Economic Espionage Act of 1996
   HOME

TheInfoList



OR:

The Economic Espionage Act of 1996 () was a 6 title Act of Congress dealing with a wide range of issues, including not only industrial espionage (''e.g.'', the
theft Theft is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word ''theft'' is also used as a synonym or informal shorthand term for som ...
or
misappropriation In law, misappropriation is the unauthorized use of another's name, likeness, identity, property, discoveries, inventions, etc without that person's permission, resulting in harm to that person. Another use of the word refers to intentional a ...
of a
trade secret Trade secrets are a type of intellectual property that includes formulas, practices, processes, designs, instruments, patterns, or compilations of information that have inherent economic value because they are not generally known or readily ...
and the
National Information Infrastructure Protection Act The National Information Infrastructure Protection Act (; ) was Title II of the Economic Espionage Act of 1996, as an amendment to the Computer Fraud and Abuse Act. The Act The Act was enacted in 1996 as an amendment to the Computer Fraud and Ab ...
), but the insanity defense, matters regarding the
Boys & Girls Clubs of America Boys & Girls Clubs of America (BGCA) is a national organization of local chapters which provide voluntary after-school programs for young people. The organization, which holds a congressional charter under Title 36 of the United States Code, h ...
, requirements for presentence investigation reports, and the
United States Sentencing Commission The United States Sentencing Commission is an independent agency of the judicial branch of the U.S. federal government. It is responsible for articulating the U.S. Federal Sentencing Guidelines for the federal courts. The Commission promulgate ...
reports regarding encryption or scrambling technology, and other technical and minor amendments.


Structure of the Act


Protection of trade secrets

The act makes the theft or misappropriation of a trade secret a federal crime. Unlike the
Espionage Act of 1917 The Espionage Act of 1917 is a United States federal law enacted on June 15, 1917, shortly after the United States entered World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code (War ...
(found at ), the offense involves commercial information, not classified or national defense information. "Trade secrets" are defined in the act consistent with generally accepted legal definitions such as those used in the Uniform Trade Secrets Act and state laws based on the UTSA. Specifically it declares:


Enforcement


Department of Justice policy

The
United States Department of Justice Criminal Division United may refer to: Places * United, Pennsylvania, an unincorporated community * United, West Virginia, an unincorporated community Arts and entertainment Films * ''United'' (2003 film), a Norwegian film * ''United'' (2011 film), a BBC Two fi ...
has issued a prosecution policy relating to enforcement of the Act. In general, it states:


Use of EEA

The Act can be employed to accomplish several purposes: :* It can be used to protect a company's valuable intellectual property by prosecuting dishonest competitors who steal a company's trade secrets, but :* it can also be used against a company that finds itself with trade secrets belonging to a competitor. In ''United States v. Lange'', the EEA was used to protect a victim company that had learned that Lange, a disgruntled former employee, had been offering to sell its secret manufacturing processes to third parties. The company reported Lange to the FBI, and Lange was arrested and subsequently convicted and sentenced to 30 months in prison. The case was successful in large part because the company undertook reasonable measures to keep its information secret, including: #physically securing the trade secrets in question #limiting the distribution of documentation describing the trade secret #limiting the number of employees with access to the trade secret #notifying such employees that they were working with confidential information, and placing warnings on trade secret information #providing vendors with only partial information of the trade secret, so that it could not be replicated The EEA has also been used to prosecute a
Boeing The Boeing Company () is an American multinational corporation that designs, manufactures, and sells airplanes, rotorcraft, rockets, satellites, telecommunications equipment, and missiles worldwide. The company also provides leasing and p ...
manager, together with an employee he hired from Lockheed Martin with the offer of a higher salary in return for his inside information on Lockheed Martin's pricing. Although the EEA charges were later dropped, the matter resulted in Boeing being denied $1 billion in contracts from the
United States Air Force The United States Air Force (USAF) is the Aerial warfare, air military branch, service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States. Originally created on 1 August 1907, as a part ...
, as well as it paying a $615 million settlement to the US Government.


§ 1831 - First conviction and sentence

In February 2010, former
Boeing The Boeing Company () is an American multinational corporation that designs, manufactures, and sells airplanes, rotorcraft, rockets, satellites, telecommunications equipment, and missiles worldwide. The company also provides leasing and p ...
engineer Dongfan "Greg" Chung was sentenced to 16 years in prison, following the first ever trial conviction under the 1996 Economic Espionage Act. Chung, a native of China, was convicted by the US District Court for the Central District of California of stealing Boeing trade secrets related to the US Space Shuttle program and the
Delta IV Delta IV is a group of five expendable launch systems in the Delta rocket family introduced in the early 2000s. Originally designed by Boeing's Defense, Space and Security division for the Evolved Expendable Launch Vehicle (EELV) program, t ...
rocket. He spent over 30 years providing U.S. aerospace technologies to China. Chung was convicted on charges related to more than 350,000 sensitive documents that were found concealed in crawl spaces underneath his home, including conspiracy to commit economic espionage, six counts of economic espionage to benefit a foreign country, one count of acting as an agent of the People's Republic of China, and one count of making false statements to the FBI. The 15-year sentence was viewed as a life sentence for Chung who was 74 years old. Chung subsequently died in 2020 at age 84 from coronavirus-related complications while incarcerated at the
Federal Correctional Complex, Butner The Federal Correctional Complex, Butner (FCC Butner) is a United States federal prison complex for men near Butner, North Carolina. It is operated by the Federal Bureau of Prisons, a division of the United States Department of Justice. FCC Butner ...
. Chung was arrested by special agents from the FBI's Los Angeles Field Office in February 2008. He worked for
Rockwell International Rockwell International was a major American manufacturing conglomerate involved in aircraft, the space industry, defense and commercial electronics, components in the automotive industry, printing presses, avionics and industrial products. R ...
from 1973 until its defense and space unit was acquired by Boeing in 1996, and he continued to work for Boeing as an employee and then as a contractor through 2006. Chung's arrest resulted from an investigation into the case of
Chi Mak Chi Mak (; born 28 September 1940) was a Chinese-born naturalized American citizen who worked as an engineer for California-based defense contractor Power Paragon, a part of L-3 Communications. In 2007, Mak was found guilty of conspiring to export ...
, a Chinese-American engineer convicted in 2007 of conspiring to export sensitive naval technologies to China and sentenced to more than 24 years in prison. At Chung's sentencing, presiding judge, Cormac Carney, said that he could not "put a price tag" on national security, and that with the long sentence for Chung he wanted to send a signal to China to "stop sending your spies here." In April 2012, Chung's conviction was upheld by the
United States Court of Appeals for the Ninth Circuit The United States Court of Appeals for the Ninth Circuit (in case citations, 9th Cir.) is the U.S. federal court of appeals that has appellate jurisdiction over the U.S. district courts in the following federal judicial districts: * District ...
.


§ 1832 - First conviction and sentence

Most prosecutions under the Economic Espionage Act have been for violation of Section 1832 (Trade Secret Theft). The first such prosecution was of Daniel and Patrick Worthing, maintenance workers at PPG Industries in Pennsylvania who stole blueprints and diskettes. Both pleaded guilty in early 1997. For another example, see the first conviction in California, that of David Brian Kern. After an August, 2007 plea of guilt for (one count) of violating the Economic Espionage Act and one count of violating the
Arms Export Control Act The Arms Export Control Act of 1976 (Title II of , codified at ) gives the President of the United States the authority to control the import and export of defense articles and defense services. The H.R. 13680 legislation was passed by the 94th ...
, San Jose U.S. District Court Judge Jeremy Fogel sentenced
Canadian Canadians (french: Canadiens) are people identified with the country of Canada. This connection may be residential, legal, historical or cultural. For most Canadians, many (or all) of these connections exist and are collectively the source of ...
citizen Xiaodong Sheldon Meng, 44, to 24 months in federal prison, 3 years of
parole Parole (also known as provisional release or supervised release) is a form of early release of a prison inmate where the prisoner agrees to abide by certain behavioral conditions, including checking-in with their designated parole officers, or ...
and a $10,000 fine, with forfeiture of computer equipment seized. Meng was indicted in December 2006, with 36 counts, "for stealing military software from a
Silicon Valley Silicon Valley is a region in Northern California that serves as a global center for high technology and innovation. Located in the southern part of the San Francisco Bay Area, it corresponds roughly to the geographical areas San Mateo Coun ...
defense contractor and trying to sell it to the Chinese military." The first to be convicted of Economic Espionage (Section 1831), Meng admitted "illegally obtaining a program used for military training from
Quantum3D Quantum3D is an American computer graphics company. It was founded on 31 March 1997People's Liberation Army Navy after he no longer worked for the firm; he attempted to sell the fighter-pilot training software programs to the
Royal Thai Air Force "Royal Thai Air Force March" , mascot = , anniversaries = 9 April 1937 (Royal Thai Air Force Day) , equipment = , equipment_label = , battles ...
, the
Royal Malaysian Air Force The Royal Malaysian Air Force (RMAF, ms, Tentera Udara Diraja Malaysia; TUDM; Jawi: ) was formed on 2 June 1958 as the Royal Federation of Malaya Air Force (; ). However, its roots can be traced back to the Malayan Auxiliary Air Force format ...
and the Navy Research Center in China." He paid $500,000 bond, for temporary liberty, until August 18 when he begins serving sentence. On June 18, 2008, Meng was the first individual sentenced under the Economic Espionage statute. Meng was the first person convicted of both the Economic Espionage Act of 1996 and the
Arms Export Control Act The Arms Export Control Act of 1976 (Title II of , codified at ) gives the President of the United States the authority to control the import and export of defense articles and defense services. The H.R. 13680 legislation was passed by the 94th ...
. He received a 24-month sentence and $10,000 fine, which included a sentencing departure for cooperation, according to news reports.


Further developments


Intersection with trade law

The International Trade Commission has used the EEA's definition of misappropriation to support its enforcement of US trade laws that prohibit "unfair methods of competition and unfair acts in the importation of articles ... in the United States." In ''Tianrui Group Company Limited LLC v International Trade Commission'', the
United States Court of Appeals for the Federal Circuit The United States Court of Appeals for the Federal Circuit (in case citations, Fed. Cir. or C.A.F.C.) is a United States court of appeals that has special appellate jurisdiction over certain types of specialized cases in the U.S. federal court ...
held that the manufacture abroad of products using a process that was developed in the United States, protected under domestic trade secret law, and misappropriated abroad, violated section 337 of the
Tariff Act of 1930 A tariff is a tax imposed by the government of a country or by a supranational union on imports or exports of goods. Besides being a source of revenue for the government, import duties can also be a form of regulation of foreign trade and polic ...
, . The ITC therefore had the authority to bar the importation of such products into the United States.


Scope of trade secrets

The extent to which trade secrets are covered under § 1832 was expanded in 2012, following the reversal of a conviction in April 2012 by the
United States Court of Appeals for the Second Circuit The United States Court of Appeals for the Second Circuit (in case citations, 2d Cir.) is one of the thirteen United States Courts of Appeals. Its territory comprises the states of Connecticut, New York and Vermont. The court has appellate ju ...
in ''United States v. Aleynikov'' In that case, it was held that the theft of the source code for a proprietary system at Goldman Sachs was never intended to be placed in interstate or foreign commerce. As Goldman had no intention of selling or licensing its system, § 1832 (as it was written at that time) did not apply. The provision was promptly amended on December 28, 2012 with the passage of the Theft of Trade Secrets Clarification Act of 2012, so that it now applies to products or services that are used or intended for use in interstate or foreign commerce. The amendment led to a conviction in '' United States v. Agrawal''.


Expansion of penalties

On January 24, 2013, § 1831 was amended to increase the maximum fines: :* in the case of individuals, from $500,000 to $5,000,000, and :* in the case of organizations, from $10,000,000 to "the greater of $10,000,000 or 3 times the value of the stolen trade secret to the organization."


Civil cause of action

On May 11, 2016, in what ''
Forbes ''Forbes'' () is an American business magazine owned by Integrated Whale Media Investments and the Forbes family. Published eight times a year, it features articles on finance, industry, investing, and marketing topics. ''Forbes'' also r ...
'' called "the single most important intellectual property development since Congress enacted the America Invents Act," the
Defend Trade Secrets Act The Defend Trade Secrets Act of 2016 (DTSA) (, codified at , et seq.) is a United States federal law that allows an owner of a trade secret to sue in federal court when its trade secrets have been misappropriated. The act was signed into law by Pres ...
() expanded the EEA's reach. In cases filed after that date: :* is replaced to provide for private civil actions, including (subject to appropriate safeguards) ''
ex parte In law, ''ex parte'' () is a Latin term meaning literally "from/out of the party/faction of" (name of party/faction, often omitted), thus signifying "on behalf of (name)". An ''ex parte'' decision is one decided by a judge without requiring all ...
'' orders "providing for the seizure of property necessary to prevent the propagation or dissemination of the trade secret that is the subject of the action." Remedies available to the court include the granting of injunctions, awarding of damages (including
treble damages In United States law, treble damages is a term that indicates that a statute permits a court to triple the amount of the actual/compensatory damages to be awarded to a prevailing plaintiff. Treble damages are a multiple of, and not an addition t ...
in cases of wilful and malicious misappropriation) and the awarding of costs in cases where the claim was made in bad faith. :* is amended to provide for criminal fines to be the greater of $5,000,000 or three times the trade secret's value (including any reproduction costs that the holder of the trade secret has avoided). :* is amended to include in the
RICO The Racketeer Influenced and Corrupt Organizations (RICO) Act is a United States federal law that provides for extended criminal penalties and a civil cause of action for acts performed as part of an ongoing criminal organization. RICO was en ...
list of predicate offences signifying racketeering activity. :* is amended to provide for whistleblower protection for an individual who makes a confidential disclosure to a government official in cases of a suspected violation of the law, or files a sealed document to the court with respect to an antiretaliation lawsuit. As a reinforcing measure, employers are required to include a notice of such immunity in any employment agreement that governs trade secrets and other
confidential information Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access or places restrictions on certain types of information. Legal confidentiality By law, lawyers are often required ...
.


Impact of the Act

This legislation has created much debate within the
business intelligence Business intelligence (BI) comprises the strategies and technologies used by enterprises for the data analysis and management of business information. Common functions of business intelligence technologies include reporting, online analytical p ...
community regarding the legality and ethics of various forms of information gathering designed to provide business decision-makers with competitive advantages in areas such as strategy, marketing, research and development, or negotiations. Most business intelligence (also known as
competitive intelligence Competitive intelligence (CI) is the process and forward-looking practices used in producing knowledge about the competitive environment to improve organizational performance. It involves the systematic collection and analysis of information from ...
practitioners) rely largely on the collection and analysis of open source information from which they identify events, patterns, and trends of actionable interest. However, some techniques focus on the collection of publicly available information that is in limited circulation. This may be obtained through a number of direct and indirect techniques that share common origins in the national intelligence community. The use of these techniques is often debated from legal and ethical standpoints based on this Act. One such example is the collection and analysis of
gray literature Grey literature (or gray literature) is materials and research produced by organizations outside of the traditional commercial or academic publishing and distribution channels. Common grey literature publication types include reports (annual, rese ...
. The techniques for developing actionable intelligence from limited circulation / limited availability documents such as selected corporate publications can raise difficult legal and ethical questions under both intellectual property laws and the Economic Espionage Act. The Society for Competitive Intelligence Professionals provides training and publications which outline a series of guidelines designed to support business intelligence professionals seeking to comply with both the legal restrictions of the EEA as well as the ethical considerations involved. In 1999, the Society of Competitive Intelligence Professionals published its ''Policy Analysis on Competitive Intelligence and the Economic Espionage Act'' which explained how the Economic Espionage Act will not affect legitimate competitive intelligence. The ''National Law Journal'' of March 29, 2000, reviewed the Policy Analysis and reported that the Policy Analysis' conclusion was that the EEA's "impact on legitimate competitive intelligence would be negligible" and that "nearly four years" after the EEA's passage, "it appears that the olicy Analysis'predictions were on target."Industry Spying Still Flourishes; Criminalizing Trade Secret Theft Hasn't Led to Mass Proseuctions," National Law Journal, March 29, 2000
/ref> The EEA was developed on the basis of a national philosophy that emphasizes a "level playing field" for all business competitors that arose in no small part due to the size and diversity of the American
private sector The private sector is the part of the economy, sometimes referred to as the citizen sector, which is owned by private groups, usually as a means of establishment for profit or non profit, rather than being owned by the government. Employment The ...
. Many other nations not only lack such legislation, but actively support industrial espionage using both their national intelligence services as well as less formal mechanisms including bribery and corruption. The United States
Office of the National Counterintelligence Executive The National Counterintelligence and Security Center (NCSC) leads national counterintelligence (CI) for the United States government. It is part of the Office of the Director of National Intelligence (ODNI). History The position of Natio ...
publishes an annual report on Foreign Economic Collection and Industrial Espionage mandated by the U.S. Congress which outlines these espionage activities of many foreign nations. The United States does not engage in state-sanctioned industrial espionage. In 2000, in response to European concerns, a former U.S. Director of Central Intelligence, James Woolsy, said (in the March 17, 2000 Wall Street Journal editorial) that if there is collection, it's usually focused on bribery by European companies, not on access to technologies. Woolsey said "most European technology just isn't worth our stealing." As DCI, Woolsey testified before Congress that he was reluctant to engage in economic espionage as the endeavor is "fraught with complexities, legal difficulties (and) foreign policy difficulties." In 2000, the
European Parliament The European Parliament (EP) is one of the legislative bodies of the European Union and one of its seven institutions. Together with the Council of the European Union (known as the Council and informally as the Council of Ministers), it adopts ...
voted to carry out an investigation into the international surveillance project ECHELON. That same year the French government also began an official investigation into allegations that several collaborating nations may be using the program for illegal purposes. U.S.
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
documents had been revealed to the British press, showing that the U.S. has been using the technology to monitor European business communications. The French and European allegations centered on the suspicion that such information was being passed to U.S. firms. The U.S. stated that monitoring was focused on the participation of European firms in supplying foreign WMD (weapons of mass destruction) programs, such as the Iran nuclear program, on evading sanctions in Iran and Libya, and on the bribery of foreign officials, such as French payments to Saudi Defense officials.


See also

* ITT Corporation * Non-disclosure agreement *
Trade secret Trade secrets are a type of intellectual property that includes formulas, practices, processes, designs, instruments, patterns, or compilations of information that have inherent economic value because they are not generally known or readily ...


References


Further reading

* * * {{Authority control Acts of the 104th United States Congress Espionage in the United States United States federal criminal legislation United States federal intellectual property legislation Secrecy Trade secrets