Industrial Espionage Research Paper

2302 Words5 Pages

Abstract U.S. Companies lose an estimated $500 billion in raw innovations each year due to industrial espionage. These raw innovations include research and development, trade secrets and the products that enable U.S. companies their competitive edge. Industrial espionage typically capitalizes on simple and very avoidable vulnerabilities that produce incredible results. The counter espionage market is relatively small and businesses often do not employ a counter espionage program. Businesses can incorporate a counter espionage program, which could significantly discourage adversaries to attempting to steal their raw innovations and trade secrets. This paper will discuss the importance of incorporating counter espionage programs and how it can …show more content…

The Economic Espionage Act of 1996, Title 18, UCS 1831 defines it as the theft of trade secrets or economic espionage is a federal criminal offense (FBI, Title 18 UCS 1831). A trade secret can provide a competitive edge to the competitors, has the potential to make money, is a secret, and is something you want to keep confidential and not known to your competitors(FBI, Title 18 UCS 1831). The US Economic Espionage Act of 1996 passed into law to help provide legal guidelines that would help prosecute those taking part in industrial espionage and who those who stole trade secrets that could benefit any foreign entities. The Economic Espionage Act also helps organizations to get financial reimbursement for any financial losses they might suffer as result of industrial espionage (FBI, Title 18 UCS 1831). Economic Espionage Act of …show more content…

One of the first steps in developing an effective counterespionage program is to conduct a risk assessment of the organizations trade secrets or sensitive information. Daniel Benny states that when determining the risk, there will be a need to examine the information that is to be protected; what the value of the information is, define would want it; determine how accessible it is; and the impact on the organization should such information be illegally obtained through industrial espionage (Benny, page 51). When the risk assessment shows what the risk and threat are, a trusted person in the organization will need to determine the information they want to protect. Daniel Benny illustrates Threat: risk of threat = severity of threat x probability of occurrence (Benny, page

More about Industrial Espionage Research Paper

Open Document