Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
This art icle was downloaded by: [ Dr. Mat t hew Crosst on] On: 24 Novem ber 2014, At : 11: 39 Publisher: Rout ledge I nform a Lt d Regist ered in England and Wales Regist ered Num ber: 1072954 Regist ered office: Mort im er House, 37- 41 Mort im er St reet , London W1T 3JH, UK International Journal of Intelligence and CounterIntelligence Publicat ion det ails, including inst ruct ions f or aut hors and subscript ion inf ormat ion: ht t p: / / www. t andf online. com/ loi/ uj ic20 Soft Spying: Leveraging Globalization as Proxy Military Rivalry Mat t hew Crosst on Published online: 20 Nov 2015. To cite this article: Mat t hew Crosst on (2015) Sof t Spying: Leveraging Globalizat ion as Proxy Milit ary Rivalry, Int ernat ional Journal of Int elligence and Count erInt elligence, 28: 1, 105-122, DOI: 10. 1080/ 08850607. 2014. 962377 To link to this article: ht t p: / / dx. doi. org/ 10. 1080/ 08850607. 2014. 962377 PLEASE SCROLL DOWN FOR ARTI CLE Taylor & Francis m akes every effort t o ensure t he accuracy of all t he inform at ion ( t he “ Cont ent ” ) cont ained in t he publicat ions on our plat form . However, Taylor & Francis, our agent s, and our licensors m ake no represent at ions or warrant ies what soever as t o t he accuracy, com plet eness, or suit abilit y for any purpose of t he Cont ent . Any opinions and views expressed in t his publicat ion are t he opinions and views of t he aut hors, and are not t he views of or endorsed by Taylor & Francis. The accuracy of t he Cont ent should not be relied upon and should be independent ly verified wit h prim ary sources of inform at ion. Taylor and Francis shall not be liable for any losses, act ions, claim s, proceedings, dem ands, cost s, expenses, dam ages, and ot her liabilit ies what soever or howsoever caused arising direct ly or indirect ly in connect ion wit h, in relat ion t o or arising out of t he use of t he Cont ent . This art icle m ay be used for research, t eaching, and privat e st udy purposes. Any subst ant ial or syst em at ic reproduct ion, redist ribut ion, reselling, loan, sub- licensing, syst em at ic supply, or dist ribut ion in any form t o anyone is expressly forbidden. Term s & Condit ions of access and use can be found at ht t p: / / www.t andfonline.com / page/ t erm sand- condit ions International Journal of Intelligence and CounterIntelligence, 28: 105–122, 2015 Copyright # Taylor & Francis Group, LLC ISSN: 0885-0607 print=1521-0561 online DOI: 10.1080/08850607.2014.962377 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 MATTHEW CROSSTON Soft Spying: Leveraging Globalization as Proxy Military Rivalry Despite Hollywood romanticizing about the fictional escapades of various James Bonds and Jason Bournes, one of the most prevalent forms of modern intelligence activity is arguably the least emphasized: economic and industrial espionage. Aimed at garnering financial and innovation advantages for countries seeking greater influence in a highly globalized world, this activity is not merely about economic policy. It also serves as a de facto proxy military rivalry: states maneuver to outperform, outwit, and ‘‘outstrategize’’ their competitors across all spheres of profitable activity via this lesser ‘‘INT.’’ Like the more ubiquitous concept of soft power, soft spying (a term interchangeable with ‘‘economic and=or industrial espionage’’) is the avoidance of war while still achieving dominance, wherein states engage one another in myriad transactions and contestations, Dr. Matthew Crosston is Professor of Political Science, Miller Chair for Industrial and International Security, and Director of the International Security and Intelligence Studies Program at Bellevue University, Bellevue, Nebraska. A graduate of Colgate University, with an M.A. from the University of London, and a Ph.D. from Brown University, he has done post-doctoral work at the University of Toronto’s Munk Centre for International Studies. A specialist in intelligence analysis, counterterrorism, and cyberwar ethics, Dr. Crosston has expertise in Russian-area studies, political Islam, and global conflict. He previously taught at Clemson University and the Virginia Military Institute (VMI). The author of Fostering Fundamentalism: Terrorism, Democracy and American Engagement in Central Asia (London: Ashgate, 2006), his articles have appeared in numerous peer-reviewed publications. AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 105 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 106 MATTHEW CROSSTON and global futures can rise or fall without a single bullet being fired. Soft spying is an under-emphasized aspect of globalization and the everincreasing transnational technical connectivity among nations. More importantly for Americans, structural=cultural flaws in the world of business reveal how the United States might arguably always end up more victim than perpetrator in this globally pervasive activity. The motivation to engage in soft spying and conduct economic espionage is no small matter. The end of the Cold War signaled a shift from heavy emphasis on military alliances to the focus on hyper-economic development. The turnaround was due not so much to the end of war and a cessation of hostile activities as a switch to competition with more productive and prosperous end goals. All around the world states understood that failure to keep up in a rapidly globalizing economy would likely doom a state to not merely economic hardship but expose it to dangers of the decidedly old-school realist variety: war, occupation, loss of territory, and the like. Yet, emphasizing economic development does not magically and overnight create an industrial juggernaut. As developing states began to realize just how difficult steady, progressive, rational growth would be, they soon began to find ways to shortcut the journey. Soft spying became arguably the chief method in this new national security priority of economic development. Spy movies notwithstanding, the traditional methods of economic espionage truly read like a primer from novelist Ian Fleming: planting moles and=or recruiting inside agents; surveillance; clandestine entry; bag drops and collections; dumpster diving; bugging and phone tapping; invasive computer programs; and drop-by spies.1 The National Counterintelligence Center (NCC) has been actively developing a database since 2000 and reporting to Congress on foreign economic collection and industrial espionage. Its work has been invaluable in understanding not just the economic appeal of soft spying but the potentially dangerous national security consequences undergirding all such initiatives. The pervasive spread of technology with dual applications (economic and military) is increasingly problematic and offers a powerful incentive for countries to actually intensify their investment and resources on soft spying.2 In fact, since 2000 the NCC has never had a year where all the categories on the Department of Defense’s Militarily Critical Technologies List weren’t regularly targeted by foreign countries, both developed and underdeveloped, traditional rivals and allies alike. The danger from threat countries is in attempting to obtain critical technical information that will enable U.S. rivals to disable, copy, neutralize, or force significant change to American systems and strategies.3 Elaborating the categories in full shows how soft spying impacts more than just bottom line profit-sharing or stock market positions. It exposes INTERNATIONAL JOURNAL OF INTELLIGENCE 107 SOFT SPYING weaknesses and reveals flaws that could negatively impact the protection of the homeland: . . . . . . . Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 . . . . . . . . . Information systems Sensors and lasers Aeronautics Armaments and energetic materials Marine systems Guidance and navigation Signature control Space systems Manufacturing and fabrication Information warfare Nuclear systems technology Power systems Chemical-biological systems Weapons effects and countermeasures Ground systems Directed and kinetic energy systems The NCC’s efforts have revealed how rarely one method alone is used to collect valuable data. Whether through open sources that are legal or illegal, involving compromised systems or agents, the end result is the same: not just the loss of possibly billions of dollars in trade secrets and technological innovation but the increased vulnerability of some of the country’s key systems. Ironically, data suggests that the most active collectors are not exactly a who’s who list of American enemies: China, Japan, Israel, France, Korea, Taiwan, and India all regularly make the list of most aggressive soft spies. Only China is a rival and even then not a pure one: that is what makes the potential damage of soft spying so frightening—not that the loss of materials, data, and technology is harmless, but that maybe the only thing stopping the misappropriation and misuse of the information so far has been that its performance has remained in the hands of countries deeply dependent upon and interactive with the American economy. Unfortunately, the hurdles to jump over to get past this danger are numerous and significant. Against this backdrop is discovered a rather unimpressive and compromised legal foundation trying to deal with this increasingly important reality of global affairs, intelligence, and foreign policy. The issue is no longer just about economics. DEFICIENCIES IN FORMAL LEGISLATION AND LEGAL CUSTOMS The legal foundation for most analyses of U.S. soft spying needs to begin with the Economic Espionage Act of 1996 (EEA). Falling squarely in the AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 108 MATTHEW CROSSTON middle of President Bill Clinton’s eight-year tenure and a major focal point of his administration’s emphasis on economic development and trade security, the EEA was not necessarily a hammer against foreign agents and organizations operating freely against American economic interests. Rather, it was more an admission by the President and Congress that up to then very little formal legislation explicitly attempted to address this increasing illicit activity. While the EEA did try to formally define both ‘‘economic espionage’’ and ‘‘theft of trade secrets’’ as illegal acts punishable by fines as high as ten million dollars, unintended flaws in the language of the document became exacerbated in the 21st-century digital age. The EEA’s Section 1831(a) states, in general, ‘‘whoever, intending or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent, knowingly’’ shall be subject to the full force of the American legal system.4 The problem with this formulation is multi-layered. The document’s crafters were clearly hindered by an American economic cultural bias regarding commercial activity. In the United States, the belief in the power of the free market and the inefficiency of government assistance or interference runs so strongly that the drafters of the EEA apparently envisioned a distinct line of demarcation between business and government, thus making it ostensibly easy to identify ‘‘actions that would knowingly benefit a foreign government.’’ That demarcation indeed exists in the U.S. with its independent business culture and desire for limited if not non-existent government intervention. But this is not the case for most of the world, which has attempted to deal with pronounced America’s technical innovation and consumption advantages by blurring the line between business and government. Interestingly, this initial adjustment was not done to encourage or foster economic espionage. Rather, most developing states (and even some advanced industrial states willing to admit their distinct disadvantages in comparison with the mammoth American economy) felt that government support and assistance was essential for the proper growth and expansion of their own industries and national economies. This fact in and of itself sets the United States at a disadvantage in the conceptualization of terms within the EEA. If a strong demarcation between business and government is best for proper attribution, then those countries absent such demarcation are structurally building their economies and industries in a manner that would make soft spying that much more difficult to detect. Again, the EEA defines economic espionage as any foreign body ‘‘knowingly and willingly’’ seeking to benefit a foreign government. If the line between government and industry is hopelessly opaque, then it becomes nearly impossible to adjudicate intent behind any particular industrial action. INTERNATIONAL JOURNAL OF INTELLIGENCE 109 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 SOFT SPYING The attempt of American businesses trying to steal secrets from other U.S. businesses is considered a standard, if perhaps distasteful, part of the game. For competitors to strive to gain early access to patents, trade secrets, strategies, and the like is not explicitly illegal. The domestic laws of many nations, America included, do not explicitly prohibit intruding into foreign lands for the direct purpose of acquiring and collecting economic information.5 This might explain why so many American businesses tend to avoid preaching about the elimination of soft spying, and why such espionage activity is often ignored when done by traditional allies.6 But if done expressly for the gain of a foreign government, then the act does become illegal under the EEA. Since the EEA has not ultimately become a hammer of punishment over the past nineteen years, with the American government seldom seeking retribution and levying fines on countless offending countries, the conclusion is that Congress and those legal bodies charged with enforcing the EEA’s precepts have taken a more liberal interpretive view of most foreign industrial fusion between business and government. Ironically, this lenient prosecutorial tendency was arguably powered by American industry—the very group the EEA was originally designed to protect. Ever mindful of creating a positive trade and investment climate, the passage of the EEA was always met lukewarmly by U.S. businesses. While the idea of protecting industry from blatant attempts at theft and espionage was appreciated and valued, any overzealous implementation of the EEA against valuable trade partners was seen as counterproductive and ultimately harmful. As a result, the EEA has become a wolf with blunted teeth: legislation was finally on the books, but the desire for full enforcement has been muted at best. This fact, combined with massive advances in technological innovation coming right on the heels of the EEA’s adoption, ultimately proved too sweet a temptation for many countries to pass up: the 21st century has seen an explosion of soft spying. If the EEA got off to a bad start with its conceptualization of ‘‘economic espionage,’’ it certainly did no better defining ‘‘foreign instrumentality.’’ As defined in the EEA: ‘‘Foreign instrumentality’’ means any agency, bureau, ministry, component, institution, association, or any legal, commercial, or business organization, corporation, firm, or entity that is substantially owned, controlled, sponsored, commanded, managed, or dominated by a foreign government.7 Despite that effort, no amount of explicit categorization can overcome the structural reality of the 21st-century global economy: increased attempts by the United States to protect itself legally have resulted in the opacity of state-industrial fusion becoming ever more clouded, this time by design. AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 110 MATTHEW CROSSTON What were initially benign governmental programs meant to help develop young industries soon became confusingly intertwined entities that were nearly impossible to tell apart between company and state. In fact, some particularly adept and aggressive states like China have sought to obfuscate everything—from ownership, to employee lists, management hierarchies, and corporate strategies—ostensibly rendering null and void the EEA’s ‘‘foreign instrumentality’’ clause. International law does not help clear the murky waters of soft spying legislation either. Scholars have tended to focus on United Nations (UN), Resolution 1236 and Resolution 2131, as at least peripherally connecting to proper economic behavior among states. Resolution 1236 discusses the duty of non-intervention in other states’ internal affairs and calls upon all disagreements to be settled in a peaceful manner, while Resolution 2131 deals with the inadmissibility of intervention in the domestic affairs of states and the protection of their sovereignty. 8 Those two resolutions, passed in 1957 and 1965, respectively, were obviously not developed in response to the overwhelming technical interconnectedness of the 21st-century global economy. The scholarly connection of these two resolutions to soft spying comes from the interpretive reach that allows intelligence activities to bypass and largely circumvent the regular domestic legal authorities of most states. As such, they are usually designed to not only not encourage peaceful resolution of disagreements between states but might ultimately be aimed at improperly influencing and negatively impacting domestic affairs. 9 While undeniably true, this is also relatively vague, with no explicit procedures or actionable causes elaborated for law enforcement. As such, the usual criticism levied against international law in general applies here: international law isn’t so much law as perhaps a set of guidelines. While following the guidelines is advisable, what, if any, consequences will occur as a result of a violation of said laws is not necessarily clearly understood. So, while soft spying can technically be framed by the two international unresolutions as a violation of sovereignty and the principles of non-intervention, the empirical problem remains that hardly any states outside of America take such claims seriously.10 Thus, victim states more often than not find themselves arguing in the dark, since establishment of a global business culture that treats economic cyber espionage as akin to more traditional prohibited forms of force and invasion has not been successful. International groups like the World Trade Organization (WTO)—a body that should have a natural alignment in seeing greater progress against soft spying—have to date shown no major prioritization or interest in this objective. The structural rules governing the system continue to hinder progress: in the WTO context, establishing economic espionage as actually violating any specific or explicit WTO agreements INTERNATIONAL JOURNAL OF INTELLIGENCE 111 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 SOFT SPYING has been difficult. The WTO, as does international law, establishes guidelines for members’ operations inside their own territories. But no established procedures impose punishment or enforce such guidelines outside those limits.11 Yet another double-dilemma is manifest in the international sphere: no rules currently protect American companies from corrupt or improper business practices overseas. The United States attempted to self-regulate through the passage of the Foreign Corrupt Practices Act, but even this effort confronts a fundamental structural problem with the global system: very few nations have enacted laws criminalizing the bribing of foreign officials in terms of economic commercial activity. This situation prevails not so much because only America cares about corruption or doesn’t itself engage in economic information collection. Rather, it is a testimony to how prevalent is the focus elsewhere in the world on development at any cost. America’s dominance in terms of technical innovation and corporate long-term strategizing comparatively diminishes nearly every other country. The issue is not so much about how ‘‘provable’’ this is but rather the ‘‘perception’’: most of the world’s countries believe they have little to offer America in terms of intellectual and industrial property worth stealing—at least in comparison to what they consider to be worth stealing from the United States. Paradoxically, in terms of soft spying, this perception is actively encouraged by Americans, as evidenced by former Central Intelligence Agency (CIA) director R. James Woolsey, who infamously stated that only a few areas of European technology surpassed American versions, but that those areas were ‘‘very, very, very small.’’12 As such, the concern for adopting explicit, enforceable, and transparent legal rules to constrain soft spying remains largely undeveloped, even in its primary victim, the United States. While the relevance and potential supra-economic damage possible from soft spying is becoming better-known, the ability to craft legal awareness and security vigilance has been slow to develop. The Subcommittee on Counterterrorism and Intelligence of the U.S. House of Representatives Committee on Homeland Security in the 112th Congress formally expressed a worry that the threat of soft spying could be ‘‘massively undervalued’’ at the present time, largely because so many important thefts, attempts, and corruption cases go unreported. 13 In part, this manifests structural=cultural flaw of American business, which seeks to obsessively hide weakness and let such ‘‘defeats’’ get buried in paperwork that never sees the light of shareholder day. While completely rational from an economic strategy perspective, the practice undermines the legal= security effort to combat those agents=companies=governments looking to take advantage of this flaw. The consequences are severe: the Federal Bureau of Investigation (FBI) has reported a massive increase in weapons AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 112 MATTHEW CROSSTON proliferation wherein items with U.S.-acquired components are being found. This is generally not the result of unscrupulous American companies selling out their patriotism for profits, but rather direct proof of how successful soft spying has become even within the most illicit and taboo activities. The FBI’s disruption of illegal transfers of technology involving weapons of mass destruction has nearly tripled since 2011.14 Of course, how many illegal transfers go undetected for every one that is stopped is disturbingly unknown. As the global economy has entered the cyber age, so too has the American attempt to keep up with it legally. The Deter Cyber Theft Act of 2013 passed by the 113th Congress required the Director of National Intelligence (DNI) to develop a watchlist and a priority watchlist of foreign countries that engage in economic or industrial espionage in cyberspace with respect to the United States.15 Unfortunately, the law itself remains vague, operating more at the level of encouraged action rather than being an explicit procedure of how to enforce and deter potential threats. In this particular case, the Deter Cyber Theft Act doesn’t go much beyond allowing the DNI to determine and identify suspicious countries and foreign actors. Perhaps with unintended humor, the act even specifically mentions that the goal is to distinguish among the ‘‘most egregious’’ perpetrators of economic and industrial espionage, thus opening the door to legal interpretations as to what exactly is or is not ‘‘egregious’’ soft spying.16 In totality, the United States obviously accepts and understands the gravity of economic espionage and its cascade effects that go far beyond industrial profiteering. What America has not been able to do is enact effective legislation that authorizes government agencies to intervene in or change a business culture that seeks to ‘‘handle its own affairs’’ without any governmental intrusion. Not only does American industry at times handcuff the government and the nation’s own security organizations from properly protecting crucial assets, often with an overly cavalier attitude that feigns hyper-vigilance and competence, but previous discussions that considered the possibility of American intelligence proactively ‘‘helping’’ American businesses were apparently deterred by design. This arguably leaves the United States even further exposed and weak in comparison to other countries that have no qualms about using their own intelligence communities for such activity. This might be the time to reopen such discussions and consider if the nation can find a proper role for American soft spying. PROACTIVE INTELLIGENCE AND AMERICAN BUSINESS: NOT EVEN RELUCTANT PARTNERS While the motivation in drafting the EEA was well-intentioned, it has proven to be relatively toothless after nearly two decades of operation. The result has INTERNATIONAL JOURNAL OF INTELLIGENCE 113 SOFT SPYING Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 been an extremely small number of prosecutions and an overemphasis on Chinese activities, even though multiple U.S. intelligence agencies have simultaneously collected substantial data on many other countries that try to engage in soft spying against the United States.17 But this problem is not exclusively dependent on a lack of governmental motivation or a lack of passion on the part of prosecutors. Rather, the true culpability seems to stem from the business community itself, both in terms of the culture with which it is governed and the general rules it likes to play by. According to Aaron Burstein, The goals and design of trade secret law are fundamentally different from national security information regulations. Though the purpose of trade secrets as a legal doctrine is still widely debated, most commentators agree that it helps to order commercial relationships among private parties. Private parties decide whether to treat information under their control as a trade secret. They decide whether to take action to enforce their trade secret rights. None of this changed when the EEA made it a federal crime to misappropriate a trade secret . . . it is doubtful that devoting more prosecutorial resources to using the EEA to define norms for international economic information collection would succeed. The basic problem of economic espionage is that agents act on behalf of principals who stand outside a shared system of formal and informal constraints on their conduct.18 This problem is double-edged. Businesses like to emphasize their need for secrecy and try to minimize damage that could occur from the open transparency of trade theft. Thus, even if soft spying occurs, businesses are more inclined to underreport or non-report it, believing that such action could negatively impact a company’s financial strength and standing. But the more complex and multi-layered deception indicative of the cyber age also means that businesses might not even realize that soft spying has been perpetrated against them until it is far too late: knowing what to look for or understanding what an ‘‘attack’’ looks like is a largely still unrefined business skill across many industries.19 Consequently, the EEA and similar other legislative measures are incomplete: they have set the stage for making soft spying more explicitly illegal but they have made no inroads in better aligning business incentives with the concerns of national security.20 If the United States does not communicate to the private sector a better sense of how many foreign nations invest in economic espionage and how ill-equipped American business is dealing with it on an independent, traditional free-market basis, then the problem of soft spying against America will only increase. President Barack Obama has merely continued what seems to now be American presidential custom: to argue how much trade secret theft AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 114 MATTHEW CROSSTON threatens national security and then develop ‘‘strategic actions’’ that usually encompass the following: Focus diplomatic efforts to protect trade secrets overseas Promote voluntary best practices by private industry to protect trade . Enhance domestic law enforcement operations . Improve domestic legislation 21 . Public awareness and stakeholder outreach Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 . . Obviously, the problem with this approach is its clear acquiescence to the business culture that continues to resist increased government involvement or interaction. Accordingly, formal government strategy utilizes such ambiguous ‘‘action verbs’’ as focus, promote, enhance, and improve: none of these strategies enforces commitment or creates greater legal specificity and explicitness. Thereby arises a possible internal contradiction: domestic legislation will likely not improve any time soon as long as the use of ‘‘best practices’’ across private industry remains a strictly voluntary activity. Nearly two decades have featured legal criticism highlighting how this duality—formal legislation that only ‘‘encourages’’ voluntary participation— ultimately leaves enforcement weakened, if not impotent. And just as Presidents Clinton and George W. Bush before him, Obama has clearly decided to not draw a line in the sand in terms of fighting soft spying. Such a stand becomes most obvious, as David Fidler points out, when a President fails to assert that economic espionage is in fact a violation of international law and that his priority is in achieving ‘‘improved legal frameworks . . . and strong and efficient remedies for trade secret owners.’’22 What’s more, this strategic-legal bipolar tendency is not restricted to the executive branch. William Edelman asserts that the legislative branch of the United States is just as culpable in not remedying these contradictions: In a floor statement introducing amendments [to the EEA], Senator Herb Kohl [D-Wisconsin] explained that the new wording [of his amendments] was designed to ensure that the law ‘‘not apply . . . to foreign corporations when there is no evidence of foreign government-sponsored or coordinated intelligence activity,’’ and he encouraged enforcement agencies to keep this limiting principle in mind when administering the law.23 Time and again the United States has faced a fundamental dilemma when it comes to soft spying: while it recognizes its place of primacy as an object of attack for other countries, it worries that even the impression of overly vigilant prosecution of actual law might end up detrimentally affecting the expansion and prosperity of American industry. American politicians have long tried to walk this extremely fine line, honoring the need for real INTERNATIONAL JOURNAL OF INTELLIGENCE 115 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 SOFT SPYING law with the desire to not hurt industry, but have ultimately landed firmly on the side of business and its innate desire to see less government intrusion, even in regard to laws designed to protect bottom-line industrial interests. Even more damaging is how easily this position has been acknowledged and manipulated by foreign countries that seek to intensify their soft spying efforts against the United States. That the dominant trend in the 21st century global economy, in terms of state-industrial fusion, has been an increasing impenetrability is not coincidental: by structural design states like China, France, Israel, and India make nearly impossible a determination of where state influence begins and industrial independence begins. Thereby, the American legal-political demand for direct evidence of foreign government sponsorship or coordinated intelligence activity is futile: many nations not only purposely bury such explicit connectivity, they have also given ‘‘full legal authority’’ to their intelligence communities to conduct soft spying for economic advantage.24 To wit, an expansive corporate survey conducted in 2005 by ASIS International, the world’s largest professional security association, reported that nearly 70 percent of all compromised information intrusions by foreign entities were intended to benefit their own individuals, firms, and governments.25 In contrast, while clearly having the most powerful and expansive intelligence community in the world, American intelligence efforts basically lack an economic espionage component for the direct benefit of U.S. businesses. Responsibility for this reality rests less on the political motivations of the United States government than on the industrial structural-cultural logic flaws that are unconvincing and counter-productive.26 While America consistently prides itself on being the epitome of the free market, this core belief that the market shall ultimately be the judge, jury, arbiter (and executioner as the case may be) of ideas, products, and services, produces a dismissive attitude that typically shuns government involvement. Unfortunately, this self-assuredness is not matched by an effort to develop an industrial in-house priority to combat soft spying: that capability remains uneven though such heavy control of industry runs counter to the culture of trust and collaboration needed for long-term multi-national economic success. 27 This lack of effort is not solely explained by any devotion to ‘‘purist economic theory.’’ Even in this hyper-cyber age, companies can still be remarkably naı̈ve regarding their own vigilance against soft spying, which is often couched as someone else’s problem and some other industry’s dilemma.28 A marked skill deficiency problem also exists across American industry: Managers, business owners, executives, auditors, and forensic accountants have important roles to play as decision-makers, AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 116 MATTHEW CROSSTON Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 investigators, consultants, expert witnesses and knowledgeable employees in the assault on trade secret piracy. It is important for [any of these people] who work with intellectual property to be able to identify a trade secret, be familiar with reasonable steps to preserve secrecy, be aware of misappropriation methods used to acquire trade secrets, know when to consult legal counsel in a trade secret case, and design and implement a compliance plan to protect an entity’s trade secrets.29 Quite frankly, such highly skilled executive leadership has not yet become common across American industry. So if the U.S. government is operating at a distinct legal disadvantage because of its own compromises and contradictions, then American business also suffers disadvantages because of its own biases and misplaced confidence. An examination of the extent to which foreign states engage in ‘‘high politics’’ to avoid these same problems reveals how steep a hill America has to climb to address this disparity. HIGH POLITICS: EMBRACING SOFT SPYING FOR NATIONAL SECURITY GAIN The reach and pervasiveness of soft spying is difficult to overestimate. A Federal Bureau of Investigation study of 173 countries found that fully 100 had conclusively engaged in attempts to invest significant financial resources in the quest to illegally acquire U.S. technology. Of those, 57 were believed to have conducted physical covert operations against U.S. targets.30 While documentation indicates how the United States seems to make a distinction between economic espionage and traditional intelligence activity, this dichotomy does not seem to matter in other countries. Former heads of both the Central Intelligence Agency (CIA) and FBI have gone on record testifying that France and Russia currently employ methods for economic espionage that are barely different from the traditional methods employed during the Cold War.31 Indeed, soft spying has in some ways become the highest form of politics in the 21st century, replacing military campaigns as the preferred method for acquiring power. As Darren Tucker explains: Economic espionage is perceived by offending states as a lesser offense than political espionage. Many states consider the practice vital to their continued stability and success—to these states, economic spying is a matter of national security. . . . Its practice is considered by many to be vital to state security. The fact that no minimum obligations regarding economic espionage exist at the international level suggests states are reluctant to relinquish sovereignty in this area.32 INTERNATIONAL JOURNAL OF INTELLIGENCE 117 SOFT SPYING Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 But not all that glitters is gold when it comes to soft spying, not even for the most adept and skilled illicit economic collectors. According to Mark Danielson, Superficially, economic espionage has a zero sum outcome: one state’s loss is another’s gain. A broader examination reveals otherwise. It discourages innovation by eroding businesses’ hard-earned competitive advantage. It reduces profitability, forcing businesses to recoup losses by raising costs to consumers. Businesses, already undercut by lower production costs overseas, may not be viable after factoring in the cost of these thefts. Economic espionage unquestionably raises tensions between states and challenges the security and stability of sovereign states.33 And yet, soft spying remains not only viable, it increasingly reigns supreme in the intelligence portfolios of many countries. A brief look at China, the state cited as the most accomplished ‘‘soft spy,’’ will shed light on the continued attraction of economic=industrial espionage. Determining whatever advantages China has accrued will help reveal general principles applicable to other cases. China began formally experimenting with soft spying in the mid-1980s, when it launched its ‘‘863’’ program, designed to acquire and develop biotechnology, space technology, information technology, laser technology, energy technology, and the like.34 Some have argued that China’s program for soft spying has basically resulted in a sort of de facto virtual economic neo-colonialism, where its ‘‘plunder of intellectual property creates a massive global subsidy worth hundreds of billions of dollars to its businesses and people.’’ 35 China thereby succeeds in ‘‘invading’’ the economies of other nations rather than their territories. More importantly, this ‘‘invasion’’ is not aimed at destruction or devastation, but rather in the management, control, and siphoning of another country’s prosperity so as to benefit itself. In some ways China preempted American legislation through its practice of not relying solely on formal government=intelligence agents for the collection of data and information. China has always employed a broad interpretation of the means for foreign intelligence gathering. As a consequence it has relied on regular businesspeople, researchers, faculty, and students to acquire, assemble, and even interpret information.36 Thus, as the United States was dutifully setting prosecutorial boundaries on its legislation so as to prevent undue governmental harassment of the economic sector, China was creating an economic intelligence culture that purposefully blurred the line between government and civilian, between intelligence and business. While acknowledging the extensive damage done to American industry, the brilliant foresight of such a strategy cannot be AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 118 MATTHEW CROSSTON denied: China basically preempted and countered the one area of legal danger it could have encountered even before such legislation was passed in the United States. Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 CHINESE SOFT SPYING: HEGEMONY UNNOTICED To resolve any doubt about the impact of these strategies on the U.S. and whether portraying the massive American economy and consumptive power as disadvantaged, looking no further than Julian Assange, the infamous creator of Wikileaks and considered by most American government circles as an enemy of the state, will attest its accuracy. When asked if the U.S. or China were perpetrators of industrial espionage, Assange tellingly declared that the U.S. is one of the ‘‘victims.’’37 Indeed, the success of China’s soft spying program has allowed it to achieve the hallmark of illicit organized crime: to blur assets and acquisitions so that the entire enterprise becomes at least ‘‘quasi-legal’’ in the eyes of the law and difficult to prosecute. In China, that process goes from outright industrial theft to concentrated emphasis on direct foreign investment Souvik Saha has described the results: Foreign ownership of an American corporation provides a presence for that company’s country in the United States. This creates a potential conduit for leaking American technology, intellectual property, and sensitive information pertaining to critical infrastructure. . . . While China has focused heavily on economic growth through trade partnerships, its success has translated into a dramatic increase in its power potential relative to other countries. In particular, the United States’ lop-sided trade deficit with China endows China with the upper hand in the economic sector, which subsequently provides China financial capital and technical expertise to expand its military capability and political clout.38 China remains the overwhelming empirical counterargument to those who argue about the debilitating economic blowback dangers innate to soft spying: no country engages in soft spying more than China and no country is in a position to more completely challenge American hegemony. While these two statements may not be cause-and-effect, the Chinese strategy for economic development is unquestionably seen as worthy of emulation by many other nations around the world. While China is not yet fully a challenger to American dominance in technical innovation, it has legitimized its corporate presence in America and solidified its place as a primary maintainer of the global economy. Its economic and political power was built largely on the successes it gained through soft spying. And its accomplishment is a more powerful argument to other countries for soft INTERNATIONAL JOURNAL OF INTELLIGENCE 119 SOFT SPYING spying than any theoretical or legal principles offered by the United States against it. THE NEED FOR AN AMERICAN POLICY REVISION Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 America’s military allies are economic adversaries. Refusal to acknowledge that an adversarial trade relationship exists . . . prevents the United States from responding effectively to the competitive challenge [and risks its own national security interest]. —Selig Harrison and Clyde Prestowitz39 That soft spying represents a significant threat to the United States has never been an issue or under question. The debate that continues today is about how best to deal with the problem. Unlike many issues in the increasingly complex 21st century global economy, soft spying doesn’t lend itself to simple fixes revolving around revised legislation or more aggressive prosecution. Soft spying is so difficult to deal with primarily because potential resolutions tends to run contrary to the root of some fundamental American socio-economic structural and cultural values. First, the general separation in America between state and industry doesn’t adhere as strongly in other countries, especially those in the developing world. Principles of American self-reliance and the normal cleansing= correcting purity of the free market creates a deep skepticism and reluctance to rely on government solutions to ‘‘business problems.’’ Second, unfortunately in the context of soft spying, this reluctance to rely on government has not been matched by vigilance, training, and development of advanced skill sets within American industry to protect itself from the increasingly sophisticated economic espionage initiatives of foreign agents and organizations. Third, this backdrop sets the stage for the enactment of uninspired, vague, ambiguous, and non-commital legislation that fails to constrain soft spying in any substantive manner. Just as the attacks on the U.S. of 11 September 2001 (9=11) continue to generate profound discussions about the cost of freedom and how steep a price is to be paid for security, an equally impassioned debate needs to be conducted about soft spying and the relationship between free commerce and legal security. Many fascinating parallels have yet to be investigated in regard to their fullest impact on American civil society. Finally, parallel to the general wariness between business and government is the difficulty in understating the mistrust and near derision expressed when business community leaders are asked if America’s intelligence agencies should proactively engage in economic espionage for the benefit of American industry. Direct cooperation and interaction with the American Intelligence Community is generally considered anathema to best business AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 120 MATTHEW CROSSTON practices and somehow a violation of business ethics. The issue is not so much that the United States does not collect economic information from foreign sources, but rather that this collection is routinely done to enhance the security of American citizens and protect American national security interests. The U.S. does not deny spying on foreign firms and business interests. But it does deny that such spying is done for a particular industrial purpose or for the advancement of specific American industries so that they may be more competitive in the global market.40 Whether that position is fully accepted or exceptions are offered to that general rule, the result still places the United States in a decidedly harmful position, as most of its main competitors in the global market, and all of its main political adversaries, have long since eliminated any such barriers or walls-of-separation between their own intelligence communities and local industries. Simply following those proactively engaged in soft spying may not be the correct path. But not treading that path while simultaneously failing to address the flaws, dilemmas, debates, and contradictions discussed here simply results in the United States being quadruply burdened: its political values, economic principles, laws, and civic culture unfortunately work to its detriment when it comes to soft spying. This is no small thing, as it speaks to more than just bottom-line reports and profit-sharing margins. This gap reflects the overall weakening global position of the United States as economic power becomes ever more influential in political and military rivalries, and soft spying becomes a more prevalent and dominant strategy for foreign intelligence operations. REFERENCES 1 2 3 4 5 6 7 8 9 Karen Sepura, ‘‘Economic Espionage: The Front Line of a New World Economic War,’’ Syracuse Journal of International Law and Commerce, Vol, 26, Fall 1998. National Counterintelligence Center, Annual Report to Congress on Foreign Economic Collection and Industrial Espionage (Washington, DC, 2000). Ibid. U.S. Congress, Economic Espionage Act of 1996, Washington, DC. Mark E. A. Danielson, ‘‘Economic Espionage: A Framework for a Workable Solution,’’ Minnesota Journal of Law, Science, and Technology, Vol. 10, No. 2, 2009. Ibid. U.S. Congress, Economic Espionage Act of 1996. Karen Sepura, ‘‘Economic Espionage: The Front Line of a New World Economic War.’’ Ibid. INTERNATIONAL JOURNAL OF INTELLIGENCE 121 SOFT SPYING Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 10 David P. Fidler, ‘‘Economic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies,’’ ASIL Insights, Vol. 17, No. 10, 2013. 11 Ibid. 12 Michael Mosier, ‘‘Causes of Action for Foreign Victims of Economic Espionage Abroad by US Intelligence,’’ Duke Journal of Comparative and International Law, Vol. 11, 2001. 13 112th U.S. Congress, Economic Espionage: A Foreign Intelligence Threat to American Jobs and Homeland Security, Subcommittee on Counterterrorism and Intelligence of the Committee on Homeland Security, House of Representatives, 28 June 2012, Serial No 112–101. 14 Ibid. 15 113th U.S. Congress, Deter Cyber Theft Act 2013, United States Senate, S. 884. 16 Ibid. 17 Aaron J. Burstein, ‘‘Trade Secrecy as an Instrument of National Security? Rethinking the Foundations of Economic Espionage,’’ Institute for Information Infrastructure Protection Program, Dartmouth College, Hanover, New Hampshire, 2009. 18 Ibid., pp. 34–42. 19 Ibid. 20 Ibid. 21 David P. Fidler, ‘‘Economic Cyber Espionage and International Law.’’ 22 Ibid. 23 William J. Edelman, ‘‘The ‘Benefit’ of Spying: Defining the Boundaries of Economic Espionage Under the Economic Espionage Act of 1996,’’ Stanford Law Review, No. 447, 2011. 24 Georgetown University Law Center, ‘‘From Goldfinger to Butterfinger: The Legal and Policy Issues Surrounding Proposals to Use the CIA for Economic Espionage,’’ Law and Policy in International Business, 1995. 25 Mark E. A. Danielson, Economic Espionage: A Framework for a Workable Solution. 26 Georgetown University Law Center, ‘‘From Goldfinger to Butterfinger: The Legal and Policy Issues Surrounding Proposals to Use the CIA for Economic Espionage.’’ 27 Anonymous, ‘‘Who Needs Cyber Spying? Corporate Espionage,’’ The Economist, 23 February 2013. 28 Ibid. 29 Carl J. Pacini, Raymond Placid, and Christine Wright-Isak, ‘‘Fighting Economic Espionage with State Trade Secret Laws,’’ International Journal of Law and Management, Vol. 50, No. 3, 2008, p. 131. 30 Darren S. Tucker, ‘‘The Federal Government’s War on Economic Espionage,’’ University of Pennsylvania Journal of International Economic Law, Vol. 18, No. 3, 1997. AND COUNTERINTELLIGENCE VOLUME 28, NUMBER 1 122 MATTHEW CROSSTON 31 Ibid. Mark E. A. Danielson, ‘‘Economic Espionage: A Framework for a Workable Solution.’’ 33 Ibid. 34 Mark A. Frazzetto, Protecting Against Economic Espionage: Trade Secrets, Standards, and Criminal Liability (Loyola University of Chicago School of Law, 2010). 35 Ibid. 36 James A. Lewis, ‘‘China’s Economic Espionage: Why it Worked in the Past but Won’t in the Future,’’ Center for Strategic and International Studies, 13 November 2012. 37 Souvik Saha, ‘‘CFIUS Now Made in China: Dueling National Security Review Frameworks as a Countermeasure to Economic Espionage in the Age of Globalization,’’ Northwestern Journal of International Law & Business, Vol, 33, 2010, pp. 201–207. 38 Ibid. 39 Quoted in Stanley Kober, ‘‘The CIA as Economic Spy: The Misuse of US Intelligence after the Cold War,’’ Cato Institute Policy Analysis, No. 185, 1992. 40 Jack Goldsmith, ‘‘Reflections on US Economic Espionage, Post-Snowden,’’ Lawfareblog, 10 December 2013. Downloaded by [Dr. Matthew Crosston] at 11:39 24 November 2014 32 INTERNATIONAL JOURNAL OF INTELLIGENCE