Economic and industrial espionage at the start of the 21st century – Status quaestionis

Authors

  • Klaus Solberg Søilen Halmstad University Author

DOI:

https://doi.org/10.37380/jisib.v6i3.196

Keywords:

Economic espionage, hacking, industrial espionage, literature review, signal intelligence

Abstract

This article is a literature review where the aim is to define a status quaestionis for the field of economic and industrial espionage. History shows how those who engage in these activities often are the scientifically and industrially weaker party, the party that is learning or trying to catch up. On a global scale economic and industrial espionage can be seen as a form of involuntarily sharing that has a series of positive results for economic development. On the scale of the individual businesses attacked, and for tax authorities in those countries, it is a troublesome phenomenon that must be regulated and punished. Governments must prepare society for systematic and frequent cyberattacks. Private companies are wise to move to stricter security controls, which must include encryption. A number of specific research projects are suggested throughout the article. In the literature we have identified the following agent motives: the employee who needs money, has split loyalties, leaves angry, the occasional thieve and the professional spy.

References

Andrijcic, E. & Horowitz, B. (2006). A macroeconomic framework for evaluation of cyber security risks related to protection of intellectual property. Risk analysis. Volume: 26, Issue: 4. Pages: 907-923.

Anonymous (2007). Lawyers warn of increased risk of industrial espionage. Professional engineering. Volume: 20, Issue: 12. Pages: 10.

Anonymous (2002). Industrial espionage attempt thwarted by sting operation. Computers & security. Volume: 21, Issue: 3. Pages: 202.

Bergier, J. (1975). Secret armies: The growth of corporate and industrial espionage. Indianapolis: Bobbs-Merrill.

Bachman, D. (2014) Chinese Industrial Espionage: Technology Acquisition and Military Modernization. China quarterly. Volume: 219, Pages: 874-875.

Barrachina, A., Tauman, Y.; Urbano, A. (2014). Entry and espionage with noisy signals. Games and economic behavior Volume: 83 Pages: 127-146

Baum, J. A. C., Li. S. X., Usher, J.M. (2000). Making the next move: how experiential and vicarious learning shape the locations of chains’ acquisitions. Administrative Science Quarterly, 45(4), pp. 766-801.

Bapuji, H., Crossan, M. (2004). From questions to answers: reviewing organizational learning research. Management Learning, 35(4): 397-417.

Bergier, J. (1977). Vieux comme l’homme: L’espionage industriel. Historia (368), pp. 84-95.

Cotte. M. (2005). De l’espionnage industriel à la veille technologique. Belfort-Montbéliard: Presses Universaires de France Comté.

Cipolla, M. (1993). Before the industrial revolution: European Society and Economy 1000-1700. New York: Norton

Condon, R. (2007). We've been expecting you, Mr Bond. Infosecurity, 4 (7), pp. 26-27.

Corera, G. (2015). Intercept – The secret history of computers and spies. London: Weidenfeld & Nicolson.

Crane, A. (2005). In the company of spies: When competitive intelligence gathering becomes industrial espionage. Business Horizons, 48 (3), pp. 233-240.

De Camp, L. S. (1974). The ancient engineers. London: Ballantine.

Ferdinand, J. & Simm, D. (2007). Re-theorizing external learning - Insights from economic and industrial espionage. Conference: 1st Interntional Conference on Organizational Learning, Knowledge and Capabilities Location: Warwick Univ, Warwick, England.

Fialka, J. (1997). War by other means: economic espionage in america. New York, N.Y.: W. W. Norton.

Gaidelys, V., Valodkiene, G. (2011). The methods of selecting and assessing potential consumers used of by competitive intelligence. Engineering Economics, 22 (2), pp. 196-202.

Gillispie, C. C. (2006). From industrial espionage to the old technology. Technology and culture, Volume: 47, Issue: 4. Pages:839-840.

Greve, H. (1998). Performance, aspirations, and risky organizational change. Administrative Science Quarterly, 43: pp. 58-86.

Hamon, V. (2015). Android botnets for multitargeted attacks. Journal in computer virology and hacking techniques, Volume: 11, Issue: 4. Pages: 193-202.

Harrer, J., Wald, A. (2016). Levers of enterprise security control: a study on the use, measurement and value contribution. Journal of Management Control, 27 (1), pp. 7-32.

Heickero, R. (2015). Industrial Espionage and Theft of Information. Conference: 14th European Conference on Cyber Warfare and Security (ECCWS) Location: Univ Hertfordshire, Hatfield, England.

Hvistendahl, M. (2016). Industrial espionage 3d printers vulnerable to spying. Science, Volume: 352, Issue: 6282. Pages: 132-133.

Jameson, D.A. (2011). The rhetoric of industrial espionage: The case of Starwood V. Hilton. Business Communication Quarterly, 74 (3), pp. 289-297.

Jerrard, M. (2015). The G & K O'Connor lockout (1999) and its aftermath: A case study of a union avoidance campaign in the Australian meat processing industry. Labour History, 109 (1), pp. 131-148.

Kraatz, M. S. (1998). Learning by association? Interorganizational networks and adaptation to environmental change. Academy of Management Journal, 41(6), pp. 621-643.

Lee, C-M. (2015). Criminal profiling and industrial security. Multimedia tools and applications, 74, 5. 1689-1696.

Mendell, R. L. (2003). The quiet threat: fighting industrial espionage in America. Springfield, Ill.: Charles C. Thomas.

Mietzner, M., Schiereck, D., Schweizer, D. (2015). The role of sovereign wealth funds as activist or passive fund managers. Journal of Asset Management, 16 (5), pp. 303-315.

Nasheri, H. (2005). Economic espionage and industrial spying. Cambridge: Cambridge University Press.

Nickisch, C. (2016). Defend your research industrial espionage is more effective than r&d. Harvard Business Review, Volume: 91, Issue: 11. Pages: 30-31

Nyhan, B., & Reifler, J. (2015). The effect of factchecking on elites: A field experiment on U.S. state legislators: the effect of fact-checking on elites. American Journal of Political Science, 59(3), pp. 628-640.

Polanyi, M. (1967). The tacit dimension. New York: Anchor Books.

Reisch, M. (2011). Industrial espionage Former Dow scientist admits to theft of trade secrets. Chemical & engineering news, Volume: 89, Issue: 39. Pages: 7-7

Reisman, A. (2006). A taxonomic view of illegal transfer of technologies: A case study. Journal of Engineering and Technology Management -JET-M, 23 (4), pp. 292-312.

Schofield, J. (2016). Chinese Industrial Espionage: Technology Acquisition and Military Modernisation. Canadian journal of political science-revue canadienne de science politique, Volume: 49, Issue: 1. Pages: 182-183

Schultz, E. (2001). Security views. Journal of computers and security, Vol. 21, Iss 1, pp. 201-211.

Shorrock, T. (2016). A New Spy Scandal Exposes the Corruption of Privatized Intelligence. The Nation. October 14. At https://www.thenation.com/article/a-new-spyscandal-exposes-the-corruption-of-privatizedintelligence/

Silverman, C. (2012). A new age for truth. Nieman Reports, 66(2), 4.

Sinha, S. (2012). Understanding industrial espionage for greater technological and economic security. IEEE Potentials, 31 (3), art. no. 6193307, pp. 37-41.

Smith, A.D. (2007). Strategic aspects of electronic document encryption. International Journal of Services and Standards, 3 (2), pp. 203-221.

Solberg Søilen, K. (2016). A research agenda for intelligence studies in business. Journal of Intelligence Studies in Business, 6(1), pp. 21-36.

Solberg Søilen, K. (2005). Wirtschaftsspionage in Verhandlungen aus informationsökonomischer und wirtschaftsethischer Perspektive – Eine interdisziplinäre Analyse. Doctoral Thesis , 341 Pages. Full text at http://www.divaportal.org/smash/get/diva2:534515/FULLTEXT01.pdf

Sivansan, G. (2011). The human factor in espionage. Computer Fraud & Security, 2011 (2), 15-16.

Stadler, W.A. (2012). The quiet threat: Fighting industrial espionage in America. Security journal, 25, 1, 90-93.

Thorleuchter, D. & Van den Poel, D. (2013). Protecting research and technology from espionage. Expert systems with applications, Volume: 40, Issue: 9. Pages: 3432-3440.

Vashisth, A., Kumar, A. (2013). Corporate espionage: The insider threat. Business Information Review, 30 (2), pp. 83-90.

West, N. (2015). Chinese industrial espionage: Technology Acquisition and Military Modernization. Asian Security Studies. Pacific affairs, Volume: 88, Issue: 1. Pages: 178-180.

Downloads

Published

2016-12-30

How to Cite

Solberg Søilen, K. (2016). Economic and industrial espionage at the start of the 21st century – Status quaestionis. Journal of Intelligence Studies in Business, 6(3), 51-64. https://doi.org/10.37380/jisib.v6i3.196