- Industrial espionage
-
Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes. Economic espionage is conducted or orchestrated by governments and is international in scope, while industrial or corporate espionage is more often national and occurs between companies or corporations.[1]
Competitive intelligence and economic or industrial espionage
'Competitive intelligence' describes the legal and ethical activity of systematically gathering, analyzing and managing information on industrial competitors.[2] It may include activities such as examining newspaper articles, corporate publications, websites, patent filings, specialised databases, information at trade shows and the like to determine information on a corporation.[3] The compilation of these crucial elements is sometimes termed CIS or CRS, a Competitive Intelligence Solution or Competitive Response Solution. With its roots in market research, 'competitive intelligence' has been described as the 'application of principles and practices from military and national intelligence to the domain of global business';[4] it is the business equivalent of open-source intelligence.
In theory, the difference between 'competitive intelligence' and economic or industrial espionage is clear. In practice, it is sometimes quite difficult to tell the difference between legal and illegal methods. Especially if one starts to consider the ethical side of information gathering, the border becomes even more blurred and elusive of definition.
Forms of economic and industrial espionage
Economic or industrial espionage takes place in two main forms. In short, the purpose of espionage is to gather knowledge about (an) organization(s). It may include the acquisition of intellectual property, such as information on industrial manufacture, ideas, techniques and processes, recipes and formulas. Or it could include sequestration of proprietary or operational information, such as that on customer datasets, pricing, sales, marketing, research and development, policies, prospective bids, planning or marketing strategies or the changing compositions and locations of production.[2] It may describe activities such as theft of trade secrets, bribery, blackmail and technological surveillance. As well as orchestrating espionage on commercial organizations, governments can also be targets —for example, to determine the terms of a tender for a government contract so that another tenderer can underbid.
Target industries
Economic and industrial espionage is most commonly associated with technology-heavy industries, including computer software and hardware, biotechnology, aerospace, telecommunications, transportation and engine technology, automobiles, machine tools, energy, materials and coatings and so on. Silicon Valley is known to be one of the world's most targeted areas for espionage, though any industry with information of use to competitors may be a target.[5]
Information theft and sabotage
Information can make the difference between success and failure; if a trade secret is stolen, the competitive playing field is leveled or even tipped in favor of a competitor. Although a lot of information-gathering is accomplished legally through competitive intelligence, at times corporations feel the best way to get information is to take it.[6] Economic or industrial espionage is a threat to any business whose livelihood depends on information.
In recent years, economic or industrial espionage has taken on an expanded definition. For instance, attempts to sabotage a corporation may be considered industrial espionage; in this sense, the term takes on the wider connotations of its parent word. That espionage and sabotage (corporate or otherwise) have become more clearly associated with each other is also demonstrated by a number of profiling studies, some government, some corporate. The US Government currently has a polygraph examination entitled the "Test of Espionage and Sabotage" (TES, contributing to the increasingly popular, though not consensus, notion, by those studying espionage and sabotage countermeasures, of the interrelationship between the two.[7] In practice, particularly by 'trusted insiders,' they are generally considered functionally identical for the purpose of informing countermeasures.
Agents and the process of collection
Economic or industrial espionage commonly occurs in one of two ways. Firstly, a dissatisfied employee appropriates information to advance their own interests or to damage the company or, secondly, a competitor or foreign government seeks information to advance its own technological or financial interest[8] 'Moles' or trusted insiders are generally considered the best sources for economic or industrial espionage.[9] Historically known as a 'patsy,' insiders can be induced, willingly or under duress to provide information. A 'Patsy' may be initially asked to hand over inconsequential information and once compromised by committing a crime, bribed into handing over material which is more sensitive.[10] Individuals may leave one company to take up employment with another and take sensitive information with them.[11] Such apparent behavior has been the focus of numerous industrial espionage cases that have resulted in legal battles.[11] Some countries hire individuals to do spying rather than make use of their own intelligence agencies.[12] Academics, business delegates and students are often thought to be utilized by governments in gathering information.[13] Some countries, such as Japan, have been reported to expect students be debriefed on returning home.[13] A spy may follow a guided tour of a factory then get 'lost'.[10] A spy could be an engineer, a maintenance man, a cleaner, a insurance salesman or an inspector - basically anyone who has legitimate access to the premises.[10]
A spy may break into the premises to steal data. They may search through waste paper and refuse, known as "dumpster diving".[14] Information may be compromised via unsolicited requests for information, marketing surveys or use of technical support, research or software facilities. Outsourced industrial producers may ask for information outside of the agreed-upon contract.[15]
Computers have facilitated the process of collecting information, due to the ease of access to large amounts of information, through physical contact or via the internet.
Use of computers and the Internet
Personal computers
Computers have become key in exercising industrial espionage due to the enormous amount of information they contain and its ease of being copied and transmitted. The use of computers for espionage increased rapidly in the 1990s. Information has been commonly stolen by being copied from unattended computers in offices, those gaining unsupervised access doing so through subsidiary jobs, such as cleaners or repairmen. Laptops were, and still are, a prime target, with those traveling abroad on business being warned not to leave them for any period of time. Perpetrators of espionage have been known to find many ways of conning unsuspecting individuals into parting, often only temporarily, from their possessions, enabling others to access and steal information.[16] A 'bag-op' refers to the use of hotel staff to access data, such as through laptops, in hotel rooms. Information may be stolen in transit, in taxis, at airport baggage counters, baggage carousels, on trains and so on.[14]
The Internet
The rise of the internet and computer networks has expanded the range and detail of information available and the ease of access for the purpose of industrial espionage.[17] Worldwide, around 50,000 companies a day are thought to come under cyberattack with the rate estimated as doubling each year.[18] This type of operation is generally identified as state backed or sponsored, because the 'access to personal, financial or analytic resources' identified exceed that which could be accessed by cybercriminals or individual hackers. Sensitive military or defense engineering or other industrial information may not have immediate monetary value to criminals, compared with, say, bank details. Analysis of cyberattacks suggests deep knowledge of networks, with targeted attacks, obtained by numerous individuals operating in a sustained organized way.[19]
Opportunities for sabotage
The rising use of the internet has also extended opportunities for industrial espionage with the aim of sabotage. In the early 2000s, it was noticed that energy companies were increasingly coming under attack from hackers. Energy power systems, doing jobs like monitoring power grids or water flow, once isolated from the other computer networks, were now being connected to the internet, leaving them more vulnerable, having historically few built-in security features.[20] The use of these methods of industrial espionage have increasingly became a concern for governments, due to potential attacks by terrorist groups or hostile foreign governments.
Malware
One of the means of perpetrators conducting industrial espionage is by exploiting vulnerabilities in computer software. Malware and spyware as 'a tool for industrial espionage,' in 'transmitting digital copies of trade secrets, customer plans, future plans and contacts'. Newer forms of malware include devices which surreptitiously switch on mobile phones camera and recording devices. In attempts to tackle such attacks on their intellectual property, companies are increasingly keeping important information off network, leaving an 'air gap,' with some companies building '"Faraday cages"' to shield from electromagnetic or cellphone transmissions.[21]
Distributed denial of service (DDoS) attack
The distributed denial of service (DDoS) attack uses compromised computer systems to orchestrate a flood of requests on the target system, causing it to shut down and deny service to other users.[22] It could potentially be used for economic or industrial espionage with the purpose of sabotage. This method was allegedly utilized by Russian secret services, over a period of two weeks on a cyberattack on Estonia in May 2007, in response to the removal of a Soviet era war memorial.[23].
History
Origins of industrial espionage
Economic and industrial espionage has a long history. The work of Father Francois Xavier d'Entrecolles in Jingdezhen, China to reveal to Europe the manufacturing methods of Chinese porcelain in 1712 is sometimes considered an early case of industrial espionage[24].
Historical accounts have been written of industrial espionage between Britain and France.[25] Attributed to Britain's emergence as an 'industrial creditor,' the second decade of the 18th century saw the emergence of a large-scale state-sponsored effort to surreptitiously take British industrial technology to France.[25] Witnesses confirmed both the inveigling of tradespersons abroad and the placing of apprentices in England.[26] Protests by those such as iron workers in Sheffield and steel workers in Newcastle[clarification needed], about skilled industrial workers being enticed abroad, led to the first English legislation aimed at preventing this method of economic and industrial espionage.[27][26]
During the Cold War
With Western restrictions on the export of items thought likely to increase military capabilities to the USSR, Soviet industrial espionage was a well known adjunct to other spying activities up until the 1980s.[28]
"Operation Brunnhilde"
Some of these activities were directed via the East German Stasi (Ministry for State Security). One such operation, known as "Operation Brunnhilde" operated from the mid-1950s until early 1966 and made use of spies from many Communist Bloc countries. Through at least 20 forays, many western European industrial secrets were compromised.[29] One member of the "Brunnhilde" ring was a Swiss chemical engineer called Dr Jean Paul Soupert, also known as 'Air Bubble,' living in Brussels. He was described by Peter Wright in Spycatcher as having been 'doubled' by the Belgian Sûreté de l'État.[29][30] He revealed information about industrial espionage conducted by the ring, including the fact that Russian agents had obtained details of Concorde's advanced electronics system.[31] He testified against two Kodak employees, living and working in Britain, during a trial in which they were accused of passing information on industrial processes to him, though they were eventually acquitted.[29]
Soviet spetsinformatsiya system
A secret report from the Military Industrial Commission (VPK), from 1979–80, detailed how spetsinformatsiya could be utilised in twelve different military industrial areas. Writing in the Bulletin of the Atomic Scientists, Philip Hanson detailed a spetsinformatsiya system in which 12 industrial branch ministries formulated requests for information to aid technological development in their military programs. Acquisition plans were described as operating on 2 year and 5 year cycles with about 3000 tasks under way each year. Efforts were aimed at civilian as well as military industrial targets, such as in the petrochemical industries. Some information was garnered so as to compare levels of competitor to Soviet technological advancement. Much unclassified information was also gathered, blurring the boundary with 'competitive intelligence'.[28]
The Soviet military was recognised as making much better use of acquired information, compared to civilian industry, where their record in replicating and developing industrial technology was poor.[28]
The legacy of Cold War espionage
Following the demise of the Soviet Union and the end of the 'Cold War,' commentators, including the US Congressional Intelligence Committee, noted a redirection amongst the espionage community from military to industrial targets, with Western and former communist countries making use of 'underemployed' spies and expanding programs directed at stealing such information.[32][33]
The legacy of 'Cold War' spying included not just the redirection of personnel but the use of spying apparatus such as computer databases, scanners for eavesdropping, spy satellites, bugs and wires.[34]
Notable cases
France and the United States
In 1991 Air France was accused of helping its spy agency garner corporate secrets through installing microphones in its seats. Between 1987 and 1989, IBM and Texas Instruments were also thought to have been targeted by French spies with the intention of helping France's Groupe Bull.[35] In 1993, US aerospace companies were also thought to have been targeted by French interests.[36] During the early 1990s, France was described as one of the most aggressive pursuers of espionage to garner foreign industrial and technological secrets.[35] France accused the U.S. of attempting to sabotage its high tech industrial base.[35] The government of France has been alleged to have conducted ongoing industrial espionage against American aerodynamics and satellite companies.[37]
Volkswagen
In 1993, car manufacturer Opel, the German division of General Motors, accused Volkswagen of industrial espionage after Opel's chief of production, Jose Ignacio Lopez, and seven other executives moved to Volkswagen.[11] Volkswagen subsequently threatened to sue for defamation, resulting in a four-year legal battle.[11] The case, which was finally settled in 1997, resulted in one of the largest settlements in the history of industrial espionage, with Volkswagen agreeing to pay General Motors $100 million and to buy at least $1 billion of car parts from the company over 7 years, although it did not explicitly apologize for Lopez's behavior.[38]
Hilton and Starwood
In April 2009 the US based hospitality company Starwood accused its rival Hilton of a "massive" case of industrial espionage. After being purchased by private equity group Blackstone, Hilton employed 10 managers and executives from Starwood. Under intense pressure to improve profits[clarification needed], Starwood accused Hilton of stealing corporate information relating to its luxury brand concepts, used in setting up its own Denizen hotels. Specifically, former head of its luxury brands group, Ron Klein, was accused of downloading "truckloads of documents" from a laptop to his personal email account.[39]
GhostNet
GhostNet was a 'vast surveillance system' reported by Canadian researchers based at the University of Toronto in March 2009. Using targeted emails it compromised thousands of computers in governmental organisations, enabling attackers to scan for information and transfer this back to a 'digital storage facility in China'.[40]
Google and Operation Aurora
On January 13, 2010, Google Inc. announced that operators, from within China, had hacked into their Google China operation, stealing intellectual property and, in particular, accessing the email accounts of human rights activists.[41][42] The attack was thought to have been part of a more widespread cyber attack on companies within China which has become known as Operation Aurora.[42] Intruders were thought to have launched a zero-day attack, exploiting a weakness in the Microsoft Internet Explorer browser, the malware used being a modification of the trojan Hydraq.[21] Concerned about the possibility of hackers taking advantage of this previously unknown weakness in Internet Explorer, the Government of Germany, then France, issued warnings not to use the browser.[43]
There was speculation that 'insiders' had been involved in the attack, with some Google China employees being denied access to the company's internal networks after the company's announcement.[44][45] In February 2010, computer experts from the U.S. National Security Agency claimed that the attacks on Google probably originated from two Chinese universities associated with expertise in computer science, Shanghai Jiao Tong University and the Shandong Lanxiang Vocational School, the latter having close links to the Chinese military.[40]
Google claimed at least 20 other companies had also been targeted in the cyber attack, said by the London Times, to have been part of an 'ambitious and sophisticated attempt to steal secrets from unwitting corporate victims' including 'defence contractors, finance and technology companies'.[42][41][43] Rather than being the work of individuals or organised criminals, the level of sophistication of the attack was thought to have been 'more typical of a nation state'.[41] Some commentators speculated as to whether the attack was part of what is thought to be a concerted Chinese industrial espionage operation aimed at getting 'high-tech information to jump-start China’s economy'.[46] Critics pointed to what was alleged to be a lax attitude to the intellectual property of foreign businesses in China, letting them operate but then seeking to copy or reverse engineer their technology for the benefit of Chinese 'national champions'.[47] In Google's case, they may have (also) been concerned about the possible misappropriation of source code or other technology for the benefit of Chinese rival Baidu. In March 2010 Google subsequently decided to cease offering censored results in China, leading to the closing of its Chinese operation.
CyberSitter and 'Green Dam'
The US based firm CyberSitter announced in January 2010 that it was suing the Chinese government, and other US companies, for stealing its anti pornography software, with the accusation that it had been incorporated into China's Green Dam program, used by the state to censor Chinese[48] citizens' internet access. CyberSitter accused Green Dam creators as having copied around 3000 lines of code. They were described as having done 'a sloppy job of copying,' with some lines of the copied code continuing to direct people to the CyberSitter website. The attorney acting for CyberSitter maintained “I don't think I have ever seen such clear-cut stealing".[49]
USA v. Lan Lee, et al
The United States charged two former NetLogic Inc. engineers, Lan Lee and Yuefei Ge, of committing economic espionage against TSMC and NetLogic, Inc. A jury acquitted the defendants of the charges with regard to TSMC and deadlocked on the charges with regard to NetLogic. In May 2010, a federal judge dismissed all the espionage charges against the two defendants. The judge ruled that the U.S. Government presented no evidence of espionage[50].
Dongxiao Yue and 'Chordiant Software, Inc'
In May 2010, the federal jury convicted Chordiant Software, Inc., a U.S. corporation, of stealing Dr. Dongxiao Yue's JRPC technologies and used them in a product called 'Chordiant Marketing Director'. Dr. Yue previously filed lawsuits against Symantec corporation for a similar theft [51].
Stuxnet Worm
Stuxnet is a computer worm which affected Iran's Bushehr nuclear power plant in September 2010. Designed to target weaknesses in Siemens electronic industrial systems, it is thought to be capable of seizing control of industrial plants and to be the first 'worm' created for this purpose.[52] The complexity of its design and targeted purpose left Western computer experts suggesting it could only have been the product of a "nation state". (Some security experts suggested Israel[53]; others suggest the United States[54][55]; still others suggest a combined effort of the two[56].) Mahmoud Liayi, from Iran's Ministry of Industries, is quoted as saying, "an electronic war has been launched against Iran". As well as targeting nuclear power stations, it is also capable of attacking systems which manage water supplies, oil rigs and other utilities[57].
According to the British Daily Telegraph a video played at the retirement party of the former Israel Defence Forces (IDF) chief of staff, Gabi Ashkenazi, claimed the worm as one of his "operational successes".[53]
Operation Payback
Distributed Denial of Service (DDoS) attacks were utilised by a network of hackers, led by the self styled group 'Anonymous', in orchestrating what was termed Operation Payback, in December 2010[58]. This was aimed at sabotaging the websites of corporations such as Mastercard, Visa and Paypal, who had stopped Wikileaks donors using their financial services, allegedly under pressure from the United States Government[58]. Thousands of people participating in the attacks did so through downloading the readily available open source LOIC (Low Orbit Ion Cannon) DDoS tool, leading to some commentators to note that, rather than worrying whether their credit card numbers had been hacked, parents should be concerned as to whether their teenage child was an amateur 'hackitivist', possibly 'participating in a co-ordinated global attack on major financial institutions'[59][60]. With Wikileaks founder Julian Assange in Wandsworth prison on charges of sexual assault, the hackers threatened to bring down United Kingdom Government websites, should he be extradited to face charges in Sweden[61]. However, 'Security experts' derided the idea that 'Operation Payback' was in any way comparable to cyber warfare, claiming attacks of this kind were very common, and relatively harmless, only reaching the news in this case due to the association with Wikileaks[58].
Chengdu J-20 stealth fighter jet
When it was unveiled in January 2010, the Chinese engineered Chengdu J-20 stealth fighter jet was speculated by Balkan military officials and other experts as having been reverse engineered from the parts of a US F-117 Nighthawk stealth fighter shot down over Serbia in 1999. It was the first time such an aircraft had been hit. When the US jet was shot down, Chinese officials in the country were reported as having travelled around the region buying up parts of the aircraft from farmers. Representing 'dramatic progress' into cutting edge military technology for the Chinese, the Chengdu J-20 stealth fighter was thought to potentially pose a challenge to US air superiority. President Milosevic was known to have routinely shared captured military technology with Russian and Chinese allies. The Russian Sukhoi T-50 prototype stealth fighter, unveiled in 2010, is likely to have been built from knowledge based on the same source [62].
Chinese commentators contested claims this technology had somehow been stolen. A test pilot claimed that the J-20 was a "masterpiece" of home-grown innovation and that the F-117 technology was "outdated" even at the time it was shot down; although it was reported that one of the wheels of the J-20 actually fell off the aircraft during a demonstration. This raises the question, is this aircraft really a masterpiece? An unnamed Chinese defence official protested to the official English language mouthpiece of the Chinese Communist Party, the Global Times, "It's not the first time foreign media has smeared newly-unveiled Chinese military technologies. It's meaningless to respond to such speculations."[63]
Concerns of Nation States
United States
A recent report to the US Government, by aerospace and defense company Northrop Grumman, describes Chinese economic espionage as comprising 'the single greatest threat to U.S. technology'.[19] Joe Stewart, of SecureWorks, blogging on the 2009 cyber attack on Google, referred to a 'persistent campaign of "espionage-by-malware" emanating from the People’s Republic of China (PRC)' with both corporate and state secrets being 'Shanghaied' over the past 5 or 6 years.[64] The Northrup Grumann report states that the collection of US defense engineering data through cyberattack is regarded as having 'saved the recipient of the information years of R&D and significant amounts of funding'.[19] Concerns about the extent of cyberattacks on the US emanating from China has led to the situation being described as the dawn of a 'new cold cyberwar'.[65]
United Kingdom
In December 2007 it was revealed that Jonathan Evans, head of the United Kingdom's MI5 had sent out confidential letters to 300 chief executives and security chiefs at the country's banks, accountants and legal firms warning of attacks from Chinese 'state organisations'. A summary was also posted on the secure website of the Centre for the Protection of the National Infrastructure, accessed by some of the nation's 'critical infrastructure' companies, including 'telecoms firms, banks and water and electricity companies'.[66] One security expert warned about the use of 'custom trojans,' software specifically designed to hack into a particular firm and feed back data.[67] Whilst China was identified as the country most active in the use of internet spying, up to 120 other countries were said to be using similar techniques.[67] The Chinese government responded to UK accusations of economic espionage by saying that the report of such activities was 'slanderous' and that the government opposed hacking which is prohibited by law.[68]
Germany
German counter-intelligence experts have maintained the German economy is losing around €53 billion or the equivalent of 30'000 jobs to economic espionage yearly. The main perpetrator was thought to be China, though Russia was also considered "top of the list," with a variety of espionage methods being used, from old fashioned spying, phone tapping and stealing laptops, to internet based methods, such as the use of Trojan email attacks. The target of these attacks included not just information about technology but also management techniques and marketing strategies. As well as accessing intellectual property on-line, state sponsored hackers were also considered, by German counter intelligence officer Walter Opfermann, as capable of "sabotaging huge chunks" of infrastructure such as Germany's power grid.[69]
See also
- Business intelligence
- Competitive intelligence
- Cyber spying
- The American Economic Espionage Act of 1996
- Trade secret
References
- ^ Nasheri 2005, p. 10.
- ^ a b Nasheri 2005, p. 73.
- ^ Nasheri 2005, p. 74.
- ^ Walker 1996.
- ^ Nasheri 2005, p. 9.
- ^ Scalet 2003, p. 3.
- ^ Department of Defense 2002.
- ^ Nasheri 2005, p. 7.
- ^ Nasheri 2005, pp. 80-81.
- ^ a b c Palmer 1974, p. 12.
- ^ a b c d Reuters 1996.
- ^ Nasheri 2005, p. 80.
- ^ a b Nasheri 2005, p. 88.
- ^ a b Nasheri 2005, p. 82.
- ^ Nasheri 2005, p. 84.
- ^ Boggon 1996.
- ^ DeWeese et al. 2009.
- ^ Glover 2010.
- ^ a b c DeWeese et al 2009.
- ^ Piller 2002.
- ^ a b Lohr 2010.
- ^ Nasheri 2005, p. 112.
- ^ Anderson 2007.
- ^ a b Rowe & Brook 2009, p. 84.
- ^ a b Harris 1998, p. 7.
- ^ a b Harris 1998, p. 9.
- ^ Harris 1998, p. 8.
- ^ a b c Hanson 1987.
- ^ a b c Palmer 1974, p. 13.
- ^ Wright 1987, p. 183.
- ^ Wright 1987, p. 184.
- ^ Nodoushani & Nodoushani 2002.
- ^ Nasheri 2005, p. 53.
- ^ Nasheri 2005, pp. 53-54.
- ^ a b c New York Times: Paris 1991.
- ^ Jehl 1993.
- ^ http://www.hanford.gov/oci/maindocs/ci_r_docs/frenchesp.pdf
- ^ Meredith 1997.
- ^ Clark 2009.
- ^ a b Markoff & Barboza 2010.
- ^ a b c Harvey 2010.
- ^ a b c Branigan 2010.
- ^ a b Ahmed 2010.
- ^ Beaumont 2010.
- ^ Reuters Shanghai 2010.
- ^ Lawson 2010.
- ^ Rogin 2010.
- ^ Clipston 2010.
- ^ Newman 2010.
- ^ Levine 2010.
- ^ Dongxiau Yue, et al., v. Chordiant Software, Inc. 2010.
- ^ "Iran's Nuclear Agency Trying to Stop Computer Worm". Tehran: Associated Press. 25 September 2010. Archived from the original on 25 September 2010. http://www.webcitation.org/5t1DCvbet. Retrieved 25 September 2010.
- ^ a b Israel video shows Stuxnet as one of its successes
- ^ Reals, Tucker (24 September 2010). "Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes?". CBS News. http://www.cbsnews.com/8301-501465_162-20017507-501465.html.
- ^ Kim Zetter (17 February 2011). "Cyberwar Issues Likely to Be Addressed Only After a Catastrophe". Wired. http://www.wired.com/threatlevel/2011/02/cyberwar-issues-likely-to-be-addressed-only-after-a-catastrophe. Retrieved 18 February 2011.
- ^ Gross, Michael Joseph (April 2011). "A Declaration of Cyber-War". Vanity Fair. Condé Nast. http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104.
- ^ BBC News September 26th 2010.
- ^ a b c Murphy 2010.
- ^ Keiser 2010.
- ^ Kennedy 2010.
- ^ Swinford 2010.
- ^ associated press 2011.
- ^ "China newspaper rejects J-20 stealth jet claim." BBC, 25 January 2011.
- ^ Stewart 2010.
- ^ Blakely December 1, 2007.
- ^ a b Blakely 1st December 2007.
- ^ Blakely December 5, 2007.
- ^ Connolly 2009.
Bibliography
Ahmed, Murad (2010-01-18). "Google cyber-attack from China 'an inside job'". The Times. http://technology.timesonline.co.uk/tol/news/tech_and_web/article6992771.ece. Retrieved 2010-01-22.
Anderson, Nate (2007-05-14). "Massive DDoS attacks target Estonia; Russia accused". Ars Technica. http://arstechnica.com/security/news/2007/05/massive-ddos-attacks-target-estonia-russia-accused.ars. Retrieved 2010-04-05.
Barry, Marc; Penenberg, Adam L (2000). Spooked: Espionage in Corporate America. Cambridge, Massachusetts: Perseus Publishing. pp. 208. ISBN 978-0738205939.
"Chinese stealth fighter jet may use US technology". The Guardian. Associated Press. 2011-01-23. http://www.guardian.co.uk/world/2011/jan/23/china-stealth-fighter-us-technology. Retrieved 2011-01-23.
BBC, News (2010-09-26). "Stuxnet worm hits Iran nuclear plant staff computers". BBC. http://www.bbc.co.uk/news/world-middle-east-11414483. Retrieved 2010-09-27.
Beaumont, Claudine (2010-01-18). "Google China hacks 'a possible inside job'". The Daily Telegraph. http://www.telegraph.co.uk/technology/google/7019536/Google-China-hacks-a-possible-inside-job.html/. Retrieved 2010-01-30.[dead link]
Blakely, Rhys (2007-12-01). "MI5 alert on China’s cyberspace spy threat". The Times. http://business.timesonline.co.uk/tol/business/industry_sectors/technology/article2980250.ece. Retrieved 2010-01-30.
Blakely, Rhys (2007-12-05). "China says it is cyber-espionage victim". The Times. http://business.timesonline.co.uk/tol/business/industry_sectors/technology/article3006792.ece. Retrieved 2010-01-30.
Boggon, Steve (1996-01-01). "The spy who loved me (and my laptop)". The Independent. http://www.independent.co.uk/life-style/the-spy-who-loved-me-and-my-laptop-1321969.html. Retrieved 2010-02-13.
Branigan, Tania (2010-01-13). "Google to end censorship in China over cyber attacks". The Guardian. http://www.guardian.co.uk/technology/2010/jan/12/google-china-ends-censorship. Retrieved 2010-01-22.
Clark, Andrew (2009-04-17). "Starwood sues Hilton for 'stealing trade secrets'". The Guardian. http://www.guardian.co.uk/business/2009/apr/17/industrial-espionage-hotel-industry-lawsuit. Retrieved 2010-02-24.
Connolly, Kate (2009-07-22). "Germany accuses China of industrial espionage". The Guardian. http://www.guardian.co.uk/world/2009/jul/22/germany-china-industrial-espionage. Retrieved 2010-01-18.
DeWeese, Steve; Krekel, Bryan; Bakos, George; Barnet, Christopher (October 9, 2009). Capability of the People's Republic of Conduct Cyber Warfare and Computer Network Exploitation: Prepared for The US-China Economic and Security Review Commission. McLean, Virginia, USA: Northrop Grumman Corporation. http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf.
Dongxiau Yue, et al., v. Chordiant Software, Inc., No. C08-00019 JW U.S. (In the United States District Court for the Northern District of California San Jose Division. 2010-05-14).
Fink, Steven (2002). Sticky Fingers: Managing the Global Risk of Economic Espionage. Chicago: Dearborn Trade. pp. 368. ISBN 978-0793148271.
Fitchett, Joseph (1995-07-19). "French Report Accuses U.S. of Industrial Sabotage Campaign". New York Times. http://www.nytimes.com/1995/07/19/news/19iht-rivals.html?pagewanted=1. Retrieved 2010-02-13.[dead link]
Glover, Tony (2010-01-17). "Chinese hackers blamed for cyber attack wave". This is Money. http://www.thisismoney.co.uk/news/article.html?in_article_id=497698&in_page_id=2&position=moretopstories. Retrieved 2010-01-31.
Guynn, Jessica (2010-01-15). "Chinese hackers pose a growing threat to U.S. firms". Los Angeles Times. http://www.latimes.com/business/la-fi-google-china15-2010jan15,0,7251525.story?page=1&track=rss. Retrieved 2010-01-31.
Hanson, Philip (April 1987), "Soviet industrial espionage", Bulletin of the Atomic Scientists 43 (3): 25–29, http://books.google.co.uk/books?id=qQYAAAAAMBAJ&pg=PA25&lpg=PA25&dq=%22industrial+espionage%22+soviet&source=bl&ots=uAsb3OyMIP&sig=5PI1Gy2FS7v2tCIKpGrFj7xKqd4&hl=en&ei=8FCGS4GDGZSo0QSE9fzvDA&sa=X&oi=book_result&ct=result&resnum=10&ved=0CCgQ6AEwCQ#v=onepage&q=%22industrial%20espionage%22%20soviet&f=false
Harris, John (1998). Industrial Espionage and Technology Transfer: Britain and France in the Eighteenth Century. Aldershot: Ashgate Publishing Limited. pp. 680. ISBN 0754603679.
Harvey, Mike (2010-01-16). "China accused of cyber attack on Google and 'global industrial targets'". The Times. http://technology.timesonline.co.uk/tol/news/tech_and_web/article6990459.ece. Retrieved 2010-01-30.
Helft, Miguel; Markoff, John (2010-01-13). "In Rebuke of China, Focus Falls on Cybersecurity". New York Times. http://www.nytimes.com/2010/01/14/technology/14google.html. Retrieved 2010-01-30.
Javers, Eamon (2010). Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage. New York: Harper Collins Business. pp. 320. ISBN 978-0061697203.
Jehl, Douglas (1993-04-30). "U.S. Expanding Its Effort to Halt Spying by Allies". New York Times. http://www.nytimes.com/1993/04/30/world/us-expanding-its-effort-to-halt-spying-by-allies.html?pagewanted=1. Retrieved 2010-02-13.
Keizer, Gregg (2010-12-09). "Pro-WikiLeaks cyber army gains strength; thousands join DDoS attacks". Computer World. http://www.computerworld.com/s/article/9200659/Pro_WikiLeaks_cyber_army_gains_strength_thousands_join_DDoS_attacks?taxonomyId=82/. Retrieved 2010-12-11.
Kennedy, John (2010-12-10). "Is your kid part of the ‘Operation Payback’ army?". Silicon Republic. http://www.siliconrepublic.com/strategy/item/19593-is-your-kid-part-of-the/. Retrieved 2010-12-11.
Lawson, Dominic (2010-01-17). "Be afraid, China, the Google dragon stirs". The Times. http://www.timesonline.co.uk/tol/comment/columnists/dominic_lawson/article6991018.ece. Retrieved 2010-01-22.
Levine, Dan (2010-05-24). Federal Judge_Trashes Novel Economic Espionage Case "Federal Judge Trashes Novel Economic Espionage Case". Law.com. http://www.law.com/jsp/article.jsp?id=1202458668065&Federal_Judge_Trashes_Novel_Economic_Espionage_Case Federal Judge_Trashes Novel Economic Espionage Case. Retrieved 2010-12-11.
Lawson, Dominic (2010-01-17). "Be afraid, China, the Google dragon stirs". The Times. http://www.timesonline.co.uk/tol/comment/columnists/dominic_lawson/article6991018.ece. Retrieved 2010-01-22.
Lohr, Steve (2010-01-18). "Companies Fight Endless War Against Computer Attacks". New York Times. http://www.nytimes.com/2010/01/18/technology/internet/18defend.html?hpw. Retrieved 2010-01-22.
Markoff, John; Barboza, David (2010-02-18). "2 China Schools Said to Be Tied to Online Attacks". The New York Times. http://www.nytimes.com/2010/02/19/technology/19china.html. Retrieved 2010-04-06.
Macartney, Jan (2010-02-09). "Chinese police arrest six as hacker training website is closed down". The Times. http://www.timesonline.co.uk/tol/news/world/asia/article7019850.ece. Retrieved 2010-02-13.
Meredith, Robyn (1997-01-09). "VW Agrees To Pay G.M. $100 Million in Espionage Suit". New York Times. http://www.nytimes.com/1997/01/10/business/vw-agrees-to-pay-gm-100-million-in-espionage-suit.html?pagewanted=1. Retrieved 2010-02-24.
Murphy, Samantha (2010-12-09). "WikiLeaks Hactivism is Not Cyberwarfare, Experts Say". Tech News Daily. http://www.technewsdaily.com/wikileaks-hacking-not-cyberwarfare-1787/. Retrieved 2010-12-11.
Nasheri, Hedieh (2005). Economic Espionage and Industrial Spying. Cambridge: Cambridge University Press. pp. 270. ISBN 0521543711.
Newman, Alex (2010-01-07). "Communist Pirates Stealing For Censorship?". The John Birch Society. http://www.jbs.org/jbs-news-feed/5821-communist-pirates-stealing-for-censorship/. Retrieved 2010-01-31.
New York Times, Archive (no author) (1991-09-14). "Air France Denies Spying on Travellers". New York Times. http://www.nytimes.com/1991/09/14/news/14iht-spy_.html?pagewanted=1. Retrieved 2010-02-13.[dead link]
Nodoushani, Omid; Nodoushani, Patricia A (April), "Industrial Espionage: The Dark Side of the "Digital Age"", Competitiveness Review: An International Business Journal incorporating Journal of Global Competitiveness 12 (2), http://www.emeraldinsight.com/10.1108/eb046445
Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence) (2002 Fiscal Year). "Annual Polygraph Report to Congress". Department of Defense. http://www.fas.org/sgp/othergov/polygraph/dod-2002.html. Retrieved 2010-04-03.
Palmer, Raymond (1974), "Espionage threat to British industry: Spies don't only operate in books and films. They can be for real. And their target might be your industrial secrets", Industrial Management and Data Systems 74 (7/8)
Piller, Charles (2002-07-08). "Hackers Target Energy Industry". Los Angeles Times. http://articles.latimes.com/2002/jul/08/science/sci-hackers8. Retrieved 2010-02-24.
Pitorri, Peter (2010). Counterespionage for American Business. Chicago: Butterworth-Heinemann Limited. pp. 144. ISBN 978-0750670449.
Reuters (1996-05-12). "Volkswagen Sues GM for $6.6 Million, Accusing U.S. Firm of Defamation". Los Angeles Times. http://articles.latimes.com/1996-05-12/news/mn-3419_1_volkswagen-sues-gm. Retrieved 2010-02-24.
Shanghai, Reuters (2010-01-13). "Google probes possible inside help on China attack". The Globe and Mail. http://www.theglobeandmail.com/report-on-business/google-probes-possible-inside-help-on-china-attack/article1434662/. Retrieved 2010-01-22.
Rogin, Josh (2010-01-14). "China’s expansion of economic espionage boils over". Foreign Policy. http://thecable.foreignpolicy.com/posts/2010/01/13/china_s_expansion_of_economic_espionage_boils_over. Retrieved 2010-04-05.
Rowe, William; Brook, Timothy (2009). China's Last Empire: The Great Qing. Cambridge, Massachusetts: The Belknap Press of Harvard University Press. pp. 368. ISBN 0674036123.
Rustmann, F.W. Jr. (2002). CIA, INC.: Espionage and the Crat of Business Intelligence. Dulles, VA: Potomac Books. pp. 240. ISBN 978-1574885200.
Scalet, Sarah D (May 1, 2003). "Corporate Spying: Snooping, by Hook or by Crook" (web page). CSO Security and Risk. http://www.csoonline.com/article/218034/Corporate_Spying_Snooping_by_Hook_or_by_Crook?page=2%20Corporate%20Spying:%20Snooping,%20By%20Hook%20or%20By%20Crook. Retrieved 2010-03-21.
Stewart, Joe (2010-01-20). "Operation Aurora: Clues in the Code". Secureworks - The information security experts. http://www.secureworks.com/research/blog/index.php/2010/01/20/operation-aurora-clues-in-the-code/. Retrieved 2010-01-23.
Swinford, Steven (2010-12-10). "WikiLeaks hackers threaten British Government". The Daily Telegraph. http://www.telegraph.co.uk/news/worldnews/wikileaks/8193210/WikiLeaks-hackers-threaten-British-Government.html. Retrieved 2010-12-11.
Walker, Nick (1996-01-01). "Marketing: Know your enemy". The Independent. http://www.independent.co.uk/life-style/marketing-know-your-enemy-1526528.html. Retrieved 2010-02-13.
Winker, Ira. (1997). Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It. Darby, PA: Darby, PA. pp. 240. ISBN 978-0788165290.
Wright, Peter (1987). Spycatcher. New York: Viking. pp. 270. ISBN 0521543711.External links
- Directory of Corporate Espionage detectives at ExpertLaw
- Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis.
- Intelligence Online Investigative news and reporting on industrial espionage and business intelligence (subscription and pay-per-article site).
Espionage Agent handling · Asset · Black operation · Black bag operation · Concealment device · Cryptography · Cut-out · Dead drop · Eavesdropping · False flag · Industrial espionage · Intelligence assessment · Interrogation · Numbers station · One-way voice link · Official cover · Non-official cover · Resident spy · Steganography · SurveillanceIntelligence cycle management Intelligence
collection
managementHuman
Intelligence
(HUMINT)Clandestine HUMINT (recruiting · operational techniques · Covert action · Direct action · Clandestine cell system)
Special reconnaissance (organizations)
Espionage (Agent handling · Asset · Black operation · Black bag operation · Concealment device · Cryptography · Cut-out · Dead drop · Eavesdropping · False flag · Industrial espionage · Intelligence assessment · Interrogation · Numbers station · One-way voice link · Official cover · Non-official cover · Resident spy · Steganography · Surveillance)Signals
Intelligence
(SIGINT)Measurement
and Signature
Intelligence
(MASINT)Others Open source intelligence (OSINT) · Imagery intelligence (IMINT) · Geospatial intelligence (GEOINT) · /Financial intelligence (FININT) · Technical intelligence (TECHINT) · Market Intelligence (MARKINT)Intelligence
analysis
managementIntelligence
dissemination
managementCategories:- Cyberwarfare
- Types of espionage
- Corporate crime
- Business ethics
- Trade secrets
Wikimedia Foundation. 2010.