5+ Crushing Corporate Espionage Cases—Are Your Trade Secrets Safe?

Corporate espionage: Crushing cases of IP theft

Are your trade secrets safe against corporate spies? These examples of corporate espionage highlight the great lengths that foreign governments and competing companies will go to maintain an advantage over their competitors.

If you like this article be certain to check out our article on the Worst Examples of Data Theft by Employees.

Key Definitions

A female teacher points to a chalkboard

What is Corporate Espionage?

“Corporate espionage — sometimes also called industrial espionage, economic espionage or corporate spying — is the practice of using espionage techniques for commercial or financial purposes. We usually think of “espionage” in terms of spies working on behalf of one government trying to get information about another. But in fact, many of the same techniques — and even many of the same spies — work in both realms.”

CSO Online

The Economic Espionage Act of 1996 (EEA), 18 U.S.C. §§ 1831-1839, defines the term “economic espionage” as the theft or misappropriation of a trade secret with the intent or knowledge that the offense will benefit any foreign government, foreign instrumentality, or foreign agent.

Corporate espionage is the unlawful practice of obtaining non-public proprietary or operational information. Corporate espionage is practiced by foreign companies, a foreign agent, a foreign government, and commercial organizations in the private sector to enhance economic development, build more advanced military technology, and gain a competitive advantage.

While high-tech industries such as manufacturing, life sciences, automotive, and aerospace are most commonly the targets of corporate espionage, any company with sensitive proprietary data can become a target.

According to the National Bureau of Asian Research, the annual cost to the U.S. economy of counterfeit goods, pirated software, and theft of trade secrets is between $225 billion and $600 billion. 

Examples of Corporate Spying Include:

  • Having an employee of one company get hired by another company for the purpose of acting as a corporate spy for their primary employer.
  • Hiring an ex-employee of a competitor with the intent of gaining access to insider information
  • Gaining access to computer systems such as computer databases via a cyber attack for the purposes of technological surveillance or stealing company data
  • Stealing assets such as hard drives and laptops to gain access to the data they contain

Corporate Espionage vs Competitive Intelligence

Corporate espionage/industrial espionage refers to the unlawful acquisition of proprietary information through means such as bribery, technological surveillance, the recruitment of spies, etc.

In contrast to industrial espionage, competitive intelligence refers to the lawful collection of open source information such as mergers and acquisitions, new government regulations, and information gained from publicly available sources such as social media. 

Competitive intelligence companies will use this public information to advise their clients on the steps they need to take to remain competitive. This information is so valuable that many companies now have Operational Security teams that closely manage what information is released to the public.

What Are Trade Secrets?

18 U.S. Code § 1839 defines “trade secret” as all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if—

  • (A) the owner thereof has taken reasonable measures to keep such information secret; and
  • (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, another person who can obtain economic value from the disclosure or use of the information;

Examples of Trade Secrets:

  • Marketing strategies, pricing schemes
  • Manufacturing assets including processes, blueprints, and CAD files
  • Source code for a closed-source program
  • The original Coca-Cola recipe

Viking Yachts Protects Intellectual Property From a Departing Employee (Corporate Espionage Case Study)

A departing employee was caught stealing classified files! If we didn’t have AccessPatrol we would never have known.

The data security risks of offboarding employees simply cannot be understated. It’s been reported that 70% of intellectual property theft occurs within the 90 days before an employee’s resignation announcement.

Viking Yachts faced this risk head-on when a soon-to-be-ex-employee attempted to steal their intellectual property to gain favor with one of their competitors.

Learn how Viking Yachts protected themselves against industrial espionage and economic injury in our case study.

Is Industrial Espionage Illegal?

The legality of industrial espionage, corporate spying, et al. varies between different jurisdictions. Even when such regulations exist they may still prove difficult to enforce when industrial espionage is carried out by an uncooperative foreign government. This is most notable when you consider the history of industrial espionage between the United States and China.

The U.S. government governs corporate espionage by the Economic Espionage Act of 1996 (EEA), a federal law that makes theft or misappropriation of trade secrets, primarily through acts of industrial espionage, a federal crime. 

The EEA is further extended by the Defend Trade Secrets Act Of 2016 which allows an owner of a trade secret to sue in federal court when its trade secrets have been misappropriated.

As for the United Kingdom, up until recently there were no current criminal offenses specifically designed to protect the UK and its interests from the illicit acquisition of trade secrets conducted by foreign states. 

This all changed in 2022 when the UK introduced a National Security Bill that repeals the Official Secrets Acts. It includes offenses for obtaining or disclosing protected information, obtaining or disclosing trade secrets, and assisting a foreign intelligence service. 

Software to Protect Your Company Against Industrial Espionage

Protect your sensitive data against insider threats with the robust data loss prevention and user activity monitoring features in the CurrentWare Suite.

  • Prevent Data Leaks
    Restrict access to cloud storage, apps, and removable media devices
  • Intuitive User Activity Reports
    User-friendly reports make it easy to monitor for high-risk activity
  • Meet Regulatory Compliance Requirements
    Address critical cybersecurity gaps to strengthen your security posture

Corporate Espionage Cases

NVIDIA Allegedly Develop Its First Parking-Assistance Software With Stolen Trade Secrets (2023)

In 2023 a software developer for NVIDIA was convicted in Germany for unlawful acquisition, use, and disclosure of trade secrets that he stole from his previous employer, Germany-based automotive-technology company Valeo Schalter und Sensoren. 

These stolen trade secrets were then allegedly used by NVIDIA to develop its first parking-assistance software. According to the lawsuit, the stolen trade secrets “provided NVIDIA and its engineers a shortcut in the development of its first parking-assistance software, and saved NVIDIA millions, perhaps hundreds of millions, of dollars in development costs.”

Gillette vs Steven Louis Davis (1997)

Gillette razor

  • Affected Company: The Gillette Company
  • Industry/Market: Men’s Razors & Shaving Products
  • Crime: Wire fraud & theft of trade secrets
  • Verdict: US $1.5M+ damages, 2 year prison sentence

“Congress correctly understood that, in this day and age, stealing trade secrets can be more damaging than breaking into a company’s warehouse and stealing its inventory. That is particularly so in Massachusetts, where intellectual property is our life blood. In this case, it is alleged that the defendant stole Gillette’s shave secrets.”

Donald K. Stern, US Attorney

When it comes to mitigating the risks of insider threats it’s critical to realize that everyone with access to proprietary information is a potential threat. This example of corporate espionage showcases how not all corporate espionage is the result of a company’s immediate employees and hostile foreign governments; third-party contractors are just as much of a vulnerability.

In 1997 Steven Louis Davis, a subcontractor for Gillette from Washington, Iowa, was convicted for stealing trade secrets by emailing and faxing them to competitors. These trade secrets were technical drawings of a new shaving system that Gillette had spent $750 million developing.

Davis was employed as a process control engineer for Wright Industries, Inc., a third-party designer of fabrication equipment, which had been hired by Gillette to assist in the development of the new shaving system. 

It has been said that Davis’ motivation for his corporate espionage against Gillette was due to being disgruntled with his working conditions, fearing that his job was in jeopardy, and anger against his supervisor.

Once Gillette uncovered the intellectual property theft incident they swiftly reported it to the Federal Bureau of Investigation (FBI), the principal federal law enforcement agency, domestic intelligence, and security service of the United States.

Davis later went on to agree in a plea agreement that the loss caused by his conduct was at least $1.5 million.

Davis was ultimately charged with wire fraud and theft of trade secrets, which led him to be sentenced to 2 years of prison. His sentence was a significant reduction from what he was initially facing: A ten-year term of imprisonment on each of the five trade secrets counts, a five-year term on each of the wire fraud counts, and a fine of $250,000 on each count.

Avery Dennison Corp Vs Four Pillars Enterprises Ltd. (1999)

Avery Dennison logo
  • Affected Company: Avery Dennison Corp
  • Industry/Market: Manufacturing (Packaging and labeling)
  • Crimes: Economic espionage, mail fraud, wire fraud, money laundering, receipt of stolen property and theft of trade secrets
  • Verdict: US $40M+ damages

“In 1997, Avery Dennison sued Four Pillars in the Northern District of Ohio, alleging theft of trade secrets and violations of RICO in a scheme whereby Four Pillars recruited one of Avery Dennison’s employees to deliver trade secrets and other confidential material to Four Pillars. …in 1999 Four Pillars and two of its employees were convicted of attempt and conspiracy to steal Avery Dennison’s trade secrets, in violation of the Economic Espionage Act of 1996, 18 U.S.C. § 1832.  The convictions were affirmed on appeal. See United States v. Yang, 281 F.3d 534 (6th Cir.2002).”

FindLaw.com

“The indictment alleges that from July of 1989 through 1997 the defendants, Pin Yen Yang, a.k.a. P.Y. Yang, his daughter Hwei Chen Yang, a.k.a. Sally Yang and Four Pillars Enterprise Company, LTD, of Taiwan, engaged in a scheme to defraud Avery of the intangible right to the honest service of Victor Lee and of its confidential and proprietary information and trade secrets. Since July of 1989 the defendants have obtained, among things, proprietary and confidential Avery information relating to formulations for self-adhesive products.”

Justice.gov

Four Pillars is a manufacturer of pressure-sensitive products in Taiwan, and Avery Dennison is one of the largest manufacturers of adhesive labels in the United States.The two companies initially considered a joint venture in Asia before their relationship became adversarial. 

Despite the lack of a partnership, Four Pillars was able to leverage an insider transferring trade secrets from Avery Dennison to them so they could gain the competitive intelligence they needed to compete.

Four Pillars was able to get away with secretly acquiring trade secrets between 1989-1997 until an employee of theirs applied for work with Avery Dennison. During their interview the employee revealed that Avery Dennison’s adhesive formulas were being provided to Four Pillars by an employee of Avery Dennison. This revelation resulted in an FBI investigation that would later lead to civil and criminal penalties against Four Pillars.

The saga of Avery Dennison Corp Vs Four Pillars Enterprises Ltd. spans across various civil suits and a criminal prosecution. 

One of the civil suits was tried under the 1996 Economic Espionage Act, which Congress passed to protect US companies from thefts by foreign businesses and governments. 

Authorities claimed in the trial that a worker for Avery Dennison in Ohio had divulged trade secrets to Four Pillars regarding adhesives used in items such as battery labels and self-stick postal stamps.

The key players for Four Pillars were Pin Yen Yang, Four Pillars’ former chief executive, his daughter Hwei Chen Yang, and Ten Hong (Victor) Lee, a former research scientist for Avery Dennison, who testified during the criminal trial that he gave Four Pillars access to more than 12,000 research and development documents outlining the company’s adhesive formulas and other proprietary information.

Ultimately, Avery Dennison Corp. was awarded at least US $40M in damages in a civil suit accusing Four Pillars Enterprises Ltd. of misappropriating trade secrets. Victor Lee was charged with wire fraud for “defrauding his employer of their right to his honest services.“

So, why did Victor Lee transfer trade secrets to Four Pillars? Simply put, Four Pillars knew the value of competitive intelligence and they paid accordingly, with some reports claiming they paid a sum of $150,000 over the course of 8 years to gain access to Avery Dennisons’ corporate secrets. The Yangs’ investment is said to have resulted in an approximate $30 to 50 million loss to Avery Dennison. 

Further Reading:

United States v. Lange (2002)

Fighter jet flying high in the atmosphere
  • Affected Company: Replacement Aircraft Parts Co. (“RAPCO”)
  • Industry/Market: Manufacturing (Aviation)
  • Crimes: Theft of Trade Secrets under 18 U.S.C. § 1832 of the Economic Espionage Act of 1996
  • Verdict: 30 months’ imprisonment 

“Matthew Lange has been convicted of violating 18 U.S.C. § 1832, part of the Economic Espionage Act of 1996.  This statute makes it a felony to sell, disseminate, or otherwise deal in trade secrets, or attempt to do so, without the owner’s consent. Lange stole computer data from Replacement Aircraft Parts Co. (RAPCO), his former employer, and attempted to sell the data to one of RAPCO’s competitors.”

FindLaw.com

The case of United States v. Lange serves as a prime example of how “company trade secrets” are defined in the legal sense. 

As a manufacturer for the aviation industry, RAPCO needs to invest years of work and a significant amount of money to design, and obtain approval for, their parts. Their products must be exhaustively tested to demonstrate, to the FAA’s satisfaction, that all requirements have been met before they will certify the part for sale.

While the exact dollar figure invested in the brake assembly referenced in United States vs Lange is not disclosed, one can consider that the dynamometer testing alone is expected to cost $75,000.

That said, this expensive and time consuming process can be avoided if a manufacturer demonstrates that its parts are identical (in composition and manufacturing methods) to parts that have already been certified.

If RAPCO’s competitors could gain access to their testing data they could gain the competitive advantage with a considerably lesser investment. Matthew Lange, a disgruntled former employee of RAPCO, was all too aware of the value that this competitive intelligence could provide to their competitors.

Lange offered RAPCO’s competitors all of the information required for them to get FAA certification for various identical parts that were already certified thanks to RAPCO’s extensive testing. This information included completed specifications and engineering diagrams, as well as valuable data from their tests.

To help facilitate his desired sale, Lange went to the internet and offered RAPCO’s information for $100,000 alongside a pirated copy of AutoCAD®, the computer-assisted drawing software that RAPCO uses to maintain its drawings and specifications data. 

Lange was caught when someone he offered the data to reported him to the FBI. With the FBI involved Lange was readily caught and brought to trial.

Lange’s key argument was that, though the competitive intelligence was of value to competitors, it did not meet his understanding of the definition of trade secrets. 

Ultimately the courts determined that the data Lange attempted to sell was considered trade secrets due to key factors, including:

  • Physical Security: RAPCO stored all of its drawings and manufacturing data in its CAD room, which is protected by a special lock, an alarm system, and a motion detector.
  • Data Limitation: Documentation describing the trade secret was limited, with surplus copies of their sensitive information being shredded.
  • Access Control: The number of employees with access to the trade secret was limited and vendors were only provided with partial information of the trade secret so they could not replicate it. 
  • Communication: Employees were notified they were working with confidential information and warnings were placed on trade secret information. 

As a result of the trial Lange was sentenced to 30 months’ imprisonment.


data theft prevention - a guide to offboarding employees - CurrentWare

The employee offboarding process presents significant data security risks. Employees have intimate access to corporate data, insider knowledge of the organization’s systems, and a level of trust that can allow them to steal data undetected.

  • 70% of intellectual property theft occurs within the 90 days before an employee’s resignation announcement
  • 88% of IT workers have stated that they would take sensitive data with them if they were fired
  • 72% of CEOs admit they’ve taken valuable intellectual property (IP) from a former employer
  • 50% of respondents in a Symantec survey say they have taken information, and 40% say they will use it in their new jobs

These vulnerabilities need to be addressed as part of any insider threat management program. Click the button below to learn the best practices for protecting data during a termination and gain access to a downloadable IT offboarding checklist.


Disgruntled Employee Attempts To Sell Coca-Cola’s Secret Formula To Pepsi (2006)

Dramatically lit photo of a red Coca-Cola can engulfed in shadows
  • Affected Company: Coca-Cola
  • Industry/Market: Beverages
  • Crimes: Wire fraud, unlawfully stealing and selling trade secrets.
  • Verdict:  Various prison sentences between 2–8 years

“We did what any responsible company would do. Competition can sometimes be fierce, but also must be fair and legal. We’re pleased the authorities and the FBI have identified the people [allegedly] responsible for this.”

Dave DeCecco, PepsiCo Spokesperson

While the competitive advantages provided by economic and industrial espionage are of great value to competitors, knowingly accepting commercial secrets from industrial spies can result in significant legal penalties.

While Coca-Cola and Pepsi are two industry giants that seek to gain every competitive advantage possible (as evidenced by the Cola Wars), Pepsi ultimately decided that the federal crime of stealing commercial secrets was not worth the advantage.

Here’s the story:

  • c. 2006 Joya Williams, the administrative assistant to the Global Head of Marketing at Coca-Cola, attempted to steal and then sell “very detailed and very confidential information” about several items Coca-Cola was working on. 
  • Unfortunately, the employee was under a strict non disclosure agreement. To get around this the ex-employee enlisted the help of accomplices to reach out to Pepsi and sell them the secret formula—Edmund Duhaney and Ibrahim Dimson.
  • Pepsi wanted nothing to do with what it believed was stolen data and notified  Coca-Cola. 
  • Coca-Cola then called in the FBI, which set up a sting operation. During the sting they were demanded $10,000 in exchange for the information, as well as $75,000 for a sample of a top secret new product Coca-Cola was planning to introduce to the marketplace.
  • On July 5, 2006, Williams, Dimson, and Duhaney were arrested on charges of wire fraud and unlawfully stealing and selling trade secrets.In a swift trial, Duhaney and Dimson were handed 2-year and 5-year prison sentences, respectively. Williams served 8 years in prison.

Further Reading:

Boeing Engineer Sells Trade Secrets To China (2010)

Airplane taking off into the sunset
  • Affected Company: Boeing
  • Industry/Market: Aerospace & Defense
  • Crimes: Conspiracy to commit economic espionage, six counts of economic espionage to benefit a foreign country, one count of acting as an agent of the People’s Republic of China, and one count of making false statements to the FBI. 
  • Verdict: Sentenced to 15 years in prison

In February 2010, former Boeing engineer Dongfan “Greg” Chung was sentenced to 16 years in prison for stealing trade secrets related to the US Space Shuttle program and the Delta IV rocket. Over the course of 30 years Chung provided secrets regarding U.S. aerospace technologies to China.

This example of corporate espionage was the first ever trial conviction under the Economic Espionage Act of 1996.

According to the Trade Secrets Institute, United States federal agents first suspected Chung of espionage during an unrelated investigation of an individual named Chi Mak, a former naval engineer for a US defense contractor similar to Boeing. 

During that investigation they found links between Chunk and Mak that prompted the FBI to investigate Chung further. In their investigation they uncovered Boeing documents in his trash. 

A later search of his home uncovered documents including a detailed journal describing Chung’s travel for meetings and “espionage activities” in China, as well as approximately 300,000 pages of documents related to Boeing space vehicles, helicopters, fighter jets, and thermal protection systems stored in binders.Among these countless documents 6 of them were identified by the United States government as Boeing trade secrets.

Ultimately Chung’s actions caused him to be charged with conspiracy to commit economic espionage, six counts of economic espionage to benefit a foreign country, one count of acting as an agent of the People’s Republic of China, and one count of making false statements to the FBI.

Further Reading:

Bonus: Top 10 Most Infamous Cases of Corporate Espionage (WatchMojo)

Conclusion

Whether you are a private company or a government agency, you are at risk of industrial espionage. These industrial espionage examples highlight the great lengths that companies and foreign governments will go when it comes to orchestrated espionage for their gain.

Want to protect your company against industrial espionage? View these resources from CurrentWare to learn more about protecting your intellectual property against trusted insiders

Dale Strickland
Dale Strickland
Dale Strickland is the Digital Marketing Manager for CurrentWare, a global provider of user activity monitoring, web filtering, and device control software. Dale’s diverse multimedia background allows him the opportunity to produce a variety of content for CurrentWare including blogs, infographics, videos, eBooks, and social media shareables.