 We fight like hell for freedom, but we let the world pick our intellectual pockets.
We fight like hell for freedom, but we let the world pick our intellectual pockets.
Sure, the US has a counterespionage law. But it is a half-way measure. Ok, we do more than Canada. 
They don't even have a law.
Question... What is the quality of your freedom once your jobs are 
stolen, and your intellectual property is ripped out from under you?  
Memorial Day is a good day to re-print this post from 
April 5, 2012.
----------------------------------
Gen. Keith B. Alexander, (NSA)
 
...called the continuing, rampant cybertheft “
the greatest transfer of wealth in history.” (
bio)
---
...
current public and private approach to fending off hackers is  "unsustainable.'' Computer criminals are simply too talented and  defensive measures too weak to stop them, he said. (
bio)
---
"Yet the same Congress that has heard all of this disturbing testimony is mired in disagreements about 
a proposed cybersecurity bill that does little to address the problem of Chinese cyberespionage." (
bio)
---
Letter to the Editor - The New York Times
Dear Editor,
Richard A. Clarke’s op-ed piece, “How China Steals Our Secrets,”       (4/2/12) states the current business espionage problem perfectly,       but we need a solution. Consider this...
The Chinese secrets of: silk and tea production; making porcelain,      
 gunpowder and paper, could not survive Western espionage attacks –     
  not even when protected with death penalties. Espionage killed       
their economy, and the damage lasted for centuries. Obviously,       our
 competitive advantages are also our National Interest Assets.
The one-sided, punish-the-spy security model, still being used       
today, never worked. We need to make it two-sided. There must be       a proactive legal responsibility to protect. 
The solution... Corporate caretakers must be held accountable for       protecting their valuables; our national treasures. We need a law       creating business counterespionage security standards, with       penalties for inadequate protection. We already successfully employ the same concept with       medical and financial record privacy.
Kevin D. Murray
Spybusters, LLC 
---
 A cybersecurity  law alone will not stop spying.
A cybersecurity  law alone will not stop spying.  
If implemented, 
it will force an increase in  traditional spy techniques, such as: 
bugging, wiretapping, physical  intrusions and social engineering. (Remember, computer data is available elsewhere long before it is computerized.) 
Protecting our competitive advantages requires a holistic approach; a National Interest Assets law which would also... 
• Protect the entire intellectual property timeline, from brainstorming and initial discussions, to the final product or business strategy. 
• Impose a responsibility of due care upon the creators and holders competitive advantage information.
• Specify compliance requirements
 aimed at countering traditional business espionage practices. Technical
 Surveillance Countermeasures Inspections (TSCM / bug sweeps), 
information-security audits, and information-security compliance 
procedures; safeguards which can be easily mandated and monitored.
 This is a no-brainer, Congress.
The cost of keeping National Interest Assets safe is infinitesimal compared to current losses (not to mention the long-term effects). Just ask the Chinese.
~Kevin
This is a no-brainer, Congress.
The cost of keeping National Interest Assets safe is infinitesimal compared to current losses (not to mention the long-term effects). Just ask the Chinese.
~Kevin