Insider Espionage 1703468440
Insider Espionage 1703468440
Insider Espionage 1703468440
INSIDER ESPIONAGE
U.S. VULNERABILITY TRENDS
AND FEDERAL STATUTES
No part of this digital document may be reproduced, stored in a retrieval system or transmitted in any form or
by any means. The publisher has taken reasonable care in the preparation of this digital document, but makes no
expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No
liability is assumed for incidental or consequential damages in connection with or arising out of information
contained herein. This digital document is sold with the clear understanding that the publisher is not engaged in
rendering legal, medical or any other professional services.
INTELLIGENCE AND
COUNTERINTELLIGENCE STUDIES
INSIDER ESPIONAGE
U.S. VULNERABILITY TRENDS
AND FEDERAL STATUTES
HANA PARISH
EDITOR
New York
Copyright © 2014 by Nova Science Publishers, Inc.
All rights reserved. No part of this book may be reproduced, stored in a retrieval system or
transmitted in any form or by any means: electronic, electrostatic, magnetic, tape,
mechanical photocopying, recording or otherwise without the written permission of the
Publisher.
For permission to use material from this book please contact us:
Telephone 631-231-7269; Fax 631-231-8175
Web Site: http://www.novapublishers.com
This publication is designed to provide accurate and authoritative information with regard
to the subject matter covered herein. It is sold with the clear understanding that the
Publisher is not engaged in rendering legal or any other professional services. If legal or any
other expert assistance is required, the services of a competent person should be sought.
FROM A DECLARATION OF PARTICIPANTS JOINTLY ADOPTED BY A
COMMITTEE OF THE AMERICAN BAR ASSOCIATION AND A COMMITTEE OF
PUBLISHERS.
Additional color graphics may be available in the e-book version of this book.
Preface vii
Chapter 1 Technological, Social, and Economic Trends That
Are Increasing U.S. Vulnerability to Insider
Espionage 1
Lisa A. Kramer, Richards J. Heuer, Jr.
and Kent S. Crawford
Chapter 2 Stealing Trade Secrets and Economic Espionage:
An Overview of 18 U.S.C. 1831 and 1832 45
Charles Doyle
Index 67
PREFACE
This book explores ten technological, social, and economic trends in the
United States and globally that are serving to increase opportunity and
motivation for espionage. Findings suggest that American ―insiders‖ have an
unprecedented level of access to classified and proprietary information due to
technological advances in information storage and retrieval. American
employees have greater opportunity to establish contact with foreign entities
and to transfer information to them through traveling internationally more
often and by participating in international research and business ventures more
frequently. Internet use is expanding globally and computer-users are
becoming more culturally and linguistically diverse. The Internet can now be
used to transmit massive amounts of digitized information to multiple foreign
parties simultaneously. Finally, the market for U.S. information is expanding.
American insiders can sell more types of information to a broader range of
foreign buyers than ever before. In addition to these new opportunities for
espionage, American employees are more often encountering situations that
can provide motivation for this crime. More insiders are experiencing financial
problems and gambling addiction, both of which can provide impetus for
workplace theft. Loyalty to organizations is diminishing and a greater
proportion of American workers are at risk for becoming disgruntled. A
growing number of insiders have emotional and financial ties to other
countries. Under some circumstances, insiders with loyalties to other peoples
may be less inclined to view espionage as morally wrong. It is possible that
some insiders with a global orientation to world affairs will view espionage as
morally justifiable if they feel that sharing information will benefit the ―world
community‖ or prevent armed conflict. This book discusses the United States'
vulnerability and federal statutes on insider espionage.
viii Hana Parish
Maximum fines for both individuals and organizations may be higher when
the amount of the gain or loss associated with the offense is substantial. Any
attempt or conspiracy to commit either offense carries the same penalties as
the underlying crime. Offenders must also be ordered to pay restitution.
Moreover, property derived from the offense or used to facilitate its
commission is subject to confiscation. The sections reach violations occurring
overseas, if the offender is a United States national or if an act in furtherance
of the crime is committed within the United States.
Depending on the circumstances, misconduct captured in the two sections
may be prosecuted under other federal statutes as well. A defendant charged
with stealing trade secrets is often indictable under the Computer Fraud and
Abuse Act, the National Stolen Property Act, and/or the federal wire fraud
statute. One indicted on economic espionage charges may often be charged
with acting as an unregistered foreign agent and on occasion with disclosing
classified information or under the general espionage statutes.
P.L. 112-269 set the maximum fines described above. It also instructed the
United States Sentencing Commission to examine the sufficiency of federal
sentencing guidelines and policies in the area of stealing trade secrets and
economic espionage. P.L. 112-236 amended the trade secrets prohibition of 18
U.S.C. 1832 to overcome the implications of the Court of Appeals‘ Aleynikov
decision. That decision held that the section did not outlaw the theft of
computer code designed to facilitate a company‘s commercial transactions,
because the code did not relate to a product to be placed in the stream of
commerce.
In: Insider Espionage ISBN: 978-1-61728-226-3
Editor: Hana Parish © 2014 Nova Science Publishers, Inc.
Chapter 1
ABSTRACT
This study explores ten technological, social, and economic trends in the United States
and globally that are serving to increase opportunity and motivation for espionage. Findings
suggest that American ―insiders‖ have an unprecedented level of access to classified and
proprietary information due to technological advances in information storage and retrieval.
American employees have greater opportunity to establish contact with foreign entities and
to transfer information to them through traveling internationally more often and by
participating in international research and business ventures more frequently. Internet use is
expanding globally and computer-users are becoming more culturally and linguistically
diverse. The Internet can now be used to transmit massive amounts of digitized information
to multiple foreign parties simultaneously. Finally, the market for U.S. information is
expanding. American insiders can sell more types of information to a broader range of
foreign buyers than ever before. In addition to these new opportunities for espionage,
American employees are more often encountering situations that can provide motivation for
this crime. More insiders are experiencing financial problems and gambling addiction, both
of which can provide impetus for workplace theft. Loyalty to organizations is diminishing
*
This is an edited, reformatted and augmented version of Technical Report 05-10, issued by The
Defense Personnel and Security Research Center (PERSEREC), dated May 2005.
2 Lisa A. Kramer, Richards J. Heuer, Jr. and Kent S. Crawford
and a greater proportion of American workers are at risk for becoming disgruntled. A
growing number of insiders have emotional and financial ties to other countries. Under
some circumstances, insiders with loyalties to other peoples may be less inclined to view
espionage as morally wrong. It is possible that some insiders with a global orientation to
world affairs will view espionage as morally justifiable if they feel that sharing information
will benefit the ―world community‖ or prevent armed conflict.
INTRODUCTION
Most open-source literature that explores the phenomenon of insider
espionage consists of journalistic accounts, biographical works, case studies of
individual spies, and memoirs of intelligence officer defectors. As an
organization responsible for systematic research on personnel security,
PERSEREC occasionally applies social science methods to the study of
espionage. We recently published Espionage Against the United States by
American Citizens: 1947-2001, a documentation of statistical analyses
conducted with a large unclassified dataset of espionage cases. PERSEREC
researchers have published an anthology of significant studies of insider
espionage entitled Citizen Espionage: Studies in Trust and Betrayal, and a
comprehensive literature review entitled Temperament Constructs Related to
Betrayal of Trust. Soon, PERSEREC will publish Counterintelligence
Reporting Essentials, a guide to identifying behaviors in the workplace that are
of counterintelligence concern and which should be reported by coworkers and
supervisors.
Building upon findings of previous research, the current study explores
insider espionage from an especially broad perspective by examining factors
that are relevant to prevalence of espionage. Rather than analyzing
psychological factors that influence an individual‘s decision to spy, this study
examines situational factors that affect the frequency with which insider
espionage will occur. The technological, social, and economic trends explored
in this study suggest that greater numbers of American employees have
opportunity to commit espionage and are more often encountering situations
that may motivate them to commit this crime.
The factors explored in this study are relevant to espionage involving the
theft of classified as well as proprietary information, and pertain primarily to
the illicit transfer of material to foreign rather than domestic recipients.
Because this study presents data gathered from open sources, this report is
unclassified. It is our hope that this publicly available document will be of
Technological, Social, and Economic Trends … 3
value to those who are interested in U.S. vulnerability to insider espionage, but
who do not have access to classified espionage research.
James. A. Riedel
Director
EXECUTIVE SUMMARY
Permanent and temporary employees, vendors, contractors, suppliers, ex-
employees, and other types of ―insiders‖ are among those who are most
capable of exploiting organizational assets at greatest expense to U.S.
interests. Due to their knowledge of the public agencies and private companies
that employ them, their familiarity with computer systems that contain
classified and proprietary information, and their awareness of the value of
protected information in the global market, insiders constitute a significant
area of vulnerability for national security.
Using a methodology similar to that employed in epidemiological studies
where scientists explain or forecast changes in prevalence of certain diseases,
this study examines prevalence of insider espionage. The medical researcher
knows that heart disease is associated with age, weight, amount of exercise,
blood pressure, diet, stress, genetics, and other factors, and can thus predict
changes in the pervasiveness of heart disease by analyzing changes in these
variables. Similarly, because we know that opportunity and motivation come
together to create the crime of espionage, we can forecast changes in the
prevalence of insider espionage by analyzing trends that influence opportunity
and motivation for spying. As the medical researcher can identify higher risk
groups but cannot predict which specific individuals will develop heart
disease, we can make observations regarding U.S. vulnerability to insider
espionage but cannot predict exactly which insiders will engage in this crime.
Findings of this study suggest that the information revolution, global
economic competition, the evolvement of new and nontraditional intelligence
adversaries, and other changes in the domestic and international environment
have converged to create unusually fertile ground for insider espionage.
Primary findings of this research are as follows:
encounter in their personal and professional lives. Lessons learned from the
post-World War II history of espionage illustrate the fact that not all insiders
who are reliable and trustworthy at the time they are granted a position of
trust, will remain so. For this reason, American organizations must protect
intellectual assets by reducing opportunity for information theft. Findings of
this study suggest that American organizations within government and
industry must better control access to, and track the use of, digitized
proprietary and classified files.
INTRODUCTION
Permanent and temporary employees, vendors, contractors, suppliers, ex-
employees, and other types of ―insiders‖ are among those who are most
capable of exploiting organizational assets at greatest expense to U.S.
interests. Due to their knowledge of the public agencies and private companies
that employ them, their familiarity with computer systems that contain
classified and proprietary information, and their awareness of the value of
protected information in the global market, insiders constitute a significant
area of vulnerability for national security (Fialka, 1997; Freeh, 1996; Nockels,
2001; Shaw, Ruby, & Post, 1998; Thurman, 1999; Venzke, 2002). An
estimated 2.4 million insiders have access to classified information currently,
and while difficult to approximate, insiders with access to proprietary and
sensitive technological information are likely to number in the tens of millions
(National Security Institute, June 2002). While the deliberate compromise of
classified or proprietary information to foreign entities is a relatively rare
crime, even one case of insider espionage can cause extraordinary damage to
national security.
Because espionage is a secret activity, we cannot know how many
undiscovered spies are currently active in American organizations, or what the
future will bring in terms of discovered espionage cases. Nevertheless, we are
not entirely in the dark when assessing the magnitude of the insider espionage
threat. We can draw inferences from relevant changes in technology, society,
and the international environment that affect opportunity and motivation for
spying.
Technological, Social, and Economic Trends … 7
Approach
2004, however, arrivals to the United States from overseas destinations are
expected to reach 20.3 million by the end of 2004. While not shown, arrivals
to the United States are projected to reach 20.7 million in 2005, 22.0 million in
2006, and 23.4 million in 2007 (Office of Travel and Tourism Industries,
2004a; 2004b; R. Erdmann, personal communication, January 24, 2005).
Office of Travel and Tourism Industries (2004a; 2004b) and R. Erdmann (personal
communication, January 24, 2005).
Internet Expansion
The annual Domain Survey, one of the longest running measurements of
the Internet‘s size, documents a rapid rise in the number of Internet hosts
worldwide. (An Internet host is a computer connected to the Internet.) In the
year 2000, this study identified 72 million Internet hosts globally. Internet
hosts numbered 110 million by 2001, 147 million in 2002, 172 million in
2003, and 233 million in 2004 (Figure 3). Some analysts project that by the
year 2010, 95 percent of the population of the industrialized world, and half
the population of the developing world, will be online (Cetron & Davies,
2001). Within the American workplace, the proportion of employees using the
Technological, Social, and Economic Trends … 19
Internet and/or email grew from about 18 percent in 1998 to almost 42 percent
in 2001 (U.S. Department of Commerce, 2002).
currently has around 23 million Internet users. Latin American Internet use is
also experiencing high growth. Users in the region are expected to increase
from 26 million to over 30 million by 2003. Middle East Internet use is at 4.2
million—up from 1.9 million in the year 2000. Israel has about 1.3 million
Internet users; nearly 90 percent of Israeli homes have personal computers
(Internet Software Consortium, 2002).
& Wiskoff, 1991; Timm, 1991). While most insiders possess personal qualities
that are not conducive to committing espionage (or any serious crime for that
matter), some insiders with access to classified and proprietary files become
motivated to commit espionage when they encounter the right conditions in
their personal and professional lives. Insiders commit espionage to satisfy
needs and desires and to alleviate problems. Situations that can provide
motivation for espionage include the experiencing of financial crisis or the
development of a gambling addiction.
Other factors explored here that can result in motivation for spying are
emotional and financial ties to foreign countries, perceived mistreatment by
one‘s employer, and feelings of obligation or loyalty to a foreign country or to
a global community.
Consumer Debt
Comparisons of research findings over time (findings of the Consumer
Bankruptcy Project I, the Consumer Bankruptcy Project II, and the Ohio
Bankruptcy Study) by Sullivan et al. (2000) show that credit card debt plays a
significant role in creating financial instability for Americans. Whereas in
1981 the average debtor filing for bankruptcy owed about 18 percent of his or
her yearly income in credit card loans, in 1991 the average debtor in
bankruptcy had accumulated the equivalent of nearly half a year‘s take-home
income in credit card balances. By 1997, the average debtor filing for
Technological, Social, and Economic Trends … 23
bankruptcy was estimated to have revolving credit card debt equivalent to $77
for every $100 of annual income (Sullivan et al., 2000, p. 124-126).
Consumer credit increased by 5 percent in May 2003, to 1.76 trillion, and
total American household credit now stands at 110 percent of annual
disposable income—up from 76 percent in 1986 (Dobbs, 2003, p. 36).
Lending to individuals with poor credit histories or who are already burdened
with debt (e.g., ―sub-prime‖ lending) has become one of the most profitable,
and hence one of the most rapidly growing segments of the consumer lending
industry (Sullivan et. al., 2000).
adolescents have a gambling problem and that 2.2 million adolescents are
pathological gamblers (Shaffer, 1999).
Number of Percent
Type of Clearance Clearance Naturalized Or Naturalized or
Holder Holders Derived Citizens Derived Citizens
SCI 34,642 716 .2
Top Secret 110,395 119 .01
Secret 413,982 516 .01
Confidential 25,832 35 .01
Total 584,851 1,386 .02
less interested in adopting American values and customs. More immigrants are
coming to the U.S. for economic advantages rather than for political or
ideological reasons (Yang, 1994). An increasing percentage of immigrants
choose not to become American citizens, and more of those who do obtain
U.S. citizenship, maintain citizenship elsewhere (Massey, 1995; Renshon,
2001). Between 1970 and 2000 the naturalized citizen foreign-born population
in the United States increased by 71 percent. During this same period, the
noncitizen foreign-born population in the United States increased by 401
percent (Schmidley, 2001).
or to persons who are not citizens of the United States, the impact that
globalization will have on national allegiance is not well understood.
a
There are other factors that provide opportunity and motivation for insider espionage
that are not explored in this study or included in this diagram.
Figure 6. Technological, Social, and Economic Trends that are Increasing U.S.
Vulnerability to Insider Espionagea.
34 Lisa A. Kramer, Richards J. Heuer, Jr. and Kent S. Crawford
It is not possible to describe all the ways the factors outlined in this study
(Figure 6) may converge with one other, and other variables not discussed
here, to create opportunity and motivation for spying. The fact that the
vulnerabilities created by these trends are compounding one another does
suggest, however, that we are at greater risk for experiencing insider espionage
than in previous decades. Throughout our research we did not identify a single
countervailing trend that will make insider espionage more difficult or less
likely in the immediate future.
easier for insiders to remove large quantities of information with less risk of
being caught. The relative ease with which information can now be stolen may
serve to increase an individual‘s confidence that they will be able to commit
espionage without being detected.
Policies have recently been enacted to encourage increased sharing of
national security information within agencies and among agencies, and
between federal, state and local government agencies for homeland security
purposes (U.S. Senate, S. 1025, Sec. 334, 2003). While there are many
benefits to the increased availability of information, with this increased
availability comes greater risk of compromise. Congress rightly recognizes
that increased information sharing will succeed only with revised security
policies and the employment of technologies to reduce the insider threat to
classified computer networks (U.S. Senate 108–44, 2003). Results of this
study support the need for security policies that will result in improved control
of digitized files and more effective monitoring and tracking of insiders‘ use of
digitized information.
Information security policies and practices must reflect a risk-management
paradigm in which the benefits of information availability and sharing are
weighed against the risks. The advantages associated with granting thousands
of insiders access to databases that are foreign espionage targets must be
weighed against the potential costs to national security if information
contained within these databases is compromised. Because personnel security
measures will never be capable of guaranteeing the continued reliability and
trustworthiness of all cleared personnel, employees‘ ability to exploit multiple
databases—especially those they do not need access to perform their work—
must be curtailed.
REFERENCES
Ambrose, M.L., Seabright, M.A., & Schminke, M. (2002). Sabotage in the
workplace: The role of organizational justice. Organizational Behavior
and Human Decision Processes, 89, 947–965.
American Bankruptcy Institute. (2002). U.S. bankruptcy filings 1980-2001
business, non-business, total. Retrieved August 12, 2002, from
http://www.abiworld. org/stats/newstatsfront.html
American Psychiatric Association. (1992). Diagnostic and statistical manual
of mental disorders, Fourth Ed. Washington, DC: Author.
Technological, Social, and Economic Trends … 37
Hundley, R.O., Anderson, R.H., Bikson, T.K., Dewar, J.A., Green, J., Libicki,
M., & Neu, D.R. (2000). The global course of the information revolution:
Political, economic, and social consequences. Santa Monica, CA: Rand.
Internet Software Consortium. (2002) The domain survey. Retrieved June 15,
2002, from http://www.isc.org
Iwata, E. (2003, February 13). More U.S. trade secrets walk out the door with
foreign spies. USA Today, 18.
Jacobs, D. (2000). Juvenile gambling in North America: An analysis of long-
term trends and future prospects. Journal of Gambling Studies, 16, 119–-
151.
Kipp, S. (2001). Espionage and the insider. San Francisco, CA: SANS
Institute.
Kurtz, H. (1987, February 11). Pollard letter asserts ―obligation‖ to spy:
Abandonment by Israel is lamented. The Washington Post, B6.
Ladouceur, R., Dube, D., & Bujold, A. (1994). Prevalence of pathological
gambling and related problems among college students in the Quebec
Metropolitan Area. Canadian Journal of Psychiatry, 39, 289–293.
Massey, D. (1995). The new immigration and ethnicity in the United States.
Population and Development Review, 21, 631–652.
Meyer, G., & Stadler, M. (1999). Criminal behavior associated with
pathological gambling. Journal of Gambling Studies, 15, 29–43.
Morris, J., & Sherman, J. (1981). Generalizability of an attitudinal
commitment model. Academy of Management Journal, 24, 512–526.
Moule, G. (1996). A study of security countermeasures to reduce economic
espionage in the United States from 1975 to 1996. Retrieved August 8,
2002, from http://www. spybusters.com
Mossberg, W.S. (2003, November 12). A road test of ‗keychain‘ drives. The
Wall Street Journal, D4.
Mowday, R., Porter, L., & Steers, R. (1982). Employee-organizational
linkages: The psychology of commitment, absenteeism, and turnover. New
York: Academic Press.
Nadel, R. (2002). Pair from Cupertino and San Jose, California, indicted for
economic espionage and theft of trade secrets from Silicon Valley
companies. Retrieved June 12, 2002, from http://www.cybercrime.gov
/yeIndict.htm
National Opinion Research Center. (1999). Gambling impact and behavior
study. Report to the National Gambling Impact Study Commission.
Washington, DC: Author.
40 Lisa A. Kramer, Richards J. Heuer, Jr. and Kent S. Crawford
Whitelaw, K., & Enrich, D. (2001). Surfing for secrets. U.S. News and World
Report, 131, 20.
Wise, D. (1995). The Ames spy hunt. Time, 145, 54-60.
Yang, P.Q. (1994). Explaining immigrant naturalization. Immigrant
Naturalization Review, 28, 449-477.
Zacharia, J. (2000, December). A time to forgive? The Jerusalem Post, 7B.
In: Insider Espionage ISBN: 978-1-61728-226-3
Editor: Hana Parish © 2014 Nova Science Publishers, Inc.
Chapter 2
Charles Doyle
SUMMARY
Stealing a trade secret is a federal crime when the information relates
to a product in interstate or foreign commerce, 18 U.S.C. 1832 (theft of
trade secrets), or when the intended beneficiary is a foreign power, 18
U.S.C. 1831 (economic espionage). Section 1832 requires that the thief
be aware that the misappropriation will injure the secret‘s owner to the
benefit of someone else. Section 1831 requires only that the thief intend
to benefit a foreign government or one of its instrumentalities.
Section 1832 (theft) violations are punishable by imprisonment for
not more than 10 years, or a fine of not more than $250,000 (not more
than $5 million for organizations), or both. Section 1831 (espionage)
violations by individuals are punishable by imprisonment for not more
than 15 years, or a fine of the greater of not more than $5 million, or both.
Section 1831 violations by organizations are punishable by a fine of not
more than the greater of $10 million or three times the value of the stolen
This is an edited, reformatted and augmented version of a Congressional Research Service
publication, CRS Report for Congress R42681, from www.crs.gov, prepared for Members
and Committees of Congress, dated January 28, 2013.
46 Charles Doyle
trade secret. Maximum fines for both individuals and organizations may
be higher when the amount of the gain or loss associated with the offense
is substantial. Any attempt or conspiracy to commit either offense carries
the same penalties as the underlying crime. Offenders must also be
ordered to pay restitution. Moreover, property derived from the offense or
used to facilitate its commission is subject to confiscation. The sections
reach violations occurring overseas, if the offender is a United States
national or if an act in furtherance of the crime is committed within the
United States.
Depending on the circumstances, misconduct captured in the two
sections may be prosecuted under other federal statutes as well. A
defendant charged with stealing trade secrets is often indictable under the
Computer Fraud and Abuse Act, the National Stolen Property Act, and/or
the federal wire fraud statute. One indicted on economic espionage
charges may often be charged with acting as an unregistered foreign
agent and on occasion with disclosing classified information or under the
general espionage statutes.
P.L. 112-269 set the maximum fines described above. It also
instructed the United States Sentencing Commission to examine the
sufficiency of federal sentencing guidelines and policies in the area of
stealing trade secrets and economic espionage. P.L. 112-236 amended the
trade secrets prohibition of 18 U.S.C. 1832 to overcome the implications
of the Court of Appeals‘ Aleynikov decision. That decision held that the
section did not outlaw the theft of computer code designed to facilitate a
company‘s commercial transactions, because the code did not relate to a
product to be placed in the stream of commerce.
INTRODUCTION
The Economic Espionage Act (EEA) outlaws two forms of trade secret
theft: theft for the benefit of a foreign entity (economic espionage) and theft
for pecuniary gain (theft of trade secrets).1 Under either proscription, its reach
extends to theft from electronic storage.2 Offenders face imprisonment for not
more than 10 years in the case of trade secret theft and not more than 15 years
in the case of economic espionage.3 Individuals may incur fines of not more
than the greater of $250,000 or twice the loss or gain associated with the
offense for trade secret theft and for economic espionage not more than the
greater of $5 million or twice the loss or gain.4 Organizations are fined more
severely, up to the greater of $5 million or twice the gain or loss for trade
secret theft, and for economic espionage up to a fine of the greater of $10
Stealing Trade Secrets and Economic Espionage 47
million, three times the value of the trade secret, or twice the gain or loss
associated with the offense.5
A court may assess the same sanctions for attempt or conspiracy to
commit either offense.6 A sentencing court must order the defendants to pay
victim restitution, and the government may confiscate any property that is
derived from or used to facilitate either offense.7 The government may seek to
enjoin violations, but the EEA creates no explicit private cause of action.8
Conduct that violates the EEA‘s proscriptions may also violate other federal
prohibitions, however. Some, like the Computer Fraud and Abuse Act, in
addition to imposing criminal penalties, do authorize victims to sue for
damages and other forms of relief under some circumstances.9
The trade secrets prohibition is the more complicated of the EAA‘s two
criminal offenses. It condemns:
I.
(1) Whoever
(2) with intent to convert
(3) a trade secret
(4) related to
(5) a product or service
(6) (a) used in or
(b) intended for use in
(7) (a) interstate commerce or
(b) foreign commerce
(8) to the economic benefit of anyone other than the owner thereof
(9) (a) intending or
(b) knowing
(10)that the offense will injure the owner of that trade secret
(11)knowingly
(12) (a) steals, without authorization appropriates, takes, carries away,
conceals, or by fraud, artifice, or deception obtains such information,
(b)without authorization copies, duplicates, sketches, draws,
photographs, downloads, uploads, alters, destroys, photocopies, replicates,
48 Charles Doyle
Substantive Offense
Whoever
The term ―whoever‖ encompasses both individuals and organizations.
Thus, individuals and organizations may be guilty of the theft of trade secrets.
Subsection 1832(b) confirms this intent by establishing a special fine for
―organizations‖ who commit the offense. For purposes of the federal criminal
code, an ―organization‖ is any ―person other than an individual.‖11 The
Dictionary Act supplies examples of the type of entities that may qualify as
―persons‖—―the words ‗person‘ and ‗whoever‘ include corporations,
companies, associations, firms, partnerships, societies, and joint stock
companies, as well as individuals.‖12
Trade Secret
An EEA trade secret is any information that ―(A) the owner thereof has
taken reasonable measures to keep such information secret; and (B) ... derives
independent economic value, actual or potential, from not being generally
known to, and not being readily ascertainable through proper means by, the
public.‖14 An owner for these purposes is one ―in whom or in which rightful
legal or equitable title to, or license in, the trade secret is reposed.‖15
Whether an owner has taken reasonable measures to ensure the secrecy of
his trade information will depend upon the circumstances of the case. Such
measures would ordinarily include limiting access to the information and
notifying employees of its confidential nature.16 Inclusion within the definition
of ―trade secret‖ of the instruction that the owner take ―reasonable measures‖
to secure the confidentiality of the information does not render the statute
unconstitutionally vague as applied to a defendant whose conduct clearly falls
with the statute‘s proscription.17
Construction of the ―known or readily ascertainable‖ element of the
secrecy definition is more perplexing. On its face, the EEA suggests that
information is secret if it unknown or undiscoverable by the general public,
even if it might be known or discoverable within the industry in which the
information is relevant. Congress, however, may have intended a more narrow
interpretation of ―secret,‖ that is, the information is secret only if it is not
known to or reasonably ascertainable either by the general public or within the
industry in which the information has value.
The EEA‘s definition of ―trade secret‖ is ―based largely on the definition
of that term in the Uniform Trade Secrets Act.‖18 The EEA definition refers to
information known to or readily ascertainable by the ―public.‖19 The Uniform
Trade Secrets Act (UTSA) definition, however, refers not to the public but to
information known to or readily ascertainable by ―other persons who can
obtain economic value from its disclosure or use.‖20 Speaking in the context of
an owner‘s protective measures, the legislative history indicates that ―[s]ecrecy
in this context means that the information was not generally known to the
public or to the business, scientific, or educational community in which the
owner might seek to use the information.‖21 The question thus far appears to
have divided the lower federal appellate courts.22
an appellate court held that earlier language covered only theft of a trade secret
related to a product that was, or was intended to be, sold or otherwise placed in
the stream of commerce.24
Intent to Injure
The government must prove that the defendant intended to injure the trade
secret‘s owner or that he knew the owner would be injured.28 However, it need
not show actual injury. The section ―does not require the government to prove
malice or evil intent, but merely that the actor knew or was aware to a practical
certainty that his conduct would cause some disadvantage to the rightful
owner.‖29 Again, the element addresses the defendant‘s state of mind, not
reality. Nothing in the statute‘s language demands that the government prove
actual injury.
Knowingly
The last of the section‘s three mens rea requirements demands that the
defendant be aware that he is stealing, downloading, or receiving a stolen trade
secret. There is some dispute over whether this requires the prosecution to
prove that the defendant knew that he was stealing, downloading, or receiving
proprietary information or that he knew that he was stealing, downloading, or
receiving a trade secret. The Justice Department has used the section‘s
legislative history to reinforce its understanding of this feature of the section:
convert for his personal use,‖ the government generally must show
that the defendant knew or had a firm belief that the information he
or she was taking was a trade secret in an EEA case as well. 142
Cong. Rec. 27,117 (1996).
Ignorance of the law is no defense. The government need not
prove that the defendant himself had concluded that the information
he took fit the legal definition of a ―trade secret‖ set forth in 18
U.S.C. §1839(3). If the government had to prove this, EEA violations
would be nearly impossible to prosecute and Congress‘s intent would
be contravened:
This [knowledge] requirement should not prove to be a great
barrier to legitimate and warranted prosecutions. Most companies go
to considerable pains to protect their trade secrets. Documents are
marked proprietary; security measures put in place; and employees
often sign confidentiality agreements. 142 Cong. Rec. 27,117 (1996).
Based on this legislative history, the government should be able
to establish that the defendant knew that the information was a trade
secret by proving that he was aware that the information was
protected by proprietary markings, security measures, and
confidentiality agreements. Id. More generally, the government could
simply prove that the defendant knew or had a firm belief that the
information was valuable to its owner because it was not generally
known to the public, and that its owner had taken measures to protect
it, that is, the information had the attributes of a trade secret
described in 18 U.S.C. §1839(3). On the other hand, a person cannot
be prosecuted under the EEA if ―he [took] a trade secret because of
ignorance, mistake, or accident.‖ 142 Cong. Rec. 27,117 (1996). Nor
could he be prosecuted if ―he actually believed that the information
was not proprietary after [he took] reasonable steps to warrant such
belief.‖ Id.30
The courts have not always agreed. Some insist that the prosecution show
that the defendant knew the information ―had the general attributes of a trade
secret.‖31
the owner is not necessarily deprived of the information, but is denied control
over access to it. It proscribes unauthorized copying, downloading, uploading,
or otherwise conveying the information. It also outlaws alteration or
destruction of a trade secret.33 The Justice Department has argued that this
second means of misappropriation includes instances where a faithless
employee, former employee, or cyber intruder commits the trade secret to
memory and subsequently acts in manner necessary to satisfy the other
elements of the offense.34 It makes the point with some trepidation, however:
The third subsection outlaws the knowing receipt of stolen trade secret
information.36 Conviction requires proof that a trade secret was stolen or
converted in violation of one of the other subsections and that the defendant
knew it.37
Attempt
Defendants who attempt to steal a trade secret face the same penalties as
those who succeed.38 Attempt consists of intent to commit the offense and a
substantial step towards the attainment of that goal.39 This would indicate that
the information which the defendant seeks to steal need not be a trade secret,
as long as he believes it is.40
Conspiracy
Defendants who conspire to steal a trade secret also face the same
penalties as those who commit the substantive offense.41 ―In order to find a
defendant guilty of conspiracy, the prosecution must prove.... that the
defendant possessed both the intent to agree and the intent to commit the
substantive offense. In addition, the government must prove that at least one
conspirator committed an overt act, that is, took an affirmative step toward
Stealing Trade Secrets and Economic Espionage 53
Consequences
ECONOMIC ESPIONAGE
The EEA‘s economic espionage and theft of trade secret offenses share
many of the same elements.50 There are four principal differences. The theft of
a trade secret must involve the intent to benefit someone other than the
owner.51 It must involve an intent to injure the owner.52 And, it must involve a
trade secret ―that is related to or included in a product that is produced for or
placed in interstate or foreign commerce.‖53 Economic espionage, on the other
hand, must involve an intent to benefit a foreign entity or at least involve the
knowledge that the offense will have that result.54 It does not require an intent
to injure the owner.55 And, it applies to any trade secret, notwithstanding the
absence of any connection to interstate or foreign commerce.56 Finally,
economic espionage is punished more severely. The maximum term of
imprisonment is 15 years rather than 10 years, and the maximum fine for
individuals is $5 million rather than $250,000.57 For organizations the
maximum fine is the greater of $10 million or three times the value of trade
secret rather than $5 million.58 As in the case of stealing trade secrets, the
maximum permissible fine may be higher if twice of the amount of the gain or
54 Charles Doyle
loss associated with the offense exceeds the otherwise applicable statutory
maximum.59
Section 1831 condemns:
I.
(1) Whoever
(2) intending or knowing the offense will benefit
(3) (a) a foreign government,
(b)a foreign instrumentality, or
(c)a foreign agent
(4) knowingly
(5) (a) steals, without authorization appropriates, takes, carries away,
conceals, or by fraud, artifice, or deception obtains a trade secret,
(b)without authorization copies, duplicates, sketches, draws,
photographs, downloads, uploads, alters, destroys, photocopies, replicates,
transmits, delivers, sends, mails, communicates, or conveys a trade secret; [or]
(c) (i) receives, buys, or possesses a trade secret,
(ii) knowing the same to have been stolen or appropriated, obtained,
or converted without authorization;
or
II.
(1)Whoever
(2)attempts [to do so];
or
III.
(1)Whoever
(2)conspires with one or more other persons to [do so], and
(3)one or more of such persons do any act to effect the object of the
conspiracy.60
Foreign Beneficiary
A casual reader might conclude that any foreign entity would satisfy
Section 1831‘s foreign beneficiary element.61 Section 1839‘s definition of
foreign agent and foreign instrumentality, however, makes it clear that an
entity can only qualify if it has a substantial connection to a foreign
government. The definition of foreign instrumentality refers to foreign
governmental control or domination.62 The description of a foreign agent
Stealing Trade Secrets and Economic Espionage 55
leaves no doubt that the individual or entity must be the agent of a foreign
government.63
The theft of a trade secret demands an intent to confer an economic
benefit.64 Economic espionage is not so confined. Here, ―benefit means not
only economic benefit but also reputational, strategic, or tactical benefit.‖65
Moreover, unlike the theft offense, economic espionage may occur whether
the defendant intends the benefit or is merely aware that it will follow as a
consequence of his action.66 As in the case of trade secret theft, however, the
benefit need not be realized; it is enough that defendant intended to confer it.67
Extraterritoriality
when trial would have been possible in the absence of an express provision.
For example, in the absence of the limiting provision, the courts would likely
conclude that Congress intended to allow prosecution of overseas offenses of
foreign nationals that have an impact within the United States.76
Prosecutorial Discretion
For five years after passage of the Economic Espionage Act, neither
economic espionage nor trade secret violations of its provisions could be
prosecuted without the approval of senior Justice Department officials.
Prosecutors must still secure approval before bringing charges of economic
espionage, but approval is no longer necessary for the prosecution of theft of
trade secret charges.77
RELATED OFFENSES
Conduct that violates the Economic Espionage Act may violate other
federal criminal provisions as well. In the case of trade secret offenses,
potentially corresponding offenses include violations of the Computer Fraud
and Abuse Act, the National Stolen Property Act, and the federal wire fraud
statute.
The Computer Fraud and Abuse Act outlaws accessing certain computers
or computer systems without authorization or in excess of authorization, with
the intent to defraud.78 The National Stolen Property Act outlaws the interstate
transportation of tangible stolen property or the knowing receipt of such
property.79 The federal wire fraud statute outlaws the use of wire
communications in execution of a scheme to defraud.80
In addition in the case of economic espionage violations, a defendant may
be subject to prosecution under the general espionage statutes or with failure to
register as the agent of a foreign power. Foreign agents, other than diplomatic
personnel, must register with the Attorney General; failure to do so is
generally a felony.81
The general espionage laws are only likely to be triggered if the trade
secret information is also classified information or is national defense
information.82
Stealing Trade Secrets and Economic Espionage 57
On November 27, 2012, Senator Leahy introduced, and the Senate passed
by unanimous consent, the Theft of Trade Secrets Clarification Act (S.
3642).86 The proposal reworded the jurisdictional element of the trade secret
provision to cover secrets relating to products or services used or intended for
use in interstate or foreign commerce. Senator Leahy explained that:
The House passed the measure shortly thereafter under suspension of the
rules,88 and the President signed it into law on December 28, 2012.89
58 Charles Doyle
Economic Espionage
End Notes
1
18 U.S.C. 1831 and 18 U.S.C. 1832, respectively.
Stealing Trade Secrets and Economic Espionage 59
2
―Whoever ... without authorization ... downloads, uploads ... transmits ... or conveys‖ such
[trade secret] information.... ‖ 18 U.S.C. 1831(a)(2), 1832(a)(2).
3
18 U.S.C. 1832(a), 1831(a).
4
18 U.S.C. 1832(a), 3571(b), 1831(a). Here and elsewhere, 18 U.S.C. 3571(c) provides as
general matter that the maximum for a criminal fine of any federal criminal offense is the
greater of the standard amount set for the particular offense (e.g., $250,000 for individuals
convicted of a felony) or twice the gain or loss resulting from the offense. For purposes of
brevity in most instances, this report omits reference to this alternative maximum fine level
in most instances. Prior to the passage of P.L. 112-269, Section 1831 punished individuals
with a fine of not more than $500,000 and individuals with a fine of not more than the
greater of $10 million or twice the amount of the gain or loss associated with the offense;
see 18 U.S.C. 1831 (2006 ed.).
5
18 U.S.C. 1832(b), 1831(b).
6
18 U.S.C. 1831(a)(4), (5), 1832(a)(4), (5).
7
18 U.S.C. 1834, 2323(c)(restitution), 2323(a)(civil forfeiture), 2323(b)(criminal forfeiture).
8
18 U.S.C. 1836.
9
E.g., 18 U.S.C. 1030(g)(computer fraud and abuse), 2520(interception of electronic
communications), 2707 (unauthorized access to an electronic communications facility).
10
18 U.S.C. 1832; see also, U.S. Department of Justice, Criminal Resource Manual §1129 (May,
1999)(language in italics substituted to reflect P.L. 112-235‘s amendments) (―In order to
establish a violation of 18 U.S.C. §1832, the government must prove: (1) the defendant
stole, or without authorization of the owner, obtained, destroyed, or conveyed information;
(2) the defendant knew this information was proprietary; (3) the information was in fact a
trade secret; (4) the defendant intended to convert the trade secret to the economic benefit of
anyone other than the owner; (5) the defendant knew or intended that the owner of the trade
secret would be injured; and (6) the trade secret was related to [a product or service used in
or intended for use in] interstate or foreign commerce‖).
11
18 U.S.C. 1832.
12
1 U.S.C. 1 (emphasis added).
13
BLACK‘S LAW DICTIONARY 381 (9th ed. 2009).
14
18 U.S.C. 1839(3)(―[T]the term ‗trade secret‘ means all forms and types of financial, business,
scientific, technical, economic, or engineering information, including patterns, plans,
compilations, program devices, formulas, designs, prototypes, methods, techniques,
processes, procedures, programs, or codes, whether tangible or intangible, and whether or
how stored, compiled, or memorialized physically, electronically, graphically,
photographically, or in writing if - (A) the owner thereof has taken reasonable measures to
keep such information secret; and (B) the information derives independent economic value,
actual or potential, from not being generally known to, and not being readily ascertainable
through proper means by, the public‖).
15
18 U.S.C. 1839(4).
16
United States v. Chung, 659 F.3d 815, 825-29 (9th Cir. 2011)(citations omitted)(―[R]easonable
measures for maintaining secrecy have been held to include advising employees of the
existence of a trade secret, limiting access to a trade secret on a ‗need to know basis‘, and
controlling plant access. Security measures, such as locked rooms, security guards, and
document destruction methods, in addition to confidentiality procedures, such as
confidentiality agreements and document labeling, are often considered reasonable
measures‖).
60 Charles Doyle
17
United States v. Krumrei, 258 F.3d 535, 539 (6th Cir. 2001); see also, United States v.
Genovese, 409 F.Supp.2d 253, 257 (S.D.N.Y. 2005)(rejecting the contention that the ―not ...
generally known ... to the public‖ element of the definition of a trade secret was
unconstitutionally vague as applied when the evidence showed that he clearly understood
that the information he downloaded was not generally known).
18
H.Rept. 104-788, at 12 (1996); United States v. Chung, 659 F.3d 815, 825 (9th Cir. 2011).
19
18 U.S.C. 1839(3)(B).
20
UNIF. TRADE SECRETS ACT §1(4), 14 U.L.A. 538 (2005). The Uniform Trade Secrets Act
definition of trade secrets reads in its entirety: ―‗Trade Secret‘ means information, including
a formula, pattern, compilation, program, device, method, technique, or process that: (i)
derives independent economic value, actual or potential, from not being generally known to,
and not being readily ascertainable by proper means by, other persons who can obtain
economic value from its disclosure or use, and (ii) is the subject of efforts that are
reasonable under the circumstances to maintain its secrecy.‖
21
H.Rept. 104-788, at 12 (1996).
22
United States v. Chung, 659 F.3d 815, 825 (9th Cir. 2011)(―There is some conflict between
circuits as to whether that deviation alters the ‗readily ascertainable‘ analysis. Compare
United States v. Lange, 312 F.3d 263, 267 (7th Cir. 2002)(interpreting ‗the public‘ as not
necessarily meaning the ‗general public,‘ but potentially ‗the economically relevant public‘
(emphasis in original), with United States v. Hsu, 155 F.3d 189, 196 (3d Cir. 1998)
(observing that ‗the EEA alters the relevant party from whom proprietary information must
be kept confidential‘). Because Defendant does not contest that the secret information in
this case was readily ascertainable, we need not weigh in on this issue‖).
23
18 U.S.C. 1832(a)(language added by P.L. 112-236 in italics)(―Whoever, with intent to convert
a trade secret that is related to a product or service used in or intended for use in interstate
or foreign commerce ... ‖).
24
United States v. Aleynikov, 676 F.3d 71, 80-2 (2d Cir. 2012)(construing 18 U.S.C. 1832(a)
which at the time read: ―Whoever, with intent to convert a trade secret that is related to or
included in a product that is produced for or placed in interstate or foreign commerce ...
‖)(P.L. 112-236 struck the language in italics in favor of that quoted in italics in the
previous footnote in order to overcome the implications of Aleynikov, 158 Cong. Rec.
S6978 (daily ed. Nov. 27, 2012)(introductory remarks of Sen. Leahy)).
25
18 U.S.C. 1832(a); United States v. Hsu, 155 F.3d 189, 195-96 (3d Cir. 1998); United States v.
Jin, 833 F.Supp.2d 977, 1016 (N.D. Ill. 2012).
26
U.S. Department of Justice, Executive Office for United States Attorneys, Prosecuting
Intellectual Property Crimes (Justice Report) 159 (3d ed. September 2006)(―The recipient of
the intended benefit can be the defendant, a competitor of the victim, or some other person
or entity‖), available at http://www.justice.gov/criminal/cybercrime/docs/ ipma2006.pdf.
27
Id. (―One who misappropriates a trade secret but who does not intend for anyone to gain
economically from the theft cannot be prosecuted under [the section]‖).
28
18 U.S.C. 1832(a); United States v. Jin, 833 F.Supp.2d 977, 1018 (N.D. Ill. 2012).
29
H. Rep. No. 104-788, at 11-12 (1996), quoted in Justice Report at 159.
30
Justice Report at 156-57 (some citations omitted); see also, United States v. Chung, 633
F.Supp.2d 1134, 1143 (C.D.Cal. 2009), aff‘d, 659 F.3d 815 (9th Cir. 2011)(―It is not
explicitly clear from the language of section 1831(a)(3)[which corresponds to section
1832(a)(3)] whether the word ‗knowingly‘ modifies the ‗trade secret‘ element of the
offense. The Government argues that it does not, and therefore it does not have to prove that
Mr. Chung knew that the information he possessed was a trade secret. Mr. Chung contends
Stealing Trade Secrets and Economic Espionage 61
that the Government must prove that he had such knowledge. The Court agrees with Mr.
Chung‖).
31
United States v. Jin, 833 F.Supp.2d 977, 1011-14 (N.D. Ill. 2012); United States v. Chung, 633
F.Supp.2d 1134, 1145 (C.D.Cal. 2009), aff‘d on other grounds, 659 F.3d 815 (9th Cir.
2011); but see, United States v. Krumrei, 258 F.3d 535, 539 (6th Cir. 2001)(indicating that
the government must show that the defendant knew the information was proprietary and
thus by implication indicating that the government need not meet the higher standard of
showing that he knew the information constituted a trade secret).
32
18 U.S.C. 1832(a)(1)(― ... [K]nowingly – (1) steals, or without authorization appropriates,
takes, carries away, or conceals, or by fraud, artifice, or deception obtains such
information‖).
33
18 U.S.C. 1832(a)(2)(―[K]nowingly ... (2) without authorization copies, duplicates, sketches,
draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits,
delivers, sends, mails, communicates, or conveys such information‖).
34
Justice Report at 155 (―The statute also prohibits not only actions taken against a trade secret‘s
physical form, such as ‗steal[ing], ...tak[ing], [and] carr[ying] away‘, 18 U.S.C.
§§1831(a)(1), 1832(a)(1), but also actions that can be taken against a trade secret in a
memorized, intangible form, such as ‗sketch[ing], draw[ing], ... download[ing], upload[ing],
..., transmit[ting], ... communicat[ing], [and] convey[ing],‘ 18 U.S.C. §§1831(a)(2),
1832(a)(2). See James H.A. Pooley et al., Understanding the Economic Espionage Act of
1996, 5 Tex. Intell. Prop. L.J. 177 (1997). In this respect, as in others, the EEA echoes civil
law and some pre-EEA case law. See, e.g. , 4 Roger M. Milgrim, Milgrim on Trade Secrets
§15.01[e]; Stampede Tool Warehouse v. May, 651 N.E.2d 209, 217 (Ill. App. Ct. 1995) (‗A
trade secret can be misappropriated by physical copying or by memorization.‘) (citations
omitted). Trade secret cases to the contrary that do not involve the EEA are thus not
persuasive authority on this point‖). See also, Twenty-Sixth Annual Survey of White Collar
Crime: Intellectual Property Crimes, 49 AMERICAN CRIMINAL LAW REVIEW 929,
934 (2012).
35
Justice Report at 155.
36
18 U.S.C. 1832(a)(3)(― ... [K]nowingly ... (3) receives, buys, or possesses such information,
knowing the same to have been stolen or appropriated, obtained, or converted without
authorization‖).
37
18 U.S.C. 1832(a)(3); United States v. Jin, 833 F.Supp.2d 977, 1015 (N.D.Ill. 2012).
38
18 U.S.C. 1832(a).
39
United States v. Hsu, 155 F.3d 189, 202-203 (3d Cir. 1998); United States v. Lange, 312 F.3d
263, 268 (7th Cir. 2002); United States v. Yang, 281 F.3d 534, 543 (6th Cir. 2002).
40
United States v. Hsu, 155 F.3d at 203 (―It naturally follows that the government need not prove
that an actual trade secret was used during the EEA investigation, because the defendant‘s
culpability for a charge of attempt depends only on the ‗circumstances as he believes them
to be,‘ not as they really are‖); United States v. Yang, 281 F.3d at 543-44 (―The Yangs
believed that the information Lee was providing was trade secrets belonging to Avery. They
attempted to steal that information. The fact that they actually did not receive a trade secret
is irrelevant‖); but see United States v. Lange, 312 F.3d at 269 (―But it is far less clear that
[the] sale of information already known to the public could be deemed a substantial step
toward the offense, just because the defendant is deluded and does not understand what a
trade secret is.... We need not pursue the subject beyond noting the plausibility of the claim
and its sensitivity to the facts – what kind of data did the employee think he stole, and so on.
For it is not necessary to announce a definitive rule about how dangerous the completed acts
62 Charles Doyle
must be in trade secret cases: the judge was entitled to (and did) find that Lange had real
trade secrets in his possession‖).
41
18 U.S.C. 1832(a).
42
United States v. Martin, 228 F.3d 1, 10-11 (1st Cir. 2000); cf., United States v. Chung, 659
F.3d 815, 828-29 (9th Cir. 2011).
43
United States v. Hsu, 155 F.3d at 203-204; United States v. Yang, 281 F.3d at 544.
44
18 U.S.C. 1832(a), 3571.
45
18 U.S.C. 1832(b).
46
18 U.S.C. 3571(d).
47
18 U.S.C. 1834, 2323(c), 3663A(a), (c). See generally, CRS Report RL34138, Restitution in
Federal Criminal Cases.
48
18 U.S.C. 1834, 2332(a), (b). See generally, CRS Report 97-139, Crime and Forfeiture.
49
18 U.S.C. 1836.
50
18 U.S.C. 1831, 1832.
51
18 U.S.C. 1832(a).
52
Id.
53
Id.
54
18 U.S.C. 1831(a)(―Whoever, intending or knowing that the offense will benefit any foreign
government, foreign instrumentality, or foreign agent ... ‖); United States v. Jin, 833
F.Supp.2d 977, 1019 (N.D.Ill. 2012).
55
Id.
56
Id.; United States v. Aleynikov, 676 F.3d 71, 79 (2d Cir. 2012)(―Thus there is a limitation – [a
nexus to] interstate or foreign commerce – in the statute Aleynikov is charged with
violating, a limitation that does not appear in the otherwise parallel foreign espionage
statute‖).
57
18 U.S.C. 1831(a), 1832(a).
58
18 U.S.C. 1831(b), 1832(b).
59
18 U.S.C. 3571(d).
60
18 U.S.C. 1831; see also United States v. Chung, 633 F.Supp.2d 1134, 1146 (C.D.Cal. 2009),
aff‘d, 659 F.3d 815 (9th Cir. 2011)(―Accordingly, under section 1831(a)(3), the
Government must prove five elements: (1) Mr. Chung intended to benefit a foreign
government; (2) Mr. Chung knowingly possessed trade secret information; (3) Mr. Chung
knew the information was obtained without authorization; (4) the information Mr. Chung
possessed was, in fact, a trade secret; and (5) Mr. Chung knew the information was a trade
secret‖); U.S. Department of Justice, Criminal Resource Manual §1124 (―In order to
establish a violation of 18 U.S.C. §1831, the government must prove: (1) the defendant stole
or, without authorization of the owner, obtained, destroyed, or conveyed information; (2)
the defendant knew this information was proprietary; (3) the information was in fact a trade
secret; and (4) the defendant knew the offense would benefit or was intended to benefit a
foreign government, foreign instrumentality, or foreign agent‖).
61
18 U.S.C. 1831(a)(― ... [I]ntending or knowing the offense will benefit (3) (a) a foreign
government, (b) a foreign instrumentality, or (c) a foreign agent ... ‖).
62
18 U.S.C. 1839(1)(―As used in this chapter – (1) the term ‗foreign instrumentality‘ means any
agency, bureau, ministry, component, institution, association, or any legal, commercial, or
business organization, corporation, firm, or entity that is substantially owned, controlled,
sponsored, commanded, managed, or dominated by a foreign government‖).
63
18 U.S.C. 1839(1)(―As used in this chapter ... (2) the term ‗foreign agent‘ means any officer,
employee, proxy, servant, delegate, or representative of a foreign government‖).
Stealing Trade Secrets and Economic Espionage 63
64
18 U.S.C. 1832(a)(―Whoever, with the intent to convert a trade secret ... to the economic
benefit of anyone other than the owner ... ‖).
65
H.Rept. 104-788, at 11 (1996).
66
18 U.S.C. 1832(a)(―Whoever, with the intent to convert a trade secret ... to the economic
benefit of anyone other than the owner ... ‖); 1831(a)(―Whoever, intending or knowing that
the offense will benefit ... ‖).
67
Id.
68
18 U.S.C. 1835; United States v. Hsu, 155 F.3d 189, 193-94 (3d Cir. 1998).
69
United States v. Ye, 436 F.3d 1117, 1120-121 (9th Cir. 2006)(―The plain language of the EEA
indicates that the government can file an interlocutory appeal pursuant to §1835 only where
a district court‘s order actually directs or authorizes the disclosure of a trade secret.... Here,
the district court‘s order did not provide for the disclosure of any trade secret materials. In
its opening brief in this court, the government acknowledges that it had already turned over
all relevant trade secret materials and documents.... Because the purpose of the district
court‘s order was only to clarify exactly which materials the government contends
constitute the protected trade secrets, and all relevant materials had already been turned
over, the district court‘s order does not direct or authorize the ‗disclosure‘ of trade secrets as
required by the plain language of §1835‖).
70
Id. at 1121-124. Mandamus relief is a discretionary remedy ordinarily only available when the
petitioner can show: the absence of any other form of relief, a clear right to issuance of the
writ, and that recourse to this extraordinary form of relief is appropriate under the
circumstances, Cheney v. United States District Court, 542 U.S. 367, 380-81 (2004). The
lower federal appellate courts sometimes describe these requirements in greater detail, see
e.g., Lewis v. Ayers, 681 F.3d 992, 998 (9th Cir. 2012)(―In Bauman, we established five
guidelines to determine whether mandamus is appropriate in a given case:(1) whether the
petitioner has no other means, such as a direct appeal to obtain the desired relief; (2)
whether the petitioner will be damaged or prejudiced in any way not correctable on appeal;
(3) whether the district court‘s order is clearly erroneous as a matter of law; (4) whether the
district court‘s order is an oft repeated error or manifests a persistent disregard of the federal
rules; and (5) whether the district court‘s order raises new and important problems or issues
of first impression‖); In re Jones, 680 F.3d 640, 642 (6th Cir. 2012)(essentially the same).
71
Morrison v. National Australia Bank Ltd., 130 S.Ct. 2869, 2877 (2010), quoting EEOC v.
Arabian American Oil Co., 449 U.S. 244, 248 (1991) and Foley Bros., Inc. v. Filardo, 336
U.S. 281 (1949). See generally, CRS Report 94-166, Extraterritorial Application of
American Criminal Law.
72
H.Rept. 104-788, at 14 (1996).
73
18 U.S.C. 1837 (―This chapter also applies to conduct occurring outside the United States if -
(1) the offender is a natural person who is a citizen or permanent resident alien of the
United States, or an organization organized under the laws of the United States or a State or
political subdivision thereof; or (2) an act in furtherance of the offense was committed in
the United States‖).
74
H.Rept. 104-788, at 14 (emphasis added)(―To ensure that there is some nexus between the
ascertaining of such jurisdiction and the offense, however, extraterritorial jurisdiction exists
only if [an overt act occurs within the United States or the offender is a U.S. national]‖).
75
18 U.S.C. 1837 (emphasis added)(―This chapter also applies to conduct occurring outside the
United States if - (1) the offender is a natural person who is a citizen or permanent resident
alien of the United States, or an organization organized under the laws of the United States
64 Charles Doyle
or a State or political subdivision thereof; or (2) an act in furtherance of the offense was
committed in the United States‖).
76
Ford v. United States, 273 U.S. 593, 623 (1927)(―A man who outside of a country willfully
puts in motion a force to take effect in it is answerable at the place where the evil is done‖);
United States v. Yousef, 327 F.3d 56, 96-7 (2d Cir. 2003)(―Moreover, assertion of
jurisdiction is appropriate under the ‗objective territorial principle,‘ because the purpose of
the attack was to influence United States foreign policy and the defendant intended their
actions to have an effect – in this case a devastating effect – on and within the United
States‖); United States v. Felix-Guiterrez, 940 F.2d 1200, 1205 (9th Cir. 1991)(Felix‘s
actions created a significant detrimental effect in the United States ... ‖). See also The
Extraterritorial Application of the Economic Espionage Act of 1996, 23 HASTINGS
INTERNATIONAL AND COMPARATIVE LAW REVIEW, 527, 553-54 (2000)(―If a
foreign company possesses no operations in the U.S. and engages in trade secret theft
against a U.S. entity entirely outside the U.S., Then EEA cannot apply. In that respect, the
extraterritorial jurisdiction under the EEA may fall short of the jurisdictional reach applied
under a ‗pure‘ effects test in antitrust law – where the Sherman Act can reach conduct
entirely extraterritorial in nature‖).
77
U.S. Department of Justice, Criminal Resource Manual §1122 (―Prior to passage of the EEA,
the Attorney General assured Congress in writing that for a period of five years, the
Department of Justice would require that all prosecutions brought under the EEA must first
be approved by the Attorney General, the Deputy Attorney General, or the Assistant
Attorney General to the Criminal Division. (See October 1, 1996 letter from Attorney
General Janet Reno to Chairman Orrin Hatch, Criminal Resource Manual at 1123). This
requirement expired on October 11, 2001. Subsequently, the Attorney General renewed the
prior requirement for initiating prosecutions under 18 U.S.C. §1831.... The requirement was
not extended for cases under 18 U.S.C. §1832 ... ‖).
78
18 U.S.C. 1030(a)(4), (e)(2)(―(a) Whoever ... (4) knowingly and with intent to defraud,
accesses a protected computer without authorization, or exceeds authorized access, and by
means of such conduct furthers the intended fraud and obtains anything of value, unless the
object of the fraud and the thing obtained consists only of the use of the computer and the
value of such use is not more than $5,000 in any 1-year period ... shall be punished as
provided in subsection (c) of this section.... (e) As used in this section ... (2) the term
‗protected computer‘ means a computer - (A) exclusively for the use of a financial
institution or the United States Government, or, in the case of a computer not exclusively
for such use, used by or for a financial institution or the United States Government and the
conduct constituting the offense affects that use by or for the financial institution or the
Government; or (B) which is used in or affecting interstate or foreign commerce or
communication, including a computer located outside the United States that is used in a
manner that affects interstate or foreign commerce or communication of the United States‖);
e.g., United States v. Koo, 770 F.Supp.2d 1115, 1118 (D.Ore. 2011)(defendant indicted for
computer fraud and abuse and for trade secrets violations); see generally, CRS Report 97-
1025, Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and
Related Federal Criminal Laws.
79
18 U.S.C. 2314 (―Whoever transports, transmits, or transfers in interstate or foreign commerce
any goods, wares, merchandise, securities or money, of the value of $5,000 or more,
knowing the same to have been stolen, converted, or taken by fraud.... shall be fined under
this title or imprisoned not more than ten years or both ... ‖); 18 U.S.C. 2315(―Whoever
receives, possesses, conceals, stores, barters, sells, or dispose of any goods, ware, or
Stealing Trade Secrets and Economic Espionage 65
merchandise, securities, or money of the value of $5,000 or more ... which have crossed a
State of United States boundary after being stolen ... knowing the same to have been stolen
... shall be fined under this title or imprisoned not more than ten years, or both‖); see also,
United States v. Aleynikov, 676 F.3d 71, 76-9 (2d Cir. 2012)(stolen, intangible computer
source code is neither a good, ware, nor merchandise for purposes of the National Stolen
Property Act).
80
18 U.S.C. 1343 (―Whoever, having devised or intending to devise any scheme or artifice to
defraud, or for obtaining money or property by means of false or fraudulent pretenses,
representations, or promises, transmits or causes to be transmitted by means of wire ... any
writings, signs, signals, pictures, or sounds for the purpose of executing such scheme or
artifice, shall be fined under this title or imprisoned not more than 20 years, or both ... ‖);
e.g., United States v. Hsu, 155 F.3d 189, 193 (3d Cir. 1998)(defendant indicted for wire
fraud and trade secrets violations); United States v. Koo, 770 F.Supp.2d 1115, 1118 (D.Ore.
2011)(same); see generally, CRS Report R41930, Mail and Wire Fraud: A Brief Overview
of Federal Criminal Law.
81
18 U.S.C. 951(a)(―Whoever, other than a diplomatic or consular officer or attaché, acts in the
United States as an agent of a foreign government without prior notification to the Attorney
General if required in subsection (b), shall be fined under this title or imprisoned not more
than ten years, or both‖); e.g., United States v. Chung, 659 F.3d 815, 819 (9th Cir.
2011)(defendant indicted for economic espionage and unregistered foreign agent
violations).
82
18 U.S.C. 798, outlaws the unauthorized disclosure of classified information relating to
communications intelligence; 18 U.S.C. 1924 outlaws the unauthorized retention of
classified information; and 18 U.S.C. 793, 794 outlaw the unauthorized gathering or
transmitting national defense information; see generally CRS Report RS21900, The
Protection of Classified Information: The Legal Framework.
83
P.L. 112-236 (S. 3642), 126 Stat. 1627 (2012), amending, 18 U.S.C. 1832(a).
84
Section 2, P.L. 112-269 (H.R. 6029), 126 Stat. 2442 (2013), amending, 18 U.S.C. 1831(a), (b).
85
Section 3, P.L. 112-269 (H.R. 6029), 126 Stat. 2442-443 (2013).
86
158 Cong. Rec. S6979 (daily ed. Nov. 27, 2012).
87
158 Cong. Rec. S6968 (daily ed. Nov. 27, 2012).
88
158 Cong. Rec. H6849 (daily ed. Dec. 18, 2012).
89
P.L. 112-236, 126 Stat. 1627 (2012).
90
158 Cong. Rec. H5619 (daily ed. August 1, 2012); see also, H.Rept. 112-610.
91
Reported favorably without printed report and placed on the calendar, 157 Cong. Rec. S8460
(daily ed. December 8, 2011).
92
H.R. 6029, §2(a)(1), proposed 18 U.S.C. 1831(a).
93
18 U.S.C. 1831(a), (b).
94
H.R. 6029, §§2(a)(2), 2(b), proposed 18 U.S.C. 1831(a), (b).
95
18 U.S.C. 1832(a), (b), 3571(b). Under existing law, a defendant, individual or organizational,
may be fined up to twice the loss or gain association with the offense when that amount
exceeds the statutory maximum, 18 U.S.C. 3571(c).
96
H.Rept. 112-610, at 2 (2012), quoting Office of the National Counterintelligence Executive,
Foreign Spies, Stealing US Economic Secrets in Cyberspace, Report to Congress on
Foreign Economic Collection and Industrial Espionage, 2009-2011, at i (Oct. 2011).
97
158 Cong. Rec. S8230 (daily ed. Dec. 19, 2012).
98
158 Cong. Rec. H7455 (daily ed. Dec. 30, 2012).
99
P.L. 112-269, 126 Stat. 2442 (2013).
INDEX
N
L
nanometer(s), 9
labeling, 59
nation states, 32
languages, 19
lasers, 11
Index 71
sentencing, ix, 46, 47, 53, 58 theft, vii, viii, ix, 1, 2, 6, 11, 23, 39, 45, 46,
servers, 8 48, 50, 51, 52, 53, 55, 56, 60, 64
services, 9, 14, 15, 20, 27, 57, 58 trade, viii, ix, 11, 12, 37, 39, 42, 45, 46, 47,
Sherman Act, 64 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58,
showing, 61 59, 60, 61, 62, 63, 64, 65
signals, 65 trade secret(s), viii, ix, 11, 37, 39, 45, 46,
signs, 65 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57,
Silicon Valley, 11, 39, 41 58, 59, 60, 61, 62, 63, 64, 65
social consequences, 39 traditions, 31
society, 4, 6, 30, 31, 37, 38, 42 transactions, ix, 46
software, 57 transformation, 27
spending, 4, 13, 34 transmission, 57, 58
state(s), 7, 21, 23, 25, 36, 50 transportation, 11, 56
statistics, 38 treatment, 41, 57, 58
statutes, vii, ix, 46, 56 trial, 55, 56
stock, 48 trustworthiness, 35, 36
storage, vii, viii, 1, 3, 7, 8, 9, 10, 21, 34, 35, turnover, 27, 39
46
strategic position, 4
stress, 3, 7, 23 U
substance abuse, 22
U.S. Department of Commerce, 14, 18, 19,
supervisors, 2, 10
42
suppliers, 3, 6
U.S. information, vii, viii, 1, 4, 7, 10, 12,
Supreme Court, 55
17, 21, 27, 30
syndrome, 27
U.S. policy, 31
United, vii, viii, ix, 1, 2, 4, 9, 11, 12, 13, 15,
T 16, 17, 23, 25, 26, 27, 28, 29, 31, 35, 38,
39, 40, 42, 46, 55, 57, 58, 59, 60, 61, 62,
Taiwan, 15 63, 64, 65
talent, 42 United Kingdom, 13
target, 12, 21, 41 United States, vii, viii, ix, 1, 2, 4, 9, 11, 12,
target number, 41 13, 15, 16, 17, 23, 25, 26, 27, 28, 29, 31,
technical support, 13 35, 38, 39, 40, 42, 46, 55, 57, 58, 59, 60,
techniques, 9, 59 61, 62, 63, 64, 65
technological advancement, 7, 21, 35 USA, 39
technological advances, vii, viii, 1, 34
technological change, 23
technologies, 8, 10, 11, 12, 14, 18, 32, 35, V
36
variables, 3, 7, 21, 34
technology, 6, 12, 13, 14, 23, 38, 40, 58
victims, 47, 53
technology transfer, 40
vulnerability, vii, 3, 5, 6, 7, 9, 10, 12, 32,
telecommunications, 11
34, 37
territorial, 55, 64
terrorism, 17, 40
terrorist organization, 12
Index 73