+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Economic espionage

Essay, term paper, research paper:  History Essays

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on History Essays: Economic Espionage, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



Economic Espionage


A small Mississauga electronics safety equipment company is broken into.
Although filing cabinets and desks were rummaged through, nothing was seemingly
taken. An officer discovered the company had drawn up a bid for $7 million
dollar contract a day or so before the break-in. The contract in question was
for a foreign country. It was later discovered that the company in question was
known for its aggressive economic espionage. An iron ore shipping company was
also broken into. At first it was thought that the target had been the firms
computers. But, nothing was taken, it was assumed that the burglars had been
scared off. Within thirty minutes it was discovered that the company was
approaching its fiscal year end. staff eventually found that most of the recent
database backup tape was missing. A Quebec based company with the laser-based
system for inspecting materials used in, among other things, the stealth
aircraft, had three computers stolen. On their harddrives were confidential
codes for specialized software used by the Canadian Armed forces. The above are
all true examples of the modern threat facing international business today
known as industrial or economic espionage. The end of the cold and economic
pressures have increased the risk of economic espionage. The collapse of the
Soviet Union has left unemployed KGB and other former communist bloc
intelligence agents selling everything from Russian night vision devices to
completely assembled and functional bugging devices. Even friendly western
European governments have been caught spying on private corporations based in
the U.S. and other countries, while industrial competitors sometimes hire
private companies to collect competitive intelligence from their corporate
rivals( Lester:96). What exactly is economic espionage? how prevalent is it?
Who does it? How do they do it? and what can we do to stop it. These are the
questions that will be looked at in the following pages.
First lets look at, what exactly is economic espionage. Espionage and
intelligence is no longer the exclusive domain of monarchs and governments, it
has become a must for modern international business. Large corporations around
the world particularly in western Europe and Asia now hire agents to gather
intelligence on their competitors and other countries. The goal of economic
espionage is to steal trade secrets, plans and confidential procedures or
anything to give your company or country a competitive edge over another
(Perry:1996). The areas that interest industrial spies the most include
radiation transfer technology, systems diagnostic and testing software,
traveling wave tubes, aviation technologies, microwave monolithic integrated
circuits, inferred signature measures software, radar technologies, wet
processing systems, information management and processing, simulation
technologies, physical security technologies, ram-jet engine and ram-jet
technologies.(Special Security news letter:1995). Although this is not all of
the areas that modern spies target, it will give you an idea of the scope of the
problem. Peter Schweiser author of the book "Friendly spies" speculates that
for the most part, modern industrial spies are motivated by pure greed of money.
If we look back in history we can see that the majority of the spies that were
caught, were motivated by the money. John walker head of the notorious Walker
spie ring, sold submarine secretes to the Soviets for 17 years for one million
dollars. Larry Wu-Tai Chin and analyst of the CIA, passed secrets to China
and was paid $180,000 over a three year period. Richard Miller worked for the
FBI and was to be paid 2 million dollars to pass counter-intelligence secrets to
the Soviets, but he was caught and was only paid one quarter of this amount. It
is easy to see that spying for friendly countries is a profitable business.
Is economic espionage really as bad as it is made out to be? Since 1985
economic espionage directed at American companies has increases 260 percent and
the FBI's industrial espionage caseload has jumped to well over five hundred
investigations. Espionage is costing American companies well over a 100 billion
dollars a year in lost sales infact some sources put the loss at 260 billion.
In Canada that Number translates to 10 billion a year and companies with
overseas operations are estimated to lose 140 billion dollars per year. It is
hard to get accurate numbers when it come to losses due to espionage for the
simple reason that companies don't want to admit to being victims, in fear of
undermining the confidence of their suppliers and shareholders (Lester:1996).
The visible damage of economic espionage takes the from of Lost contracts, jobs
and markets, and overall a diminished competitive edge. The companies
that are hurt the most are the ones that earn under 11 million dollars annually.

How do industrial spies go about collecting information. It is a well
known fact that modern spies have used all of the collection methods used during
the cold war for collecting information on industrial competitors.
Practitioners of modern espionage seldom use one method by itself, but combine
them into concerted collection programs. countries and corporations have been
known to turn legitimate transactions or business relationships stealthy
collection opportunities. Some of the methods of information collection listed
below are most often used for legitimate purposes. Including them here is not to
imply illegal activity, they are used to show as potential elements of a broader,
coordinated intelligence effort(Security Online:1996:5).
Classic agent recruitment is an intelligence collectors best source.
This method provides a trusted member inside a company or organization who the
collector cans task to provide classified information. An information
collector's interest in recruiting personal is not limited to a high ranking
personal in a company or organization. It is true that researchers, key
business managers, and corporate executives are a good target for industrial
spies, but support personal such as secretaries, computer operators, technicians,
and maintenance personal are also targeted. The latter may behave the best
access to competitive information, and their low pay may provide good ground for
manipulation by intelligence agencies.(Security On-line: issue 1)
Next spies use what is called us volunteers. The people that have the
easiest access to companies information is the companies own employees.
Employees who steal information from their companies exhibit the same
motivations as the typical spie or thief, illegal or excessive use of drugs or
alcohol, money problems, personal stress, and just plain greed.
industrial spies will use ordinary surveillance and simple break and
enter to gain access to sensitive information. Companies have reported break
and enters were only laptops and disks were stolen when items of much more value
were close by. Some countries pursuade hotel operators to give their spies
access to visitors rooms and luggage. during these break-ins known as "bag ops"
luggage is searched for sensitive information and any useful documents are
copied or simply stolen.(Security On-line: issue 1)
Specialized technical operations constitutes the largest part portion of
economic espionage. This type of collection includes computer intrusion,
telecommunications targeting and intercept, and private-sector encryption
weaknesses. Corporate telecommunications especially international
telecommunications provide a highly vulnerable and lucrative source for anyone
interested in obtaining trade secrets or competitive measures because they are
so easily accessed and intercepted. Due to the increased use these links for
computer transmission and electronic amil, intelligence collectors find
telecommunications interception cost-effective. For example, foreign
intelligence collectors intercept facsimile transmissions through government-
owned telephone companies, and the stakes are large, approximately half of all
overseas transmissions are facsimiles. innovative hackers connected to
computers containing competitive information evade the controls and access
companies information. In addition many American companies have begun using
electronic data interchange, a system of transferring corporate bidding, invoice,
and pricing data electronically overseas. many foreign government and corporate
information collectors find this information invaluable.(Security On-line: issue
1)
Another tactic used in the world of corporate espionage is economic
misinformation. Some governments use misinformation campaigns to scare their
domestic companies and potential clients away from dealing with US companies.
The press and governments agencies often discuss foreign economic and industrial
intelligence activities, often in vague non-specific terms. The issue has been
to paint foreign competitors or countries as aggressive and untrustworthy, even
if the accuser has no proof of any collection activity. Some countries have
widely publicized their efforts to set up information security mechanisms to
protect against their competitors penetration attempts, and frequently the
United States id mentioned as the primary threat.(Security On-line: issue 1)
Tasking foreign students studying in the US and other countries. Some
governments task their students studying in a different country to aquire
information on a variety of economic and technical subjects. In some cases the
students are recruited before they start their studies, others are approached
after and are recruited or pressured based on loyalty, fear for their countries
government or intelligence service. In some cases, at an intelligence
collectors request, foreign graduate students serve as assistance at no cost to
professors doing research in target areas. These students then have access to
the professors research and learns the applications of the technology. As an
alternative to compulsory military service one government has an organized
programs to send interns abroad, often with the specific task of collecting
foreign business and technological information.(Security On-line: issue 1)
As well as recruiting students studying abroad, information collectors
will task foreign employees of North American firms and agencies. The
information collector will recruit or task compatriot employee in A North
American firm to steal information. Although similar to the clandestine
recruitment used by intelligence agencies, often no intelligence service is
involved, only a competitive company or non-intelligence government agency. The
collector then passes the information directly to a foreign firm or the
government for the use in it research and development activities.(Security On-
line: issue 1)
Debriefing of foreign visitors to North American countries is another
method collectors use. Some countries actively debrief their citizens after
travel in North America, asking information acquired during their trips abroad.
Sometimes this debriefings are heavy handed, with foreign scientists describing
them as offensive. In some countries, they are simply and accepted part of
traveling abroad.(Security On-line: issue 1)
Recruitment of emigres, ethnic targeting is another way information is
collected. Frequently, intelligence collectors find it effective to target
persons of their own ethic group. Persons working for the Us military and
research and development who have access to classified technology. Several
countries have found repatriation of emigre and foreign scientists to be the
most beneficial technology transfer methodology. One country, in particular,
claims to have repatriated thousands of ethnic scientists back to their home
country from the United States. Ethnic targeting includes attempts to recruit
and task naturalized US citizens and permanent resident aliens to assist in
acquiring secret information. Frequently, foreign intelligence collectors
appeal to a persons patriotism and ethnic loyalty. Some countries collectors
resort to threatening family members that continue to reside in their home
country.(Security On-line: issue 1)
Information collectors will also use what is refereed to as elicitation
during international conferences and trade fairs. Events such as international
conferences on high-tech topics, trade fairs, and air shows-attract many foreign
scientists and engineers, providing foreign intelligence collectors with
concentrated group of specialists on a certain topic. Collector target these
individuals while they are abroad to gather any information the scientists or
engineers may posses. Sometimes depending on the country and the specific
circumstances these elicitation efforts may be heavy handed. Intelligence
collectors sometimes try to recruit scientists by inviting them on all expense
paid trips abroad for conferences or sabbaticals. The individuals are treated
royally, and their advice sought on areas of interest. When they return to
their country, collectors recontact them and ask them to provide information on
their areas of research. (Security On-line: issue 1)
Commercial data bases, trade and scientific journals, computer bulletin
boards, openly available US government data, corporate publications are another
source. Many collectors take advantage of the vast amount of competitive
information that is legally and openly available in the United States. Open
source information can provide personality profile data, data on new research
and development and planned products, new manufacturing technics, and
competitor strengths and weaknesses. Most collectors use this information for
its own worth in their business competition. However, some use openly available
information as leads to refine and focus their clandestine collection and to
identify individuals and organization that posses desired information.(Security
On-line: issue 1)
Foreign government use of private-sector organizations, front companies,
and joint ventures is the next way collectors use to gather intelligence. Some
foreign governments exploit existing non-government affiliation organizations or
create new ones-such as friendship societies, international exchange
organizations, import and export companies, and other entities that have
frequent contact with foreigners to gather intelligence and to place
intelligence collectors. They conceal government involvement in these
organizations and present them as merly private entities in order to cover their
intelligence operations. These organizations spot and assess potential foreign
intelligence recruits with whom they have contact. Such organizations also
lobby US government officials to chanfe policies the foreign governments
consider unfavorable.(Security On-line: issue 1)
Corporate mergers and acquisitions. Several countries use corporate
mergers and acquisitions to aquire technology. The vast majority of these
transactions are made for legitimate purposes. Sometimes though they are made
to specifically to allow a foreign company to aquire North American technology
without spending their own resources on research and development. According a
1994 US government document entitled " Report on US critical technology
Companies" 984 foreign mergers and acquisitions of US critical technology
companies occurred between January 1st 1985 and October 1st 1993. All but a
handful of these mergers and acquisitions were friendly, and four countries
accounted for 68 percent of them. Of the total 60 percent of them involved US
companies involved in advanced materials, computers including software,
peripherals, biotechnology, areas relative US professional and scientific
instrumentation, communications equipment, advanced manufacturing, and aircraft
and spare parts. (Security On-line: issue 1)
The next way information is collected is refered to as headhunting or
hiring competitors employees. Foreign companies typically hire knowledgeable
employees of competing US firms to do corresponding work for the foreign firm.
At times, they do this specifically to gain inside technical information from
the employee and use it against the competing US firms.(Security On-line: issue
1)
Corporate technology agreements is another way information collectors
assemble technological information. Some foreign companies use potential
technology sharing agreements as condiuts for receiving propriety information.
In such instances, foreign companies demand that, in order to negotiate an
agreement, the North American company must divulge large amounts of information
about its processes and products, sometime much more than is justified by the
project be negotiated. Often the information requested is highly sensitive. In
some of these cases, the foreign company either terminates the deal after
receipt of the information or refuses to negotiate further if denied the
information.(Security On-line: issue 1)
Foreign companies will often use the favorable research climate in North
America. Foreign countries will sponsor research activities at the North
American university and research centers. Generally everyone benefits from the
finished research. At times, however, foreign governments or companies use the
opportunity as a one sided attempt only to collect research results and
proprietary information at the North American facility. Foreign intelligence
services also use these efforts to insert intelligence officers who act solely
as information collectors. (Security On-line: issue 1)
Hiring information brokers, consultants. Information brokers scour the
world for valuable information. What they can not obtain legally or by guile
some information brokers will purchase. The broker then verifies the data, puts
it into a usable and easily accessible format, and delivers it to interested
clients. The following example, that was printed in the Asian Wall Street
Journal in 1991 and illustrates this type of activity. The ad was followed by a
phone number in western Europe.

"No you have advanced/privileged information on any type of
project/contract that is going to be carried out in your country?
We hold commission/agency agreements with many large
European companies and could introduce them to "your"
project/contract. Any commission received would be shared with
yourselves."

Some countries frequently hire well connected consultants to write
reports on topics of interest and to lobby North American government officials
on the countries behalf. Often, the consultants are often high ranking US
government officials who maintain contacts with their former colleagues. They
exploit these connections and contract relationships to acquire protected
information and gain access to other high level officials who are currently
holding positions of authority through whom they attempt to further aquire
protected information.(Security On-line: issue 1)
Fulfillment of classified US government contracts and exploitation of
department of defense sponsored technology sharing agreements. At times,
classified government contracts are awarded to companies that are partially or
substantially controlled by foreign governments. Although the US governments
security agencies closely monitor these contracts, they still provide foreign
governments with unauthorized access to information. Traditional allies of the
US are most likely to use this method, since non-allies seldom are included in
such contracts.(Security On-line: issue 1)
The last method of information collection we will look at tasking
liaison officers at government to government projects. During joint research
and development activities, foreign governments routinely request to have on-
site liaison officers to monitor progress and provide guidance. Several allied
countries have taken advantage of these positions as cover for intelligence
officers assigned with collecting as much information about the facility as
possible. Using their close access to their US counterparts conducting joint
research and development, particularly in the defense arena, liaison officers
have been caught removing documents clearly marked as restricted or classified.
(Security On-line: issue 1)
Now that we have looked at how foreign countries and companies go about
collecting information from North American companies. The FBI investigations
reflect that 23 countries are currently engaged in espionage against North
American countries. France is one of the countries that we will look at.
The French currently commit 200 full-time agents world wide. These
agents are known as the " General de la Securite Exterieure" and concentrate on
the soft business targets. The other full-time group in the French
intelligence service is the "Service 7". This group of spies is also known as
the action unit. They carry out all of the operations that require a deft
hand,IE break-ins, buggings and covert operations. These full-time agents are
only part of the story, France also has part-time information collectors called "
Honorary correspondents". This group of people includes a large number of
corporate officials living overseas. Some of these people work for money, but
others see it as part of their jobs. An example of this type of information
collectors a man by the name of Pierre Marion. Pierre was a Air France
representative who lived in Japan. His job was to collect information about
Japanese social circles particularly as it related to Japanese political
officials.
For its size no other country in the world has the intelligence
capability of South Korea. The Korean intelligence service is called the "
National Security Planning Agency" and is active around the world providing a
variety of intelligence and espionage services to Korean interests. South Korean
agents operate in North Korea, China and the Soviet Union, but the United States
and Japan is were they are most active. US intelligence sources have bee heard
to say that the NSP is more effective than Israelis Mossad. The NSP has a
technically proficient agents, enormous financial resources, and a well-
organized group of informers. An example of an operation the South Koreans
carry out is called " Operation Laughing Bird". This operation was conducted in
Japan and was designed to gather technological information to support South
Korean industry. It was put into action in 1981. It included more than 200
agent. These agents engaged in electronic eavesdropping, the planting of moles
and agents, the use of organized crime syndicates in Japan and the recruitment
of Japanese and American workers to act as agents.
Israel is the next country that we will look at. The Israeli economic
espionage collection agency is called the " LAKAM", and is one of Israel's most
effective intelligence organizations> LAKAM is an Hebrew acronym for Israeli
Defense Minuister's Scientific Liaison Bureau. Its agents operate in United
States, Japan, France, Germany, Italy, Great Britain, Switzerland, and Sweden.
LAKAM's biggest operation is in the US. Their agents operate out of the Israeli
ambassy in Washington as well as two other shops, in Los Angeles and the other
in New York. Theri operations in these cities are believed to include thirty
five full-time agents with a several dozen informers. companies that benefit
the most in Israel include aerospace, chemical producers, and electronics firms.
In addition to regular agents the Israelis use dee cover agents posing as
business people and scientists traveling to the United States. Most of the time
the agents are in direct contact with the Prime Minister through the telephone
and telex, but if it is something that is extremely sensitive diplomatic pouches
are used to transport it.
Next lets turn our attention toward Germany. Germany's intelligence
service is called the Bundesnachrichtendienst (BND). Since the 1960's the
Germans have been actively involved in spying on the US, France, Great Britain,
and Italy. The BND regularly monitor telecommunications of foreign corporations
bases in Germany. he BND is very active in the US. German agents have
cultivated mole or spies in Us high-tech firms. The BND is gathering extensive
information in the fields of economy, technology and industry.
These United States is not completely innocent in the world of espionage.
Now that the cold war is over the CIA officials have latched onto the idea of
collecting economic data to justify the inflated budget of the agency. Dozens
of US corporations from fortune 500 companies to small, high tech firms, are
secretly assisting the CIA, allowing the agency to place full-time officers from
its operations division into corporate offices abroad. Serving under what is
refereed as "nonofficial cover" (NOC), CIA officers pose as American businessmen
in friendly countries, from Asia to Central America to Western Europe. Once
there, they recruit agents from the ranks of foreign officials and business
leaders, pilfer secrets, and even conduct speacial operations and parliamentary
activity (Dreyfus:95:1). Proof that the United States is engaged in this type
of espionage happened in 1995 when the French government demanded that four
business officials leave the country because they were allegedly caught
gathering French economic and political secrets. Three businessmen were posing
as American diplomats and the fourth was operating under a business cover( Time:
March 6:1995).
As stated above Espionage is not the exclusive domain of governments
anymore. Some corporations have intelligence organizations that rival that of a
small country. other companies that do not have intelligence organization of
their own retain or hire private investigators when espionage is required. An
example of the use of company spies happened in July 1989. A du pont chemical
plant was the site of an well planned espionage scheme. Visitors from a German
chemical company were visiting the plant. One of the visitors, while looking
over a table accidentally dip the tip of his tie into a vat of chemicals.
Company officials at first were very apologetic and offered to replace the tie.
The visitor insisted o keeping the tie because it was from his family. Only
after an experienced company security official protested to company leaders that
the accident was probably a scheme to obtain a chemical sample did the company
insist on keeping the tie(Scheizer:1993:253).
Lastly we will look at some of the ways that companies can protect
themselves against economic espionage. The following was taken from a paper
written by Kevin d. Murray A certified protection professional called "10 Spy-
Busting Secrets".
According to Murray, espionage is preventable if you know the
vulnerabilities, you can take the proper precautions. Murray presents a list of
the top ten ways to fight back against economic espionage.
The first thing Murray examines is what is called trash trawling. this
is simply digging through garbage. This activity is legal. The simple counter-
espionage tactic for this is to reduce that availability of what he refers to as
puzzle parts. companies must encourage destruction of waste paper by purchasing
shredders appropriate to the needs of the company, Use crosscut destruction for
high level security, computer paperwork and large volume waste require a
central bulk shredder. do not leave confidential papers in a box under desks
for later shredding shred it now, Do not entrust wastepaper destruction to
paper recycling vendors destroy it before recycling. The big shredder
purchasing mistake is buying just one shredder for everyone to use. Some people
are to busy to be bothered. Murray recommends the use of several convenient
desk-side shredders.
Bugs and wire tapping is the next area examined by Murray. Electronic
spying is the most devastating spy trick there is. A common mistake is saying"
Oh I'm just being paranoid" when you suspect electronic surveillance. Murray
recommends not discussing your suspicions with others unless they have a real
need to know, do not discuss your suspicions in the suspect areas, don't
attempt a do-it yourself solution, don't waste money buying spybuster toys,
seek professional guidance without delay. Contrary to what is seen on
television and in catalogs, detection of bugs and wiretaps is equipment and
knowledge intensive work. Expect a professional sweep team to have about
$100,000 dollars invested in their equipment as well as an extensive background
in security, investigations, telecommunications and electronics. These types of
professionals will not be found in the yellow pages, you must contact a
corporate security professional for a recommendation.
The drop by spies is the next area of interest. Check and photocopy
credentials and work orders of anyone performing technical work in or around
your offices. Verify the work was actually requested and most of all necessary.
This included telecommunications technicians, office equipment repair persons,
paper recycles, cleaning crews, electricians etc. Have someone that represents
the interests of your company accompany these individuals while on your property.
Outsider contractors and unauthorized company employees should never br allowed
to roam free unescorted. One professional snoop brags openly that any building
can be entered at any ti


 

Other sample model essays:

China Between The Fall Of The KMT and Mao Tse-Tung's Death The time from 1949-1976 was a time of transition for China. Many social and economic changes occurred through this period....
History Essays / Effects Of Youth Crime
Effects of Youth Crime A kid walks down the crowded hallway at school. He is late to his class so he is going as fast as he can. In his hurry, he accidentally bumps into another kid. Th...
Reason Why Elections Are Less Democratic The reason why elections are less democratic is because some people say that money is taking away from our well known democracy, but in other instanc...
History Essays / Judicial Choices
Judicial Choices Supreme Court conformations, much like everything else in politics and life, changed over the years. Conformations grew from insignificant and routine appointments to vit...
History Essays / Euthanasia
Euthanasia "It is conceivable, that life can deteriorate to the point where persons lose their dignity and self-respect and are unable to communicate; life in such a form no longer...
Political Science / Euthanasia: The Right To Die
Euthanasia: The Right to Die Thesis: Euthanasia should be legalized so, if we ever have a loved one that is suffering and death is certain, that we have the choice to ease their pai...
History Essays / Farewell To Manzanar
Farewell To Manzanar In the true story "Farewell to Manzanar" we learn of a young girl's life as she grows up during World War II in a Japanese internment camp. Along with her family and ...
The Importance of Theoretical Frameworks For Understanding Foundations of Political Science The importance of theoretical frameworks is essential for understanding foundations for political...
Personal Freedom In the United States of America No other democratic society in the world permits personal freedoms to the degree of the United States of America. Within the last si...
History Essays / Freedom Through The Press
Freedom Through The Press Tears streamed down a broken face That stared to the ground where his father lay At lexington was he dying this day For a battle l...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD