Cyberespionage Crimes
1. Cyberespionage groups are stealing all types of intellectual property, including government and corporate secrets, information on products and technology, financial information, etc. These groups also infiltrate security organizations in order to reverse engineer their technologies and further weaken their defense from cyber-attacks.
2. The video describes several instances of cyberespionage in American companies, including the operation Aurora, the Nortel Networks hack, and the RSA exploit. The investigation of these cases revealed that there is strong technical evidence that the attacks are, in fact, coming from China. The evidence was obtained by analyzing the network traffic on corporate computers and tracing the location of the unauthorized connections.
3. Adam Siegel claims that the main motivation for cyberespionage in china is the fear of falling behind its’ western competitors in the technological sphere. China steals and copies products and technologies in order to be economically independent of America’s market and industry.
4. American companies are not acknowledging the cyberespionage because they mostly don’t even know that they are being spied on. Other companies are careful with accusations as the evidence is often insufficient to take the threat seriously. In the case of Nortel Networks, the hack was happening at a time when only several instances of cyberespionage were recorded and confirmed, so the board members considered the evidence unrealistic.
5. I don’t think that there’s a reason not to believe it’s true. I think that the rapid development of the IT industry constantly provides hackers with new tools and technology for improving their espionage methods. Plus, as the software becomes more complicated, it’s getting harder to predict all of the possible breaches and vulnerabilities.
6. I don’t think that the U.S. will lose its’ competitive advantages to China because I believe that in the near future IT professionals will overcome all the difficulties and create a reliable security system to protect future research and innovations made by American corporations.
There are a number of methods of legal technology transfer, such as licensing, strategic supplier agreement, contract R&D, etc. (Technology Transfer, n.d.). I don’t think that it’s possible to shut down all types of technology transfer from a country due to numerous political and economic reasons.
References
Technology Transfer. (n.d.). Retrieved March 16, 2017, from …