- Gentlemen, start your drones: Judge’s ruling opens door for commercial use
- Soldier who hid, bragged about not saluting flag to be punished — in secret
- ‘Maverick’ of the seas: ‘Top Gun’ school for U.S. ship officers to launch
- Putin declares Sochi Paralympics open amid Ukrainian protest
- ‘In Jesus name, we pray’ sparks ire at Ohio council meeting
- Navy’s first laser weapon ready for prime time; drone killer to deploy this summer
- Billionaire backer: Rick Santorum ‘needs to be heard’ in 2016
- Obamacare fallout: 49 percent pessimistic; 45 percent ‘scared’
- DHS accused of holding U.S. citizen at airport, using emails to pry into her sex life
- Seattle socialist: Minimum-wage discussion skewed by ‘right-wing’ GAO analysis
White House announces anti-theft trade strategy
WASHINGTON (AP) - The Obama administration announced new efforts Wednesday to fight the growing theft of American trade secrets, a broad but relatively restrained response to a rapidly emerging global problem that was brought into sharp focus this week by fresh evidence linking cyberstealing to China's military.
Mentioning China but not specifically targeting that country, Attorney General Eric Holder announced the plan, which includes a new diplomatic push to discourage intellectual property theft abroad along with better coordination at home to help U.S. companies protect themselves.
The administration says indications are that economic espionage is increasing, not only through electronic intrusion over the Internet but also through the recruitment of former employees of U.S. companies with knowledge of inside trade information.
“Particularly in this time of economic recovery, this work is more important than it ever has been before,” Holder said at the White House announcement of the administration’s strategy.
“As new technologies have torn down traditional barriers to international business and global commerce, they’ve also made it easier for criminals to steal trade secrets _ and to do so from anywhere in the world,” Holder said. “A hacker in China can acquire source code from a software company in Virginia without leaving his or her desk. With a few keystrokes, a terminated or simply unhappy employee of a defense contractor can misappropriate designs, processes, and formulas worth billions of dollars.”
Earlier this week, a Virginia-based cybersecurity firm, Mandiant, accused a secret Chinese military unit in Shanghai of years of cyberattacks against more than 140 companies, a majority of them American. The accusations and supporting evidence increased pressure on the United States to take more action against the Chinese for what experts say has been years of systematic espionage.
The Chinese government denied being involved in cybertheft, with China’s defense minister calling the Mandiant report deeply flawed. China's Foreign Ministry said that country has also been a victim of hacking, much of it traced to the United States.
Wednesday’s Obama administration report did not target any one violator, but the China problem was evident in the case studies it cited. Those examples did not involve cyberattacks but rather the theft of hundreds of millions of dollars in trade secrets by former employees of U.S. corporations including Ford Motor Co., DuPont Co., General Motors Corp., Cargill, Dow Chemical Co., Valspar and Motorola.
The administration report didn’t threaten any specific consequences for theft of trade secrets, and no new fines or other trade actions were announced. It included five actions to protect American innovation:
_ Applying diplomatic pressure by senior officials to foreign leaders to discourage theft.
_ Promoting best practices to help industries protect against theft.
_ Enhancing U.S. law enforcement operations to increase investigations and prosecutions.
_ Reviewing U.S. laws to determine if they need to be strengthened to protect against theft.
_ Beginning a public awareness campaign.
President Barack Obama signed an executive order last week aimed at helping protect the computer networks of American industries from cyberattacks. It called for the development of voluntary standards to protect the computer systems that run critical sectors of the economy such as the banking, power and transportation industries. It directed U.S. defense and intelligence agencies to share classified threat data with those companies.
TWT Video Picks
Extra charge on the bill reminds everyone who's paying
- Putin has transformed Russian army into a lean, mean fighting machine
- Kim Jong-un calls for execution of 33 Christians
- Bill Clinton cashes in on struggling nonprofit hospital
- BRUCE: Obama's bizarre immigration rules
- Unemployment insurance vote could happen next week
- Two liberals say Sarah Palin is right: Obama lacks substance
- Russias Putin nominated for Nobel Peace Prize
- 'Holy grail of guitars' among those in N.Y. auction
- IRS to turn over Lerner emails in tea party targeting probe
- Bill Clinton poses for photo with Bunny Ranch prostitutes
Pope Francis meets his 'mini-me'
Celebrity deaths in 2014
Winter storm hits states — again