Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-nr4z6 Total loading time: 0 Render date: 2024-05-02T22:37:48.409Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  05 June 2012

Hedieh Nasheri
Affiliation:
Kent State University, Ohio
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2004

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

“Across the Nation.” Seattle Times, 21 August 2002
Adams, James. The Next World War: Computers Are the Weapons and the Front Line is Everywhere. New York: Simon and Schuster, 1998
Adams, Jo-Ann M. “Comment, Controlling Cyberspace: Applying the Computer Fraud and Abuse Act to the Internet.” Santa Clara Computer and High Technology Law Journal, vol. 12 (1996). Cited in National Institute of Justice, U.S. Department of Justice, Computer Crime: Criminal Justice Resource Manual. Washington, DC: GPO, 1989
Agre, Philip E. “Your Face Is Not a Bar Code: Arguments Against Automatic Face Recognition in Public Places.” 9 September 2001. Accessed 9 September 2003. Available at: 〈http://dlis.gseis.ucla.edu/people/pagre/bar-code.html〉
Agreement on Trade-Related Aspects of Intellectual Property Rights, 15 April, 1994. “Marrakesh Agreement Establishing the World Trade Organization.” Annex 1C, Legal Instruments – Results of the Uruguay Round, vol. 31, International Legal Materials, vol. 33 (1994) [Trade-Related Aspects of Intellectual Property Rights Agreement]. Reprinted in International Treaties on Intellectual Property, edited by Marshall Leaffer. Washington, DC: BNA Books, 1997
“Air Force Websites Shut as Hackers Gain Access, Change Files.” Wall Street Journal, 31 December 1996
Akdeniz, Yaman, Clive Walker, and David Wall. The Internet, Law and Society. Harlow: Longman, 2000
Aldrich, Richard W. “Cyberterrorism and Computer Crimes: Issues Surrounding the Establishment of an International Legal Regime.” INSS Occasional Paper 32, Information Operation Series (April 2000). USAF Institute for National Security Studies, USAF Academy, Colorado Springs, Colorado
Aldrich, Richard W.How Do You Know You Are at War in the Information Age?Houston Journal of International Law, vol. 22 (fall 1999)Google Scholar
Allen, Mary. “Secret Trader Gets Weekends in Jail.” News Journal (Delaware), 5 February 2003
Alster, Norm. “The Valley of the Spies.” Forbes, 26 October 1992
American Bar Association. Section of Intellectual Property Law. American Bar Association Homepage. Accessed 4 July 2003. Available at: 〈http://www.abanet.org/intelprop/home.html〉
“American Chemistry Council Statement on EPA Computer Security.” U.S. Newswire, 11 August 2000
American Society of Industrial Security & Pricewaterhouse Coopers. “Trends in Proprietary Information Loss Survey Report 1999.” Accessed 4 July 2003. Available at: 〈http://www.pwcglobal.com/extweb/ncsurvres.nsf/(ViewAgentByKeyDisplay)/all_all_us_eng〉
American Society of Industrial Security & Pricewaterhouse Coopers “Trends in Proprietary Information Loss Survey Report 2000.” Accessed 4 July 2003. Available at: 〈http://www.pwcglobal.com/extweb/ncsurvres.nsf/(ViewAgentByKeyDisplay)/all_all_us_eng〉
Amstar Corp. v. Envirotech Corp., 730 F 2d 1476, 1481-82 (Fed. Cir. 1984)
“Annual Report to Congress on Foreign Economic Collection and Industrial Espionage.” 1995. Accessed 3 July 2003. Available at: 〈http://www.fas.org/sgp/othergov/indust.html〉
“Annual Report to Congress on Foreign Economic Collection and Industrial Espionage.” 1996. Accessed 3 July 2003. Available at: 〈http://www.apg.army.mil/tenants/902dmi/ARTICLES/Fy96rpt.htm〉
“Annual Report to Congress on Foreign Economic Collection and Industrial Espionage.” 1998. Pacific Northwest National Laboratory
“Annual Report to Congress on Foreign Economic Collection and Industrial Espionage.” 2001. Office of the National Counterintelligence. Accessed 20 July 2003. Available at: 〈http://www.ncix.gov/pubs/reports/fy01.htm〉
Anthes, Gary H. “Target: Electronic Spies Beefing Up Corporate Computer Security Alert Program.” Computer World, 28 October 1996
Aoki, Keith. “Neocolonialism, Anticommons, Property and BioPiracy in the (Not-so-Brave) New World Order of International Intellectual Property Protection.” Indiana Journal of Global Legal Studies, vol. 6 (1998)Google Scholar
Arevalo, Penny, Steve Andersen, and Bruce Rubenstein. “Circuit by Circuit.” Corporate Legal Times, July 1999. Available in Lexis-Nexis (Legal News)
“Argentine Hacker Who Invaded Pentagon Enters Guilty Plea.” Wall St. J., 8 December 1997
Arkin, Stanley S. “When Theft of an Idea Can Be a Crime.” New York Law Journal, 11 April 1996
Arquilla, John, and David Ronfeldt. The Advent of Net War. Santa Monica, CA: RAND, 1996
Asbrand, Deborah. “Who's Holding the Bag for the Hackers?” The Standard: Intelligence for the Internet Economy. Accessed 4 July 2003. Available at: 〈http://www.thestandard.com/article/0,1902,10840,00.html〉
Association for Computing Machinery. “Denial of Service.” University of Illinois, Urbana-Champaign. Accessed 5 July 2003. Available at: 〈http://www.acm.uiuc.edu/workshops/security/deny.html〉
Atari Games Corp. v. Nintendo of America Inc., 975 F. 2d 832, 845(Fed. Cir. 1992)
Augustini, Jeff. “Note, From Goldfinger to Butterfinger: The Legal and Policy Issues Surrounding Proposals to Use the Central Intelligence Agency for Economic Espionage.” Law and Policy in International Business, vol. 26 (winter 1995)Google Scholar
Band, Jonathan, et al. “The Economic Espionage Act: Its Application in Year One.” Corporate Counsel, November 1997
Barbaro, Michael. “Internet Attacks on Companies up 28 Percent, Report Says.” Washington Post, 8 July 2002
Barkley, John. “Denial of Service.” Accessed 5 July 2003. Available at: 〈http://csrc.nist.gov/publications/nistpubs/800-7/node117.html〉
Barnouw, Erik. A History of Broadcasting in the United States, A Tower in Babel. New York: Oxford University Press, 1966
Barth, Steve. “Protecting the Knowledge Enterprise; Knowledge Management Techniques and Theory.” Knowledge Management 4 (1 March 2001)Google Scholar
Barth, Steve “Spy vs. Spy.” World Trade, 1 August 1998
Barton, Gene. “Taking a Byte out of Crime: E-Mail Harassment and the Inefficacy of Existing Law.” Washington Law Review, vol. 70 (1995)Google Scholar
Basiouni, Mammoud Cherif. “Effective National and International Action Against Organized Crime and Terrorist Criminal Activities.” Emory International Law Review, vol. 4 (1990)Google Scholar
Bass, Kenneth C., III. “Relevant Intelligence in the Post-Cold War World.” Accessed 13 January 1997. Available at: 〈http://199.34.61.2/govern/fulltext.html〉
Beatty, Donna L.Comment, Malaysia's ‘Computer Crimes Act 1997’ Gets Tough on Cybercrime but Fails to Advance the Development of Cyberlaws.” Pacific Rim Law and Policy Journal, vol. 7 (1998)Google Scholar
Beck, Matthew E., and O'Brien, Matthew E.. “Corporate Criminal Liability.” American Criminal Law Review, vol. 36 (2000)Google Scholar
Behar, Richard. “Who's Reading Your E-mail?” Fortune, 3 February 1997
Bennett, Johanna, and Beth Mantz. “Amgen's Patent Infringement Trail Draws Rivals' Lawyers in Search of Data.” Wall St. J., 26 June 2000
Bentham, Jeremy. “Principles of Penal Law, Part II: Rationale of Punishment.” In The Works of Jeremy Bentham, vol. 1, edited by John Bowring. Edinburgh: William Tait, 1843
Bergier, Jacques. Secret Armies: The Growth of Corporate and Industrial Espionage. Translated by Harol J. Salemson. Indianapolis: Bobbs-Merrill Co., Inc., 1975
Berthelsen, John. “Friendly Spies.” Far Eastern Economic Review, 17 February 1994
Bick, Jonathan D.Why Should the Internet Be Any Different.” Pace Law Review, vol. 19 (1998)Google Scholar
Blair, Margaret M. “New Ways Needed to Assess New Economy.” L.A. Times, 13 November 2000. Lexis News Library, Lat File
Blake, Harlan M.Employee Agreements Not to Compete.” Harvard Law Review, vol. 73 (1960)CrossRefGoogle Scholar
Bluestein, Paul. “France, Israel Alleged to Spy on U.S. Firms.” Washington Post, 16 August 1996
Boadle, Anthony. “Canada Spy-Catcher Says High-Tech Firms Targeted.” The Reuter European Business Report, 13 April 1994
Boren, David L.The Winds of Change at the Central Intelligence Agency.” Yale Law Journal, vol. 101 (1992)CrossRefGoogle Scholar
Borrus, Amy. “Why Pinstripes Don't Suit the Cloak-and-Dagger Crowd.” Business Week, 17 May 1993
Bowman, M. E.International Security in the Post-Cold War Era: Can International Law Truly Effect Global Political and Economic Stability? Is International Law Ready for the Information Age?Fordham International Law Journal, vol. 19 (1996)Google Scholar
Bradsher, Keith. “Former G.M. Executive Indicted on Charges of Taking Secrets.” N.Y. Times, 23 May 2000
Brandes, Ronnie Heather, et al. “Intellectual Property Crimes.” American Criminal Law Review, vol. 37 (2000)Google Scholar
Branscomb, Anne W.Rogue Computer Programs and Computer Rogues: Tailoring the Punishment to Fit the Crime.” Rutgers Computer and Technology Law Journal, vol. 16 (1990)Google Scholar
Brendel, Neal, and Lucas Paglia. “The Economic Espionage Act.” Pennsylvania Law Weekly, 7 July 1997
Bridis, Ted, et al. “How Piles of Trash Became Latest Focus in Bitter Software Feud.” Wall St. J., 10 July 2000
Brockett, Daniel L. “Companies Need to Keep Sharp Eye on Trade Secrets.” Crain's Cleveland Business, 15 July 2002
Brooktree Corp. v. Advanced Micro Devices, Inc., 977 F.2d 1555, 1570 (Fed. Cir. 1992)
Buckley, Neil, and Robert Graham. “Europe: MEP's to Vote on Probe of US-UK “Spying' Satellite.” Financial Times (London), 5 July 2000
Burchette, Lloyd M., Jr. “Economic Espionage is a Big Threat to National Security.” Greensboro News & Record (North Carolina), 6 March 1994
Burton, Mark. “Problems and Alternatives: Government Spying for Commercial Gain.” Accessed 2002. Available at: 〈http://www.odci.gov/csi/studies/unclass1994.pdf〉
Business Software Alliance. “1998 Global Software Piracy Report.” Accessed 4 July 2003. Available at: 〈http://global.bsa.org/usa/press/newsreleases//1999-05-25.239.phtml〉
Business Software Alliance. 1998 Global Software Piracy Report. Washington, D.C.: International Planning and Research Corporation for the Business Software Alliance, May 1999. Business Software Alliance. Software Piracy and the Law. Accessed July 2003. Available at: 〈http://global.bsa.org/usa/antipiracy/law/Piracy_Law03.pdf〉
Business Software Alliance. Eighth Annual BSA Global Software Piracy Study: Trends in Software Piracy, 1994–2002. June 2003. Accessed July 2003. Available at: http://www.bsa.org/globalstudy/loader.cfm?url=/commonspot/security/getfile.cfm&pageid=12927&hitboxdone=yes
Business Software Alliance BSA World-wide Report 1990–91. Washington, DC: BSA, United States, 1991
“Business Trends; Management.” Electronic Business, 1 January 2002
“Business Watch Legal.” Sun-Sentinel (Ft. Lauderdale), 14 November 1997
Campbell, Duncan. “Inside Echelon.” 25 July 2000. Accessed 2002. Available at: 〈http://www.heise.de/tp/english/inhalt/te/6929/1.html〉
Campbell, Duncan, and Paul Lashmar. “Revealed: 30 More Nations with Spying Stations.” Independent (London), 9 July 2000
Canadian Security Intelligence Service. “1996 Public Report, Economic Security.” Accessed 7 July 2003. Available at: 〈http://www.csis-scrs.gc.ca/eng/publicrp/pub1996_e.html〉
Capaccio, Tony. “Report Highlights Espionage Threat from Israel, Allies.” Defense Week, 26 February 1996
Carey, Pete. “Software Engineer Charged in Theft of Pentium Plans from Intel.” Seattle Times, 24 September 1995
Carnegie Endowment for International Peace. Website. Accessed 15 September 2003. Available at: 〈http://www.ceip.org/〉
Carr, Chris, et al. “The Economic Espionage Act: Bear Trap or Mousetrap?Texas Intellectual Property Law Journal, vol. 8 (winter 2000)Google Scholar
Carroll, John. Computer Security. 3rd ed. St. Louis, MO: Butterworth-Heinemann, 1996
Carter, Jimmy. “Amendments to the Manual for Courts-Martial, United States, 1969 (Revised Edition).” Executive Order 12,233, 1 September 1980
Computer Crime and Intellectual Property Section, Introduction. Accessed 4 July 2003. Available at: 〈http://www.cybercrime.gov/ccips.html〉
CDT (Center for Democracy and Technology) “pages on wiretapping and surveillance.” Accessed 15 September 2003. Available at: 〈http://www.cdt.org〉. Policy Post 6.15
Center for Strategic and International Studies (Canadian Security Intelligence Service). Cybercrime … Cyberterrorism … Cyberwarefare … (1998). Accessed July 2003. Available at: 〈http://www.csis.org〉
Central Intelligence Agency. Accessed 1 July 2003. Available at: 〈http://www.cia.gov〉
CERT Coordination Center. “Computer Emergency and Response Team Coordination Center Statistics 1988–2000.” Accessed 4 July 2003. Available at: 〈http://www.cert.org/stats/cert_stats.html〉
CERT (Computer Emergency Response Team) Coordination Center Computer Emergency Response Team 1995 Annual Report. Pittsburgh, PA: Carnegie Melon University, 1995
CERT Coordination Center. Computer Emergency Response Team 1998 Annual Report. Pittsburgh, PA: Carnegie Melon University, 1998
CERT Coordination Center “Trends in Denial of Service Attack Activity” (October 2001). Accessed July 2003. Available at: 〈http://www.cert.org/archive/pdf/DoS_trends.pdf〉
CERT Coordination Center Research. “Denial-of-Service Incidents.” Accessed 5 July 2003. Available at: 〈http://www.cert.org/research/JHThesis/Chapter11.html〉
CERT. “Home Network Security.” Accessed 15 September 2003. Available at: 〈http://www.cert.org/tech_tips/home_networks.html〉
CERT Coordination Center. CERT Coordination Center 1998 Annual Report (Summary) (1999). Accessed July 2003. Available at: 〈http://www.cert.org/annual_rpts/cert_rpt_98.html〉
Cha, Ariana Eunjung. “Hackers Steal Subscriber Data from AOL Network.” Washington Post, 17 June 2000
Charney, Scott, and Alexander, Kent. “Computer Crime.” Emory Law Journal, vol. 45 (1996)Google Scholar
Chatterjee, Neel. “Should Trade Secret Appropriation be Criminalized.” Hastings Communications and Entertainment Law Journal, vol. 19 (fall 1996)Google Scholar
Children's Online Privacy Protection Act. Public Law 277, 105th Con., 2d sess., (21 October 1998)
Chicago Lock Co. v. Fanberg, 676 F.2d 400, 404 (9th Cir. 1982)
Children's Online Privacy Protection Rule. 64 Federal Register 59888 (3 November 1999)
Childs, Kelvin. “Feds Arrest Two for Newspaper Espionage.” Editor and Publisher Magazine, 21 February 1998
Chisum, Donald S. Chisum on Patents. Albany, NY: Matthew Bender Publishing, 2000
“Central Intelligence Agency Fingers France, Israel for Economic Espionage.” Orlando Sentinel Tribune, 15 August 1996
“Central Intelligence Agency: Israel Among Most ‘Extensive’ In Economic Espionage.” Defense Week, 5 August 1996
Cillufo, Frank J. “Security Threats to Americans Overseas, Congressional Testimony.” Federal Document Clearing House (3 April 2001)
Cillufo, Frank J., et al. “Bad Guys and Good Stuff: When and Where Will the Cyber Threats Converge?DePaul Business Law Journal, vol. 12, no. 30 (1999)Google Scholar
Clark, Michael T.Economic Espionage: The Role of the United States Intelligence Community.” Journal of International Legal Studies, vol. 3 (1997)Google Scholar
Clarke, Duncan L.Israel's Economic Espionage in the United States.” Journal of Palestine Studies, vol. 27 (1998)CrossRefGoogle Scholar
Clinton, William J. Commencement Address to the U.S. Naval Academy. May 1998
Coffee, John C.Hush!: The Criminal Status of Confidential Information After McNally and Carpenter and the Enduring Problem of Overcriminalization.” American Criminal Law Review, vol. 26 (1988)Google Scholar
Cohen, Jerry, and Alan S. Gutterman. Trade Secrets Protection and Exploitation. Washington, DC: BNA Books, 1998
Coile, Zachary. “Better Shred Than Read.” San Francisco Examiner, 29 August 1994
Cole, Michelle. “Proliferation of High Tech Firms Fosters Espionage.” Idaho Statesman, 27 April 1997
Collins, Cindy. “Trade Secrets: The Economic Espionage Act, Friend or Foe?” Inside Litigation, September 1997
Combeau, Jacques. “Protection of Undisclosed Information.” In Intellectual Property and International Trade: A Guide to the Uruguay Round Trade-Related Aspects of Intellectual Property Rights Agreement Paris, France, edited by Tania Saulnier et al. New York: International Chamber of Commerce, 1996
Commission Regulation No. 240/96 of 31 January 1996 on the application of Article 81(3) of the Rome Treaty to Certain Categories Technology Transfer Agreements. 1996 O.J. (L 31) 2
Commission Regulation No. 566/89 of November 1988 on the application of Article 85(3) of the Rome Treaty to Certain Categories of Know-How Licensing Agreements. 1989 O.J. (L 61) 1
“Commission Regulation No. 2658/2000 of 29 November 2000 on the app-lication of Article 81(3) of the Treaty to Categories of Specialisation Agreements.” Accessed 3 July 2003. Available at: 〈http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=en&numdoc=32000R2658&model=guichett〉
“Commission Regulation No. 2659/2000 …” (accessed 2003). [Office for Official Publications of the European Communities, Commission Regulation (European Commission) No 2659/2000 of 29 November 2000, On the Application of Article 81(3) of the Treaty to Categories of Research and Development Agreements, at http://europa.eu.int/eur-lex/en/consleg/pdf/2000/en_2000R2659_do_001.pdf (last visited July 2003)
Computer Security Institute Computer Security Institute-FBI Computer Crime and Security Survey, vol. 8. San Francisco: Computer Security Institute, 2003
Computer Security Institute Issues and Trends: 1998 Computer Security Institute-FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 1998
Computer Security Institute web site. Accessed 4 July 2003. Available at: 〈http://www.gocsi.com〉
“Computer Whiz Guilty of Planting Rogue Virus.” Chicago Sun-Times, 23 January 1990, 3. Available in 1990 WL 4381438
Congressional Record. Washington, D.C.: GPO, 1996
Convention Establishing the World Intellectual Property Organization. 14 July 1967. Accessed 3 July 2003. Available at 〈http://www.wipo.int/treaties/convention/index.html〉
Convention on Combating Bribery of Foreign Public Officials in International Business Transactions. 17 December 1997. Accessed 3 July 2003. Available at: 〈http://ue.eu.int/ejn/data/vol_c/9_autres_textes/20nov1en.html〉
Cooper, David E. Statement before U.S. Senate Committee on Intelligence of the U.S. Senate and the Subcomm. on Terrorism, Tech., and Gov't Info. of the Comm. on the Judiciary of the U.S. Senate. Economic Espionage: Joint Hearing Before the Select Comm. on Intelligence of the U.S. Senate and the Subcomm. on Terrorism, Tech., and Gov't Info. of the Comm. on the Judiciary of the U.S. Senate. 104th Cong., 2d Sess., (4 December 1996) [Cooper statement]
“Corporate Legal Times Roundtable: Protecting Trade Secrets Requires Multiple Approaches.” Corporate Legal Times, October 1998
Corporate Raiding: Handling, Preventing and Litigating the Theft of Corporate Employees and Information. New York: Practicing Law Institute, 2001
Costantini, Peter. “Information Warriors Form New Army. International Press Service, 9 August 1996. Available in 1996 WL 10768646
Council Directive 91/250/EEC. The Legal Protection of Computer Programs. May 14, 1991 O.J. (L122) 42; 44–46
Council of Europe Criminal Law Convention. Accessed 3 July 2003. Available at: 〈http://conventions.coe.int/treaty/en/Treaties/Html/173.htm〉
Crock, Stan. “Business Spies: The New Enemy Within?” Business Week, 10 February 1997
Crock, Stan, and Jonathan Moore. “Corporate Spies Feel a Sting.” Business Week, 14 July 1997
Cundiff, Victoria A. “The Economic Espionage Act and You.” In Third Annual Institute for Intellectual Property Law, PLI Patents, Copyrights, Trademarks, and Literary Property Course Handbook Series, No. G-490, 1997
Current and Projected Nat'l Sec. Threats to the U.S.: Hearings Before the Select Comm. on Intelligence of the U.S. Senate, 105th Cong., 2d Sess. 35 (1998)
“Cyber-Attacks, Information Theft, and the Online Shakedown: Preparing for and Responding to Intrusions of Computer Systems.” Electronic Banking Law and Commerce Reporter, vol. 6 (October 2001)
“Cybercrime Bleeds U.S. Corporations, Survey Shows.” Accessed 7 April 2002. Available at 〈http://www.gocsi.com/press/20020407.htm〉
“Cybercrimes.” Cyberspace Law, vol. 3, no. 1 (1998)
Daly, James. “Netherlands, Mexico Chase After Hackers.” Computerworld, 13 July 1992
Damadian, Raymond. Testimony before the House Comm. on the Judiciary Subcomm. on Crime. Federal Document Clearing House, 9 May 1996. Available in 1996 WL 10163734 [Damadian testimony]
Davis, Susan E. “Gangster Tech.” California Lawyer, June 1996
“Defense Commissary Agency.” Accessed 3 July 2003. Available at: 〈http://www.commissaries.com/〉
Denning, Dorothy E. “Cyberterrorism, Testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services.” U.S. House of Representatives. 23 May 2000. Accessed 2002. Available at: 〈http://www.cs.georgetown.edu/∼denning/infosec/cyberterror.html〉
Desmet, Thierry Olivier. “The Economic Espionage Act of 1996: Are We Finally Taking Corporate Spies Seriously?Houston Journal of International Law, vol. 22 (1999)Google Scholar
Deutch, Miguel. “The Property Concept of Trade Secrets in Anglo-American Law: An Ongoing Debate.” University of Richmond Law Review, vol. 31 (1997)Google Scholar
Deutsch, Andrew L.Practice Tip; Protecting the Co.'s Trade Secrets.” Start-Up & Emerging Companies Strategist, vol. 3 (September 2002)Google Scholar
Devost, Matthew G., Brian K. Houghton and Neal A. Pollard. “Information Terrorism: Political Violence in the Information Age.” Accessed 2002. Available at: 〈http://www.terrorism.com/Denning.html〉
DeYoung, H. G. “Thieves Among Us: If Knowledge Is Your Most Important Asset, Why Is It So Easily Stolen?” Industry Week, 17 June 1996
Dickson, Paul, and Joseph Goulden. Myth-Informed: Legends, Credos and Wrongheaded Facts We All Believe. New York, NY: Perigree Books, 1993
Dillon, Sheri A., Groene, Douglas E., and Hayward, Todd. “Computer Crimes.” American Criminal Law Review, vol. 35 (1998)Google Scholar
Dilworth, George “Toby.” “The Economic Espionage Act of 1996: An Overview.” Accessed 3 July 2003. Available at: 〈http://www.cybercrime.gov/usamay2001_6.htm〉
Doane, Michael L. “The Uruguay Round Negotiations.” In International Intellectual Property Law, edited by Anthony D'Amato and Doris Estelle Long. London; Boston: Kluwer Law International, 1997
Dobbs, Dan B. The Law of Torts. St. Paul, MN: West Group, 2001
Dolinar, Lou. “Spoofing Lets Hackers Hijack Computers, Officials Warn.” News Tribune (Tacoma), 24 January 1995
“DoS attack.” PC Webopedia Definition and Links. Accessed 5 July 2003. Available at: 〈http://webopedia.internet.com/TERMS/D/DoS_attack.html〉
Drahos, Peter, and John Braitwaite. Information Feudalism Who Owns the Knowledge Economy? London: Earthscan Publications Ltd, 2002
Dreyfuss, Robert. “Company Spies.” Mother Jones Mo Jo Wire. Accessed 30 October 1997. Available at: 〈http://www.mojones.com/motherjones/MJ94/dreyfuss.html〉
Dreyfuss, Robert “Tinker, Tailor Silicon Spy.” California Lawyer, 16 May 1996
Dreyfuss, Rochelle Cooper. “Intellectual Property Challenges in the Next Century.” Article an Alert to the Intellectual Property Bar: The Hague Judgments Convention 2001. University of Illinois Law Review, no. 1 (2001)Google Scholar
Dreyfuss, Rochelle CooperTrade Secrets: How Well Should We Be Allowed To Hide Them: The Economic Espionage Act of 1996.” Fordham Intellectual Property and Media Law Journal, vol. 9 (1998)Google Scholar
Drozdiak, William. “U.S. Spy Agency Is Out in the Cold; Some Germans Question Presence of American Eavesdropping Site.” International Herald Tribune, 25 July 2000
Dungan, Sean. “Cybersabotage.” Infoworld. Accessed 5 July 2003. Available at: 〈http://ask.elibrary.com/login.asp?c=&host=ask%2Eelibrary%2Ecom&script=%2Fgetdoc%2Easp&query=pubname%3DInfoWorld%26puburl%3Dhttp%7EC%7E%7ES%7E%7ES%7Ewww%2Einfoworld%2Ecom%26querydocid%3D29132249%40urn%3Abigchalk%3AUS%3BLib%26dtype%3D0%7E0%26dinst%3D0%26author%3DSean%2520Dugan%2520%2520%26title%3DENTERPRISE%2520COMPUTING%2520%253A%2520Cyber%2520sabotage%2520%2520%26date%3D02%2F10%2F1997%26refid%3Dency%5Fbotnm&title=ENTERPRISE+COMPUTING+%3A+Cyber+sabotage++&pubname=InfoWorld&author=Sean+Dugan++&date=02%2F10%2F1997〉
Echelon. “Answers to Frequently Asked Questions about Echelon.” Accessed 1 July 2003. Available at: 〈http://www.aclu.org/echelonwatch/faq.html〉
“Economic Espionage.” Pittsburgh Post-Gazette, 1 February 1997
“Economic Espionage of U.S. Companies on the Rise: Report.” Agence France-Presse, 24 February 1996. Available in NEXIS, News Library
Economic Espionage Act of 1996. U.S. Code 18 (2000) § 1831
“Economic Espionage – Spies Come in From the Cold, Go After U.S. Business.” Seattle Times, 6 November 1991
“Economic Espionage: The Corporate Threat.” Accessed 22 October 1996. Available at: 〈http://emporium.turnpike.net/IntlInt/econ.html〉
Edelman, Bernard. Ownership of the Image: Elements for a Marxist Theory of Law. Translated by E. Kingdom. London: Routledge and Kegan, Paul, 1979
“EDPA Sentences Taiwanese Businessman to Probation in Taxol Theft Case.” Intellectual Property Litigation Reporter, 21 July 1991
Edsall, Margaret Horton. “Away We Go, Investigate FBI Headquarters in DC.” The Capital, 11 August 2002
Eells, Richard, and Peter Nehemkis. Corporate Intelligence and Espionage. New York, NY: Macillan, 1984
“Electronic Intrusion Threats to National Security and Emergency Preparedness (NS/EP) Internet Communications.” National Communications Systems. December 2000. Accessed 2002. Available at: 〈http://www.infowarrior.org/strategy/nsepcomms.pdf〉
Elliott, Marci. “MBA Students Learn the Art of Corporate Spying.” Scripps Howard News Service, 6 August 2002
Elron Software. “The Year 2001 Corporate Web and Email Study.” Accessed 4 July 2003. Available at 〈http://www.elronsoftware.com/pdf/nforeport.pdf〉
Encyclopedia.com. Accessed 4 July 2003. Available at: 〈http://www.encyclopedia.com/searchpool.asp?target=@DOCTITLE%20Rust%20Belt〉
“Enemy Within, The.” Engineer, 9 August 2002
Epstein, Michael A. Modern Intellectual Property. Gaithersburg, MD: Aspen Law & Business, 1995
Evans-Pritchard, Ambrose. “Bored Central Intelligence Agency Spies Go Moonlighting.” Sunday Telegraph (London), 24 November 1996
Ewing, A. C. The Morality of Punishment. London: Kegan Paul, Trench, Trubner & Co., 1929
“Exclusive Interview with Charles Neal, Supervisory Special Agent, FBI Computer Crime Squad.” E-Commerce Times. Accessed 10 February 2000. Available at: 〈http://www.ecommercetimes.com/news/articles2000/000211-la.shtml〉
“Ex-Kodak Employee Sentenced.” Greensboro News and Record, 15 November 1997
Farnham, Alan. “How Safe Are Your Secrets?” Fortune, 8 September 1997
“FBI: Ethnic Targeting Common Tactic in Economic Espionage.” Defense Week, 25 March 1996
FBI Press Release. 28 April 1999. Accessed 13 December 1999. Available at: 〈http:www.fbi.gov/pressrm/pressrel/avery.htm〉 (also on file with authors)
FBI Press Room – “Congressional Statement for the Record of Charles L. Owens, Chief Financial Crimes Section Federal Bureau of Investigation, Computer Crimes and Computer Related or Facilitated Crimes.” Accessed 19 March 1997. Available at: 〈http://www.fbi.gov/congress/congress97/compcrm.htm〉
Federal Bureau of Investigation. Accessed 1 July 2003. Available at: 〈http://www.fbi.gov〉
“Feds Charge Two with Stealing Trade Secrets for China.” Intellectual Property Litigation Reporter, vol. 9 (7 January 2003)
Fein, David B., and Heaphy, Mark W.. “Companies Have Options When Systems Hacked Same Technologies That Empower Corporation Can Expose Vital Proprietary Information.” Connecticut Law Tribune, vol. 27 (15 October 2001)Google Scholar
Feinberg, Joel. The Moral Limits of the Criminal Law: Harm to Others 218–21 (1984)
Ferdinand, Pamela. “Argentine Pleas Guilty to Hacking U.S. Networks: Wire Tap Led Authorities to Arrest.” Washington Post, 20 May 1998
Fialka, John J. “Stealing the Spark: Why Economic Espionage Works in America.” Wasington Quarterly (autumn 1996)
Fialka, John J. War by Other Means: Economic Espionage in America. New York: W.W. Norton & Co., Inc., 1997
“Field Guide for Investigating Computer Crime.” Accessed 2002. Available at:〈http://www.securityfocus.com/cgi-bin/infocus.pl?head=Incidents:Forensics&id=1244〉
Fisse, Brent. “Reconstructing Corporate Criminal Law: Deterrence, Retribution, Fault and Sanctions.” Southern California Law Review, vol. 56 (1983)Google Scholar
Flaming, Todd H. “Comment, The National Stolen Property Act and Computer Files: A New Form of Property, A New Form of Theft.” University of Chicago Law School Roundtable (1993)
Florini, Ann M., and Yahya A. Dehqanzada. No More Secrets, Policy Implications of Commercial Remote Sensing Satellites. Washington, D.C.: Carnegie Endowment for International Peace, July 1999
Foley, Mark J., and Michael E. Dash, Jr. “Inevitable Disclosure Cases in the Information Age.” Legal Intelligencer (Philadelphia), 9 August 1999
Foley, Timothy D.The Role of the Central Intelligence Agency in Economic and Technological Intelligence.” Fletcher Forum of World Affairs, vol. 18 (winter/spring 1994)Google Scholar
Fonseca, Brian. “IT Security Under the Gun” Infoworld. Accessed 4 July 2003. Available at: 〈http://www.itworld.com/Sec/3832/itwnws010312security/〉
Ford, Peter. “New Cooperation in Taming the Wild Web.” Christian Science Monitor, 18 May 2000
Fraser v. Nationwide Mut. Ins. Co.,135 F.Supp.2d 623 (E.D. Pa. 2001)
Fraumann, Edwin. “Economic Espionage: Security Missions Redefined.” Public Administration Review, vol. 57 (1997)CrossRefGoogle Scholar
Fraumann, Edwin, and Joseph Koletar. “Trade Secret Safeguards.” Security Management, March 1999
Freeh, Louis. Statement. See Cooper … Economic Espionage: Joint … (1996) [Freeh statement]
Freeh, Louis. Statement. Economic Espionage: Joint Hearing Before the Select Comm. on Intelligence of the U.S. Senate and the Subcomm. on Terrorism, Tech., and Gov't Info. of the Comm. on the Judiciary of the U.S. Senate. 104th Cong., 2d Sess., (4 December 1996). Accessed June 2004. Available at: 〈http://thomas.loc.gov/cgi-bin/query/R?r104:FLD001:S62208-S62210〉 … … … … … … Loeb, Vernon. “Wanted: A Few Good Spies; After Dry Spell, Central Intelligence Agency Hiring Again.” Washington Post, 27 November 1998, sec. A, p. 01. Accessed June 2004. Available at: 〈http://www.washingtonpost.com〉
“French Won't Expel U.S. Diplomats.” Windsor Star, 28 February 1995
Friedman, Lawrence. A History of American Law. New York: Simon and Schuster, 1978
Friedman, Marc S., and Bissinger, Kristin. “‘Infojacking’: Crimes on the Information Superhighway.” Computer Law, vol. 13 (1996)Google Scholar
Gallagher, Neil J. “Cybercrime, Transnational Crime, and Intellectual Property Theft: Hearing Before the J. Econ. Comm., 105th Cong. 2–4,” 1998. Accessed 3 July 2003. Available at: 〈http://www.wiu.edu/library/govpubs/guides/intellect.htm〉 [Gallagher statement]
Gannon, John C. “Intelligence Challenges Through 2015.” National Intelligence Council, 27 April 2000. See “Speeches and Testimony.” Accessed 2002. Available at: 〈http://www.cia.gov/〉
Garner, Bryan A. Black's Law Dictionary. 7th ed. St. Paul, MN: West Group, 1999
Geist, Michael A.The Reality of Bytes: Regulating Economic Activity in the Age of the Internet.” Washington Law Review, vol. 73 (1998)Google Scholar
Gelber, Daniel S. Testimony before Permanent Subcomm … Security in Cyberspace: Hearings Before the Permanent Subcomm. on Inv. of the Senate Comm. on Governmental Affairs. 104th Cong., sess. 50 (1996) [Gelber testimony]
“General Agreement on Tariffs and Trade – Multilateral Trade Negotiations (The Uruguay Round): Agreement on Trade-Related Aspects of Intellectual Property Rights, Including Trade in Counterfeit Goods,” 15 December 1993. International Legal Materials, vol. 33 [General Agreement on Tariffs and Trade]
Gertz, Bill. “Securities and Exchange Commission Aide Quits After Leak to Chinese; Threatened Firms, FBI Kept in Dark.” Washington Times, 11 November 2002
Gertz, Bill “The New Spy: ‘90s Espionage Turns Economic.” Washington Times, 9 February 1992
Gertz, Bill “U.S. Spy Center to Track Economic Espionage.” Washington Times, 21 October 1994
Gibson, Steve. “The Strange Tale of the Denial of Service Attacks Against GRC. COM.” May 2001. Accessed 2002. Available at:〈http://grc.com/dos/grcdos.htm〉
Gilad, Benjamin, and Tamar Gilad. The Business Intelligence System: A New Tool for Competitive Advantage. New York: American Management Association, 1988
Gilpin, Robert. The Political Economy of International Relations. Princeton, NJ: Princeton University Press, 1987
Glickman, Dan. “Intelligence After the Cold War.” Kansas Journal of Law and Public Policy, vol. 3 (1994)Google Scholar
Goller, Mimi C. “Is A Padlock Better Than a Patent? Trade Secrets vs. Patents.” Wisconsin Lawyer, May 1998
Gomes, Lee. “Upstart Linux Draws a Microsoft Attack Team.” Wall St. J., 21 May 1999
Goodin, Dan. “Busting Industrial Spies.” Recorder 25 September 1996. Available in Lexis-Nexis (Legal News)
Goodman, Marc D.Making Computer Crime Count.” The FBI Law Enforcement Bulletin, vol. 70 (1 August 2001)Google Scholar
Goodman, Marc D.Why the Police Don't Care About Computer Crime.” Harvard Journal of Law and Technology, vol. 10 (1997)Google Scholar
Gordon, Sarah. “The Generic Virus Writer II.” Accessed 15 September 2003. Available at:〈http://www.research.ibm.com/antivirus/SciPapers/Gordon/GVWII.html〉
Gore, Al. “Bringing Information to the World: The Global Information Infrastructure.” Harvard Journal of Law and Technology, vol. 9 (1996)Google Scholar
Gorelick, Jamie S. Testimony … See Gelber … Security in Cyberspace: Hearings (1996) [Gorelick testimony]
“Govt Aims to Fight Industrial Espionage.” Daily Yomiuri (Toyko), 13 February 2002
Grabosky, Peter, and Russell G. Smith. Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities. Leichhardt, N.S.W.: The Federation Press, 1997
Grabosky, Peter, Russell G. Smith, and Gillian Dempsey. Electronic Theft: Unlawful Acquisition in Cyberspace. Cambridge: Cambridge University Press, 2001
Graham, Robert. “Carnivore FAQ.” Accessed 2002. Available at: 〈http://www.robertgraham.com/pubs/carnivore-faq.html〉
G. S. Rasmussen & Assoc., Inc. v. Kalitta Flying Serv., Inc., 958 F.2d 896, 900 (9th Cir. 1992)
Gutowski, Robert J.The Marriage of Intellectual Property and International Trade in the Trade-Related Aspects of Intellectual Property Rights Agreement: Strange Bedfellows or a Match Made in Heaven?Buffalo Law Review, vol. 47 (1999)Google Scholar
Halligan, R. Mark. “Intellectual Property.” National Law Journal, 9 December 1996
Halligan, R. Mark “International Protection of Trade Secrets.” Accessed 5 July 2003. Available at: 〈http://execpc.com/∼mhallign〉
Hansen, Hugh C. “Introduction to Part I: Current Developments in European Union Intellectual Property Law.” In International Intellectual Property Law and Policy, vol. 3, edited by Hugh C. Hansen. Yonkers, NY: Juris Publishing, 1998
Harmon, Amy. “Group Says It Beat Music Security But Can't Reveal How.” N.Y. Times, 15 January 2001 [2001a]
Harmon, Amy “‘Hactivists’ of All Persuasions Take Their Struggle to the Web.” N.Y. Times, 31 October 1998
Harmon, Amy “New Economy.” N.Y. Times, 13 August 2001 [2001b]
Harris, John E. Director, Office of International Affairs. Memorandum to Scott Charney, Chief, Computer Crime and Intellectual Property Section, 21 December 1998 [Harris memorandum]
Hartstein, Larry. “Man Sentenced for Conspiracy.” Atlanta Journal & Constitution, 4 June 1998
Hatcher, Michael, et al. “Computer Crimes.” American Criminal Law Review, vol. 36 (1999)Google Scholar
Health Insurance Portability and Accountability Act of 1996. Office of the Federal Register. Code of Federal Regulations, vol. 45 (1996) sec. 164.530(c)(1)
Heed, Thomas P.Comment, Misappropriation of Trade Secrets: The Last Civil RICO Cause of Action That Works.” John Marshall Law Review, vol. 30 (1996)Google Scholar
Heffernan, Richard J. Testimony with Regard to Economic Espionage Before the House Comm. on the Judiciary Subcomm. on Crime Subcomm. on Crime. Committee on the Judiciary, U.S. House of Representatives. Washington, DC: GPO, 9 May 1996 [Heffernan testimony]
Heffernan, Richard J., and D. T. Swartwood. Asis Special Report: Trends in Intellectual Property Loss. Alexandria, VA: American Society for Industrial Security (American Society of Industrial Security), 15 March 1996
Heller, Emily. “Stolen Plan No Big Secret, But Scheme Costs 90 Days.” Fulton County Daily Report, 27 August 1998. Available in Lexis-Nexis (U.S. News, Southeast Regional Sources)
Heymann, Stephen P.Legislating Computer Crime.” Harvard Journal on Legislation, vol. 34 (1997)Google Scholar
Higgins, John J. Statement. See Cooper … Economic Espionage: Joint … (1996) [Higgins statement]
Hirst, Michael, and Karen Breslau. “Closing the Deal, Trade Is the Main Focus of Bill Clinton's Foreign Policy.” Newsweek, 6 March 1995
Hitchens, Ralph. “Computer Network Security and Risk Management.” MultiTech Communications. Accessed 15 September 2003. Available at: 〈http://www.insurancetranslation.com/Language_Perils/01general.htm#12a〉
Hobson, Katherine. “Corporate Intelligence Seen as a Necessity.” Accessed 30 September 1998. Available at: 〈http://www.abcnews.com/sections/business/DailyNews/spy980924/index.html〉
Hodgson, Stephen S. “Trade Secrets, The U.S. Economic Espionage Act and You.” Chemical Engineering, December 1998
Hodkowski, William A.Comment, The Future of Internet Security: How New Technologies Will Shape the Internet and Affect the Law.” Santa Clara Computer and High Technology Law Journal, vol. 13 (1997)Google Scholar
Hohfeld, Wesley Newcomb. “Some Fundamental Legal Conceptions as Applied in Judicial Reasoning.” Yale Law Journal, vol. 23 (1913)CrossRefGoogle Scholar
Holder, Eric. Deputy Attorney General. Remarks at Press Conference Announcing the Intellectual Property Rights Initiative. Accessed 23 July 1999. Available at: 〈http://www.cybercrime.gov/dagipini.html〉
Honeynet Project. “Know Your Enemy: Statistics.” 22 July 2001. Accessed 18 January 2004. Available at: 〈http://www.honeynet.org/papers/stats/〉
Horowitz, Richard. “The Economic Espionage Act: The Rules Have Not Changed.” Competitive Intelligence Review, vol. 9 (1998)3.0.CO;2-0>CrossRefGoogle Scholar
Hosteny, Joseph N. “The Economic Espionage Act: A Very Mixed Blessing.” Intellectual Property Today, February 1998. Available in Lexis-Nexis (Legal News)
“House Judiciary Panel Backs …” (1996) ($24 billion); “Economic Espionage: The Corporate Threat” (accessed 1996) ($260 billion). Perry, Sam. “Economic Espionage: The Corporate Threat.” Accessed 22 October 1996. Available at: 〈http://emporium.turnpike.net/IntlInt/econ.html〉
Howard, Liz. “Criminal Penalties for Theft of Biological Materials.” BioPharm, vol. 15 (1 June 2002)Google Scholar
Hudson, James E., III. “Trade Secret Theft Threatens Everyone with Corporate Economic Espionage Escapades.” Houston Bus. J. Tech. Q. Accessed 1 October 1999. Available at:〈http://www.bizjournals.com/houston/stories/1999/10/4/focus13.html〉
Hulme, George V. “Guarded Optimism – Even as Companies Plug More Holes, the Threats Grow More Sophisticated.” Information Week, 8 July 2002
Husman, Hans. “Introduction to Denial of Service.” Accessed 5 July 2003. Available at: 〈http://secinf.net/misc/Introduction_to_Denial_of_Service_.html〉
Hyde, Alan. “The Wealth of Shared Information: Silicon Valley's High-Velocity Labor Market, Endogenous Economic Growth, and the Law of Trade Secrets.” Accessed 4 July 2003. Available at 〈http://andromeda.rutgers.edu/∼hyde/WEALTH.htm〉
“Independent Technical Review of the Carnivore System.” 8 December 2000. Accessed 2002. Available at: 〈http://www.usdoj.gov/jmd/publications/carniv_final.pdf〉
“India: Netspionage Coming of Age – II: William Boni and Gerald L. Kovacich on Business, Crime and Security in the 21st Century Global Marketplace.” Global News Wire, 3 September 2001
Institute for Security Technology Studies, Dartmouth College. “Cyber Attacks During the War on Terrorism: A Predictive Analysis.” September 22, 2001. Accessed 15 September 2003. Available at: 〈http://www.ists.dartmouth.edu/ISTS/counterterrorism/cyber_attacks.htm〉
Intel Corp. “2000 Annual Report.” Accessed 3 July 2003. Available at: 〈http://www.intel.com/intel/annual00/〉
Inter-American Convention on Corruption. “Signatories.” Accessed 3 July 2003. Available at: 〈http://www.oas.org/juridico/english/sigs/b-58.html〉
“Interception Capabilities 2000.” European Parliament, Scientific and Technological Options Assessment (STOA). Accessed 15 September 2003. Available at: 〈http://www.cyber-rights.org/interception/stoa/interception_capabilities_2000.htm〉
Intermedics, Inc. v. Ventritex, Inc., 822 F. Supp. 634, 642-43 (N.D. Cal. 1993)
“Internet Insecurity.” Time, 2 July 2001
“Israel Indicts Hackers.” Pittsburgh Post-Gazette, 10 February 1999
“Israeli Teenager Questioned in Pentagon Hacking Case.” L.A. Times, 19 March 1998
Iwata, Edward. “More U.S. Trade Secrets Walk Out Door with Foreign Spies.” USA Today, 13 February 2003
Jackamo, Thomas J., III. “From the Cold War to the New Multilateral World Order: The Evolution of Covert Operations and the Customary International Law of Non-Intervention.” Virginia Journal of International Law, vol. 32, no. 88 (1992). Citing Bill Gertz, “The New Spy: ‘90s Espionage Turns Economic,” Washington Times, 9 February 1992
Jager, Melvin F. Trade Secrets Law. New York: Clark Boardman Callaghan & Co, 1996
James, Michael. “Small Thefts, Big Trouble.” Baltimore Sun, 22 January 2001
“Japan Changes Its Espionage Laws.” Intelligence Online, no. 423, 14 February 2002
Jauvert, Vincent. “Espionage – How France Listens to the Whole World.” 5 April 2001. Accessed 2002. Available at:〈http://all.net/iwar/archive/2001Q2/0098.html〉
Java Security. “Denial of Service.” Accessed 5 July 2003. Available at: 〈http://java.sun.com/sfaq/denialOfService.html〉
Jopeck, Ed, and Ken Sawka. “Foreign Espionage: Is Your Business at Risk?” Accessed 25 September 1996. Available at: 〈http://www.scip.org/jan3.html〉
“Judge Convicts Man in Trade-Secret Case.” Milwaukee Journal Sentinel, 10 December 1999
Kalitka, Peter F.Do They Know What You Know?Security Management, vol. 44 (1 September 2000)Google Scholar
Kant, Immanuel. The Philosophy of Law: An Exposition of the Fundamental Principles of Jurisprudence as the Science of Right. Translated From German by W. Hastie, B.D. (Edinburgh: T. & T. Clark, 1887)
Kanuck, Sean P.Information Warfare: New Challenges for Public International Law.” Harvard International Law Journal, vol. 37 (1996)Google Scholar
Kaslow, Amy. “Behind White House Role as Pitchman for U.S. Firms.” Christian Science Monitor, 28 March 1995
Katsh, Salem M., and Dierks, Michael P.. “Globally, Trade Secrets Are All Over the Map.” Journal of Property Rights, vol. 7, no. 11 (1995)Google Scholar
Keithly, David M., and Ferris, Stephen P.. “U.S. Companies Exposed to Industrial Espionage; Point of View.” National Defense, vol. 87 (1 September 2002)Google Scholar
Kelsey, Tim, and David Leppard. “American Spies Hack into Euro Computers to Steal Trade Secrets.” Sunday Times (London), 4 August 1996
Kephart, Jeffrey, Gregory Sorkin, David Chess, and Steve White. “Fighting Computer Viruses. Scientific American, November 1997. Accessed 2002. Available at: 〈http://www.sciam.com/1197issue/1197kephart.html〉
Kerr, Orin. “Internet Surveillance Law After the USA Patriot Act.” Northwestern Law Review, vol. 97 (2003)Google Scholar
Kerr, Thomas M.‘Trade Secrets,’ i.e., Confidential Business Information or Business Intelligence.” Pittsburgh Legal Journal, vol. 145 (December 1997)Google Scholar
Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 481–82 (1974)
King, Neil, Jr., and Jess Bravin. “Call It Mission Impossible, Inc. – Corporate Spying Firms Thrive.” Wall St. J., 3 July 2000
King, Neil, Jr., and Jess Bravin “Corporate-Spying Firms Thrive: Central Intelligence Agency Veterans, Dumpster-Divers Work in ‘Competitive Intelligence’: If the Trash is on the Curb, It's Fair Game.” Wall St. J., 4 July 2000, Europe edition
Klevorick, Alvin K.Legal Theory and the Economic Analysis of Torts and Crimes.” Columbia Law Review, vol. 85 (1985)CrossRefGoogle Scholar
Knoll, Amy. “Comment, Any Which Way But Loose: Nations Regulate the Internet.” Tulane Journal of International and Comparative Law, vol. 4 (1996)Google Scholar
Knowles, J. “IW Battlelab to Go Operational This Month.” Journal of Electronic Defense, 1 June 1997
Kober, Stanley. “Why Spy? The Uses and Misuses of Intelligence.” USA Today Magazine, 1 March 1998
Korah, Valentine. An Introductory Guide to European Commission Competition Law and Practice. 7th ed. Oxford: Hart Publishing, 2000
Lamb, Robert. “Economic and Financial Issues in Intellectual Property.” In International Intellectual Property Law and Policy, vol. 3, edited by Hugh C. Hanson. Yonkers, NY: Juris Publishing, 1998
Landers, Jim. “Foreign Spies Target Corporate Secrets.” Dallas Morning News, 7 October 1996
Landes, William, David, Friedman, and Posner, Richard A.. “Some Economics of Trade Secret Law.” Journal of Economic Perspectives, vol. 5, no. 1 (1991)Google Scholar
Lange, Larry. “Trust a Hacker Under 30? You'd Better.” Elec. Engineering Times, 19 August 1996
Lao, Marina. “Federalizing Trade Secrets Law in an Information Economy.” Ohio State Law Journal, vol. 59 (1998)Google Scholar
Latham, A. Copyright Law. New York: Rothman, 1979
Leaffer, Marshall A. International Treaties on Intellectual Property. 2nd ed. Washington, DC: BNA Inc., 1997
Leob, Vernon. “Wanted: A Few Good Spies.” Washington Post, 27 November 1998
Leob, Vernon, and Walter Pincus. “Invisible on the Inside; Knowing System Helped Suspect Go Undetected, FBI Says.” Washington Post, 21 February 2001
Lisser, Eleena de. “Hearing and Seeing Business Travel Blab and Laptop Lapses.” Wall St. J., 8 November 1999
“Local Man Pleads Guilty in Trade Theft Case.” Telegram & Gazette (Massachusetts), 12 October 2002
Locke, John. Two Treatises on Civil Government. Edited by H. Morley. London: George Routledge and Sons, 1884
Lowry, Suellen. “Inevitable Disclosure Trade Secrets Disputes: Dissolutions of Concurrent Property Interests.” Stanford Law Review, vol. 40 (1988)CrossRefGoogle Scholar
Lowry, Tom. “Secrets at Stake, Fears of Chinese Spying Mount.” USA Today, 29 January 1998
Lynch, Ian. “EU Makes Blueprint for Echelon Inquiry.” Accessed 9 September 2000. Available at: 〈http://www.vnunet.com/News/1110830〉
Lynch, Ian Overseas Offices Fall Prey to Crackers. Accessed 5 July 2003. Available at: 〈http://www.vnunet.com/News/1115279〉
MaCodrum, Donald, Hedieh, Nasheri, and O'Hearn, Timothy J.. “Spies in Suits: New Crimes of the Information Age from the United States and Canada Perspectives.” Information and Communications Technology Law, vol. 10, no. 2 (June 2001)CrossRefGoogle Scholar
“Man Charged in Theft of Trade Secrets.” Des Moines Register, 26 September 1995
“Man Offering to Sell Secrets to Rival Newspaper Sentenced.” Associated Press State & Local Wire, 25 August 1998. Available in Lexis-Nexis (Wire Service Reports)
Mangel, John. “Economic Espionage Losses in the Billions Experts Say.” Plain Dealer (Cleveland), 30 July 2001
Mann, Charles C. “The Mole in the Machine.” The New York Times Magazine, 25 July 1999. Accessed 15 September 2003. Available at:〈http://www.nytimes.com/library/magazine/home/19990725mag-tech-secure-secrets.html〉
Lynch, Ian Overseas Offices Fall Prey to Crackers. Accessed 5 July 2003. Available at: 〈http://www.vnunet.com/News/1115279〉
MaCodrum, Donald, Hedieh, Nasheri, and O'Hearn, Timothy J.. “Spies in Suits: New Crimes of the Information Age from the United States and Canada Perspectives.” Information and Communications Technology Law, vol. 10, no. 2 (June 2001)CrossRefGoogle Scholar
“Man Charged in Theft of Trade Secrets.” Des Moines Register, 26 September 1995
“Man Offering to Sell Secrets to Rival Newspaper Sentenced.” Associated Press State & Local Wire, 25 August 1998. Available in Lexis-Nexis (Wire Service Reports)
Mangel, John. “Economic Espionage Losses in the Billions Experts Say.” Plain Dealer (Cleveland), 30 July 2001
Mann, Charles C. “The Mole in the Machine.” The New York Times Magazine, 25 July 1999. Accessed 15 September 2003. Available at:〈http://www.nytimes.com/library/magazine/home/19990725mag-tech-secure-secrets.html〉
Mann, Kenneth. “Punitive Civil Sanctions: The Middleground Between Criminal and Civil Law.” Yale Law Journal, vol. 101 (1992)CrossRefGoogle Scholar
Marcus, Jon. “Scientist Arrested Over Trade Espionage.” N.Y. Times, 30 August 2002, Higher Education Supplement, no. 1553
Markey, John K., and Boyle, James F.. “New Crimes of the Information Age.” Boston Bar Journal, vol. 43 (May/June 1999)Google Scholar
Marriot, Anne. “Companies Gamble on Keeping Secrets.” Washington Times, 20 March 1997
Martin, Brian. “Against Intellectual Property.” Philosophy and Social Action, vol. 21 (1995)Google Scholar
Mason, J. Derek, et al. “The Economic Espionage Act: Federal Protection for Corporate Trade Secrets.” Computer Law, vol. 16 (1999)Google Scholar
Mathiason, Garry G., and Roland M. Juarez. “The Electronic Workplace: An Overview.” CEB's California Business Law Reporter, 1995
Matthews, Chris. “FBI Has Developed System for Monitoring the Internet.” Hardball with Chris Matthews, CNBC News Transcripts, 18 July 2000
McAllester, Matthew. “Feds Aid Miami Company in Global Hunt for Hacker.” Newsday, 8 June 1997
McCarthy, Michael. “The Pentagon Worries That Spies Can See Its Computer Screens.” Wall St. J., 7 August 2000
McCartney, Scott. “System Breach Is Stirring Up Airline Rivalry.” Wall St. J., 27 June 2000
McCurdy, Dave. “Glasnost for the Central Intelligence Agency.” Foreign Affairs, vol. 73 (January/February 1994)Google Scholar
McGugan, Ian. “The Spy Who Came in for the Gold.” Canadian Business, 1 May 1995
McMorris, Frances A. “Corporate-Spy Case Rebounds on Bristol.” Wall. St. J., 2 February 1998
“Men Sentenced for Trying to Sell Prototype Computers.” Associated Press State and Local Wire, 4 December 1998. Available in Lexis-Nexis (Wire Service Reports)
Meyerowitz, Steven A., and Fryer, Donna. “Competitive Intelligence: A New Revenue Stream for Firms Looking to Gain an Edge.” New York Law Journal News, vol. 228, 20 August 2002Google Scholar
Milgrim, Roger M. Milgrim on Trade Secrets. New York: Matthew Bender, 1999
Mills, Mike. “Testing the Limits on Trade Secrets; Kodak Lawsuit Is Likely to Have Broad Impact on Use of Confidential Data.” Washington Post, 9 December 1997
Mock, Lois F., and Dennis Rosenbaum. A Study of Trade Secret Theft in High-Technology Industries. Unpublished manuscript on file with the National Institute of Justice, May 1988
Molander, Roger, Peter Wilson, David Mussington, and Richard Mesic. “Strategic Information Warfare Rising.” Draft RAND Study. Santa Monica, CA: 1998
Moore, David. “The Spread of the Code-Red Worm (CRv2).” Accessed 2002. Available at: 〈http://www.caida.org/analysis/security/code-red/〉
Moore, David, Geoffrey M. Voelker, and Stefan Savage. “Inferring Internet Denial-of-Service Activity.” 2001. Accessed 2002. Available at: 〈http://www.caida.org/outreach/papers/backscatter/usenixsecurity01.pdf〉
Moore, David, Geoffrey M. Voelker, and Stefan Savage. “Inferring Internet Denial-of-Service Activity.” 2001. Accessed 2002. Available at: 〈http://www.caida.org/outreach/papers/backscatter/usenixsecurity01.pdf〉
Morris, Nomi, et al. “The New Spy Wars: Canada Is a Key Target in the Global Race for Economic Secrets.” Maclean's, 2 September 1996
Morse, Paige Marie. “Protecting Trade Secrets.” Chemical and Engineering News, 1 December 1997
Mossinghoff, Gerald J., et al. “The Economic Espionage Act: A New Federal Regime of Trade Secret Protection.” Journal of the Patent and Trademark Office Society, vol. 79 (1997)Google Scholar
Moyer, Marc A.Section 301 of the Omnibus Trade and Competitiveness Act of 1988: A Formidable Weapon in the War Against Economic Espionage.” Northwestern Journal of International Law and Business, vol. 15 (1994)Google Scholar
Mueller, Robert S., III. Director, Federal Bureau of Investigation. Statement before the Senate Select Committee on Intelligence. International Terrorism: Hearing Before the Senate Select Comm. on Intelligence. 104th Cong., 2d sess. (1 August 1996) [Mueller statement]
Muller, Joann. “Raytheon Unit Is Accused of Industrial Espionage; Florida Firm Alleges Foul in $450 Million Aircraft Pact.” Boston Globe, 22 January 1997
Murray, Kevin D. “Ten Spy-Busting Secrets.” Accessed 3 July 2003. Available at: 〈http://www.tscm.com/murray.html〉
Nadlemann, Ethan A. Cops Across Borders: The Internationalization of U.S. Criminal Law Enforcement. University Park: Pennsylvania State University Press, 1993
Nash, Kim S. “Symantec Executives Charged with Stealing Borland Trade Secrets.” Computerworld, 8 March 1993
Nasheri, Hedieh. “Digital Crime.” Encyclopedia of Crime and Punishment, vol. 2 (2002). Great Barrington, MA: Berkshire Publishing Group, 2002
Nasheri, HediehThe Intersection of Technology Crimes and Cyberspace in Europe: The Case of Hungary.” Information and Communications Technology Law, vol. 12, no. 1 (2003)CrossRefGoogle Scholar
Nasheri, Hedieh, and O'Hearn, Timothy J.. “Crime and Technology: New Rules for a New World.” Information and Communications Technology Law, vol. 7, no. 2 (June 1998)CrossRefGoogle Scholar
Nasheri, Hedieh, and O'Hearn, Timothy J.Hightech Crimes and the American Economic Machine.” International Review of Law, Computers and Technology, vol. 13, no. 2 (November 1999)Google Scholar
Nasheri, Hedieh, and O'Hearn, Timothy J.The Worldwide Search for Techno-thieves: International Competition v. International Co-operation.” International Review of Law, Computers and Technology, vol. 13, no. 3 (December 1999)CrossRefGoogle Scholar
Nasheri, Hedieh, and Timothy J. O'Hearn “The Worldwide Search for Techno-thieves: International Competition v. International Co-operation.” In Cyberspace Crime, ed. D. S. Wall (London: Ashgate, 2002). First published in International Review of Law, Computers and Technology, vol. 13, no. 3 (December 1999)
National Counterintelligence Center. “Counterintelligence News & Developments,” no. 1. Accessed 3 July 2003. Available at: 〈http://www.loyola.edu/dept/politics/hula/cind1.html〉
National Fraud Center, Inc., The, a LEXIS-NEXIS Company. “The Growing Global Threat of Economic and Cyber Crime.” A white paper produced in conjunction with The Economic Crime Investigation Institute, Utica College, December 2000
National Infrastructure Protection Center (National Infrastructure Protection Center). Accessed 3 July 2003. Available at: 〈http://www.nipc.gov〉
National Legal Center for the Public Interest. Judicial Legislative Watch Report, vol. 19, no. 6 (June 1998)
National Stolen Property Act. United States Code. Title 18, sec. 2314 (1940)
Nelan, Bruce. “A New World for Spies.” Time, 5 July 1993
Nelson, Carrington. “Ex-Engineer Jailed for Stealing Secrets.” Tennessean, 29 April 1998
Nelson, Emily, and George Anders. “Wal-Mart, Amazon.com Settle Fight Over Recruitment and Trade Secrets.” Wall St. J., 6 April 1999
Nelson, Emily, George Anders, and Raju Narisetti. “How Kodak, Fearing Theft of Trade Secrets, Mounted Its Own Sting.” Wall St. J., 25 November 1996
Nelson, Jack. “Spies took $300-Billion Toll on U.S. Firms in '97.” L.A. Times, 12 January 1998
“Network Security: The Business Value Proposition.” The Consultant Registry. Accessed 15 September 2003. Available at: 〈http://www.consultant-registry.com/delivery/SWP2.pdf〉
National Legal Center for the Public Interest. Judicial Legislative Watch Report, vol. 19, no. 6 (June 1998)
National Stolen Property Act. United States Code. Title 18, sec. 2314 (1940)
Nelan, Bruce. “A New World for Spies.” Time, 5 July 1993
Nelson, Carrington. “Ex-Engineer Jailed for Stealing Secrets.” Tennessean, 29 April 1998
Nelson, Emily, and George Anders. “Wal-Mart, Amazon.com Settle Fight Over Recruitment and Trade Secrets.” Wall St. J., 6 April 1999
Nelson, Emily, George Anders, and Raju Narisetti. “How Kodak, Fearing Theft of Trade Secrets, Mounted Its Own Sting.” Wall St. J., 25 November 1996
Nelson, Jack. “Spies took $300-Billion Toll on U.S. Firms in '97.” L.A. Times, 12 January 1998
“Network Security: The Business Value Proposition.” The Consultant Registry. Accessed 15 September 2003. Available at: 〈http://www.consultant-registry.com/delivery/SWP2.pdf〉
“Nike Sued for Hacking Costs.” Newswire, 28 March 2001
Nimmer, Raymond T. The Law of Computer Technology. 3rd ed. St. Paul, MN: West Group, 1997
“911 Lines Tied Up by Hacker – In Sweden.” Orlando Sentinel, 8 March 1997
1998 Global Software Piracy Report. International Planning and Research Corporation for the Business Software Alliance, May 1999
“1998 Organization for Economic Cooperation and Development Convention: An Impetus for Worldwide Changes in Attitudes Toward Corruption in Business Transactions.” American Business Law Journal, vol. 37 (2000)
No Electronic Theft (Net) Act, Pub. L. No. 105–147, 1997 U.S.C.C.A.N. (111 Stat. 2678). United States Code Congressional and Administrative News, 105th Congress, First Session, 1997, vol. 2. St. Paul: West Group, 1998
No. 02-20145-JW, indictment issued (N.D. Cal. Dec. 4, 2002). [Indictment by Ross W. Nadel (Assistant U.S. Attorney) against Fei Ye and Ming Zhong in USA v. Ye(before Judge James Ware); USDOJ press release at http://www.cybercrime.gov/yeIndict.htm]
Nobel, Johan J. Ingles-le. “Cyberterrorism Hype.” Jane's Intelligence Review, 1 December 1999
North American Free Trade Agreement (North American Free Trade Agreement).” International Legal Materials, vol. 32 (17 December 1992)
Norton-Taylor, Richard. “Spooky Business.” Guardian (Manchester, GB), 26 March 1997
Note, Trade Secrets in Discovery: From First Amendment Disclosure to Fifth Amendment Protection.” Harvard Law Review, vol. 104 (1991)
Novell, Inc. v. Weird Stuff, Inc., No. C92-20467 JW/EAI, 1993 U.S. Dist. Lexis 6674, at 5 (N.D. Cal. May 14, 1993)
Nyberg, Alix. “The Spy Who Bugged Me.” CFO, The Magazine for Senior Financial Executives, vol. 16 (1 September 2000)Google Scholar
Organization for Economic Co-operation and Development (Organization for Economic Cooperation and Development). “About Organization for Economic Cooperation and Development.” Accessed 3 July 2003. Available at: 〈http://www.oecd.org/EN/home/0,EN-home-0-nodirectorate-no-no-no-0,FF.html〉
Organization for Economic Co-operation and Development (Organization for Economic Cooperation and Development) Computer Related Crime: Analysis of Legal Policy. Washington, DC: Organization for Economic Cooperation and Development, 1986
Office of the National Counterintelligence Executive. “Counterintelligence Executive Notes 13–96.” Accessed 4 July 2003. Available at: 〈http://www.nacic.gov〉
O'Harrow, Robert, Jr. “Hacker Accesses Patient Records; Thousands of Files Easily Downloaded.” Washington Post, 9 December 2000
O'Hearn, Timothy, and Sozio, Stephen. “Tech Secrets Can Be Troublesome, Economic Espionage Act of 1996.” Communications News, vol. 38 (1 September 2001)Google Scholar
Olivenbaum, Joseph M.Ctrl-Alt-Delete: Rethinking Federal Computer Crime Legislaton.” Seton Hall Law Review, vol. 27, no. 4 (1997)Google Scholar
O'Reilly, John. “Online Propaganda the Corporate Way.” Accessed 5 July 2003. Available at: 〈http://www.vnunet.com/analysis/1114674〉
O'Sullivan, Sean. “N.Y. Man Pleads Guilty To Stealing Trade Secrets.” News Journal, 18 October 2002
Pace, Christopher Rebel J.The Case for a Federal Trade Secrets Act.” Harvard Journal of Law and Technology, vol. 8 (1995)Google Scholar
Paine, Thomas. “The American Crisis.” In Heritage of American Literature Beginnings to the Civil War, edited by James E. Miller, Jr. Fort Worth, TX: Harcourt Brace Jovanovich Collage Publisher, 1991
“Pair from Cupertino and San José, California, Indicted for Economic Espionage and Theft of Trade Secrets from Silicon Valley Companies,” U.S. Department of Justice press release December 4, 2002
Palmer, Caroline. “How to Spot Your Office Spy.” Observer (London), 17 October 1999
Pappalardo, Denise. “Avoiding Future Denial-of-Service Attacks.” Network World Fusion, 23 February 2000
Paris Convention of Industrial Property. United Nations Treaty Series, vol. 828 (20 March 1883) [Paris convention]
Park, W. H. “The International Law of Intelligence Collection.” In National Security Law, edited by John Norton Moore, et al. Durham, NC: Carolina Academic Press, 1990
Parker, D. B. Computer Crime: Criminal Justice Resource Manual. Washington, DC: Department of Justice, National Institute of Justice, 1989
Parra, Esteban. “The Enemy Is in the Internet.” The News Journal, 16 December 2002
Pasternak, Douglas, and Gordon Witkin. “The Lure of the Steal.” U.S. News and World Reports, 4 March 1996
Peabody v. Norfolk, 98 Mass. 452, 457 (Mass. 1868)
Perritt, Henry H.Jurisdiction in Cyberspace.” Villanova Law Review, vol. 41 (1996)Google Scholar
Perry, Sam. “Economic Espionage and Corporate Responsibility.” CJ International, March/April 1995
Persico, Brian A.Under Siege: The Jurisdictional and Interagency Problems of Protecting the National Information Infrastructure.” CommLaw Conspectus, vol. 7 (1999)Google Scholar
Petersen, Melody. “Lawsuits by Rivals Accuse Textile Maker of Corporate Espionage.” N.Y. Times, 13 October 1998
Pethia, Richard. “Cyber Security – Growing Risk from Growing Vulnerability.” Testimony before the House Select Committee on Homeland Security Subcommittee on Cybersecurity, Science, and Research and Development. Hearing on Overview of the Cyber Problem – A Nation Dependent and Dealing with Risk. 25 June 2003 [Pethia testimony]
Piirto, Rebecca. “Health, Competitive Intelligence; What You Don't Know Will Hurt You.” Marketing Tools, July/August 1996
Piller, Charles. “Anti-Hacker Fights for Respect, Internet: Federal Agency Created to Combat the Rise in Cyber-crime Is Viewed with Distrust by Firms It Is Supposed to Protect.” L.A. Times, 5 March 2000
Pincus, Walter. “Agencies Debate Value of Being Out in the Cold: Spies Under “Nonofficial Cover” Are Among Most Sensitive Operations.” Washington Post, 12 January 1996
Pitz, Marylynne. “Brothers Charged in Scheme to Sell PPG Trade Secrets; Competitor Offered Documents, FBI Says.” Pittsburgh Post-Gazette, 10 December 1996
Pollit, Mark. “Cyberterrorism – Fact or Fancy?” Accessed 15 September 2003. Available at: 〈http://www.cs.georgetown.edu/∼denning/infosec/pollitt.html〉
O'Harrow, Robert, Jr. “Hacker Accesses Patient Records; Thousands of Files Easily Downloaded.” Washington Post, 9 December 2000
O'Hearn, Timothy, and Sozio, Stephen. “Tech Secrets Can Be Troublesome, Economic Espionage Act of 1996.” Communications News, vol. 38 (1 September 2001)Google Scholar
Olivenbaum, Joseph M.Ctrl-Alt-Delete: Rethinking Federal Computer Crime Legislaton.” Seton Hall Law Review, vol. 27, no. 4 (1997)Google Scholar
O'Reilly, John. “Online Propaganda the Corporate Way.” Accessed 5 July 2003. Available at: 〈http://www.vnunet.com/analysis/1114674〉
O'Sullivan, Sean. “N.Y. Man Pleads Guilty To Stealing Trade Secrets.” News Journal, 18 October 2002
Pace, Christopher Rebel J.The Case for a Federal Trade Secrets Act.” Harvard Journal of Law and Technology, vol. 8 (1995)Google Scholar
Paine, Thomas. “The American Crisis.” In Heritage of American Literature Beginnings to the Civil War, edited by James E. Miller, Jr. Fort Worth, TX: Harcourt Brace Jovanovich Collage Publisher, 1991
“Pair from Cupertino and San José, California, Indicted for Economic Espionage and Theft of Trade Secrets from Silicon Valley Companies,” U.S. Department of Justice press release December 4, 2002
Palmer, Caroline. “How to Spot Your Office Spy.” Observer (London), 17 October 1999
Pappalardo, Denise. “Avoiding Future Denial-of-Service Attacks.” Network World Fusion, 23 February 2000
Paris Convention of Industrial Property. United Nations Treaty Series, vol. 828 (20 March 1883) [Paris convention]
Park, W. H. “The International Law of Intelligence Collection.” In National Security Law, edited by John Norton Moore, et al. Durham, NC: Carolina Academic Press, 1990
Parker, D. B. Computer Crime: Criminal Justice Resource Manual. Washington, DC: Department of Justice, National Institute of Justice, 1989
Parra, Esteban. “The Enemy Is in the Internet.” The News Journal, 16 December 2002
Pasternak, Douglas, and Gordon Witkin. “The Lure of the Steal.” U.S. News and World Reports, 4 March 1996
Peabody v. Norfolk, 98 Mass. 452, 457 (Mass. 1868)
Perritt, Henry H.Jurisdiction in Cyberspace.” Villanova Law Review, vol. 41 (1996)Google Scholar
Perry, Sam. “Economic Espionage and Corporate Responsibility.” CJ International, March/April 1995
Persico, Brian A.Under Siege: The Jurisdictional and Interagency Problems of Protecting the National Information Infrastructure.” CommLaw Conspectus, vol. 7 (1999)Google Scholar
Petersen, Melody. “Lawsuits by Rivals Accuse Textile Maker of Corporate Espionage.” N.Y. Times, 13 October 1998
Pethia, Richard. “Cyber Security – Growing Risk from Growing Vulnerability.” Testimony before the House Select Committee on Homeland Security Subcommittee on Cybersecurity, Science, and Research and Development. Hearing on Overview of the Cyber Problem – A Nation Dependent and Dealing with Risk. 25 June 2003 [Pethia testimony]
Piirto, Rebecca. “Health, Competitive Intelligence; What You Don't Know Will Hurt You.” Marketing Tools, July/August 1996
Piller, Charles. “Anti-Hacker Fights for Respect, Internet: Federal Agency Created to Combat the Rise in Cyber-crime Is Viewed with Distrust by Firms It Is Supposed to Protect.” L.A. Times, 5 March 2000
Pincus, Walter. “Agencies Debate Value of Being Out in the Cold: Spies Under “Nonofficial Cover” Are Among Most Sensitive Operations.” Washington Post, 12 January 1996
Pitz, Marylynne. “Brothers Charged in Scheme to Sell PPG Trade Secrets; Competitor Offered Documents, FBI Says.” Pittsburgh Post-Gazette, 10 December 1996
Pollit, Mark. “Cyberterrorism – Fact or Fancy?” Accessed 15 September 2003. Available at: 〈http://www.cs.georgetown.edu/∼denning/infosec/pollitt.html〉
Posner, Richard A.An Economic Theory of the Criminal Law.” Columbia Law Review, vol. 85 (1985)CrossRefGoogle Scholar
Powell, Daniel P.An Introduction to the Law of Trade Secrets.” Colorado Lawyer, vol. 23 (1994)Google Scholar
Prentice, Robert A.The Future of Corporate Disclosure: The Internet, Securities Fraud, and Rule 10b-5.” Emory Law Journal, vol. 47 (1998)Google Scholar
Preston, Candace L. “Out-of-work Spies Find New Niche in Corporate Espionage.” Business First-Columbus, 28 November 1997
“Proprietary Information Theft #1 Threat to Information Systems; Vanguard Introduces ezRIGHTS, Ground Breaking Technology That Eliminates Risk.” Business Wire, 21 October 2002
Ramo, Joshua Cooper. “A Survivor's Tale.” Time, 29 December 1997
Rathmell, Andrew. “Assessing the IW Threat from Sub-state Groups.” In Cyberwar 2.0: Myths, Mysteries and Reality, edited by Alan D. Campen and Douglas H. Dearth. Fairax, Virginia: AFCEA International Press, 1998
“Relevant Intelligence in the Post-Cold War World.” Accessed 10 September 1998, Available at: 〈http://www.venable.com/govern/fulltest.htm〉
Reno, Janet. Attorney General of the United States. Before the United States Senate Committee on Appropriations Subcommittee on Departments of Commerce, Justice, State, the Judiciary, and Related Agencies, Cybercrime. Accessed 4 July 2003. Available at 〈http://www.usdoj.gov/archive/ag/testimony/2000/reno21600.htm〉 [Reno statement]
Reno, Janet Keynote address at the Meeting of the P8 Senior Experts' Group on Transnational Organized Crime (Chantilly, VA). 21 January 1997. Accessed 20 July 2003. Available at: 〈http://www.usdoj.gov/criminal/cybercrime/agfranc.htm〉 [Reno keynote address]
Reno, Janet “The Threat of Digital Theft: Intellectual Property Theft Is Faster, Costlier, and More Dangerous Than Ever.” Accessed 21 November 2001. Available at: 〈http://www.cybercrime.gov/Agdigitaltheft.htm〉
“Reno Opposes Eased Export Control.” Associated Press, 13 July 1999. Available at 1999 WL 17823820
Restatements of Torts, sec. 757 (1939): Chapter 36, § 757: “Liability for Disclosure or Use of Another's Trade Secret – General Principle.” In Restatement of the Law of Torts: As Adopted and Promulgated by the American Law Institute at Washington, D.C., May 11, 1934. St. Paul: American Law Institute Publishers, 1934–1939
Restatement (First) of Torts, sec. 757 (1939). Chapter 36, § 757: “Liability for Disclosure or Use of Another's Trade Secret – General Principle.” In Restatement of the Law of Torts: As Adopted and Promulgated by the American Law Institute at Washington, D.C., May 11, 1934. St. Paul: American Law Institute Publishers, 1934–1939
Restatement of Torts, sec. 757 cmt. b (1939). “Liability for Disclosure or Use of Another's Trade Secret – General Principle,” in Chapter 36: Miscellaneous Trade Practices, Restatement of the Law of Torts: As Adopted and Promulgated by the American Law Institute at Washington, D.C., May 11, 1934. St. Paul: American Law Institute Publishers, 1934–1939
Restatement (Third) of Unfair Competition, sec. 39, comment a (1995). Section 39: “Definition of Trade Secret,” comment a. In Restatement (Third) of the Law, Unfair Competition: As Adopted by the American Law Institute at Washington, D.C., May 11, 1993. St. Paul: American Law Institute Publishers, 1995
Restatement (Third) of Unfair Competition sec. 39 (1995). “Definition of Trade Secret” Restatement (Third) of the Law, Unfair Competition: As Adopted by the American Law Institute at Washington, D.C., May 11, 1993. St. Paul: American Law Institute Publishers, 1995
Restatement of Torts, sec. 757 (1939). “Liability for Disclosure or Use of Another's Trade Secret – General Principle,” in Chapter 36: Miscellaneous Trade Practices, Restatement of the Law of Torts: As Adopted and Promulgated by the American Law Institute at Washington, D.C., May 11, 1934. St. Paul: American Law Institute Publishers, 1934–1939
“Revictimization of Companies by the Stock Market Who Report Trade Secret Theft Under the Economic Espionage Act, The.” Business Law, vol. 57 (November 2001)
“Reviewing Current Issues on Trade Secrets.” New York Law Journal, 1 April 2002
Richelson, Jeffrey. “Examining US Intelligence Failures.” Jane's Intelligence Review, vol. 12 (1 September 2000)Google Scholar
Robbins, Tom. “In the New World of Espionage, Targets Are Economic.” Houston Chronicle, 11 September 1994
Rockwell Graphics Sys., Inc. v. Dev Indus., Inc., 91 F3d 914, 917 n.3 (7th Cir. 1996)
Rodger, Will. “Warrants for Online Data Soar, Demands Served on Internet, E-mail Providers Up 800%, Study Finds.” USA Today, 28 July 2000
Ros-Lehtinen, Ileana. U.S. Representative. Holding Hearing on Corporate and Industrial Espionage and Its Effects. House International Relations Committee: Subcommittee on International Economic Policy and Trade Holds Hearing on Corporate and Industrial Espionage. FDCH Political Transcripts, Committee Hearing, 13 September 2000 [Ros-Lehtinen hearing]
Rosencrance, Linda. “Survey: Retail Fraud More Prevalent for Online Vendors.” ComputerWorld, 24 July 2000
Rovella, David E. “Preparing for a New Cyberwar: Justice Dept. Seeks Lawyers, Revised Laws to Fight Net Crimes.” National Law Journal, 20 March 2000
Rovella, David E. “Trail Nears for Untested Secrets Law.” National Law Journal, 8 March 1999
Rush, Mark A., Feczko, Mark D., and Manganello, Thomas D.. “Protecting Trade Secrets from Dumpster Divers and Other Snoops: The Law Protects Those That Protect Themselves.” Mealey's Litigation Report: Trademarks, vol. 8, no. 12 (7 August 2000)Google Scholar
“Russians Arrest 6 in Computer Thefts.” N.Y. Times, 27 September 1995
Ryan, Michael P. Knowledge Diplomacy, Global Competition and the Politics of Intellectual Property. Washington, DC: Brookings Institution Press, 1998
Ryberg, William. “New Washers Put Town on Spy Alert.” Chicago Sun-Times, 2 January 1997
Samuels, Linda B., and Johnson, Brian K.. “The Uniform Trade Secrets Act: The States' Response.” Creighton Law Review, vol. 24 (1990)Google Scholar
Sanger, David E., and Tim Weiner. “Central Intelligence Agency Targets Allies But Still Misses.” Sacramento Bee, 22 October 1995
Savage, Joseph R. Jr., and Lauren A. Stagnone. “Plot to Steal Trade Secrets Alleged.” Record (Bergen County, NJ), 29 July 1998 [1998a]
Savage, Joseph R. Jr., and Lauren A. Stagnone “You Can't Hide Your Spying Eyes: EEA Issues Emerge.” Business Crimes Bulletin, December 1998. Available in Lexis-Nexis (Legal News) [1998b]
Schleslinger, James. Testimony before the Senate Select Committee on Intelligence. International Terrorism: Hearing Before the Senate Select Comm. on Intelligence. 104th Cong., 2d sess. (1 August 1996) [Schleslinger testimony]
Schmetzer, Uli. “Optimism on Trade Accords; Agreements Could Open Market to U.S. Goods, Advance Human Rights.” Chicago Tribune, 14 March 1995
Schneier, Bruce. Testimony before the House Select Committee on Homeland Security Subcommittee on Cybersecurity, Science, and Research and Development. Hearing on Overview of the Cyber Problem – A Nation Dependent and Dealing with Risk. 25 June 2003 [Schneier testimony]
Schuldt, Gretchen. “Man Charged with Selling Trade Secrets.” Milwaukee Journal Sentinel, 9 September 1999
Schwartau, Winn. Information Warfare: Chaos in the Electronic Superhighway. New York: Thunder's Mouth Press, 1994
Schweizer, Peter. Friendly Spies: How American Allies Are using Economic Espionage to Steal Our Secrets. New York: Atlantic Monthly Press, 1993
Schweizer, Peter “Hello, Cruel World: How to Succeed in Business.” News & Observer (Raleigh), 9 March 1997 [1997a]
Schweizer, Peter “New Spy Law Could Cramp Economy. USA Today, 20 November 1997 [1997b]
Schweizer, Peter “The Growth of Economic Espionage: America Is Target Number One.” Foreign Affairs (January/February 1996)
Science and Technology in U.S. International Affairs. Report of the Carnegie Commission on Science, Technology, and Government, January 1992
Sciglimpaglia, Robert J. Jr.Comment, Computer Hacking: A Global Offense.” Pace Yearbook of International Law, vol. 3, no. 265 (1991)Google Scholar
SecureWorks website. Accessed July 2003. Available at: 〈www.secureworks.com〉
See USC, title 18, sec. 2703 (1994 & Supp. 1997). Section Name: “Requirements for governmental access” Title 18: “Crimes and Criminal Procedure,” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
Seidel, Arthur H. What The General Practitioner Should Know About Trade Secrets and Employment Agreements. Philadelphia: ALI-ABA, 1984
Seita, Alex Y.Globalization and the Convergence of Values.” Cornell International Law Journal, vol. 30 (1997)Google Scholar
Seki, Hoken S., and Peter J. Toren. “EEA Violations Could Trigger Criminal Sanctions, Stiff Penalties are Intended to Deter Economic Espionage by Foreign Companies in the U.S.” National Law Journal, 25 August 1997
Seltzer, Mark D., and Angela A. Burns. “The Criminal Consequences of Trade Secret Misappropriation: Does the Economic Espionage Act Insulate Your Company's Trade Secrets from Theft and Render Civil Remedies Obsolete?” Software Law Bulletin, February 1999. Available in Lexis-Nexis (Legal News)
Sen, Sankar. “Cyber Crimes: Police Should Be Properly Equipped.” Statesman (India), 10 September 2000
Senate, S12213, 104th Cong., 2d sess., Cong. Rec. (2 October 1996), 142. Congressional Record. “Economic Espionage Act of 1996. Accessed July 2003. Available at: 〈http://thomas.loc.gov/cgi-bin/query/F?r104:1:./temp/~r104z29Vk0:e126131
Senate, S12207-08, 104th Cong., 2d sess., Cong. Rec. (2 October 1996), 142. Congressional Record. “Economic Espionage Act of 1996.” Accessed July 2003. Available at: 〈http://thomas.loc.gov/cgi-bin/query/R?r104:FLD001:S62208-S62210〉
Senate, S12213, 104th Cong., 2d sess., Cong. Rec. (2 October 1996), 142. Congressional Record. “Economic Espionage Act of 1996.” Accessed July 2003. Available at: 〈http://thomas.loc.gov/cgi-bin/query/F?r104:1:./temp/~r104z29Vk0:e126131〉
Senate, S12213, 104th Cong., 2d sess., Cong. Rec. (2 October 1996), 142. “Economic Espionage Act of 1996.” Congressional Record, available at http://thomas.loc.gov/cgi-bin/query/F?r104:1:./temp/~r104z29Vk0:e126131: (last visited_July 2003)
Sennott, Charles M. “Business of Spying.” Star Tribune (Minneapolis-St. Paul), 4 February 1997. Available in Dow-Jones News (Publications Library). [1997a]
Sennott, Charles M. “Shadowy World of Spying.” Rocky Mountain News (Denver), 2 February 1997. [1997b]
Seper, Jerry. “4 Arrested in Denmark for Computer Hacker Scheme.” Washington Times, 16 December 1993
Sepura, Karen. “Economic Espionage: The Front Line of a New World Economic War.” Syracuse Journal of International Law and Commerce, vol. 26 (Fall 1998)Google Scholar
Shackelford, Steve. “Note, Computer-Related Crime: An International Problem in Need of an International Solution.” Texas International Law Journal, vol. 27 (1992)Google Scholar
Shapiro, Howard M.The FBI in the 21st Century.” Cornell International Law Journal, vol. 28 (1995)Google Scholar
“Shedding the Trench Coat; Despite a Cloak-and-Dagger Image, ‘Competitive Intelligence’ Operations are Winning Rave Reviews at Many Technology Companies.” Electronic Business, 1 September 2001
Sherr, James. “Cultures of Spying.” National Interest (winter 1994/1995)
“Shift in Espionage Trends” Annual Report to Congress on Foreign Economic Collection and Industrial Espionage 2001, prepared by the Office of the National Counterintelligence Executive, available at http://www.ncix.gov/docs/fecie_fy01.pdf
Shipley, Greg. “Anatomy of a Network Intrusion.” Network Computing, 18 October 1999. Accessed 2002. Available at: 〈http://www.networkcomputing.com/1021/1021ws1.html〉
Senate, S12207-08, 104th Cong., 2d sess., Cong. Rec. (2 October 1996), 142. Congressional Record. “Economic Espionage Act of 1996.” Accessed July 2003. Available at: 〈http://thomas.loc.gov/cgi-bin/query/R?r104:FLD001:S62208-S62210〉
Senate, S12213, 104th Cong., 2d sess., Cong. Rec. (2 October 1996), 142. Congressional Record. “Economic Espionage Act of 1996.” Accessed July 2003. Available at: 〈http://thomas.loc.gov/cgi-bin/query/F?r104:1:./temp/~r104z29Vk0:e126131〉
Senate, S12213, 104th Cong., 2d sess., Cong. Rec. (2 October 1996), 142. “Economic Espionage Act of 1996.” Congressional Record, available at http://thomas.loc.gov/cgi-bin/query/F?r104:1:./temp/~r104z29Vk0:e126131: (last visited_July 2003)
Sennott, Charles M. “Business of Spying.” Star Tribune (Minneapolis-St. Paul), 4 February 1997. Available in Dow-Jones News (Publications Library). [1997a]
Sennott, Charles M. “Shadowy World of Spying.” Rocky Mountain News (Denver), 2 February 1997. [1997b]
Seper, Jerry. “4 Arrested in Denmark for Computer Hacker Scheme.” Washington Times, 16 December 1993
Sepura, Karen. “Economic Espionage: The Front Line of a New World Economic War.” Syracuse Journal of International Law and Commerce, vol. 26 (Fall 1998)Google Scholar
Shackelford, Steve. “Note, Computer-Related Crime: An International Problem in Need of an International Solution.” Texas International Law Journal, vol. 27 (1992)Google Scholar
Shapiro, Howard M.The FBI in the 21st Century.” Cornell International Law Journal, vol. 28 (1995)Google Scholar
“Shedding the Trench Coat; Despite a Cloak-and-Dagger Image, ‘Competitive Intelligence’ Operations are Winning Rave Reviews at Many Technology Companies.” Electronic Business, 1 September 2001
Sherr, James. “Cultures of Spying.” National Interest (winter 1994/1995)
“Shift in Espionage Trends” Annual Report to Congress on Foreign Economic Collection and Industrial Espionage 2001, prepared by the Office of the National Counterintelligence Executive, available at http://www.ncix.gov/docs/fecie_fy01.pdf
Shipley, Greg. “Anatomy of a Network Intrusion.” Network Computing, 18 October 1999. Accessed 2002. Available at: 〈http://www.networkcomputing.com/1021/1021ws1.html〉
Shiva, Vandana. Protect or Plunder? Understanding Intellectual property Rights. New York: Zed Books, 2001
Shoichet, Catherine E. “Charges of Laboratory Theft Vex the Research World.” The Chronicle of Higher Education, 18 October 2002
Sieber, Ulrich. “Computer Crimes and Other Crimes Against Information Technology: Commentary and Preparatory Questions for the Colloquium of the Association Internationale de Droit Penal in Wuerzburg.” Revue Internationale De Droit Penal, vol. 64 (1993)Google Scholar
Sieber, Ulrich The International Handbook on Computer Crime: Computer-Related Economic Crime and the Infringements of Privacy. New York: Wiley, 1986
Silva, Jeffrey. “Legislative Relief Sought For Corporate Espionage Cases; High-Tech Companies Must Step Up Defenses.” Radio Comm. Report, 25 September 2000
Simensky, Melvin, et al. Intellectual Property in the Global Marketplace. 2nd ed. Hoboken, NJ: Wiley, 1999
Simmonsen, Derek. “Con Artists Take Scams Online; Computer Fraud Headache For Law Enforcement.” Stuart News/Port St. Lucie News, 16 December 2002
Simon, Spencer. “The Economic Espionage Act of 1996.” Berkeley Technology Law Journal, vol. 13 (1998)Google Scholar
Siri, Liraz. “The Internet Auditing Project.” Accessed 15 September 2003. Available at: 〈http://www.viacorp.com/auditing.html〉
Slind-Flor, Victoria. “New Spy Act to Boost White-Collar Defense Biz.” National Law Journal, 28 July 1997
Sohmen, Helmut. “Critical Importance of Controlling Corruption.” International Lawyer, vol. 33 (1999)Google Scholar
Solomon, Joel S.Forming a More Secure Union: The Growing Problem of Organized Crime in Europe as a Challenge to National Sovereignty.” Dickinson Journal of International Law, vol. 13 (1995)Google Scholar
Soma, John T., et al. “Computer Crime: Substantive Statutes & Technical & Legal Search Considerations.” Air Force Law Review, vol. 39 (1996)Google Scholar
Soma, John T., et al. “Transnational Extradition for Computer Crimes: Are New Treaties and Laws Needed?Harvard Journal on Legislation, vol. 34 (1997)Google Scholar
Specter, Arlen. Statement. See Cooper … Economic Espionage: Joint … (1996) [Specter statement]
Specter, Arlen. Senator [PA]. “Economic Espionage Act of 1996.” Congressional Record. Accessed October 2003. Available at: 〈http://thomas.loc.gov/cgi-bin/query/R?r104:FLD001:S62207,S62208
“Spies Step Up Attacks on U.S. Firms.” Irish Times, 16 January 1998
Staniford, Stuart, Vern Paxson and Nicholas Weaver. “How to Own the Internet in Your Spare Time.” Accessed 2002. Available at: 〈http://www.cs.berkeley.edu/∼nweaver/cdc.web/cdc.pdf〉
“Spies Step Up Attacks on U.S. Firms.” Irish Times, 16 January 1998
Staniford, Stuart, Vern Paxson and Nicholas Weaver. “How to Own the Internet in Your Spare Time.” Accessed 2002. Available at: 〈http://www.cs.berkeley.edu/∼nweaver/cdc.web/cdc.pdf〉
Stanton, John. “Industrial Espionage Becoming ‘Big Business’.” National Defense, vol. 86 (1 July 2001)Google Scholar
Starkman, Dean. “Russian Hacker Enters Fraud Plea in Citicorp Case.” Wall St. J., 26 January 1998
Starkman, Dean “Secrets and Lies: The Dual Career of a Corporate Spy.” Wall St. J., 23 October 1997
Steele, Robert David. “Private Enterprise Intelligence.” In Intelligence Analysis and Assessment, edited by David A. Charter, et al. London: Frank Cass & Co., Ltd., 1996
Steiker, Carol S.Punishment and Procedure: Punishment Theory and the Criminal-Civil Procedural Divide.” Georgetown Law Journal, vol. 85 (1997)Google Scholar
Still, Torri. “A Lesson for the Valley: Thou Shalt Not Steal.” Recorder (California), 7 October 1999
Stoll, Cliff. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Edinburgh, Ireland: Pocket Books, 1989
Stone, Brad. “Diving into Bill's Trash.” Newsweek, 10 July 2000
Stone, Brad “The Spy Who Scrubbed Me.” Newsweek, 24 February 1997
Stone, Katherine V. W.Knowledge at Work: Disputes Over the Ownership of Human Capital in the Changing Workplace.” Connecticut Law Review, vol. 34 (2002)Google Scholar
“Superseding Indictment Adds Charges in Lucent Trade Secret Theft Case, Criminal Action.” E-Business Law Bulletin, vol. 3 (June 2002)
Swartz, Jon. “Modern Thieves Prefer Computers to Guns Online Crime Is Seldom Reported, Hard to Detect.” San Francisco Chronicle, 25 March 1997
Tenet, George J. Director of Central Intelligence. Statement before Senate Select Committee on Intelligence. “The Worldwide Threat in 2000: Global Realities of Our National Security.” 2 February 2000. See “Speeches and Testimony.” Accessed 2002. Available at: 〈http://www.cia.gov/〉
Tenet, George J. Director of Central Intelligence Testimony before the Senate Committee on Government Affairs, 24 June 1998. Accessed 20 July 2003. Available at: 〈http://www.fas.org/irp/congress/1998_hr/980624-dci_testimony.htm〉
Tenet, George J. Director of Central Intelligence Testimony before the Senate Committee on Government Affairs, 24 June 1998. Accessed 20 July 2003. Available at: 〈http://www.fas.org/irp/congress/1998_hr/980624-dci_testimony.htm〉 [Tenet testimony]
“Theft of Trade Secrets May Bring Automatic Jail Time – California, In The Courts.” Cyberspace Lawyer, vol. 7 (July/August 2002)
Tillett, L. Scott. “DOJ, IT Industry Team to Fight Cybercrime.” Accessed 4 July 2003. Available at: 〈http://www.cnn.com/TECH/computing/9903/23/crimefighters.idg/index.html〉
Toffler, Alvin. Powershift: Knowledge, Wealth and Violence at the Edge of the 21st Century. New York: Bantam Books, 1990
Toffler, Alvin, and Heidi Toffler. The Third Wave. New York: Bantam Books, 1980
Toffler, Alvin, and Heidi Toffler War and Anti-War. East-Maitland, Australia: Warner Books, 1993
Toren, Peter J. G.Internet: A Safe Haven for Anonymous Information Thieves?St. John's Journal of Legal Commentary, vol. 11 (1996)Google Scholar
Toren, Peter J. G. Intellectual Property and Computer Crimes. New York, NY: Law Journal Press, 2003
Toren, Peter J. G.The Prosecution of Trade Secret Thefts Under Federal Law.” Pepperdine Law Review, vol. 22, no. 3 (1994)Google Scholar
“Trade in Secrets, The.” Bulletin, 29 June 1994
“Treaty Establishing the European Economic Community.” United Nations Treaty Series, vol. 11 (25 March 1957)
Tucker, Darren S.The Federal Government's War on Economic Espionage.” University of Pennsylvania Journal of International Economic Law, vol. 18 (1997)Google Scholar
Tucker, Robert L.Industrial Espionage as Unfair Competition.” University of Toledo. Law Review, vol. 29 (1998)Google Scholar
“2 Charged with Trying to Steal Intel Trade Secrets.” Fort Worth Star-Telegram, 4 June 1998
Tyler, Christian. “The Enemy Within.” Financial Times (London), 12 April 1997
Uniform Trade Secrets Act. Uniform Laws Annotated, Title 14, sec. 433–467 (1990 & Supp. 2001)
United Nations Association of the U.S.A. Science and Technology in an Era of Interdependence. New York, NY: UNA-USA, 1975
United Nations General Assembly Press Release GA/DIS/3106, 9 October 1998
“United Nations Manual on Prevention and Control of Computer-Related Crime.” International Review of Criminal Policy, vol. 24, nos. 43 and 44. Available at: http://www.uncjin.org/Documents/EighthCongress.html (accessed July 2003)
United States Code (USC), title 18, sec. 2710 (2000) Wrongful Disclosure of Video Tape Rental or Sales Records. U.S. Code 18 (2000) § 2710
United States v. Morris, 928 F.2d 504 (2d Cir. 1991), cert. denied 502 U.S. 817 (1991)
United Nations Treaty Series 993. 16 December 1966
United States Code (USC) (1994–2000)
United States Code Annotated (USCA) (1991–1999)
United States Code Service (USCS) (2000)
United States Intelligence Community. Accessed 3 July 2003. Available at: 〈http://www.intelligence.gov/〉
United States International Trade Commission. Foreign Protection of Intellectual Property Rights and the Effect on U.S. Industries and Trade, no. 2065, 1988
United States v. Hancock, Crim. No. CR88-319A (N.D. Ga. 1988)
“University of Chicago Student Charged in Enabling Theft of TV Signals.” Chicago Sun-Times, 4 January 2003
University of Lethbridge (Alberta, Canada), Faculty of Management. Management Matters, 1 February 1997. Available in WL 7489166
USA Patriot Act. Public Law No. 107-56. Congress. House Report 3162, 26 October 2001
U.S. Congress. House of Representatives. 104th Cong., H.R. 788. Washington, DC: GPO, 1996
U.S. Congress House of Representatives. 105th Cong., H.R. 2265. Washington, DC: GPO, 1997
U.S. Congress Senate. 104th Cong., S.R. 359, Washington, DC: GPO, 1996
U.S. Congress Senate. 105th Cong., S.R. 190, Washington, DC: GPO, 1998
U.S. Congress House Permanent Select Committee on Intelligence. Staff Study. IC21: Intelligence Community in the 21st Century. Washington, D.C.: GPO, 1996. Accessed 2002. Available at: 〈http://www.access.gpo.gov/congress/house/intel/ic21/ic21_toc.html〉
United States International Trade Commission. Foreign Protection of Intellectual Property Rights and the Effect on U.S. Industries and Trade, no. 2065, 1988
United States v. Hancock, Crim. No. CR88-319A (N.D. Ga. 1988)
“University of Chicago Student Charged in Enabling Theft of TV Signals.” Chicago Sun-Times, 4 January 2003
University of Lethbridge (Alberta, Canada), Faculty of Management. Management Matters, 1 February 1997. Available in WL 7489166
USA Patriot Act. Public Law No. 107-56. Congress. House Report 3162, 26 October 2001
U.S. Congress. House of Representatives. 104th Cong., H.R. 788. Washington, DC: GPO, 1996
U.S. Congress House of Representatives. 105th Cong., H.R. 2265. Washington, DC: GPO, 1997
U.S. Congress Senate. 104th Cong., S.R. 359, Washington, DC: GPO, 1996
U.S. Congress Senate. 105th Cong., S.R. 190, Washington, DC: GPO, 1998
U.S. Congress House Permanent Select Committee on Intelligence. Staff Study. IC21: Intelligence Community in the 21st Century. Washington, D.C.: GPO, 1996. Accessed 2002. Available at: 〈http://www.access.gpo.gov/congress/house/intel/ic21/ic21_toc.html〉
United Nations General Assembly, G. A. Res. 1236, U.N. GAOR, 12th Sess., Supp. No.18 (1957), at http://ods-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/120/19/IMG/NR012019.pdf?OpenElement (last visited July 2003)
United Nations General Assembly, G.A. Res. 2131, U.N. GAOR, 20th Sess., Supp. No.14 (1965), at http://ods-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/218/94/IMG/NR021894.pdf?OpenElement (last visited July 2003)
United States v. Hsu, 155 F.3d 189 (3d Cir. 1998)
United States v. Pin Yen Yang, Criminal No. 1:97MG0109 (N.D. Ohio 1997)
United States v. Yang, No. 1:97 CR 288, 1999 WL 1051714 (N.D. Ohio, Nov. 17, 1999)
United States v. Worthington, Criminal No. 97–9 (W.D. Pa. 1996)
USC, title 17, sec. 506 (1994). Criminal Offenses. U.S. Code 17 (1994) § 506. USC, title 17, sec. 506 (1994). Section Name: “Criminal offenses,” Title 17: Copyrights, United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title 17, sec. 906(a) (Supp. 1998). There was no changes to the 1998 Supplement. “Limitation on exclusive rights: reverse engineering; first sale” (Name of Section 906), Title 17: Copyrights, United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title 18, sec. 3123 (1994). “Issuance of an order for a pen register or a trap and trace device” Title 18: “Crimes and Criminal Procedure,” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title 18, sec. 1030 (2000). 18 U.S.C. § 1030 (2000) “Fraud and related activity in connection with computers.” Title 18: “Crimes and Criminal Procedure” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 2, 2001. Washington: Government Printing Office, 2001-. [Note: This section was modified by Public Laws 107–273 and 107–296 in 2002]
USC, title 18, sec. 1030 (2000). Fraud and Related Activity in Connection with Computers. U.S. Code 18 (2000) § 1030(a). Title 18: “Crimes and Criminal Procedure” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 2, 2001. Washington: Government Printing Office, 2001-. [Note: Section 1030 was modified by Public Laws 107–273 and 107–296 in 2002.]
USC, title 18, sec. 1030 (2000). Fraud and Related Activity in Connection with Computers. U.S. Code 18 (2000) § 1030(a)(5)(A). Title 18: “Crimes and Criminal Procedure” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 2, 2001. Washington: Government Printing Office, 2001-. [Note: Section 1030 was modified by Public Laws 107–273 and 107–296 in 2002.]
USC, title 18, sec. 1030(g) (2000). Fraud and Related Activity in Connection with Computers. U.S. Code 18 (2000) § 1030(g). Title 18: “Crimes and Criminal Procedure” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 2, 2001. Washington: Government Printing Office, 2001-. [Note: Section 1030 was modified by Public Laws 107–273 and 107–296 in 2002.]
USCA, title 18, sec. 1832(a) (2000). [Section Name: “Theft of trade secrets” Title 18: “Crimes and Criminal Procedure,” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 2, 2001. 2000 ed., Washington: Government Printing Office, 2001-
USC, title 18, sec. 1837(1) (2000). Section Name: “Applicability to conduct outside the United States” Title 18: “Crimes and Criminal Procedure,” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 2, 2001. 2000 ed., Washington: Government Printing Office, 2001.”
USC, title 18, sec. 1839(3)(B) (Supp. V 1999). “Definition of ‘trade secret’” Title 18: Crimes and Criminal Procedure, United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title title 18, sec. 1905 (1994 & Supp. IV 1998). “Disclosure of confidential information generally,” Title 17: “Crimes and Criminal Procedure,” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995”2000
USCA, title 18, sec. 2319(b)(1) (West Supp. 1998). “Criminal infringement of a copyright” Title 18: “Crimes and Criminal Procedure” United States Code Annotated, 1994 ed., St. Paul: West Group, 1927-
USC, title 35, secs. 100–105 (Supp. 1998), outlining the requirements for patenting an “invention.” Sections 100–105 are in Chapter 10: “Patentability of Inventions,” within Title 35: Patents United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title 35, sec. 102 (1994), detailing the “novelty” requirement for patentability. Section 102: “Conditions for patentability; novelty and loss of right to patent” Title 35: Patents United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title 35, sec. 102(b) (Supp. 1998), denying patentability if an invention is patented, described in a printed publication, publicly use, or placed on sale more than one year prior to the date of the application. Section 102: “Conditions for patentability; novelty and loss of right to patent” Title 35: Patents United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title 35, sec. 103 (Supp. 1998), detailing the “non-obvious subject matter” requirement for patentability. Section 103: “Conditions for patentability; non-obvious subject matter” Title 35: Patents United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title 35, sec. 115 (Supp. 1998), requiring the inventor to submit an oath stating that he believes himself to be the first inventor. Section 115: “Oath of applicant” Title 35: Patents United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
USC, title 35, sec. 284 (1998), providing for damages not less than a reasonable royalty, including interest and costs. Section 284: “Damages” Title 35: Patents United States Code: Containing the General and Permanent Laws of the United States, in Force on January 4, 1995. 1994 ed., Washington: Government Printing Office, 1995–2000
18 U.S.C. § 1837(2). “Applicability to conduct outside the United States” Title 18: “Crimes and Criminal Procedure,” United States Code: Containing the General and Permanent Laws of the United States, in Force on January 2, 2001. 2000 ed., Washington: Government Printing Office, 2001
U.S. Department of Justice. “Computer Crime and Intellectual Property Section (Computer Crime and Intellectual Property Section)” Accessed 3 July 2003. Available at: 〈http://www.usdoj.gov/criminal/cybercrime〉
U.S. Department of Justice “Introduction, Computer Crime and Intellectual Property Section.” Accessed 4 July 2003. Available at: 〈http://www.cybercrime.gov/ipmanual/intro.htm〉
U.S. Department of Justice “Introduction, Computer Crime and Intellectual Property Section.” Accessed 4 July 2003. Available at: 〈http://www.cybercrime.gov/ipmanual/intro.htm〉
U.S. Department of Justice. Accessed July 2003. Available at: 〈http://www.usdoj.gov/〉
“U.S. Department of Justice Online.” Accessed 3 July 2003. Available at: 〈http://www.usdoj.gov/〉.U. S. Department of Justice. Press Release. U.S. Attorney, Western Dist. of N.Y., 28 August 1997
U.S. Department of Justice. Press Release. U.S. Attorney, Western Dist. of N.Y., 28 August 1997 [1997a]
U.S. Department of Justice Press Release. U.S. Attorney, Western Dist. of N.Y., 13 November 1997 [1997b]
U.S. Department of Justice “The National Information Infrastructure Protection Act of 1996 Legislative Analysis,” The Computer Crime & Intellectual Property Section. Accessed 4 July 2003. Available at: 〈http://www.usdoj.gov/criminal/cybercrime/1030_anal.html〉
“U.S. Department of Justice Online.” Accessed 3 July 2003. Available at: 〈http://www.usdoj.gov/〉.U.S. Department of Justice. Press Release. U.S. Attorney, Western Dist. of N.Y., 28 August 1997
U.S. Department of Justice. Press Release. U.S. Attorney, Western Dist. of N.Y., 28 August 1997 [1997a]
U.S. Department of Justice Press Release. U.S. Attorney, Western Dist. of N.Y., 13 November 1997 [1997b]
U.S. Department of Justice “The National Information Infrastructure Protection Act of 1996 Legislative Analysis,” The Computer Crime & Intellectual Property Section. Accessed 4 July 2003. Available at: 〈http://www.usdoj.gov/criminal/cybercrime/1030_anal.html〉
U.S. Department of State Overseas Security Advisory Council. Guidelines for Protecting U.S. Business Information Overseas. Washington, D.C.: GPO, 1992
U.S. Department of Justice. Computer Crime and Intellectual Property Section (Computer Crime and Intellectual Property Section). “What Does Computer Crime and Intellectual Property Section Do?” Accessed July 2003. Available at: 〈http://www.usdoj.gov/criminal/cybercrime/ccips.html〉
Use of Electronic Media for Delivery Purposes. U.S. Securities and Exchange Commission, Docket 1091, File No. S7-31-95, no. 22 (6 October 1995)
U.S. General Accounting Office. “Economic Espionage: Information on Threat from U.S. Allies.” GAO/T-NSIAD-96-1141, 28 February 1996
“U.S. Losing High-Tech Secrets to ‘Student’ Spies: FBI.” Straits Times (Singapore), 8 April 1997
USSID (United States Signals Intelligence Directive)18. “Procedures for National Security Agency collection of data on US persons.” Accessed 2002. Available at: 〈http://www.gwu.edu/∼nsarchiv/NSAEBB/NSAEBB23/07-01.htm〉
U.S. Statutes at Large, vol. 35 (1909). Act of 4 March 1909
U.S. Statutes at Large vol. 98 (1984). Counterfeit Access Device and Computer Fraud and Abuse Act of 1984
U.S. Statutes at Large vol. 105 (1991). Intelligence Authorization Act of Fiscal Year 1991
U.S. Statutes at Large vol. 110 (1996). Economic Espionage Act of 1996
U.S. Statutes at Large vol. 96 (1982). Public Law No. 97-180
U.S. Statutes at Large vol. 105 (1992). Public Law No. 102-561
U.S. Statutes at Large vol. 108 (1994). Public Law No. 103-325
U.S. Statutes at Large vol. 110 (1996). Public Law No. 104-253
Vaknin, Sam. “Analysis: The Industrious Spies – II.” United Press International, Financial News, 14 May 2002 [2002a]
Vaknin, Sam “Analysis: The Industrious Spies – III.” United Press International, Financial News, 15 May 2002 [2002b]
Veltrop, James. “Trade Secret Misappropriation a Federal Crime.” Intellectual Property Today, June 1997
Vickery v. Welch, 36 Mass. (1 Pick.) 523, 526 (1837)
Venzke, Ben N. “Economic/Industrial Espionage.” Accessed 3 July 2003. Available at: 〈http://www.computercrimeconsultants.com/news1.htm〉
“Veridian Targeted by Spy?” Intelligence Online, no. 441, 5 December 2002
Vise, David A., and Daniel Eggen. “FBI Warns of Cyber-Attack Threat: U.S. ‘Very Concerned’ About Vulnerability of Infrastructure.” Washington Post, 21 March 2001
Vistica, Gregory. “Inside the Secret Cyberwar: Facing Unseen Enemies, the Feds Try to Stay a Step Ahead.” Newsweek, 21 February 2000
Vrana, Deborah. “University of Chicago Student Arrested for Document Piracy.” Chicago Tribune, 3 January 2003
Waguespack, Michael J. Director of the National Counterintelligence Center. Letter. Accessed 13 January 1997. Available at: 〈http://www.nacic.gov/dirlett.htm〉 [Waguespack letter]
Walker, Nigel. Punishment, Danger and Stigma: The Morality of Criminal Justice. Oxford: Basil Blackwell, 1980
Wall, David. Crime and the Internet: Cybercrimes and Cyberfears. London; New York: Routledge, 2001
Wall, David Cyberlaw. Harlow: Longman, 2000
Wall, David Cyberspace crime. Aldershot, Hants, England; Burlington, VT: Ashgate, 2003
Waller, Douglas. “Spying: ‘Halt! Friend or Foe?’” Time, 6 March 1995
Waller, Spencer W., and Byrne, Noel J.. “Changing View of Intellectual Property and Competition Law in the European Community and the United States of America.” Brooklyn Journal of International Law, vol. 20 (1993)Google Scholar
Warner, William T. “Economic Espionage: A Bad Idea.” National Law Journal, 12 April 1993
Waterschoot, Paul. “Overview of Recent Developments in Intellectual Property in the European Union.” In International Intellectual Property Law and Policy, vol. 4, edited by Hugh C. Hansen. Yonkers, NY: Juris Publishing, 2000
Watson, Bruce W. United States Intelligence: An Encyclopedia. New York: Garland, 1990
Weisner, Don, and Cava, Anita. “Stealing Trade Secrets Ethically.” Maryland Law Review, vol. 47 (1988)Google Scholar
Welch, Lee Ann. Herald-Dispatch (West Virginia), 14 August 2002
Welsh, Robert C., et al. Protecting Confidential Business Information in the Digital Age. New York: Practicing Law Institute, 2001
“What Purchasing Managers Should Know About Trade Secrets.” Purchasing Law Report, December 2001
Wheeler, Scott L. “PRC Espionage Leads to ‘Terf’ War.” Insight on the News Magazine, 29 October 2002
Wilke, Clifford A. “Protecting Internet Addresses of National Banks.” Comptroller of the Currency, Alert 2000–9, 19 July 2000
Wine, Michael. “Cyberspace – A New Medium for Communication, Command and Control by Extremists.” April 1999. Accessed 15 September 2003. Available at: 〈http://www.ict.org.il/articles/cyberspace.htm〉
Wingfield, Nick. “A Stolen Laptop Can Be Trouble if Owner is CEO.” Wall St. J., 19 September 2000
Winkler, Ira. Corporate Espionage. New York: Prima Publishing, 1997
Winter, Christine. “Security, Inside Out; Firm's Product Protects Networks From Disgruntled Employees.” Sun-Sentinel (Florida), 27 August 2002
Winton, Ben. “Intel Theft a Frame-Up?” Arizona Republic, 25 September 1995
World Intellectual Property Organization. “Member States.” Accessed 3 July 2003. Available at: 〈http://www.wipo.org/members/index.html〉
Wiretap Reports. Accessed 2002. Available at: 〈http://www.uscourts.gov/wiretap.html〉
“Woman Pleads Guilty.” Houston Chronicle, 31 July 1998. Available in Dow-Jones News (Publications Library)
Woodward, John D. Jr. Superbowl Surveillance: Living Up to Biometrics. Santa Monica, CA: RAND, 2001
Woolsey, James R. “Former Central Intelligence Agency Director Woolsey Delivers Remarks at Foreign Press Center.” 7 March 2000. Accessed 3 July 2003. Available at: 〈http://cryptome.org/echelon-cia.htm〉
“World Forum Designed to Combat International Crime, Corruption.” The Metropolitan Corporate Counsel (Mountainside, NJ), May 2000
World Information Technology and Services Alliance (WITSA). “Digital Planet 2000: The Global Information Economy. Accessed 3 July 2003. Available at: 〈http://www.WITSA.org/D2000sum.pdf〉
World Intellectual Property Organization. “About Intellectual Property.” Accessed 28 February 2003. Available at: 〈http://www.wipo.org/about-ip/en/〉
Worldwide Threat Assessment Brief to the Senate Select Committee on Intelligence. Accessed 1 July 2003. Available at: 〈http://www.fas.org/irp/congress/1996_hr/s960222p.htm〉
“Worming Out the Truth.” Economist, 4 November 2000
Wray, Stefan. “On Electronic Civil Disobedience.” Peace Review, vol. 11 (1999)CrossRefGoogle Scholar
Wright, Steve. “An Appraisal of Technologies of Political Control.” Working document. European Parliament, Scientific and Technological Options Assessment (STOA). Accessed 9 September 2003. Available at: 〈http://cryptome.org/stoa-atpc.htm〉
Yates, Ronald E. “Cold War: Part II, Foreign Intelligence Agencies Have New Targets – U.S. Companies.” Chicago Tribune, 29 August 1993 [Yates 1993a]
Yates, Ronald E. “Corporate Cloak-and-Dagger Spying – Either by Rival Businesses or Foreign Governments – Can Cut Right to the Heart of a Vulnerable Corporation, But Congress Is Considering Ways to Strike Back.” Chicago Tribune, 1 September 1996
Yates, Ronald E. “U.S. Intelligence Retools to Fight New Brand of Espionage.” Chicago Tribune, 30 August 1993 [Yates 1993b]
Yellen, Dwight, and Frank S. Kalamajka. “Reviewing Current Issues on Trade Secrets.” New York Law Journal, 1 April 2002
Young, Jeffrey. “Spies Like Us.” Forbes, 3 June 1996
Yushkiavitshus, Henrikas. “Law, Civil Society, and National Security: International Dimensions.” In The Information Revolution and National Security: Dimensions and Directions, edited by S. Schwartzstein. Washington, DC: Center for Strategic and International Studies, 1996
Zuckerman, M. J. “Cracking Down on the Outlaws of Cyberspace.” USA Today, 2 July 1996

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Hedieh Nasheri, Kent State University, Ohio
  • Book: Economic Espionage and Industrial Spying
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511610288.013
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Hedieh Nasheri, Kent State University, Ohio
  • Book: Economic Espionage and Industrial Spying
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511610288.013
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Hedieh Nasheri, Kent State University, Ohio
  • Book: Economic Espionage and Industrial Spying
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511610288.013
Available formats
×