<s docid="FBIS4-67741" num="23"> The report gives evidence that 900 thefts from military and nuclear plants and 700 thefts of secret technology were reported only during the second half of 1993, including nuclear weapons for Iran and Pakistan.</s>

<s docid="FBIS4-67741" num="56"> This includes special documents on manufacturing weapons of mass destruction, chemical weapons, and even biological weapons.</s>

<s docid="FBIS4-67741" num="57"> In general, the special documents on the minute details of the manufacturing of weapons.</s>

<s docid="FBIS4-67741" num="59"> What makes the situation even more complicated is that most of the republics that became independent of the former USSR, have on their territory some of the institutions, factories, and scientific centers and laboratories which, in one way or another, are affiliated with the military industrial complex, the nuclear complex, the production of chemical weapons, or production of mass destruction weapons.</s>

<s docid="FBIS4-67741" num="61"> In fact, they believe that the best solution is to sell them, along with their means of production and their technology, to the highest bidder, regardless of who it is.</s>

<s docid="FBIS4-67741" num="62"> If the nuclear material and their technology were sold with some caution and secrecy, the mass destruction weapons and the technology of their production, and even the chemical weapons, were sold publicly.</s>

<s docid="FBIS4-67741" num="66"> Following the disintegration of the USSR, the new state of Turkmenistan decided that it did not need these charges in the depot because it does not have a fleet or naval air force units.</s>

<s docid="FBIS4-67741" num="67"> The entire depot was sold in one year.</s>

<s docid="FBIS4-67741" num="68"> The sea mines workshop was also sold.</s>

<s docid="FBIS4-67741" num="69"> The already-made production was sold, and the equipment was sold later.</s>

<s docid="FBIS4-67741" num="71"> The buyers offered the engineers and the technicians working at the workshop contracts to work on the equipment back in their countries for five years.</s>

<s docid="FBIS4-67741" num="72"> Some of the former officers of the Caspian Sea fleet signed contracts and left with the equipment after working for more than a year and a half without salaries.</s>

<s docid="FBIS4-67741" num="74"> In the same way, the gunpowder factory in the town of Shusta [place name as published] in the suburbs of Namangan in Uzbekistan, was sold.</s>

<s docid="FBIS4-67741" num="77"> It was one of the three Soviet factories where cluster bombs and vacuum bombs, which are considered a kind of mass destruction weapon, are assembled.</s>

<s docid="FBIS4-67741" num="86"> Here is another example: A secret laboratory, which carried out near-production level scientific research in chemical weapons and lasers, in the town of At Bashi, a suburb of the Kirghiz town of Naryn, was lost.</s>

<s docid="FBIS4-67741" num="132"> The report discloses that more than a third of the scientists and specialists in the nuclear field and in highly sophisticated technology, who total 3,000 people that used to work in the Soviet Union, have left the country and now work at major scientific institutions in the United States, Japan, Germany, France, Britain, and Sweden.</s>

<s docid="FBIS4-67741" num="133"> Also, around 6,000 "medium-caliber" engineers and science experts have left the country.</s>

<s docid="FBIS4-67741" num="134"> Some of them settled in countries with nuclear potential.</s>

<s docid="FBIS4-67741" num="135"> They are now conducting nuclear and atomic technology research.</s>

<s docid="FT933-8358" num="23"> When he quit abruptly on March 10 this year, suspicions mushroomed about his and his closest allies' activities in the interim, in which box-loads of secret and confidential data about most of GM's future European plans were allegedly systematically collected - only to disappear.</s>

<s docid="FT933-8358" num="24"> With hindsight, GM now suspects he may already have been working on VW's behalf as early as December 2 last year.</s>

<s docid="FT933-8358" num="25"> On that day he asked for, and received 20 days later, GM Europe's so-called Epos list: computer-stored details of parts prices and suppliers, equivalent to up to 90,000 print-out sheets.</s>

<s docid="FT933-8358" num="26"> According to Mr Hans Wilhelm Gab, vice-president of GM Europe, they were of no use to him in his US-based job.</s>

<s docid="FT933-8358" num="41"> February 3, Russelsheim: Lopez attends a two-day meeting, called at his request, at which he allegedly asks for and is given details of GM Europe's purchasing, costs and new models strategies.</s>

<s docid="FT933-8358" num="51"> February 17, Detroit: Gutierrez writes to Opel, asking for internal files on the Corsa, Omega and Astra models and the successor to the Vectra, plus details on engines and production plants.</s>

<s docid="FT933-8358" num="52"> He will collect them on February 23, when he is due to arrive in Frankfurt.</s>

<s docid="FT933-8358" num="59"> March 8, Russelsheim: Lopez at top-level Opel international strategy board meeting, allegedly given 2cm-thick wad of confidential documents on future strategies.</s>

<s docid="FT933-8358" num="69"> He collects a binder of 'internal' documents and asks Martinez to send them to Spain.</s>

<s docid="FT933-8358" num="104"> Mid-April, Wiesbaden: Witnesses allegedly hear and see documents being shredded all night long by Jorge Alvarez Aguirre and Rosario Piazza, two ex-Opel men who had followed their leader to VW.</s>

<s docid="FT933-8358" num="139"> Lopez appears to contradict his earlier public claim that he never took any secret documents and tells board that papers from his former offices were destroyed, including 'possibly secret or sensitive' GM/Opel material, in Wiesbaden and during his stay at the group's Rotehof guesthouse in late March.</s>

<s docid="FT944-15440" num="9"> Although electronic surveillance or computer hacking more often grab the headlines, the most common form of industrial espionage is for a rival company to employ an insider - or a turner in the trade jargon - to give them inside information.</s>

<s docid="FT944-15440" num="14"> According to Paul Carratu, managing director of Carratu International, a London-based fraud investigator, the most common form of industrial espionage concerns disaffected employees offering this type of information to a rival for a fee.</s>

<s docid="FT944-15440" num="31"> A rival boardroom can be bugged - perhaps using the services of a person contracted for this purpose who uses the 'cover' of working for a cleaning company - with an instrument the size of a matchbox and costs no more than Pounds 100.</s>

<s docid="FT931-14754" num="42"> In 1990, as Laing Properties became the target of a hostile takeover attempt, it told the Takeover Panel it had found an electronic bug in its offices.</s>

<s docid="FT931-14754" num="43"> Three years earlier, three men were convicted for placing a listening device in a biscuit tin outside the home of an executive of Comet, a subsidiary of the then Woolworth group which was the object of a bid from Dixons.</s>

<s docid="FT931-14754" num="44"> A more recent story of corporate espionage involves the tactics adopted by a large UK retailer to undermine another high-street multiple in advance of a takeover bid.</s>

<s docid="FT931-14754" num="47"> Several managers had been bribed to depress sales returns, denting the company's figures and making it more vulnerable to outside attack.</s>

<s docid="FT931-14754" num="49"> At present, there are two significant cases of alleged industrial espionage before the British courts, one involving the alleged sale of confidential information and the other centred on alleged attempts to plant a 'spy' in a competing business.</s>

<s docid="FT931-14754" num="78"> They tap identified lines from pavement junction boxes and listen in from a vehicle parked nearby.</s>

<s docid="FBIS3-58751" num="19"> Erich Schmidt-Eenboom, an "intelligence expert," says "the creation of such a section in BND Department I means agents from Pullach will in the future steal foreign companies' internal secrets to make them available to German firms for competitive advantages.</s>

<s docid="FBIS3-58751" num="35"> According to these documents, the "BND passes on secret information to German industry, and intends in the future to spy on foreign firms as well -- illegally, but in the world trade war, one does not hesitate to use dirty tricks in this country, too," the ``Monitor'' report concludes.</s>

<s docid="LA080590-0178" num="9"> In 1985, U.S.</s>

<s docid="LA080590-0178" num="10"> District Judge Murray Schwartz in Delaware tried to force Coca-Cola Co. to divulge its secret formula.</s>

<s docid="LA080590-0178" num="11"> He didn't succeed, but since that time businesses have been nervous about losing trade secrets in open court.</s>

<s docid="LA080590-0178" num="15"> Nearly 90% of all trade secret cases never go to trial because defendants who possess confidential information often threaten to reveal trade practices in open court as part of their defense, according to expert testimony before the legislature.</s>

<s docid="LA080590-0178" num="17"> "Claiming that the thrust of his or her defense will be that the secret is in fact public information, the defense will request thousands of documents disclosing other trade secrets," said Rosenblatt, who heads up the county's high-tech crime unit.</s>

<s docid="FBIS3-37478" num="28"> India, Russia, Germany, and Egypt are conducting active industrial espionage against the United States.</s>

<s docid="FBIS3-37478" num="29"> French agents have almost infiltrated 49 U.S. companies.</s>

<s docid="FBIS3-37478" num="30"> Taiwan has 280 spies in the United States.</s>

<s docid="FBIS3-37478" num="78"> In 1968 the plans for the French Mirage fighter were stolen which formed the basis for a similar Israeli aircraft, the Kfir.</s>

<s docid="FBIS3-37478" num="79"> In 1969, five of the latest missile patrol boats were stolen from the French port of Cherbourg.</s>

<s docid="FBIS3-37478" num="80"> In 1979 Israeli agents made a recording of a conversation between Andrew Young, the U.S. permanent representative at the United Nations, and the PLO observer.</s>

<s docid="FBIS3-37478" num="81"> The CIA arrested the Israeli spy (J.</s>

<s docid="FBIS3-37478" num="82"> Ford) for handing over classified documents.</s>

<s docid="FT944-18257" num="9"> Staff poaching and charges of dirty dealing are common enough in the world of international business, but the intensity of GM's attack on Europe's biggest volume carmaker and the scale of the allegations it has made have yet to be matched in the motor trade.</s>

<s docid="LA042990-0187" num="30"> The information explosion of the past decade, fueled by more powerful computers and a proliferation of data banks and specialized publications, helps corporate spies find out almost anything they want about competitors.</s>

<s docid="FT933-6558" num="23"> This revealed that documents which should have been restricted to the top management of General Motors and its German subsidiary, Adam Opel, had been found - 'where they did not belong', Mr Nauth noted - in boxes left in a house, apparently by colleagues of Mr Lopez who had followed him to VW.</s>

<s docid="FT911-3920" num="20"> So what is reverse engineering in computer software?</s>

<s docid="FT911-3920" num="21"> It is software archaeology, according to Mr Gilles Lafue, a software specialist with Andersen Consulting.</s>

<s docid="FT911-3920" num="22"> 'It consists of extracting the software's functionality (what the software does) and the design (how it does it) by analysing the software's implementation - that is, programming code, data structures, files and databases'.</s>

<s docid="FT942-5019" num="27"> Little is suing EDS for unfair competition under the California Business and Professions Code; theft of trade secrets; and for inducing Little employees to breach fiduciary duties to the company.</s>

<s docid="FT942-5019" num="29"> Little alleges that, while still working for the company but after being hired by EDS, Mr Scales used his influence and position as an officer of the company to persuade colleagues to move to EDS.</s>

<s docid="FT942-5019" num="39"> At one level the lawsuit appeared to be a straightforward Bancroft-Whitney v Glen claim, named after the 1960s case which established the principle under California law that it is a civil wrong, or tort, to conduct a raid designed to cripple a competitor by luring away a group of its employees.</s>

<s docid="FT933-4222" num="66"> He suggested that GM/Opel may have hacked into VW's computers to plant secrets there.</s>

<s docid="FBIS3-45696" num="38"> After analyses, selection, and summaries of these reports, a new scheme proposed three major tasks for U.S. intelligence agencies to collect international economic information: First, keep abreast of global economic trends and opportunities, take note of their influence on a stable international situation which includes the economies of "allies" and "potential enemies," and track economic activities and unusual financial relations and commercial transactions.</s>

<s docid="FBIS3-45696" num="39"> Second, track trends in international science and technology, particularly advanced technological trends, such as the development and application of supercomputers and the development of semiconductors and information technology, and judge the impact these developments could have on U.S. security.</s>

<s docid="FBIS3-45696" num="41"> In the intelligence sphere, the United States discovered that many countries, including its allies, had shifted the focus of their attention from politics to the economy, taken North America as their target, and had vigorously collected U.S. economic and commercial information.</s>

<s docid="FBIS3-45696" num="42"> According to the U.S. media, the CIA holds that the country must guard against more than 20 countries which are involved in gathering "industrial information" from U.S. companies.</s>

<s docid="FBIS3-45696" num="44"> At his approval by Congress earlier this year, CIA Director R. James Woolsey said that the gathering of economic information is "the hottest topic in current intelligence policy" and that the Clinton administration will carry out "comprehensive research" on the matter.</s>

<s docid="FBIS3-45696" num="47"> By the end of 1993, Woolsey stressed that the CIA had already played an "essential role" in hitting at foreign intelligence agencies, which were trying to gather industrial information in U.S. companies through bribery.</s>

<s docid="FBIS3-45696" num="65"> If the government interferes in economic activities, it will be a difficult question to allow economic circles to share the information, manifest the principles of the market, and avoid agents from getting involved in economic activities, which could result in corruption.</s>

<s docid="FT933-8481" num="7"> VOLKSWAGEN has withdrawn from the war of words over industrial espionage with car market rival Adam Opel, owned by General Motors, amid fresh media charges contradicting VW's claims that no Opel data ever came into its possession.</s>

<s docid="FT933-8481" num="12"> VW's decision to remain silent coincided with detailed claims in Der Spiegel, the weekly magazine, that 11 Volkswagen trainees had worked for several days at the end of March typing Opel data into computers in a VW property once used to house 'guest workers' from Italy.</s>

<s docid="FT931-3885" num="9"> The operation included surveillance of directors of Europarks, the target company, rifling of dustbins and briefcases, and the use of infiltrators to obtain confidential financial information.</s>

<s docid="FT931-3885" num="29"> Early in 1987 Mr David Paterson, who before joining KAS had once been a Rhodesian policeman, carried out initial investigations and said he could find no evidence of dirty tricks by Europarks.</s>

<s docid="FT931-3885" num="33"> For the next year Mr Tucker, his family and other Europarks directors were closely followed by KAS staff.</s>

<s docid="FT931-3885" num="36"> Realising it needed an insider to obtain the information it wanted, the firm set about trying to infiltrate Europarks.</s>

<s docid="FT931-3885" num="37"> A KAS employee, known during the trial as 'Witness E', obtained a job as a kiosk manager at Europarks' Heathrow offices.</s>

<s docid="FT931-3885" num="43"> Using a false CV, she secured a job with Europarks as Mr Tucker's personal assistant.</s>

<s docid="FT931-3885" num="44"> With free access to his offices there was little she could not obtain.</s>

<s docid="FT934-3990" num="16"> The four men arrived in Wolfsburg virtually simultaneously last March, followed by clouds of suspicion generated by alleged information-gathering activities in the latter part of their service at GM and its German subsidiary Adam Opel.</s>

<s docid="FT934-3990" num="17"> As the KPMG report confirmed, within days of their arrival, two of them were busy in VW's Rotehof guesthouse unpacking, sorting, and destroying 'in part', the contents of 20 cartons delivered to Mr Lopez.</s>

<s docid="FT934-3990" num="18"> It also emerged that they found time to make several thousand photocopies while feeding the shredder.</s>

<s docid="FT934-3990" num="19"> The box contents, according to Mr Lopez and his colleagues comprised books, magazines, seminar material, hand-written notes, brochures and correspondence with GM component suppliers.</s>

<s docid="FBIS3-24271" num="24"> [K.] All my career has been associated with scientific and technological [S\|[amp ]\|T] intelligence, whose main task is to track advanced foreign technologies and obtain the appropriate information, as well as samples, for the purpose of improving the scientific and industrial potential of our country.</s>

<s docid="FBIS3-24271" num="25"> The needs of the military-industrial complex [VPK], weapons of mass destruction, and developments in the area of critical technologies were given priority, of course.</s>

<s docid="FBIS3-24271" num="31"> Let me start with the fact that information obtained by our staff on the problems of nuclear energy enabled Soviet science, with considerable savings in material resources and time, to create atomic weapons and deprive our main enemy of the time--the United States--of the ability to use nuclear blackmail.</s>

<s docid="FBIS3-24271" num="32"> We seriously helped our scientists in industrial applications of powder metallurgy.</s>

<s docid="FBIS3-24271" num="33"> Not too many people know that S\|[amp ]\|T provided anticipatory information on the spread abroad of a dangerous illness--AIDS, and its medical and biological parameters.</s>

<s docid="FBIS3-24271" num="34"> S\|[amp ]\|T also provided important information for the work on eliminating the consequences of the Chernobyl disaster.</s>

<s docid="LA110490-0254" num="10"> In the case of John Stephen Wilson, the crime was industrial espionage.</s>

<s docid="LA110490-0254" num="11"> He was arrested by two undercover FBI agents at a Ventura restaurant in 1988, after he tried to sell them secrets about a new drug being developed by a Thousand Oaks company.</s>

