Trade Secret Theft, Industrial Espionage, and the China Threat

Book description


Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the

Table of contents

  1. Front Cover
  2. Contents (1/2)
  3. Contents (2/2)
  4. About the Author
  5. Introduction
  6. 1. China: The Red Dragon of Economic Espionage (1/5)
  7. 1. China: The Red Dragon of Economic Espionage (2/5)
  8. 1. China: The Red Dragon of Economic Espionage (3/5)
  9. 1. China: The Red Dragon of Economic Espionage (4/5)
  10. 1. China: The Red Dragon of Economic Espionage (5/5)
  11. 2. We Are Not Alone: Economic Espionage and the World (1/2)
  12. 2. We Are Not Alone: Economic Espionage and the World (2/2)
  13. 3. The Background of Economic Espionage (1/2)
  14. 3. The Background of Economic Espionage (2/2)
  15. 4. PRC Acquisition of US Technology*: An Overview and Short History (1/5)
  16. 4. PRC Acquisition of US Technology*: An Overview and Short History (2/5)
  17. 4. PRC Acquisition of US Technology*: An Overview and Short History (3/5)
  18. 4. PRC Acquisition of US Technology*: An Overview and Short History (4/5)
  19. 4. PRC Acquisition of US Technology*: An Overview and Short History (5/5)
  20. 5. Chinese Product Piracy and Counterfeiting* (1/2)
  21. 5. Chinese Product Piracy and Counterfeiting* (2/2)
  22. 6. Who, What, and How China Targets* (1/4)
  23. 6. Who, What, and How China Targets* (2/4)
  24. 6. Who, What, and How China Targets* (3/4)
  25. 6. Who, What, and How China Targets* (4/4)
  26. 7. The China Spy Guide and Open-Source Information (1/3)
  27. 7. The China Spy Guide and Open-Source Information (2/3)
  28. 7. The China Spy Guide and Open-Source Information (3/3)
  29. 8. The Intelligence Cycle and Collection Effort (1/2)
  30. 8. The Intelligence Cycle and Collection Effort (2/2)
  31. 9. Corporate Rivals (1/2)
  32. 9. Corporate Rivals (2/2)
  33. 10. Sources of Information* (1/5)
  34. 10. Sources of Information* (2/5)
  35. 10. Sources of Information* (3/5)
  36. 10. Sources of Information* (4/5)
  37. 10. Sources of Information* (5/5)
  38. 11. The Economic Espionage Act (1/2)
  39. 11. The Economic Espionage Act (2/2)
  40. 12. The U.S. Response to Economic Espionage (1/4)
  41. 12. The U.S. Response to Economic Espionage (2/4)
  42. 12. The U.S. Response to Economic Espionage (3/4)
  43. 12. The U.S. Response to Economic Espionage (4/4)
  44. 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies* (1/2)
  45. 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies* (2/2)
  46. 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (1/3)
  47. 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (2/3)
  48. 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (3/3)
  49. 15. Internet Exploitation: The Web, Your Computer, Your IT System (1/2)
  50. 15. Internet Exploitation: The Web, Your Computer, Your IT System (2/2)
  51. 16. Protecting Your Data (1/6)
  52. 16. Protecting Your Data (2/6)
  53. 16. Protecting Your Data (3/6)
  54. 16. Protecting Your Data (4/6)
  55. 16. Protecting Your Data (5/6)
  56. 16. Protecting Your Data (6/6)
  57. 17. Source Documents and Other Resources (1/3)
  58. 17. Source Documents and Other Resources (2/3)
  59. 17. Source Documents and Other Resources (3/3)
  60. Appendix A: The Dongfan “Gregg” Chung and Chi Mak Economic Espionage Cases (1/2)
  61. Appendix A: The Dongfan “Gregg” Chung and Chi Mak Economic Espionage Cases (2/2)
  62. Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case (1/2)
  63. Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case (2/2)
  64. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (1/5)
  65. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (2/5)
  66. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (3/5)
  67. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (4/5)
  68. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (5/5)
  69. Appendix D: Special 301 Report, China (1/3)
  70. Appendix D: Special 301 Report, China (2/3)
  71. Appendix D: Special 301 Report, China (3/3)

Product information

  • Title: Trade Secret Theft, Industrial Espionage, and the China Threat
  • Author(s): Carl Roper
  • Release date: December 2013
  • Publisher(s): CRC Press
  • ISBN: 9781439899397