Beruflich Dokumente
Kultur Dokumente
CAROLE A. FORYST
AS EVENTS UNFOLDED . . .
Two important events occurred on 11 September 2001 (9=11) that changed
the strategic focus of the U.S. government. The loss of lives and damage
to property caused by Islamic terrorists lodge indelibly in the mind of
every American. With the country and Congress backing him, those
Carole A. Foryst formerly served as an official with several United States federal
agencies and public corporations. She is a candidate for an M.A. in Strategic
Intelligence Studies at the Institute of World Politics, Washington, D.C.
399
400 CAROLE A. FORYST
fear and passion have abated enough so that policymakers should be able to
objectively reconsider the results and reevaluate the nation’s CI priorities.
POLICY FORMATION
At National Counterintelligence Executive (NCIX)–sponsored seminars
seeking to strengthen the partnership between the government and the
private sector, officials and sector experts have urged heightened attention
to both industrial and economic espionage. Without quantifying the losses
sustained by U.S. business and industry from IE and EE, former officials
such as Principal Deputy Director of National Intelligence Donald M.
Kerr and Deputy National Counterintelligence Executive Marion ‘‘Spike’’
Bowman, and many other CI experts have implied that such espionage and
theft are as damaging, if not more so, than other types of spying during
the Cold War.5
Capturing the tone of the counterintelligence community’s current
appreciation of economic espionage, as expressed in an FBI briefing
document for the private sector and speakers at seminars in 2007 and
confirmed in private conversations at a 29 October 2008 CI seminar, is the
following statement:
Left unchecked, such economic espionage threatens the foundations of
U.S. prosperity, say current and former counterintelligence officials. In
an era of globalization, competitors in low-wage developing countries
can produce most products less expensively. The United States’
economic advantage revolves around the sophisticated technology and
unique know-how residing in corporate laboratories and research
institutes. So that’s where the corporate thieves and foreign spies
concentrate their efforts.6
The U.S. constitutes roughly four percent of world population. From the
stated perspective o f t he nation’ s then-second highest-ranking
counterintelligence official, the U.S. has lately been experiencing more
economic espionage than the total spying experienced during the Cold
War. A few facts support Bowman’s concern:
. In Fiscal Year (FY) 2005, a record 108 countries were collecting all sorts of
proprietary business information, actively trying to import dual-use products
and circumvent U.S. export restrictions.8
. That year, the FBI opened 89 economic espionage cases and had 122 cases ongoing.9
. By 2006, the FBI was pursuing 143 economic espionage cases.10
. Immigration and Customs Enforcement (ICE) initiated more than 1,050 export
investigations and investigated 2,400 violations of various arms control and
export laws resulting in 101 arrests, 70 criminal indictments, and 85 criminal
convictions.11
. The Department of Commerce’s Bureau of Industry and Security initiated more
than 1,300 investigations, resulting in 31 criminal convictions.12
. The American Society for Industrial Security (ASIC) estimated that between 1993
and 1995, economic and commercial espionage cost American industry $63
billion.15
. In a 1995 report the White House Office of Science and Technology estimated
damage at $100 billion.16
17
. The ASIC published an estimate of industrial losses in 1997 of $300 billion.
. In 1999, that small ‘‘5 percent stuff’’ cost industry an estimated $100 billion in
losses from industrial espionage activity. According to a survey by the ASIC
and PriceWaterhouseCoopers, that worked out to about $50 million an incident.18
. The Attorney General’s 2002 report said that accurate calculation of monetary
losses directly and indirectly linked to economic espionage on an annual basis
cannot be made and is not readily available. Speculations . . . . range from $53
billion to $1 trillion. Losses may reflect inventory ‘‘snapshots’’ only on the day
the audit was performed.19
The Cox Report said China was doing most of the spying, but was joined on
the list of top spying countries by Russia, Japan, France, Israel, South
Korea, and others.
After the Cold War ended, freeing many economies from the constraints of
Communism and socialism, foreign countries saw the U.S. as a ripe target
from which to pluck economic and industrial secrets to accelerate their
industrial and job growth without the expense of time and capital
investment or repercussions from the U.S.
of 43 percent to 971 SCRs. One hundred and six countries were associated
with suspicious activities, compared with 90 in 2004.
The DSS report, while not addressing suspicious activity in companies
outside the defense sector—i.e., companies, startups, universities, and
laboratories—gives a sense of the increase in efforts by unauthorized
persons to obtain U.S. technical and trade secrets to enrich the spy, and
benefit foreign economies, their domestic companies, and their military
capabilities.
The countries that the DSS found spying in 2005 included U.S. allies and
trading partners like Israel, Germany, and France.28 Learning that the
economic strength of France has reached a condition that the country has
no compunction against engaging in economic warfare against an ally is
jarring. France views it as normal among nations to pursue market
advantages by all available means. France boldly declares as the policy of
the Republic what John Locke enunciated in his Second Treatise: that all
nations are in a state of war with each other. The French Defense Ministry,
through its semi-private Defense Consultancy International, went so far as
to establish the École de Guerre Économique (School of Economic Warfare)
in 1996 with a faculty of experts. Were it not a brazen threat to U.S.
economic strength and criminal behavior, such an action might evoke a
cynical smile. The school’s director, Christian Harbulot, declared:
The U.S. is the top priority. There is true industrial competition and there
are many fields where we have everything to lose. We cannot let ourselves
be pushed around. A huge number of companies have disappeared
because they were bought out or destroyed by the Americans. We have
to protect ourselves.29
Cyber attacks are EE and EI threats that garner attention. The advent of
cyber technologies makes easier than ever one of the most difficult jobs for
spies: delivery. Yet government documents seldom connect the threat of
cyber security and threats to the actual products and information at risk,
intellectual property and trade secrets, or the value of thefts. Cyber attacks
are said to constitute twenty percent of EE and EI threats.
1. Identify foreign intelligence and other threats to both the U.S. and U.S. interests
overseas;
2. Assess them;
3. Neutralize them;
4. Exploit them.
Intentions—Frankly Speaking
China’s premier Wen Jiabao made a remarkable public declaration of his
grand vision of Chinese and Indian dominance in information technology
during a visit to India in April 2005:
We will be able to lead the world in the sector and a day will come when
we can herald the beginning of the Asian century of information
technology.37
Concern has grown that the United States is losing its competitive edge
in science and technology (S&T). The factors driving this concern
include globalization, the rise of science centers in developing
countries such as China and India, the increasing number of
foreign-born Ph.D. students in the United States, and claims of a
shortage of S&T workers in the United States. A loss of prowess in
S&T could hurt the U.S. economic competitiveness, standard of
living, and national security.48
The importance of S&T to U.S. prosperity and security warrants that
policymakers pay careful attention to the various high-level reports
issued over the past five years that warn of pressures on the U.S. lead
in S&T.49
For 2001, the dollar value of high-technology imports was $561 billion;
the value of high-technology exports was $511 billion.51
. The Founding Fathers protected invention and new ideas in the Constitution,
followed by passage by Congress and signing by President George Washington
of the first U.S. federal law which concerned patent, trademark, and copyright law;
. The U.S. banking system and capital markets supported invention from the
earliest years;
. U.S. companies and individuals invested about $35 billion per year in R&D
between 1976 and 1998, and about $75 billion per year during the 2000s, for a
total of about $1.1 trillion since 1976.52
. Americans exhibit an innovation gene through which they learn, create, absorb,
and apply new ideas and things almost by instinct. The U.S. has been the
innovation leader for decades during which time technology has become the
superstructure supporting the country.
As a nation, the U.S. has been unique in possessing all the above
characteristics; together, they form the base from which it generates ideas,
products, jobs, and wealth that support the country’s national security.
Every year some 27 billion investment dollars enable the U.S.’s generation
of world-class services and products by the country’s best minds and
workforce. U.S. leadership has come to assume that the country’s
capabilities are a birthright and infinite. But how long can the country
maintain its well-being and withstand an economic drain of $200–$500
billion of wealth annually—or $1 trillion to $2 trillion over four years? A
prudent government would address this subject urgently.
innovation. They covet and steal the benefits of U.S. investments and
labor by purloining technologies and business secrets. The U.S. is
laden with technology and proprietary information for easy plucking.
The results of the National Academies’ analyses point the way to
inform policymakers’ national security priorities. Congress passed new
EE and IE laws after probing hearings that made CI a priority
concern during the decade of the 1990s, only to have counterterrorism
replace them overnight with no real debate. Since 9=11, combating
terrorism appears to have been the IC’s predominant focus. The Bush
Administration, and to a lesser extent the Obama Administration, have
kept that threat in the forefront of public awareness. Awareness by the
public, and government urgings to report suspicious activities, help
support national security efforts regarding counterterrorism.
Quite the opposite is the situation regarding EE and IE. Judging by IC-
and CI-published strategic plans, testimony, news releases, and
administration official statements, EE and IE are not accorded much, if
any, policy attention. With nine years of success in preventing a repeat
of 9=11 in the U.S., the time has arrived to reexamine the basis of
current domestic national security and economic security strategies and
to weigh the merits of the current priority rankings as published in
strategy documents. Such reconsideration, based on fresh analysis of the
deeper, sustained threat from EE and EI, might reposition
counterespionage above or equal to counterterrorism on the nation’s
priority list. As a result, the President and Congress might budget and
appropriate greater funding, more CI personnel, and better CI training
for federal, state, and local efforts. In addition, the public attention
would heighten awareness on the part of the people who may be
brushing against corporate spies every day without noticing or reporting
anomalous behavior. At present, those who notice suspicious activities
may have no idea as to whom to report them, and may fear that
managers would be dismissive of such reports. That reluctance is in
stark contrast to the success of the official attention to terrorism that
sensitized the public to report suspicious activities.
and damages property provides the graphic imagery that the media
requires to make events worthy of headlines and the evening news. An
economic spy who is indicted, tried, or sentenced garners one inch of
column space on an inside newspaper page on a slow news day. The
public remains largely unaware of the economic espionage threat. CI
leaders express their concerns in annual reports to Congress, and post
news releases about spy apprehensions and prosecutions, but the public
gains little or no insight from political leaders. Likewise, among leaders
of academic institutions, companies, and nongovernmental organizations,
few pay attention to economic espionage. The lone exception is cyber
threats. Cyber threats now comprise twenty percent of EE, and continue
to grow.
How can the costs of undermining the vitality of companies and the U.S.
economy be accurately included?
An Unaware America
The prominence of political and law enforcement focus on counterterrorism
apparently alerts and motivates the public to notice and report suspicious
people and activities. In the absence of a subsequent terrorist act in the
U.S. since 9=11, and by relying on open sources, the ongoing CT success
could be attributed to authorities’ vigilance and some to public awareness.
But this public–private synergy is absent concerning EE and IE, where it
could be a similarly important resource.
Since 9=11, CT has usurped EE and IE as the FBI’s strategic CI priority.
Without diminishing the national imperative of thwarting terrorists’
intentions to prevent their success, President Obama should prudently
order the IC to reevaluate and rank the nation’s CI priorities. Instead
Mr. Obama, his administration, the IC, Congress, and local law
enforcement continue to build one CI capability but no others. With the
exception of young children, few if any Americans could possibly remain
unaware of the commitment of political leaders and law enforcement
agencies to thwarting another terrorist act in the U.S. Aware citizens and
focused leadership are a potent combination to preserve safety against the
odds. The time is too early to relax, as terrorists are likely preparing more
surprise attacks. Consistent public comments by IC leadership about
terrorist threats and the advisability of moving IC elements off the eastern
power grid are sobering and worrisome. Clearly, the bipartisan political
leadership across the country remains concerned and unified against
terrorism, though noticeably less vocal until the failed Christmas 2009
attempt to bomb an airliner over Detroit.
Notable is the contrast in prominence of the political treatment given the
terrorism threat with that given EE and IE threats. In the absence of political
pronouncements, the IC, FBI, and the security industry are aware of this
issue, but few among the public. Yet, in the decade preceding 9=11, the issue
was gaining prominence because policymakers and elected officials perceived a
threat. EE was considered serious enough to merit criminalization in the EE
Act of 1998. As the FBI’s own publication put it:
It was a landmark piece of legislation at that time, showing the foresight
of Congress in protecting proprietary information and trade secrets in
today’s global market and wired world . . . and, by extension, the very
health, and competitiveness of critical segments of the U.S. economy.56
3. Update the component numbers for EE and IE and explain the methodology for
their compilation. Only with reliable, updated figures will the IC be able to
prepare a comparative analysis of the threats to economic and national
security from EE and IE, and compare the assessment to the economic and
national security threats from terrorism.
4. Present a fully allocated EE=IE vs. terrorism comparative analysis to the
National Security Council and other policymakers for reconsideration of
strategic national CI priorities and their rankings.
5. Analyze and publicize the techniques and practices used by EE and IE spies for
China and other countries. In essence, how do EE and IE spies work?
6. The former Deputy NCIX, Spike Bowman, used the same estimate in 2008 as did
the Cox report of 1999 in stating that ‘‘over 3,000 Chinese-owned companies’’ are
suspected of having intentions to acquire U.S. technology and business
information illicitly. Did this widely quoted number really remain unchanged
for a decade?
7. Mount a national public awareness campaign to achieve the EE=IE equivalent to
CT awareness. Engage in more outreach to help small and medium-size
businesses create a visibility for CI to enhance staff understanding of, and
respect for, CI programs throughout the economy.
8. Publicize CI programs to generate public attention, support private business
awareness of espionage, and generate the use of espionage reporting systems.
. The private sector lacks the ability to do CI without FBI and DOD support.
. The Defense Security Service’s (DSS) counterintelligence program may offer
information and advice that would benefit private sector companies and
organizations. The DSS provides support to the Insider Threat Program, the
Information and Capabilities Protection Program for the early detection and
referral of cases of potential espionage. It assists the defense industry in the
recognition and reporting of foreign collection attempts, through its Security
Education and Training Awareness Program, and conducts CI=Security
awareness training to industry.
. Awareness efforts should be directed at small and medium-sized companies to
reach small centers of innovation where awareness of EE may be minimal or
absent.61
. The FBI offers programs to raise awareness in nondefense organizations, an offer
accepted mainly by the largest companies with security programs and staff, while
overlooking the individual and small centers of innovation that give birth to most
new technology.
. Few know about an FBI program that encourages the public to report suspicious
activity by offering a reward of up to $500,000.62
. The Awareness of National Security Issues and Response (ANSIR) Program is the
FBI’s national security awareness program. The program is designed to provide
unclassified national security threat and warning information to U.S. corporate
security directors and executives, law enforcement, and other government agencies.
It also focuses on the ‘‘response’’ capability unique to the FBI’s jurisdiction in both
law enforcement and counterintelligence investigations.63
During the decades of the 1990s and the 2000s collectively, EE and IE
became a wave washing over the United States, perpetrated mostly by
foreign nationals and naturalized citizens who seek and steal for reasons of
personal pride or greed, or to gain the respect of ethnic compatriots who
stroke them, the full range of proprietary information companies or
institutions possess.
The Cold War was a contest that could have been lost to espionage
termites were it not for the intrinsic unsustainbility of Communism that
led to the collapse of the Soviet experiment. In April 2008, Eugene Poteat,
for many years a leading scientist at the CIA, told a class on Intelligence
Technology that the Soviets were able to apply their long experience of
domestic and foreign spying to get ‘‘everything’’ from the U.S. during the
Cold War. Early on, the U.S. was a comparative neophyte in the art of
intelligence, a deficit that continued even after five years of mentoring by
Great Britain during World War II.
Now, however, the U.S. better understands foreign espionage threats. If
the threats are as grave as believed by experts, the IC would be negligent
in failing to thoroughly understand the current situation, analyze it
continuously, and communicate its findings to policymakers. This time, the
economic weaknesses of Communism will not be there to save the U.S.
from its lack of commitment to prevention of economic and industrial
espionage.
REFERENCES
1
‘ ‘ T er m i t e s, ’ ’ d e fi ni ti o n , B i o l o gy O nl i n e, 1 Ju l y 2 0 0 8, h t t p : / / w w w .
biology-online.org/dictionary/Termites
2
The Federal Bureau of Investigation, Strategic Plan 2004–2009, 10 July 2008, p. 9,
http://www.fbi.gov/publications/strategicplan/strategicplanfull.pdf
3
The Economic Espionage Act of 1996 (EEA) differentiates between definitions of
economic espionage and industrial espionage: ‘‘Economic espionage (EE) is the
theft of trade secrets in which the perpetrator acts intending or knowing that
the offense will benefit any foreign government, foreign instrumentality, or
foreign agent. Industrial espionage (EI) is trade secret theft which is the
acquisition of sensitive information that has independent economic value and
that the owner has taken reasonable measures to protect, regardless of the
perpetrator’s country of origin or whether a foreign government agent can be
linked to the theft. The acquisition must be intended for the economic benefit
of someone other than the owner.’’
4
David J. Lynch, ‘‘FBI Goes on Offensive Against China’s Tech Spies,’’;
Steven Spoonamore, panelist, ‘‘Individual Responsibility to Protect
Corporate Assets,’’ conference on National Assets at Risk: Recognizing
and Addressing the Threat, sponsored by the Office of the Director of
National Intelligence, National Counterintelligence Executive, Washington,
D.C., 29 October 2008.
5
Speakers at conference, National Assets at Risk: Recognizing and Addressing the
Threat, Seminar.
6
David J. Lynch, ‘‘FBI Goes on Offensive Against China’s Tech Spies.’’
7
Marion ‘‘Spike’’ Bowman, Deputy Director, Office of the National
Counterintelligence Executive, Remarks, Institute of World Politics,
Washington, D.C., 19 March 2008.
8
Office of the Attorney General, U.S. Department of Justice, Annual Report to
Congress on Foreign Economic Collection and Industrial Espionage, 2005,
accessed 25 June 2008, p. 1.
9
Ibid.
10
Ibid.
11
Ibid.
12
Ibid.
13
Office of the Attorney General, U.S. Department of Justice, 2002 Annual Report
to Congress on Foreign Economic Collection and Industrial Espionage, Key
Findings, footer, p. vii.
14
White Paper, ‘‘Economic Espionage and Trade Secret Theft: Defending Against
the Pickpockets of the New Millennium,’’ Dave Drab, Director, Information
Content Security Services, 2004, Xerox Corporation, August 2003, accessed
24 July 2008 at http://www.xerox. com/downloads/wpaper/x/xgs_
business_insight_economic_espionage.pdf
15
Sam Vaknin, ‘‘The Industrious Spies: Industrial Espionage in the Digital Age,’’
The American Chronicle, 22 February 2007, accessed 24 July 2008, http://
www.americanchronicle.com/articles/21083
16
Ibid.
17
Ibid.
18
John Stanton, ‘‘Industrial Espionage Becoming ‘Big Business,’’’ Business and
Technology Magazine, National Defense Industrial Association, July 2001,
accessed on 24 July 2008 at http://www.nationaldefensemagazine.org/issues/
2001/Jul/Industrial_Espionage.htm
19
Office of the U.S. Attorney General, U.S. Department of Justice, Annual Report
to Congress on Foreign Economic Collection and Industrial Espionage, 1998, U.S.
accessed 24 July 2008 at http://www.xerox.com/downloads/wpaper/x/
xgs_business_insight_economic_espionage.pdf
20
Remarks prepared for delivery, Assistant Director Cassandra Chandler,
Federal Bureau of Investigation, J. Edgar Hoover Foundation, 23 April
2004, accessed 6 July 2008 at www.fbi.gov/pressrel/speeches/
chandler042304.htm
21
Wikipedia, ‘‘Economy of the United States,’’ accessed 30 October 2008, http://
www.ask.com/we?q=Size+US+economy
22
‘‘Economic Espionage: The Threat to U.S. Industry,’’ 29 April 1992, General
Accounting Office, Washington, D.C., Office of Special Investigations, Defense
Technical Information Center, Accession Number: ADA290904, Handle=proxy
Url: http://handle.dtic.mil/100.2/ADA290904, 29 April 1992, accessed 6 July
2008, http://stinet.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=
html&identifier=ADA290904
23
Ibid.
24
‘‘The New China Syndrome, The Cox Report Casts a Pall Over the Political and
Business Climate,’’ Business Week Online, New Analysis and Commentary, 7 June
1999, accessed 7 July 2008, http://www.businessweek.com/1999/99_23/
b3632100.htm
25
Statements on Introduced Bills and Joint Resolutions, ‘‘The Economic Espionage
Act of 1996,’’ United States Senate, Senator Arlen Specter, Sen. Herbert H. Kohl,
Global Security Organization, p. S742: 1 February 1996, accessed 8 July 2008,
http://www.globalsecurity.org/intell/library/congress/1996_cr/s960201a
26
Ibid.
27
‘‘FY 2008=FY 2009 Budget Estimates,’’ Defense Security Service, U.S.
Department of Defense, accessed 5 July 2008, p. 455.
28
Ibid.
29
Susan W. Brenner and Anthony C. Crescenzi, ‘‘State-sponsored Crime: The
Futility of the Economic Espionage Act,’’ Houston Journal of International
Law, Winter 2006, accessed 24 June 2008 at http://entrepreneur.com/
tradejournals/article/print/146272029.html
30
National Security Strategy of the United States of America, National Economic
Council, Executive Office of the President, White House, March 2006, accessed
15 July 2008 at http://www.whitehouse.gov/nsc/nss/2006/
31
‘‘National Economic Council,’’ Wikipedia, accessed 15 July 2008 at http://
en.wikipedia.org/wiki/National_Economic_Council
32
National Economic Council, The White House, accessed 15 July 2008 at http://
www.whitehouse.gov/nec/
33
Ibid.
34
Annual Threat Assessment of the Intelligence Community for the Senate Select
Committee on Intelligence, unclassified Statement for the Record, Dennis C.
Blair, Director of National Intelligence, 12 February 2009, before the Senate
Select Committee on Intelligence, accessed 2 October 2009, at http://
intelligence.senate.gov/090212/blair.pdf
35
Intellectual Property, Federal Enforcement Has Generally Increased, but
Assessing Performance Could Strengthen Enforcement Efforts, The General
Accounting Office (GAO), Report to the Ranking Member, Subcommittee on
Oversight of Government Management, the Federal Workforce, and the
District of Columbia, Committee on Homeland Security and government
Affairs, March 2008, October 2009, http://www.gao.gov/new.items/d08157.pdf
36
Computer Security For Everyone, Chapter 18: ‘‘Threats=Attacks=Hackers &
Crackers,’’ Intelligentedu.com accessed 3 October, 2009 at http://
www.intelligentedu.com/computer_security_for_everyone/graphics/
threats%20and%20attacks.gif
37
David Kang and Adam Segal, ‘‘The Siren Song of Technonationalism,’’ Far
Eastern Economic Review, March 2006, accessed 4 October 2009 at http://
www.feer.com/articles1/2006/0603/free/p005.html
38
Ibid.
39
Conference Proceedings, Perspectives on U.S. Competitiveness in Science and
Technology, Titus Galama and James Hosek, eds., prepared for the Office of
the Secretary of Defense, approved for public release; distribution unlimited,
http://www.rand.org/pubs/conf_proceedings/2007/RAND_CF235.pdf,
pp. 40–41.
40
Ibid.
41
David J. Lynch, ‘‘FBI Goes on Offensive Against China’s Tech Spies.’’
42
‘‘Former Chinese National Convicted for Committing Economic Espionage to
Benefit China Navy Research Center in Beijing and for Violating the Arms
Export Control Act, First Conviction in the Country Involving Source Code
Under the Arms Export Control Act; and Second Conviction in the Country
Under the Economic Espionage Act of 1996,’’ FBI, accessed 8 July 2008,
http://www.usdoj.gov/criminal/cybercrime/mengPlea.htm
43
Richard A. Posner, Remaking Domestic Intelligence (Stanford, CA: Hoover Press,
2005), p. 31.
44
Ibid.
45
Congressional Testimony, Robert S. Mueller, III, Director, Federal Bureau of
Investigation, Statement Before the House Judiciary Committee, 23 April 2008,
accessed 16 July 2008 at http://www.fbi.gov/congress/congress08/
mueller042308.htm
46
David J. Lynch, ‘‘FBI Goes on Offensive Against China’s Tech Spies.’’
47
‘‘Perspectives on U.S. Competitiveness in Science and Technology,’’ 8 November
2006, Meeting publication Rising Above the Gathering Storm: Energizing and
Employing America for a Brighter Economic Future, Titus Galama and James
Hosek eds., prepared for the Office of the Secretary of Defense, National
Defense Research Institute, RAND Corporation, Washington, D.C., 2007,
Preface, p. iii.
48
Ibid.
49
Ibid., p. 1.
50
Norman R. Augustine, Retired Chairman and Chief Executive Officer, Lockheed
Martin Corporation, Chair, Committee on Prospering in the Global Economy of
the 21st Century, Committee on Science, Engineering, and Public Policy, Division
on Policy and Global Affairs, The National Academies: National Academy of
Sciences; National Academy of Engineering, Institute of Medicine, Testimony
before the Committee on Commerce, Science, and Transportation, U.S. Senate,
15 March 2006, accessed 4 October 2009, at http://www7.nationalacademies.org/
ocga/testimony/Innovation_and_Competitiveness_Rising_Above_the_Gathering_
Storm.asp
51
Ibid. For 2001, the dollar value of high-technology imports was $561 billion; the
value of high-technology exports was $511 billion. See National Science Board,
2004. ‘‘Science and Engineering Indicators 2004’’ (NSB 04-01). Arlington,
Virginia. National Science Foundation. Appendix Table 6-01. Page A6-5
provides the export numbers for 1990 and 2001 and page A6-6 has the import
numbers. http://www7.nationalacademies.org/ocga/testimony/
Innovation_and_Competitiveness_Rising_Above_the_Gathering_Storm.asp
52
Research and Development in the FY 2006 Budget, Selected Trends in Non
Defense R&D, Figure 5, AAAS R&D Budget and Policy Program, American
Association for the Advancement of Science, 2006, accessed 24 July 2008 at
http://www.aaas.org/spp/rd/trnon06c.pdf
53
Jonathan Adams, ‘‘Science, Wealth and the Scientific Investments of Nations,’’
Conference Proceedings, Perspectives on U.S. Competitiveness in Science and
Technology, Meeting on Rising Above the Gathering Storm: Energizing and
Employing America for a Brighter Economic Future, p. 37.
54
Annual Report to Congress on Foreign Economic Collection and Industrial
Espionage, 2005, p. 10.
55
Ibid., p. 10.
56
FBI Headline Archives, ‘‘Protecting Trade Secrets: FBI Cracks Down on
Economic Espionage,’’ accessed 8 July 2008 at http://www.fbi.gov/page2/
oct03/secrets101003.htm
57
M.E. (Spike) Bowman remarks, 19 March 2008.
58
Sam Vaknin, ‘‘The Industrious Spies,’’ Global Politician, 6 June 2006, accessed 16
July 2008 at http://www.globalpolitician.com/21824-military-intelligence
59
American Society for Industrial Security, accessed 1 July 2008 at http://
www.ctcintl.com/facts.shtml
60
Remarks of Cassandra Chandler, Assistant Director, Federal Bureau of
Investigation, 23 April 2004.
61
FY 2008=FY 2009 Budget Estimates, Defense Security Service, Department of
Defense, p. 459.
62
‘‘Spies on the Inside, Foreign Intrigue on American Soil,’’ Headline Archives,
FBI, accessed at 8 July 2008 at http://www.fbi.gov
63
National Foreign Intelligence Program, ANSIR Program, 22 October 2002,
accessed 8 July 2008 at http://indianapolis.fbi.gov/pgnatforintell.htm