ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Enemies Among Us

Updated on September 11, 2010

Foreign Economic Collection and Industrial Espionage

 From a United States military purist perspective many could strongly state the case that the protection of military classified information is paramount. However even more individuals may argue that economic stability, prosperity, and progress should be our nations leaders number one concern.

That being said; in my opinion common sense would dictate that the husbanding of United States military and government secrets are of utmost importance to the National Security of our nation.

Therefore the goal of this post is to “bring to light” the Foreign Economic Collection and Industrial Espionage activities performed by both foreign state & non-state actors aimed at the United States of America. The attacks are a fusion of our military, government, academic, and private sector trade secrets being stolen by a wide variety of our enemies.

Moving forward the following information contained
in the Office of the National Counterintelligence Executive (ONCIX) Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, FY 2008 is both enlightening and disturbing at the same time. Although the findings reflect back to 2008; I can only imagine that the impact of the activity is still felt. Please find brief excerpts of information from the very powerful (ONCIX) document:

(ONCIX) 2008 Key Findings:
“ The threat to the United States from foreign economic intelligence collection and industrial espionage has continued unabated since
the publication of the Annual Report to Congress on Foreign
Economic Collection and Industrial Espionage, 2007. Economic
espionage cases went up slightly and nearly every day brought
reports—in the press and in the classified world—of new cyber
attacks against US Government and business entities.
Additionally, the increasing use of new modes of communication
and social networking has provided uncharted opportunities for
transferring information and espionage for enterprising foreign
intelligence services.”

In my opinion Freedom to worship Almighty God anyway that one sees fit is the foundation of our society; this right along with Freedom of Speech is what makes America great! However the price of that freedom is being targeted by our adversaries. Lax immigration laws, an obsession for transparency in government, that is followed by a need for many members of our society to strive for a “political correctness” and acceptance to foreign influence that puts our American way of life in jeopardy.

Moving forward please find facts from the (ONCIX) 2008 document that revolve around collection operations run against the USA by two of America’s chief adversaries Iran & China:

Selected Arrests and Convictions for Economic Collection
and Industrial Espionage Cases in FY 2008

IRAN: 9 Arrests and Convictions for Economic Collection
and Industrial Espionage Cases which included:
• Engineering Software
• Telecommunications Equipment and Technology
• Electronics and IED Components
• Gas Valve Parts
• Nickel Alloyed Pipes
• Fighter Jet Components
• Chemical Purchasing Software
• Cryogenic Pumps
• Illegal Export of Three Key Master Software

CHINA: 7 Arrests and Convictions for Economic Collection
and Industrial Espionage Cases which included:
• Space Launch Technical Data
• Unmanned Aerial Vehicles
• Military Aircraft Components
• Thermal Imaging Cameras
• Amplifiers and Missile Target Acquisition Technology
• Controlled Amplifiers
• Military Source Code and Trade Secrets

I believe that the above facts speak to the strength of counterintelligence efforts within the United States intelligence community. My perception is that it would be overly simplistic to place blame on the IC as a whole; the “cards” are stacked against the United States IC as the masses in our nation become more tolerant and inviting to foreign entities.

Therefore the strength of counterintelligence experts is exposed in the aformentioned Iran & China cases as they sifted through a massive amount of information and mis-information in order to initiate the arrest of the foreign intelligence collection agents that were intent on stealing valuable information from our nation.

Again I reiterate that the easy way out is to provide a “scapegoat” in how did the Iran & China thefts occur in the first place; however please allow me to point out that without effective United States effective counterintelligence efforts those crimes against America would have never been discovered in the first place!

In closing as I attempt to address the two poignant questions; what are the US vulnerabilities? And where should the US concentrate its efforts currently?

My view of modern day vulnerabilities that the United States counterintelligence community must deal with is perception itself; prime example being the a segment of the United States leadership and society being drawn into a psychological warfare trap that would allow members of our society to find it acceptable to desecrate a small portion of land in New York City that should be dedicated to the memory of thousands of murdered Americans.

The United States counterintelligence community has the daunting task of protecting a nation that on the surface does not appear it needs protection; that was also our countries perspective on September 11, 2001. I thought the sight on the television of airplanes crashing into a building in New York City had to be trailer for an upcoming movie; sadly I was wrong.

Work Cited:

The Office of the National Counterintelligence Executive (ONCIX) Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, FYI 2008 8/2008_FECIE_Blue.pdf


    0 of 8192 characters used
    Post Comment

    • profile image

      Kevin Fenning 

      7 years ago

      Rider 1,

      Excellent blog, I would recommend http://rideriantieconomicwarfaretrisiii.blogspot.c...

      highly to fellow hubbers, well done!


    • Kevin Fenning profile imageAUTHOR

      Kevin Fenning 

      7 years ago from Philadelphia PA

      Rider 1,

      Thank you for taking the time to read my work, I will read your blog and respond accordingly...thanks again!


    • profile image

      Rider I 

      7 years ago

      I think this is a great piece. I have a theory that the CCP and MSS are specifically doing what the Soviets and US did during the first cold war. Which is puppet specific elements against market places. Which is stated in an algorithmic code of tracing oppressive regimes as per the expenditure that they spend on thwarting terrorist activity. From my theory the Communist Chinese world be an anomaly, as they are not willing to help the international community stop genocide of terrorist camps. Thus placing them in the Charlie Wilson puppet category.


      Rider I

    • dallas93444 profile image

      Dallas W Thompson 

      8 years ago from Bakersfield, CA

      Our infrastructure is also at risk.... Thanks for sharing.

    • Kevin Fenning profile imageAUTHOR

      Kevin Fenning 

      8 years ago from Philadelphia PA

      cluense & junko,

      Thank you both for taking the time to read my work, and your encouraging words!


    • junko profile image


      8 years ago

      interesting perspective

    • cluense profile image

      Katie Luense 

      8 years ago from Buffalo, NY

      Awesome Hub! I rated it up a notch! Keep on writing!

    • Kevin Fenning profile imageAUTHOR

      Kevin Fenning 

      8 years ago from Philadelphia PA


      I concur; and thank you for taking the time to read my work.


    • Mr. Happy profile image

      Mr. Happy 

      8 years ago from Toronto, Canada

      Managing an Empire is tough, for sure - there are many waiting for it to crumble and/or chipping away at it.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)