Houthi Red Sea Attacks and the Impact on the Global Order
SUBSCRIBER+EXCLUSIVE INTERVIEW – For months, Yemen’s Houthis have been launching repeated missile and drone attacks againstcommercial and military ships in the southern Red Sea and […] More
American businesses lose an estimated $160 billion to $480 billion annually due to trade secret misappropriation. To combat this loss, over the past few years the law enforcement community has enhanced its strategies, Congress has passed legislation to expand trade secret protection, and many businesses have made sweeping changes to their security procedures. To further aid businesses in their efforts to protect their most valuable secrets, my assessment identifies offender trends by analyzing 22 trade secret theft criminal cases decided between 2010-2016.
Most of the trade secret offenders reviewed were middle-aged Chinese males with advanced degrees in engineering, working in the manufacturing industry.
The fact that most of the offenders were Chinese is not surprising because China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets, according to the Federal Bureau of Investigation.
Among the cases reviewed, most of the trade secret offenders acted alone and were seeking financial gain, often by selling these secrets to Chinese companies or by using them to seek profits for their own competing companies.
The amount the offenders were paid for the trade secrets varied, but on the high side, Walter Liew was paid $28 million from 2006 to 2011 for contracts to design a titanium dioxide plant for Pangang Titanium Industry Co. in China. Liew recruited sources from DuPont to acquire the trade secrets.
In improving their security procedures, U..S companies—particularly large manufacturing companies—should consider enhancing their trade secret access controls, conducting periodic employee reinvestigations, and reviewing their termination procedures.
One of the challenges prosecutors faced in the cases reviewed was demonstrating that the information stolen was protected, classified, or marked in some way to ensure the user knew they were handling confidential company information, suggesting companies should do more in this area.
Related Articles
SUBSCRIBER+EXCLUSIVE INTERVIEW – For months, Yemen’s Houthis have been launching repeated missile and drone attacks againstcommercial and military ships in the southern Red Sea and […] More
SUBSCRIBER+ EXCLUSIVE — When U.S. and British officials filed charges of cyberespionage and imposed sanctions against China Monday, for a campaign which they said had […] More
OPINION / EXPERT PERSPECTIVE — On the night of March 22, four masked individuals armed with automatic weapons entered the Crocus City Hall in the […] More
SUBSCRIBER+ EXCLUSIVE INTERVIEW — While wars rage in Ukraine and Gaza, the past week has seen a spike in tensions over a global conflict that […] More
SUBSCRIBER+ EXCLUSIVE ANALYSIS — Along with expressions of sympathy for the victims and pledges to bring the perpetrators to justice, Russia’s response to Friday’s deadly […] More
OPINION / EXPERT PERSPECTIVE – The death toll from last week’s terrorist attack inside a concert hall in a suburban Moscow neighborhood is now at […] More
Search