Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/159082
|
Title: | 數位時代的國家經濟安全:美國與英國因應中國網路及混合式經濟間諜行為之法律架構比較研究 National Economic Security in the Digital Age: The United States’ and the United Kingdom’s Legal Frameworks Against Chinese Cyber and Hybrid Economic Espionage |
Authors: | 楊愛恩 Young, Judithanne Oi Yun |
Contributors: | 林夏如 Lin, Syaru Shirley 楊愛恩 Young, Judithanne Oi Yun |
Keywords: | 網路經濟間諜 商業機密竊取 智慧財產權 Cyber economic espionage Trade secret theft Intellectual property |
Date: | 2025 |
Issue Date: | 2025-09-01 15:01:29 (UTC+8) |
Abstract: | 本論文對美國與英國針對中國國家支持的網路經濟間諜問題之法律回應進行比較分析。由於現行國際法在處理跨國網路經濟間諜方面仍顯不足,各國遂依賴本國法律架構以遏止經濟間諜行為。本研究檢視了若干關鍵法規,包括美國《1996年經濟間諜法》(Economic Espionage Act of 1996)、《2016年保護商業機密法》(Defend Trade Secrets Act of 2016),以及英國《2023年國家安全法》(National Security Act 2023),並探討其他相關的刑事與民事法律。為進一步評估美國與英國法律體系的充分性,本研究亦分析若干案例研究,包括與上述問題相關之公開歸責事件。 本研究採用比較法之功能性方法,評估兩國法律框架在執行與威懾中國國家支持之網路經濟間諜威脅方面的有效性。英國更新後的間諜罪架構擴大了其應對現代間諜威脅(包括商業機密間諜)的法律權限,惟其制度仍不成熟且缺乏公共透明度。儘管美國擁有較為完善之經濟間諜與商業機密竊取的成文法體系,但仍面臨司法管轄權限制與量刑不一致的問題。 分析結果發現,兩國制度皆面臨處理網路經濟間諜各面向的挑戰,包括證明中國國家支持的充分證據、偵測與抓捕透過網路遠端作案之行為者等。本論文最後提出具體政策建議,以強化威懾力、促進私部門合作,並提升國際合作水平。此研究旨在促進對各國法律策略如何在數位時代中保護經濟安全、應對經濟間諜威脅的理解。 This thesis conducts a comparative analysis of the United States' and the United Kingdom's legal responses to the problem of Chinese state-sponsored cyber and hybrid economic espionage. As current international law is insufficient in addressing transnational cyber-enabled economic espionage, states rely on their own national legal frameworks to deter economic espionage. The research examines key statutes, including the United States' Economic Espionage Act of 1996, the Defend Trade Secrets Act of 2016, and the United Kingdom's National Security Act 2023, alongside other applicable criminal and civil laws. To further assess the sufficiency of the United States' and United Kingdom's legal systems, select case studies, including public attributions of incidents associated with the highlighted problem are analyzed too. Applying the functional methodology of comparative law, the study evaluates the effectiveness of each country's legal framework in enforcement and deterrence of the threat of Chinese state-sponsored cyber economic espionage. The United Kingdom's updated espionage offense framework expands the state's legal authority to deal with modern espionage threats, including trade secrets espionage, but is still underdeveloped and lacks public transparency. Although the United States possesses a more developed statutory law framework against economic espionage and theft of trade secrets, it still struggles with jurisdictional limitations and inconsistent sentencing. The analysis finds that both systems face challenges in addressing all facets of cyber and hybrid economic espionage from providing sufficient evidence of Chinese state-sponsorship to detecting and apprehending actors operating remotely through cyberspace. The thesis concludes with targeted policy recommendations to strengthen deterrence, bolster private sector cooperation, and enhance international cooperation. This study seeks to contribute to a greater understanding of national legal strategies in safeguarding economic security against economic espionage threats in the digital age. |
Reference: | Akoto, W. (2024). Who spies on whom? Unravelling the puzzle of state-sponsored cyber economic espionage. Journal of Peace Research, 61(1), 59-71. Beconcini, P. (2021). The State of Trade Secret Protection in China in Light of the US-China Trade Wars: Trade Secret Protection in China Before and After the US-China Trade Agreement of January 15, 2020, 20 UIC Rev. Intell. Prop. L. 108 (2021). UIC Review of Intellectual Property Law, 20(2), 2. Buchan, R. J. (2016). The international legal regulation of cyber espionage. Tallinn Papers, 65-86. Center for Responsible Enterprise and Trade (CREATe.org) & PricewaterhouseCoopers. (2014). Economic impact of trade secret theft: A framework for companies to safeguard trade secrets and mitigate potential threats. https://www.innovation-asset.com/hubfs/blog-files/CREATe.org-PwC-Trade-Secret-Theft-FINAL-Feb-2014_01.pdf Center, M. I. (2013). APT1: Exposing one of China’s cyber espionage units. Mandian.com. Computer Misuse Act 1990, c. 18. https://www.legislation.gov.uk/ukpga/1990/18 Constantin, L. (2025, January 3). Chinese apt group Winnti stole trade secrets in years-long undetected campaign. CSO Online. https://www.csoonline.com/article/572667/chinese-apt-group-winnti-stole-trade-secrets-in-years-long-undetected-campaign.html Corera, G. (2022, July 7). China: MI5 and FBI heads warn of “immense” threat. BBC News. https://www.bbc.com/news/world-asia-china-62064506 Crown Prosecution Service. (2022). Cyber / online crime. https://www.cps.gov.uk/crime-info/cyber-online-crime Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure, 88 Fed. Reg. 51896 (Aug. 4, 2023) Dagg, N., Baldwin, S., Clarke, R., & Grant, A. (2025). Trade secrets 2025. Trade Secrets 2025 - UK | Global Practice Guides | Chambers and Partners. https://practiceguides.chambers.com/practice-guides/trade-secrets-2025/uk Defend Trade Secrets Act of 2016 (Pub. L. No. 114-153). https://www.congress.gov/bill/114th-congress/senate-bill/1890/text Department for Science, Innovation and Technology. (2025, April 9). Cyber Security and Resilience Bill: Policy Statement. GOV.UK. https://www.gov.uk/government/publications/cyber-security-and-resilience-bill-policy-statement/cyber-security-and-resilience-bill-policy-statement Detica. (2011). The Cost of Cyber Crime. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/60942/THE-COST-OF-CYBER-CRIME-SUMMARY-FINAL.pdf Directive (EU) 2016/943. On the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure. European Parliament and Council. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016L0943 Doyle, C. (2016, August 19). Stealing trade secrets and economic espionage: An overview of the Economic Espionage Act [Report]. University of North Texas Libraries, UNT Digital Library. https://digital.library.unt.edu/ark:/67531/metadc958627/ Economic Espionage Act of 1996, 18 U.S.C. §§ 1831–1839. https://www.congress.gov/104/plaws/publ294/PLAW-104publ294.pdf Federal Bureau of Investigation. (n.d.). Cyber incident reporting: A unified message for reporting to the federal government. https://www.fbi.gov/file-repository/cyber-incident-reporting-united-message-final.pdf/view Feuer, Katherine. (2015). Protecting government secrets: comparison of the espionage act and the official secrets act. Boston College International and Comparative Law Review, 38(1), 91-[i]. Fick, N., Miscik, J., Segal, A., & Goldstein, G. M. (2022). Confronting reality in cyberspace: Foreign policy for a fragmented internet. Council on Foreign Relations. https://www.cfr.org/task-force-report/confronting-reality-in-cyberspace Foreign & Commonwealth Office, National Cyber Security Centre, & Jeremy Hunt MP. (2018, December 20). UK and allies Reveal Global Scale of Chinese Cyber Campaign. GOV.UK. https://www.gov.uk/government/news/uk-and-allies-reveal-global-scale-of-chinese-cyber-campaign Foreign, Commonwealth & Development Office, National Cyber Security Centre, & The Rt Hon Dominic Raab. (2021, July 19). UK and allies hold Chinese state responsible for a pervasive pattern of hacking. GOV.UK. https://www.gov.uk/government/news/uk-and-allies-hold-chinese-state-responsible-for-a-pervasive-pattern-of-hacking Foreign, Commonwealth & Development Office, National Cyber Security Centre, Cabinet Office, Home Office, The Rt Hon Lord Cameron, The Rt Hon James Cleverly MP, & The Rt Hon Oliver Dowden CBE MP. (2024, March 25). UK holds China state-affiliated organisations and individuals responsible for malicious cyber activity. GOV.UK. https://www.gov.uk/government/news/uk-holds-china-state-affiliated-organisations-and-individuals-responsible-for-malicious-cyber-activityGOV.UK Fraud Act 2006, c. 35. https://www.legislation.gov.uk/ukpga/2006/35 Gilmore, A., & Latham-Koenig, D. (2025, March 6). In defence of the realm – the national security act 2023 and the role of private investigators. Solicitors Journal. https://www.solicitorsjournal.com/sjarticle/in-defence-of-the-realm--the-national-security-act-2023-and-the-role-of-private-investigators Government Digital Service. (2024, August 19). New espionage offences: Factsheet. GOV.UK. https://www.gov.uk/government/publications/national-security-bill-factsheets/espionage-etc-national-security-bill-factsheet Grabiszewski, K., & Minor, D. (2018). Economic Espionage. Defence and Peace Economics, 30(3), 269–277. https://doi.org/10.1080/10242694.2018.1477400 Guo, E., Aloe, J., & Hao, K. (2022, May 11). The US crackdown on Chinese economic espionage is a mess. We have the data to show it. MIT Technology Review. https://www.technologyreview.com/2021/12/02/1040656/china-initative-us-justice-department/ Hamilton, F. (2023, October 17). China targets 20,000 officials in economic espionage surge. The Times & The Sunday Times. https://www.thetimes.com/business-money/technology/article/china-targets-20-000-officials-in-economic-espionage-surge-hrncc2xkz Harnisch, S., & Zettl-Schabath, K. (2023). Secrecy and Norm Emergence in Cyber-Space. The US, China and Russia Interaction and the Governance of Cyber-Espionage. Democracy and Security, 19(1), 82-110. https://www3.ntd.com/eu-sanctions-cyber-attackers-for-first-time Indictment: United States v. Jiang Lizhi, Qian Chuan, and Fu Qiang (No. 1:20-cr-00154). (2020). U.S. District Court for the District of Columbia. Information Commissioner’s Office. (n.d.). Incident reporting under the NIS Regulations. https://ico.org.uk/for-organisations/the-guide-to-nis/incident-reporting/ Jarvis, D. (2025). Foreign influence registration scheme implementation. GOV.UK. https://www.gov.uk/government/speeches/foreign-influence-registration-scheme-implementation Jensen, B. (2023). How the Chinese Communist Party uses cyber espionage to undermine the American economy. CSIS. KC, B. J., & Burges, T. (2024). How to prosecute a spy: the National Security Act 2023 in context. Archibold Review, 6, 5-10. https://redlionchambers.co.uk/wp-content/uploads/2024/07/Archbold-Review-Issue-6-2024.pdf Kendall, S. (2024). Espionage law in the UK and Australia: Balancing effectiveness and appropriateness. The Cambridge Law Journal, 83(1), 62-98. Lifhits, Jenna. (2024). Sentencing economic espionage in an era of great power competition. Georgetown Journal of Law & Public Policy, 22(1), 353-[ii]. Lincenberg, G. S., & Shakow, P. J. (2014). The Secret No More: The Rise of Economic Espionage Prosecutions and How to Litigate Them. Crim. Just., 29, 15. Lotrionte, C. (2015). Countering state-sponsored cyber economic espionage under international law. North Carolina Journal of International Law and Commercial Regulation, 40(2), 443-54. Madubuko, C. C., & Chitsungo, C. (2024). The Evolution of China’s Cyber-Espionage Tactics: From Traditional Espionage to AI-Driven Cyber Threats against Critical Infrastructure in the West. American Journal of International Relations, 9(4), 25-50. Maness, R. C., Macias, A., Mond, J., Hedgecock, K., Jensen, B., & Ziegler, R. (2023). Expanding the Dyadic Cyber Incident and Campaign Dataset (DCID): Cyber conflict from 2000 to 2021. The Cyber Defense Review, 8(2), 39–55. https://cyberdefensereview.army.mil/Portals/6/Documents/2023_Summer/Maness_Macias%20et%20al%20CDR%20V8N2%20Summer%202023.pdf Manion, P. J. (2016). Two Steps Forward, One Step Back: The Defend Trade Secrets Act of 2016 and Why the Computer Fraud and Abuse Act of 1984 Still Matters for Trade Secret Misappropriation. J. Legis., 43, 289. Marvin, M. (2023, April 21). Could bespoke malware target your organization?. Portnox. https://www.portnox.com/blog/network-security/could-bespoke-malware-target-your-organization/ McCallum, K. (2024). Director general Ken McCallum gives latest Threat update. https://www.mi5.gov.uk/director-general-ken-mccallum-gives-latest-threat-update Michaels, R. (2006). The Functional Method of Comparative Law. The Oxford Handbook of Comparative Law (pp. 339-382). https://scholarship.law.duke.edu/faculty_scholarship/1249 Montasari, R. (2023).Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Springer International Publishing AG. Moynihan, H. (2019, December). The application of international law to state cyberattacks: Sovereignty and non intervention (Research Paper). Chatham House. https://www.chathamhouse.org/sites/default/files/publications/research/2019-11-29-Intl-Law-Cyberattacks.pdf Nasheri, H. (2023). State-sponsored economic espionage in cyberspace: Risks and preparedness. In Cybercrime in the pandemic digital age and beyond (pp. 87-107). Cham: Springer International Publishing. Nasu, H. (2015). STATE SECRETS LAW AND NATIONAL SECURITY. International and Comparative Law Quarterly, 64(2), 365–404. doi:10.1017/S0020589315000056 National Counterintelligence and Security Center (2021, August 19). HAFNIUM compromises MS Exchange Servers (No. 1:20-cr-00154). National Counterintelligence and Security Center. https://www.dni.gov/files/NCSC/documents/SafeguardingOurFuture/HAFNIUM%20Compromises%20MS%20Exchange%20Servers.pdf National Cyber Security Centre. (2017, April 3). Global targeting of enterprises via managed service providers. NCSC. https://www.ncsc.gov.uk/information/global-targeting-enterprises-managed-service-providers National Cyber Security Centre. (2018, December 10). Alert: APT10 continues to target UK organisations across ... NCSC. https://www.ncsc.gov.uk/files/APT10%20advisory%20v2.pdf National Cyber Security Centre. (2023, August 23). Categorising UK cyber incidents. https://www.ncsc.gov.uk/information/categorising-uk-cyber-incidents National Cyber Security Centre. (2025). Cyber Incident Response. NCSC. https://www.ncsc.gov.uk/schemes/cyber-incident-response National Security Act 2023, c. 32. https://www.legislation.gov.uk/ukpga/2023/32/section/2 Nocturnus, C. (2024). Operation cuckoobees: Cybereason uncovers massive Chinese intellectual property theft operation. Cybersecurity Software. https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation O’Connor, I. (2024, July 24). Watch out Europe: China is stealing your chip secrets. CEPA. https://cepa.org/article/watch-out-europe-china-is-stealing-your-chip-secrets/ Official Secrets Act 1889, 52 & 53 Vict. c. 52. https://www.legislation.gov.uk/ukpga/Vict/52-53/52/enacted Official Secrets Act 1911, c. 28. https://www.legislation.gov.uk/ukpga/Geo5/1-2/28 Official Secrets Act 1920, c. 75. https://www.legislation.gov.uk/ukpga/Geo5/10-11/75 Official Secrets Act 1989, c. 6. https://www.legislation.gov.uk/ukpga/1989/6 Pacini, C., & Placid, R. (2009). The importance of state trade secret laws in deterring trade secret espionage. Buffalo Intellectual Property Law Journal, 7(1), 101. https://digitalcommons.law.buffalo.edu/buffaloipjournal/vol7/iss1/4 Pietsch, I.M. (2023, September 12). Trade secrets misappropriation: A new criminal offence in the UK. Global Policy Watch. https://www.globalpolicywatch.com/2023/09/trade-secrets-misappropriation-a-new-criminal-offence-in-the-uk/ PwC UK, & BAE Systems. (2017, April). Operation Cloud Hopper. PwC UK. https://www.pwc.co.uk/cyber-security/pdf/pwc-uk-operation-cloud-hopper-report-april-2017.pdf Pytlak, A., & Lad, S. (2024, November 22). Confront the cybersecurity challenge. Stimson Center. https://www.stimson.org/2024/confront-the-cybersecurity-challenge/ Reid, M. (2016). A comparative approach to economic espionage: is any nation effectively dealing with this global threat. U. Miami L. Rev., 70, 757. Rowe, B. I. (2020). Transnational state-sponsored cyber economic espionage: a legal quagmire. Security Journal, 33(1), 63-82. https://doi.org/10.1057/s41284-019-00197-3 Rowe, E. A. (2023). Academic Economic Espionage? William & Mary Law Review, 65(1), 1–77. Rubio, M. (2025, May 28). New visa policies put America first, not China. U.S. Department of State. https://www.state.gov/releases/office-of-the-spokesperson/2025/05/new-visa-policies-put-america-first-not-china/ Ruppert, Kathleen (2010). In G.P. Hastedt (Ed.). Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage [2 volumes] (pp. 577–598). Santa Barbara: ABC-CLIO. https://www.bloomsburycollections.com/encyclopedia-chapter?docid=b-9798216017486&tocid=b-9798216017486-0000185 Sarclad Ltd v APT Technology [2014] EWHC 2440 (Ch). Schmitt, M. N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (2nd ed.). Cambridge: Cambridge University Press. Scott, P. F. (2024). ‘State threats’, security, and democracy: the National Security Act 2023. Legal Studies, 44(2), 260–276. doi:10.1017/lst.2023.39 Siddiqui, Z. (2023). Five eyes intelligence chiefs warn on China’s “theft” of intellectual property | reuters. Reuters. https://www.reuters.com/world/five-eyes-intelligence-chiefs-warn-chinas-theft-intellectual-property-2023-10-18/ Simon, S. (1998). The Economic Espionage Act and the threat to national security. Berkeley Technology Law Journal, 13(1), 305–318. https://btlj.org/data/articles2015/vol13/13_1_AR/13-berkeley-tech-l-j-0305-0318.pdf Skinner, C. P. (2013). An international law response to economic cyber espionage. Conn. L. Rev., 46, 1165. The Director of the Serious Fraud Office v. Jiang, [2023] EWHC 1810 (Admin). Thomas, R. (2016). Espionage and Secrecy (Routledge Revivals): The Official Secrets Acts 1911-1989 of the United Kingdom. Routledge. Trade Secrets (Enforcement, etc.) Regulations 2018, S.I. 2018/597. https://www.legislation.gov.uk/uksi/2018/597 Trade Wars: Trade Secret Protection in China Before and After the US-China Trade Agreement of January 15, 2020, 20 UIC Rev. Intell. Prop. L. 108 (2021). UIC Review of Intellectual Property Law, 20(2), 2. U.S. Attorney’s Office, Northern District of New York. (2023, January 3). GE Power Engineer Sentenced for Conspiracy to Commit Economic Espionage. U.S. Department of Justice. https://www.justice.gov/usao-ndny/pr/former-ge-power-engineer-sentenced-conspiracy-commit-economic-espionage U.S. Commission On The Theft Of American Intellectual Property (2013). Commission on the Theft of American Intellectual Property IP Commission Report. United States. https://www.loc.gov/item/lcwaN0009018/. U.S. Commission on the Theft of American Intellectual Property. (2017). Commission on the Theft of American Intellectual Property Update To The IP Commission Report. National Bureau of Asian Research. https://www.nbr.org/wp-content/uploads/pdfs/publications/IP_Commission_Report_Update.pdf U.S. Department of Justice. (2018, December 20). Two Chinese hackers associated with the Ministry of State Security charged with global computer intrusion campaigns targeting intellectual property and confidential business information (DOJ 18-454) [Press release]. https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion U.S. Department of Justice. (2020, September 6). Seven International Cyber Defendants, Including “Apt41” Actors, Charged In Connection With Computer Intrusion Campaigns Against More Than 100 Victims Globally. Archives U.S. Department of Justice. https://www.justice.gov/archives/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged-connection-computer U.S. Department of Justice. (2021) Information About the Department of Justice’s China Initiative and a Compilation of China-Related Prosecutions Since 2018. Archives U.S. Department of Justice. https://www.justice.gov/archives/nsd/information-about-department-justice-s-china-initiative-and-compilation-china-related#:~:text=Background,all%20trade%20secret%20theft%20cases. U.S. Department of Justice. (2022, November 16). Chinese government intelligence officer sentenced to 20 years in prison for espionage crimes, attempting to steal trade secrets from Cincinnati Company. Archives U.S. Department of Justice. https://www.justice.gov/archives/opa/pr/chinese-government-intelligence-officer-sentenced-20-years-prison-espionage-crimes-attempting U.S. Department of the Treasury. (2024, March 25). Treasury sanctions China-linked hackers for targeting U.S. critical infrastructure. https://home.treasury.gov/news/press-releases/jy2205 Uniform Trade Secrets Act, §§ 1–12. (1985). https://www.wipo.int/wipolex/en/legislation/details/3934 United States v. Xu, 114 F.4th 829 (C.A.6 (Ohio), 2024) United States v. Yihao Pu, 814 F.3d 818 (7th Cir. 2016) United States v. You, 76 F.4th 741 (6th Cir. 2023). United States v. Zheng, 113 F.4th 280 (2d Cir. 2024), cert. denied, No. 24-604, 2025 WL 1020366 (U.S. Apr. 7, 2025) Valeriano, B. (2022). Dyadic Cyber Incident Dataset v 2.0 [Data set]. Harvard Dataverse. https://doi.org/10.7910/DVN/CQOMYV Wang, Q. (2016, December 15). A Comparative Study of Cybercrime in Criminal Law: China, US, England, Singapore and the Council of Europe. http://hdl.handle.net/1765/94604 Williams, R. D. (2021, October 12). Reckoning with cyberpolicy contradictions in great power politics. Brookings Institution. https://www.brookings.edu/articles/reckoning-with-cyberpolicy-contradictions-in-great-power-politics/ Wang, Y. (2023). Trade secrets laws and technology spillovers. Research Policy, 52(7), 104794. Wang, Y. (2023). Trade secrets laws and technology spillovers. Research Policy, 52(7), 104794. Xu v. Corbiere Ltd, [2018] EWCA Civ 1899, [2018] 4 W.L.R. 125 (Eng.). Yong, N. (2023, January 16). Industrial espionage: How china sneaks out america’s technology secrets. BBC News. https://www.bbc.com/news/world-asia-china-64206950 Zhou, L. (2020, August 31). EU sanctions cyber attackers for first time. NTD. Zweigert, K., & Kötz, H. (1998). Introduction to comparative law (T. Weir, Trans., 3rd ed.). Oxford University Press. |
Description: | 碩士 國立政治大學 亞太研究英語碩士學位學程(IMAS) 112926026 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0112926026 |
Data Type: | thesis |
Appears in Collections: | [亞太研究英語博/碩士學位學程(IDAS/IMAS)] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
602601.pdf | | 995Kb | Adobe PDF | 0 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|