Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

U.S. Senators Introduce ‘Deter Cyber Theft Act’ to Help Protect Trade Secrets

A bi-partisan group of Senators introduced a new bill to fight cyber-espionage and intellectual property theft by foreign countries.

A bi-partisan group of Senators introduced a new bill to fight cyber-espionage and intellectual property theft by foreign countries.

The proposed “Deter Cyber Theft Act” aims to block products that contain intellectual property stolen from U.S. companies by foreign countries from being sold in the United States. The bill was co-sponsored by Sens. Carl Levin (D-MI), Jay Rockefeller (D-WV), John McCain (R-Ariz), and Tom Coburn (R-OK) and introduced in the Senate Wednesday.

China is frequently accused of supporting cyber-espionage attacks against U.S. government and commercial networks. Just a day earlier, a U.S. Department of Defense report to Congress directly accused the Chinese government and military of supporting cyber-intrusions against U.S. networks for information relevant to diplomatic, economic, and defense industrial base sectors. China, as expected, denied the accusation, but these claims have been getting louder from both public officials and private sector over the past year.

U.S. SenateThe U.S. needed to take “aggressive new steps” to combat cyber-espionage and “hit the thieves where it hurts most — in their wallets, by blocking imports of products or from companies that benefit from this theft,” Levin, chairman of the Armed Services Committee, said in a statement.

China is “by far the largest source” of theft against U.S. companies, according to Levin.

If the bill passes, the Director of National Intelligence would be required to compile an annual report identifying foreign countries which are involved in economic or industrial cyber-espionage against the U.S and flag the most persistent offenders. The report would also include what information was targeted, what intellectual property was actually stolen, and what products or technology was created using that stolen information. The report would list names of foreign companies and government entities which benefitted from the theft. Finally, the report would also list what steps the DNI and other US federal agencies had taken to prevent the theft.

The proposed bill elevates “cyber theft as a national security priority,” Rockefeller said.

The bill goes further than just naming-and-shaming the countries that steal technology from the U.S. In its current form, the bill would requires the president to take action within 120 days of the report to block the import of products that benefitted from cyber-espionage. The definition is fairly broad, including products which contain the stolen technology, those made by “state-controlled enterprises” of nations included in the DNI watch list, and those manufactured by companies listed in the report.

“We must cut demand for stolen trade secrets by holding countries who engage in cyber theft accountable for their illegal activities and by preventing products that use stolen information from entering the U.S. market,” Rockefeller said in a statement.

The Deter Cyber Theft Act (PDF) was crafted to combat what Gen. Keith Alexander, head of the National Security Agency and commander of U.S. Cyber Command called “the greatest transfer of wealth in history,” the lawmakers said in a statement. U.S. companies invest billions every year in research and development, only to have their results stolen by foreign companies and nations who then use it to compete against American companies and workers.

“This bill provides the President with the authority to target those who are attempting to unfairly and illegally benefit from cyber crime at the expense of America’s interests,” said McCain.

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.