CD4D Export Control and Economic Espionage Briefing Unit Chief CD4D Alexis Hatten Phone: 202-324-6066.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
Sourcing Equity Globally
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Chapter 1: Expanding Abroad Motivations, Means, and Mentalities
Export Control Regulations What Investigators Need to Know.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
Espionage Indicators Briefing 1 U.S. Department of Commerce
Introduction to Cyber Crime Investigation Course Conducted in English Institute for Information Industry Decision Group.
Time Share Fraud Investigations
 Is becoming more successful › New ways of communication, technology › Easy to travel  The world is technically getting smaller  However, potential.
3 Business in the Global Economy 3-1 International Business Basics
Conferences and Incentives Statistics April 2010 CMR Cypronetwork Marketing Research & Consulting PRESENTATION OF MAIN RESULTS CONFERENCES AND INCENTIVES.
COUNTERINTELLIGENCE TRENDS
Promoting Objectivity in Research by Managing, Reducing, or Eliminating Conflicts of Interest UT HOP UT HOP The University of Texas at Austin.
Export Controls Michael Reeves Export Control Officer Michael Reeves Export Control Officer.
Copyright © 2002 by Harcourt, Inc. All rights reserved. Topic 8 : Globalization and Business Lecturer: Zhu Wenzhong.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Chapter 15: Government at Work: The Bureaucracy Section 2
Globalization of Economy and Expanding Internet Usage
Deemed Exports Erin Golsen Export Policy Analyst Office of Nonproliferation Controls and Treaty Compliance.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
© The McGraw-Hill Companies, Inc., 2008 McGraw-Hill/Irwin Financial & Managerial Accounting The Basis for Business Decisions FOURTEENTH EDITION Williams.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
1 Objective: To provide an overview of the main organizational issues when establishing and operating in an overseas market. Summary: 6.1 Globalization.
SMALL BUSINESS MANAGEMENT
My Own Business The Business Plan. The Plan A business plan is a written document that describes your business objectives and strategies, your financial.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
International HR 1. Globalization Forces for Globalization Free Trade (EU, NAFTA, WTO) Free Trade (EU, NAFTA, WTO) Political and economic liberalization.
Managing Global Research and Development (R&D)
1 SMALL BUSINESS MANAGEMENT Chapter 4 The Business Plan.
Chapter 15: Government at Work: The Bureaucracy Section 2
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
INTERNATIONALIZATION OF APRU UNIVERSITIES -LOCAL PRACTICES AND FUTURE DEVELOPMENTS- President Xu, Zhihong Peking University June, 24, 2004.
Enforcing IP Rights Involving Foreign Companies Greg Vogler Chicago, Illinois May 2013.
How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Chapter 1 The Internationalization Process Key Points Rationale Process Dimensions Course Content Overview.
 U.S. laws and their implemented regulations that prohibit the unauthorized “export” of certain controlled ITEMS, INFORMATION OR SOFTWARE to foreign.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Chapter 4: Ethics and Business Decision Making Chapter 4: Ethics and Business Decision Making.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
+ Enron the Unsinkable Ship Nancy Vazquez. + Overview Describe the concept of ‘Creative Accounting’. How the unsinkable ship was sunk to the bottom of.
September 11 th Attacks By: Jacob Wall.
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
GREENBERG TRAURIG, LLP ATTORNEYS AT LAW ©2010. All rights reserved. The New Form I-129: Are You Ready to Certify Compliance with US Export.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
ILO Workers’ Group Priorities: implications for research A Trade union training on research methodology, TMLC, Kisumu, Kenya 6-10 December.
Crown capital management international relations International Affairs.
crimes-report
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
Protecting Your Credit Identity
EXPORT CONTROLS. EXPORT CONTROLS The U.S. Government regulates the WHAT IS EXPORT CONTROL The U.S. Government regulates the Transfer of Information.
Export Control at Jefferson
Bulgarian Small and Medium Enterprise Promotion Agency
T Trade in Services Pilot project in
Export Controls Update
Lynn Titus Jr (Tye) Export Controls Administrator
Prosecuting International Intellectual Property Crimes
Theft of Trade Secrets & Economic Espionage
Bribery Act 2010.
Export Control at Jefferson
Presentation transcript:

CD4D Export Control and Economic Espionage Briefing Unit Chief CD4D Alexis Hatten Phone:

Briefing Focus HISTORY OF ECONOMIC ESPIONAGE AGAINST THE UNITED STATES THE 1996 ECONOMIC ESPIONAGE ACT METHODOLOGIES CASE STUDIES Export Restrictions and Nominee sponsors

ECONOMIC ESPIONAGE HISTORY U.S. National Security Strategy: “…for America to be strong abroad, it must be strong economically at home. At the same time, domestic economic renewal depends on the growth and integration of the global economy…” President Clinton in 1994 CD4D was established to focus upon this threat on November 4, 2003

ECONOMIC ESPIONAGE DEFINITION Foreign power-sponsored or coordinated intelligence activity directed at the U.S. Government or U.S. corporations, establishments, or persons, designed to unlawfully or clandestinely obtain sensitive financial, trade, or economic policy information, proprietary economic information, or critical technologies, or to unlawfully or clandestinely influence sensitive economic policy decisions.

1996 ECONOMIC ESPIONAGE ACT Section 1831: Economic Espionage (Agent of a foreign power): -- Penalties: persons: $500,000 and/or 15 years in prison; organizations: $10,000,000 Section 1832 : Theft of Trade Secrets (Industrial Espionage) : -- Penalties: persons: $500,000 and/or 10 years in prison; organizations: $5,000,000

METHODOLOGIES How does Economic Espionage Occur?

METHODOLOGIES Volunteers Co-opting via “cultural commonalities” Recruitment as agents Surreptitious entries and searches abroad Computer penetrations SIGINT

METHODOLOGIES (Continued) Unsolicited requests for information via , written letters, telephone calls and unannounced visits Inappropriate conduct during visits Solicitation and marketing services International exhibits, conventions, symposia, seminars, lectures, etc…, both in the United States and abroad Marketing foreign technology and services within the United States

METHODOLOGIES (Continued) Joint ventures via front companies Purchase of technology or companies owning the technology Co-opting of former and disgruntled employees Open source collection: -- internet -- libraries - -- dumpster diving

POSSIBLE INDICATORS OF ECONOMIC ESPIONAGE Contact with foreign officials and/or foreign delegations, above and beyond normal responsibilities Frequent travel abroad to attend conferences, lectures, seminars, symposia, etc… Notable enthusiasm for overtime, weekend or other unusual work schedules Interest in matters outside the normal scope of employment Disgruntled Recently terminated/laid off

FIRST ARREST UNDER THE EEA December 7, 1996

PATRICK WORTHING DANIEL WORTHING Victim: Pittsburgh Plate Glass PPG contract employee sells PPG trade secrets valued at $20 Million to undercover FBI agent Sentenced to 15 months in federal prison

DR. TEN HONG LEE Victim: Avery Dennison Corp. An undergraduate at National Taiwan University in Taipei Received Masters Degree at the University of Akron -- Polymer Science Received Ph.D. at Texas Tech -- Chemical Engineering

DR. TEN HONG LEE Victim: Avery Dennison Corp. PIN YEN YANG –President and founder of the Four Pillars Enterprises Company in Taiwan –citizen of Taiwan SALLY YANG -- daughter of Pin Yen Yang -- U.S. citizen -- Research and development for Four Pillars Enterprises Company

DR. TEN HONG LEE Victim: Avery Dennison Corp. Case History July Lee invited to Taiwan by Industrial Technology Research Institute to give lecture Lee then invited to Four Pillars to give lecture by technical director Lee asked to work as “secret consultant” to Four Pillars (paid $25,000 the first year)

DR. TEN HONG LEE Victim: Avery Dennison Corp. Case History From , Lee supplied proprietary/trade secret Avery Dennison technology to Four Pillars Lee paid $150,000 to $160,000 through various channels Multiple contacts with Pin Yen and Sally Yang Estimated losses from $50 - $60 million

DR. TEN HONG LEE Victim: Avery Dennison Corp. Case History Lee cooperated with FBI investigation Meeting between Pin Yen Yang, Sally Yang and Lee on Sep. 4, 1997, in Cleveland Arrests at Cleveland Hopkins Airport

DR. TEN HONG LEE Victim: Avery Dennison Corp. Case History October 1, 1997, 21-count indictment returned against Pin Yen Yang, Sally Yang, AND Four Pillars for: mail fraud wire fraud money laundering receipt of stolen property attempted theft of trade secrets (1832)

DR. TEN HONG LEE Victim: Avery Dennison Corp. Case History October 1, 1997, Dr. Lee pled guilty to wire fraud and agreed to cooperate with the FBI investigation On April 28, 1999, Pin Yen Yang, Sally Yang and Four Pillars all found guilty of conspiracy and attempted theft of trade secrets (1832).

DR. TEN HONG LEE Victim: Avery Dennison Corp. Case History On January 5, 2000, Pin Yen Yang was sentenced to two years probation and six months of home detention Sally Yang received one year probation Four Pillars was fined $5 million Separate civil case

OTHER POINTS OF INTEREST 75 countries have targeted U.S. proprietary/trade secret information Most information that is covertly sought is NOT classified The information may no longer be “cutting edge” by U.S. standards Those involved with economic espionage mostly seek to obtain only bits and pieces of information at a time The threat will continue

Export Restricted Technologies