Trade Secret Theft, Industrial Espionage, and the China Threat

Book description

This book provides an overview of economic espionage as practiced by a range of nations from around the world focusing on the mass scale in which information is being taken for China's growth and development. It supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect information and assets, both at home and abroad.

Table of contents

  1. Front Cover
  2. Contents (1/2)
  3. Contents (2/2)
  4. About the Author
  5. Introduction
  6. 1. China: The Red Dragon of Economic Espionage (1/5)
  7. 1. China: The Red Dragon of Economic Espionage (2/5)
  8. 1. China: The Red Dragon of Economic Espionage (3/5)
  9. 1. China: The Red Dragon of Economic Espionage (4/5)
  10. 1. China: The Red Dragon of Economic Espionage (5/5)
  11. 2. We Are Not Alone: Economic Espionage and the World (1/2)
  12. 2. We Are Not Alone: Economic Espionage and the World (2/2)
  13. 3. The Background of Economic Espionage (1/2)
  14. 3. The Background of Economic Espionage (2/2)
  15. 4. PRC Acquisition of US Technology*: An Overview and Short History (1/5)
  16. 4. PRC Acquisition of US Technology*: An Overview and Short History (2/5)
  17. 4. PRC Acquisition of US Technology*: An Overview and Short History (3/5)
  18. 4. PRC Acquisition of US Technology*: An Overview and Short History (4/5)
  19. 4. PRC Acquisition of US Technology*: An Overview and Short History (5/5)
  20. 5. Chinese Product Piracy and Counterfeiting* (1/2)
  21. 5. Chinese Product Piracy and Counterfeiting* (2/2)
  22. 6. Who, What, and How China Targets* (1/4)
  23. 6. Who, What, and How China Targets* (2/4)
  24. 6. Who, What, and How China Targets* (3/4)
  25. 6. Who, What, and How China Targets* (4/4)
  26. 7. The China Spy Guide and Open-Source Information (1/3)
  27. 7. The China Spy Guide and Open-Source Information (2/3)
  28. 7. The China Spy Guide and Open-Source Information (3/3)
  29. 8. The Intelligence Cycle and Collection Effort (1/2)
  30. 8. The Intelligence Cycle and Collection Effort (2/2)
  31. 9. Corporate Rivals (1/2)
  32. 9. Corporate Rivals (2/2)
  33. 10. Sources of Information* (1/5)
  34. 10. Sources of Information* (2/5)
  35. 10. Sources of Information* (3/5)
  36. 10. Sources of Information* (4/5)
  37. 10. Sources of Information* (5/5)
  38. 11. The Economic Espionage Act (1/2)
  39. 11. The Economic Espionage Act (2/2)
  40. 12. The U.S. Response to Economic Espionage (1/4)
  41. 12. The U.S. Response to Economic Espionage (2/4)
  42. 12. The U.S. Response to Economic Espionage (3/4)
  43. 12. The U.S. Response to Economic Espionage (4/4)
  44. 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies* (1/2)
  45. 13. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign Targeting of US Technologies* (2/2)
  46. 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (1/3)
  47. 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (2/3)
  48. 14. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets (3/3)
  49. 15. Internet Exploitation: The Web, Your Computer, Your IT System (1/2)
  50. 15. Internet Exploitation: The Web, Your Computer, Your IT System (2/2)
  51. 16. Protecting Your Data (1/6)
  52. 16. Protecting Your Data (2/6)
  53. 16. Protecting Your Data (3/6)
  54. 16. Protecting Your Data (4/6)
  55. 16. Protecting Your Data (5/6)
  56. 16. Protecting Your Data (6/6)
  57. 17. Source Documents and Other Resources (1/3)
  58. 17. Source Documents and Other Resources (2/3)
  59. 17. Source Documents and Other Resources (3/3)
  60. Appendix A: The Dongfan “Gregg” Chung and Chi Mak Economic Espionage Cases (1/2)
  61. Appendix A: The Dongfan “Gregg” Chung and Chi Mak Economic Espionage Cases (2/2)
  62. Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case (1/2)
  63. Appendix B: Economic Espionage Killed the Company, The Four Pillars Enterprise Case (2/2)
  64. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (1/5)
  65. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (2/5)
  66. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (3/5)
  67. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (4/5)
  68. Appendix C: Summary of Major US Export Enforcement, Economic Espionage, Trade Secret, and Embargo-Related Criminal Cases, 2007 to the Present (5/5)
  69. Appendix D: Special 301 Report, China (1/3)
  70. Appendix D: Special 301 Report, China (2/3)
  71. Appendix D: Special 301 Report, China (3/3)

Product information

  • Title: Trade Secret Theft, Industrial Espionage, and the China Threat
  • Author(s): Carl Roper
  • Release date: December 2013
  • Publisher(s): CRC Press
  • ISBN: 9781439899397