CORPORATE AND INDUSTRIAL ESPIONAGE AND THEIR EFFECTS ON AMERICAN 
                            COMPETITIVENESS

=======================================================================

                                HEARING

                               BEFORE THE

                            SUBCOMMITTEE ON
                INTERNATIONAL ECONOMIC POLICY AND TRADE

                                 OF THE

                              COMMITTEE ON
                        INTERNATIONAL RELATIONS
                        HOUSE OF REPRESENTATIVES

                       ONE HUNDRED SIXTH CONGRESS

                             SECOND SESSION

                               __________

                           SEPTEMBER 13, 2000

                               __________

                           Serial No. 106-180

                               __________

    Printed for the use of the Committee on International Relations


        Available via the World Wide Web: http://www.house.gov/
                  international--relations



                               __________

                    U.S. GOVERNMENT PRINTING OFFICE
68-684                     WASHINGTON : 2000


                                 ______


                  COMMITTEE ON INTERNATIONAL RELATIONS

                 BENJAMIN A. GILMAN, New York, Chairman
WILLIAM F. GOODLING, Pennsylvania    SAM GEJDENSON, Connecticut
JAMES A. LEACH, Iowa                 TOM LANTOS, California
HENRY J. HYDE, Illinois              HOWARD L. BERMAN, California
DOUG BEREUTER, Nebraska              GARY L. ACKERMAN, New York
CHRISTOPHER H. SMITH, New Jersey     ENI F.H. FALEOMAVAEGA, American 
DAN BURTON, Indiana                      Samoa
ELTON GALLEGLY, California           DONALD M. PAYNE, New Jersey
ILEANA ROS-LEHTINEN, Florida         ROBERT MENENDEZ, New Jersey
CASS BALLENGER, North Carolina       SHERROD BROWN, Ohio
DANA ROHRABACHER, California         CYNTHIA A. McKINNEY, Georgia
DONALD A. MANZULLO, Illinois         ALCEE L. HASTINGS, Florida
EDWARD R. ROYCE, California          PAT DANNER, Missouri
PETER T. KING, New York              EARL F. HILLIARD, Alabama
STEVEN J. CHABOT, Ohio               BRAD SHERMAN, California
MARSHALL ``MARK'' SANFORD, South     ROBERT WEXLER, Florida
    Carolina                         STEVEN R. ROTHMAN, New Jersey
MATT SALMON, Arizona                 JIM DAVIS, Florida
AMO HOUGHTON, New York               EARL POMEROY, North Dakota
TOM CAMPBELL, California             WILLIAM D. DELAHUNT, Massachusetts
JOHN M. McHUGH, New York             GREGORY W. MEEKS, New York
KEVIN BRADY, Texas                   BARBARA LEE, California
RICHARD BURR, North Carolina         JOSEPH CROWLEY, New York
PAUL E. GILLMOR, Ohio                JOSEPH M. HOEFFEL, Pennsylvania
GEORGE RADAVANOVICH, Califorina      [VACANCY]
JOHN COOKSEY, Louisiana
THOMAS G. TANCREDO, Colorado
                    Richard J. Garon, Chief of Staff
          Kathleen Bertelsen Moazed, Democratic Chief of Staff
            John P. Mackey, Republican Investigative Counsel
                                 ------                                

        Subcommittee on International Economic Policy and Trade

                 ILEANA ROS-LEHTINEN, Florida, Chairman
DONALD A. MANZULLO, Illinois         ROBERT MENENDEZ, New Jersey
STEVEN J. CHABOT, Ohio               PAT DANNER, Missouri
KEVIN BRADY, Texas                   EARL F. HILLIARD, Alabama
GEORGE RADANOVICH, California        BRAD SHERMAN, California
JOHN COOKSEY, Louisiana              STEVEN R. ROTHMAN, New Jersey
DOUG BEREUTER, Nebraska              WILLIAM D. DELAHUNT, Massachusetts
DANA ROHRABACHER, California         JOSEPH CROWLEY, New York
TOM CAMPBELL, California             JOSEPH M. HOEFFEL, Pennsylvania
RICHARD BURR, North Carolina
             Mauricio Tamargo, Subcommittee Staff Director
        Jodi Christiansen, Democratic Professional Staff Member
                Yleem Poblete, Professional Staff Member
                   Victor Maldonado, Staff Associate


                            C O N T E N T S

                              ----------                              

                               WITNESSES

                                                                   Page

Sheila W. Horan, Deputy Assistant Director for Counter 
  Intelligence, National Security Division, Federal Bureau of 
  Investigation..................................................     3
Dan Swartwood, Corporate Information Security Manager, Compaq 
  Computer Corporation...........................................    12
Scott Charney, Partner, PricewaterhouseCoopers...................    14
Austin J. McGuigan, Senior Partner, Rome, McGuigan, and Sabanosh, 
  P.C............................................................    16

                                APPENDIX

Prepared statements:

The Honorable Ileana Ros-Lehtinen, a Representative in Congress 
  from Florida and Chair, Subcommittee on International Economic 
  Policy and Trade...............................................    26
Sheila W. Horan..................................................    29
Dan Swartwood....................................................    40
Scott Charney....................................................    48
Austin J. McGuigan...............................................    51

 
   CORPORATE AND INDUSTRIAL ESPIONAGE AND THEIR EFFECTS ON AMERICAN 
                            COMPETITIVENESS

                              ----------                              


                     WEDNESDAY, SEPTEMBER 13, 2000

              House of Representatives,    
         Subcommittee on International Economic    
                                      Policy and Trade,    
                      Committee on International Relations,
                                                    Washington, DC.

    The Subcommittee met, pursuant to notice, at 2:09 p.m. in 
room 2200, Rayburn House Office Building, Hon. Ileana Ros-
Lehtinen (chairman of the Subcommittee) presiding. 
    Ms. Ros-Lehtinen. The Subcommittee will come to order.
    The past decade has brought profound changes, yet some of 
the characteristics of the old world order continue to live on 
today, with some of the darker impulses of yesteryears adapting 
to fit a new time and a new set of standards and requirements.
    The front line is no longer the one which divides East and 
West, but the one defined by technological innovations. The 
battle lines lie in research and development. Resources 
designed and previously used exclusively for military 
intelligence gathering are now being expanded to gather 
intelligence on mergers, investments and other financial 
transactions. The generals are being replaced with CEOs, and 
the bottom line is not ideological, but financial.
    The threat of economic and industrial espionage looms over 
the horizon of the business world like a gray cloud threatening 
a placid sea. Those who develop a competitive advantage over 
their rivals stand to make millions from their innovations. 
That profit is enough for some to seek an unearned advantage of 
their own by indulging in corporate espionage as a quick fix 
solution to their creative deficiencies and their inability to 
remain competitive in their field.
    In a survey of Fortune 500 companies, the American Society 
for Industrial Security estimated that last year U.S. 
corporations sustained losses of more than $45 billion from the 
theft of trade secrets. Companies reported that on average, 
each had suffered 2.5 incidents of unauthorized appropriation 
of proprietary information. The average estimated loss per 
incident was calculated to be over $500,000, with most 
incidents occurring in the high technology and service sectors.
    In another study, Pacific Northwest National Laboratory, 
under contract by the FBI, developed an economic loss model in 
an attempt to assess economic losses resulting from 
intellectual property theft. This model determined that the 
misappropriation of intellectual property resulted in over $600 
million in lost sales and the direct loss of 2,600 full-time 
jobs per year.
    The same technology which has propelled our economy to 
unparalleled heights is also the mechanism which allows for 
those practicing corporate espionage to more easily sneak into 
a corporation's files, gather sensitive information and escape 
without a trace. However, industrial espionage is a crime which 
continues to be best accomplished through low tech means and is 
not necessarily dependent upon high tech gadgetry.
    A vast majority of corporate espionage crimes do not occur 
in cyberspace, but rather in person, face to face. For example, 
key employees within a given corporation might be sought by a 
rival company for information or recruited by spies posing as 
consultants or headhunters at trade shows.
    Competitors often examine a company's own internet home 
page, where key technical employees are often listed, and craft 
strategies on how to lure that employee away from that firm. 
This is done because information can be meaningless without the 
help of trained employees who understand how a particular 
technology is used.
    A critical step was taken in 1996 with the passage of the 
Economic Espionage Act. Since its enactment, the U.S. 
Government has prosecuted 18 cases of corporate or industrial 
espionage, yet these crimes and the threat they pose to U.S. 
economic security continues to escalate.
    Some would argue that this is because we are the leading 
target of these crimes due to our position in the global 
marketplace and our technological leadership. The United States 
produces the majority of the world's intellectual property 
capital, including patented inventions, copyrighted material 
and proprietary economic information. Factor in the incredible 
ingenuity and inventiveness of the American worker, and one can 
easily see why this problem is so pronounced in the American 
workplace.
    Other observers contend that if the punitive portions of 
the Economic Espionage Act were strengthened to make it more 
costly for corporations and governments to engage in industrial 
espionage against the United States, the desired deterrent 
effect would be achieved. Many have raised export restrictions 
as a strong option for the United States to take, and have 
underscored the need to secure binding commitments from our 
allies in the Organization for Economic Cooperation and 
Development and other international forums.
    We hope to examine these and other pertinent issues during 
the course of today's hearing and look forward to the 
recommendations of our panelists on the steps that Congress can 
take to help curtail the proliferation of economic espionage.
    I would like to yield to the Ranking Member of our 
Subcommittee, Mr. Bob Menendez of New Jersey.
    Mr. Menendez. Thank you, Madam Chairlady. I appreciate your 
hearing today. This is an important subject, one that warrants 
and receives increasing attention. As our witnesses have 
pointed out in the past and will again today, opportunities to 
steal trade secrets are on the rise, particularly as society 
relies more and more on computers and the internet for the 
development, storage and communication of ideas and designs.
    For the purposes of this hearing, of course, we really 
should distinguish between legal and illegal spying or 
corporate intelligence, as legitimate gathering of company data 
is called, and as we are the International Relations Committee 
we must, of course, distinguish as well between domestic and 
foreign theft.
    Only a fraction of the problem is actually foreign theft of 
U.S. trade secrets. According to the American Society for 
Industrial Security, more than three of every four thieves are 
employees or contractors. Another 6 percent or more are 
domestic competitors. Only 7 percent steal secrets on behalf of 
a foreign company or government. Still, this amount of foreign 
theft of U.S. trade secrets amounts to possibly billions of 
dollars annually, and ease of access to computers and internet 
and intranet sites will make foreign theft much easier and much 
more common.
    I realize that much of the testimony today will focus on 
the problem as a whole, on the threats from employees, on the 
need to educate businesses about the risks and how to protect 
themselves, on the need to inform the public and policymakers 
about what is acceptable and not within the bounds of corporate 
intelligence, but I do hope also that we can focus to the 
extent possible on what exactly are the threats from abroad and 
how government can best work to prevent corporate espionage 
that will threaten the United States' competitiveness.
    I know that our witnesses will make some specific 
recommendations for new and improved legislation, and we look 
forward to exploring those with you. We look forward to the 
responses of the Administration as to some of those and to the 
testimony here today.
    Thank you.
    Ms. Ros-Lehtinen. Thank you so much, Mr. Menendez.
    It is a pleasure to have with us our first Administration 
witness who will share with us her views on the effects which 
corporate and industrial espionage have American 
competitiveness. It is our pleasure to introduce Sheila Horan, 
Deputy Assistant Director on Counter Intelligence for the 
Federal Bureau of Investigation.
    A special agent of the FBI since 1973, Ms. Horan has held a 
number of positions within the Bureau, including Assistant 
Special Agent in Charge for Administration in the New York 
office and the Associate Special Agent in Charge in 
Philadelphia. In 1998, Ms. Horan was transferred to her current 
position as Deputy Assistant Director for Counter Intelligence 
with the National Security Division at FBI headquarters.
    We thank you, Sheila, for being here today. We will include 
your entire testimony for the record, and feel free to abridge 
your comments.
    [The prepared statement of Ms. Ros-Lehtinen appears in the 
appendix.]

   STATEMENT OF SHEILA HORAN, DEPUTY ASSISTANT DIRECTOR FOR 
     COUNTER INTELLIGENCE, FEDERAL BUREAU OF INVESTIGATION

    Ms. Horan. Thank you very much, Madam Chairman. I am 
gratified to see that you are anxious and willing to engage 
with us in grappling with the immense problem facing us today 
with regard to the protection of sensitive information, 
proprietary information, security, economic competitiveness and 
economic security in this----
    Ms. Ros-Lehtinen. Ms. Horan, if I could interrupt you?
    Ms. Horan. Yes?
    Ms. Ros-Lehtinen. I am so sorry, Mr. Burr. I should have 
looked back. I have these funny glasses on today. I apologize.
    Mr. Burr. The gentlelady is awfully kind to stop, but I 
would rather hear from our witnesses. I thank the Chair.
    Ms. Ros-Lehtinen. Thank you. I am so sorry.
    Ms. Horan. Thank you, sir.
    So you have my statement, and rather than regurgitating 
that now I will just make some points, and then we can get on 
to the questions if you would like.
    The Attorney General essentially defines economic espionage 
as the unlawful or clandestine targeting and acquisition of 
sensitive financial, trade or economic policy information, 
proprietary economic information or critical technology.
    In today's environment, intellectual property and economic 
information in general have become the most important and 
sought after commodity by all nations of the world. No question 
about it. I would say that because of our unique position in 
the world as a target rich nation for natural resources, 
intellectual property, just general overall wealth, that we are 
the No. 1 target in the world for economic espionage and the 
stealing of that information and secrets.
    Why are we the most sought after commodity? The United 
States, that is. It is a pretty complex situation actually, but 
three reasons sort of come to the fore. The first is the 
collapse of the Soviet Union and the tremendous relief that 
that has brought throughout the world.
    There were essentially, and not to be overly simplistic, 
but two large camps in the world, and various countries in the 
world devoted their natural resources, their personnel 
resources and their general overall wealth toward supporting 
their position either with the west or with the Soviet empire.
    When the empire fell, they found themselves looking around 
and saying look, we have got to redefine what is our national 
security. It is no longer aligning ourselves with the Soviet 
Union or the west. It is we have to have a piece of the 
economic pie. We want to do this. We want to have wealth as 
well. So the intelligence services, as well as the governments 
themselves, said who has the most, and the answer is the United 
States has the most.
    Second, allies, military allies, who were--as well as 
ideological allies--during that last 50 years of our history 
are now aggressive economic competitors. We are faced with 
former friends I do not want to say attacking, but certainly 
working against us very aggressively in order to get again a 
piece of the pie.
    Third, rapid globalization of the world economy defines 
national security not so much in how many tanks you have 
deployed or how many soldiers you have on the field 
necessarily, but instead their strength is measured in terms of 
the nation's economic capability.
    So the nations of the world, as well as our own, and 
President Clinton underscored this point I think back in 1991 
by saying now we should realize very strongly that national 
security equals economic security. That is an extremely 
important point I think for us to keep in mind in terms of our 
war or our fight against economic espionage.
    What are the targets? Very briefly, they come in sort of 
two flavors, if I could be a little bit flip there. We are 
still facing the threat and the attempted threat on classified 
military defense related national information. There is no 
doubt about that. There is still ongoing, and we are always 
battling espionage cases on that basis.
    Coming out of classified information, however, and related 
to classified information is cutting edge technologies, dual 
technologies, sensitive information that may not reach the 
classified level and, hence, would not be subject to an 
espionage case, but certainly would be fodder for economic 
espionage cases and our inspection of those kinds of cases.
    The other flavor, if you will, is the non-sensitive area 
and theft of our non-high tech products and services. It is 
very important to realize that the way we approach economic 
espionage investigations. It does not have to be high tech for 
us to take an interest in something. A trade secret can be just 
as valuable in many instances as more sensitive or classified 
information.
    So that is how we approach that, and the way we approach it 
is through the Economic Espionage Act, which you have already 
indicated that is out there. Prior to 1996, there was only 
state laws and some civil remedies for companies and 
individuals and entities to pursue theft of their trade secrets 
or theft of their proprietary information.
    In 1996, the law gave us an overarch or gave the Federal 
Government the ability with the Federal law to approach the 
theft of trade secrets offering stiffer penalties and other 
advantages that were not available to us and to business and 
industry to pursue these cases. We have prosecuted you 
mentioned 18. Actually up to date there are 20 in which we have 
successfully prosecuted over the last 4 years.
    Interestingly enough, the Department of Justice or Congress 
actually, not the Department of Justice, was concerned that we 
would take this law in 1996 and profligately investigate all 
sorts of smaller issues and inappropriate crimes under this 
umbrella. I think that you can be well served and proud that in 
the 4-years the Bureau and the Department of Justice have 
carefully looked at these cases and have had what I consider a 
tremendous success in the 20 cases that we have prosecuted.
    We are truly faced with a problem that because of the Cold 
War and our 50 years' involvement in that perhaps did not allow 
us to focus as we should have as an intelligence community, as 
a government, on this problem. It is not a new problem. It has 
been around for years and years and years, but our government 
was focused on the Cold War issues and realities and perhaps 
did not have enough time to pursue this as aggressively as we 
are trying to do today.
    Let me stop there, Madam Chairman, and engage with you and 
your fellow Members any issues that you might want to pursue.
    [The prepared statement of Ms. Horan appears in the 
appendix.]
     Ros-Lehtinen. Thank you so much for your testimony.
    Mr. Burr, in order to make up for it I would like to 
recognize you first for the questions.
    Mr. Burr. The gentlelady is awfully kind.
    Let me ask you, if I can. Can you give us some type of 
percentage as to what you see that would be the classified part 
that the theft is going after versus the non-classified?
    Ms. Horan. Let me answer that, Mr. Burr, by saying that 
there are two provisions in the Economic Espionage Act. One is 
1831, which deals with economic espionage attempted and 
conducted by a foreign entity, that is to say a foreign 
intelligence service, a foreign government, a foreign 
organization linked to the actual government.
    The other provision is 1832, which, generally speaking, you 
could characterize as a theft of trade secrets and would be 
aligned with possibly white collar crime violations, theft of 
essentially trade secrets, as I said.
    The vast majority--well, of the 20 prosecutions that I 
mentioned to the Chairwoman that we have pursued, none of them 
fall in the former category of the foreign power based or 
supported category. All 20 have been in the 1832, which is the 
trade secrets.
    In terms of how many cases, actual cases we are pursuing 
that fall into the two camps, I would say that the percentage 
is at this stage highly weighted in the trade secrets or the 
non-classified versus the classified, although we have a 
number, and I would prefer not to get into actual numbers in 
this open forum, but we do have a goodly number in the other 
category, the foreign based category.
    Mr. Burr. And is there any dollar amount that the Bureau 
has put on the current economic espionage that exists for the 
U.S. economy?
    Ms. Horan. We have not. As the Madam Chairperson has 
mentioned, there were two, at least two, studies conducted. 
ASIS did one and PNNL conducted another one in which they 
projected. The PNNL case projected out of an actual trade 
secret prosecuted or trade secret case. They projected out even 
to tax loss, job loss, as well as monetary loss to the company 
itself.
    While that is illustrative to us, as is the American 
Society for Industrial Security study, both of them are very 
illustrative of what the actual loss is and magnificent 
essentially. It is huge.
    Mr. Burr. I thank you and yield back to the Chairman.
    Ms. Ros-Lehtinen. Thank you so much.
    Ms. Horan. OK.
    Ms. Ros-Lehtinen. Thank you.
    Mr. Menendez. I know we have a vote.
    Mr. Menendez. I have one question or two actually. Maybe 
just by joining together you can answer them together.
    Ms. Horan. Sure.
    Mr. Menendez. I understand there are, you said, about 20 
cases or so that have been prosecuted under the EEA. I 
understand that this is in part due to an agreement or an 
understanding or a pledge by the Attorney General not to 
prosecute cases or not to have the government pursue charges 
without first having obtained the Attorney General's personal 
approval to proceed and that there are 800 cases now being 
considered for prosecution. Is that a correct number, and would 
we expect the amount of prosecutions to go up after the 5-year 
waiting period?
    No. 2, is the suggestion that closing--from some of the 
other witnesses we will hear about closing the loophole that 
prevents prosecution for theft of their product before it is 
placed into interstate or foreign commerce and the creation of 
a private cause of action under the EEA, are those items that 
the Department has considered or has----
    Ms. Horan. I am not aware of the Department's view on the 
latter issue, but on the former issue----
    Mr. Menendez. If you would have the Department give us a 
written response to that?
    Ms. Horan. Yes, certainly I would. By all means, Mr. 
Menendez.
    Your first question, though, would we expect an up tick, so 
to speak, in the number of prosecutions, and also you asked 
about the figure 800 and whether that is accurate. I would say 
that is not accurate at this time. We have about as of today, 
because I checked thinking you might want to know this. We have 
about 400 cases open today.
    Mr. Menendez. Four hundred?
    Ms. Horan. Four hundred. Because of the education efforts 
that we are engaging in and trying to get the word out about 
this, you must understand that industry and business are 
somewhat loathe and reticent in engaging with us, but the more 
they hear about the cases, the more they see the results, we 
anticipate that those cases are going to raise exponentially 
and in fact have raised over the years heretofore. Have 
increased I should say, so, yes, definitely.
    Mr. Menendez. I really look forward to the Department's 
response.
    Ms. Ros-Lehtinen. Thank you, and I am pleased to recognize 
Mr. Manzullo, who will take over for us. Thank you.
    Mr. Manzullo [presiding]. This is like musical chairs.
    Ms. Ros-Lehtinen. Thank you.
    Mr. Manzullo. Thank you.
    I get to ask you the questions, yet I have not even heard 
your testimony.
    Ms. Horan. Well, I will be happy to hand it to you right 
now.
    Mr. Manzullo. I have it right here. Forgive me if I ask 
this question----
    Ms. Horan. That is quite all right.
    Mr. Manzullo. What is the line beyond which inquiry or 
gathering information becomes a violation of the Economic 
Espionage Act?
    Ms. Horan. Let me try and answer that question this way. 
There are a number of ways that we look at and approach 
economic espionage in the FBI and intelligence community wide. 
We are not doing this ourselves. We are enjoined with the 
Department of Defense, the Central Intelligence Agency, 
Commerce, Customs, etc. This is not an FBI unilateral 
responsibility, but we sort of coordinate it.
    One of the main ways we do that is utilizing the Economic 
Espionage Act of 1996, which I think is what you are referring 
to. We also have a responsibility under our counterintelligence 
mandate and apart from any criminal mandate to gather 
information and collect and disseminate information with regard 
to foreign targeting of our infrastructure, of our government, 
of our business academia, business and industry, etc., with the 
idea that using investigative steps, which I probably will not 
get into here, but trying to stem that, avoid it, prevent it 
and get around it, stop it before it actually happens.
    It is a huge analytical effort, and that is one whole 
aspect that we probably will not talk about today, but that is 
one area that we have a lot of effort in.
    With respect to when does an individual or a member of a 
foreign government step over the line, I would have to say that 
it is a case by case situation. You have to really look at the 
circumstance, the totality of circumstances involved in each 
situation, but what the law does not want us to do, and this is 
part of that line, is to say to diplomats and legitimate 
government or personal envoys from abroad or from within our 
own country that they cannot collect open source information, 
economic information that is out there on whether it be the 
internet, whether it be libraries, wherever it lies.
    So we are not trying to impact or stop that kind of 
activity. Where we would like to have an impact and where many 
of the 20 cases that have been prosecuted so far have led us is 
where a foreign or a domestic, a foreign or a non-foreign, 
entity is attempting to rip away some element of our economic 
competitiveness, generally speaking, in the business world 
here, in the business industry.
    Mr. Manzullo. Can you----
    Ms. Horan. I am sorry.
    Mr. Manzullo. In the context of that answer, can you give 
us an example of someone who you have prosecuted----
    Ms. Horan. Sure.
    Mr. Manzullo [continuing]. That is a matter of open record?
    Ms. Horan. Sure.
    Mr. Manzullo. Thank you.
    Ms. Horan. As I say, there are 20. I will--probably the 
most widely known one and one that you may be aware of is the 
Bristol-Myers Squibb Taxol case, which was resolved a couple of 
years ago, Taxol being a very, very popular cancer fighting 
drug, and it was the subject of theft from a Taiwanese company 
who sent employees here to attempt to steal that. We prevented 
that thankfully. They went through the court process and 
arrests were made, and it was prosecuted successfully.
    That is one of them, but let me, I think, to give you an 
idea, I will just quickly tell you some of the--and this goes 
to a comment that I made that it need not--our prosecutions and 
our interests need not be only in cutting edge, dual use 
technology, sensitive, proprietary information, but can be non-
high tech. I do not think you were here for this part; non-high 
tech issues, trade secret issues that we are very interested 
in, too.
    For instance, the Joy Mining Machining Company in 
Pittsburgh, PA. Technical coal mining equipment was being 
targeted. Deloitte & Touche was the victim of one case, and a 
proprietary software program was targeted. Gillette Company was 
the victim in another case. A new shaving system was the 
target.
    Mr. Manzullo. How many ways----
    Ms. Horan. On and on.
    Mr. Manzullo [continuing]. Can you use to cut whiskers?
    Ms. Horan. Well, they evidently had a new one. I do not 
know what it was.
    Mr. Manzullo. I do not want to use the word watchdog, but 
obviously you got involved at a point where the company owning 
the patent or the trade secret had some kind of an indication 
that somebody was trying to steal it?
    Ms. Horan. That is correct.
    Mr. Manzullo. That would be the normal way?
    Ms. Horan. It can be two ways. Either they detect this, 
which is frequently the case, or we get information that 
something is amiss.
    This brings up an interesting point. I am glad you made 
that point that companies are sometimes reluctant to come to 
the Federal Government and the Federal Bureau of Investigation 
for these kinds of investigations, No. 1, because they are 
largely ignorant of how we do them, and we are trying to 
successfully overcome that by an education program, but they do 
not want their trade secrets to be aired. They do not want 
their shareholders to know there are problems in the company. 
These kinds of bottom line issues are very difficult to 
overcome when a company comes and finds out information like 
this.
    Just this very morning we were in contact with one of the 
major oil companies in the United States who phoned in and 
wanted--the director of security phoned in and said look, we 
found that we have information that someone is trying to steal 
XYZ from us, and I am going to make a presentation--I am the 
director of security--to the CEO about whether we should 
involve the FBI or not, so these kinds of problems are plaguing 
us right now because it is a new law and people do not know, 
but we think we will overcome this as time goes on hopefully 
with some good, high level, highly publicized deterrent 
factors.
    Mr. Manzullo. This is a good segue to these questions that 
the Chairlady had circled, which I will ask now.
    One of the witnesses on the second panel will state that 
since the value of trade secrets is not well established, 
safeguarding efforts are often given lower priority when 
limited resources are allocated. The question here is do you 
agree with this assessment?
    Is there a wide gap between the value of lost assets and 
resources allocated to investigation, enforcement, prosecution 
of economic espionage? How do you establish a clear value for 
the assets? This goes right to the heart of your work at the 
FBI, does it not?
    Ms. Horan. It does.
    Mr. Manzullo. It is obviously high priority for you because 
this is your mission, is it not?
    Ms. Horan. Pardon me, please. Yes, it is a high priority 
for us and will continue to be one I think in the coming years 
because of the escalating costs that it is----
    Mr. Manzullo. And you focus your career almost entirely on 
this, is that correct, in the FBI?
    Ms. Horan. Me myself?
    Mr. Manzullo. Yes.
    Ms. Horan. Personally? It is one of the responsibilities. I 
am in charge of counterintelligence for the Bureau, so this 
would be one aspect of it----
    Mr. Manzullo. OK.
    Ms. Horan [continuing]. But certainly one growing and very 
important one, but I would say to you in answer to your comment 
there that if you go out to major corporations in the United 
States and look at their security departments, you are going to 
find that generally, generally speaking, the heads of the 
security departments are not first line executive, and by that 
I mean it is not a particular company's first mission, 
security.
    Mr. Manzullo. They are not trained in it?
    Ms. Horan. Well, Delta Airlines take for instance. Their 
mission is to fly planes. The director of security at Delta 
Airlines, and this is multiplied across the country, is a drain 
on company resources because that person wants to say, 
``listen, in order to prevent bombs from going on the plane, in 
order to prevent luggage from being stolen, in order to prevent 
our executives from being kidnapped, this is what I need. This 
is how much money I need.''
    They are not, generally speaking, welcomed, euphemistically 
speaking. Not literally, but they are not always the most 
favorite person at the party, so to speak, so again it is an 
education process.
    Mr. Manzullo. Do you mean within the company?
    Ms. Horan. Exactly right, so resources, and I think this is 
what you were getting at. Resources in private industry devoted 
to security issues are much less than probably they should be 
in many instances.
    Mr. Manzullo. I do not know if this question was aimed at 
the belief that there is a low priority within the FBI or 
within the company itself. That is why I said----
    Ms. Horan. Not a low priority with us.
    Mr. Manzullo [continuing]. Based upon your testimony----
    Ms. Horan. No.
    Mr. Manzullo [continuing]. I do not think it is a low 
priority.
    Ms. Horan. Not at all, no, but my response was to private 
industry.
    Mr. Manzullo. Do you think the big problem is that there is 
so much snooping going on that people just cannot fathom the 
sophisticated means of doing it and the extent to which people 
would actually steal the product, their patent or something 
like that?
    Ms. Horan. Yes. I do not think people expect it.
    Mr. Manzullo. And they get blindsided?
    Ms. Horan. That is exactly right. Some of the methods used 
to do this are fairly innocuous and not geared toward raising 
anyone's hackles unless you happen to be a security person or 
an investigator or something who is well schooled in this 
spotting and assessing, for instance, an individual in a 
company who might be near to a particular technology, getting 
to know that person, building up a relationship. These are some 
of the methods that are used.
    Additionally, what you see more and more are unsolicited 
requests to businesses from--either domestically or 
internationally in which hundreds of thousands of E-mails are 
sent around the world asking for particular information from, 
you know, someone who is interested in getting it.
    It is an information gathering technique that a foreign 
entity can use to just send to all our countries--pardon me. 
All companies that deal with a particular technology that they 
are involved in. So they send out 1,000 E-mails. They may get 
back two, but they are getting back information very cheaply.
    Mr. Manzullo. Do you mean just enough to know that somebody 
has something there that they want?
    Ms. Horan. Oh, yes. Yes. Visits to U.S. facilities, the 
visitor programs, DOD, DOE, NASA. All these government entities 
and quasi government entities have hundreds of thousands of 
visitors who come to their doors each year on legitimate 
business, but they are also collectors, and they bring that 
back to their home country.
    Is that something that we should be concerned about? I 
would say absolutely.
    Mr. Manzullo. Los Alamos?
    Ms. Horan. Los Alamos is an extremely good example.
    Mr. Manzullo. Do you or people that work under you at the 
FBI put on seminars for companies on----
    Ms. Horan. Yes.
    Mr. Manzullo. Do you do seminars like that? The biggest 
city in the congressional district I represent has over 1,500 
industries.
    Ms. Horan. What is that city, sir?
    Mr. Manzullo. Rockford, IL.
    Ms. Horan. Oh, yes.
    Mr. Manzullo. It serves some aerospace fasteners. Of 
course, it is anything that is kept secret, so I am sitting 
here thinking that perhaps you or somebody might be interested 
in having a seminar on how to keep your secrets from being 
stolen.
    Ms. Horan. Well, our Chicago field office would have what 
is called, as all field offices have, an answer program.
    Mr. Manzullo. OK. I really appreciate your coming here. I 
did not hear your testimony, and I am sorry, but I will read 
that.
    We will be in contact with your Chicago office to see if 
the chambers perhaps would have, even if it is a half dozen 
industries. Would that be sufficient to have an agent come out?
    Ms. Horan. One industry would be enough.
    Mr. Manzullo. One industry?
    Ms. Horan. We do them to 1 or 200. It does not matter.
    Mr. Manzullo. Fine. Thank you for coming.
    Ms. Horan. You are very welcome, sir.
    Mr. Manzullo. I really appreciate it. I am sorry about the 
interruption with the bells, but----
    Ms. Horan. Not at all. Very understandable.
    Mr. Manzullo [continuing]. We live by this. Thanks again.
    Ms. Horan. Thank you for your attention.
    Mr. Manzullo. If we could impanel the second panel? If we 
could impanel the second panel before the bell starts again, 
and I guess it is obvious that they are not interested in 
televising your testimony, so I hope you do not feel too badly 
about that.
    To complement the expertise of our first witness, we would 
like to introduce three gentlemen who not only understand this 
issue, but have dedicated a significant amount of their 
professional lives to dealing with this problem.
    First, Dan Swartwood, corporate information security 
manager with Compaq Computer Corporation and primary author of 
``Trends in Intellectual Property Loss Survey Report.'' Dan is 
a retired U.S. Army counterintelligence officer and 
contributing consultant to an independent assessment of the 
White House security program for U.S. Secret Service.
    He is a 14-year member of the American Society for 
Industrial Security, an 8-year member of a standing committee 
on safeguarding proprietary information and an avid reader of 
James Bond novels.
    I threw that in. Next, I would like to introduce Scott 
Charney, a partner with PricewaterhouseCoopers. Scott is a 
former chief of the Computer Crime and Intellectual Property 
Section, Criminal Division, at the Department of Justice. Under 
his watch, his division investigated and prosecuted cases of 
national and international computer hacking, cases of economic 
espionage and violations of Federal criminal copyright and 
trademark laws.
    A former U.S. Attorney and Assistant District Attorney, 
Scott is a published author who has written widely on the 
subject of protection of proprietary information.
    Finally, I would like to introduce Mr. Austin McGuigan, a 
senior partner--is that correct?
    Mr. McGuigan. Correct, sir.
    Mr. Manzullo. That is an Irish name like Manzullo.
    A senior partner at Rome, McGuigan and Sabanosh. He is a 
former Chief State's Attorney for the State of Connecticut, as 
well as a former adjunct professor at the University of New 
Haven. He is the co-author of a number of articles, including 
``How to Use the Economic Espionage Act to Protect Your 
Corporate Assets.''
    Well, this is pretty impressive. Dan, we will start with 
you. I am going to put on a 5-minute clock here and try to 
stick to it a little bit generally.
    Mr. Swartwood. I will make every effort.
    Mr. Manzullo. This is pretty sophisticated. I do not know 
if I can operate it.
    OK. Go ahead.

  STATEMENT OF DAN SWARTWOOD, CORPORATE INFORMATION SECURITY 
 MANAGER, COMPAQ COMPUTER CORPORATION, AND CO-AUTHOR OF TRENDS 
          IN INTELLECTUAL PROPERTY LOSS SURVEY REPORT

    Mr. Swartwood. Mr. Chairman, I want to thank you for the 
opportunity to discuss a topic that often is addressed only as 
a subplot in movies and occasional sensational headlines.
    Mr. Manzullo. And James Bond novels.
    Mr. Swartwood. That topic is economic espionage and its 
impact on American competitiveness.
    For over 20 years, I have worked in a variety of government 
and civilian positions that have helped qualify me to discuss 
this topic. I have also been actively involved, as mentioned, 
in the American Society for Industrial Security international 
survey efforts to assess the impact of intellectual property 
loss for almost 10 years.
    These surveys have continued to indicate that the issue of 
intellectual property loss is growing in both scope and impact. 
As mentioned, the 1999 survey mentioned that direct revenue 
losses were estimated to be as high as $45 billion and there 
were almost 1,000 incidents of loss reported by 45 companies 
alone.
    For the last 5 years I have been the corporate information 
security manager at Compaq Computer, and during that time 
Compaq has grown into the 20th largest American corporation and 
75th largest in the world. Compaq's work force globally exceeds 
100,000 people, and we, along with other major corporations, 
face the challenge of information loss.
    I mentioned earlier that this topic tends to make the 
headlines. Unfortunately, there was just a major incident this 
week. On Monday, it was widely reported that part of the 
Western Union website had been cracked, and 15,000 users' 
credit card information had been stolen. From my perspective, 
the interesting aspect is how this theft occurred.
    It was reported that the site administrators, while 
conducting routine maintenance, had removed security measures 
protecting the site. This is anecdotal, but does support the 
premise discussed in my prepared statement, which is the 
majority of corporate information loss occurred because of one 
of three causes.
    One, a lack of training for and mistakes made by authorized 
members of your work force. Two, the failure on the part of 
administrators to implement and maintain security measures, 
and, three, disgruntled and/or disaffected individuals working 
in your corporation. These issues can cause up to 85 percent of 
all corporate information loss.
    A primary consideration determining how this issue is 
addressed in any corporation is the priority that senior 
management gives it. In any corporation, there are a myriad of 
competing priorities on a constant basis. Security issues tend 
to be addressed as a reaction to unfortunate events. The lack 
of adequate security and training resources can create an 
environment where the question is not if losses will occur. The 
question is when they will occur.
    The surveys indicate that less than 3 percent of all IT and 
security dollars are spent protecting or safeguarding 
electronic or hard copy proprietary information. The vast 
majority of these dollars are spent on physical and electronic 
measures designed to keep outsiders from penetrating corporate 
spaces or networks. These are absolutely essential measures in 
any corporation, but it must be noted, however, that they do 
little to protect information from either the untrained or 
disgruntled insider.
    Few American corporations have the resources to deal with 
economic espionage sponsored by either nations or foreign 
corporations. The Federal Bureau of Investigation and Justice 
Department are actively building a capability to investigate 
such activities, and we welcome the interest and efforts they 
have made to address economic and industrial espionage.
    Corporate espionage, defined as outsiders penetrating 
corporate offices or networks, does occur and can be very 
damaging, but because of my experience and results of the four 
nationwide surveys on intellectual property loss I have been a 
part of, I feel that it is an issue to be addressed, but is not 
the primary concern of corporate America.
    Because the threat to business information is not primarily 
foreign or caused by outsiders does not make it less real or 
less destructive. When a corporation is denied the full benefit 
of their trade secret or innovations, their business suffers, 
and our economy is weakened.
    For the last 4 years, the Federal Government has been 
instrumental in engaging corporate America on the issue of 
infrastructure protection. These efforts are designed to 
protect information and networks of several critical 
infrastructure industries. A similar engagement addressing the 
larger issue of intellectual property loss might cause similar 
improvements in how corporations view this issue and improve 
our competitiveness in the global marketplace.
    I want to thank you for the opportunity to address you 
today and would be pleased to answer any questions you might 
have after the speakers are done.
    [The prepared statement of Mr. Swartwood appears in the 
appendix.]
    Ms. Ros-Lehtinen [presiding]. Thank you so much.
    Mr. Charney.

  STATEMENT OF SCOTT CHARNEY, PARTNER, PRICEWATERHOUSECOOPERS

    Mr. Charney. Thank you, Madam Chairperson. Being mindful of 
Mr. Menendez's comments that you have our written testimony and 
we should feel a little bit free to deviate, I am going to do 
just that.
    In my career I have now been both on the government side at 
the Justice Department responsible for economic espionage, and 
now at PricewaterhouseCoopers I have clients that want economic 
espionage or hacking cases investigated.
    Building on what was said before when the FBI was present, 
there is certainly a reluctance by some industry members to go 
to law enforcement. That has to do with several reasons, but 
the biggest one I see is that for a private victim if they go 
to the government they lose control over the case.
    That is, as a private company that is being victimized they 
can control the investigation, decide how many resources to put 
toward it and call it quits if they choose to do so, whereas 
when you report it to law enforcement then the subpoenas come 
and other kinds of compulsory process, and you have to go 
forward. Most companies do not want to lose that control.
    Having said that, I also want to highlight a few other 
points. I mean, it is absolutely clear that digital information 
is great property of value in the information age. I remember 
many years ago, as far back as 1992, a reporter was asking 
Europeans about the fall of the Soviet Union and what it meant 
that the United States was the world's sole superpower.
    The response of most Europeans was in the new economy it is 
not military power, but economic power that is going to rule, 
and so if Willy Sutton says I go to banks because that is where 
the money is, then competitors are going to say we are going to 
computers because that is where the digital resource is.
    If you look at the surveys that have come out that have 
been referenced in almost all the testimony, both the American 
Society for Industrial Security [ASIS] and surveys by the 
Computer Security Institute, it is clear that the losses are 
mounting. The number of cases is increasing.
    In the Computer Security Institute survey, for example, 
about 20 percent of the respondents out of 585 said that they 
were victims of trade secret information theft, and in terms of 
sheer dollar losses the survey found that the most serious 
losses from all the types of criminal activity listed from 
hacking to other kinds of abuse, the theft of trade secret 
information was the most expensive crime for U.S. businesses 
with 66 respondents reporting over $66 million in losses.
    I would point out, too, that these surveys probably 
represent only the tip of the iceberg because most computer 
crime is neither detected nor reported, so to the extent that 
people are stealing data from computer systems that is 
valuable, it is probably not detected.
    The reason for that is the nature of electronic theft. If I 
steal your car you know because it is gone, but if I steal your 
customer list or a design plan, you still have it and so unless 
you have detected that abuse you will not know that I have it, 
and you will remain comfortable.
    To show just how bad that is, one of the difficulties has 
always been that when you have a supposition, such as most 
computer crimes are neither detected nor reported, how do you 
prove what you do not know? The answer is you do a controlled 
study.
    The Defense Department did just that. They attacked 38,000 
of their own machines. They penetrated security 24,700 times or 
65 percent. Then they went to the system administrators and 
said OK, how many intrusions have you detected, and their 
answer was 988, only 4 percent. Then they went to DISA, the 
Defense Information Systems Agency, and said how many reports 
have you gotten, and the answer was 267 or 27 percent, so it is 
absolutely clear that most of these crimes are probably not 
detected in the first instance, and then they are not reported 
to anyone.
    I would like to conclude by focusing particularly on the 
international aspects of this problem, and I think that there 
are some critical questions that the committee needs to think 
about when thinking about international economic espionage in 
particular. The first is what actually constitutes 
international espionage in the new world order. Is Chrysler an 
American company or a foreign company?
    With all the globalization of businesses, to the extent 
laws and governments are concerned, as rightly they should be, 
about allegiances and whether this is foreign or domestic, I 
think that line is getting increasingly blurry. It is hard to 
tell. That is one problem.
    The second problem is with the growth of the internet, 
particularly with now approximately 165 countries connected, it 
is going to be increasingly difficult to identify the 
perpetrators of these crimes. The reason for that is the 
internet has global connectivity. Hackers have shown the 
ability to weave between countries to hide their tracks.
    In addition to that, there is no authentication or 
traceability on the internet, which means if you know your 
machines are being attacked and people are taking sensitive 
data, it is extremely, extremely hard to find the source.
    [The prepared statement of Mr. Charney appears in the 
appendix.]
    Ms. Ros-Lehtinen. Thank you, Mr. Charney.
    Mr. McGuigan.
    Mr. McGuigan. McGuigan.
    Ms. Ros-Lehtinen. McGuigan. Close enough.
    Mr. McGuigan. Thank you, Madam Chairperson. McGuigan.
    Ms. Ros-Lehtinen. All right. All right.
    Mr. McGuigan. Thank you, Madam Chairperson.
    Ms. Ros-Lehtinen. Congresswoman Johnson and Congressman 
Shays send their best to you. I saw them there on the Floor. 
Actually, they asked me to ask you really hard questions.
    Mr. McGuigan. I understand at least from Congressman Shays 
why he would say that.

STATEMENT OF AUSTIN J. McGUIGAN, SENIOR PARTNER, ROME, McGUIGAN 
  AND SABANOSH, P.C. AND CO-AUTHOR OF HOW TO USE THE ECONOMIC 
         ESPIONAGE ACT TO PROTECT YOUR CORPORATE ASSETS

    Mr. McGuigan. A little bit about my background. I was the 
chief prosecutor in Connecticut from 1977 to 1985. For 4 years 
I was chief of the organized crime task force, and prior to 
that I had 3 years as a special agent in military intelligence.
    For the last 11 years, I have been a plaintiff in many 
uniform trade secret actions throughout the United States, at 
least eight or nine states, so I come from this both as a 
government prosecutor and as an attorney who is prosecuting the 
cases.
    I have written a number of articles about the Economic 
Espionage Act. I assume that everybody agrees that America's 
technological prowess is its real capital and that the reason 
for federalizing this area of criminal activity was that we 
needed that type of protection and expected results.
    I would suggest to the Committee that there has been a 
disquieting dichotomy between the numbers that have been 
provided on estimated losses, $45 billion in 1999, $24 billion 
in another study, and I have cited these studies from time to 
time in the absence of cases.
    Twenty cases, I think only nine of which resulted in any 
incarceration, not significant fines, not a single case under 
1831 which deals with foreign entities, and truly if you call 
it the Economic Espionage Act it seemed it was in the first 
instance directed at foreign espionage.
    There is not a single case that has been developed that 
deals with foreign espionage of all the 20 cases that are 
cited, one of which I believe was dismissed, so that when one 
looks at the record against the alleged losses, one must ask 
why? What is going on? Of course, the reasons are people are 
learning how to do these cases, etc.
    Understandably, the Attorney General agreed to limit the 
number of cases to 50 in the first 5 years, but at this point 
it does not look like they are going to challenge the agreed 
upon limitation so that the number of cases reflects and the 
types of cases that have been taken reflects that so far 
whatever the allocation of resources, and I do not know what 
the government has allocated for resources under the Economic 
Espionage Act, but it does not seem to be returning the kind of 
bang for the buck that one might expect.
    As normally not a fan of the federalization of criminal 
law, recognizing as a former chief state prosecutor that many 
of the federalizations of crimes does not exactly enhance the 
law enforcement activities, but, in any event, this law I felt 
was a law that was needed.
    It was needed because this was truly a national/ 
international problem, but I could say this. I would doubt 
there is any significant deterrent effect that has come out of 
the passage of this Act in the last 4 years. The number of 
cases simply would not augur that people are living in fear of 
being caught stealing trade secrets.
    I have suggested in the material prepared for the Committee 
that at this point it would be something to seriously consider 
creating a private cause of action for individuals and 
companies under the Economic Espionage Act. The Uniform Trade 
Secret Act is presently in force in 38 states, and I believe 
that almost every state has common law trade secret, which 
would be equivalent to the Uniform Trade Secret Act, so there 
are trade secret causes of action in all the states.
    The question is why federalize? Federalizing would direct 
court power in three areas in which it is needed. One is in the 
enforcement of injunctions. Let me explain, having had a number 
of these cases. If one is to get an injunction in say the State 
of Connecticut against an individual who has misappropriated 
trade secrets and that individual moves to Montana, enforcing 
that injunction in Montana is not as simple as one would think 
so that we have to discuss with companies the fact that unless 
we are lucky enough to have diversity, which allows us to have 
Federal jurisdiction, when we have injunctive power of the 
Court we may have problems getting enforcement in a foreign 
jurisdiction.
    Second, I think it would provide for much easier discovery, 
and discovery in uniform trade secret cases, and I take 
economic espionage cases through investigation, is absolutely 
essential, so I would suggest that for that reason a Federal 
cause of action is warranted.
    The third is executing of judgments, execution of judgments 
when people leave states. Although we have uniform execution, a 
judgment is simply not that simple. If one is trying to seize 
assets, once one has a Federal judgment they are in much better 
shape in trying to enforce it.
    The fourth reason. I would suggest that when and if someone 
considers a cause of action that they consider having some type 
of pre-suit discovery orders. In other words, one of the 
problems in developing these cases, while one realizes in a 
company that the technology has been taken to a different 
company because they have developed something and show no 
pattern of having worked on it, one is not able to file an 
action based on the fact that they must have stolen it, so I 
would suggest that similar to the Copyright Act, and I have put 
it in my prepared remarks, that you consider some type of pre-
suit discovery.
    The conclusion is that given the paucity of prosecutions 
that you have, that while criminalization of economic espionage 
may have provided some merit, the real battle is going to have 
to be fought by the people who are losing technology. The 
people who are suffering the losses are going to have to 
finance the war through private causes of action, and that, I 
suggest, would give us better deterrent effect and better 
protect America's technological prowess.
    Thank you.
    [The prepared statement of Mr. McGuigan appears in the 
appendix.]
    Ms. Ros-Lehtinen. Thank you. Those are very good 
recommendations.
    Following up on improvements that we could make to the 
Economic Espionage Act, and I would like to ask all three 
panelists. The Act allows for a protective order preserving the 
confidentiality of a trade secret only if the prosecution 
requests it.
    Does this afford, do you believe, sufficient protection 
against disclosure during legal proceedings? How would you 
propose that this section of the law be improved?
    Mr. McGuigan. Well, I would say, and it was pointed out, 
that companies are afraid they lose control over cases when 
they have the government prosecuting a case and are afraid that 
their trade secret will be disclosed in the case itself so that 
they may in effect win the battle and lose the war.
    I would suggest that the law be amended so that companies--
the government is required to seek the input of the company, 
and if a company is forced to give up the very thing for which 
it was trying in the first instance to protect in order to 
proceed with the prosecution, it should have a say in having 
the prosecution stopped, similar to when the government decides 
that giving up an intelligence informant, they do not wish to 
go further with the case.
    Ms. Ros-Lehtinen. Thank you.
    Mr. Charney.
    Mr. McGuigan. I believe Mr. Charney had also----
    Mr. Charney. Yes. From my days as chief of the computer 
crime section, we grappled with this problem. You have to look 
at this a bit logically, though.
    If the trade secret has already been stolen, the defendant 
has it. If the trade secret has not been stolen or has been 
stolen and not yet used as far as you can tell and you want to 
prohibit its introduction in court, there is a problem with the 
sixth amendment because under the right of confrontation and 
the right to challenge the government's evidence, he has a 
right to challenge the trade secret.
    I will tell you that we had a case where we charged 
attempted theft of a trade secret. The defense asked for the 
trade secret, and we took it up, and we won on the theory that 
since the defendant was only charged with attempt, whether it 
was actually a trade secret was irrelevant, and, therefore, 
there was no need to disclose it.
    The Appellate Court agreed and so we did not have to 
disclose it, but I would just caution the Subcommittee that if 
you are looking at that issue, remember that to some extent the 
defendant has a right to see what he has been accused of 
stealing for purposes of litigating for his defense.
    Ms. Ros-Lehtinen. Thank you.
    Do you have anything to add? Thank you, Mr. Swartwood.
    Mr. Swartwood. I would comment that as the only person on 
this panel that actually works in a corporation, this is a very 
difficult issue. Often not only is it very difficult to make a 
determination that you have lost something, but then after you 
have made that determination or you feel you are comfortable 
that that has occurred, getting that information pushed up into 
the management of the organization and having a reaction, a 
positive reaction to that, is also somewhat problematic.
    It is very difficult with all the concerns that major 
corporations have unless you are talking about some absolutely 
seminal piece of information or something that is considered so 
super critical. It is very difficult sometimes to get any mind 
space with the senior management to address these issues in any 
constructive way.
    Ms. Ros-Lehtinen. Thank you.
    I wanted to ask about the territorial scope of the law 
relating to conduct occurring outside of the United States. 
Some suggest that there are problems with it. They suggest that 
the measure ought to be whether the espionage act committed 
overseas had a substantial effect within the United States.
    Would you disagree or agree with that recommendation, and 
how would you define substantial effect?
    Mr. Charney. I think it is a difficult issue. The law 
already has some extra territorial provisions, as you know, and 
also when there is any conduct in the United States you get 
venue in the United States and so I guess my question would be 
are we looking at cases, for example, where a foreign company 
steals a secret in that country, but it somehow has an impact 
upon the United States.
    I think if the United States were to exercise jurisdiction 
in those kinds of cases we would probably get resistance from 
foreign states about the reach of our law--if that is the 
scenario we are thinking about.
    If, for example, a French company took data from IBM in 
France and because IBM is an American company we said well, 
that has an impact on IBM's corporate profits and earnings, I 
think we would get resistance. That is just my sense.
    Ms. Ros-Lehtinen. Austin.
    Mr. McGuigan. I do not know whose proposition this is a 
problem because I know of no case under 1831 that has even been 
attempted, and I cannot comment on whether or not there is a 
stumbling block because I simply do not see it as a stumbling 
block, and I have not seen a case where someone has planned out 
how it could become a stumbling block. I do not know what 
testimony there is to that effect. I do not know.
    Ms. Ros-Lehtinen. OK. Does the prospect of litigation, the 
threat of litigation or prosecution serve as a true deterrent 
for corporate spies? Are the fines that are levied under this 
Act, the Economic Espionage Act, a true deterrent? How can 
industrial espionage be made less appealing? Do you think more 
prosecution or heavier fines would serve as deterrents?
    For example, should violator companies be sanctioned 
internationally whereby they cannot reap any benefits from the 
stolen information? Should the United States impose duties on 
products from such companies or impose other import or export 
restrictions? What steps can be taken?
    Mr. McGuigan. The fine so far, and I hate to keep taking 
the table. The fine so far is simply in looking through I 
provided a table of all the cases.
    Ms. Ros-Lehtinen. Yes. We have it. Thank you.
    Mr. McGuigan. Simply no one could suggest that the types of 
fines that have been proposed could act as a deterrent----
    Ms. Ros-Lehtinen. Correct.
    Mr. McGuigan [continuing]. If the problem is $45 billion. 
It is simply not--it does not make any sense.
    The only large fine is really a restitution I believe that 
is in the Gillette case where the gentleman sold, I believe, 
the new design for the Mach III razor before it came out. I 
believe it has something to do with that, but that is the only 
large one, and that is really a restitution so there does not 
seem to be any fines.
    I would think that the threat of incarceration is more 
serious for corporations than money, and putting individuals in 
jail is the best deterrent.
    Mr. Manzullo. Yes, but they do not give you razors in jail.
    Mr. McGuigan. I understand that, but I think that----
    Ms. Ros-Lehtinen. Not the Mach III anyway.
    Mr. McGuigan [continuing]. Incarceration is a much better 
deterrent. For foreign companies obviously, fines are going to 
have to be more seriously considered, substantial ones, because 
incarceration is not real.
    Ms. Ros-Lehtinen. Thank you.
    Mr. Swartwood.
    Mr. Swartwood. I think another consideration is that it 
would be difficult I think to try to prove that something was 
taken with the full knowledge and agreement of say the CEO of 
any major corporation.
    My experience in information loss indicates that even the 
perpetrators of such crimes for the most part are acting as 
individuals and not acting necessarily at the behest of another 
corporation. They are doing it for their own personal reasons. 
They are doing it for either personal gain or for some type of 
retribution, etc., and once again I am talking mostly on the 
insiders.
    In external situations, my feeling is that even when 
corporations, if they were involved, it would be at a level of 
the corporation that would not necessarily be considered 
corporate. I mean, you might have someone in a division trying 
to get a short-term gain in an area, and so, I mean, I think 
proving that it would be a corporate level issue could be very 
difficult, especially in a criminal venue.
    Ms. Ros-Lehtinen. Yes?
    Mr. McGuigan. I think my experience has been the opposite. 
In many of the cases I have taken, upper management has been 
involved in the misappropriation, and it has been my experience 
in the criminal law that when one prosecutes low level 
individuals they are able to get those individuals to give up 
the names of the people otherwise involved.
    So absent again incarceration and seriously doing that, I 
do not see how you are going to get to the bottom of who in the 
company is involved.
    Ms. Ros-Lehtinen. Thank you.
    Mr. Manzullo.
    Mr. Manzullo. This is very fascinating. I see two roads 
here. Maybe I am wrong, and you can correct me-- one is an 
inference that says because there have been only 18 
prosecutions, the FBI or Department of Justice is not 
sufficiently and aggressively prosecuting these types of cases. 
Then, on the other hand there is this natural reticence of the 
companies. They would rather take the hit than give a Federal 
agent the opportunity to take a peek at the secret.
    The testimony of the Assistant Director was pretty obvious 
that they have to struggle with companies. She said she would 
put on a seminar for one company just to be able to peak their 
level of inquiry that the FBI is indeed interested.
    Did you want to comment on that, Mr. McGuigan, because you 
seem to draw the----
    Mr. McGuigan. We in Connecticut have incarcerated at state 
court individuals. There are no Federal prosecutions in 
Connecticut, but have had the local gendarmerie prosecute 
individuals and actually incarcerate individuals for 
misappropriation of propriety drawings from one of our 
companies.
    I think that the reasons for the dichotomy I think need to 
be explored between the losses and the lack of cases, but, 
second, I think that it should be longer incarceration because 
summarily dealing with some people is an object lesson for 
others.
    What I am saying is that when you have a case I think you 
have to prosecute it very, very vigorously, and you have to--
when you get substantial time, you will find out who else is 
involved, and that can have a salutary effect on a number of 
other individuals contemplating similar conduct.
    Mr. Manzullo. Yes?
    Mr. Charney. I would just like to build on this question a 
moment because when I was chief of the computer crime section, 
I can tell you that prosecutors salivate over cases like these.
    You know, the first case out of the box was the Four 
Pillars case, which went to trial. We convicted the president 
of a corporation from Taiwan for stealing secrets from Avery 
Dennison. These are good cases with sex appeal. That is not the 
problem.
    If you look at the Computer Security Institute's surveys, 
however, they have done surveys on computer crime from 1996 to 
the year 2000, and in the year 2000 survey what they said was 
one of the most remarkable statistics on computer crime--not 
just trade secrets, but computer crime--was the rapid increase 
in the number of companies willing to report to law 
enforcement. It had gone all the way up to 32 percent.
    You know, one victim out of three was now willing to report 
to law enforcement, up from 17 percent the year before, so if 
you have between one and two, you know, in every 100 cases you 
have roughly 17 reported. That is not a very high statistic.
    I think there is a lot of difficulty within the corporate 
environment in making the determination about whether you 
handle this civilly, whether you cut your losses, remediate and 
get your business up and running again and seek damages through 
civil action or whether you go to law enforcement.
    That is a tough call because when you go to law enforcement 
you get far more publicity than you might want. Then you have 
to worry about shareholders and investors and public relations.
    Mr. Manzullo. Loss of confidence.
    Mr. Charney. Loss of confidence. It is a hard call for a 
CEO whose primary responsibility is to protect the assets of 
the corporation and not to----
    Mr. Manzullo. Especially in light of the fact that the 
penalties are so minimal. That goes back to what you were 
saying. Do companies then opt for civil action, or do they just 
take it on the chin?
    Mr. Charney. No. I am actually now on the private side, and 
the cases that we have been investigating for companies is for 
civil suit purposes, not to go to law enforcement.
    Mr. Manzullo. Are these very difficult cases to try and 
prove?
    Mr. Charney. Like everything else, it is so dependent on 
the evidence. I mean, the Four Pillars case we had someone in 
the company who was being paid off. We flipped him. We put him 
in a hotel room. We had a camera. The president of the foreign 
company was going to see the Forest Hills tennis tournament. We 
had him stop off in the hotel room, and he traded documents for 
money.
    The best part of the case, the documents actually said 
Confidential, and he took scissors and told our informant to 
cut out the word Confidential and throw it away where it would 
not be found.
    That is a great case to try, but in most cases it is far 
more difficult, especially electronic cases because it is very 
hard to trace back to the source, and even if you can trace 
back to the source machine, it does not tell you who is the 
person sitting at the keyboard. If that machine is in another 
country, now you have to figure out if that country has similar 
laws.
    Mr. Manzullo. We just had that. Was it Indonesia where 
the----
    Mr. Swartwood. Philippines.
    Mr. Manzullo. In the Philippines. That shows obviously a 
lack of legal coverage, but only a Philippine law could apply 
there.
    Mr. Charney. That is correct. In fact, there are groups. 
There are three international organizations looking at some of 
these issues. One is the G8, and I used to chair the G8 
subgroup of high tech crime, one is the United Nations, and the 
other is the Council of Europe.
    There is a push internationally to harmonize criminal laws 
in the new economy area, but it is slow. It takes a lot of 
work. Many countries do not quite see the threat. Indeed, we 
have only been waking up to it.
    Mr. Manzullo. Where do you draw the line? When I asked the 
Assistant Director, at what point does something become 
espionage? You earnestly recruit people that are with other 
companies. That goes on all the time. At what point do you 
cross the line? At what point is a crime committed?
    Mr. Charney. I mean, generally we would look at the 
statutory elements first and foremost, and then I hate to say 
this, but it is a little like paraphrasing Potter Stewart on 
obscenity, which is I know it when I see it.
    Most of the cases that were brought to our attention were 
egregious cases where, for example, people, companies, will not 
come to law enforcement and report we had an employee. He got 
hired away by another company. We want you to go investigate.
    In fact, the government would probably say that is a 
perfect civil suit, not a criminal one, because you are in a 
situation where there is going to be a lot of dispute over the 
facts, a lot of questions about whether it is an employment 
dispute or----
    Mr. Manzullo. Scott, let me followup on that. If you have 
an individual that works for one company and is hired away by a 
competitor, how much of his mind has to stop?
    Mr. Charney. Well, the answer is it does not. I mean, 
general knowledge does not have to stop, but specific does. In 
fact, I have seen cases where individuals who have created 
proprietary information then go to another company and recreate 
proprietary information.
    I can tell you in those cases companies are looking at 
civil suits over that issue. They think that crosses the line 
because the second company is producing now the same unique 
product that the first company had and gave them a competitive 
edge in the market.
    Mr. McGuigan. Generally you have a non-disclosure agreement 
in the first place with any high level employee creating that 
type of information so if he breaches the contract in the first 
instance.
    Mr. Manzullo. A non-competitive agreement.
    Mr. McGuigan. Second, if he were claiming it was simply in 
his head, in many cases now there is what is known as 
inevitable disclosure. He is inevitably using the proprietary 
data that he got in the first instance to develop the data for 
another company, so those cases are prosecuted civilly.
    I have been involved in them. I had someone who developed 
software for machinery and then when to work for another 
company 5 years later and developed the same software. We 
successfully sued them and prevented them from doing that.
    Even though he claimed he did not take any of the 
information with him when he left, he had the process by which 
the flow charts for the computer software, which allowed him to 
essentially create it.
    Mr. Manzullo. I have one last question if you do not mind, 
regarding the four suggestions that you made. Mr. McGuigan, you 
mentioned the fact that there is no subject matter 
jurisdiction, that you have to have diversity in order to get 
the Act involved.
    Mr. McGuigan. Correct. You do not have a Federal Economic 
Espionage Act, so you sue in the states. If you were suing a 
citizen of another state and you get diversity, you can----
    Mr. Manzullo. Do you mean if there is no Federal Act?
    Mr. McGuigan. There is no Federal Act now. There is only a 
Federal criminal Act.
    What I am suggesting is they should make the Economic 
Espionage Act and create a civil cause of action under the 
Economic Espionage Act and allow the companies to spend the 
resources to prosecute the cases because they will do it, and 
they will do it when they are confident that they can do it, 
and they will no longer be afraid they are going to lose 
control of the case and the government is going to----
    Mr. Manzullo. So do you think that is one of the problems 
is that there is no Federal cause of action?
    Mr. McGuigan. I think it is clear to me. I never thought as 
a state prosecutor I would be arguing for an expansion of 
Federal jurisdiction, but it is clear to me in this particular 
case.
    Mr. Manzullo. You have come to your senses. OK.
    Mr. McGuigan. It is clear to me.
    Mr. Manzullo. We are moving with electronic commerce that 
moves like that across state lines. That is a little bit 
different.
    Mr. McGuigan. I have come to the conclusion that creating a 
Federal cause of action is really the way to go, and I think 
almost everything was pointed out here today.
    Mr. Manzullo. Which could be tried in a state court. You 
could actually try that case in a state court if the law----
    Mr. McGuigan. You should not have preemption. You should 
have it you can file a Federal cause of action or a state cause 
of action. In other words, you should be allowed to file 
either.
    I do not think there should be a preemption of state 
uniform trade secrets law as has happened in some other areas, 
so I am not suggesting that, and I am not talking about it in 
expansive approaches in the RICO Act. I am just talking about 
creating a cause of action.
    Ms. Ros-Lehtinen. Those are good recommendations.
    Mr. Manzullo. Yes. I appreciate that very much. Thank you.
    Ms. Ros-Lehtinen. I think we will move on that. Thank you 
so much for your excellent testimony. We appreciate it, and we 
will be checking back with you. I am sure as we move on this, 
on these recommendations. Thank you.
    The Subcommittee is now adjourned.
    [Whereupon, at 3:27 p.m. the Subcommittee was adjourned.]
      
=======================================================================




                            A P P E N D I X

                           September 13, 2000

=======================================================================

      
    [GRAPHIC] [TIFF OMITTED] T8684.001
    
    [GRAPHIC] [TIFF OMITTED] T8684.002
    
    [GRAPHIC] [TIFF OMITTED] T8684.003
    
    [GRAPHIC] [TIFF OMITTED] T8684.004
    
    [GRAPHIC] [TIFF OMITTED] T8684.005
    
    [GRAPHIC] [TIFF OMITTED] T8684.006
    
    [GRAPHIC] [TIFF OMITTED] T8684.007
    
    [GRAPHIC] [TIFF OMITTED] T8684.008
    
    [GRAPHIC] [TIFF OMITTED] T8684.009
    
    [GRAPHIC] [TIFF OMITTED] T8684.010
    
    [GRAPHIC] [TIFF OMITTED] T8684.011
    
    [GRAPHIC] [TIFF OMITTED] T8684.012
    
    [GRAPHIC] [TIFF OMITTED] T8684.013
    
    [GRAPHIC] [TIFF OMITTED] T8684.014
    
    [GRAPHIC] [TIFF OMITTED] T8684.015
    
    [GRAPHIC] [TIFF OMITTED] T8684.016
    
    [GRAPHIC] [TIFF OMITTED] T8684.017
    
    [GRAPHIC] [TIFF OMITTED] T8684.018
    
    [GRAPHIC] [TIFF OMITTED] T8684.019
    
    [GRAPHIC] [TIFF OMITTED] T8684.020
    
    [GRAPHIC] [TIFF OMITTED] T8684.021
    
    [GRAPHIC] [TIFF OMITTED] T8684.022
    
    [GRAPHIC] [TIFF OMITTED] T8684.023
    
    [GRAPHIC] [TIFF OMITTED] T8684.024
    
    [GRAPHIC] [TIFF OMITTED] T8684.025
    
    [GRAPHIC] [TIFF OMITTED] T8684.026
    
    [GRAPHIC] [TIFF OMITTED] T8684.027
    
    [GRAPHIC] [TIFF OMITTED] T8684.028
    
    [GRAPHIC] [TIFF OMITTED] T8684.029
    
    [GRAPHIC] [TIFF OMITTED] T8684.030
    
    [GRAPHIC] [TIFF OMITTED] T8684.031
    
    [GRAPHIC] [TIFF OMITTED] T8684.032
    
    [GRAPHIC] [TIFF OMITTED] T8684.033