• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Tech

Diplomacy is failing to protect the United States’ trade secrets

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
May 11, 2015, 1:51 PM ET
A Department of Homeland Security worker listen to U.S. President Barack Obama talk at the National Cybersecurity and Communications Integration Center in Arlington
A Department of Homeland Security worker listens to U.S. President Barack Obama talk at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. REUTERS/Larry Downing (UNITED STATES - Tags: POLITICS SCIENCE TECHNOLOGY CRIME LAW MILITARY) - RTR4LBMOPhotograph by Larry Downing — Reuters

At the moment, hacking is top of mind for the American public, and companies are spending more on security than ever before. But has the problem gotten any better? Not quite.

Last year the number of cyberespionage incidents confirmed by Verizon in its latest data breach investigations report increased to 548 from 511 the year prior. And even though research firm Gartner predicts that information security spending will grow this year to $76.9 billion from $71.1 billion a year ago—an 8.2% increase—the problem persists. State sponsored attackers continue to loot corporate networks for classified information, seeking commercial, military, and political advantage.

Type of data stolen through cyberespionage.Courtesy of Verizon

How has the U.S. handled this threat to its economic well-being? Back in Feb. 2013, President Barack Obama unveiled a plan to beat back cyberespionage.

“Trade secret theft threatens American businesses, undermines national security, and places the security of the U.S. economy in jeopardy,” the administration’s strategy document said. “These acts also diminish U.S. export prospects around the globe and put American jobs at risk.”

The plan laid out five ways the U.S. would counter industrial spying. They can be summed up as:

    1. Using diplomacy to discourage trade partners from stealing trade secrets
    2. Encouraging companies to share best practices around risk mitigation
    3. Making cyber intrusions a priority for law enforcement action
    4. Beefing up legal repercussions and protections
    5. Engaging the public and raising awareness

The country has, to be sure, made progress in some of these areas. A recent executive order imbued the Treasury with the power to sanction “individuals or entities that engage in significant malicious cyber-enabled activities.” Congress has upped maximum penalties and fines for individuals found guilty of any kind of economic espionage by tenfold to $5 million (and $10 million for organizations). And the Federal Bureau of Investigation has been aggressively pursuing economic snoops. “The agency reported a 60 percent increase in trade secret investigations from 2009 through 2013,” as the New York Times points out.

But even as the prosecutions under the Economic Espionage Act have increased, the Justice Department has had difficulty indicting people for online theft of trade secrets. “During the first nine months of [2014], the Justice Department reported 20 new prosecutions under the Economic Espionage Act — a 33 percent increase from 2013 — and several convictions,” writes Nicole Perlroth, “but only two of the indictments involved trade secrets theft via digital intrusions.”

The two cases comprise last year’s indictment of five Chinese nationals for hacking and stealing secrets from various businesses such as Westinghouse and U.S. Steel, and the August indictment of another Chinese national, Su Bin, for doing the same to defense contractors such as Boeing. The U.S. has had no authority to extradite the former from China, while the latter awaits extradition in Canada.

In its latest “301 report” on protecting intellectual property, the Office of the U.S. Trade Representative, which negotiates on trade agreements with foreign governments, places China atop its “priority watch list” alongside nine other countries. Some of the countries—Chile, China, India, Indonesia, Thailand, and Turkey—have remained on that list every year since the first report came out in 1989.

It’s clear that diplomacy—the administration’s priority numero uno for combating digital economic espionage, and the approach with the best chance at success given the U.S.’s lack of enforcement authority abroad—has not been very successful to date. Cyberespionage is still on the rise, and the same countries appear to be to blame.

It’s possible that the executive branch’s newly approved power to impose financial and travel sanctions on perpetrators may change the game. But that solution faces challenges, too. As Verizon’s report reveals, not knowing who’s behind a hacking remains a problem: “Two-thirds of the incidents in this pattern had no attacker-attribution information whatsoever,” the report says in the cyberespionage section. That’s a lot of whodunnit.

For the time being, diplomacy will likely remain the U.S.’s best option in combatting cyberspies. That said: Without the requisite muscle or confidence in attribution, it’s bound to continue to be ineffectual. States will just continue to evade and parry accusations of hacking.

“Conditions are likely to deteriorate,” the 301 report says, less than optimistically, “as long as those committing such thefts, and those benefitting, continue to operate with relative impunity.”

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

Latest in Tech

Bill Gates speaks onstage at the Bloomberg Philanthropies Global Forum 2025 at The Plaza Hotel on September 24, 2025 in New York City.
AIBill Gates
Bill Gates says AI could be used as a bioterrorism weapon akin to the COVID pandemic if it falls into the wrong hands
By Eleanor PringleJanuary 9, 2026
8 hours ago
shapiro
Big TechMedia
Netflix’s competition isn’t sleep anymore. Its battle against YouTube is like fighting an ‘infinite number of monkeys,’ top strategist says
By Nick LichtenbergJanuary 9, 2026
9 hours ago
Bill Gates pictured in New York, May 2025.
SuccessBill Gates
Read Bill Gates’s 2026 annual letter in full
By Eleanor PringleJanuary 9, 2026
9 hours ago
A screen displays the Grok logo while a person holds another phone in front.
AIX
Lawmakers and victims criticize the choice to limit Grok’s AI image generation to paid users as ‘insulting’ and ‘not effective’
By Beatrice NolanJanuary 9, 2026
11 hours ago
NewslettersTerm Sheet
Andreessen Horowitz’s shiny, new $15 billion reveals where the firm sees the biggest opportunities
By Allie GarfinkleJanuary 9, 2026
11 hours ago
Chinese and U.S. flags wave outside a technology company in Beijing, on April 17, 2025. (Photo: Pedro Pardo/AFP/Getty Images)
NewslettersFortune Tech
‘Salt Typhoon’ hackers accessed email of U.S. congressional committee staff
By Andrew NuscaJanuary 9, 2026
12 hours ago

Most Popular

placeholder alt text
Success
Diary of a CEO founder says he hired someone with 'zero' work experience because she 'thanked the security guard by name' before the interview
By Emma BurleighJanuary 8, 2026
1 day ago
placeholder alt text
Workplace Culture
Amazon demands proof of productivity from employees, asking for list of accomplishments
By Jake AngeloJanuary 8, 2026
1 day ago
placeholder alt text
North America
Bill Gates warns the world is going 'backwards' and gives 5-year deadline before we enter a new Dark Age
By Eleanor PringleJanuary 9, 2026
9 hours ago
placeholder alt text
Crypto
Russia and Iran are increasingly turning to crypto—especially stablecoins—to avoid sanctions, report finds
By Carlos GarciaJanuary 8, 2026
1 day ago
placeholder alt text
Real Estate
Google billionaire Larry Page copies the Jeff Bezos playbook, buying a $173 million Miami compound that will save him millions in taxes
By Nick LichtenbergJanuary 8, 2026
1 day ago
placeholder alt text
Law
Amazon is cutting checks to millions of customers as part of a $2.5 billion FTC settlement. Here's who qualifies and how to get paid
By Sydney LakeJanuary 6, 2026
3 days ago

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.