New Industrtial Espionage - TAI 201412

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

O PAC I T I E S

The information revolution has rendered obsolete


the legacy legal regime on intellectual property
rights, enabling spying for commercial purposes to
morph into a strategic issue.

The New Industrial Espionage


Joel Brenner

T
he lawless world of international espio- prosecutors tied him to a trove of secret GM
nage, until recently the preserve of the documents, and VW settled with GM for $100
most secretive organs of government, million and a commitment to buy $1 billion in
has come to affect the everyday commercial af- auto parts. American know-how was the target,
fairs of businesses around the world, which are and by the mid-1990s, tens of billions of dollars’
woefully unprepared to deal with it. Economic worth of intellectual property had reportedly
espionage is not itself a new phenomenon. Chi- been stolen from American companies.2
nese silkworms legendarily made their way to This was the background against which
India in a clandestine transaction. In 1812, Congress passed the Economic Espionage Act
Francis Cabot Lowell traveled to Britain, where of 1986, which criminalized stealing intellec-
he visited and managed to memorize and steal tual property.3 The incidents that led to the
the secret workings of the Cartwright loom.1 act, while notorious, were exceptional. That
More recently, starting no later than 1980, is no longer true. The ubiquitous digitization
Hitachi and other Japanese companies repeat-
edly launched espionage attacks against IBM 1Cartwright’s effort had been foreseen and en-
and other American companies, with the sup- couraged by Treasury Secretary Alexander
port of the Japanese government. In the early Hamilton’s Report on Manufactures Decem-
1990s, the purchasing chief for GM’s European ber 5, 1971. Hamilton specifically referred to
operations decamped for Volkswagen, alleg- textile mill technology and said, “To procure
edly taking with him GM’s cost-cutting se- all such machines as are known in any part
crets. Though he was never convicted, German of Europe, can only require a proper provi-
sion and due pains.” His report was rejected
Joel Brenner is a lawyer and security consultant by Congress, however, and so did not become
and the Robert Wilhelm Fellow for 2014–15 in official policy of the United States.
the Center for International Studies at the Mas- 2U.S. v. Kai-lo Hsu, 155 F.3d 189, ¶23 (3d Cir.

sachusetts Institute of Technology. He is the former 1998), citing Richard J. Heffernan and Dan T.
national counterintelligence executive and former Starwood, Trends in Intellectual Property Loss
inspector general and senior counsel of the National (1996). Hsu involved the theft of secrets from
Security Agency. Bristol-Myers Squibb.

WINTER (JANUARY/FEBRUARY) 2015 1


OPACITIES

of information and pervasive connectivity of technology, aeronautical test data, and valuable
electronic networks have facilitated espionage chemical and pharmaceutical formulas in this
as well as productivity, and they have turned way. The governments of Germany and Britain
exceptional theft directed against the largest have complained publicly about the thievery.
American companies into a daily reality for Networks in Japan and Australia have also been
companies large and small. scoured. About 20 percent of European compa-
Foreign intelligence services and their sur- nies have been victim to at least one attempt to
rogates have been penetrating the networks of steal a trade secret over the past decade.8 West-
Western corporations on a regular basis and ern companies and governments nevertheless
stealing technology electronically since the late continued to dither.
1990s, but for years most businesses preferred Then in 2013 the security firm Mandiant
to ignore the problem. That was in part because disclosed that hundreds of terabytes of data
they did not understand it and in part for fear from 141 companies in 20 different industries
of antagonizing countries in which they wished had been stolen remotely by China, and traced
to do business. That began to change in 2010, the theft back to a specific office in the Peo-
when Google admitted that Chinese cyber spies ple’s Liberation Army known as unit 61398.9
had penetrated its networks, stolen source code, The U.S. government could have made similar
and used Google both to spy on its users and disclosures years earlier but regrettably chose
to worm their way into many other companies.
About a week later the Christian Science Moni- 318 U.S.C. §§ 1831-1832. Section 1831 criminal-
tor revealed that persistent electronic espionage izes “economic espionage”, which requires a
against Marathon Oil, Exxon-Mobil, and showing that the defendant knew that a foreign
ConocoPhillips had yielded massive amounts government, instrumentality, or agent would
of information about the quantity, value, and benefit from the theft. Section 1832 criminal-
location of global oil discoveries. The theft was izes “industrial espionage”, which is the theft
traced to a single site in China.4 That same of trade secrets in interstate or foreign com-
year, Chinese spies mounted a sophisticated merce. The distinction between industrial and
penetration of RSA, the company known for economic espionage is therefore significant for
security tokens. These tokens are the crypto- Federal criminal law purposes, but the terms
graphic keys to other companies’ secrets. Their are otherwise often used interchangeably.
theft led to the compromise of some 760 other 4Mark Clayton, “US Oil industry hit by cyber-

organizations, including four major defense attacks: Was China Involved?”, January 25,
contractors and the Massachusetts Institute of 2010; McAfee, “Global Energy Cyberattacks:
Technology.5 ‘Night Dragon’”, February 10, 2011.
These incidents represent a small part of the 5See Brian Krebs, “Who Else Was Hit by the RSA

systematic theft of intellectual property (IP), Attackers?”, Krebs on Security, October 11.
much of it state sponsored, that shows no sign 6Office of the National Counterintelligence Ex-

of abating. In 2009, while serving as the nation- ecutive, “Annual Report to Congress on For-
al counterintelligence executive, I warned that eign Economic Collection and Industrial Es-
foreign entities were penetrating U.S. networks pionage, FY 2008” (“ONCIX 2008 Report”),
to steal technology, trade secrets and proprietary July 23, 2009.
information.6 The warning got little traction. 7ONCIX, “Foreign Spies Stealing U.S. Economic

In 2011, however, following the Google affair, Secrets in Cyberspace: Report to Congress on
the undertone of unease became audible when Foreign Economic Collection and Industrial
my successor reported that “[f]oreign economic Espionage, 2009–2011” (“ONCIX 2011 Re-
collection and industrial espionage against the port”), October 2011.
United States represent significant and growing 8Joel Brenner, Glass Houses: Privacy, Secrecy, and

threats to the nation’s prosperity and security.”7 Cyber Insecurity in a Transparent World (Pen-
This is unquestionably true. American and guin, 2013); see also Alex Barker, “Brussels
European firms have lost automotive brak- Takes Aim at Economic Espionage”, Financial
ing and battery technology, high-speed rail Times, November 28, 2013.

2 THE AMERICAN INTEREST


THE NEW INDUSTRIAL ESPIONAGE

silence. After the Mandiant report, however, Even as the level of theft increases, quantify-
the thievery had become too brazen, pervasive ing its aggregate financial cost is difficult. For
and obvious to ignore. This past May, in United reputational and liability reasons, many compa-
States v. Wang, a Federal grand jury indicted nies will not disclose that they have been victim-
five Chinese military personnel associated with ized, and companies that do business in China
unit 61398 for economic espionage and related are resolutely silent on the subject (at least in
crimes against five U.S. companies and a U.S. public) for fear of retaliation. In any case, trans-
labor union. lating an IP loss into lost market share, revenue,
State-sponsored espionage directed at com- and profit is usually speculative. This kind of
pany secrets is still growing, however. In its loss has therefore been impossible to insure
most recent breach report, Verizon reported against. But regardless of the aggregate figures,
that state-affiliated actors had increased signifi- the effect of cyber-enabled economic espionage
cantly to account for 21 percent of all breaches. on victim companies can be devastating. Those
The Chinese intelligence services are the worst companies deserve effective remedies.
but not the only sponsors of this kind of larce- At base, network-enabled IP theft is a trade
ny. The Russian intelligence services are quieter and economic issue, and it raises two questions.
and more selective than the Chinese, but they The first is whether theft via networks should
too are in the business of stealing IP for com- be treated differently than theft by any other
mercial purposes. Indeed, they operate under a means. This question is easily answered no,
public directive from President Putin to “more though cyber IP theft presents challenges of
actively protect the economic interests of our proof. The second question is whether the theft
companies abroad.”10 Iran also engages in eco- of legally protected IP should be treated differ-
nomic espionage, and unlike other offenders, it ently when undertaken by governments or their
is also active in attempting to disrupt American surrogates. Answering this question requires an
banks.11 France and Israel are frequently cited examination of basic ideological differences re-
as offenders too, though recent examples are garding espionage.
hard to find in open sources. Taken together,
this larceny is an assault on national economies
in which jobs and wealth depend on innovation
and IP protection. By 2010, IP-intensive busi-
M oses sent spies into Canaan. In the Rig
Veda, which is at least as old as the oldest
text in the Hebrew Bible, spies sit at the table
nesses accounted for more than a third of U.S. with the god Varuna. To most practitioners of
GDP and, directly or indirectly, for nearly 28 espionage, and indeed to anyone familiar with
percent of all U.S. jobs.12 the hard realities of international relations, the
Technology alone cannot prevent this lar- idea of limiting the ancient practice through
ceny. Attribution of cyber network opera-
tions—that is, proving who did it—is diffi- 9Mandiant, “APT 1: Exposing One of China’s
cult, though with enough time and resources Cyber Espionage Units”, February 2013.
it can sometimes be done, as the Mandiant 10 Quoted in the ONCIX 2011 Report, p. 6.

report demonstrates.13 But even if the internet 11See appendix, ONCIX 2008 Report.

were fundamentally re-engineered to make at- 12U.S. Department of Commerce, “Intellectual

tribution more reliable at the device level, the Property and the U.S. Economy: Industries in
weakest link in the system would remain the Focus”, March 2012, pp. vi–viii.
human user. Moreover, the operation of na- 13There are three levels of attribution. First, from

tional and global enterprises, whether private what machine did the attack originate? Second,
or governmental, requires sensitive information who controlled the machine? And third, who
to be widely shared among people in far-flung was that person working for? The first level,
locations. Clamping down severely on that dis- and in some cases the second, can sometimes
semination would impair productivity and the be done reliably through electronic means
quality of decision-making. Some degree of alone, with time. The third level, if done at all,
network vulnerabilities will therefore continue, usually requires additional intelligence means
regardless of technological improvements. and methods.

WINTER (JANUARY/FEBRUARY) 2015 3


OPACITIES

law is naive. Espionage is premised on breaking to carve out IP theft as qualitatively different
laws—other countries’ laws. Spies will under- from other espionage is merely a self-serving,
take it so long as their masters believe they can bourgeois legalism.
get away with it, and it has long been tolerated The Chinese are in any event ideologically
under international law. hostile to law as a means of controlling the state.
Though espionage is ancient, its modalities Indeed, the English phrase “rule of law”, by
have recently shifted in two fundamental ways. which we mean that the law controls the state as
First, it has moved from a retail-scale business well as private actors, can also be translated into
to a wholesale business. The quantity of pur- Chinese as “rule by law”, by which the Chinese
loined information moving over our networks mean that the state uses law to achieve the aims
is measured in units too large for most people of the state.14 Last year the Chinese Commu-
to comprehend. And if you can extract tera- nist Party explicitly criticized Western notions
bytes of data from an adversary’s network from of rule of law and constitutional government as
thousands of miles away, you may not require “attempt to undermine the current leadership
a human spy in the adversary’s camp. Or the and the socialism with Chinese characteristics
spy you require may be an underling in the IT system of governance.”15
department rather than the Defense Minister’s This philosophical disposition nevertheless
principal private secretary. contains a contradiction that will become in-
The second change is the relentless target- creasingly apparent. China’s policy of a peace-
ing of proprietary, non-military technology. ful rise in international affairs is based on the
There have been cases in previous centuries belief that its increasing prominence will pro-
of state-sponsored espionage directed against mote stability, benefit its neighbors, and in-
economic targets, but they generally involved crease its comprehensive national power, by
military technology, such as European cannon- which they mean cultural and diplomatic influ-
making technology sought by the Turks in the ence as well as military power. To achieve those
15th century, or British and German naval tech- goals, China must stand for something, just as
nology before World War I. In contrast, state- the United States, however imperfectly, stands
sponsored espionage against commercial IP is for economic and political liberty at home and
unrelated, in many cases, to military or defense. abroad. But the Chinese, like the Japanese in
This kind of espionage has become pervasive in the 1980s, are well aware they have been unable
part because insecure networks make it easy to either to articulate or exemplify a national ideal
get away with. The collapse of the Soviet Union that other nations can be expected to recognize,
also drove home to the Russians, the Chinese let alone willingly follow. Their growing repu-
and others that if they could not compete tech- tation for international commercial IP banditry
nologically and economically with the West, is inconsistent with this aspiration.
and with the United States in particular, they The level of this banditry, most of it from
could not compete geopolitically in any di- China, has reached alarming levels. State-spon-
mension. This is largely why state-sponsored, sored theft of IP is not merely an attack on the
network-based IP theft is state policy in China, victim enterprises. It is also an attack on the
Russia, and certain other countries, and why it basic principles of the multilateral commercial
has become a plague in the West. order to which China and many other nations
To Chinese and Russian ears, however, the have already agreed and from which they ben-
distinction between economic and other kinds efit. It is therefore time to consider measures
of espionage is an ideological construction, con-
venient only to the West. In their view, all state- 14For this point and for the point expressed in the
sponsored espionage is by definition conducted following paragraph, I thank Nigel Inkster,
in the national interest. In these countries, CMG, Director of Transnational Threats and
where a distinction between the public and Political Risk, International Institute for Stra-
private sectors is either non-existent or blurred, tegic Studies, London.
and where public and private actions are ex- 15“Document 9: A China File Translation”, China

pected to support national policy, an attempt File, August 8, 2013.

4 THE AMERICAN INTEREST


THE NEW INDUSTRIAL ESPIONAGE

aimed at strengthening the multilateral system reports to the DSB must be accepted, however,
of political norms that apply, or should apply, to unless there is a consensus that they be rejected.
state-sponsored IP theft. This rule virtually ensures acceptance.
From the perspective of 1994, TRIPS and

I n 1994 the Marrakesh Agreement among the


world’s trading nations created the World Trade
Organization (WTO), a successor the General
GATS brought the multilateral trading regime
up to date, but that was long before the internet
had become the backbone of a digitized knowl-
Agreement on Tariffs and Trade (GATT). The edge economy with little respect for interna-
WTO structure included the Agreement on tional borders. Consequently, TRIPS did not
Trade-Related Aspects of Intellectual Property deal with cross-border enforcement challenges,
Rights, known as TRIPS.16 Previous multilat- which are now rife as a result of network-en-
eral agreements had focused on goods trade and abled IP theft by both states and criminal or-
did not protect intellectual property, which by ganizations. In 2013 Richard Clarke, who was
then accounted for a large and growing percent- special adviser for cybersecurity in the Beroge
age of the world’s wealth, particularly in Europe W. Bush Administration, and James Lewis, a
and North America. TRIPS aimed to protect IP senior fellow at the Center for Strategic and
from predation. It was an important element, International Studies, each suggested that this
along with the then-new General Agreements on form of industrial espionage be outlawed un-
Services (GATS), in updating global trade rules der TRIPS. Computer network operations in
to better reflect the modern global economy as it their nature cross borders and trigger both vir-
existed twenty years ago. tual and actual effects at great distances. This
TRIPS protects not only trademarks, copy- characteristic makes them a fit subject for an
rights, and patented goods but also designs and international remedy. Nevertheless, Clarke
trade secrets. It does so by requiring WTO and Lewis’s suggestion was quickly met with
members to adopt domestic standards for pro- objections. The chief objection was simply to
tecting IP and enforcement procedures and point out that TRIPS merely requires members
penalties to ensure IP holders can effectively en- to enact and enforce at least minimal national
force those rights internally and at their borders, laws to enforce TRIPS principles; it cannot deal
such as by excluding counterfeit goods. These with extra-territorial misbehavior. As David
requirements need not meet Western standards, Fidler of the Indiana University School of Law
but they must “permit effective action” against put it, “WTO rules operate on a territorial ba-
infringement and must provide “expeditious sis, meaning that only in unusual circumstanc-
remedies.” Developing nations were given sig- es do the rules recognize the legitimacy of the
nificant time to comply with this requirement extraterritorial application of a WTO member’s
through transitional arrangements. When Chi- domestic law in trade contexts.”17
na and Russia joined the WTO (in 2001 and This is a fair statement of how TRIPS has
2012, respectively), however, they immediately worked for the past twenty years. As a result,
assumed full TRIPS obligations. however, we find ourselves with an internation-
Violations of TRIPS are covered by the al trading regime in which members are obli-
WTO’s dispute settlement understanding gated to prohibit IP theft in their national laws,
(DSU), through which member states, but not but are free to engage in it through network-
private parties, can bring disputes to the WTO enabled espionage in other countries. This is
for consultation and, if necessary, resolution
by decision. Disputes that cannot be resolved 16I am grateful to Robert C. Fisher of Hills &
through consultation are heard in the first in- Company, formerly of the Office of the U.S.
stance by a dispute panel, and in the second Trade Representative, for his advice on WTO
instance by an appellate body. These bodies and TRIPS issues. The opinions and any errors
make findings and recommendations; binding in this discussion are mine, however, not his.
decisions can be made only by representatives 17Fidler, “Why the WTO is not an Appropriate

of all member governments, acting as the Dis- Venue for Addressing Economic Cyber Espio-
pute Settlement Body. Panel and appellate body nage”, Arms Control Law, February 11, 2013.

WINTER (JANUARY/FEBRUARY) 2015 5


OPACITIES

an irrational and probably untenable arrange- complaints would undermine the Doha Dec-
ment. The question, then, is how TRIPS and laration on Public Health. That Declaration
the WTO’s dispute settlement structure might recognized that TRIPS “can and should be
work to inhibit state-sponsored IP theft. interpreted and implemented in a manner sup-
Fortunately, TRIPS already enshrines prin- portive of WTO members’ right to protect
ciples of fair play and honest dealing that are public health and, in particular, to promote
inconsistent with cross-border IP theft “for access to medicines for all.” The specific fear
commercial purposes”, and it establishes the is that developed nations with large pharma-
right to protect oneself from such theft (Article ceutical industries, like Switzerland the United
26). On its face, this right applies against all States, would use non-violation complaints as
third parties—states as well as non-states—re- “a stealth attack on WTO members’ sovereign
gardless of the means by which it is violated. right to use TRIPS flexibilities such as compul-
Another provision enshrines the principle of sory licensing to safeguard health and promote
honest commercial practice: “Natural and legal access to medicines for all.”18
persons shall have the possibility of preventing The objection to the general lifting of the
information lawfully within their control from moratorium on non-violation complaints in
being disclosed to, acquired by, or used by oth- TRIPS is unlikely to be overcome. But nations
ers without their consent in a manner contrary asserting this objection do not assert a right to
to honest commercial practices” (Article 39.2). steal IP; they are concerned with health. So a
These same principles should form the founda- multilateral consensus against network-enabled
tion of a remedy in the WTO as well as under IP theft may therefore be possible if a health-
national law. related exception can be crisply carved out, and
diplomatic efforts to achieve it could proceed

T he international trade regime in goods


and services has long recognized an ex-
ceptional remedy known as a “non-violation
based on either of two proposals.
The first proposal would lift the morato-
rium on non-violation complaints only in cases
nullification of benefits”, based on the premise of non-military IP theft, even when engaged in
that negotiated benefits may be “nullified or by a sovereign. The second proposal, alterna-
impaired” by measures that may be technically tively, would amend TRIPS to make such theft
consistent with TRIPS provisions (GATT Ar- an explicit violation. Neither proposal would af-
ticle 23). This remedy has been rarely invoked, fect developing nations’ asserted right to ignore
though a provision for it appears in many bilat- or compulsorily take a patent for public health
eral U.S. trade agreements, and various WTO purposes. Amending TRIPS may be harder to
decisions make it clear that the remedy is disfa- achieve, but would be preferable for two rea-
vored. The United States and Switzerland pro- sons: It would give clearer guidance to arbitra-
posed to permit such complaints in the case of tors faced with actual disputes, and it could
IP, but widespread objections, especially from lead to the imposition of obligatory rather than
the developing world, resulted in a 1994 mora- advisory remedies as would apply in cases on
torium on them, which has been extended sev- non-violations (DSU Article 26).
eral times since then. Pursuing either path would require patience
In theory, the opposition to permitting non- and a significant diplomatic effort. That ef-
violation complaints under TRIPS is grounded fort should start with drafting the necessary
in resistance to a mechanism that could lead to principles into the Trans-Pacific Partnership
an expansion of specifically negotiated TRIPS (TPP) and the Transatlantic Trade and Invest-
obligations. But that argument merely turns ment Partnership (TTIP), which are now being
inside out the rationale for permitting non-
violation complaints in the first place: namely, 18“WTO TRIPS Council, “India’s intervention
that countries sometimes engage in measures on Non-Violation and Situation Complaints”,
that do effectively nullify those negotiated obli- February 26, 2014; “Intellectual property
gations. In practice, the opposition stems more meeting mulls Irish tobacco plan, drug tariffs,
narrowly from the belief that non-violation sport, non-violation.”

6 THE AMERICAN INTEREST


THE NEW INDUSTRIAL ESPIONAGE

negotiated. Attempts to lift the TRIPS mora- only economic espionage that offends existing
torium or amend TRIPS could benefit from international norms is the stealing of IP for
this experience. Recognizing that TRIPS cov- commercial gain—regardless of whether a state
ers state-sponsored IP theft would be important or a private actor undertakes it. This is not a
not only as a remedy in its own right. It may be self-serving American distinction; TRIPS rec-
even more important as a means of controlling ognizes the significance of a “commercial pur-
retaliation for actions taken under national laws. pose” and “unfair commercial use” in establish-
ing violations.

T here has been no shortage of excuses for


failing to address state-sponsored cyber
theft of IP. The first excuse is that “everybody
Hence, penetrating a foreign banking net-
work for the purpose of understanding or dis-
rupting terrorist financing is not commercial
does it.” Americans have had this charge thrown use, and no one proposes to prohibit the col-
at them with force in the wake of Edward lection of economic information per se, even
Snowden’s disclosures, but Snowden is a red her- when it pertains to an individual firm, let alone
ring here. Stealing IP for commercial gain is un- an economic sector or an entire economy. Nor
like the surveillance he exposed because it is an should a state be prohibited from conducting
assault on property whose right to protection is espionage for the purpose of understanding,
already recognized in TRIPS. True enough, the say, the condition of another nation’s economy
Chinese and the Russians do not accept this dis- or its position in international political or trade
tinction. But they are members of, and benefit negotiations, or for the purpose of interdicting
from, a world trade order that rests on precisely criminal behavior. Every nation able to conduct
such distinctions; they should not be permitted that kind of espionage does so and will con-
to participate in that order while they simulta- tinue to do so. Nor would the development of
neously go about undermining it. weaponry or military technology (as defined
The “everybody does it” rationale is also by the Wassenaar Agreement) be off-limits to
false. The U.S. government does not employ its espionage merely because it is undertaken by a
intelligence services to steal IP in support of na- commercial entity. None of these activities of-
tional industries—for two good reasons. First, fends TRIPS principles.
it is a bedrock principle of American policy Another explanation for failing to address
to strengthen the legal order that supports IP economic espionage through international
rights and international trade. To sacrifice that norms is that it supposedly cannot be stopped
principle for whatever tactical advantage would and is now simply a condition of doing busi-
derive from IP theft would be foolish. Second, ness. But that is precisely the point to be tested.
to be brutally honest about it, the Russians and Equally defeatist is the rationale that we inno-
Chinese don’t have much IP to steal. Russia, vate faster than the thieves, so they will never
for all its cultural depth and brilliant scientific catch up with our latest stuff. This is what chief
minds, has never produced a commercially vi- executive officers tell their boards of directors
able computer chip. China, for all its engineer- when they find themselves over a barrel in a law-
ing prowess and dramatic growth rate, has thus less and disruptive cyber environment. But the
far not produced much innovation. argument ignores the fact that third-world mar-
In an effort to prove that the U.S. govern- kets are usually happy to buy last year’s model
ment does “it”, however, Snowden has asserted or the one before that. They may even prefer it.
that the United States engages in “economic We find ourselves at a juncture reminiscent
espionage” because it will grab any informa- of the early days of the campaign against for-
tion it can, economic and otherwise. But “eco- eign bribery. Many were scornful of the Foreign
nomic espionage” is much too broad a term to Corrupt Practices Act of 1977 and called it un-
be useful. Neither Snowden nor anyone else has realistic or worse. The list of objections to that
shown that U.S. intelligence has stolen IP for act rings a familiar bell: It would be difficult
commercial purposes, but those who imagine to distinguish corrupt payments from legiti-
that he is a noble whistleblower incline to be- mate payments; business could not be done in
lieve everything he says without scrutiny. The some countries without corrupt payments; and,

WINTER (JANUARY/FEBRUARY) 2015 7


OPACITIES

of course, everybody supposedly did it. But en- be presented, with all the well-known difficul-
trenched corruption did long-term damage to ties of attributing cyber operations to a particu-
the political culture of less developed countries, lar device, operator, and organization. And if
and forbidding it was the right thing to do. The some or all of that evidence were classified, the
European Union and the United Kingdom complainant’s government might have to make
eventually implemented their own anti-bribery a difficult decision about giving up intelligence
measures, thus copying the legislation they sources and methods.
formerly ridiculed. Foreign commercial brib- Countries already deal with that problem
ery has not been wiped out, but it now comes in their own national courts, however. Assum-
with much higher costs. Transnational IP theft ing that misappropriation were shown, would
probably cannot be wiped out either, but sig- it be sufficient to show an intention to use the
nificant costs can be attached to it that would misappropriated IP for commercial purposes,
form a limiting boundary for its practice. or would actual introduction of a product into
The practical difficulties of implementing the flow of commerce be required? Would
even limited espionage protections under the proof of damage be necessary? These questions
WTO are nevertheless significant, and they raise ordinary issues of judicial proof. Parties
begin with the need to put a boundary on the and courts deal with them regularly. Remedies
national security exception to the TRIPS rules. would not seem different in kind from those
Article 73 states that the agreement cannot be that arise in other WTO cases.
used “to prevent a Member from taking any ac- The fundamental obstacles to bringing a
tion which it considers necessary for the pro- measure of international order to rampant IP
tection of its essential security interests.” On theft remain political and commercial. Com-
paper, that exception is limited to disclosure ob- panies and nations must weigh the likelihood
ligations, to rights under the UN Charter, and of retaliation against complainants by the alleg-
to matters involving fissionable materials, traf- edly offending nation, either under that nation’s
fic in arms, and measures taken in wartime or law or by commercial or political measures.
international emergency. In practice, however, That difficulty will not disappear. Potential
these limitations may not apply. claimants would have to deal with it, just as
Moreover, as already noted, the Chinese litigants deal with other strategic decisions.
and Russians do not recognize a distinction be- Undoubtedly, there would be some potential
tween national and economic security. This is for unwanted escalation. In the absence of in-
a deep ideological belief and not merely a posi- stitutionalized legal means to deal with this
tion of current convenience. The United States problem, however, victim companies and states
also accepts the linkage between economic and will be tempted to take unilateral steps, overt
national security; President Obama referred to and covert, that hold even greater potential for
economics or the economy 130 times in his instability and that bear a far greater risk of es-
current National Security Strategy. But a le- calation. If the level of commercial espionage
gitimate exception cannot be allowed to swal- does not abate, we can expect to see retaliatory
low the entire TRIPS principle of fair dealing cyber measures against economic sectors, with
in international trade. A prosperous regime of significant potential for disruption.
global trade requires a national security excep-
tion and a requirement that trading partners
obey a common set of norms. If the security
requirement could be invoked to permit state-
T he use of national intelligence means (di-
rectly or through proxies) to steal technol-
ogy and business secrets for commercial purpos-
sponsored theft of IP, it could also be invoked es must be brought under control by concerted
to condone the state-sponsored infringement diplomatic efforts as well as enhanced national
of any patent and any other protected right re- laws. The thievery is corrupt, and in the already
lating to any subject. affirmed language of TRIPS, it is “an affront
Network intrusions present difficult eviden- to honest commercial practices in international
tiary issues, but they are not unique in this re- trade.” Thus far most Western companies have
gard. Proof of misappropriation would have to felt that the short-term profits have been worth

8 THE AMERICAN INTEREST


THE NEW INDUSTRIAL ESPIONAGE

the long-term cost of losing technology and in- proscription against network-enabled IP theft
cubating their own competition. But they now in the TPP and the TTIP.
stand at a tipping point. Confronting the chal- Fourth, the U.S. government should en-
lenge will require four concerted initiatives. courage like-minded states to lead a diplo-
First, the United States and like-minded matic effort to include the same proscription
states should agree on a definition of network- in TRIPS, either through a partial lifting of
enabled, non-military IP theft for commercial the current moratorium on non-violation com-
purposes. A fundamental issue will be whether plaints under TRIPS or by amending TRIPS.
to include dual-use technologies. Espionage This effort will require persuading India, Bra-
directed against non-military IP is distinguish- zil, Indonesia, Egypt, and other nations that the
able from the politico-military variety precisely effort to combat network-enabled IP theft will
because it involves property already protected not undermine the Doha Declaration on the
under TRIPS. State sponsorship should not be TRIPS Agreement and Public Health. It will
a predicate in a TRIPS proceeding that involves also require trading nations to give the WTO
network-enabled IP theft, however, any more sufficient resources to deal with an expanding
than, say, in a patent proceeding. Yet including and crowded docket.
state-sponsored acts in the definition is critical The goal in all of this is to devise effective
because it would remove a blanket defense for mechanisms to diminish the plague of net-
such espionage in international law. work-enabled IP predation. Western companies
Second, national laws remain critical and should support this effort because they will
should be strengthened in three important benefit from it, but given the potential for retal-
ways: they should permit the sequestration of iation they cannot be expected to lead it. Prog-
goods containing stolen IP under procedures ress will depend on achieving an international
that are rapid as well as fair; they should deny consensus through hard diplomatic work. That
access to banking systems by companies that work will be difficult and the goal will seem
profit from stolen IP; and they should allow a elusive, but it is high time to begin the effort.
private right of action under national laws by
parties victimized by trade-secret theft.19 19These measures were proposed by The Report of
Third, the U.S. government should lead the Commission on the Theft of American Intel-
a consensus for including an enforceable lectual Property (2013).

WINTER (JANUARY/FEBRUARY) 2015 9

You might also like