1. Auflage 2013,
320 Seiten, Gebunden, Format (B × H): 178 mm x 254 mm, Gewicht: 772 g
Verlag: CRC Press
Roper Trade Secret Theft, Industrial Espionage, and the China ThreatAlthough every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world—focusing on the mass scale in which information is being taken for China's growth and development. Supplying a current look at espionage, the book details the specific types of information China has targeted for its collection efforts in the past. It explains what China does to prepare for its massive collection efforts and describes what has been learned about China's efforts during various Congressional hearings, with expert advice and details from both the FBI and other government agencies.This book is the product of hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation and various government agencies. Within the text, you will learn the rationale and techniques used to obtain information in the past. You will see a bit of history over centuries where espionage has played a role in the economy of various countries and view some cases that have come to light when individuals were caught. The book supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect their information and assets, both at home and abroad.
Security management professionals, computer IT/IT security professionals, intelligence and counterintelligence personnel, intelligence and counter- intelligence organizations, and defense contractors.
Weitere Infos & Material
China: The Red Dragon of Economic EspionageProtecting US Intellectual Property OverseasBackground of the ProblemLondon Speaks OutWhat Does China Desire to Be?The US Stand on the Nation’s EconomyChina’s Industrial EspionageProject 863Guidance ProjectsNational High-Tech R&D Program Getting the Data Economic Collection and Industrial EspionageA US View—Background of the ProblemReferencesWe Are Not Alone: Economic Espionage and the WorldExamples of Attempts to Obtain Economic InformationRenewed Focus on ChinaReferencesThe Background of Economic EspionageEspionage as a Means of Nation BuildingHistoryReferencesPRC Acquisition of US Technology: An Overview and Short HistoryThe PRC Government Structure COSTIND: The CCP’s Use of Corporations for Military AimsCCP Supremacy over the State, the PLA, and the EconomyDevelopment of the CCP’s Technology PoliciesThe 863 and Super 863 Programs: Importing Technologies for Military UseThe 16-Character Policy: "Give Priority to Military Products"The PRC’s Use of Intelligence Services to Acquire US Military TechnologyOverview of Methods Used by the PRC to Acquire Advanced US Military TechnologyAcquisition of Military Technology from Other GovernmentsJoint Ventures with US CompaniesAcquisition and Exploitation of Dual-Use TechnologiesFront CompaniesDirect Collection of Technology by Non-Intelligence Agencies and IndividualsIllegal Export of Military Technology Purchased in the United StatesPRC Incentives for US Companies to Advocate Relaxation of Export ControlsChina’s Efforts to Assimilate Advanced US Military TechnologyChinese Product Piracy and CounterfeitingThe Film Industry and Pirated DVDsChina’s Loose IP Protection ConcernsIP TheftIP RightsThe Plight of the Copyright Industries Due to Piracy in China The Business Software Industry The Motion Picture Industry The Entertainment Software Industry The Book Publishing Industry The Recording Industry Congressional Hearings on Chinese Piracy Breadth of the Counterfeiting ProblemWho, What, and How China TargetsTargeted Information and TechnologiesMethods Used to Conduct Such EspionageOther Economic Collection MethodsOther Economic Collection EffortsCase Study of a Chinese CollectorOther Interesting Cases of Chinese Espionage Case 1 Case 2 Case 3 Case 4 Case 5ReferencesThe China Spy Guide and Open-Source InformationChinese Intelligence OperationsChinese Intelligence Collection Organizations Chinese Collection Operations Chinese Intelligence Collection TrendsOpen-Source Collection Benefits of Open-Source Information Collection The Changing Nature of Open-Source Information Traditional Open-Source Assets Electronic Databases Commercial ImageryClosing CommentsReferencesThe Intelligence Cycle and Collection EffortDefining IntelligenceCollection Disciplines HUMINT SIGINT MASINT IMINT OSINTComputer Intrusion for Collection OperationsReferenceCorporate RivalsNature of the InformationReferencesSources of InformationOpen Sources of InformationClassified Government InformationPaper ShreddingThe Direction of the Collection EffortReferences
The Economic Espionage ActOverview of the EEA of 1996Elements Common to 18 U.S.C. §§ 1831, 1832Specification of Trade SecretsDisclosure Effects of a Trade SecretCommon Issues and Challenges in Trade Secret and EEA Cases Primary Objectives Three Parts to Trade Secrets Intellectual Property CasesReferencesThe U.S. Response to Economic EspionageUS Government AwarenessNACIC Background and the Change to the Office of the NCIXAn Expanded Outreach to the Private SectorNo Electronic Theft ActMilitarily Critical Technologies ListEspionage and Illicit Acquisition of Proprietary InformationPolicy Functions and Operational RolesUS Government Support to Private IndustryOptions for ConsiderationCI Community Efforts to Protect TechnologyReferencesThe DOD View of IP Theft: A Trend Analysis of Reporting on ForeignTargeting of US TechnologiesBackgroundThreat EntitiesDSS Key FindingsTargeted Technology ConcernsOverall DOD Concerns—A SummaryReferencesIntellectual Property Rights: Patents, Copyrights, and Trade SecretsPatentsTypes of PatentsTrademark and Service Marks US Trademark Act and Trade DressCopyright What Does a Copyright Protect?Trade SecretsTrade Secret ProtectionChina’s IPR Enforcement SystemReferencesInternet Exploitation: The Web, Your Computer, Your IT SystemFederal Information Security Management ActSensitive US Internet Traffic Sent to Chinese ServersChina’s Thinking and Capabilities in CyberspaceThe Deterrence Effect on the United StatesReferencesProtecting Your DataEspionage and Foreign TravelElicitation: What Is It? Why Elicitation and What Is Its Appeal to Today’s Spy? Elicitation Response Your Response Tips on Deflecting Elicitation AttemptsElicitation: An Intelligence Collector’s ViewpointHosting Foreign Visitors Host ResponsibilitiesLong-Term Foreign VisitorsThe Technology Control Plan Security Reporting Responsibilities Espionage IndicatorsProtecting Your IP Rights (IPR) in China China’s Current IPR Environment The Best Protection Is Prevention China’s IPR Enforcement System What the US Government Can Do in IPR Infringement CasesAbout Trade Secrets in ChinaStrategy Targeting Organized PiracyGetting Help to Protect Your RightsYour Knowledge of Methods Used in Economic Espionage Unsolicited Requests for Proprietary InformationEspionage Indicators Inappropriate Conduct during Visits Suspicious Work Offers Exploitation of Joint Ventures and Joint Research Acquisitions of Technology and Companies Co-opting of Former Employees Targeting Cultural CommonalitiesThe Bottom Line for Protecting against ThreatsSecurity Precautions as a Business EnablerReferencesSource Documents and Other ResourcesAppendix A: The Dongfan "Gregg" Chung and Chi Mak Economic Espionage CasesAppendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise CaseAppendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the PresentAppendix D: Special 301 Report, ChinaIndex