why Elicitation and What Is Its Appeal to Today’s Spy?
Elicitation Response
Your Response
Tips on Deflecting Elicitation Attempts
Elicitation: An Intelligence Collector’s Viewpoint
Hosting Foreign Visitors
Host Responsibilities
Long-Term Foreign Visitors
The Technology Control Plan
Security Reporting Responsibilities
Espionage Indicators
Protecting Your IP Rights (IPR) in China
China’s Current IPR Environment
The Best Protection Is Prevention
China’s IPR Enforcement System
What the US Government Can Do in IPR Infringement Cases
About Trade Secrets in China
Strategy Targeting Organized Piracy
Getting Help to Protect Your Rights
Your Knowledge of Methods Used in Economic Espionage
Unsolicited Requests for Proprietary Information
Espionage Indicators
Inappropriate Conduct during Visits
Suspicious Work Offers
Exploitation of Joint Ventures and Joint Research
Acquisitions of Technology and Companies
Co-opting of Former Employees
Targeting Cultural Commonalities
The Bottom Line for Protecting against Threats
Security Precautions as a Business Enabler
References

Source Documents and Other Resources
Appendix A: The Dongfan "Gregg" Chung and Chi Mak Economic Espionage Cases
Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case
Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present
Appendix D: Special 301 Report, China
Index

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)