The Scale and Impact of Industrial Espionage and Theft of Trade Secrets Through Cyber

Total Page:16

File Type:pdf, Size:1020Kb

The Scale and Impact of Industrial Espionage and Theft of Trade Secrets Through Cyber The scale and impact of industrial espionage and theft of trade secrets through cyber Written by PricewaterhouseCoopers December – 2018 The scale and impact of industrial espionage and theft of trade secrets through cyber EUROPEAN COMMISSION Directorate-General for Internal Market, Industry, Entrepreneurship and SMEs Directorate F — Innovation and Advanced Manufacturing Unit GROW-F.5 — Intellectual property and Fight against Counterfeiting Contact: Jorge NOVAIS GONCALVES E-mail: [email protected] European Commission B-1049 Brussels 2 The scale and impact of industrial espionage and theft of trade secrets through cyber Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). LEGAL NOTICE This document has been prepared for the European Commission however it reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein. More information on the European Union is available on the Internet (http://www.europa.eu). Luxembourg: Publications Office of the European Union, 2018 ISBN 978-92-79-77355-6 doi: 10.2873/48055 © European Union, 2018 Reproduction is authorised provided the source is acknowledged. Printed in Belgium Image(s) © artist's name + image #, Year. Source: Fotolia.com (unless otherwise specified) 4 The scale and impact of industrial espionage and theft of trade secrets through cyber Table of contents 1. EXECUTIVE SUMMARY ........................................................................................ 7 2. INTRODUCTION AND SCOPE OF THE STUDY ...................................................... 10 3. METHODOLOGY FOR THE PREPARATION OF THE STUDY .................................... 13 3.1. Desk Research .......................................................................................... 13 3.2. Interviews ................................................................................................ 13 3.3. Online Questionnaire ................................................................................ 14 3.4. Workshop “Industrial Espionage In A Digital World” ............................... 14 3.5. Aggregation of Results Obtained .............................................................. 14 4. LITERATURE REVIEW ON CYBER THEFT OF TRADE SECRETS .............................. 15 5. STAKEHOLDER CONSULTATION ......................................................................... 19 6. KEY FINDINGS OF THE STUDY ........................................................................... 22 6.1. State of the Threat ................................................................................... 22 6.1.1. Threat and Trends. Current Risks and Growing Concern........................... 22 6.1.2. The (In)ability to Detect Cyber Intrusions and Lack of Awareness........... 24 6.1.3. Impact on Companies and Organisations ................................................. 26 6.1.4. How Targeting Changes from One Company to Another: Sector, Size and Country .............................................................................................. 29 6.1.5. Cyber Theft in the SME Environment ........................................................ 32 6.2. Prevention, Mitigation and Reporting ....................................................... 35 6.2.1. Risk Management and Adoption of a Multi-disciplinary Approach to Develop Cyber Theft of Trade Secrets Frameworks .................................. 35 6.2.2. Investments to Prevent Cyber Theft of Trade Secrets .............................. 39 6.2.3. Awareness and Training ........................................................................... 41 6.2.4. The EU Policy Background and its Coordination Action ............................. 42 6.2.5. Law Enforcement ..................................................................................... 47 6.2.6. Incident Reporting Schemes .................................................................... 48 7. RECOMMENDATIONS TO ADDRESS THE CHALLENGE .......................................... 52 8. CONCLUSIONS ................................................................................................... 57 ANNEX A: METHODOLOGY FOR THE PREPARATION OF THE REPORT ......................... 60 Revision of the Literature Review and the Stakeholder Consultation ................. 60 Integration of the Stakeholder Consultation ..................................................... 61 Refinement and integration of recommendations to address the challenge ....... 63 Preparation of the Event and the Dissemination Report .................................... 63 ANNEX B: CASE STUDY PROTOCOL ............................................................................ 65 ANNEX C: CASE STUDIES IDENTIFIED ....................................................................... 67 ANNEX D: SURVEY QUESTIONNAIRE ......................................................................... 71 ANNEX E: WORKSHOP REPORT – INDUSTRIAL ESPIONAGE IN A DIGITAL WORLD .......................................................................................................................... 93 ANNEX F: THE DIRECTIVE ON SECURITY OF NETWORK AND INFORMATION SYSTEMS (NIS DIRECTIVE) ............................................................................. 109 ANNEX G: THE EUROPEAN UNION AGENCY FOR NETWORK AND INFORMATION SECURITY (ENISA) .......................................................................................... 111 ANNEX H: THE US STRATEGY IN PREVENTING AND MITIGATING CYBER THEFT OF TRADE SECRETS.......................................................................................... 112 ANNEX I: COMPREHENSIVE BIBLIOGRAPHY ........................................................... 115 5 The scale and impact of industrial espionage and theft of trade secrets through cyber List of Acronyms APT Advanced Persistent Threat CEO Chief Executive Officer CERT Computer Emergency Response Team CIO Chief Information Officer CISO Chief Information and Security Officer CSIRT Computer Security Incidents Response Team CTO Chief Technology Officer CYSPA (European) Cyber Security Protection Alliance DoD Department of Defense (United States) EC European Commission EDA European Union Defence Agency ENISA European Union Agency for Network and Information Security EOS European Organisation for Security EU European Union EUROPOL EC3 European Union Agency for Law Enforcement Cooperation, European Cybercrime Centre FSB Federation of Small Businesses GDPR General Data Protection Regulation ICT Information and Communication Technology IFSR International Financial Reporting Standards IP/IPRs Intellectual Property/Intellectual Property Rights ISAC Information Sharing Analysis Centre ISO International Organization for Standardization IT Information Technology LEA Law Enforcement Agency NCSC National Cyber Security Centre (UK) NIS (directive) Directive on the security of Network Information Systems NIST National Institute of Standards and Technology PoC Point of Contact PPP Public Private Partnership R&D Research and Development SME Small and Medium Enterprise 6 The scale and impact of industrial espionage and theft of trade secrets through cyber 1. EXECUTIVE SUMMARY The past decade has seen rapid development in the field of information technology and a digital revolution that has provided unprecedented benefits to the European society and economy, facilitating trade and the provision of services, creating new opportunities for businesses and boosting productivity and economic gain. While a better-connected world offers new opportunities, there are also new risks. This study focusses on investigating the impact on European businesses and organisations of a specific type of cyber incident, namely cyber theft of trade secrets. Information represents a pivotal economic asset for businesses, which rely on confidentiality of data as a key for their industrial progress, crucial for the development of their innovation process and their economic growth. The study is based on an extensive literature review complemented by stakeholder engagement, namely through an online survey, interviews with key stakeholders and a workshop organised in cooperation with the services of the European Commission (EC) in Brussels on 4th October 2018. Industrial espionage is a method employed throughout history. Europe is particularly vulnerable to this threat. Because of its first class industrial and academic research and development (R&D), Europe attracts interest from emerging countries and competitors. The Tilburg University confirmed this trend in 2015, estimating that “20% of European companies suffered a breach”.1 The study demonstrates that European businesses are particularly exposed to this kind of threat, because of their advanced know-how and production development. In fact, national businesses in Italy (36%), France (24%), Germany (20%) and The Netherlands (17%) topped the list as the Europeans who fear cyber espionage the most.2 Among these countries, the analysis reveals that German companies are most affected with 17% of them declaring sensitive data stolen between 2015 and 2017. Sectors with distinctive industrial expertise are targeted more often, such as luxury manufacturing in Italy or finance in the UK. At European Union (EU) level, manufacturing, information and
Recommended publications
  • Intelligence Services Roles and Responsibilities in Good Security Sector Governance
    SSR BACKGROUNDER Intelligence Services Roles and responsibilities in good security sector governance About this series The SSR Backgrounders provide concise introductions to topics and concepts in good security sector governance (SSG) and security sector reform (SSR). The series summarizes current debates, explains key terms and exposes central tensions based on a broad range of international experiences. The SSR Backgrounders do not promote specific models, policies or proposals for good governance or reform but do provide further resources that will allow readers to extend their knowledge on each topic. The SSR Backgrounders are a resource for security governance and reform stakeholders seeking to understand but also to critically assess current approaches to good SSG and SSR. About this SSR Backgrounder This SSR Backgrounder explains the roles and responsibilities of intelligence services in good security sector governance (SSG). Intelligence services perform an essential security function by providing governments with timely and relevant information necessary to protect the security of states and their societies. Applying the principles of good SSG to intelligence services makes them both effective and accountable within a framework of democratic governance, the rule of law and respect for human rights. This SSR Backgrounder answers the following questions: What are intelligence services? Page 2 What do intelligence services do? Page 2 How is intelligence produced? Page 4 What intrusive legal powers do intelligence services hold?
    [Show full text]
  • Commercial and Industrial Cyber Espionage in Israel
    Commercial and Industrial Cyber Espionage in Israel Shahar Argaman and Gabi Siboni Cyberspace is especially suited to the theft of business information and to espionage. The accessibility of information, along with the ability to remain anonymous and cover one’s tracks, allows various entities to engage in the theft of valuable information, an act that can cause major damage. Israel, rich in advanced technology and a leader in innovation-based industries that rely on unique intellectual property, is a prime target for cyber theft and commercial cyber attacks. This article examines the scope of cyber theft and cyber industrial espionage globally, and attempts to estimate how much !nancial damage they cause in countries around the world and in Israel. It seeks to raise awareness of the extent of the phenomena among the relevant authorities in Israel and provide recommendations on how to grapple with it. Keywords : Cyber, espionage, industrial espionage, intellectual property, cyber crime, cyber theft, technology “There are two types of companies: companies that have been breached and companies that don’t know they’ve been breached…. The vast majority of companies have been breached.” 1 Shawn Henry The director of the National Security Agency, Gen. Keith Alexander, called cybercrime “the greatest transfer of wealth in history.” The price tag for intellectual property theft from U.S. companies is at least $250 billion a year .2 Shahar Argaman is the director of the National Cyber Sta!. Col. (ret.) Dr. Gabi Siboni is the head of the Military and Strategic A!airs Program and Cyber Security Program at INSS. Military and Strategic Affairs | Volume 6 | No.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Testimony of James C
    September 15, 2005 “Chinese Information Operations Strategies in a Taiwan Contingency” Testimony of James C. Mulvenon, Ph.D. Director, Advanced Studies and Analysis DGI Center for Intelligence Research and Analysis Before the U.S.-China Economic and Security Review Commission Hearing “China’s Military Modernization and the Cross-Strait Balance” INTRODUCTION Thank you, Mr. Chairman and the other members of the U.S.-China Economic and Security Review Commission for the opportunity to take part in the hearings you are holding today on the topic of In the minds of the Chinese leadership, the available evidence suggests that the most important political-military challenge and the most likely flashpoint for Sino-US conflict is Taiwan. In seeking to reunify the island with the mainland, however, it is important to note that the PRC has a political strategy with a military component, not a military strategy with a political component. The PRC would prefer to win without fighting, since Beijing's worst case outcome is a failed operation that would result in de facto independence for Taiwan. Also, the leadership realizes that attacking Taiwan with kinetic weapons will result in significant international opprobrium and make the native population ungovernable. These assumptions explain why China until recently maintained a "wait and see" attitude towards Taiwan, even though the island elected a President from a party committed previously to independence. From 2000 until late 2003, China eschewed saber-rattling in favor of economic enticement and “united front” cooperation with the Pan-Blue opposition, both of which were believed to be working successfully. In November 2003, in response to perceived provocations by Taiwan President Chen Shui-bian, Beijing once again revived the threat of military force to deter what it saw as further slippage towards independence, dramatically increasing tensions in the U.S., China, Taiwan triangle.
    [Show full text]
  • Foreign Economic Espionage in Cyberspace 2018
    Foreign Economic Espionage in Cyberspace 2018 NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER Contents Executive Summary • 1 Scope Note • 2 I. The Strategic Threat of Cyber Economic Espionage • 4 II. Threats from Foreign Countries • 5 China: Persistent Cyber Activities • 5 Russia: A Sophisticated Adversary • 8 Iran: An Increasing Cyber Threat • 9 Targeted Technologies • 11 III. Emerging Threats • 12 Software Supply Chain Operations • 13 Foreign Laws Could Enable Intellectual Property Theft • 13 Foreign Technology Companies With Links to Host Governments • 14 Annex – Decreasing the Prevalence of Economic or Industrial Espionage in Cyberspace • 15 Executive Summary In the 2011 report to Congress on Foreign Spies Stealing U.S. Economic Secrets in Cyberspace, the Office of the National Counterintelligence Executive provided a baseline assessment of the many dangers facing the U.S. research, development, and manufacturing sectors when operating in cyberspace, the pervasive threats posed by foreign intelligence services and other threat actors, and the industries and technologies most likely at risk of espionage. The 2018 report provides additional insight into the most pervasive nation-state threats, and it includes a detailed breakout of the industrial sectors and technologies judged to be of highest interest to threat actors. It also discusses several potentially disruptive threat trends that warrant close attention. This report focuses on the following issues Foreign economic and industrial espionage against the United States continues to represent a significant threat to America’s prosperity, security, and competitive advantage. Cyberspace remains a preferred operational domain for a wide range of industrial espionage threat actors, from adversarial nation- states, to commercial enterprises operating under state influence, to sponsored activities conducted by proxy hacker groups.
    [Show full text]
  • Ausa Background Brief (
    AUSA BACKGROUND BRIEF ( No. 42 April 1992 SPECIAL OPERATIONS FORCES: A PRIMER Introduction A small but critical portion of the Total Force is made up of the special operations forces (SOF) of the Army, Navy and Air Force, which are comprised of special operations, psychological operations and civil affairs organizations. Special operations forces are task organized to conduct contingency operations. Special operations forces are designed to augment theater-based forces and, in response to a crisis situation, normally operate with an appropriate mix of conventional forces under theater control. ( Almost all SOF missions require joint planning; also, they are used for missions with allied or coalition forces as well as for a number of ongoing ground missions in many countries. U.S. Special Operations Command The joint nature ofSOF operations was recognized in the establishment of a permanent unified command, the U.S. Special Operations Command (USSOCOM). The USSOCOM commander-in­ chief commands all active and reserve Special Operations, Psychological Operations and Civil Affairs forces of the Army, Navy and Air Force (about 47,000 personnel). USSOCOM supports other unified commands responsible for crisis responses in their respective geographic areas of responsibility. The U.S. Special Operations Command is composed of four subordinate commands: U.S. Army Special Operations Command, Naval Special Warfare Command, Air Force Special Opera­ tions Command and Joint Special Operations Command. U.S. Army Special Operations Command (USASOC), headquartered at Fort Bragg, North Carolina, is composed of active component and reserve component Army forces consisting of Special Forces groups, a Ranger regiment, Psychological Operations groups, a Special Operations Aviation regiment, Civil Affairs commands, and special operations signal and support units.
    [Show full text]
  • Surveillance and Counter Surveillance December 1, 2009 STRATFOR Global Information Services
    Surveillance and Counter surveillance December 1, 2009 STRATFOR Global Information Services STRATFOR Global Information Services publishes intelligence, analysis and research for professionals in government, corporations and research institutions. For more than a decade, this information has helped customers monitor, track and manage political risk and instability around the world. STRATFOR Global Information Services delivers information in three ways: via password protected websites, customized information and data feeds and customized briefings and presentations. More than 1 million professionals rely upon this information at organizations that range from The U.S. Air Force to Yale University to The Federal Reserve Bank of Atlanta and others. STRATFOR Global Information Services 700 Lavaca Street, Suite 900 Austin, TX 78701 Tel: 1-512-279-9462 www.stratfor.com Electronic delivery Reports are also available online by subscribing at www.stratfor. com. Copyright © 2009 STRATFOR. All Rights Reserved. Neither this publication nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of STRATFOR. All information in this report is verified to the best of the author’s and the publisher’s ability. However, STRATFOR does not accept responsibility for any loss arising from reliance on it. To learn more please contact Patrick Boykin, Vice President, by calling 1-512-279-9462. Surveillance and Counter Surveillance
    [Show full text]
  • Society for Ethnomusicology 58Th Annual Meeting Abstracts
    Society for Ethnomusicology 58th Annual Meeting Abstracts Sounding Against Nuclear Power in Post-Tsunami Japan examine the musical and cultural features that mark their music as both Marie Abe, Boston University distinctively Jewish and distinctively American. I relate this relatively new development in Jewish liturgical music to women’s entry into the cantorate, In April 2011-one month after the devastating M9.0 earthquake, tsunami, and and I argue that the opening of this clergy position and the explosion of new subsequent crises at the Fukushima nuclear power plant in northeast Japan, music for the female voice represent the choice of American Jews to engage an antinuclear demonstration took over the streets of Tokyo. The crowd was fully with their dual civic and religious identity. unprecedented in its size and diversity; its 15 000 participants-a number unseen since 1968-ranged from mothers concerned with radiation risks on Walking to Tsuglagkhang: Exploring the Function of a Tibetan their children's health to environmentalists and unemployed youths. Leading Soundscape in Northern India the protest was the raucous sound of chindon-ya, a Japanese practice of Danielle Adomaitis, independent scholar musical advertisement. Dating back to the late 1800s, chindon-ya are musical troupes that publicize an employer's business by marching through the From the main square in McLeod Ganj (upper Dharamsala, H.P., India), streets. How did this erstwhile commercial practice become a sonic marker of Temple Road leads to one main attraction: Tsuglagkhang, the home the 14th a mass social movement in spring 2011? When the public display of merriment Dalai Lama.
    [Show full text]
  • Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action
    ARTICLE Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action Andru E. Wall* Abstract Modern warfare requires close integration of military and intelligence forces. The Secretary of Defense possesses authorities under Title 10 and Title 50 and is best suited to lead US government operations against external unconventional and cyber threats. Titles 10 and 50 create mutually supporting, not mutually exclusive, authorities. Operations conducted under military command and control pursuant to a Secretary of Defense-issued execute order are military operations and not intelligence activities. Attempts by congressional overseers to redefine military preparatory operations as intelligence activities are legally and historically unsupportable. Congress should revise its antiquated oversight structure to reflect our integrated and interconnected world. I. Introduction After being hunted for nearly ten years, Osama Bin Laden was shot and killed by U.S. Navy SEALs in the early hours of May 2, 2011. The identity of the elite special operations unit that conducted the raid on bin Laden's compound in Pakistan was not immediately released, as the * Senior Associate with Alston & Bird LLP; former senior legal advisor for U.S. Special Operations Command Central (2007 to 2009). While this article was cleared for publication as required by my security clearance and nondisclosure agreements, the views expressed herein are my own and do not necessarily reflect the position of the U.S. government or Department of Defense. I thank Harvard Law School for its generous support of this paper andJack Goldsmith, Hagan Scotten., Mark Grdovic, Nick Dotti, Chris Costa, Michael Bahar, and Lenn Ferrer for their invaluable comments and suggestions.
    [Show full text]
  • Espionage and Intelligence Gathering Other Books in the Current Controversies Series
    Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher.
    [Show full text]
  • Criminal Intelligence: Manual for Managers
    Vienna International Centre, PO Box 500, 1400 Vienna, Austria Tel.: (+43-1) 26060-0, Fax: (+43-1) 26060-5866, www.unodc.org Criminal Intelligence Manual for Managers United Nations publication Printed in Austria *1058434*V.10-58434—March 2011—100 UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Criminal Intelligence Manual for Managers United nations n ew York, 2011 © United Nations, March 2011. All rights reserved. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. This publication has not been formally edited. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Contents 1. An introduction to intelligence . 1 2. The intelligence process . ............................................... 9 3. Example of a national intelligence model: the United Kingdom . 17 4. Evaluation of source and data . 25 5. Analysis and analytical process . ......................................... 29 6. Types of analysis . 35 7. Security and the intelligence process . 39 8. Management of the intelligence unit. ..................................... 51 9. Standards and guidelines . 61 Annex. Evaluations . ................................................... 69 References . .......................................................... 79 iii
    [Show full text]
  • Cyber-Espionage: a Growing Threat to the American Economy
    Cyber-Espionage: A Growing Threat to the American Economy Gerald O'Harat "It's the great irony of our Information Age-the very technologies that empower us to create and to build also empower those who would disrupt and destroy. "' I. INTRODUCTION The American economy is currently the world's largest and most advanced. 2 It is this status that allows the United States to remain among the most power- ful and influential countries in the world. However, the country's economy is at risk of marginalization in a way that many policymakers could not have en- visioned just a decade ago. The potential result threatens not only the economic standing of the United States in the global economy, but its national security as well. Although threats of economic and industrial espionage have long ex- isted,' the international proliferation of the Internet makes cyber economic and J.D. 2010, The Catholic University of America, Columbus School of Law. The author would like to thank Ed Schellhom and Jenny Childs for their thoughtful suggestions throughout the writing process, as well as the editors and staff of the COMMLAW CONSPEC- TUS for all of their hard work in preparing Volume 19. 1 President Barack Obama, Remarks by the President on Securing Our Nation's Cyber Infrastructure (May 29, 2009), available at http://www.whitehouse.gov/thepress-office/Remarks-by-the-President-on-Securing-Our- Nations-Cyber-Infrastructure/. 2 The World Factbook, CENT. INTELLIGENCE AGENCY, http://www.cia.gov/library/publications/the-world-factbook/geos/us.html (follow "Econ- omy" hyperlink) (last visited Jan.
    [Show full text]