We fight like hell for freedom, but we let the world pick our intellectual pockets.
Sure, the US has a counterespionage law. But it is a half-way measure. Ok, we do more than Canada.
They don't even have a law.
Question... What is the quality of your freedom once your jobs are
stolen, and your intellectual property is ripped out from under you?
Memorial Day is a good day to re-print this post from
April 5, 2012.
----------------------------------
Gen. Keith B. Alexander, (NSA)
...called the continuing, rampant cybertheft “
the greatest transfer of wealth in history.” (
bio)
---
...
current public and private approach to fending off hackers is "unsustainable.'' Computer criminals are simply too talented and defensive measures too weak to stop them, he said. (
bio)
---
"Yet the same Congress that has heard all of this disturbing testimony is mired in disagreements about
a proposed cybersecurity bill that does little to address the problem of Chinese cyberespionage." (
bio)
---
Letter to the Editor - The New York Times
Dear Editor,
Richard A. Clarke’s op-ed piece, “How China Steals Our Secrets,” (4/2/12) states the current business espionage problem perfectly, but we need a solution. Consider this...
The Chinese secrets of: silk and tea production; making porcelain,
gunpowder and paper, could not survive Western espionage attacks –
not even when protected with death penalties. Espionage killed
their economy, and the damage lasted for centuries. Obviously, our
competitive advantages are also our National Interest Assets.
The one-sided, punish-the-spy security model, still being used
today, never worked. We need to make it two-sided. There must be a proactive legal responsibility to protect.
The solution... Corporate caretakers must be held accountable for protecting their valuables; our national treasures. We need a law creating business counterespionage security standards, with penalties for inadequate protection. We already successfully employ the same concept with medical and financial record privacy.
Kevin D. Murray
Spybusters, LLC
---
A cybersecurity law alone will not stop spying.
If implemented,
it will force an increase in traditional spy techniques, such as:
bugging, wiretapping, physical intrusions and social engineering. (Remember, computer data is available elsewhere long before it is computerized.)
Protecting our competitive advantages requires a holistic approach; a National Interest Assets law which would also...
• Protect the entire intellectual property timeline, from brainstorming and initial discussions, to the final product or business strategy.
• Impose a responsibility of due care upon the creators and holders competitive advantage information.
• Specify compliance requirements
aimed at countering traditional business espionage practices. Technical
Surveillance Countermeasures Inspections (TSCM / bug sweeps),
information-security audits, and information-security compliance
procedures; safeguards which can be easily mandated and monitored.
This is a no-brainer, Congress.
The cost of keeping National Interest Assets safe is infinitesimal compared to current losses (not to mention the long-term effects). Just ask the Chinese.
~Kevin