SlideShare a Scribd company logo
1 of 8
Download to read offline
JAVERS    Espionage Exposed




Secrets and Lies
The Rise of Corporate Espionage in a Global Economy

Eamon Javers
   In 2008, thousands of employees at American defense               Eamon Javers is a
                                                                     Washington         corre-
and technology companies received emails from an exec-               spondent for CNBC
utive-recruiting firm based in Tokyo called Fox Adams.               and author of the book
                                                                     Broker, Trader, Lawyer, Spy:
The correspondence hinted at lucrative job opportunities             The Secret World of Corpo-
                                                                     rate Espionage.
and urged the employees to reply with contact information.
However, there was something wrong with the email: Fox
Adams did not exist.
   Security experts and veteran U.S. intelligence agents
examined the issue and concluded that Fox Adams was sim-
ply a front for Chinese intelligence.1 According to these
authorities, the spam emails were part of a very wide net
cast by the Chinese to help identify American executives
with access to sensitive technologies. Under the guise of a
job interview, anyone who replied to the email would likely
be quizzed for details about his or her work, access to tech-
nology, and experience. Several veteran U.S. intelligence
officers described the Fox Adams ploy as a routine Chinese
intelligence probe of U.S. corporate infrastructure, some-
thing they say has been on the rise in recent years as the
Beijing government attempts to steal technology and infor-


                                                                Winterr/Spring 2011 [ 53]
SECRETS AND LIES




mation that can help keep the country’s               credentials, the Mattel market intel-
astonishing economic growth on pace                   ligence employees allegedly used spy
with aggressive government goals.                     cameras to film secret demonstration
   All of this means that American                    models of toys that rival companies
corporate executives must be increas-                 planned to launch. Mattel said there
ingly guarded against spying by current               was no merit to the charges, which came
employees, former employees, com-                     in the course of a long-running litiga-
puter hackers, and the full gamut of                  tion battle over which company should
Cold War-style intelligence techniques.               hold the rights to the Bratz dolls.
                                                         In the second category—financial


It was this wave of Chinese hacking
attacks that finally drove Google into the arms
of the U.S. National Security Agency.
Forms of Corporate Espionage. firms gathering information to use in
                                                      market trading—corporate spy orga-
China is not the only perpetrator.
                                                      nizations operate around the globe,
Corporate espionage can be separat-
                                                      working for Wall Street, hedge funds,
ed into three broad categories: spying
                                                      and wealthy individuals. In one case,
practiced by companies, by financial
                                                      a private spy firm even flew aerial sur-
firms, and by nations.
                                                      veillance missions for the notorious
   An example of the first category of                energy-trading firm Enron.
corporate espionage—companies spy-                       This private spy firm was Diligence, a
ing against other companies in order                  company founded by two former intel-
to harm competitors—came to light                     ligence officers (one previously worked
late this summer. MGA Entertainment                   for the CIA, the other for British
Inc., the maker of the wildly popular                 MI5). In the early 2000s, Diligence
Bratz line of toy dolls, filed docu-                  was hired by Enron to develop infor-
ments in federal court alleging that                  mation about the European power
rival Mattel Inc. maintained an inter-                industry that might prove advantageous
nal “market intelligence” unit whose                  in Enron’s daily buying and selling of
members traveled the country under                    energy contracts. However, Diligence
fake identities, gaining entrance to                  operatives didn’t scour trade publica-
confidential product briefings by pos-                tions and interview experts, as a typical
ing as potential customers of rival toy               consulting firm might have; instead,
makers.2 There, with their cover stories              the spies-for-hire set up thermal imag-
backstopped by fake business cards and                ing equipment in fields around some


[ 5 4 ] Georgetown Journal of International Affairs
JAVERS    Espionage Exposed


of Europe’s biggest power plants.3 They    agents have tried to steal American
used the data to develop a comprehen-      hybrid car technology, insecticide
sive, real-time look at the production     manufacturing techniques, and—in the
of energy being sold into the market.      most high profile case to date—the
The more energy being moved into the       cyber secrets of the search-engine giant
market, the lower prices would be. The     Google.
less energy, the higher prices would be.      In order to keep their economic
That is invaluable information for an      growth miracle going, the Chinese are
energy trader like Enron.                  trying to move up the manufacturing
   Diligence did not stop with thermal     food chain, evolving from low-cost
imaging. Veteran CIA officer and co-       providers of unskilled labor to pro-
founder Mike Baker chartered private       ducers of more technically complicated
airplanes and flew surveillance missions   goods at higher price points.6 Since
over the power plants, looking for signs   the United States is far ahead in a wide
of when the plants might be taken off      array of industries, one way to catch
line for maintenance.4 A power plant       up is to steal the plans, formulas, and
shutting down has a dramatic effect        algorithms that allow American com-
on supply and demand in the market,        panies to dominate world markets. If
and pinpointing the dates of such a        the Chinese can steal such secrets faster
shutdown in advance could yield arbi-      than Americans can develop new ones,
trage opportunities for Enron. Baker       they will close the gap between the
relentlessly circled the plants, look-     two economies. Andrew Arena, Special
ing for declining coal stacks—because      Agent in Charge of the FBI office in
the power companies would not order        Detroit that conducted one investiga-
more coal in advance of a shut down.       tion into Chinese corporate espionage,
The planes even searched for port-o-       noted that “theft of trade secrets is a
potties being set up on the property       threat to national security,” demon-
since annual maintenance can involve a     strating the U.S. government’s concern
large number of workers.5 By watching      with these intrusions.7
for such mundane details, Diligence           In secret diplomatic cables revealed
was able to spot trading opportunities     by the website Wikileaks in late 2010,
in the market.                             American diplomats in Beijing con-
   The last category of corporate espio-   cluded that the electronic attacks on
nage—nations spying on companies—          Google’s home servers to obtain the
can be difficult to prove. Government      identities of Chinese dissidents and
intelligence agencies operate behind       Google’s proprietary source code had
layers of plausible deniability. The       been ordered at the highest level of the
bogus Fox Adams emails were ham-           Chinese government. In one cable, the
fisted in comparison to a slew of recent   diplomats said they had a well-placed
cases in which Chinese-connected           source who said that Li Changchun, a


                                                                 Winter/Spring 2011 [ 55]
SECRETS AND LIES




member of China’s Politburo Standing                  motivated by politics, it highlights the
Committee, had been shocked to find                   willingness of foreign countries—and
negative information about himself                    China in particular—to resort to illegal
when he Googled his own name on                       activities in order to collect the secrets
the Chinese language version of the                   of private companies.
search engine’s website. Another cable                   If it is any consolation to Western
revealed that Mr. Li was a key leader in              intelligence, Chinese economic espio-
China’s anti-Google efforts, and that                 nage is not always flawless. Fox Adams,
his self-Googling likely led to his inter-            the bogus executive recruiting firm
est in the company.8                                  experts suspected of being a front
   The effort was part of a wider cam-                for Chinese intelligence, made some
paign of corporate espionage against                  noticeable mistakes. Emails coming
American companies and government                     from purported “Fox Adams” recruit-
agencies that began as early as 2002,                 ers used names that looked like they
the American cable-writers concluded.                 had been randomly mixed and matched
Particularly vulnerable were Chinese                  from American phone books—and by
subsidiaries of non-Chinese compa-                    someone with little feel for American
nies, whose local executives were often               culture. One email was signed by a
afraid to inform their Western bosses                 recruiter supposedly named “Jesus
about the extent of Chinese govern-                   Black.” The Internet domain regis-
ment meddling. “Contacts in the tech-                 tration for the website www.foxadams.
nology industry tell us that Chinese                  com was listed to a New Jersey address
interference in the operations of for-                that does not seem to exist. The phone
eign businesses is widespread and often               number listed was “1-234-5678.”11
underreported to U.S. parent compa-
nies,” reported one U.S. diplomat.9                   The Rise of Private Intelligence
   It was this wave of Chinese hack-                  Firms. Corporate intelligence gath-
ing attacks that finally drove Google                 ering has created a new market for a
into the arms of the U.S. National                    rising class of private espionage firms—
Security Agency, announcing a part-                   companies set up by veterans of the
nership with the American techno-                     world’s intelligence agencies that sell
logical spy agency to help Google fend                their services on a contract basis to
off intrusion attempts.10 For Google,                 companies and financial firms. In the
as for many companies, one option                     21st Century, companies and financial
when faced with government-funded                     firms have a greater need for infor-
spying is to team up with another gov-                mation than ever and—particularly in
ernment. Even in a global economy,                    emerging markets—the best providers
it seems, companies sometimes have                    of that information are former intel-
to choose sides. Although it appears                  ligence officers who are deeply steeped
that the Google incident was partially


[ 5 6 ] Georgetown Journal of International Affairs
JAVERS    Espionage Exposed


in the leadership and politics of a given    freelancers, each layer papered with
country and intimately familiar with its     strict non-disclosure agreements.
local powerbrokers.                             In public, they describe their services
   There is nothing wrong with compa-        as “strategic advisory consulting,” “risk
nies turning to such intelligence advi-      mitigation analysis,” or “litigation sup-
sors for information on potential new        port.” With names like “Diligence,”
business partners and advice on the          “Control Risks Group,” and “Hakluyt,”
political landscape in unfamiliar coun-      these private intelligence firms hide in
tries, but there is enormous poten-          plain sight, offering extremely lucra-
tial for abuse by corporate intelligence     tive post-government career options
firms. The ways in which they gather         for veterans of the CIA, the British
information can wander into a legal          MI5, and the former Soviet intelli-
gray area, and their offensive opera-        gence agency, the KGB.
tions—efforts to damage competitors             The industry’s growth is driven by
through underhanded tactics includ-          several trends. The increased globaliza-

The corporate espionage industry is
deliberately hidden in a thicket of
complex relationships.
ing surveillance, placing of operatives      tion of commerce has created a demand
inside competitors’ firms, and other         for companies to understand the rela-
techniques the companies would be            tionships between business and politi-
embarrassed to admit in public—can           cal elites in countries they often know
deprive legitimate businesses of oppor-      little about. Who better to help piece
tunities to succeed.                         together the puzzle than the men and
   Indeed, the corporate espio-              women who spent their careers gath-
nage industry is deliberately hidden         ering the same information for their
in a thicket of complex relationships        governments?
designed to obscure just who is work-            And, of course, there is the romance
ing for whom. Often, these firms are         of it all. Globe-hopping corporate
hired as subcontractors for corporate        executives sometimes cannot resist
law firms and they argue that everything     the glamour of the spy business. The
they do is covered by attorney-client        romance factor is often implicit in
privilege.12 Thus, their operations do       the spies’ sales pitches to prospec-
not surface to the public. In other          tive clients. In 2001, for example,
cases, these private spy firms protect the   former British secret intelligence ser-
secrecy of their operations around the       vice officer Christopher James wrote
world by using a series of cutouts and       to Enron executive Jeff Skilling, hop-


                                                                    Winter/Spring 2011 [ 57 ]
SECRETS AND LIES




ing to land Skilling as a new client of     cies have a vested interest in know-
his London-based private intelligence       ing where such people are employed
firm, Hakluyt. “Dear Mr. Skilling,”         and they should therefore track that
he wrote, “Your office has asked me to      information. Retired spies working in
outline Hakluyt’s services. … I would       corporate espionage are not motivated
simply say this: Hakluyt is what you        by love of country any longer; they are
make of it—it places an unparalleled        motivated by love of money. When the
private intelligence network at the per-    spies have taken their skills and gone
sonal disposal of senior commercial         to work for paying clients, the govern-
figures.” 13                                ments that trained them with taxpayer
                                            money should monitor their activities
Responding to Corporate to make sure that they are not deploy-
Espionage. What is astonishing about ing those skills in ways that undermine
this private spy industry is how little the the very governments that provided
                                            them.

What is astonishing about this
private spy industry is how little the U.S.
government seems to know about it.
U.S. government seems to know about                      What is more, Western governments
it. The CIA says it does not know where               should be working harder to learn just
its former agents are working today                   how intertwined their intelligence ser-
and argues that tracking where they are               vices are with companies in the global
employed would violate the civil rights of            economy. American intelligence agen-
those agents; it surely behooves the U.S.             cies, for example, have long had a policy
intelligence community to have some                   stating that their operatives are allowed
sense of where its alumni are plying their            to “moonlight” in their off hours and
trade, however, and whose payrolls they               work for private sector firms.15 That
join when they enter the private sector.14
                                                      is, active duty intelligence officers,
    The CIA and similar organizations
                                                      including those of the CIA, are allowed
should know where their alumni work,
                                                      to work for private companies in order
particularly when they are being hired
                                                      to make extra money. This creates a
by foreign governments, oligarchs, and
                                                      conflict of interest; agents who have
political parties. Some of the infor-
                                                      access to classified materials of national
mation is not difficult to come by;
                                                      security are also working with pri-
the websites of some of the private
                                                      vate firms that sometimes engage in
intelligence firms are a handy place
                                                      questionable practices and undermine
to start. Western intelligence agen-
                                                      or violate domestic and international


[ 5 8 ] Georgetown Journal of International Affairs
JAVERS    Espionage Exposed


laws. But even intelligence commu-          between Western companies can
nity leaders profess ignorance of the       include unethical and even illegal tac-
entire moonlighting system. In pub-         tics, resulting in economic victories
lic testimony, Director of National         for the most underhanded firms, not
Intelligence Dennis Blair said he had       necessarily for the most innovative.
been surprised when the moonlight-          That is bad for capitalism. Corporate
ing was first revealed in the media.        espionage by financial firms results in
“Sometimes I too am surprised about         a transfer of information—and huge
what I read in the press about my own       financial rewards—into the hands of
organization,” Blair told Congress in       the most powerful and wealthy, rob-
February.16                                 bing average investors of a chance to
   As of fall 2010, the Director of         participate in the benefits of the finan-
National Intelligence has promised that     cial markets. That too, is damaging to
a full review of such moonlighting          the market economy, causing market
will be completed and turned over to        participants to conclude that the system
Congress.17 That is a promising first       is stacked against them. Markets only
step, but the American taxpayers need       work best when all players—large and
to know much more about the moon-           small—have confidence that the rules
lighting habits of their intelligence       are fair.
officers. How often, for example, are          Finally, Western intelligence agen-
active duty officers going to work for      cies must ratchet up their counter-
intelligence contractors—effectively        intelligence capabilities in the eco-
forcing the taxpayer to pay twice for the   nomic space. The intelligence com-
same work?                                  munity needs to focus on the threat to
   American executives, too, need to        American global economic dominance
educate themselves on the range of cor-     that comes from Chinese economic
porate espionage tactics arrayed against    espionage. One of the United States’
them. Unfortunately, the best way for       greatest advantages in its competition
them to do that right now is to reach       with China is its corporate ingenu-
out to some of the very private spy firms   ity, inventiveness, and sophistication.
that are already in the corporate espio-    If Chinese intelligence is able to chip
nage business. Companies would be           away at that advantage though corpo-
well advised to create internal monitor-    rate espionage techniques, it will do as
ing units so that they can increase their   much or more for China’s position in
ability to recognize and respond to         the world than traditional spying on
corporate espionage. Some firms have        America’s military capabilities or polit-
already implemented these practices,        ical leadership. Corporate espionage
but these are few and far between.          against the United States is one of many
   At its worst, corporate espionage        tools that China uses in its effort to


                                                                  Winter/Spring 2011 [ 59]
SECRETS AND LIES




undermine America’s position as the                      the position. This is a far deeper threat
number-one economy on the planet,                        to free-market capitalism and is why
and to take for itself the geopolitical                  America’s counter-intelligence effort
power and influence that comes with                      had better be up to the challenge.
                                                     NOTES

    1 Eamon Javers. Anonymous interview, July            ing by a China Fearful of the Web,” The New York
2009.                                                    Times, 4 December 2010.
    2 Jonathan Stempel and Dan Levine, “Mat-                 9 “A Selection from the Cache of Diplomatic
tel accused in Bratz battle of spying on rivals,”        Dispatches,” Internet, http://www.nytimes.com/
Internet, http://www.reuters.com/article/idUS-           interactive/2010/11/28/world/20101128-cables-
TRE67G4FZ20100817 (date accessed: 17 August              viewer.html#report/china-99BEIJING999 (date
2010).                                                   accessed 5 December 2010).
    3 Eamon Javers, Broker, Trader, Lawyer, Spy: The         10 Ellen Nakashima, “Google to Enlist NSA to
Secret World of Corporate Espionage (New York: Harper-   help it Ward off Cyber Attacks,” The Washington
Collins Publishers, 2010) 18.                            Post, 4 February 2010.
    4 Ibid.                                                  11 See supra note 1
    5 Ibid.                                                  12 Eamon Javers, Broker, Trader, Lawyer, Spy: The
    6 Li Cui and Murtaza Syed, “IMF Working
                                                         Secret World of Corporate Espionage (New York: Harper-
Paper: The Shifting Structure of China’s Trade
and Production,” Internet, http://books.google.          Collins Publishers, 2010), 265.
com/books?hl=en&lr=&id=dADHBsFWJLQC&oi=                      13 Archived Enron emails available at the web-
fnd&pg=PA3&dq=Chinese+economy+more+sophis                site of the Federal Energy Regulatory Commission:
ticated+manufacturing&ots=FBaAzl5ZPY&sig=7uC             http://www.ferc.gov/industries/electric/indus-act/
-JIlzZD5igh1Bm1xtcBjQB34#v=onepage&q&f=false             wec/enron/info-release.asp.
(date accessed: September 2007).                             14 Interview by the author with CIA public
    7 The Associated Press, “Ex-General Motors           affairs office, 2009.
worker, husband accused of stealing hybrid vehicle           15 Eamon Javers, “CIA moonlights in corpo-
secrets,” Internet, http://www.mlive.com/auto/           rate world,” Politico, 1 February 2010.
index.ssf/2010/07/ex-general_motors_worker_                  16 Kasie Hunt, “CIA Moonlighting to be Inves-
husba.html (date accessed: 23 July 2010).                tigated,” Politico, 3 February 2010.
    8 James Glanz and John Markoff, “Vast Hack-              17 Ibid.




[ 6 0] Georgetown Journal of International Affairs

More Related Content

Similar to Secrets and Lies The Rise of Corporate Espionage in a Global Economy

Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresJason Fernandes
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous HackersVinuammu
 
Corporate Espionage "Pharma Industry at Risk"
Corporate Espionage "Pharma Industry at Risk" Corporate Espionage "Pharma Industry at Risk"
Corporate Espionage "Pharma Industry at Risk" jsnyder40
 
germany chancellor
germany chancellorgermany chancellor
germany chancellorAli J
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowAbdullah Khosa
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftOlivia Farrow
 
PresentaciĂłn3
PresentaciĂłn3PresentaciĂłn3
PresentaciĂłn3Mikecdr
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Dr. Tim Dosemagen
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageIRJET Journal
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
The Defense Industry Under Attack
The Defense Industry Under AttackThe Defense Industry Under Attack
The Defense Industry Under AttackBooz Allen Hamilton
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)Neeraj Mahajan
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxsmile790243
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Scueto77
 

Similar to Secrets and Lies The Rise of Corporate Espionage in a Global Economy (20)

Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
File000095
File000095File000095
File000095
 
Corporate Espionage "Pharma Industry at Risk"
Corporate Espionage "Pharma Industry at Risk" Corporate Espionage "Pharma Industry at Risk"
Corporate Espionage "Pharma Industry at Risk"
 
germany chancellor
germany chancellorgermany chancellor
germany chancellor
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs Microsoft
 
PresentaciĂłn3
PresentaciĂłn3PresentaciĂłn3
PresentaciĂłn3
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate Espionage
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
The Defense Industry Under Attack
The Defense Industry Under AttackThe Defense Industry Under Attack
The Defense Industry Under Attack
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
 

More from Errol A. Adams, J.D., M.L.S.

Digital Nightmares: Accessing the Technology
Digital Nightmares: Accessing the TechnologyDigital Nightmares: Accessing the Technology
Digital Nightmares: Accessing the TechnologyErrol A. Adams, J.D., M.L.S.
 
Social Media and Learning in an Era of Digital Natives
Social Media and Learning in an Era of Digital NativesSocial Media and Learning in an Era of Digital Natives
Social Media and Learning in an Era of Digital NativesErrol A. Adams, J.D., M.L.S.
 
An Intro to Writing & Publication for Legal Scholarly Authors
An Intro to Writing & Publication for Legal Scholarly AuthorsAn Intro to Writing & Publication for Legal Scholarly Authors
An Intro to Writing & Publication for Legal Scholarly AuthorsErrol A. Adams, J.D., M.L.S.
 
Establishment and Application of Competitive Systems in mobile Devices
Establishment and Application of Competitive Systems in  mobile DevicesEstablishment and Application of Competitive Systems in  mobile Devices
Establishment and Application of Competitive Systems in mobile DevicesErrol A. Adams, J.D., M.L.S.
 
Information Quality Resources on The Internet
Information Quality Resources on The InternetInformation Quality Resources on The Internet
Information Quality Resources on The InternetErrol A. Adams, J.D., M.L.S.
 
The Mediating Effect of Cognitive Social Capital...
The Mediating Effect of Cognitive Social Capital...The Mediating Effect of Cognitive Social Capital...
The Mediating Effect of Cognitive Social Capital...Errol A. Adams, J.D., M.L.S.
 
Competitive Intelligence: A Selective Resource Guide - Completely Updated - D...
Competitive Intelligence: A Selective Resource Guide - Completely Updated - D...Competitive Intelligence: A Selective Resource Guide - Completely Updated - D...
Competitive Intelligence: A Selective Resource Guide - Completely Updated - D...Errol A. Adams, J.D., M.L.S.
 
2020 Future Work Skills" by Institute of the Future (pdf)
2020 Future Work Skills" by Institute of the Future (pdf)2020 Future Work Skills" by Institute of the Future (pdf)
2020 Future Work Skills" by Institute of the Future (pdf)Errol A. Adams, J.D., M.L.S.
 
AALL's Spectrum Article Records Management....
AALL's Spectrum Article Records Management....AALL's Spectrum Article Records Management....
AALL's Spectrum Article Records Management....Errol A. Adams, J.D., M.L.S.
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesErrol A. Adams, J.D., M.L.S.
 

More from Errol A. Adams, J.D., M.L.S. (20)

Digital Nightmares: Accessing the Technology
Digital Nightmares: Accessing the TechnologyDigital Nightmares: Accessing the Technology
Digital Nightmares: Accessing the Technology
 
Social Media and Learning in an Era of Digital Natives
Social Media and Learning in an Era of Digital NativesSocial Media and Learning in an Era of Digital Natives
Social Media and Learning in an Era of Digital Natives
 
HASHTAG!
HASHTAG!HASHTAG!
HASHTAG!
 
An Intro to Writing & Publication for Legal Scholarly Authors
An Intro to Writing & Publication for Legal Scholarly AuthorsAn Intro to Writing & Publication for Legal Scholarly Authors
An Intro to Writing & Publication for Legal Scholarly Authors
 
Establishment and Application of Competitive Systems in mobile Devices
Establishment and Application of Competitive Systems in  mobile DevicesEstablishment and Application of Competitive Systems in  mobile Devices
Establishment and Application of Competitive Systems in mobile Devices
 
Information Quality Resources on The Internet
Information Quality Resources on The InternetInformation Quality Resources on The Internet
Information Quality Resources on The Internet
 
LLAGNY's 65 YEARS A TIMELINE
LLAGNY's 65 YEARS A TIMELINELLAGNY's 65 YEARS A TIMELINE
LLAGNY's 65 YEARS A TIMELINE
 
LLAGNY's 65 years A Timeline
LLAGNY's 65 years A TimelineLLAGNY's 65 years A Timeline
LLAGNY's 65 years A Timeline
 
The Mediating Effect of Cognitive Social Capital...
The Mediating Effect of Cognitive Social Capital...The Mediating Effect of Cognitive Social Capital...
The Mediating Effect of Cognitive Social Capital...
 
Competitive Intelligence: A Selective Resource Guide - Completely Updated - D...
Competitive Intelligence: A Selective Resource Guide - Completely Updated - D...Competitive Intelligence: A Selective Resource Guide - Completely Updated - D...
Competitive Intelligence: A Selective Resource Guide - Completely Updated - D...
 
2020 Future Work Skills" by Institute of the Future (pdf)
2020 Future Work Skills" by Institute of the Future (pdf)2020 Future Work Skills" by Institute of the Future (pdf)
2020 Future Work Skills" by Institute of the Future (pdf)
 
AddThis Sharing Trends: Infographic
AddThis Sharing Trends: InfographicAddThis Sharing Trends: Infographic
AddThis Sharing Trends: Infographic
 
"...Court orders service by email..."
"...Court orders service by email...""...Court orders service by email..."
"...Court orders service by email..."
 
Infographic on QR Usage in Legal Marketing
Infographic on QR Usage in Legal MarketingInfographic on QR Usage in Legal Marketing
Infographic on QR Usage in Legal Marketing
 
Social Media Legal Infographic
Social Media Legal InfographicSocial Media Legal Infographic
Social Media Legal Infographic
 
Competitive intelligence, How to get it...
Competitive intelligence, How to get it...Competitive intelligence, How to get it...
Competitive intelligence, How to get it...
 
AALL's Spectrum Article Records Management....
AALL's Spectrum Article Records Management....AALL's Spectrum Article Records Management....
AALL's Spectrum Article Records Management....
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
 
Good Social-Networking-Users
Good Social-Networking-UsersGood Social-Networking-Users
Good Social-Networking-Users
 
Legal Research Methodology
Legal Research MethodologyLegal Research Methodology
Legal Research Methodology
 

Recently uploaded

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 

Recently uploaded (20)

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 

Secrets and Lies The Rise of Corporate Espionage in a Global Economy

  • 1. JAVERS Espionage Exposed Secrets and Lies The Rise of Corporate Espionage in a Global Economy Eamon Javers In 2008, thousands of employees at American defense Eamon Javers is a Washington corre- and technology companies received emails from an exec- spondent for CNBC utive-recruiting firm based in Tokyo called Fox Adams. and author of the book Broker, Trader, Lawyer, Spy: The correspondence hinted at lucrative job opportunities The Secret World of Corpo- rate Espionage. and urged the employees to reply with contact information. However, there was something wrong with the email: Fox Adams did not exist. Security experts and veteran U.S. intelligence agents examined the issue and concluded that Fox Adams was sim- ply a front for Chinese intelligence.1 According to these authorities, the spam emails were part of a very wide net cast by the Chinese to help identify American executives with access to sensitive technologies. Under the guise of a job interview, anyone who replied to the email would likely be quizzed for details about his or her work, access to tech- nology, and experience. Several veteran U.S. intelligence officers described the Fox Adams ploy as a routine Chinese intelligence probe of U.S. corporate infrastructure, some- thing they say has been on the rise in recent years as the Beijing government attempts to steal technology and infor- Winterr/Spring 2011 [ 53]
  • 2. SECRETS AND LIES mation that can help keep the country’s credentials, the Mattel market intel- astonishing economic growth on pace ligence employees allegedly used spy with aggressive government goals. cameras to film secret demonstration All of this means that American models of toys that rival companies corporate executives must be increas- planned to launch. Mattel said there ingly guarded against spying by current was no merit to the charges, which came employees, former employees, com- in the course of a long-running litiga- puter hackers, and the full gamut of tion battle over which company should Cold War-style intelligence techniques. hold the rights to the Bratz dolls. In the second category—financial It was this wave of Chinese hacking attacks that finally drove Google into the arms of the U.S. National Security Agency. Forms of Corporate Espionage. firms gathering information to use in market trading—corporate spy orga- China is not the only perpetrator. nizations operate around the globe, Corporate espionage can be separat- working for Wall Street, hedge funds, ed into three broad categories: spying and wealthy individuals. In one case, practiced by companies, by financial a private spy firm even flew aerial sur- firms, and by nations. veillance missions for the notorious An example of the first category of energy-trading firm Enron. corporate espionage—companies spy- This private spy firm was Diligence, a ing against other companies in order company founded by two former intel- to harm competitors—came to light ligence officers (one previously worked late this summer. MGA Entertainment for the CIA, the other for British Inc., the maker of the wildly popular MI5). In the early 2000s, Diligence Bratz line of toy dolls, filed docu- was hired by Enron to develop infor- ments in federal court alleging that mation about the European power rival Mattel Inc. maintained an inter- industry that might prove advantageous nal “market intelligence” unit whose in Enron’s daily buying and selling of members traveled the country under energy contracts. However, Diligence fake identities, gaining entrance to operatives didn’t scour trade publica- confidential product briefings by pos- tions and interview experts, as a typical ing as potential customers of rival toy consulting firm might have; instead, makers.2 There, with their cover stories the spies-for-hire set up thermal imag- backstopped by fake business cards and ing equipment in fields around some [ 5 4 ] Georgetown Journal of International Affairs
  • 3. JAVERS Espionage Exposed of Europe’s biggest power plants.3 They agents have tried to steal American used the data to develop a comprehen- hybrid car technology, insecticide sive, real-time look at the production manufacturing techniques, and—in the of energy being sold into the market. most high profile case to date—the The more energy being moved into the cyber secrets of the search-engine giant market, the lower prices would be. The Google. less energy, the higher prices would be. In order to keep their economic That is invaluable information for an growth miracle going, the Chinese are energy trader like Enron. trying to move up the manufacturing Diligence did not stop with thermal food chain, evolving from low-cost imaging. Veteran CIA officer and co- providers of unskilled labor to pro- founder Mike Baker chartered private ducers of more technically complicated airplanes and flew surveillance missions goods at higher price points.6 Since over the power plants, looking for signs the United States is far ahead in a wide of when the plants might be taken off array of industries, one way to catch line for maintenance.4 A power plant up is to steal the plans, formulas, and shutting down has a dramatic effect algorithms that allow American com- on supply and demand in the market, panies to dominate world markets. If and pinpointing the dates of such a the Chinese can steal such secrets faster shutdown in advance could yield arbi- than Americans can develop new ones, trage opportunities for Enron. Baker they will close the gap between the relentlessly circled the plants, look- two economies. Andrew Arena, Special ing for declining coal stacks—because Agent in Charge of the FBI office in the power companies would not order Detroit that conducted one investiga- more coal in advance of a shut down. tion into Chinese corporate espionage, The planes even searched for port-o- noted that “theft of trade secrets is a potties being set up on the property threat to national security,” demon- since annual maintenance can involve a strating the U.S. government’s concern large number of workers.5 By watching with these intrusions.7 for such mundane details, Diligence In secret diplomatic cables revealed was able to spot trading opportunities by the website Wikileaks in late 2010, in the market. American diplomats in Beijing con- The last category of corporate espio- cluded that the electronic attacks on nage—nations spying on companies— Google’s home servers to obtain the can be difficult to prove. Government identities of Chinese dissidents and intelligence agencies operate behind Google’s proprietary source code had layers of plausible deniability. The been ordered at the highest level of the bogus Fox Adams emails were ham- Chinese government. In one cable, the fisted in comparison to a slew of recent diplomats said they had a well-placed cases in which Chinese-connected source who said that Li Changchun, a Winter/Spring 2011 [ 55]
  • 4. SECRETS AND LIES member of China’s Politburo Standing motivated by politics, it highlights the Committee, had been shocked to find willingness of foreign countries—and negative information about himself China in particular—to resort to illegal when he Googled his own name on activities in order to collect the secrets the Chinese language version of the of private companies. search engine’s website. Another cable If it is any consolation to Western revealed that Mr. Li was a key leader in intelligence, Chinese economic espio- China’s anti-Google efforts, and that nage is not always flawless. Fox Adams, his self-Googling likely led to his inter- the bogus executive recruiting firm est in the company.8 experts suspected of being a front The effort was part of a wider cam- for Chinese intelligence, made some paign of corporate espionage against noticeable mistakes. Emails coming American companies and government from purported “Fox Adams” recruit- agencies that began as early as 2002, ers used names that looked like they the American cable-writers concluded. had been randomly mixed and matched Particularly vulnerable were Chinese from American phone books—and by subsidiaries of non-Chinese compa- someone with little feel for American nies, whose local executives were often culture. One email was signed by a afraid to inform their Western bosses recruiter supposedly named “Jesus about the extent of Chinese govern- Black.” The Internet domain regis- ment meddling. “Contacts in the tech- tration for the website www.foxadams. nology industry tell us that Chinese com was listed to a New Jersey address interference in the operations of for- that does not seem to exist. The phone eign businesses is widespread and often number listed was “1-234-5678.”11 underreported to U.S. parent compa- nies,” reported one U.S. diplomat.9 The Rise of Private Intelligence It was this wave of Chinese hack- Firms. Corporate intelligence gath- ing attacks that finally drove Google ering has created a new market for a into the arms of the U.S. National rising class of private espionage firms— Security Agency, announcing a part- companies set up by veterans of the nership with the American techno- world’s intelligence agencies that sell logical spy agency to help Google fend their services on a contract basis to off intrusion attempts.10 For Google, companies and financial firms. In the as for many companies, one option 21st Century, companies and financial when faced with government-funded firms have a greater need for infor- spying is to team up with another gov- mation than ever and—particularly in ernment. Even in a global economy, emerging markets—the best providers it seems, companies sometimes have of that information are former intel- to choose sides. Although it appears ligence officers who are deeply steeped that the Google incident was partially [ 5 6 ] Georgetown Journal of International Affairs
  • 5. JAVERS Espionage Exposed in the leadership and politics of a given freelancers, each layer papered with country and intimately familiar with its strict non-disclosure agreements. local powerbrokers. In public, they describe their services There is nothing wrong with compa- as “strategic advisory consulting,” “risk nies turning to such intelligence advi- mitigation analysis,” or “litigation sup- sors for information on potential new port.” With names like “Diligence,” business partners and advice on the “Control Risks Group,” and “Hakluyt,” political landscape in unfamiliar coun- these private intelligence firms hide in tries, but there is enormous poten- plain sight, offering extremely lucra- tial for abuse by corporate intelligence tive post-government career options firms. The ways in which they gather for veterans of the CIA, the British information can wander into a legal MI5, and the former Soviet intelli- gray area, and their offensive opera- gence agency, the KGB. tions—efforts to damage competitors The industry’s growth is driven by through underhanded tactics includ- several trends. The increased globaliza- The corporate espionage industry is deliberately hidden in a thicket of complex relationships. ing surveillance, placing of operatives tion of commerce has created a demand inside competitors’ firms, and other for companies to understand the rela- techniques the companies would be tionships between business and politi- embarrassed to admit in public—can cal elites in countries they often know deprive legitimate businesses of oppor- little about. Who better to help piece tunities to succeed. together the puzzle than the men and Indeed, the corporate espio- women who spent their careers gath- nage industry is deliberately hidden ering the same information for their in a thicket of complex relationships governments? designed to obscure just who is work- And, of course, there is the romance ing for whom. Often, these firms are of it all. Globe-hopping corporate hired as subcontractors for corporate executives sometimes cannot resist law firms and they argue that everything the glamour of the spy business. The they do is covered by attorney-client romance factor is often implicit in privilege.12 Thus, their operations do the spies’ sales pitches to prospec- not surface to the public. In other tive clients. In 2001, for example, cases, these private spy firms protect the former British secret intelligence ser- secrecy of their operations around the vice officer Christopher James wrote world by using a series of cutouts and to Enron executive Jeff Skilling, hop- Winter/Spring 2011 [ 57 ]
  • 6. SECRETS AND LIES ing to land Skilling as a new client of cies have a vested interest in know- his London-based private intelligence ing where such people are employed firm, Hakluyt. “Dear Mr. Skilling,” and they should therefore track that he wrote, “Your office has asked me to information. Retired spies working in outline Hakluyt’s services. … I would corporate espionage are not motivated simply say this: Hakluyt is what you by love of country any longer; they are make of it—it places an unparalleled motivated by love of money. When the private intelligence network at the per- spies have taken their skills and gone sonal disposal of senior commercial to work for paying clients, the govern- figures.” 13 ments that trained them with taxpayer money should monitor their activities Responding to Corporate to make sure that they are not deploy- Espionage. What is astonishing about ing those skills in ways that undermine this private spy industry is how little the the very governments that provided them. What is astonishing about this private spy industry is how little the U.S. government seems to know about it. U.S. government seems to know about What is more, Western governments it. The CIA says it does not know where should be working harder to learn just its former agents are working today how intertwined their intelligence ser- and argues that tracking where they are vices are with companies in the global employed would violate the civil rights of economy. American intelligence agen- those agents; it surely behooves the U.S. cies, for example, have long had a policy intelligence community to have some stating that their operatives are allowed sense of where its alumni are plying their to “moonlight” in their off hours and trade, however, and whose payrolls they work for private sector firms.15 That join when they enter the private sector.14 is, active duty intelligence officers, The CIA and similar organizations including those of the CIA, are allowed should know where their alumni work, to work for private companies in order particularly when they are being hired to make extra money. This creates a by foreign governments, oligarchs, and conflict of interest; agents who have political parties. Some of the infor- access to classified materials of national mation is not difficult to come by; security are also working with pri- the websites of some of the private vate firms that sometimes engage in intelligence firms are a handy place questionable practices and undermine to start. Western intelligence agen- or violate domestic and international [ 5 8 ] Georgetown Journal of International Affairs
  • 7. JAVERS Espionage Exposed laws. But even intelligence commu- between Western companies can nity leaders profess ignorance of the include unethical and even illegal tac- entire moonlighting system. In pub- tics, resulting in economic victories lic testimony, Director of National for the most underhanded firms, not Intelligence Dennis Blair said he had necessarily for the most innovative. been surprised when the moonlight- That is bad for capitalism. Corporate ing was first revealed in the media. espionage by financial firms results in “Sometimes I too am surprised about a transfer of information—and huge what I read in the press about my own financial rewards—into the hands of organization,” Blair told Congress in the most powerful and wealthy, rob- February.16 bing average investors of a chance to As of fall 2010, the Director of participate in the benefits of the finan- National Intelligence has promised that cial markets. That too, is damaging to a full review of such moonlighting the market economy, causing market will be completed and turned over to participants to conclude that the system Congress.17 That is a promising first is stacked against them. Markets only step, but the American taxpayers need work best when all players—large and to know much more about the moon- small—have confidence that the rules lighting habits of their intelligence are fair. officers. How often, for example, are Finally, Western intelligence agen- active duty officers going to work for cies must ratchet up their counter- intelligence contractors—effectively intelligence capabilities in the eco- forcing the taxpayer to pay twice for the nomic space. The intelligence com- same work? munity needs to focus on the threat to American executives, too, need to American global economic dominance educate themselves on the range of cor- that comes from Chinese economic porate espionage tactics arrayed against espionage. One of the United States’ them. Unfortunately, the best way for greatest advantages in its competition them to do that right now is to reach with China is its corporate ingenu- out to some of the very private spy firms ity, inventiveness, and sophistication. that are already in the corporate espio- If Chinese intelligence is able to chip nage business. Companies would be away at that advantage though corpo- well advised to create internal monitor- rate espionage techniques, it will do as ing units so that they can increase their much or more for China’s position in ability to recognize and respond to the world than traditional spying on corporate espionage. Some firms have America’s military capabilities or polit- already implemented these practices, ical leadership. Corporate espionage but these are few and far between. against the United States is one of many At its worst, corporate espionage tools that China uses in its effort to Winter/Spring 2011 [ 59]
  • 8. SECRETS AND LIES undermine America’s position as the the position. This is a far deeper threat number-one economy on the planet, to free-market capitalism and is why and to take for itself the geopolitical America’s counter-intelligence effort power and influence that comes with had better be up to the challenge. NOTES 1 Eamon Javers. Anonymous interview, July ing by a China Fearful of the Web,” The New York 2009. Times, 4 December 2010. 2 Jonathan Stempel and Dan Levine, “Mat- 9 “A Selection from the Cache of Diplomatic tel accused in Bratz battle of spying on rivals,” Dispatches,” Internet, http://www.nytimes.com/ Internet, http://www.reuters.com/article/idUS- interactive/2010/11/28/world/20101128-cables- TRE67G4FZ20100817 (date accessed: 17 August viewer.html#report/china-99BEIJING999 (date 2010). accessed 5 December 2010). 3 Eamon Javers, Broker, Trader, Lawyer, Spy: The 10 Ellen Nakashima, “Google to Enlist NSA to Secret World of Corporate Espionage (New York: Harper- help it Ward off Cyber Attacks,” The Washington Collins Publishers, 2010) 18. Post, 4 February 2010. 4 Ibid. 11 See supra note 1 5 Ibid. 12 Eamon Javers, Broker, Trader, Lawyer, Spy: The 6 Li Cui and Murtaza Syed, “IMF Working Secret World of Corporate Espionage (New York: Harper- Paper: The Shifting Structure of China’s Trade and Production,” Internet, http://books.google. Collins Publishers, 2010), 265. com/books?hl=en&lr=&id=dADHBsFWJLQC&oi= 13 Archived Enron emails available at the web- fnd&pg=PA3&dq=Chinese+economy+more+sophis site of the Federal Energy Regulatory Commission: ticated+manufacturing&ots=FBaAzl5ZPY&sig=7uC http://www.ferc.gov/industries/electric/indus-act/ -JIlzZD5igh1Bm1xtcBjQB34#v=onepage&q&f=false wec/enron/info-release.asp. (date accessed: September 2007). 14 Interview by the author with CIA public 7 The Associated Press, “Ex-General Motors affairs office, 2009. worker, husband accused of stealing hybrid vehicle 15 Eamon Javers, “CIA moonlights in corpo- secrets,” Internet, http://www.mlive.com/auto/ rate world,” Politico, 1 February 2010. index.ssf/2010/07/ex-general_motors_worker_ 16 Kasie Hunt, “CIA Moonlighting to be Inves- husba.html (date accessed: 23 July 2010). tigated,” Politico, 3 February 2010. 8 James Glanz and John Markoff, “Vast Hack- 17 Ibid. [ 6 0] Georgetown Journal of International Affairs