Industrial Espionage from AFIO's the INTELLIGENCER

Industrial Espionage from AFIO's the INTELLIGENCER

Association of Former Intelligence Officers 7700 Leesburg Pike, Suite 324 From AFIO's The Intelligencer Falls Church, Virginia 22043 Journal of U.S. Intelligence Studies Web: www.afio.com, E-mail: [email protected] • A trained foreign agent, who had been in the Volume 22 • Number 1 • $15 single copy price Spring 2016 ©2016, AFIO United States for more than 20 years and had become a citizen, suddenly was “activated” by his controllers in Asia and given a “shopping list” of technical information to obtain, and then proceeded to steal massive amounts of technical information from his company on the next generation of nuclear submarines being constructed for the US Navy. GUIDE TO THE STUDY OF INTELLIGENCE • An employee working for a large US manufac- turing company decided to strike out and form his own company, but first stole all of the nec- essary technical information to manufacture competing high-technology products. • A country that is an enemy (or “strategic com- petitor”) to the United States sent a number of Industrial Espionage “illegals” into various companies to systemat- ically report on all technical developments and strategies of the targeted US companies. by Edward M. Roche, PhD, JD • A major hotel chain vice president decided that he was not being paid enough and took all of No information I received was the result of spying. the records regarding the development of a Everything was given to me in casual conversations new hotel concept to a competitor, where he got without coercion. better pay and a substantial promotion. 1 — Richard Sorge, interrogation at Sugamo Prison. Some persons argue that there is little harm from These are many variations on the same theme: industrial espionage because “technology inevitably the theft of secret or proprietary information, usu- leaks out anyway.” ally for commercial purposes. The word “industrial” 2 — Count Alexandre de Marenches in “industrial espionage” has a specific reference to manufacturing companies, but in actuality, services ndustrial espionage comes in many forms as illus- industries (banking, hotels, R&D) are lucrative targets trated from the following case studies: as well. Thus, the term “industrial” is an artifact. I• The head of an adhesives company’s research Some industrial espionage is done by individuals and development (R&D), a naturalized US cit- out of greed, but other industrial espionage is done by izen, became involved with the daughter of a organizations or even by governments. In most cases, Taiwanese industrialist, and eventually started there is a large financial component to industrial to supply the Taiwanese company with all the R&D technical information from his American espionage, since at heart it is an operation involving company, resulting in competing imports at a business secrets and commercial gain. But there also much lower cost. are instances where industrial espionage is driven by • An American with close ties to a Middle East the strategic competition (economic and military) country provided to them information on gov- between nation states. ernment contracts and technical information, There is an important distinction between clas- which allowed companies there to develop new sical and industrial espionage. Industrial espionage products ahead of the US companies from which is a sub-set of espionage, but also has sui generis the original technical information was stolen. aspects; the term “espionage” refers to the taking • A secretary in a major soft drink manufacturer of government secrets. Classical espionage would in Atlanta, Georgia, got involved with an ex-con include stealing the US’ negotiating position at the and was induced to steal product samples and next Doha Trade round, or any information regarding technical details for the next new soft drink troop movements, or the design of a stealth aircraft, product, and an attempt was made to sell this or a sample of the surface paint or metallurgy of a information to a competitor. stealth aircraft. In the United States, the 1996 Economic Espio- 1. Soviet spy in Tokyo before World War II, who warned Stalin of Oper- ation Barbarosa, Hitler’s intent to invade the USSR. nage Act divides industrial espionage into two classes: 2. Former director of France’s external intelligence service. Spring 2016 Intelligencer: Journal of U.S. Intelligence Studies Page 59 Table 1. Characteristics of Classical Espionage and Industrial Espionage3 Classical Espionage Industrial Espionage Private Sector Information Government Information Defense and Intelligence Non-Government Business Contractors Tangible Equipment Sample; Designs Technology; Operations Manuals Business Strategy Intangible Negotiating Position Plans; Software (Pricing; negotiations; alliances; (Intentions; Plans) (Trade talks; Arms control) new products, R&D, etc.) (1) industrial espionage committed against a corpo- workers filed technical reports to Moscow. The pro- ration by anyone other than a foreign entity, and (2) gram was expanded to include communist sympathiz- industrial espionage committed by a foreign entity. ers working in factories throughout the West. The penalties are more severe for industrial espionage “Engineers and experts of Russian war industries carried out by foreign entities. Unfortunately, there back home were asking a host of technical questions. have been relatively few successful prosecutions under The lists of questions from Russia were turned over the 1996 Act.3 by military intelligence headquarters to the military Industrial espionage has a long history because, attachés, who had them translated at the embassies.” in a broader sense, it is part of the story of international These were then rewritten and distributed to technology diffusion. agents. p 34. For details on the worker correspondent movement.5 Unlike many types of espionage, these “corre- American Industrial Espionage spondents” worked on a voluntary basis for ideological In 1782, a young man named Samuel Slater was reasons. As the West opened up more to the Soviet working in an English cotton mill. He memorized Union, it became easier to conduct industrial espio- as much as he could about textile machinery, and nage through organizations such as trade delegations. then took his knowledge to the United States. At the This type of state-supported system of international time, England had strict laws against exporting such industrial espionage persisted until the fall of the information. Soviet Union. Industrial espionage for science and Francis Cabot Lowell travelled to England in technology was operated under the KGB First Chief 1810, and learned enough so that, upon returning to Directorate Directorate T. “Since 1970, Line X had the United States, he was able to set up a power loom obtained thousands of documents and sample prod- that could turn raw cotton into finished cloth.4 ucts, in such quantity that it appeared that the Soviet military and civil sectors were in large measure run- ning their research on that of the West, particularly The Soviet Union’s Industrial Espionage the United States. Our science was supporting their During the Stalin era (1922–1953), primarily national defense. Losses were in radar, computers, prior to the World War II, the USSR operated a system machine tools, and semiconductors. Line X had of international industrial espionage targeting pri- fulfilled two-thirds to three-fourths of its collection marily Western Europe, but also the United States requirements – an impressive performance.”6 and Japan. Known as rabochy korrespondenti (рабочие Individuals become involved in industrial espio- корреспонденты, “people’s correspondents”), these nage for a variety of reasons: • Resentment: General Motors employee Shanshan 3. Note that espionage against “Defense and Intelligence Contrac- tors,” can be classified as either industrial espionage or as a type of Du became dissatisfied with his employer and classical espionage. Historically, classical espionage targeted only decided to start his own business using GM governments, and corporate contractors to the government were not trade secrets. He teamed with Yu Qin to create a included since contractors are private enterprises. Any theft of their technology or trade secrets is certainly a type of industrial espionage. In reality, espionage against defense and intelligence contractors can be called either classical espionage or industrial espionage. 5. The work of the “people’s correspondents” is detailed in David 4. For the astounding growth of United States manufacturing during Dallin’s book Soviet Espionage (New Haven: Yale University Press, this period, see Engerman & Sokoloff, “Technology and Industrializa- 1955), 50-51. tion, 1790 – 1914” in The Cambridge Economic History of the United States, 6. Gus W. Weiss, “The Farewell Dossier,” Studies in Intelligence, Washing- Vols. 1 & 2 (Cambridge: Cambridge University Press, 1996, 2000). ton, DC: Central Intelligence Agency, 39 (5), 1996. Page 60 Intelligencer: Journal of U.S. Intelligence Studies Spring 2016 company to manufacture advanced batteries for is insufficient, and the situation was seen as crucial. hybrid cars using GM proprietary information.7 For example, when General Motors learned that a • Greed: In France, to make extra money on the competitor had purchased property to construct a side, three executives were investigated for very large factory, but did not know for what purpose, selling the economic model of the Renault car it set up a “spy center” to determine what its compet- 8 to foreign interests rumored

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us