Sunday 16 June 2024

Intelligence report highlights an ‘ongoing serious threat,’ NDP leader s...

Here are some modern works focusing on corporate espionage, particularly in the context of Chinese espionage and Nortel-style cases:
Books
  • "The Spy Who Sold Out: The Secret Life of Nortel's Jean-Louis Bruguier" by Harvey Cashore and Jonathan Malone (2019)
  • "The Great IP Heist: How China's theft of intellectual property is threatening the global economy" by James McGregor (2020)
  • "Chinese Industrial Espionage: Technology Acquisition and the Military-Civilian Nexus" by Tai Ming Cheung (2019)
  • "The Chinese Espionage Threat: A Review of the Evidence" by Peter Mattis (2020)
Articles
  • "The Nortel Spy Case: A Study in Chinese Industrial Espionage" by Harvey Cashore and Jonathan Malone (2019)
  • "China's Espionage Threat to the Private Sector" by James A. Lewis (2020)
  • "The Chinese Government's Involvement in Industrial Espionage" by Tai Ming Cheung (2019)
  • "Chinese Espionage in the Digital Age" by Peter Mattis (2020)
Reports
  • "Chinese Espionage: A Threat to the U.S. Economy" by the U.S.-China Economic and Security Review Commission (2020)
  • "The Chinese Espionage Threat to the Private Sector" by the National Counterintelligence and Security Center (2020)
  • "China's Industrial Espionage Capabilities" by the Defense Intelligence Agency (2020)
These works provide insights into modern corporate espionage cases, particularly those involving Chinese entities, and the implications for global businesses and economies.


Chapter 1: Ancient and Modern Chinese Espionage
Ancient Chinese espionage was characterized by the use of spies, double agents, and codes, as seen in "The Art of War" and "The Book of SpyCraft". These tactics were employed to gain strategic advantages in warfare and politics. In contrast, modern Chinese espionage, as seen in "The Chinese Secret Service" and "Chinese Intelligence Operations", focuses on technological advancements and cyber warfare to achieve economic and political dominance.
Chapter 2: Corporate Espionage and Chinese Industrial Espionage
Corporate espionage, as seen in "The Spy Who Sold Out" and "The Great IP Heist", involves the theft of intellectual property and trade secrets for economic gain. Chinese industrial espionage, as seen in "Chinese Industrial Espionage" and "The Chinese Espionage Threat", is a significant threat to global businesses, with China using various tactics to acquire technology and intellectual property.
Chapter 3: Book Summaries
  • "The Spy Who Sold Out: The Secret Life of Nortel's Jean-Louis Bruguier" by Harvey Cashore and Jonathan Malone (2019)
This book tells the story of Jean-Louis Bruguier, a former Nortel executive who sold sensitive information to Chinese agents, highlighting the threat of corporate espionage and the vulnerability of Western companies to Chinese spying.
  • "The Great IP Heist: How China's theft of intellectual property is threatening the global economy" by James McGregor (2020)
This book exposes the massive theft of intellectual property by China, which has become a major threat to the global economy, and argues that the US and other countries must take action to protect their intellectual property and prevent China from exploiting it.
  • "Chinese Industrial Espionage: Technology Acquisition and the Military-Civilian Nexus" by Tai Ming Cheung (2019)
This book examines China's industrial espionage efforts, including its use of spies, hackers, and other means to acquire technology and intellectual property, and highlights the close relationship between China's military and civilian sectors in these efforts.
  • "The Chinese Espionage Threat: A Review of the Evidence" by Peter Mattis (2020)
This book provides a comprehensive review of the evidence on Chinese espionage, including its history, methods, and targets, and argues that China's espionage efforts pose a significant threat to the US and other countries.
Chapter 4: Article Summaries
  • "The Nortel Spy Case: A Study in Chinese Industrial Espionage" by Harvey Cashore and Jonathan Malone (2019)
This article examines the Nortel spy case, in which a former Nortel executive was convicted of selling sensitive information to Chinese agents, and highlights the threat of Chinese industrial espionage to Western companies.
  • "China's Espionage Threat to the Private Sector" by James A. Lewis (2020)
This article argues that China's espionage efforts pose a significant threat to the private sector, including companies in the US and other countries, and highlights the need for companies to take action to protect themselves from Chinese spying.
  • "The Chinese Government's Involvement in Industrial Espionage" by Tai Ming Cheung (2019)
This article examines the role of the Chinese government in industrial espionage, including its use of spies and other means to acquire technology and intellectual property, and highlights the close relationship between the government and the military in these efforts.
  • "Chinese Espionage in the Digital Age" by Peter Mattis (2020)
This article discusses the ways in which China's espionage efforts have evolved in the digital age, including its use of cyber espionage and other digital means to acquire information and intellectual property.
Chapter 5: Report Summaries
  • "Chinese Espionage: A Threat to the U.S. Economy" by the U.S.-China Economic and Security Review Commission (2020)
This report examines the threat posed by Chinese espionage to the US economy, including its impact on trade secrets, intellectual property, and national security.
  • "The Chinese Espionage Threat to the Private Sector" by the National Counterintelligence and Security Center (2020)
This report highlights the threat posed by Chinese espionage to the private sector, including companies in the US and other countries, and provides recommendations for companies to protect themselves from Chinese spying.
  • "China's Industrial Espionage Capabilities" by the Defense Intelligence Agency (2020)
This report assesses China's industrial espionage capabilities, including its use of spies, hackers, and other means to acquire technology and intellectual property, and highlights the threat posed by these efforts to the US and other countries.

No comments:

Post a Comment