“economic espionage: incentives and disincentives”€¦ · web view“economic espionage and...

91
“Economic Espionage and Economic Security in an Age of Change” Paper to be presented at the “Seventh International CISS Millennium Conference”, Buçaco, Portugal, June 14-16, 2007 By Ioannis L. Konstantopoulos PhD Candidate, Department of International and European Studies, Panteion University of Social and Political Sciences, Athens, Greece 1. Introduction In the mid-1980s Sir Alexander Cadogan, permanent secretary at the British Foreign Office (1938-1945) described intelligence as “the missing dimension of international affairs”. 1 Bradford H. Westerfield, Political Science Professor at Yale University, had the I would like to thank my RIEAS (Research Institute for European and American Studies) colleagues Dr John Nomikos and Dr. Andrew Liaropoulos for their insightful comments. 1 Andrew Christopher, Dilks David (eds), The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century (Urbana, IL: University of Illinois Press, 1984).

Upload: doankhanh

Post on 23-Apr-2018

214 views

Category:

Documents


1 download

TRANSCRIPT

“Economic Espionage and Economic Security in an Age of Change”

Paper to be presented at the “Seventh International CISS

Millennium Conference”, Buçaco, Portugal, June 14-16, 2007

By Ioannis L. Konstantopoulos

PhD Candidate, Department of International and European Studies,

Panteion University of Social and Political Sciences, Athens, Greece

1. Introduction

In the mid-1980s Sir Alexander Cadogan, permanent secretary at the British

Foreign Office (1938-1945) described intelligence as “the missing dimension of

international affairs”.1 Bradford H. Westerfield, Political Science Professor at Yale

University, had the opportunity to gain access to secret, classified material of the U.S.

Intelligence Community, on behalf of Yale publications. From first hand experience,

he declares that his involvement with intelligence improved radically his

understanding of international relations: “In my writing and teaching I have always,

more than most scholars, recognized the importance of the covert dimension and have

incorporated what I could find in the public domain”.2 If intelligence is the missing

dimension of international relations, then economic espionage is the missing

dimension of intelligence. Professor Martin Alexander of the University of Wales,

Aberystwyth, puts it eloquently: “Economic and industrial intelligence and spying

I would like to thank my RIEAS (Research Institute for European and American Studies) colleagues Dr John Nomikos and Dr. Andrew Liaropoulos for their insightful comments. 1 Andrew Christopher, Dilks David (eds), The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century (Urbana, IL: University of Illinois Press, 1984). 2 Lara Shohet, “Intelligence, Academia and Industry”, in Edward Cheng, Diane C. Snyder (eds.), The Final Report of the Snyder Commission, Woodrow Wilson School Policy Conference 401a: Intelligence Reform in the Post-Cold War Era, The Woodrow Wilson School of Public and International Affairs, Princeton University, January 1997. Bradford H. Westerfield is Damon Wells Professor Emeritus of International Studies and Political Science at Yale University.

upon friends really does remain another “missing dimension to the missing

dimension””.3

After the end of the Cold War and the collapse of the bipolar international

system, nation-states, the main actors in the current constellation of international

system, are trying to adapt their defense and foreign policy in general and their

security policy in particular, to the challenges of the new post-Cold War era. Their

intelligence agencies worldwide are called to adopt themselves to the new

geographical and security landscape which so suddenly emerged and to confront both

the old and new challenges. One of these challenges is their involvement in economic

espionage.

The goals of this paper are firstly to define economic espionage; secondly, to

present the historical as well as the current background of this state action; and thirdly

to analyze the incentives and disincentives of states when they are called to decide

their engagement in it. The main question which we try to answer is:

What are the reasons for which states engage in economic espionage?

We will try to answer this question by examining and analyzing the case study

of the U.S.A. (United States of America) for three reasons: firstly, this country not

only maintained its importance in international affairs after the end of the Cold War;

but is the only hyper-power in the post-Cold War era; secondly and most importantly,

the U.S.A. is the main target of economic espionage in general, both of their closest

allies and their opponents/competitors, as it has developed by far the largest economy

in the world and it has not lost its place as a pioneer in technological developments,

but it has increased the gap between her and other competitors; thirdly, in the U.S.A. a

great debate is taking place, in the political, academic and intelligence domains,

concerning its engagement in economic espionage.

The main argument of this paper is that economic espionage was, is and, will be a

main tool of governments in order to make economic decisions and participate more

efficiently in the international economic and technological competition between

nation-states, despite some disincentives which this activity comprises.

3 Alexander S. Martin, Introduction: Knowing Your Friend’s, Assessing Your Allies – Perspectives on Intra-Alliance Intelligence, in Alexander S. Martin (ed.), Knowing Your Friends: Intelligence Inside Alliances and Coalitions from 1914 to the Cold War (London, Portland: Frank Cass, 1998), p. 7. By the term “industrial intelligence and spying” Professor Alexander possibly refers to microeconomic espionage.

2

2. Definitions

In the specialized literature of economic espionage we observe a definitional

confusion between economic espionage and industrial espionage, because this subject

is under-researched and under-theorized and because different academic fields which

deal with it (for example sociology, criminology, law) use different terminology, as

each focuses on a separate aspect of the phenomenon. A characteristic of this

confusion can be found in the “Espionage Encyclopedia” of Richard Bennett. Bennett

does not include an entry for economic espionage, but he deals with this term in the

entry economic intelligence. Moreover, he refers to economic intelligence,

commercial intelligence, industrial intelligence, and corporate espionage, without

defining them and distinguishing one from another, while he does not even mention

the distinction between macroeconomic and microeconomic espionage.4

According to Samuel D. Porteous, security analyst of the Canadian Security

Intelligence Service, the term “economic espionage” refers to “clandestine or illicit

attempts by foreign interests to assist their economic interests by acquiring economic

intelligence which could be used to sabotage or otherwise interfere with the economic

security of another country”.5 By the term economic intelligence, Porteous means

“policy or commercially-relevant economic information, including technological data,

financial, commercial, and government information, the acquisition of which by

foreign interests could, either directly or indirectly, assist the relative productivity or

competitive position of the economy of the collecting organization’s country”.6 Philip

Zelikow, Professor at the University of Virginia7, gives his definition of economic

intelligence as “information about how those outside of the United States develop,

produce, or manage their material goods, services and resources. 8

4 Bennett M. Richard, Espionage: An Encyclopedia of Spies and Secrets (Virgin Books Ltd, 2002), p. 83.5 Porteous Samuel, “Economic/Commercial Interests and the World’s Intelligence Services: A Canadian Perspective”, International Journal of Intelligence and Counterintelligence, Vol. 8, No. 3, 1995, p. 297. 6 Ibid.7 Philip Zelikow was former Associate Professor of Public Policy at John J. Kennedy School of Government, Harvard University, where he was co-director of Harvard’s Intelligence and Policy Program. 8 Zelikow Philip, “American Economic Intelligence: Past Practice and Future Principles”, in Jeffreys-Jones Rhodri, Andrew Christopher (eds.), Eternal Vigilance? 50 Years of the CIA (Frank Cass & Co. Ltd, 1997, p. 164).

3

Randall M. Fort, currently Assistant Secretary of State for Intelligence and

Research, defines economic espionage as the acquisition by secret means of

information concerning the economy, trade and/or intellectual property by a secret

agency/service which uses secret sources and methods.9 For Hedieh Nasheri,

Associate Professor of Justice Studies at Kent State University, economic espionage is

defined “as one nation collecting economic data about another nation”.10 With the

term “economic data” he means “such information as national gross domestic product

and inflation rate figures, which may be obtained from published sources, or more

privileged information such as budgetary allocations for defense and national research

and development expenditures, which are usually acquired through illicit means”.11

What differentiates geopolitical espionage from economic espionage is that

the goal of the former is the early warning for the capabilities and intentions of an

opponent state to conduct warfare, while economic espionage deals with the

collection of economic and technological intelligence. However, there are two factors

that make the distinction between traditional, geopolitical espionage and economic

espionage difficult. First, some materials and high-tech equipment are necessary for a

state’s defense industry as well as for its civilian industry. Secondly, it is common

ground that the political and military strategy of a state –and especially of great

powers – always has an economic parameter.12

Another important difference is that between economic intelligence-espionage

and business intelligence-espionage – the latter refers to the collection and analysis of

information from a company, usually multinational, against another company. If those

companies collect information by using clandestine means, the accepted term is

industrial espionage. While industrial espionage is conducted by an entity of private

9 Fort Randall M., “Economic Espionage”, στο Godson R., May E., Schmitt G., U.S. Intelligence at

the Crossroads (1995), p. 181. 10 Nasheri Hedieh, Economic Espionage and Industrial Spying, (Cambridge University Press, 2005), p. 16. This book is the only academic book published as far as economic espionage is concerned and although it examines economic espionage from a criminological point of view and not from an international relations or strategic studies/intelligence approach, it is extremely valuable because it covers the whole phenomenon.11 Ibid, p. 17. 12 See Kennedy Paul, The Rise and Fall of the Great Powers: Economic Change and Military Conflict from 1500 to 2000 (London: Hyman, 1988), Knorr Klaus, Power & Wealth: The Political Economy of International Power (Basic Books, Inc., Publishers, 1973), Earle Edward Mead, “Adam Smith, Alexander Hamilton, Friedrich List: The Economic Foundations of Military Power” in Paret Peter (ed.) Makers of Modern Strategy: From Machiavelli to the Nuclear Age (Princeton University Press, 1994).

4

sector, economic espionage is conducted by the government of a state by using its

secret agencies against either governmental entities of another state, or against private

companies, usually multinationals, in order to support its indigenous companies.

Economic espionage has three distinct dimensions:

The first, macroeconomic espionage, refers to the use of secret agencies on behalf of a

state’s government in order to obtain intelligence concerning the world economic

developments and activities with the ulterior purpose the advancement of its strategic

interests.13 In its basic form, macroeconomic espionage assists the political leadership

of a state to conduct its internal and external economic policy with the optimum

results. In 1949, Sherman Kent, the father of U.S. intelligence analytical domain, who

had full knowledge of the value of macroeconomic espionage, asserted that

intelligence services should track the current world economic developments as well as

foreign economic doctrines and theories. Moreover, they should watch the supplying

part of the armed forces, the development of new crops and methods of agriculture,

changes in farm machinery, land use, fertilizers, and reclamation projects. Also they

should pay close attention to the development of new utilities and the extensions of

those already established, as well as to changes in the techniques and implements of

distribution, new transport routes and changes in the inventory of the units of

transportation. But, most importantly, in the atomic age, they must follow new

discoveries as far as natural resources are concerned, especially those used in order to

build nuclear weapons.14

According to the second dimension, microeconomic espionage, the

government of a state via its secret agencies is involved in the collection of

intelligence in order to assist a company (usually a multinational), creating by that

way a collaboration between government and company whose goal is to prevail over

one’s opponents in the international economic arena.15

The third dimension of economic espionage is economic counterintelligence.

Randall M. Fort defines this term as “the identification and neutralization of foreign

intelligence services spying on the U.S. citizens or companies and stealing

13 Johnson K. Loch, Secret Agencies: U.S. Intelligence in a Hostile World (Yale University Press, 1996), p. 148.14 Kent Sherman, Strategic Intelligence for American World Policy (Princeton, NJ: Princeton University Press, 1949), p. 34-5. 15 Johnson K. Loch, (1996), op. cit., p. 147-8.

5

information and/or technology for use within their own countries”.16 Samuel Porteous

characterizes counterintelligence as not only a very important function of the secret

services, but also the less controversial. According to his definition of the term, “a

nation’s counter-intelligence service simply seeks to advise government about and

report on the activities of foreign intelligence services or their surrogates engaging in

clandestine activities directed against their state’s economic and commercial

interests.”17

3. Historical Background

Economic espionage is not a new phenomenon and its roots are dated from

biblical times. If we delve into history we can find a lot of examples of

macroeconomic espionage and we can verify the great importance of economic and

technological intelligence through the ages. As the Children of Israel ramble over

Sinai, Moses instructed his spies to “spy out the land”. This early attempt of

espionage is really instructive and it incorporates a case of macroeconomic espionage.

The spies not only gave a concrete description of the city and its defense (“the cities

are walled and very great”) and the power of its inhabitants (“be strong”), but also

offered useful economic intelligence by verifying that Canaan was a land of “milk and

honey” and by giving details about the quality of the land.18

The collection of macroeconomic intelligence was not unknown in Ancient

Greece. According to Professor Andrew Gerolymatos, in 416 B.C. the Athenians sent

a delegation in Eugesta in order to find out the economic capacities of the town so as

to finance a joint offensive military operation. According to Thucydides, the citizens

of Eugesta deceived the delegation’s members by forging their real resources and

Athenians misperceived their economic situation. The deceit was successful as the

members of the delegation with their return to Athens supported vigorously the

Athenian invasion against Sicily.19

16 Fort M. Randall, (1995), op. cit., p. 182. 17 Porteous D. Samuel, “Economic and Commercial Interests and Intelligence Services”, in Potter Evan H. (ed.), Economic Intelligence & National Security (Carleton University Press, 1998), p. 105-6.18 Laqueur Walter, The Uses and Limits of Intelligence (Transaction Publishers, 1993), p. 38, Neilson Keith & McKercher B.J.C. (eds.), Go Spy the Land: Military Intelligence in History, (Praeger Publishers, 1992), Introduction, p. ix. 19 Gerolymatos Andrew, Espionage in Ancient Greece, (Cactus Editions, Athens, 2001, in Greek), p. 30.

6

At 6th century A.C. Justinian in order to avoid the taxes in gold imposed by

Persia in the cases where Byzantium imported silk from China, and not to strengthen

the economy of its opponent, reached an agreement with Ethiopians according to

which the latter were going to buy the silk and transport it to Byzantium by a route

bypassing Persia. Unfortunately his plan failed because the Persians, being more

closed to the transport centers of India, succeeded in buying first the silk, so Justinian

had no alternative than to order a group of monks which had a perfect knowledge of

the Far East, to steal silkworms from China. According to Professor H. Papasotiriou,

“this was one of the greatest successes of “economic espionage” in history, by which

Byzantium became independent of silk imports”.20

The U.S. has a long history in collecting macroeconomic intelligence. Its

operations date back to the end of 1776 when the first U.S. intelligence agency called

“Committee of Secret Correspondence of the Continental Congress” sent William

Carmichael to Europe, disguised as a merchant, in order to collect intelligence

concerning economic issues for which the new U.S. government gave great interest.

In November 1776, Carmichael sent a reassuring letter from Amsterdam, reporting

that: “You have been threatened that the Ukraine would supply Europe with tobacco.

It must be long before that time can arrive. I have seen some of its tobacco here, and

the best of it is worse than the worst of our ground leaf”.21

During World War II economic intelligence played a great role for the U.S.

Agents of the OSS (Office of Strategic Services) and other analysts had the task to

“find out not only about enemy military dispositions but also about tungsten and

diamond smuggling, about the production of ball bearings, Swedish iron ore supplies

to Germany, and other such topics.” It was common ground that such topics consisted

strategic issues of great importance for the conduct of war.22 Also, during World War

II, the newly established Board of Economic Warfare had the task to study the

Japanese economy and analyze the role of critical commodities.23 Taking into

consideration this tradition, it is an oxymoron the fact that the U.S. ignored the

scientific-technological intelligence because it misestimated that the U.S. power was

20 Papasotiriou Haralampos, Byzantine Grand Strategy, 6 th -11 th century (Poiotita Publications, Athens 2000, In Greek), p. 103. See also “Economic and Industrial Espionage, http://plaza.powersurf.com/keddy/essays/page3espionage.htm21 Zelikow Philip, op. cit., p. 164.22 Ibid, p 165, Laqueur Walter, op. cit., p. 39.23 Zelikow Philip, op. cit., p. 165.

7

so great and its technological knowledge so superior that their opponent’s that they

had nothing to learn from them. It is a classic case of underestimating the enemy’s

capabilities.24

4. Economic Espionage and Economic Security in an Age of Change

The concept of security has been characterized by Professor John Baylis as a

“contested concept”.25 Walter Lippmann believes that “a nation is secure to the extent

to which it is not in danger of having to sacrifice core values if it wishes to avoid war,

and is able, if challenged, to maintain them by victory in such a war”. Arnold Wolfers

states that “security, in any objective sense, measures the absence of threats to

acquired values and in a subjective sense, the absence of fear that such values will be

attacked”. Booth and Wheeler give a different definition: “Stable security can only be

achieved by people and groups if they do not deprive others of it; this can be achieved

if security is concerned as a process of emancipation”.26

Although there is an agreement that security means “freedom from threats to

core values” there is a huge disagreement as far as whether the main focus should be

on “individual”, “national”, or “international” security.27 During the Cold War period

the concept of “national security” received disproportionate attention in international

relations bibliography comparing with “individual” and “international security”.

Likewise, a large amount of attention was paid to the dimension of military security

than the other dimensions of security (political, economic, societal, and

environmental) mainly because “military means can dominate outcomes in all the

other sectors”.28

According to Barry Buzan the concept of international security incorporates

five dimensions: 1) Military security has to do with “the two-level interplay of the

armed offensive and defensive capabilities of states, and states’ perceptions of each

other’s intentions”. 2) Economic security is “the access to the resources, finance and

markets necessary to sustain acceptable levels of welfare and state power”. 3)

24 Laqueur Walter, op. cit., p. 39.25 Baylis John, “International Security in the Post-Cold War Era”, in Baylis John, Smith Steve (eds.), The Globalization of World Politics: An Introduction to International Relations, (Oxford University Press, 1997), p. 194. 26 Ibid, p. 195. 27 Ibid.28 Buzan Barry, “Is International Security Possible?” in Booth Ken (ed.), New Thinking About Strategy and International Security (HarperCollins, 1991), p. 35.

8

Political security is “the organizational stability of states, systems of government, and

the ideologies that give them legitimacy. 4) Societal security refers to the

“sustainability, within acceptable conditions for evolution, of traditional patterns of

language, culture, and both religious and national identity and custom”. 5)

Environmental security is concerned with “the maintenance of the planetary biosphere

as the essential support system on which all other human enterprises depend”.29

In the Post-Cold War World, economic security has come to the front and

intelligence agencies face the dilemma to get involved (or to continue their

involvement) with economic espionage. In order to plan and implement its economic

policy, a state needs intelligence about the international economic and technological

environment on the one hand and its opponents’ strategies, policies, and capabilities

on the other hand. By providing this vital information to policymakers intelligence

agencies are contributing to the achievement of economic security. Economic

espionage is a tool of the intelligence community which helps policymakers to reach

the right decisions with the best result while it both improves and protects a state’s

economic and technological basis and competitiveness. Sun Tzu’s famous motto

“Know the enemy, know yourself; your victory will never be endangered”,30 is not

only valid for military affairs, but also for economics.

However, there can be no absolute distinction between those two realms.

Traditionally there is a strong relationship between economics and military power.

The relationship between economics and power has two forms: Firstly, economics,

hand in hand with technology, are the foundations of military power.31 Professor

Michael Sheehan, maintains that “economics and national security have always been

sees as being linked to some extent.”32 Professor Mearsheimer referring to “wealth

and power” distinguishes between two kinds of power: latent power and military 29 Ibid, p. 34-5. 30 Sun Tzu, The Art of War, (Translated by Samuel B. Griffith, Oxford University Press, 1971), p. 129 See also: Handel Michael, Masters of War: Classical Strategic Thought, (Frank Cass, third, revised and expanded edition, 2002), p. 215. 31 For the close relationship between economics and military power see: Knorr Klauss, Trager N. Frank (eds.), Economic Issues and National Security, (University Press of Kansas, 1977), Knorr Klauss, Power & Wealth: The Political Economy of International Power, (Basic Books, Inc., Publishers, 1973), Knorr Klauss, The Power of Nations: The Political Economy of International Relations, (Basic Books, Inc., Publishers, 1975), Kennedy Paul, The Rise and Fall of the Great Powers: Economic Change and Military Conflict from 1500 to 2000 (London: Hyman, 1988), Knorr Klaus, Power & Wealth: The Political Economy of International Power (Basic Books, Inc., Publishers, 1973), Earle Edward Mead, “Adam Smith, Alexander Hamilton, Friedrich List: The Economic Foundations of Military Power” in Paret Peter (ed.) Makers of Modern Strategy: From Machiavelli to the Nuclear Age (Princeton University Press, 1994). For the relationship between military power/war and technology see: Creveld Martin, Technology and War: From 2000 B.C. to the Present, (The Free Press, 1989).

9

power. Latent power has to do with “the socio-economic ingredients that go into

building military power; it is largely based on a state’s wealth and the overall size of

its population”. Military power is based largely “on the size and strength of a state’s

army and its supporting air and naval forces”33. He argues that “these two forms of

power are closely related”.34

Secondly, economic capabilities can on their own right be used as a force.35

After the end of the Cold War many realists argued that in the absence of military

confrontation, economic competition takes its place and talk about a war fought with

economic tools.36 Professor Samuel Huntington argued in 1993 that “in a world in

which military conflict between major states is unlikely, economic power will be

increasingly important in determining the primacy or subordination of states”.37 The

well-known strategist Edward Luttwak makes reference to Geo-Economics, a kind of

“warfare by other means” and maintains that “… when it comes to the central arena of

world politics where Americans, Europeans, and Japanese collaborate and contend, it

is chiefly by economic means that adversarial attitudes can now be expressed”.38

Intelligence agencies should function in an age of Globalization and of

Information. According to Jan Aart Scholte, globalization “refers to processes

whereby social relations acquire relatively distanceless and borderless qualities, so

that human lives are increasingly played out in the world as a single place”.39 Anthony

Giddens defines globalization as “the intensification of worldwide social relations

which link distant localities in such a way that local happenings are shaped by events

occurring many miles away and vice versa”.40 David Held, Anthony McGrew, David

Goldblatt and Jonathan Perraton, give a more precise definition: globalization is “a

process (or set of processes) which embodies a transformation in the spatial

organization of social relations and transactions – assessed in terms of their extensity,

32 Sheehan Michael, International Security: An Analytical Survey, (Lynne Rienner Publishers, 2005), p. 65.33 Mearsheimer John, The Tragedy of Great Power Politics, (W.W. Norton & Company, 2001), p. 55-6. 34 Ibid, p. 55. 35 Sheehan Michael, op. cit., p. 72. 36 Ibid. 37 Quoted in Sheehan Michael, op. cit., p. 72.38 Luttwak Edward, Turbo Capitalism: Winners and Losers in the Global Economy, (Weidenfeld & Nicolson, 1999), p. 128. For the role of economics as a tool of foreign policy see Baldwin A. David, Economic Statecraft, (Princeton University Press, 1985). 39 Scholte Aart Jan, “The Globalization of World Politics”, in Baylis John, Smith Steve (eds.), The Globalization of World Politics: An Introduction to International Relations, (Oxford University Press, 1997). 40 Giddens Anthony, The Consequences of Modernity: Self and Society in the Late Modern Age, (Cambridge: Polity Press, and Stanford: Stanford University Press, 1990).

10

intensity, velocity and impact – generating transcontinental or inter-regional flows

and networks of activity, interaction, and the exercise of power”.41 Globalization has

increased radically the flow of information across borders and has constructed many

new information channels.

Taking into consideration that intelligence agencies deal with a special kind of

information, it is certain that they will be affected by the Information Age. Although

this concept is ambiguous, it is of great importance. The driving factor in the

Information Age is the tremendous technological progress in the domains of

processing and communication of information. However, according to Abram N.

Shulsky, more important than technological change are “the behavioral and

institutional changes that result from the focus on information as the key to

organizational activity”.42 Bruce Berkowitz and Allan Goodman argue that the basic

technological characteristics behind the Information Age are: growing capabilities,

falling costs, and greater connectivity.43

In the Information Age the intelligence community has to compete with other

governmental and non-governmental organizations which are specialized in collecting

and analyzing information. After examining the main dimensions of economic

espionage committed by the Soviet Union/Russia, France, Japan and the U.S.A.

during the Cold War and beyond, we will analyze the incentives, as well as the

disincentives of the intelligence community in order to get involved in such an

activity.

5. Macroeconomic Espionage5.1 The Policy of the former Soviet Union – Russia

A great part of the literature concerning the former Soviet Union refers to

many cases of macroeconomic espionage. Since the 1920s the former Soviet Union

was trying to obtain high-tech industrial technology from the U.S. and Western

41 Held David, McGrew Anthony, Goldblatt David and Perraton Jonathan, “The Globalization Debate”, in Williams Phil, Goldstein M. Donald, Shafritz M. Jay(eds.), Classic Readings and Contemporary Debates in International Relations, (Thomson, Wadsworth, 2006), p. 563-4. 42 Shulsky N. Abram and Schmitt J. Gary, Silent Warfare: Understanding the World of Intelligence, (Brassey’s, Inc., 2002), p. 7. 43 Berkowitz D. Bruce, Goodman E. Allan, Intelligence in the Information Age, (Yale University Press, 2000), p. 13.

11

Europe via espionage.44 The value of foreign technology was firstly recognized as a

target of Soviet intelligence agencies by Feliks Dzerzhinsky, head of the Cheka,

forerunner of the KGB (Chrezuvychainaya Komissiya po Borbe s Kontrrevolutisnei I

Sabottazhem – The Extraordinary Commission for the Struggle Against Counter-

Revolution and Sabotage).45 The two organizations engaged in the collection of U.S.

technology were the famous KGB (Komitet Gosudarstvennoy Bezopasnosti /

Committee for State Security) and GRU (Glavnoye Razvedyvatelnoye Upravleniye /

Chief Intelligence Directorate of the General Staff, Ministry of Defense). They both

implemented the orders of VPK (Military Industrial Commission), of GKNT (State

Committee for Science and Technology), of the Ministry of Foreign Economic

Relations and of the Politburo.46 The coordination of the whole effort of collecting

scientific and technological intelligence, as far as the defense sector is concerned, was

the duty of the Military Industrial Commission (VPK) which was later upgraded by

Gorbachev in State Commission for the Military-Industrial Complex. VPK was

headed by the deputy prime minister and it included 5 intelligence agencies: GRU,

Directorate T of FCD (First Chief Directorate - KGB), the GKNT, a secret unit of

Academy of Sciences, and the State Committee for External Economic Relations

(GKES).47 One of the four directions (Lines) of KGB was “Line X – Directorate T”

and dealt with the acquisition of American technology.48

In the early 1970s, the Soviets negotiated favorable agreements to buy grains

from the U.S. due to their interceptions of the communications between members of

the U.S. economic and financial departments. Harry Rositzke, former CIA (Central

Intelligence Agency) analyst, asserts that in 1972 the Soviets got the deal with the

44 Corson W.R., Crowley R.T., The New KGB: Engine of Soviet Power (Brighton: The Harvester Press Ltd., 1985), p. 339-40.45Andrew Christopher and Mitrokhin Vasili, The Mitrokhin Archive: The KGB in Europe and the West (Allen Lane The Penguin Press, 1999), p. 723. Bennett M. Richard, op., cit. p. 43.46 Metcalfe Shotwell Robyn, The New Wizard War: How the Soviets Steal U.S. High Technology – And How We Give It Away, (Tempus Books of Microsoft Press, 1988), p. 109.47 Andrew Christopher, Gordievsky Oleg, KGB: The Inside Story of its Foreign Operations Lenin to Gorbachev (London: Hodder and Stoughton, 1991), p. 622.48 Metcalfe Shotwell Robyn, op. cit., p. 109. The KGB operations were organized in four directions (Lines): the first (Line PR) deals with the collection of political intelligence, the second (Line KR) with counterintelligence, the third (Line N) with the support of agents working illegally overseas and the fourth (Line X –Directorate T) with the acquisition of American technology.

12

U.S. by eavesdropping the telephone calls between the members of the U.S. trade

representatives in the U.S. Department of Agriculture.49

In 1980 the operations of Directorate T in France were disclosed by a French

agent called Vladimir Ippolitovitch Vetrov (codename Farewell) who had a high place

in Directorate T. Vetrov’s documents revealed to western intelligence services

important information about the Soviet operations concerning the theft of scientific

and technological intelligence. In July 1981 the French President Francois Mitterand

personally informed President Ronald Reagan about Farewell’s documents.50

According to Farewell, the KGB only in 1980 obtained 5456 technological samples.

In December 15, 1984, during a private meeting in the Soviet embassy in

London, Gorbachev spoke in flattering terms of the effectiveness and the successes of

FCD Directorate and the officers of Line X working overseas.51 For Gorbachev the

acquisition by using secret methods of Western technology was crucial for the

economic part of perestroika.

In 1985, a CIA report, concerning the practices used by the Soviets in order to

acquire high-tech technology, claims that the GRU and the KGB are involved in such

operations and the former has exceptional results in acquiring hardware, especially

connected with military technologies. According to the KGB estimate for 1985, its

effort resulted in the saving of an important amount of money in foreign currency.

The report of 1986 estimated the benefit to 550 million rubles approximately, while

the reports of 1988 and 1989 to 1 billion rubles. But, there was no reference to any

cost.52 Corson and Crowley estimate that the U.S.S.R. saved 12 billion dollars and

earned 5 to 7 years in R&D (Research and Development).53 The target of the Soviet

intelligence services was the American technology, including high-performance

microchips and supercomputers, and integrated circuits and mini-computers, in order

to upgrade their weaponry. 54 According to the estimations of British and American

intelligence services, during the Presidency of Gorbachev the efforts concerning the

49 Fialka J. John, War by Other Means: Economic Espionage in America (W.W. Norton & Company, Inc., 1997), p. 119.50 Andrew Christopher and Mitrokhin Vasili, op. cit., p. 619-20.51 Andrew Christopher, Gordievsky Oleg, op. cit., p. 621. Disclosed probably by Oleg Gordievsky, the double agent of Britain and U.S. who was present in that meeting.52 Garthoff L. Raymond, “The KGB Reports to Gorbachev”, Intelligence and National Security, Vol. 11, No. 2 (April 1996), p. 229. 53 Corson W.R., Crowley R.T., op.cit., p. 11. 54 Warner W.T., “International Technology Transfer and Economic Espionage”, International Journal of Intelligence and Counterintelligence, Vol. 7, No. 2 1994, p. 147.

13

theft of Western scientific secrets on behalf of the Soviet secret services were

escalated.55

The goal of the U.S.S.R. was not to acquire western technology only for

military reasons, but also in order to support their waning domestic economy.56 In the

short term and in the long term, the economic espionage operations allowed the

U.S.S.R. to take part in the arms race. However, the reality is less impressive than

statistics. Professor Andrew in estimating the effectiveness of Directorate T concludes

that: “The most plentiful S&T (Scientific and Technical intelligence) in intelligence

history has failed to prevent the growing gap between Soviet and Western technology,

particularly outside the defense field.”57

According to Andrew and Mitrokhin, the tactical victories of FCD against the

U.S. –the main enemy – impressed Gorbachev, but failed to avoid strategic defeat.58

In the long run, the economic espionage operations of U.S.S.R. failed to bridge the

gap between the Soviet Union and the West and to prevent the former from collapse.

The real economic and technological benefits of western technology, even of high

economic value in billions of dollars, were radically curtailed because of the structural

weaknesses of the Soviet economic system. The ideological blinkers of the Soviet

system combined with economic rigidity and the resistance to innovation neutralized

the benefits of economic espionage.

The end of the Cold War and the collapse of the Soviet Union did not finalize

the operations of macroeconomic espionage committed by Russia, the successor of

the U.S.S.R. New opportunities have arisen for Line X via the scientific exchanges

between East and West, as well as the business joint ventures.

SVR (Sluzhba Vneshney Razvedki Rossii / Russian Foreign Intelligence

Service), the successor of the KGB, looked for new roles in order to justify its

presence as an organization, and to maintain its status in the Russian society, and it is

sure that one such role is economic espionage. From the spring of 1992 it was clear

that the successors of KGB made a shift towards the collection and analysis of

economic intelligence instead of military intelligence.59 The head of the Chief

Intelligence Directorate of the Russian Army’s General Staff-GRU declared in 1992

55 Adams James, The New Spies: Exploring the Frontiers of Espionage (Pimlico, 1995), p. 129.56 Warner W.T., op. cit., p. 147.57 Andrew Christopher, Gordievsky Oleg, op. cit., p. 623.58 Andrew Christopher and Mitrokhin Vasili, op. cit., p. 618.59 Sherr James, “Cultures of Spying”, The National Interest, Winter, 1994/95, p. 60.

14

that economic espionage is one of the means which support military activities.60

President Yeltsin had characteristically declared that the securing of access in other

countries’ markets is a responsibility not only of the Ministry of Finance and of the

Ministry of Foreign Affairs, but also of the intelligence services (Foreign

Intelligence).61

According to Andrew and Gordievsky, the difficult economic situation of

Russia increased the need of high-tech intelligence. The most pressing need is to

instill the new technology acquired by economic espionage to the domains were the

Russian industry cannot invest in R&D.62 In his first press conference as head of the

Russian secret services, Yevgeniy Primakov noted that the intelligence services

“should provide favorable conditions for the development of the economy and of the

scientific and technological progress of the country”.63 In April 1992 Robert Gates,

the then DCI (Director of Central Intelligence), testified in a Congress Committee that

Russian intelligence services under the leadership of Primakov continue the economic

espionage operations.64 Zagorin, a writer of Times, in an article noted that in 1992 a

Belgian “journalist” was arrested and convicted because while he was authorized to

cover the launching of satellites, he was committed – as he admitted – economic

espionage on behalf of the SVR.65

The collection of scientific and technological intelligence played a vital role in

the decision of Russian government in 1993 to increase substantially its economic aid

towards Cuba. In exchange the Russians maintained their SIGINT center in Lourdes,

which has been upgraded in 1990.66 In February of 1996, Boris Yeltsin during a

conference with the members of his security council in Kremlin, he order the Russian

intelligence services to focus their attention to the “technological re-armament”, by

collecting new ideas from the West and implement them in Russia. He remarked

60 Ibid, p. 61.61 Ibid.62 Warner W.T., op. cit., p. 148.63 Richelson T. Jeffrey, A Century of Spies: Intelligence in the Twentieth Century, Oxford University Press, 1995), p. 428. 64 Ibid. 65 Warner W.T., op.cit., p. 148. See also: Zagorin Adam, “Still Spying After All These Years”, Time, 29 June 1992, pp. 58-9. 66 Ibid.

15

characteristically: “It is better to have a pioneer technology, than a pioneer

ideology”.67

At the same year with the nomination of Primakov as Foreign Minister and

Vyacheslav Trubnikov as head of SVR, Yeltsin signed a new law concerning the

status and the functions of the Russin intelligence service, which has been voted by

Duma in December 1995. The deputy director of SVR described its goals as far as

economic intelligence is concerned as the following: the estimation of foreign

influence in Russian economy, the facilitation of integration in the interior of the

former Soviet Union, the confrontation of foreign threats against the economic

security of Russia, the provision of aid in Russian government in order to attract new

foreign investments and the impediment of the money-laundering of foreign and

domestic criminal organizations.68 In June 1996, in a report in Moscow State

Institution of International Relations, Primakov described Russian foreign policy and

implied that SVR should give greater emphasis to economic espionage in order to

heal Russian economy.69

For the Russian government, the success in the international market of weapon

systems is crucial in order to solve its economic problems. U.S. and Western

technology is a key asset for the Russian defense industry in order to compete

successfully in the international economic arena.

5.2 The Policy of Japan

Japan has the most integrated and complex intelligence system in comparison

to other U.S. allies. In the last four decades Japanese governments facilitated the

creation of a decentralized national framework for collecting economic intelligence.

Japan is the only country whose intelligence services were established with main goal

the fulfilment of high levels of prosperity and the improvement of the standards of

living of its citizens.70 Taking into consideration the traditional tend of Japanese to

67 Pringle W. Robert, “The Heritage and Future of Russian Intelligence”, International Journal of Intelligence and Counterintelligence, Vol. 11, No. 2, Summer 1998. 68 Albini L. Joseph, Julie Anderson, “Whatever Happened to the KGB?”, International Journal of Intelligence and Counterintelligence, Vol. 11, No. 1, Spring 1998, p. 46.69 Ibid, p. 44-6.70 Deacon Richard, Kempei Tai: A History of the Japanese Secret Service (Beaufort Books Inc., 1983), p. 254.

16

seek and collect useful intelligence from abroad, improve them, and implement them

in their domestic society, we reach the conclusion that this is not a new policy, but the

establishment of the Japanese secret services according to its tradition.71 The

difference between the Japanese secret services and the services of other countries is

that the espionage operations of Japan are based less on the formal secret services and

more on a broad net of institutions of the Japanese society.72

From the late 1950s the Japanese government established 2 main organizations

with the duty to collect and analyze economic intelligence. Firstly, the Scientific

Information Centre – SIC) with the goal the dissemination of technological

intelligence obtained from the West to the Japanese private sector. Secondly, the

Ministry of International Trade and Industry which is the backbone of the economic

intelligence net of Japan. MITI charged the Japanese External Trade Organization

(JETRO) with the collection of economic intelligence.73 The fact that Japan has

established in 1962 a special educational centre for economic espionage under the

“innocent” title “Institute for Industrial Protection”– attended even by businessmen –,

proves the importance that it gives to economic espionage.74 From the early 1960s the

majority of Japanese businesses had created their own intelligence units. A great part

of the Japanese network consists of well-known multinationals like Mitsubishi,

Hitachi and Matsushita which have at their disposal important resources and

equipment. Also, a small part of the office of the Japanese Prime Minister is involved

in the supervising of the net’s operations.75 Another important organization is the

Japanese SIGINT (Signal Intelligence) organization called “Chobetsu”, the equivalent

of the American NSA (National Security Agency). The Japanese network of

economic intelligence is supplemented by some think-tanks like Nomura Institute and

Mitsubishi Research Institute.76

The consultant and ex-CIA official John F. Quinn has characterized the efforts

of the Japanese government in collecting economic intelligence as “of great scale,

71 Deacon Richard, op. cit, p. 254. See also Kennedy Paul, op. cit., p. 416-7. .72 Schweizer Peter, Friendly Spies: How America’s Allies Are Using Economic Espionage To Steal Our Secrets, (New York: Atlantic Monthly Press, 1993), p. 73.73 Herring J.P., “The Government Role in Japanese Competitive Intelligence”, Competitive Intelligence Review, Vol. 3 (1989), p. 14-5.74 Schweizer Peter, op. cit., p. 18.75 Ibid.76 Deacon Richard, op. cit., p. 260-1.

17

intensive and continuous”.77 The macroeconomic espionage operations of Japan

include the use of Japanese students of American universities in order to collect

information concerning the scientific and technological research taking place in those

institutions. Professor Johnson of University of California, Berkley, declared that the

Japanese students of the University told him that officials of the Japanese consulate in

San Francisco asked them to deliver them reports concerning research in

biotechnology, since this University is one of the pioneers in this domain. In fall of

1990 a researcher of the Massachusetts Institute of Technology (MIT) claimed that

some Japanese students received orders from Tokyo to infiltrate to research teams of

the university’s laboratories.78 Also Japanese multinationals succeeded in obtaining

access to CIA’s top secret documents and even acquired top secret technological

intelligence concerning the Strategic Defense Initiative (SDI).79

In the late 1980s, Japan had at its disposal a high-level source in the U.S. State

Department which supplied Tokyo with detailed intelligence concerning the U.S.

negotiating positions, even before the rest of the U.S. agencies.80

5.3 The Policy of France

One of the main players of macroeconomic espionage in the world espionage

chess table is France which has at its disposal a well-organized intelligence service,

characterized by experts as “one of the most aggressive collectors of economic

intelligence in the world”.81

In 1964 during the Kennedy Round of GATT’s negotiations in Cannes, a

French countess recruited by the French intelligence services infiltrated in the suite of

the American Under-Secretary of State, George Ball and stole documents which

included the last orders from Washington. According to Colonel Le Roy who was

participated in the operation, the whole idea belonged to the French Prime Minister

Valery Giscard d’ Estaing.82

77 Evans J.C., “U.S. Business Competitiveness and the Intelligence Community”, International Journal of Intelligence and Counterintelligence, Vol. 7, No. 3 (1995), p. 355. 78 Schweizer Peter, op. cit., p. 92.79 Ibid, p. 19.80 Porteous Samuel, (1998), op. cit., p. 109.81 Schweizer Peter, “The Growth of Economic Espionage: America Is Target Number One”, Foreign Affairs, Vol. 75, No.1 (Jan. / Feb. 1996), p. 11.

18

In 1969, during the fist formal visit of U.S. President Richard Nixon in Paris,

agents of the French secret services managed to put a microphone in the lining of his

aid’s (H.R.Haldeman) jacket. As a result of this operation the French secret services

eavesdropped the content of the private conversations of White House officials

concerning issues of great importance for the French government.83 Count de

Marenches, the head of the French secret services during the Presidency of Pompidou,

disclosed in his memoirs in 1992 that in 1971 French agents intercepted, in time,

valuable information concerning the day as well as the level of the planned

devaluation of dollar by Nixon. De Marenches passed this information to President

Pompidou who as a former banker and as a politician, understood the laws of secrecy,

handled the issue with the Bank of France in a need-to-know basis. As a result, France

obtained important profits from its speculation on the U.S. dollar.84

In 1982 U.S. President Reagan made a formal visit to Paris in order to discuss

the bilateral relations of the two countries with President Francois Mitterand. The

American delegation had rented two floors in a luxury hotel in Paris and every day

U.S. secret service were checking minutely the suites in order to guarantee that there

were no surveillance devices. But they did not discover something out of the ordinary.

Unfortunately for them and the U.S. delegation, they were wrong, because agents of

the DST were intercepting the conversations of the members of the delegation by

using a laser placed in the street outside the hotel, which recorded the vibrations made

by the conversations, while a computer were “translating” them in words.85

In the same year, the Indian government was negotiating with the U.S.A., the

Soviet Union and France the purchase of a new fighter and had decided to spend $2

billion for that. In the middle of 1981 the head of the station of French secret services

in New Delhi recruited a political employee of the Indian Prime Minister’s office in

order to obtain intelligence concerning the political situation inside the Indian

government. When the negotiations for the purchase were reaching the end, DGSE

ordered the French military attaché in New Delhi to use the above mentioned source

82 Schweizer Peter, op. cit., p. 96-7. After photocopying the documents in the hotel director’s office, the countess returned them back to their place and left undetected. Also, before the intrusion, officers of the French secret services lubricated the door of the Under-Secretary’s room.83 Ibid, p. 97-8.84 Chattergee Pratap, “Spying for Uncle $am: Economic Intelligence”, Covert Action Quarterly, Winter 1996, http://www.mediafilter.org/caq55EconIntel.html, Count de Marenches, Andelman A. David, The Fourth World War: Diplomacy and Espionage in the Age of Terrorism (William Morrow and Company, Inc, 1992), p. 114-115.85 Schweizer, (1993), op. cit., p. 98.

19

in order to find out the American offer. For one more time the source was credible

and France earned the contract with the Indian government.86

In the mid 1990s a shift was made in the French policy concerning economic

espionage. The French Prime Minister Edouard Balladur, influenced by a new school

of though, reached the conclusion that it was impossible for France to win the

economic war which was under way, via economic espionage and decided to establish

the Japanese way which gives emphasis in open sources.87

5.4 The Policy of the U.S.A.

The U.S. Intelligence Community –which owes its establishment as a

bureaucratic mechanism to the surprise attack of Pearl Harbor in 1941– continued the

tradition of collecting and analyzing macroeconomic intelligence during the first years

of the Cold War.

The analysis of the economic conditions of labor unions in Italy, France and

other Western countries –during the Cold War era, but especially during the first

years– was one of the highest priorities of the U.S. government. Moreover, U.S.

intelligence services focused their attention to the analysis of economic trends of

U.S.S.R. and especially the closed surveillance of its armament program.88

In two priority lists concerning intelligence collection published by the CIA in

1975 and 1986 respectively, the presence of macroeconomic targets was evident. It

included the following: the surveillance of the OPEC (Organization of Petroleum

Exporting Countries) strategies concerning their price policy, the size of the annual

crop of the Soviet Union, the quality of its computers, the financing of the developing

countries’ debt, the lack of energy in the international level, the food supplying all

over the world and the scientific and technological progress.89 It is alleged that in the

early 1980s U.S. intelligence services put “bagged software” in the computers of the

World Bank and other international financial institutions in order to provide to

86 Ibid, p. 111-2. Pierre Marion commented about this successful operation, the following: “We had an informer inside the Indian chancellery which was making the decision. And we were able to get some intelligence about the proposals by the competitors”. 87 Fialka J. John, op. cit., p. 97-8.88 Johnson K. Loch, (1996), op. cit., p. 163. 89 Zelikow Philip, Ibid, p. 168.

20

American policymakers an early warning as far as the crisis of Latin America banks is

concerned.90

One of the great criticisms for the U.S. intelligence Community in general and

the CIA in particular came from their failure to predict the collapse of the former

Soviet Union. The leader of those attacks towards the U.S. Intelligence Community

was Senator Daniel Patrick Moynihan who even asked the abolishment of the

CIA.The then DCI Robert Gates, in order to defend the agency ordered to declassify a

series of documents proving that the agency reported with full details the collapse of

the Soviet economy during the 1980s, without foreseeing its ultimate collapse. Gates’

argument was that no government agency anticipated such a sudden collapse of

communism in U.S.S.R. Another high-rank U.S. intelligence officer declared that for

the CIA the forecast of the fall of the Soviet Union was not such an important

mission, its key mission was the knowledge of its military capabilities and intentions,

and it was met with success.91

In the post-Cold War period U.S. officials with a critical role in the planning

of the U.S. foreign and intelligence policy noted the importance of economic

intelligence and macroeconomic espionage in particular. Joseph S. Nye, head of the

National Intelligence Council (NIC) in 1993-4 claimed that the role of intelligence

services in NAFTA (North American Free Trade Agreement) is to facilitate the

policymakers which are going to reach a decision to think further than their

competitors.92

In January 26 1995 the French Minister of Finance, Charles Pasqua, invited

the U.S. Ambassador Pamela Harriman in his office and informed her that some

officials of her embassy are engaged in macroeconomic espionage and should quit the

country.93

In February 1995, the French publicly accused the American intelligence

services that they tried to bribe French government officials in order to obtain detailed

90 Porteous S., (1998), op. cit., p. 110.91 Laqueur Walter, op. cit., viii-xix. See also “At Cold War’s End: U.S. Intelligence on the Soviet Union and Eastern Europe, 1989-1991”, History Staff, Center for the Study of Intelligence, Central Intelligence Agency, 1999, http://www.odci.gov/csi/books/19335/art-1.html 92 Johnson K. Loch, op. cit., p. 157.93 When the meeting leaked to the French press, U.S. officials protested that Pasqua used the scandal in order to bolster up the campaign for the Presidential elections of Edouard Balladur. Although both governments acted quickly in order to close the issue, for a period of time there was tension in their relationship. Kober Stanley, (1992).

21

intelligence about its negotiating positions in GATT negotiations about audio-visual

portion.94

In October 15 1995, according to New York Times the U.S. intelligence

agencies helped their government officials in their negotiations with Japan concerning

the import of cars by eavesdropping on Japan’s officials conversations. The U.S. trade

representative Mickey Kantor and its staff benefited from the daily briefing from the

CIA which contained intelligence collected by CIA station in Tokyo as well as NSA.

The agreement was a clear victory for the U.S.95

6. Microeconomic Espionage6.1 The Policy of the former Soviet Union – Russia

During the Cold War the intelligence services of the former Soviet Union were

conducting microeconomic espionage since the New Economic Policy of the

early1920s.96 Cheka, the predecessor of the KGB participated in the collection and

analysis of economic intelligence in 1920.97 The former Soviet Union fulfilled its goal

of collecting microeconomic espionage both via its own secret agencies and via its

satellites’ secret services (e.g. Bulgaria, Romania, Czechoslovakia, East Germany). It

has been estimated that during the 1980s at least 1,000 of the 2,800 diplomats for the

Eastern Bloc were actually intelligence agents with official cover, and the majority of

them were dealing with science and technology.98 In late 1991, the then Bulgarian

Defense Minister Dimitar Loudjev, a history professor, discovered a large net of

Bulgarian companies doing businesses abroad, established by the KGB in the late

1980s with the aim to steal Western technology.99

From 1986 to 1989 an incident of microeconomic espionage by using

computer technology took place. The former KGB used a group of contract hackers in 94 Porteous S., (1998), op. cit., p. 110.95 Fialka J. John, op. cit., p. 113. When Ichiro Fujisaki, the political director of the Japanese Embassy in Washington read the article, he contacted U.S. high-level officials of the State Department and warned them that if the article is true it would be a blow to mutual friendship and trust between U.S.A. and Japan. U.S. trade representatives declared that Japanese commit macroeconomic espionage against U.S. trade delegations at least for the last 15 years and claim that the Japanese reaction to this incident is simple hypocrisy. Clyde V. Prestowitz, Jr. former trade negotiator characterized the whole issue as a theatre called diplomacy and said that Fujisaki was not shocked but he simply lied. Ibid. 96 Smith Michael, The Spying Game: The Secret History of British Espionage, (Politico’s Publishing, 2004), p. 426. 97 Ibid. 98 Fialka J. John, op. cit., p. 70. 99 Ibid, p. 86.

22

order to gain access to many computer systems and networks from terminals outside

the U.S.A. The hackers based in West Germany, while their KGB case officer in East

Berlin. Their objective was to get penetrate sensitive computer systems and networks

worldwide. In exchange for the information they obtained from U.S. military, from

scientific R&D organizations, as well as from universities, the hackers got from their

KGB handler’s cash and drugs. The hackers after penetrating the computer system of

the Lawrence Berkley Laboratory, used it as their base in order to get access to the

Advanced Research Projects Agency Network/Military Network, which gave them

the opportunity to penetrate 450 other computers.100

Even the famous Russian Academy of Sciences was engaged in this game.

Alexei Brudno, mathematician and computer software specialist, characterized the

system very effective. Usually, only scientists who accepted to participate in

microeconomic espionage missions were granted permission to travel abroad to

participate in international conferences and to do research in foreign, especially U.S.

universities.101 In 1983 the Americans were aware of the problem and when a

delegation of Soviet scientists visited Grummar aircraft plant on Long Island that

year, cameras and every other mean used to keep records were forbidden. In spite of

these precautionary measures the Soviet scientists fulfilled their mission. By putting

adhesive tape on their shoes they managed to steal pieces of metal alloys, used for

manufacturing U.S. fighter planes.102

The most important Russian collection agency, as far as microeconomic

espionage is concerned, was KGB’s “Line X”. The “shopping list” of Line X included

equipment from General Electric, Boeing, Lockheed, Rockwell International, and

McDonell Douglas.103 Vetrov, a Russian double-agent working for the Western

intelligence services described eloquently how the KGB was conducting

microeconomic espionage against the West, especially how its officers were bribing

sources in U.S. corporations, collected information concerning weapons secrets from

100 Fraumann Edwin, “Economic Espionage: Security Missions Redefined”, Public Administration Review, Vol. 57, No. 4, July/August 1997, p. 306, Madsen Wayne, “Intelligence Agency Threats to Computer Security”, International Journal of Intelligence and Counterintelligence, Vol. 6, Winter 1993, p. 413-445.101 Ibid, p. 68.102 Ibid. 103 Fialka J. John, op. cit., p. 70. For the structure of economic espionage operations of the former Soviet Union see also: Metcalfe Shotwell Robyn, The New Wizard War: How the Soviets Steal U.S. High Technology – And How We Give It Away (Tempus Books of Microsoft Press, 1988), Andrew Christopher, Gordievsky Oleg, KGB: The Inside Story of its Foreign Operations Lenin to Gorbachev (London: Hodder and Stoughton, 1991),

23

open files in agencies like NASA, and developed contacts in the most famous U.S.

universities like MIT (Massachusetts Institute of Technology) and Princeton.104

In February 1996, Boris Yeltsin during a meeting of his security council in the

Kremlin gave specific instructions to his secret services to focus on “technological

rearmament” by collecting new ideas from the West and apply them quicker in

Russia. According to Yeltsin “It’s better to have a leading technology than a leading

ideology”.105

Yevgeny Primakov in his first interview concerning the post-Cold War

challenges for Russian intelligence services as the head of the SVR – successor of the

famous KGB – expressed the view that SVR should not disseminate economic

intelligence to businesses, but should disseminate them only to the Russian

government. He states characteristically: “I am categorically against allowing

intelligence to work for, say, the Raw Materials Commodity Exchange or any other

private concern. We are a budget organization, budgeted from public money and

therefore we must only work for the government.”106

However, the situation in Russia is more complicated than Mr. Primakov

describes. It is more plausible that Russia will adopt a semi-corporatist view than the

American model of laissez-faire. The transformation from communism to capitalism

means that the successors of the famous KGB will place greater emphasis on

economic/financial/business issues. According to Professor Sherr James of Oxford

University, the officials of the Russian intelligence services do not make a distinction

between governmental policy and private interests. The newly established “Federal

Agency for Government Communications and Information” testifies this trend. This

new organization incorporates the communications capabilities of the old KGB and

constitutes both a top secret organization as well as a corporation which has the right

to conclude contracts with foreign investors, to invest in foreign corporations and

establish businesses abroad.107 The view of an official of the Russian intelligence

services is characteristic: “Both corporations and intelligence services are doing well.

Those two professions are always side-by-side. Today they are coming much closer.

104Fialka J. John, op. cit., p. 68, 70. See also Andrew Christopher, (1991), op. cit., p. 619-20. 105 Fialka J. John, op. cit., p. 86. 106 Adams James, op. cit., p. 73. 107 Sherr James, op. cit., p. 62.

24

The expected benefits from economic espionage are biggest than those expected from

scientific research institutes”.108

In March 1999, Sunday Times revealed that according to an ex-agent of MI6,

SVR succeeded in infiltrating into important economic centers of London. MI6

uncovered at least one agent of SVR who worked in London market, while another

Russian agent arrested by the British agency revealed that in 1995 SVR had placed

one of its agents in the offices of Barclays Bank in Moscow. The targets of SVR

included Bakn of England, the European Bank for Reconstruction and Development

(EBRD) and other institutions based in London. 109

Winn Schwartau after describing the economic situation in Russia in the post-

Cold War era (withering economy, lack of a distribution system, no stable political

structure) and referring to “a couple of hundred thousand former spies, asks the

question: “What is their best chance for moving into the world economy?”.110 From

the viewpoint of William Sessions, former director of the FBI, the situation in Russia

is described like this: “Russians do not have the currency to pay for advanced systems

and designs, so they will steal them or obtain them through other illegitimate

means”.111

6.2 The Policy of Japan

The case of Japan, as far as microeconomic espionage is concerned, is very

special. Japan’s constitutional limitations concerning its defense budget and the size

of its military forces, as well as the defense and intelligence umbrella provided by the

U.S.A., decrease the need for orthodox forms of intelligence gathering.112 Although

Japan has regional interest in political and military issues, she has broader, worldwide

interests in economics and technology.113

In Japan, the collection and analysis of microeconomic intelligence for the

benefit of private corporations (usually multinational corporations based in Japan)

108 Waller J.M., Soviet Empire: The KGB in Russia Today (Oxford: Westview Press, 1994), p. 145-46. 109 Waller J. Michael, “Iraq’s Russian Arms Buyer Headed Germ Warfare Program: Russian Spies Unmasked in London Financial System”, Russia Reform Monitor, No. 597, American Foreign Policy Council, Washington D.C., March 3, 1999, http://www.afpc.org/rrm/rrm597.htm110 Schwartau, Winn, op. cit., p. 272.111 Schwartau, Winn, op. cit., p. 272. 112 Schweizer Peter, (1993), op. cit., p. 73.113 Ibid.

25

consists a sine qua non for their success in the international economic, financial and

technological arena. Peter Schweizer characterizes the Japanese intelligence system as

“perhaps the most comprehensive and complex of the friendly spy networks being

used against the United States”.114 Japan lacks a secret service with the form and the

mandate of its western counterparts. Actually, its secret service is small, like its

military intelligence bureaucracy.115 According to John J. Fialka, although Japan does

not have at its disposal a formal intelligence service, she succeeds in collecting

economic, and especially, microeconomic intelligence, to the point that she

“collectively resembles one”.116 In spite of this fact, Japan not only takes part in the

world microeconomic espionage game, but also excels in it. Fialka characterizes the

result of Japanese economic espionage spy network as “exceptionally efficient” and

states that the United States has not fully understood its function.117 He states that the

Japanese are committing a “strategic ‘beggar my neighbor’ assault” targeting high-

tech U.S. industries. Furthermore, he concludes that the U.S.A. is loosing in a game of

economic jiu-jitsu in which Japan not only hinders U.S. access to its markets, but also

steals the latter’s economic and high-tech crown jewels, by exploiting U.S.’s more

important vulnerability: the openness of its society. The importance of economic

espionage committed by Japan is illustrated by the same author: “While the fabled

and fictitious “missile gap” was used politically to galvanize U.S. concerns in the

sixties about the Soviet Union, the patently real “intelligence gap” posed by the

Japanese has caused no outcry”.118

In Japan there is almost totally unanimity, as far as the conduct of

microeconomic espionage is concerned. This is realized by the effective collaboration

of the Japanese government with the Japanese private sector. Actually, the Japanese

multinationals play the role of intelligence services, as far as microeconomic

espionage is concerned.

From the part of the Japanese state, both the Japanese Ministry of International

Trade and Industry (MITI) and the quasi-official Japanese External Trade

114 Ibid, p. 18.115 Ibid.116 Fialka J. John, op. cit., p. 5. 117 Ibid.118 Ibid, p. 11.

26

Organization (JETRO) – characterized as an “elite bureaucracy”119 – have undertaken

the organization and coordination of microeconomic espionage.120

In October 1962 the Japanese collection efforts were radically improved by

the establishment of the Institute for Industrial Protection, financed by MITI. Its

purpose was to train industrial spies for Japanese corporations. It was actually a spy

school established and financed by the Japanese state.121

Apart from MITI and JETRO, the Japanese government has at its disposal a

small intelligence organization named “Naicho”, which is under the control of the

Japanese prime minister and its duty is not only to provide Japan’s policymakers with

“detailed knowledge of foreign intelligence on international affairs”, but also to

acquire technological intelligence concerning the U.S.A. Actually, Naicho plays the

role of a clearinghouse for Japanese political and economic intelligence operations

against the U.S.A.122 Another government military organization engaged in

microeconomic espionage is the Japanese Defense Agency. The Annex Chamber,

Second Section, of the Investigation Division of the Ground Self-defense Forces

(Chobestu), is in charge for the coordination of electronic eavesdropping on both

foreign and domestic targets. Chobetsu eavesdroppes on U.S. companies’

communications inside and outside Japan, and its operations are so secretive that even

members of the Japanese Diet are forbidden to enter its headquarters.123 Electronic

stations on Rebun Island and in the Ryukus at Kikaiga-shima Island, as well as

facilities at Higashi Chitose, on the Island of Hokkaido are used for high-tech

microeconomic espionage.124 The FBI has repeatedly warned U.S. businessmen

traveling to Tokyo that they should take for granted that they are spied on. Noel

Matchett, a former senior official of the NSA and a specialist in corporate

communications, advises corporate executives that “it’s more likely to be happening

there more frequently than you might think.”125 Another government mechanism

taking part in microeconomic espionage operations is the Nippon Telephone

Company which has an agreement with the Japanese Defense Agency to eavesdrop on

119 Fialka J. John, op. cit., p. 44. 120 Schwartau, Winn, op. cit., p. 275, Deacon Richard, Kempei Tai: A History of the Japanese Secret Service, (Beaufort Books, Inc, 1983), p. 258.121 Schweizer Peter, (1993), op. cit. p. 75. 122 Ibid. 123 Ibid. 124 Ibid, p. 84.125 Ibid.

27

telephone conversations.126 According to John Quinn, a former CIA official, “I know

that Nippon Telephone and Telegraph, Japan’s major telephone corporation over here,

cooperates with the Japanese government, and their technical capability is very

advanced, so they can very easily tap into a phone line. They do not enter the

buildings to do so: they can do it from several blocks away; they can do it from a

switching station. So tapping a phone is not difficult.”127

Last but not least, the Public Security Investigation Agency (PSIA) has

conducted bag operations against U.S. corporate executives traveling in Japan.

Although this counterintelligence agency is responsible for dealing with subversive

groups and neutralizing the actions of hostile intelligence services, its mandate was

extended to include microeconomic espionage operations.

Those government mechanisms supplement the well-developed and well-

organized intelligence network of Japanese corporations. This network is so effective

that can be compared with intelligence services of medium range states.128 John

Quinn, an ex-CIA official, thinks that Japanese multinationals are “vigorous”

collectors of microeconomic intelligence and expresses the view that “Japan does

have a very widespread commercial intelligence network”. Pierre Marion agrees with

him: “All the corporations of Japan are very strongly organized in that direction.

There are members of Japanese corporations who travel abroad, and they have

responsibility for gathering intelligence, by any means”. More concretely, in Japan the

business sphere is controlled by few large corporations named “keiretsu” which in

close cooperation with MITI run the Japanese industrial sector.129

Peter Schweizer distinguishes the importance of the Japanese multinationals as

far as economic espionage is concerned and believes that they compose the most

important part of the Japanese intelligence system. He even states that these

corporations “are the most extensive and comprehensive intelligence and espionage

organizations in Japan”. Dr. Angel, a Professor at the University of South Carolina

and a specialist in Japan, thinks that these companies “spend a lot of money on

spying”. As far as their targets he states that “They do it to each other, but the

Japanese assume that foreigners are more vulnerable to spying; therefore, the vast

majority of their efforts are directed at their chief competitor, the United States”.

126 Schwartau, Winn, op. cit., p. 41, 275.127 Schweizer Peter, (1993), op. cit., p. 84.128 Schweizer Peter, (1996), op. cit., p.11.129 Schwartau, Winn, op. cit., p. 41, 275.

28

According to John Fialka, “Japanese corporations sometimes function as one large

national spy agency”.130

Among the methods used by the Japanese were the following: creating dummy

corporations, making special “consulting arrangements” with employees of U.S.

computer firms, plating moles in U.S. corporations – especially those based in Silicon

Valley –, bribing in order to obtain high-value blueprints and plans, recruiting

Japanese students in the U.S.A. to collect scientific and technological intelligence, as

well as using special eavesdropping equipment.131

According to a CIA classified report of 1987, among the priorities of Japanese

intelligence were: a) intelligence concerning access to foreign sources of raw

materials (mainly, oil and food), b) intelligence regarding technological and scientific

developments in the U.S.A. and Western Europe, and c) intelligence related to

political decision-making in the U.S.A. and Western Europe, as well as intelligence

about trade, monetary, and military policy in Asia and the Pacific.132 An important

conclusion of this report was that the Japanese government spent 80% of its

intelligence assets towards the acquisition of technological secrets of the U.S.A. and

Western Europe.133

In the 1990s, some U.S. officials expressed the view that the Japanese policies

and corporate moves as far as international telecommunications are concerned,

facilitates tremendously the conduct of economic espionage. Robert G. Harris,

President of EconomIncorporated, in the early 1980s warned the U.S. business

community that for Japan the key strategic industry for the future was

telecommunications. George Keyworth II, the former science adviser to President

Reagan, expressed the same concerns.134 The National Security Agency in May 1990

shared their worry. The U.S. SIGINT organization reached the conclusion that if two

or more U.S. companies communicate via a Japanese-developed or Japanese-owned

telecommunications network, this system can be monitored by the manufacturer and

the perpetrators not be detected by the victims.135 According to Peter Schweizer, the

ability of the Japanese to intrude into the business, economic, and industrial “crown

jewels” of their competitors and steal them is a “marvel to intelligence chiefs around

130 Schweizer Peter, (1993), op. cit., p. 87, Fialka J. John, op. cit., p. 44. 131 Ibid, p. 18-9,79132 Schweizer Peter, (1993), op. cit., p.71. 133 Ibid. 134 Schweizer Peter, (1993), op. cit., p.93-4.135 Ibid, p. 94.

29

the world”. He believes that this is a critical factor for Japan’s future and that it is a

very promising field which undoubtedly will become more effectively and

widespread. Some U.S. observers of the Japanese intelligence policy are very

skeptical and they see Japan as the future major espionage threat for the U.S.A.136

One of those experts, Clyde V. Prestowitz, Jr., a former Commerce

Department lawyer and one of the few U.S. trade specialists fluent in Japanese, wrote

a book entitled “Trading Places: How We Are Giving Our Future to Japan and How

to Reclaim It”. He concludes that in Japan “Business is frequently portrayed in terms

of war with foreigners”.137 Actually, he repeats an old Japanese motto which describes

the Japanese attitude towards economics, according to which “Business is War”.138

In 1994, the Japanese Embassy in Washington asked Robert D. Deutsch, an

American clinical psychologist to conduct a survey concerning the perception of U.S.

citizens as far as Japan is concerned. His findings are very interesting and are

included in the following paragraph: “People start out by saying the Japanese are only

concerned with business. They [the Japanese] are always concerned about the future.

They’re capable of anything. They always have a hidden agenda. We’d better watch

out. That’s the mindset that colors everything”.139 According to Edith Cresson, “Japan

is an adversary that doesn’t play by the rules and has an absolute desire to conquer the

world. You have to be naïve or blind not to recognize that”.140

6.3 The Policy of France

Undoubtedly France deserves the first-place award in the field of microeconomic

espionage. The performance of its secret services is really exceptional.

Count de Marenches, the Director of the French secret services from 1970 to

1980, on his memoirs declared that “Economic espionage has become a key element

of our war-fighting capability”, and that “Spying in the proper sense is becoming

increasingly focused on business and the economy, science, and industry”. Moreover,

he admitted that a special department, the “Economic Intelligence Service”, dealt not

only with financial and economic intelligence but also with microeconomic espionage

136 Ibid, p. 95. 137 Fialka J. John, op. cit., p. 60-1. 138 Schwartau, Winn, op. cit., p. 41. 139 Fialka J. John, op. cit., p. 61. 140 Quoted in Schwartau, Winn, op. cit., p. 42.

30

(De Marenche uses the term “industrial espionage” instead of the correct term

microeconomic espionage).141

His colleague, Pierre Marion – an Air France executive and longtime honorary

correspondent142 – very honestly admitted to Peter Schweizer that “In economics, we

are competitors, not allies. America has the most technical information of relevance.

It is easily accessible. So naturally your country will receive the most attention from

the intelligence services.”143

Another head of the DGSE, Claude Silberzahn, described in detail the

philosophical-cultural difference between France and the U.S.A. as far as

microeconomic espionage is concerned: “A major difference between the Americans

and the French was (and may still be) that if the Americans had done as the French

were doing, they would have betrayed their belief in a separation between public and

private sectors. They would have been tinkering with their view of a market economy.

This is the difference between purely liberal American society and the mixture of

economic means to an end at work in France.”144

Its performance in the 1970s and 1980s was so successful that it provoked

diplomatic tension between Paris and Washington. French agents succeeded in

infiltrating in U.S. subsidiaries in France, as engineers. Their target was two computer

companies – IBM, Texas Instrument – and one glass-making company called Corning

Glass. Corporations which dealt with aeronautics were also victims of the French

secret agencies. Among them are the famous Boeing and the Bell Helicopter Textron

which was working upon the creation of a hybrid plane-helicopter codenamed V-22.

Moreover, the French infiltrated Northrop which became famous because of the

research and development of “stealth” technology, used in its fighter planes like F-

117, B-2. The French spies – coined “moles” in the intelligence literature – got higher

in the hierarchy of those U.S. companies and as a result had access to classified

information. The company which benefited the most was an electronic company

called Bull.

In another episode in 1985, the French government obtained by using its secret

assets the detailed offer of a U.S. company concerning the procurement of French

141 Count de Marenches, Andelman A. David, op. cit., p. 114-15. Schweizer Peter, (1996), op. cit., p. 11. See also: Smith Michael, op. cit., p. 422.142 Fialka J. John, op. cit., p. 91. 143 Schweizer Peter, (1996), op. cit., p.11. 144 Guisnel Jean, CYBERWARS: Espionage on the Internet (New York: Plenum Press, 1997), p. 219.

31

Mirage fighter planes on behalf of the Indian government. The French government

provided a French company with that information and the latter gain the contract.145

Pierre Marion was really proud that during his tenure as head of the French secret

services, France earned this contract of $2 billion.146

In 1988, the French SIGINT intelligence service intercepted valuable

intelligence regarding the new generation Boeing’s plane 747-400. The method they

used was very simple. With intercepting communications devices they collected the

test flight data. The whole operation was facilitated by the fact that the data, which

were transmitted by radio, were not encrypted. The necessary equipment for the

operation was only a portable dish, a receiver and two computers.147

In the early hours of 18 February 1991 a curious incident took place in a

suburb of Houston, Texas. Before we describe the whole incident, we have to note

that during this period U.S.A. and France, two closed allies within NATO, were

preparing for the ground offensive against Saddam Hussein’s Iraq in the Persian Gulf.

The incident happened outside of the mansion of a senior official of “Texas

Instruments” – a large U.S. defense contractor – noticed the movement of two well-

tailored men putting plastic bags of garbage into their van. The van sped away but an

off-duty policeman noticed the number in its license plates. The van belonged to

Bernard Guillet, then the French consul general in Houston. When Mr. Guillet was

confronted by the FBI, his first reaction was: “Spy on people’s garbage? That’s

ridiculous”.148 Then he found very easily an excuse. He and his assistant were

searching for grass clippings in order to cover a hole dug for a swimming pool at his

house. Coincidentally, the French word for swimming pool is “La Piscine”, which is

also the nickname of the Direction General de la Securite Exterieure (DGSE).149

In 1992 American businessmen were warned by U.S. intelligence agencies not

to fly with Air France after the revelation that the French secret agencies bugged the

first-class seats and that French agents were disguised as clients or stewards.150 There

are also proofs that the French are copying documents of foreign businessmen,

145 Porteous D. Samuel, “Economic Espionage: Issues Arising from Increased Government Involvement with the Private Sector”, Intelligence and National Security, Vol. 9, no. 4 (October 1994), p. 740. See also: Smith Michael, op. cit., p. 423.146 Schweizer Peter, op. cit., (1996), p. 12. 147 Schwartau, Winn, op. cit, p. 276.148 Smith Michael, op. cit., p. 424. 149 Fialka J. John, op. cit., p. 87, Smith Michael, op. cit., p. 424. 150 Porteous D. Samuel, (1998), op. cit., p. 92, Fialka J. John, op. cit., p. 92-3, Smith Michael, op. cit., p. 423, Nasheri Hedieh, op. cit., p. 17, Schwartau, Winn, op. cit., p. 277.

32

eavesdrop their conversations and do their best in order to obtain sensitive, high-

quality information concerning international deals and contracts.151

In early 1990s agents of DGSE eavesdropped the telemetry of a test flight of

Boeing 747-400 in order to pass the information to European Airbus.152

In April 1993, the board of Hughes Aircraft, a U.S. company, decided not to

participate in the Bourget Air Show in France after the CIA warnings that the

company was victim of the French secret services. The President of the corporation

was informed that the name of his company was included in a list of 49 U.S.

companies-targets of the French secret services.153 The then German Chancellor

Helmut Kohl when he was asked by reporters about this incident he declared

“philosophically that what surprised him was not that some countries did engage in

such intelligence, but that some others supposedly did not”.154

During the same period, the CIA got a 21-pages list of the French secret

services, entitled “Defense Confidentiale” containing detailed information concerning

the government’s needs for the years 1989-1991. Included in the list were 49

corporations and 24 economic organizations, as well as the details and technical

characteristics of the European Fighter Aircraft, a competitor of the French fighter

Rafale.155 CIA analysts concluded that this document was published by the French

Ministry of Trade, Science and, Technology which often functions as a collection

department for DGSE.

In 1995, the French government established a new institution coined “the

Committee of Economic Competitiveness and Security, with the duty to “research,

analyze, process and distribute information in order to help industrialists and to carry

out prospective and strategic research for the government”.156

6.4 The Policy of the U.S.A.

In the post-Cold War era, a great debate is taking place concerning the role of

the U.S. Intelligence Community regarding microeconomic espionage. The

151 Adams James, op. cit., p. 125, Nasheri Hedieh, op. cit., p. 16. .152 Porteous D. Samuel, (1995), op. cit., p. 277.153 Porteous D. Samuel, (1998), op. cit., p. 91, Smith Michael, op. cit., p. 424, Nasheri Hedieh, op. cit., p. 16.154 Porteous D. Samuel, (1998), op. cit., p. 112. 155 Smith Michael, op. cit., p. 424.156 Ibid, p. 425.

33

participants in this debate are not only intelligence officers, but also, policymakers, as

well as academics and intelligence experts. Two schools of thought have emerged.

The first supports the engagement of the U.S. intelligence services in microeconomic

espionage with every available means, following the Machiavellian motto “the end

justifies the means”. And the end in this case is the maintaining and enhancement of

the U.S. economic and technological status in the world chessboard. The second

school of thought argues that there must be a distinction between the state and the

private sector, so the U.S. intelligence agencies should abstain from helping private

corporations. Each of these schools presents their own arguments in order to justify

their positions.

The official position of the U.S. administrations, especially during the post-

Cold War era, when the issue of economic espionage in all its dimensions emerged, is

that the U.S.A. is not engaged in microeconomic espionage. The previous DCI

George Tenet announced the continuation of the official U.S. policy by saying that

while microeconomic espionage is a usual practice for some countries, this is not the

policy or practice of the United States.157 He refused categorically the conduct of

offensive economic espionage by U.S. the intelligence by saying that “We are play

defense, never offense”.158

If we delve into the real shadow world of U.S. intelligence operations, the

declaratory official policy of the United States on microeconomic espionage is

questioned at best, and falsified at worst. Loch K. Johnson, a Political Science

Professor at the University of Georgia, has concluded that “… even the United States

has been less pure with respect to intelligence gathering against foreign business firms

than its public pronouncements would suggest.”159

During the Cold War era, the National Security Agency (NSA) – America’s

equivalent of the British GCHQ – was conducting microeconomic espionage. A U.S.

Air Force signals intelligence specialist working at a U.S. base in the U.K. during the

1960s, states maintains that among his targets were printouts of commercial telexes,

especially those concerning specific corporations or commodities. His testimony is

very clear: “I was provided with a list of about a hundred words I had to look out for.

157 Ensor David, “High-tech spy satellites not targeting Americans, CIA, NSA directors say”, April 12, 2000, www.cnn.com/2000/US/ 158 Haddouti Christiane, “CIA and NSA on ECHELON”, Telepolis, April 28, 2000, http://cryptome.org/echelon-cinsa.htm 159 Johnson K. Loch, (1996), op. cit., p. 152.

34

I had to keep a watch for commercial traffic, details of commodities that big

companies were selling like iron and steel and gas. Some weeks the list of words to

watch for contained dozens of names of big companies.”160

During the 1970s and 1980s, both NSA and CIA increased their

microeconomic espionage operations. The CIA gave to one of its eleven national

intelligence officers the duty to collect economic intelligence. NSA from its part used

its powerful computers in order to scan international corporations’ telexes with the

aim to extract microeconomic intelligence. The Director of the CIA during this

period, Admiral Stansfield Turner, established a secret program in order to

disseminate to U.S. companies industrial and economic intelligence concerning

foreign countries and corporations. In exchange for that intelligence, U.S. executives

not only worked as “amateur spies” by providing the CIA with valuable intelligence

concerning the countries they visited for business, but also provided cover for CIA’s

agents. Another secret program run by the Commerce Department had the purpose to

provide American companies with declassified economic intelligence.

The testimony of another former CIA high-rank officer is also illustrative not

only for the conduct of microeconomic espionage by the U.S.A. in general, but in

particular, against its closest ally, Britain. Howard Teicher, the Director of the

National Security Council’s Middle East Section during the mid-1980s, disclosed that

the NSA tracked every detail of the al-Yamamah deal via its special, high-tech

eavesdropping equipment of its base at Menwith Hill in Yorkshire, U.K. According to

the agreement, Saudi Arabia was going to buy from the U.K. military material worth

of £20 billion, including the Tornado fighter. Among the words that the computers of

NSA charged with monitoring U.K.-Saudi Arabia communications were searching for

were included “Tornado” and “Panavia”, the name of the British corporation. Teicher

declared that “Information related to the specific aircraft would have been priority

targets. We were certainly aware that by preventing a foreign government from

selling something that we hoped an American entity would be able to sell, it would

contribute to our commercial interest.”161

In 1990 two corporations, the Japanese NEC and the American AT&T were

trying to gain a $100 million contract from the Indonesian government concerning

telecommunications. The U.S. SIGINT services eavesdropped on communications of

160 Smith Michael, op. cit., p. 428. 161 Smith Michael, op.cit., p. 428.

35

Indonesian government officials and concluded that the Indonesian government

would award the contract to NEC. They informed President Bush who intervened to

the Indonesian government which finally split the deal between the two companies.162

Also, in the 1990s, NSA intercepted e-mails between the central offices of

Banque National de Paris and its offices in New Delhi concerning a lone for the

construction of an atomic energy plant in Madras (India).163

In early 1995 another incident of microeconomic espionage by U.S.

intelligence agencies occurred. In 1994 the Brazilian government announced an

international competition worth of $1.5 billion in order to reorganize the air

surveillance of Amazon. The corporations participating in the competition were the

American Raytheon, specialized in defense industry, and two European firms, the

French Thomson-CSF and Alcatel. In the summer of 1994, it seemed that the

Brazilian government would award the contract to Thomson. The U.S. government in

order to help Raytheon win the contract acted twofold. Firstly, NSA intercepted the

communications between the French corporation Thomson-CSF and the Brazilian

government officials. Secondly, the U.S. government organized a public relations

campaign against the French. Its main argument was that the French company got the

contract by bribing Brazilian officials. Finally, Raytheon prevailed and got the

contract. The then U.S. Secretary of Commerce Ron Brown declared that this

agreement “once again, [it] demonstrates the seriousness of purpose we have in

standing shoulder to shoulder with American business and protecting the commercial

interests of the United States”.164 Unfortunately for the United States, the bribe from

the French part was never corroborated. What made things worst was the fact that in

November 1995, Raytheon was accused of bribing Brazilian officials in order to gain

the big deal. The Argentinian press published wiretap transcripts which incriminated

Gomez dos Santos, the head of protocol for President Fernando Henrique Cardoso, as

well as M. Assumpcao, Raytheon’s Brazilian representative. The allegation was that

the latter had bribed Gilberto Miranda, the liaison to the agreement for the Brazilian

Senate. Political crisis was caused in Brazil as a result of those accusations. 165 Jean

162 Porteous D. Samuel, (1998), op. cit., p. 114, Wright W. Jeffrey, “Intelligence and Economic Security”, International Journal of Intelligence and Counterintelligence, Vol. 5, No. 2 (1991), p. 210. 163 Campbell Duncan and Lashmar Paul, “USA: Spying for Free Trade”, The Independent, July 2, 2000, www.corpwatch.org/headlines/2000/164 Guisnel Jean, op. cit., p. 216.165 Guisnel Jean, op. cit., p. 216-7, Johnson K. Loch, op, cit., p. 154.

36

Guisnel is sure that the U.S. intelligence community helped Raytheon. He concludes

that “the U.S. government’s information services were of direct assistance to

Raytheon, and the company wasn’t hurt by Commerce Secretary Ron Brown’s official

visit to Brazil.”166

In January 1998 a report of the European Parliament entitled “An Appraisal of

Technologies of Political Control” concluded that “in Europe all the communications

via e-mail, telephone and fax are intercepted by the American NSA which transfers all

the information from the Continental Europe to Fort Meade of Maryland”.167 The

European Parliament charged Duncan Campbell with writing a new report upon

Echelon. The conclusion of this report states that Echelon has the capacity to violate

the personal life of millions European citizens and is used for the conduct of

economic and industrial espionage for the benefit of U.S. corporations.168

U.S. officials deny the accusations of the Europeans and express the view that

Echelon is used only for national security reasons. Their main argument was that the

tremendous volume of intercepted voice and data communications consist

microeconomic espionage impossible.

According to the SIGINT specialist James Bamford, “the agency [NSA] is not

currently” engaged in microeconomic espionage. However he is very careful in his

judgment and he states that “… there is no law preventing the agency from doing so,

and because its customers, including the White House and the CIA, dictate NSA’s

targets, it could conceivably engage in such espionage in the future.”169 So, only a

political decision is needed for NSA in order to be involved in microeconomic

espionage. In other words, NSA has the capability, but not the intention – or the

Presidential order.

From the previous analysis of the U.S. policy we conclude that the U.S.

intelligence community is engaged in a “selective” economic espionage game. In

other words, it commits selective economic espionage operations, which tries to

disguise them as counterintelligence operations. Even if the U.S. does not accept that

166 Ibid, p. 218.167 Richelson T. Jeffrey, “Desperately Seeking SIGNALS”, The Bulletin of the Atomic Scientists, Vol. 56, No.2, March/April 2000, www.thebullatomsci.org/issues/2000/ 168 Richelson T. Jeffrey, “Desperately Seeking SIGNALS”, The Bulletin of the Atomic Scientists, Vol. 56, No.2, March/April 2000, www.thebullatomsci.org/issues/2000/, Trueheart Charles, “Europeans Decry U.S. Electronic Intercepts”, Washington Post, February 24, 2000, Page A13, www.washingtonpost.com/ 169 Bamford James, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, (Anchor Books, 2002), p. 423.

37

it has entered into the microeconomic espionage game, the reality illustrates an

opposite trend. Edward Luttwak, the famous strategist believes that “The reality is

that the CIA will get into this is a pragmatic, organic kind of way”.170

7. Economic Espionage: Incentives and Disincentives.

Decision-makers decide to assign to their intelligence services the collection

and analysis of economic intelligence for some specific reasons. Also, they might

abstain from this activity for some other clear reasons. In this part of the paper we will

explore and analyze the dilemmas that a policymaker is facing regarding the practice

of economic espionage.

7.1 Macroeconomic Espionage: Incentives and disincentives

7.1.1 Incentives

Policymakers who order their intelligence agencies to conduct macroeconomic

espionage operations have some motives:

Economic – Technological Incentives

Intelligence services conduct macroeconomic espionage in order to achieve the

most effective observance of international economic and technological developments

in the world. According to Randall M. Fort there is a historical, traditional and

legitimized role for the intelligence community: the support of the governmental

policy as far as economic issues is concerned. He asserts that the U.S. Intelligence

Community provides the suitable help to governmental officials in order to configure

its economic policy. Also, it observes the world technological trends which can

influence/effect the U.S. national security.171 Loch Johnson supports the view that the

U.S. intelligence services contribute to the effective participation of the U.S. in

international economic conference and that they play the same role with the Arms

Control Staff which is at the disposal of the DCI. Also, their aim is to provide special

intelligence concerning concrete countries (e.g. the estimation of the effectiveness of

170 Johnson K. Loch, (1996), op. cit, p. 171.171 Fort Randall M., op. cit., p. 182. Specifically, the following are of great concern: the analysis of bilateral or multilateral negotiations, the recognition of economic trends and the understanding of the intentions of economic competitors, the unification of a large quantity of interspersed data in order to present a holistic picture of the economic and political factors which influence international stability, and the assistance to the policymakers to better understand the “rules of the economic game”.

38

sanctions against Iraq).172 In some cases macroeconomic analyses of the U.S.

intelligence services are the basis of U.S. diplomatic initiatives. Also they are used in

order to estimate the effectiveness of the U.S. policy towards concrete countries – in

order to decide if they will decrease or even cut the economic aid or if economic

sanctions should be imposed or when the existing sanctions should be finalized.173

According to another commentator, macroeconomic espionage covers the special

needs of the policymakers so they can keep pace with the latest developments in the

economic and technological fields.174 Representative Dave McCurdy asserts that

economic intelligence are important for the country risk assessment as far as a

specific country is concerned, as well as the analyses of their military capabilities and

contribute to the avoidance of another –technological – Pearl Harbor in which the

basic competitors of the U.S. will accomplish a sudden progress in their economic

practices and policies.175

The economic result of a cost-benefit analysis of macroeconomic espionage

operations is positive. Few well-organized operations can yield important economic

benefits especially for states which counter financial/economic difficulties, while the

operations’ cost is minimal.176 It is always cheaper to steal economic, scientific, and

technological than to pay the whole expenses for R&D. The disclosure of the

operation of the French secret services in 1971 concerning the speculation due to the

dollar’s devaluation is an example of this case. Moreover, this incentive is very

important for the states of the former Eastern bloc which are trying to rebuild their

economy and to adapt to the rules of the world capitalist economic system (open

market system), as well as for the developing countries which are trying to catch the

train of development.

Incentives Related to the Intelligence Community

172 Johnson K. Loch, op. cit., p. 162.173 DeConcini Dennis, “The Role of U.S. Intelligence in Promoting Economic Interests”, Journal of International Affairs, Vol. 48, No. 1 (Summer 1994), p. 41174 Galvan N. Robert, “The Role of American Intelligence in The Global Economy: Business and Industrial Spying I”, International Journal of Intelligence and Counterintelligence, Vol. 8, No. 3 (1995), p. 355. 175 McCurdy Dave, “Glasnost for the CIA”, Foreign Affairs, Vol. 73, No. 1 (January/February 1994), p. 131. Representative McCurdy (D) from Oklahoma was for a decade the Chairman of the House Intelligence Committee. 176 Porteous D. Samuel, “Economic Espionage: Issues Arising from Increased Government Involvement with the Private Sector”, Intelligence and National Security, Vol. 9, No. 4 (October 1994), p. 746, Porteous Samuel, (1998), p. 102-3.

39

Intelligence services have a structural advantage comparing with other

governmental agencies. When they collect and analyze economic intelligence, secret

services play a role which can not be undertaken by either Economic or Trade

Ministries. They have access to special clandestine sources and methods which are

unavailable to other governmental –as well as non-governmental– agencies.177

7.1.2 Disincentives

The disincentives which deter states from engaging in macroeconomic

espionage are the following:

Political – Diplomatic Disincentives

Macroeconomic espionage causes problems to the creation of an effective bilateral

as well as multilateral diplomacy from the state-actor. More concretely,

macroeconomic espionage alienates allies and creates problems to existing trade

coalitions. As we have noticed in the previous section, a macroeconomic espionage

operation created diplomatic problems between the U.S.A. and France. If we try to

predict the international economic environment there is a great possibility that distinct

economic blocks will be, if they have not already been, created – NAFTA (North

American Free Trade Agreement), E.U. (European Union), China, Russia178, and

Japan. The argument is that new and strengthened alliances driven by economic

interests will test the viability and durability of existent, traditional political and

military alliances, like NATO (North Atlantic Treaty Organization), as well as some

intelligence SIGINT agreement, like that between Canada, Great Britain, U.S.A. and

Australia. A French global military review admitted the increasing link between

economic and security interests with trade blocks. This review, which aims to

influence the agenda of European security within the E.U., claims that security is

defined less with territorial terms and more with economic/industrial terms. In this

environment, the interests of France are hardly separated from those of the other E.U.

members. This review calls for the development of common intelligence structures

and the decrease of the dependency from U.S. intelligence.179 It is very difficult for

the existing military and political alliances not to be weakened, if their member-states

177 Zelikow Philip, op.cit., p. 174.178 Russia has overcome its economic problems and has become a key player as far as energy issues are concerned. 179 Porteous Samuel, (1998), p. 90. The formal position of British on this issue is the expected: “it is absurd to weaken the Anglo-U.S. intelligence link even at the risk of being accused by Britain’s EU partners of being a Trojan horse”.

40

belong to another competing/rival economic block and to different intelligence-

sharing networks.180

Disincentives Related to the Intelligence Community

Some analysts and politicians support the view that the role of intelligence

services is not to study the international economy and to steal trade secrets, but to

guarantee the U.S. national security. According to Stanley Cober, researcher of

CATO Institute, the U.S. intelligence agencies should devote their sources and

expertise in more important threats for the U.S. security, especially in countering

terrorism.181 Michael Herman expresses a similar opinion by saying that “the

intelligence services were developed mainly in the area of national security and they

must be limited to their task”.182

According to some analysts the intelligence collected by macroeconomic

espionage is useless in tactical level because their personnel have not the available

economic knowledge to exploit them.183 Samuel Porteous expresses the counter-

argument that during the Cold War U.S. intelligence services spent both money and

time in order to acquire complex military technologies for which they had not specific

knowledge and they succeeded in their mission. The same methods can be used in the

case of the collection of macroeconomic intelligence without any difficulty.184

The intelligence services can not compete with the quality of analysis of

governmental and academic institution which deals with the study of economic

issues.185 Lawrence Summers, official of the U.S. Treasury Department declared that

he can not understand how the U.S. Intelligence Community can add something

valuable to the reports concerning the economic situation of European countries,

produced by specialized economic analysts of the U.S. government or Wall Street

Journal’s analysts. Moreover, international economic organizations like the

International Monetary Fund (IMF) and the World Bank are collecting and analyzing

180 Porteous Samuel, (1998), p. 89-90. 181 Kober Stanley, (1996).182 Herman Michael, “Intelligence and Policy: A Comment”, Intelligence and National Security, Vol. 6, No. 1, 1991, p. 238.183 Porteous D. Samuel, “Economic Espionage II”, Commentary No. 46, Canadian Security Intelligence Service, http://www.csis-scrs.gc.ca/eng/, 1994.184 Ibid.185 Chattergee Pratap, op. cit.

41

information about international economic developments.186 Bruce Berkowitz, a senior

consultant of RAND, and Alan Goodman, President and Chief Executive Officer of

the Institute of International Education, agree with Summers and claim that in our era

a lot of governmental and private organizations collect and analyze economic

information worldwide, for example Dow Jones, McGraw-Hill, Dun & Bradstreet.187

As a result, policymakers have at their disposal a huge amount of economic

information.

The collection of the majority of macroeconomic intelligence is done via open

sources.188 According to the “Commission on the Roles and Capabilities of the United

States Intelligence Community” report approximately the 95% of the analysis of

economic issues comes from open sources.189 Philip Zelikow thinks that all the

agencies which collect and analyze economic intelligence/information should

understand that the function of the world economy is based on open sources.190 The

counterargument of the proponents of macroeconomic espionage is indeed very

persuasive: even in the era of CNN and Internet secrets are, and for a long time will

be, with us. Also, the comparative advantage of the intelligence services is their

clandestine methods and sources and their special ways to disseminate intelligence to

policymakers.191 Professor Johnson maintains that open sources are not a panacea and

make a reference to a CIA study according to which only the 1% of the information

provided by Internet is important for intelligence services.192

7.2 Microeconomic Espionage: Incentives and disincentives

Decision-makers decide to assign to their intelligence services the collection

and analysis of microeconomic intelligence for some specific reasons. Also, they

might abstain from this activity for some other clear reasons. In this part of the paper

186 Ibid. 187 Berkowitz D. Bruce, Goodman E. Allan, op. cit., p. 109. Alan Goodman was Professor of International Affairs at Georgetown University’s School of Foreign Service. 188 Johnson K. Loch, “Spies”, Foreign Policy (September/October 2000), p. 22. For the role of open sources see: Steele David Robert, On Intelligence: Spies and Secrecy in an Open World (AFCEA International Press (AIP), 2000).189 Johnson K. Loch, (2000), op. cit., p. 22. 190 Zelikow Philip, op. cit., p. 171.191 Porteous Samuel, (1998), op. cit., p. 81. 192 Johnson K. Loch, (2000), op. cit., p. 24.

42

we will explore and analyze the dilemmas that a policymaker is facing regarding the

practice of microeconomic espionage.

7.2.1 Incentives

Policymakers who order their intelligence agencies to commit microeconomic

espionage are not irrational but have some logical incentives. For analytical reasons,

the incentives can be categorized in 2 broad categories:

Economic Incentives

The first and most important category deals with the economic logic behind the

phenomenon of microeconomic espionage. Adherents of this intelligence activity

invoke the Strategic Trade Policy Argument in order to justify their position.

Professor Robert Gilpin defines Strategic Trade Policy (STP) as “an effort by a

nation-state to change its international strategic environment in such a way as to

provide specific benefits to indigenous corporations”.193 The central argument of STP

is that state intervention to alter the strategic interaction between oligopolistic firms

can itself be an important basis for trade policy. Microeconomic espionage is a type of

governmental interference and affects strategic interactions between oligopolistic

rivals.194 Actually, the state by providing corporations with microeconomic

intelligence, give them the opportunity to increase their gains. The supporters of

microeconomic espionage claim that a multinational, even if it has not “nationality”,

deserves the help of the state where it is based, because the company creates jobs, and

adds value to the whole state economy. From its part, the state protects its economic

and financial climate.195 SPT proponents believe that those states which are going to

be adopted to the future economic challenges will gain a strategic advantage towards

the rest. They argue that a well-funded high-quality microeconomic espionage

193 Gilpin Robert, The Political Economy of International Relations, (Gutenberg, Athens, 1995, in Greek), p. 262. 194 Brander A. James, “The Economics of Economic Intelligence”, in Potter H. Evan, Economic Intelligence & National Security (Carleton University Press, 1998), p. 201. 195 Porteous Samuel, (1998), op. cit., p. 98.

43

program in order to augment a state’s economic competitiveness would be the most

important development as far as national security is concerned.196

Another basic argument of the supporters of microeconomic espionage has to do

with applied economics. They claim that the economic result of a cost-benefit analysis

of macroeconomic espionage operations is positive. Few well-organized operations

conducted by intelligence services can yield important economic benefits especially

for companies which counter financial/economic difficulties, while the operations’

cost is minimal.197 It is always cheaper to steal economic, scientific, and technological

than to pay the whole expenses for R&D.

In 1999, Professor James D. Gasford and Dr. Merrill E. Whitney, of the

Department of Economics, at the University of Calgary, by using mathematic types

concluded that under specific circumstances (oligopolistic industries) microeconomic

espionage is beneficial both for states and for corporations. They argue that in

oligopolistic industries where “there are potential and strategic benefits from the

development of new processes”, intelligence services have a role to play in

“protecting current and future profits”. In spite of the disincentives of microeconomic

espionage, this activity has the potential to yield desirable strategic or profit-shifting

effects as well as cost savings for indigenous corporations. Even if other countries use

counterintelligence-counterespionage methods in order to counter microeconomic

espionage, the aggressive country will still gain from espionage. Moreover, they

proved that microeconomic espionage is also beneficial for the consumers because

“typically the expected world output rises, the expected price falls and the expected

consumer surplus is enlarged”. Generally they reach the conclusion that “economic

espionage can be in the national interest”.198

Incentives Related to the Intelligence Community

Intelligence services have a natural, structural advantage comparing with other

governmental agencies. When they collect and analyze economic intelligence, secret

services play a role which can not be undertaken by either Economic or Trade

Ministries because of their unique access to special clandestine sources and methods

196 Ibid, p. 200-206. 197 Porteous D. Samuel, (1994), op. cit., p. 746, Porteous Samuel, (1998), op. cit, p. 102-3.198 Merrill E. Whitney, James D. Gaisford, “Why Spy? An Inquiry into the Rationale for Economic Espionage”, International Economic Journal, Vol. 13, No. 2, Summer 1999.

44

(e.g. SIGINT collection capabilities) which are unavailable to other governmental –as

well as non-governmental– agencies.199

Moreover, intelligence agencies themselves make profits from the

microeconomic espionage operations. Count de Marenches, the former head of the

French secret services has written in his memoirs that “In any intelligence service

worthy of the name you would easily come across cases where the whole year’s

budget has been paid for in full by a single operation”.200

7.2.2 Disincentives

The disincentives which deter states from engaging in macroeconomic

espionage fall into 6 broad categories:

Political – Diplomatic Disincentives

Critics of microeconomic espionage argue that states which conduct

microeconomic espionage operations endanger their relations with their allies. A

microeconomic espionage program would cause problems to the conduct of an

effective U.S. foreign policy. If the U.S. intelligence community spies against its

allies’ companies their relations would be weakened and it would be difficult to form

a military coalition against a rogue state (e.g. Iraq) or against the worldwide terrorist

threat.201

Some analysts and politicians support the view that the role of intelligence

services is not to steal trade secrets, but to guarantee the U.S. national security. For

them, microeconomic espionage is a waste of time and resources in a world full of

direct threats against American security. The proliferation of weapons of mass

destruction, terrorism (a combination of both is a nightmare for the U.S. intelligence

policy), the existence of drug cartels, the stability in Russia and China, policies of

rogue states like Iran, Iraq and North Korea, consist more imminent threats than the

threat stemmed from microeconomic espionage.202

According to Stanley Cober, researcher of CATO Institute, the U.S.

intelligence agencies should devote their sources and expertise in more important

199 Zelikow Philip, op. cit., p. 174. 200 Schweizer Peter, op. cit., p. 12. 201 Porteous Samuel, (1998), op. cit., p. 101.202 Valero Larry, “The Role of American Intelligence in The Global Economy: Business and Industrial Spying II”, International Journal of Intelligence and Counterintelligence, Vol. 8, No. 3 (1995), p. 359-362.

45

threats for the U.S. security, especially in countering terrorism.203 Michael Herman

expresses a similar opinion by saying that “the intelligence services were developed

mainly in the area of national security and they must be limited to their task”.204

Randall Fort expresses the fear that microeconomic espionage might lead the U.S.A.

in a new economic version of the Cold War. If microeconomic espionage against

allies’ corporations will include the conduct of covert economic operations, the result

might be the declaration of an “economic-trade war” in the best case, and of a real

war, in the worst case.205

The counterargument of the proponents of a microeconomic espionage

program is that all those threats have also economic connotations and that the

economy is closely linked with national security, which has also an economic

dimension. According to Professor Ken Booth, “security should be a broader concept

than merely military strategy”206 Professor Barry Buzan distinguishes five dimensions

of security: military, political, economic, societal, and environmental.207 He maintains

characteristically that, if we select the statist level of analysis, then economic security

is part of the national security agenda. He defines economic security as the “access to

the resources, finance and markets necessary to sustain acceptable levels of welfare

and state power” and he equates security “with the economic conditions necessary for

survival”.208

Economic Disincentives

203 Kober Stanley, op. cit., (1996).204 Herman Michael, “Intelligence and Policy: A Comment”, Intelligence and National Security, Vol. 6, No. 1, 1991, p. 238. Sixteen years later, Mr. Herman still holds the same opinion. In a discussion with the author he admitted it and he argued that in an era of globalization it is very difficult to recognize a U.S. company. (Conference “Choices for Western Intelligence: The Security Challenges of the Twenty-first Century”, University of Wales, Aberystwyth, Gregynog, 28-30 April 2007).205 Johnson K. Loch, (1996), op. cit., p. 171.206 Booth Ken, “War, Security and Strategy: Towards a Doctrine For Stable Peace” in Booth Ken (ed.), New Thinking About Strategy and International Security (HarperCollins, 1991), p. 342.207 Buzan Barry, “Is International Security Possible?” in Booth Ken (ed.), New Thinking About Strategy and International Security (HarperCollins, 1991), p. 34. Buzan’s definitions of the rest dimensions of security are the following: Military security has to do with “the two-level interplay of the armed offensive and defensive capabilities of states, and states’ perceptions of each other’s intentions”. Political security is “the organizational stability of states, systems of government, and the ideologies that give them legitimacy. Societal security refers to the “sustainability, within acceptable conditions for evolution, of traditional patterns of language, culture, and both religious and national identity and custom”. Environmental security is concerned with “the maintenance of the planetary biosphere as the essential support system on which all other human enterprises depend”. Ibid, p. 34-5. 208 Buzan Barry, People, States & Fear: An Agenda for International Security Studies in the Post-Cold War Era (Harvester Wheatsheaf, 1991), p. 241.

46

One of the main arguments of the opponents of microeconomic espionage is

that if several countries enter into the “game” they all end up worst off. In this case it

is for the interest of all states to reach an international agreement not to follow

microeconomic espionage policies. Moreover, they argue that microeconomic

espionage operations work like subsidies. States, who conduct this kind of espionage

via their intelligence agencies, create market imperfections - instead of countering

them-, weakens international trade, awards stealing instead of innovation, protect

ineffective producers and not the consumers, and perceive wrongly the international

economic competition as a threat to national security rather than as a positive

component of economic development. In the long run the results for the state

economy would be negative. Actually, this activity is both a waste of time and

resources. Scarce resources would be managed counterproductively and non-

competitive industries would depend more than ever on state protection. Moreover,

isolated trade, economic and technological secrets are not so important for a state’s

whole economy. Especially for the U.S.A. a microeconomic espionage program is not

compatible with the existent U.S. policy of “national treatment” of foreign

investments. As a result of microeconomic espionage, a foreign company may decide

to withdraw its investment from the territory of a state that is engaged in such an

activity. Randal Fort and Loch Johnson support the view that the American

government instead of following the path of microeconomic espionage has more

healthy options to follow in order to improve its international competitiveness, like

the strengthening of its old industries and the improvement of the capabilities of its

working force. Professor Johnson adds that the U.S.A. would earn more from

businessmen who are fluent in Japanese and who can understand the Japanese culture,

than from spies seeking for economic intelligence.209

However, there are strong counterarguments. Firstly, as we have seen in

analyzing microeconomic incentives, this activity is actually profitable both for the

state and for corporations. Secondly, according to the realist theory of International

Relations, in an anarchic international system it is very difficult (although not

impossible) to achieve cooperation between nations because of the problems of trust,

cheating, and of the relative gains.210 So it is very difficult to reach an international

treaty banning microeconomic espionage. The main questions are which organization 209 Fort M. Randall, “Economic Espionage”, in George Z. Roger, Kline D. Robert (eds.), Intelligence and the National Security Strategist, (Rowman & Littlefield Publishers, Inc., 2006, p. 248, Johnson K. Lock, (1996), op. cit, p. 173.

47

will undertake this duty and how efficient it will be? Thirdly, another

counterargument has to do with the quality and quantity of economic intelligence. In

our era the U.S.A. is the world leader both in economic and in technological domains.

As a result this country has much more to lose from economic espionage in general

and microeconomic espionage in particular than the rest of the world. Surely, the

Europeans or the Japanese have also trade, economic and technological secrets, but

not so many than the U.S.A. In other words, states who commit microeconomic

espionage gain a clear comparative advantage vis-à-vis their great competitor, the

U.S.A.

Practical Disincentives

There are also some practical problems. Firstly, which corporations and which

sectors of the economy would be the beneficiaries of a microeconomic espionage

program? Does the list with the beneficiaries include all the companies of a specific

sector or some of them? Who will take this decision and with what criteria? What

would be more important, the size of the market, profits, or share of the market? If

there is not a fair and equal distribution of the collected economic intelligence, would

the taxpayers contribute to the subsidizing of specific corporations? If the government

distributes the intelligence product to specific corporations, is it going to be accused

of offering preferential treatment to them?211

The proponents of microeconomic espionage on the contrary believe that the

intelligence services can play the role of a clearinghouse and can distribute the

intelligence collected to all the U.S. companies.212

Secondly, in the era of globalization what criterion constitutes a company an

“American company”? The location of its headquarters? The nationality of its main

stockholders or of its employees? Some foreign companies have their basis in the

210 For a realist approach as far as the achievement of cooperation is concerned see: Grieco M. Joseph, Cooperation among Nations: Europe, America, and Non-Taiff Barriers to Trade, (Cornell University Press, 1990), Baldwin A. David, (ed.), Neorealism and Neoliberalism: The Contemporary Debate, (Columbia University Press, 1993), Kegley W. Charles, Jr., (ed.), Controversies in International Relations Theory: Realism and the Neoliberal Challenge, (St. Martin’s Press, 1995), Burchill Scott, “Realism and Neo-realism”, in Burchill Scott, Devetak Richard, Linklater Andrew, Paterson Matthew, Reus-Smit Christian and True Jacqui, Theories of International Relations, (Palgrave, 1996), Baylis John, Smith Steve (eds.), The Globalization of World Politics: An Introduction to International Relations (Oxford University Press, 1997), Williams Phil, Goldstein M. Donald, Shafritz M. Jay (eds.), Classic Readings and Contemporary Debates in International Relations (Thomson Wadsworth, 2006), Mearsheimer J. John, The Tragedy of Great Power Politics, (W.W. Norton & Company, 2001), Arthur A. Stein, Why Nations Cooperate: Circumstance and Choice in International Relations, (Cornell University Press, 1990). 211 Fort Randall, (1995), op. cit., p. 186.212 DeConcini Dennis, op. cit., p. 47, 49.

48

U.S.A. Should the U.S. intelligence community spy against them too? What about the

U.S. affiliated companies which operate overseas? Are going to have access to those

privileged microeconomic intelligence collected by U.S. secret agencies? And what if

this affiliated U.S. corporation is competing with a foreign company based in the

U.S.A.? Should U.S. intelligence services support all the foreign multinationals based

in the U.S.A. – even the Japanese? If the U.S. intelligence community will support the

American Boeing in its competition with the European Airbus, she will endanger the

interests of another U.S. corporation General Electric which constructs plane engines

for Airbus. Moreover, corporations which have strong ties with U.S. politicians and

have great influence because of their economic power can be the most privileged.213

The supporters of microeconomic espionage claim that these difficulties are

not insurmountable and that this argument has a great dose of exaggeration. Firstly, a

lot of joint ventures, especially in high-technology sector, which are supported by one

government in order to cooperate with other companies, put as a prerequisite that

those companies should be indigenous. Moreover, the public organizations which are

responsible for taxation in every country, know exactly the techniques according to

which they can determine the nationality of a corporation. Probably it is difficult to

define the nationality of a multinational, but it is not impossible. Secondly, the

intelligence could be disseminated to companies via joint ventures, so the obstacles

posed by the nationality issue can be overcome.214

Legal Disincentives

On the one hand, according to William T. Warner, Law Professor at the

University of Kentucky, microeconomic espionage can create a “legal nightmare”.215

Some multinational corporations are controlled by American citizens, or they employ

American citizens. If the U.S. intelligence community acts against them, it will violate

The National Security Act of 1947 which does not allow the conduct of espionage

operations against U.S. citizens. Moreover, microeconomic espionage operations

violate both the Intellectual Property Law, and international economic agreements

like GATT (General Agreement on Rates and Tariffs), and the rules established by its

successor, the World Trade Organization.216 According to Randall Fort, there is a

great possibility of extensive civil litigation against the American government in both

213 Fort Randall, (2006), op. cit., p. 241-42.214 Porteous D. Samuel, (1998), op. cit., p. 102. 215 Valero Barry, op. cit., p. 360. 216 Porteous D. Samuel, (1994), op. cit., p. 742-3.

49

American and foreign courts. The victims of microeconomic espionage (foreign and

U.S. companies, as well as consumers) could sue.217

On the other hand, the adherents of microeconomic espionage believe that the

CIA has actually the express or inherent power to conduct such an activity. They base

their argument on two legal documents:

Firstly, The National Security Act of 1947, and secondly on the Executive

Order 12,333. The National Security Act, although does not refer explicitly to

economic espionage, it does not clearly mention the types of intelligence collected

and analyzed by the U.S. Intelligence Community, as well as which of them have

direct relation with national security. This silence supports the theory that the

President can use the Agency to conduct economic espionage. Economic espionage

could be legally covered, especially by Section 403-3(d)(5), according to which the

CIA can “perform such other functions and duties related to intelligence affecting the

national security as the President or the National Security Council may direct”.218

Secondly, the Executive Order 12,333, in its entirety, treats economic issues as

a critical component of national security. For example Part 1.1 of the Order states:

“The United States intelligence effort shall provide the President and the National

Security Council with the necessary information on which to base decisions

concerning the conduct and development of foreign, defense and economic policy,

and the protection of United States national interests from foreign security threats”.219

As far as the violation of international economic treaties is concerned, they support

the view that the fact that both U.S. opponents and allies conduct economic espionage

(in all its dimensions) against the U.S.A. decreases their efficiency.

Disincentives Related to the Intelligence Community

Critics of microeconomic espionage present the following arguments

concerning the function of intelligence services: Firstly, the U.S. Intelligence

Community does not support the conduct of microeconomic espionage. The duty of

the U.S. intelligence officers is the protection of the U.S. security and not the

protection of specific companies. The former DCI Robert Gates referred to an

217 Fort M. Randall, (2006), op. cit., p. 245. 218 Moreover, Section 403-3(d)(4) could be also used to justify economic espionage operations by the CIA. Section 403-3(d)(4) states that the CIA shall “perform such additional services as are of common concern to the elements of the intelligence community, which services the Director of Central Intelligence determines can be more efficiently accomplished centrally”. Sather Kyle, “The Role of the CIA in Economic Espionage”, http://faculty.lls.edu/~manheimk/ns/sather2.htm 219 Ibid.

50

incident where a CIA agent told him “I am ready to sacrifice my life for my country,

but not for a corporation”.220 Furthermore, there is the danger of corruption less for

some intelligence officials, and more for the intelligence services themselves.

Corporations would exert pressure on the intelligence community to take favorable

decisions regarding the distribution of microeconomic intelligence.221

Secondly, the intelligence collected by microeconomic espionage is useless in

tactical level because their personnel have not the available economic knowledge to

exploit them.222

Samuel Porteous expresses the counter-argument that during the Cold War

U.S. intelligence services spent both money and time in order to acquire complex

military technologies for which they had not specific knowledge and they succeeded

in their mission. The same methods can be used in the case of the collection of

macroeconomic intelligence without any difficulty.223 Furthermore, the U.S.

Intelligence Community has at its disposal an efficient economic staff. Professor

Philip Zelikow states that “The greatest concentration of analytical experts on

international economic issues in the federal government resides not in any of the

executive departments but in the CIA. It is even possible that the ranks of CIA

analysis contain about as much economic expertise on international problems as can

be found in all the executive departments of the government together.”224

And if it is necessary it could recruit more efficient and clever economists by giving

them the suitable incentives.

Thirdly, the collection of the majority of microeconomic intelligence is done

via open sources.225 According to the “Commission on the Roles and Capabilities of

the United States Intelligence Community” report approximately the 95% of the

analysis of economic issues comes from open sources.226 Philip Zelikow thinks that all

the agencies which collect and analyze economic intelligence/information should 220 Porteous D. Samuel, “Economic/Commercial Interests And Intelligence Services”, Commentary, No. 59, Canadian Security Intelligence Service, www.csis-scrs.gc.ca/eng/, 1995. 221 Schweizer Peter, (1996), op. cit., p. 14. 222 Porteous D. Samuel, “Economic Espionage II”, Commentary No. 46, Canadian Security Intelligence Service, http://www.csis-scrs.gc.ca/eng/, 1994.223 Ibid.224 Sean Gregory, “Economic Intelligence in the Post-Cold War Era: Issues for Reform”, in Edward Cheng, Diane C. Snyder (eds.), The Final Report of the Snyder Commission, Woodrow Wilson School Policy Conference 401a: Intelligence Reform in the Post-Cold War Era, The Woodrow Wilson School of Public and International Affairs, Princeton University, January 1997. 225 Johnson K. Loch, (2000), op. cit., p. 22. For the role of open sources see: Steele David Robert, On Intelligence: Spies and Secrecy in an Open World (AFCEA International Press (AIP), 2000).226 Johnson K. Loch, (2000), op. cit., p. 22.

51

understand that the function of the world economy is based on open sources.227 Robert

Steele one of the pioneers of the open source collection and founder of the Open

Sources Solutions supports the view that all the intelligence collection problems

would be solved via the “open intelligence collection” and the restructuring of the

whole U.S. intelligence mechanism in the basis of the concept of “Open Sources

Intelligence” (OSCINT).228

The counterargument of the proponents of macroeconomic espionage is

indeed very persuasive: even in the era of CNN and Internet secrets are, and for a long

time will be, with us. Also, the comparative advantage of the intelligence services is

their clandestine methods and sources and their special ways to disseminate

intelligence to policymakers.229 Professor Johnson maintains that open sources are not

a panacea and make a reference to a CIA study according to which only the 1% of the

information provided by Internet is important for intelligence services.230

Disincentives Related to the Business Community

The business community in the U.S.A. does not support a microeconomic

policy. Some of them have at their disposal their own intelligence professionals

(mostly ex-CIA agents) and conduct industrial espionage themselves. Moreover,

others are worried about the price they have to pay to the U.S. intelligence agencies in

exchange of her help (probably the provision of non official cover to U.S. agents).231

Several business executives have expressed their fear that the U.S. intelligence

services would launch an economic CHAOS operation.232

The supporters of microeconomic espionage operations argue that traditionally

there is a close relationship between industry on the one hand, and the intelligence

and defense community on the other hand. A lot of large private corporations gain

contracts from the U.S. Department of Defense and from the U.S. Intelligence

Community. The U-2 program which was funded by the CIA and was undertaken by

Lockheed is an illustrative example.233 Moreover, the U.S. Intelligence Community 227 Zelikow Philip, op. cit., p. 171.228 Guisnel Jean, op. cit., p. 227, 229-30. See also Steele David Robert, op. cit.229 Porteous Samuel, (1998), op. cit., p. 81. 230 Johnson K. Loch, (2000), op. cit., p. 24. 231 Johnson K. Loch, (1996), op. cit., p. 150-1. 232 Ibid, p. 172. 233 For the U-2 project see: Tenet J. George, “An Intelligence Success Story: The U-2 Program: The DCI’s Perspective”, Studies in Intelligence, Vol. 42, No. 2, Winter 1998-1999, Orlov Alexander, “A “Hot” Front in the Cold War: The U-2 Program: A Russian Officer Remembers”, Studies in Intelligence, Vol. 42, No. 2, Winter 1998-1999, Richelson T. Jeffrey, The Wizards of Langley: Inside the CIA’s Directorate of Science and Technology, (Westview Press, 2001), p. 29, 39-40, 63, Stephen Ambrose, Ike’s Spies: Eisenhower and the Espionage Establishment, University Press of Mississippi,

52

has certain unofficial agreements with some corporations according to which the latter

should provide non-official cover to intelligence officers. As an exchange the

intelligence agencies may provide economic intelligence to those companies.

8. Conclusions

In spite of the above-mentioned disincentives, the study of the economic

espionage policies of the former Soviet Union/Russia, France, Japan, and U.S.A.

prove that states have not abandoned –and possibly will not abandon in the future –

their traditional involvement in that secret activity, which tends to become a systemic

characteristic of the intelligence apparatus of nations-states and a main mission of

their intelligence services. The overarching motive in our opinion is deeper than the

earning of money or the acquisition of a new technology. Taking into consideration

both the close relationship between the Defense and Intelligence Community and

industry, and the fact that the development and constant improvement of economic

and technological power consists a sine qua non for military power, the activity of

economic espionage is directly connected with the balance of power between nations.

In a world characterized by rapid economic and technological advancement it

is vital for the security of a state to conduct economic espionage in order not to fall

behind economically and technologically, something which will affect negatively its

power. In conclusion, the argument of Thucydides about the role of “uneven

development” in international politics is once more vindicated. The aim of states

which conduct economic espionage is to avoid a situation of “uneven development”

beneficial to their competitors but against themselves. They act like Sparta in the

Peloponnesian War which started a preventive war in order to stop the Athenian

development and avoid being the victim of the law of uneven development in the long

1999, p. 269, Pocock Christopher, The U-2 Spyplane: Toward the Unknown, A New History of the Early Years, Reviewed by Haines K. Gerald, Studies in Intelligence, Vol. 46, No. 2, 2002, Taubman Phillip, Secret Empire: Eisenhower, the CIA and the Hidden Story of America’s Space Espionage, (Simon and Schuster, 2003), Pedlow W. Gregory, Welzenbach E. Donald, The CIA and the U-2 Program, 1954-1974, (Washington D.C.: History Staff, Center for the Study of Intelligence, 1998, Pocock Chris, 50 Years of the U-2: The Complete Illustrated History of the “Dragon Lady”, (Atlen, PA: Schiffer Military History, 2005).

53

run.234 But in this time they use a mix of economic and intelligence means (economic

espionage) and not military means, which are means of the last resort.

About the Author

Ioannis L. Konstantopoulos is a PhD Candidate in the Department of International and European Studies, Panteion University of Social and Political Sciences, Athens, Greece. He received “Heraclitus” Scholarship from the E.U. and the Hellenic Ministry of Education in order to fulfil his PhD which is entitled “Economic Espionage and International Relations” and his main goal is to bridge the gap between Intelligence Studies and International Relations Theory by examining the case study of economic espionage.

234 Thucydides, History of the Peloponnesian War, (A 23, A 88) (in Greek). For the role of Thucydides in the discipline of International Relations and especially in the sub-field of Strategic Studies see: Connor, W.R., “Polarization in Thucydides”, in Lebow Ned Richard (ed.), Hegemonic Rivalry from Thucydides to the Nuclear Age, (Boulder: Westview, 1991), Fuller, J.F.C., A Military History of the Western World, Vol. 1: From the Earliest Times to the Battle of Lepanto, (Da Capo Press, 1954), Garst, David, “Thucydides and Neorealism”, International Studies Quarterly, Vol. 33, No. 1, (1989), Johnson, Bagby, Laurie M., “Thucydidean Realism: Between Athens and Melos”, Security Studies, Vol. 5, No. 2, Winter 1995/6, Kagan Donald, “Athenian Strategy in the Peloponnesian War” in, Murray Williamson , Knox MacGregor, and Bernstein Alvin (eds.), The Making of Strategy: Rulers, States, and War, (Cambridge University Press, 1994), Millett Paul, Warfare, Economy and Democracy in Classical Athens”, in Rich John, Shipley Graham (eds.), War and Society in the Greek World, (Routledge, 1993), and Platias Athanassios, International Relations and Strategy in Thucydides, (ESTIA Publishers, Athens 1999, in Greek).

54