SlideShare a Scribd company logo
ECONOMIC ESPIONAGE
      By Jeriff Sanchez
ECONOMIC ESPIONAGE
         ACT OF 1996

 Defines Economic Espionage as (1) whoever knowingly performs
targeting or acquisition of trade secrets to (2) knowingly benefit any
foreign government, foreign instrumentality, or foreign agent.

 Theft of trade secrets occurs when someone (1) knowingly
performs targeting or acquisition of trade secrets or intends to
convert a trade secret to (2) knowingly benefit anyone other than the
owner.
COLD WAR ESPIONAGE

Cold War forced crated heavy competition between Soviets and
Americans. They both attempted to steal from each other military
secrets. Evolved into current economic espionage after war.
HOW ITS DONE

 Usually it is accomplished by hiring out competitions employees.

 New technology also brought new ways to steal trade secrets.

 If information is stored in a computer it is able to be hacked.

 Malwares can also be used to attain information.
WHY IT MATTERS

 Economic Espionage gives an unfair advantage to competitors and
tips the market in favor of the thief.
 Pretty common occurrence but not sensational to be put in news.
 Many millions if not billions of dollars lost because of this as well
as good jobs lost.
 FBI put combating this as its second priority, right behind
counterterrorism
SOURCES

 http://www.wisegeek.com/what-is-industrial-espionage.htm

 http://www.fbi.gov/about-
us/investigate/counterintelligence/economic-espionage

 http://www.economicespionage.com/EEA.html

 http://www.tns.com/economic_espionage.asp

 http://www.iwar.org.uk/infocon/economic-espionage.htm

More Related Content

Similar to Economic espionage

D4 security consultants
D4 security consultantsD4 security consultants
D4 security consultants
asmsdn
 
Hack
HackHack
Counterfeits Funding Terrorism Transcript1Counterfeits.docx
Counterfeits Funding Terrorism Transcript1Counterfeits.docxCounterfeits Funding Terrorism Transcript1Counterfeits.docx
Counterfeits Funding Terrorism Transcript1Counterfeits.docx
faithxdunce63732
 
germany chancellor
germany chancellorgermany chancellor
germany chancellor
Ali J
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Maurice Dawson
 
INT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.TallantINT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.Tallant
Eric Tallant
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
Mext Metaverse
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
ouldparis
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
dineshgarhwal77
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
Kati Mccarthy
 
Evidence FTX Was a Deep State Plan to Capture Crypto
Evidence FTX Was a Deep State Plan to Capture CryptoEvidence FTX Was a Deep State Plan to Capture Crypto
Evidence FTX Was a Deep State Plan to Capture Crypto
Franck La Rocca
 
It technology used by terrorist
It technology used by terroristIt technology used by terrorist
It technology used by terrorist
Pravin Devkar
 
OECD Bribery Convention
OECD Bribery ConventionOECD Bribery Convention
OECD Bribery Convention
George Kleuser
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
Richard Stiennon
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
khansalman19
 
Ht f42
Ht f42Ht f42
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
Johnny Schaefer
 
Crime in the Business World
Crime in the Business WorldCrime in the Business World
Crime in the Business World
Jennifer Vogt-Erickson
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
harshitakhandelwal26
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 

Similar to Economic espionage (20)

D4 security consultants
D4 security consultantsD4 security consultants
D4 security consultants
 
Hack
HackHack
Hack
 
Counterfeits Funding Terrorism Transcript1Counterfeits.docx
Counterfeits Funding Terrorism Transcript1Counterfeits.docxCounterfeits Funding Terrorism Transcript1Counterfeits.docx
Counterfeits Funding Terrorism Transcript1Counterfeits.docx
 
germany chancellor
germany chancellorgermany chancellor
germany chancellor
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
INT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.TallantINT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.Tallant
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docxUNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL  .docx
UNPROTECTED DATA REVIEW OF INTERNET ENABLED PSYCHOLOGICAL .docx
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Evidence FTX Was a Deep State Plan to Capture Crypto
Evidence FTX Was a Deep State Plan to Capture CryptoEvidence FTX Was a Deep State Plan to Capture Crypto
Evidence FTX Was a Deep State Plan to Capture Crypto
 
It technology used by terrorist
It technology used by terroristIt technology used by terrorist
It technology used by terrorist
 
OECD Bribery Convention
OECD Bribery ConventionOECD Bribery Convention
OECD Bribery Convention
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Ht f42
Ht f42Ht f42
Ht f42
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
 
Crime in the Business World
Crime in the Business WorldCrime in the Business World
Crime in the Business World
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 

Recently uploaded

15062024_First India Newspaper Jaipur.pdf
15062024_First India Newspaper Jaipur.pdf15062024_First India Newspaper Jaipur.pdf
15062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
在线办理(latrobe毕业证书)拉筹伯大学毕业证Offer一模一样
在线办理(latrobe毕业证书)拉筹伯大学毕业证Offer一模一样在线办理(latrobe毕业证书)拉筹伯大学毕业证Offer一模一样
在线办理(latrobe毕业证书)拉筹伯大学毕业证Offer一模一样
ckn2izdm
 
Why We Chose ScyllaDB over DynamoDB for "User Watch Status"
Why We Chose ScyllaDB over DynamoDB for "User Watch Status"Why We Chose ScyllaDB over DynamoDB for "User Watch Status"
Why We Chose ScyllaDB over DynamoDB for "User Watch Status"
ScyllaDB
 
Shark Tank Jargon | Operational Profitability
Shark Tank Jargon | Operational ProfitabilityShark Tank Jargon | Operational Profitability
Shark Tank Jargon | Operational Profitability
TheUnitedIndian
 
Reuters Institute Digital News Report 2024
Reuters Institute Digital News Report 2024Reuters Institute Digital News Report 2024
Reuters Institute Digital News Report 2024
Reuters Institute for the Study of Journalism, Oxford University
 
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
16062024_First India Newspaper Jaipur.pdf
16062024_First India Newspaper Jaipur.pdf16062024_First India Newspaper Jaipur.pdf
16062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
ACSA confirms operational readiness ahead the arrival of Heads of State at OR...
ACSA confirms operational readiness ahead the arrival of Heads of State at OR...ACSA confirms operational readiness ahead the arrival of Heads of State at OR...
ACSA confirms operational readiness ahead the arrival of Heads of State at OR...
SABC News
 
一比一原版美国宾夕法尼亚州立大学毕业证如何办理
一比一原版美国宾夕法尼亚州立大学毕业证如何办理一比一原版美国宾夕法尼亚州立大学毕业证如何办理
一比一原版美国宾夕法尼亚州立大学毕业证如何办理
guevtut
 
The Rise of Christian Persecution In Islamic Countries (1).pdf
The Rise of Christian Persecution In Islamic Countries (1).pdfThe Rise of Christian Persecution In Islamic Countries (1).pdf
The Rise of Christian Persecution In Islamic Countries (1).pdf
ECSPE - Saving the Persecuted and Enslaved
 
Snigdha-Sreenath-Minor-v-Travancore-Devaswom-Board-WPCNO-39847-OF-2023-2024-L...
Snigdha-Sreenath-Minor-v-Travancore-Devaswom-Board-WPCNO-39847-OF-2023-2024-L...Snigdha-Sreenath-Minor-v-Travancore-Devaswom-Board-WPCNO-39847-OF-2023-2024-L...
Snigdha-Sreenath-Minor-v-Travancore-Devaswom-Board-WPCNO-39847-OF-2023-2024-L...
bhavenpr
 
The Rise of Christian Persecution In Islamic Countries
The Rise of Christian Persecution In Islamic CountriesThe Rise of Christian Persecution In Islamic Countries
The Rise of Christian Persecution In Islamic Countries
ECSPE - Saving the Persecuted and Enslaved
 
Bombay-hc-hamare-baraah-order-june-7.pdf
Bombay-hc-hamare-baraah-order-june-7.pdfBombay-hc-hamare-baraah-order-june-7.pdf
Bombay-hc-hamare-baraah-order-june-7.pdf
bhavenpr
 
18062024_First India Newspaper Jaipur.pdf
18062024_First India Newspaper Jaipur.pdf18062024_First India Newspaper Jaipur.pdf
18062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
A draft Ukraine-Russia treaty from April 2022
A draft Ukraine-Russia treaty from April 2022A draft Ukraine-Russia treaty from April 2022
A draft Ukraine-Russia treaty from April 2022
dynamo777
 
projet de traité négocié à Istanbul (anglais).pdf
projet de traité négocié à Istanbul (anglais).pdfprojet de traité négocié à Istanbul (anglais).pdf
projet de traité négocié à Istanbul (anglais).pdf
EdouardHusson
 
TN-Students-Caste-Discrimination-Chandru-Commission.pdf
TN-Students-Caste-Discrimination-Chandru-Commission.pdfTN-Students-Caste-Discrimination-Chandru-Commission.pdf
TN-Students-Caste-Discrimination-Chandru-Commission.pdf
bhavenpr
 
Organisations.pdf k[poikdip-jhhohuhejhnjhn
Organisations.pdf k[poikdip-jhhohuhejhnjhnOrganisations.pdf k[poikdip-jhhohuhejhnjhn
Organisations.pdf k[poikdip-jhhohuhejhnjhn
bhavenpr
 
Markakis-Schlee-Young-2021-The-nation-state.pdf
Markakis-Schlee-Young-2021-The-nation-state.pdfMarkakis-Schlee-Young-2021-The-nation-state.pdf
Markakis-Schlee-Young-2021-The-nation-state.pdf
Abraham Lebeza
 
#WenguiGuo#WashingtonFarm Guo Wengui Wolf son ambition exposed to open a far...
#WenguiGuo#WashingtonFarm  Guo Wengui Wolf son ambition exposed to open a far...#WenguiGuo#WashingtonFarm  Guo Wengui Wolf son ambition exposed to open a far...
#WenguiGuo#WashingtonFarm Guo Wengui Wolf son ambition exposed to open a far...
rittaajmal71
 

Recently uploaded (20)

15062024_First India Newspaper Jaipur.pdf
15062024_First India Newspaper Jaipur.pdf15062024_First India Newspaper Jaipur.pdf
15062024_First India Newspaper Jaipur.pdf
 
在线办理(latrobe毕业证书)拉筹伯大学毕业证Offer一模一样
在线办理(latrobe毕业证书)拉筹伯大学毕业证Offer一模一样在线办理(latrobe毕业证书)拉筹伯大学毕业证Offer一模一样
在线办理(latrobe毕业证书)拉筹伯大学毕业证Offer一模一样
 
Why We Chose ScyllaDB over DynamoDB for "User Watch Status"
Why We Chose ScyllaDB over DynamoDB for "User Watch Status"Why We Chose ScyllaDB over DynamoDB for "User Watch Status"
Why We Chose ScyllaDB over DynamoDB for "User Watch Status"
 
Shark Tank Jargon | Operational Profitability
Shark Tank Jargon | Operational ProfitabilityShark Tank Jargon | Operational Profitability
Shark Tank Jargon | Operational Profitability
 
Reuters Institute Digital News Report 2024
Reuters Institute Digital News Report 2024Reuters Institute Digital News Report 2024
Reuters Institute Digital News Report 2024
 
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
 
16062024_First India Newspaper Jaipur.pdf
16062024_First India Newspaper Jaipur.pdf16062024_First India Newspaper Jaipur.pdf
16062024_First India Newspaper Jaipur.pdf
 
ACSA confirms operational readiness ahead the arrival of Heads of State at OR...
ACSA confirms operational readiness ahead the arrival of Heads of State at OR...ACSA confirms operational readiness ahead the arrival of Heads of State at OR...
ACSA confirms operational readiness ahead the arrival of Heads of State at OR...
 
一比一原版美国宾夕法尼亚州立大学毕业证如何办理
一比一原版美国宾夕法尼亚州立大学毕业证如何办理一比一原版美国宾夕法尼亚州立大学毕业证如何办理
一比一原版美国宾夕法尼亚州立大学毕业证如何办理
 
The Rise of Christian Persecution In Islamic Countries (1).pdf
The Rise of Christian Persecution In Islamic Countries (1).pdfThe Rise of Christian Persecution In Islamic Countries (1).pdf
The Rise of Christian Persecution In Islamic Countries (1).pdf
 
Snigdha-Sreenath-Minor-v-Travancore-Devaswom-Board-WPCNO-39847-OF-2023-2024-L...
Snigdha-Sreenath-Minor-v-Travancore-Devaswom-Board-WPCNO-39847-OF-2023-2024-L...Snigdha-Sreenath-Minor-v-Travancore-Devaswom-Board-WPCNO-39847-OF-2023-2024-L...
Snigdha-Sreenath-Minor-v-Travancore-Devaswom-Board-WPCNO-39847-OF-2023-2024-L...
 
The Rise of Christian Persecution In Islamic Countries
The Rise of Christian Persecution In Islamic CountriesThe Rise of Christian Persecution In Islamic Countries
The Rise of Christian Persecution In Islamic Countries
 
Bombay-hc-hamare-baraah-order-june-7.pdf
Bombay-hc-hamare-baraah-order-june-7.pdfBombay-hc-hamare-baraah-order-june-7.pdf
Bombay-hc-hamare-baraah-order-june-7.pdf
 
18062024_First India Newspaper Jaipur.pdf
18062024_First India Newspaper Jaipur.pdf18062024_First India Newspaper Jaipur.pdf
18062024_First India Newspaper Jaipur.pdf
 
A draft Ukraine-Russia treaty from April 2022
A draft Ukraine-Russia treaty from April 2022A draft Ukraine-Russia treaty from April 2022
A draft Ukraine-Russia treaty from April 2022
 
projet de traité négocié à Istanbul (anglais).pdf
projet de traité négocié à Istanbul (anglais).pdfprojet de traité négocié à Istanbul (anglais).pdf
projet de traité négocié à Istanbul (anglais).pdf
 
TN-Students-Caste-Discrimination-Chandru-Commission.pdf
TN-Students-Caste-Discrimination-Chandru-Commission.pdfTN-Students-Caste-Discrimination-Chandru-Commission.pdf
TN-Students-Caste-Discrimination-Chandru-Commission.pdf
 
Organisations.pdf k[poikdip-jhhohuhejhnjhn
Organisations.pdf k[poikdip-jhhohuhejhnjhnOrganisations.pdf k[poikdip-jhhohuhejhnjhn
Organisations.pdf k[poikdip-jhhohuhejhnjhn
 
Markakis-Schlee-Young-2021-The-nation-state.pdf
Markakis-Schlee-Young-2021-The-nation-state.pdfMarkakis-Schlee-Young-2021-The-nation-state.pdf
Markakis-Schlee-Young-2021-The-nation-state.pdf
 
#WenguiGuo#WashingtonFarm Guo Wengui Wolf son ambition exposed to open a far...
#WenguiGuo#WashingtonFarm  Guo Wengui Wolf son ambition exposed to open a far...#WenguiGuo#WashingtonFarm  Guo Wengui Wolf son ambition exposed to open a far...
#WenguiGuo#WashingtonFarm Guo Wengui Wolf son ambition exposed to open a far...
 

Economic espionage

  • 1. ECONOMIC ESPIONAGE By Jeriff Sanchez
  • 2. ECONOMIC ESPIONAGE ACT OF 1996  Defines Economic Espionage as (1) whoever knowingly performs targeting or acquisition of trade secrets to (2) knowingly benefit any foreign government, foreign instrumentality, or foreign agent.  Theft of trade secrets occurs when someone (1) knowingly performs targeting or acquisition of trade secrets or intends to convert a trade secret to (2) knowingly benefit anyone other than the owner.
  • 3. COLD WAR ESPIONAGE Cold War forced crated heavy competition between Soviets and Americans. They both attempted to steal from each other military secrets. Evolved into current economic espionage after war.
  • 4. HOW ITS DONE  Usually it is accomplished by hiring out competitions employees.  New technology also brought new ways to steal trade secrets.  If information is stored in a computer it is able to be hacked.  Malwares can also be used to attain information.
  • 5. WHY IT MATTERS  Economic Espionage gives an unfair advantage to competitors and tips the market in favor of the thief.  Pretty common occurrence but not sensational to be put in news.  Many millions if not billions of dollars lost because of this as well as good jobs lost.  FBI put combating this as its second priority, right behind counterterrorism
  • 6. SOURCES  http://www.wisegeek.com/what-is-industrial-espionage.htm  http://www.fbi.gov/about- us/investigate/counterintelligence/economic-espionage  http://www.economicespionage.com/EEA.html  http://www.tns.com/economic_espionage.asp  http://www.iwar.org.uk/infocon/economic-espionage.htm