Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  November 7, 2014 4:00am-6:01am EST

4:00 am
framework of the mobile anti abuse working group. participants in the working group include the fcc, the ftc, the fbi, the department of homeland security and a broad range of industry members. the voice and telephone abuse sole focus is addressing abuse occurring over telephone networks. it was created to help protect te telephone services from abuse by developing best practices technologies and methods for mitigating phone-based attacks and scams. in closing, let me thank again the committee for holding this timely hearing. we share the committee's concerns. we look forward to our continued work together to address this constantly evolving challenge. >> double your efforts, mr. rupy. miss greisman.
4:01 am
>> good afternoon, chairman nelson, ranking member collins and members of the committee. i appreciate the opportunity to appear before you on behalf of the federal trade commission to discuss the commission's role in combating telemarketing fraud. as we have heard the jish inflicted by fraud is well-known. the harm is not just economic but emotional as well. to tackle phone fraud, the ftc uses law enforcement with close coordinate with federal and international counterparts, education and outreach and an initiative to spur technological innovation to develop tools that help consumers avoid unwanted calls and also help law enforcers to track down the frauds. first law enforcement and with a focus on imposter scams. each of us seeks out and relies upon trusted sources. that's the very thing scammers use and twist. whether they pretend to be from the government, a family member
4:02 am
or hide behind a recognizable corporate name. impersonating someone trusted is more than a door opener. it's an invitation to come in and sit down. when it's successful, people lose money enormous amounts of money. as the testimony indicates during the past two and a half years, consumers report having lost more than $200 million to imposter scams. not surprisingly, in more than 90% of the cases report of the complaints reported to the commission consumers indicate that the initial contact was by the phone. halting such impersonate serz central to the commission's broad telemarketing enforcement program. one case we filed early this year typifies the work. defendants called people, many of whom were elderly and falsely stated that a member of the family had bought a medical device alert and they lied about whether they would have to pay for it. given the nature of the such
4:03 am
conduct and the fact we see some telemarketers engaged in imposter scams emanating out of canada and also out of jamaica, our criminal lee a son unit has worked to catch perpetrators. second, consumer education is an indispensable compliment to law enforcement. the ftc has a wide range of materials directly relating to imposter fraud and all telemarketing scams. every year we reach out to tens of millions of people with those materials. i want to highlight fas on. i know you have seen it before. it's our newest project. we just launched this innovative initiative aimed specifically at older active adults, including veterans. based on research with the target audience, it gives older consumers critical information
4:04 am
about scams so that they can pass it on to those who need it. of course, that information includes imposter scams and the all too common you have just won scam. we also went in a new direction in early 2012 when we partners with the aarp foundation to afford one to one peer counseling to consumers over age 60 who complained about being the victim of certain types of frauds, including imposter scams. the foundation's volunteers have provided council to more than 1,000 people. finally, we have been keenly focused on spurring innovation to tackle illegal calls with the convergence between the phone system and the internet as well as other developments making fraudulent calls is cheaper than ever. because it's easy for the scammers to hide. the enforcement challenges are huge. in late 2012, we met those challenges with our own challenge which incentivized
4:05 am
creating innovative call blocking platformed. one of the winners already launched a new product for consumers that is successfully blocking unwanted calls. mr. ropey referred to it moments ago. our secretary challenge is taking place next month at the death con conference in have a gas. our contest will focus on phone honey pots, how to create them and use them to fight illegal calls. at the same time, the ftc has spearheaded a new working group of the london action plan international do not call forum to look specifically at caller i.d. spoofing issues from an international perspective. in some the commission's commitment to tackling phone fraud through enforcement action, education and outreach and innovation is strong. as i have outlined, the commission will continue to identify and pursue innovative ways to protect consumers and
4:06 am
engage federal international and private industry members to do the same. thank you for the opportunity. i look forward to your questions. >> thank you. mr. campbell, tell us how we put some of these people in jail. >> yes, sir. chairman nelson, ranking member collins and members of the committee, thank you for the opportunity to discuss the federal bureau of investigation's efforts to combat fraud against our nation's seniors. i am pleased to appear before the committee to address this important issue. at the beginning of 2011, the first of our nation's baby boomers reached the age of 65. since then, thousands a day are also reaching that milestone. they have many reasons to celebrate. senior citizens are most likely to have a nest egg to own their own home and to have excellent credit. unfortunately, these are also many of the same qualities which make them so attractive to con artists. as you may be aware, the fbi
4:07 am
participates in a number of working groups and task forces dedicated to combating significant frauds to include phone scams against our nation's citizens. from mortgage and healthcare fraud task forces to interagency groups such as the elder justice interagency working group, many of those resources are focused on preventing, detecting and combating those frauds which harm senior citizens. unfortunately, frauds are limited only to the imagination of those who commit such agreenlous crimes. internet and telephone fraud is any illegal activity involving phone calls, websites, chat rooms and/or e-mail. this fraud involves false communication or fraudulent representations to consumers. these crimes may include but are serbly not limited to advanced fee schemes, lottery scams and identity theft.
4:08 am
in one particular scam, the grandparent scam, scammers use scenarios that include claims of a relative being arrested or in a car accident in another country. they often pose as the relative, create urgency and make a plea for money to victims. it's not unusual for scammers to beg victims not to tell other family members about the situation. this is just one example. unfortunately, the variety of schemes is again limited only by the imagination of the con artists who offer them. in our continued effort to combat the numerous sfrauds who would do our citizens harm, the federal bureau of investigation and the national white collar crime center established the internet crime complaint center. the i c3 receives, develops and refers criminal complaints regard the rapidly expanding arena of cyber crime. the ic3 gives victims of cyber
4:09 am
crime an easy to use reporting mechanism that alerts authorities of suspected criminal or sieve ill violations. for law enforcement and regulatory agencies at the federal, state, local and international level, the ic3 provides a central referral system for complaints. for law enforcement and regulatory agencies at the federal, state, local and international level, it provides a central referral mechanism for complaints involving internet related crimes. as complaints are reported online, the ic3 compiles the data, trained analysts review and research each complaint, disseminating information to the appropriate federal, state, local or international law enforcement or regulatory agencies for criminal, civil or administrative action as appropriate. i can assure you it will also remain a priority of objective of the ic3 to establish afaekive
4:10 am
alliances with industry such as alliance enable the ic3 to ref ladies and gentlemen intel lens and subject matter expert resources pivotal in identifying and crafting an aggressive proactive approach to combating the crime. in conclusion, as you have heard, fraud targeting our senior citizens exists in many forms, is creative in its approach and can often leave our most vulnerable citizens with little to no savings to enjoy a time in life they have earned. the fbi in partnership with our federal, state, local and regulatory partners is committed to identifying this threat where it exists and taking aggressive action in response. chairman nelson and ranking member collins, would like to thank you for this opportunity to discuss the f bi's efforts to combat fraud against our nation's senior citizens. i am happy to answer any questions that you may have. >> before i turn to senator
4:11 am
collins, mr. campbell, the federal trade commission has a separate way to file complaints. it's called the consumer sentinal network. do you all use that? >> yes. that is correct our two agencies do coordinate on fraud information and the ic3 data that we receive from potential victims is also fed into the consumer database so that we can all benefit from that information, analyze it, disseminate it as appropriate and develop the right strategies to target that criminal activity. >> have you put somebody in jail for this kind of fraud? >> yes, we have. yes. we have for the grandparent scam. we have had a case that in fact we have conducted with project colt as referred to.
4:12 am
that individual was -- has been arrested. he pled guilty to one count of wire fraud. that was an interagency investigation. that indictment took place in 2012. >> i would suggest that you publicize that so that -- by the way, do you find that these are criminal enterprises that do other kind of criminal things as well as this? >> yes. that's a very important point. because there are individuals and maybe smaller groups out there perpetrating these scams. but in some cases, they can be tied to organized crime or transnational organized crime enterprises or they also may be more expansive fraud rings engaged in a variety of frauds relative to this. that's correct. >> we are going to try to get everybody's questions in before
4:13 am
you have to go to this vote. senator collins. >> thank you, mr. chairman. mr. campbell, i do appreciate the work that you are doing. but until we put in jail a lot of people who are committing these scams, we are not going to see real progress. the ftc has told us that there were 127,000 imposter scams last year alone. so how many of these cases were prosecuted in response to the chairman, you mentioned just one case in 2012. how many? >> right. we don't track specific numbers regarding, say, a grandparent scam or a particular individual who has been targeted. but we have investigated a wide variety of individuals in regard to these types of fraud which
4:14 am
have taken place. we have have had a number of convictions related to those. we're pursuing them. it certainly is a priority for us as i noted in regard to the establishment of ic3 to target this threat and to dedicate the resources that we can with our interagency partners against this threat. >> what worries is what i'm hearing sounds very bureaucratic. it sounds like there are a lot of task forces going on and there's a lot of discussion back and forth. but 127,000 imposter scams last year alone, 9 million scams of various kinds reported to the ftc, 9 million cases like mr. w. where trusting seniors lost thousands of dollars. what i'm hearing from law enforcement is, they're too small individually for us to
4:15 am
bother with them. well, you can be sure that the person who ripped off mr. w. went on to rip off other people. that's just one case. he didn't rip off mr. w. and say, boy, i'm done now. i'm going to pack it up. in fact, we know from our previous hearings that there are boiler room operations that do this with people having scripts. and i just think as with the jamaican lottery scam where we got jamaica to change its laws and we started seeing a more aggressive prosecution in this country that until that happens, we're going to continue to see our seniors and others ripped off. so i'd like some statistics from
4:16 am
you that show me that you are making this a priority and that you consider these scams to be important even if they are reported one by one a few thousand dollars here, a few thousand dollars there. in the aggregate, it's a lot of money. even for the individual where it may be what law enforcement considers to be a small amount of money, it can be devastating to their life savings. >> i certainly agree with you. you used a key word there, aggregate. it's important that we do receive this information and complaints, because in some cases, we do find them tied together. and that enables us then to effectively devote resources and work with prosecutors.
4:17 am
we agree this is a tragic circumstance and all available resources should be dedicated to it and we're certainly committed to that. the more intelligence that we can receive, we encourage the public to report. the more it can help us be effective in regard to this targeting. >> the public is reporting. if you have 9 million scams reported to the ftc, including 127,000 imposter scams, just last year. my time is expired. we have others to question. miss greisman for the record, i would like an answer from you on how often and how well law enforcement uses that wealth of data that you have collected at the ftc. >> provide that for the record. we are honored to have senator murphy come and join us.
4:18 am
let me call on our committee member senator casey. >> mr. chairman, thanks very much. i know we have a limited time. will be brief. i want to get a sense of what works. often around here, as you may have detected from reading the newspaper, we don't pass a lot of substantial bills on a regular basis. so we often have to think of other ways to have an impact, because legislation takes a long time. there are other problems of getting it passed. we have to try to use our staff, our resources and a lot of them in state to make -- have an impact on a problem like this. in our office, we have a website and other offices have similar strategies. it's a website to provide older adults and family members with information and tips about scams or fraud of various kinds. i'm just going to ask roger w.
4:19 am
just from your own -- kind of your own perspective and your own experience, what do you think works in terms of -- i should say, what kind of information would you hope would be available if it were on a website of an elected member of congress or any other information that families are not getting that you hope they would get? >> i'm not sure -- i already knew about the grandparent scam. then i became a victim of it. i had read about it. i heard about it. the way it was set up -- when i was contacted, i was in kind of a -- it was family member who has been hospitalized. i thought his wife was calling when i received this call. normally, i look at the caller i.d. and if it was a 438, i would disregard it. because i'm slow to get around, i was in the living room and i got -- by the time i got there,
4:20 am
it was the third ring and the fourth ring it stops working. so i answered phone without looking at caller i.d. looking at the caller i.d. is comple clearly one -- if it's not a number you are familiar or some of the things that this gentleman talked about, there's some possibilities. there's other things that are involved in this beyond that it's the money pack cards. i'm glad to hear the green dot is getting out of that business. i'm sure there will be another -- there's a market for it. i'm sure somebody will fill that market. i don't have a good answer for that. i'm not sure that being on -- no disrespect to your website, but i don't think many senior seens looked at their senator's website. >> i guess we got to promote it. that's helpful. if there are other ways you
4:21 am
think we can put in place preventative strategies, that would be helpful. of course, you can over time add to your answer and send us written advice as well. we appreciate that. i know we are limited on time. i want to ask about -- we know that the do not call registry has been effective in a lot of ways. i would ask you -- apparently in addition to what benefit we get from do not callregistry, consumers will post online. i'm wondering if the ftc would consider -- has considered creating some kind of a message board system or clearinghouse
4:22 am
thattin ago gats things about te fraudulent calls. i missed your testimony. maybe you spoke to this. >> it's a fair question. we're constantly evaluating, re-evaluating what to do with our complaint data and how best to utilize it. it's widely available to law enforcement and law enforcement does use it extensively. we consider the consumer complaints we receive. we receive a great many relating to do not call in any given month we may get 270,000280,000 complaints about -- relating to do not call. we consider them non-public. but that is a fair question. >> thank you very much. thank you, mr. chairman. >> senator murphy? >> thank you, mr. chairman. thank you for allowing me to sit as part of this panel today. we have had a string of these grandparent scams in connecticut along our shoreline, which is
4:23 am
the reason i have had some interest in this issue over the past several months. i just want to ask one simple question knowing we are short on time and it's probably for mr. campbell. that's about this issue of how you get information from local law enforcement. there have been some information compiled by this committee that suggests that local law enforcement doesn't know where to report these scams when they get word of it. they often aren't reporting into the databases. 9 million is a stunning number but imagine what the actual number is if local law enforcement was sending the information. given the fact that you are prosecuting where you see volume given your limited resources, it seems like an imperative to make sure that local law enforcement is communicating up the chain to the databases and to the fbi, to the ftc whethn they get information about the scams. what's the status in both of your opinion as to the flowing
4:24 am
of information from local law enforcement and to federal law enforcement and what can we do to make it better? >> sure. this is an area that for years we have worked at many levels to have that dialogue with law enforcement in regard to the scams. we work with associations like the iacp and so forth in regard to this issue. we also have what is now called operation well spring which is coordinated out of the ic3. that involves passing these violations to our field offices across the country. the data is analyzed to determine if it can be investigated and prosecuted federally. if not, that information is passed to our state and local officers for them to review and determine what action they can take. that has increased that information sharing both ways. so we're working to promote that initiative more to encourage
4:25 am
that type of dialogue to drive together against this threat. >> yes. thank you. we work extensively with local police departments and sheriff's offices to encourage them both to contribute data to -- into the system and also to use the system. we engage in hands-on training for them as well so that they can access it in a smart and intelligent way. >> i think we need to do better. appreciate the efforts. mr. rupy, i think industry can be involved in this as well if this is a matter of dissemina disseminating information. it's in your interest to make sure that all this information gets to the places it can be actionable. this seems to be a perfect example of a place where limited public resources can be paired with potentially more bountiful private resources to make sure local law enforcement reports all of the relevant information. thank you very much, mr. chairman, for allowing me the
4:26 am
time. >> mr. rupy, what can telephone company do to help a senior citizen when they call and say they have been hammered? >> that is an excellent question, chairman. that's something that the phone companies will work with the consumer based on the tools that they have and also based on the specific situation at hand. as an example, where a consumer reaches out to the phone company complaining about perhaps calls that they are receiving, the phone company can work with that consumer to identify tools that may be available to that consumer so that they can either -- >> such as? you could have the technology that if a spoofed number comes up that somehow it alerts the
4:27 am
customer? >> that is actually the ultimate goal of the steer that i was talking about in my oral and written testimony, mr. chairman. essentially, the end game of that technology is that you will have an awe thenty indication between the person being called and the calling party. >> is that technology available today? >> it is not yet available today, mr. chairman. but we do have intense industry and government involvement on developing those standards, because we have to develop the standards in order to implement that technology into the network. >> if you could have heard all the hearings that we have and just to complicate matters, a lot of them don't originate in this country. they're from a foreign country. that means you got to work with
4:28 am
another government in order to get them to cooperate to go after the guys. so that makes it doubly difficult and longer and longer and therefore, the development of technology that will help someone identify a number if it's spoofed, that would be extremely helpful in the protection of senior citizens indeed protection of customers. because of the vote that is now occurring, i want to say that i want to bring to the table retailers who offer the services to send money such as western union, money gram and the various cards. we're going to have a future hearing on that. now, they have been reluctant to come. i want to tell them that obviously we will treat them very fairly. but they are being used to
4:29 am
perpetrate fraud on our people. we don't like this. and the american people don't like it. so we want them to come and help work with us and with law enforcement and the agencies. the regulatory agencies. i'm encouraged by the action of some retailers and debit card companies that they have taken but several of them were reluctant to come. well, if we have to, we will compel them to come. we are going to get at the bottom of this. thank you all. the meeting is adjourned. tomorrow a panel discussion with an editorial team including
4:30 am
allen greenblatt, louis jacobson. here are a few of the comments we have received from our viewers. >> just calling to tell you how much i enjoy q and a. at 5:00 on sunday, on the west coast, everything stops in my house. i turn off my phone, i get my coffee and it's the most enjoyable hour on television. >> the guest was very informative. good opinions. i enjoyed listening to him and the comments today. as living in the middle east, he was very accurate and on point. he was not using his own personal innuendos. i greatly enjoyed it.
4:31 am
i hope you have more guests like that. he was right on target this morning. >> i'm calling to say that i think, like many people, c-span is wonderful. but as to criticisms, i almost have none. i'm a very partisan kind of person. but the reason i almost have none is i think you all do a tremendous job of showing just about every side of everything the way people look at things in d.c. and elsewhere. i take my hat off to you. thank you very much. >> continue to let us know what you think about the programs you are watching. screeria -- niger- with live coverage of the u.s. house on c-span and the senate on c-span2, here we
4:32 am
compliment that coverage by showing you the most relevant congressional hearings and public affairs events. on weekends, we are the home to american history tv with programs that tell our nation's story, including the civil war's 150th anniversary, visiting key events, american artifacts, history bookshelf with american history writers, the presidency, looking at the policies of our nation's commanders in chief, lectures in history and our new series real america, features government and educational films from the 1930s through the '70s. created by the cable tv industry by your local cable or satellite provider. next a senate hearing on
4:33 am
intellectual property theft. executives from boeing and eli lilly farm suit calls say they experience daily cyber attacks. randall coleman said investigating are a top priority for the agency. this is about an hour and 25 minutes.
4:34 am
4:35 am
the hearing of the senate judiciary subcommittee on crime and terrorism will come to order. i'm expecting that my ranking member senator lindsey graham will be here shortly. i just saw him on the c-span
4:36 am
screen. i know he's on the floor and not here. but i have permission from his staff to proceed. he will join us as soon as his schedule permits. i also want to recognize in the audience ed pigano. it's good to have him back in a different capacity. we are having a hearing today that is entitled, economic espionage and trade secret theft. are our laws adequate for today's threats? today the subcommittee is going to explore how we can better protect american businesses from those who try to steal their valuable intellectual property. american committees are renounced as being the most innovative in the world. companies of every size and in every industry from manufacturing to software to
4:37 am
biotechnology to aerospace own large paortfolios of legally protected trade secrets they have developed is and innovated. in some cases, the secret sauce may be a company's most valuable asset. the theft of these secrets can lead to devastating consequences. for small businesses, it can be a matter of life and death. the risk of trade secret theft has been around as long as there have been secrets to protect. there's a reason why coke has kept its formula locked away for decades. in recent years, the methods used to steal trade secrets have become more sophisticated. companies now must confront the reality that they are being attacked on a daily basis by cyber criminals who are determined to steal their
4:38 am
intellectual property. as attorney general holder has observed, there are two kinds of companies in america. those that have been hacked and those that don't know that they have been hacked. today, a criminal can steal all of the trade secrets a company owns from thousands of miles away without the company ever noticing. many of the cyber attacks we are seeing are the work of foreign governments. china and other nations now routinely steal from american businesses and give the secrets to their own companies. their version of competition. let's be clear, we do not do the same to them. we are now going through a healthy debate in america about the scope of government surveillance. but is there no dispute about one thing. our spy agencies do not steal
4:39 am
from foreign businesses to help american industry. while cyber attacks are increasing traditional threats remain. company insiders can still walk off with trade secrets to sell to the highest bidder. competitors still steal secrets through trickery or by breaking into a factory or office building. it is impossible to determine the full extent of the loss to american businesses as a result of the theft of trade secrets and other intellectual property. there have been estimates that our nation may lose 1% to 3% of our gross domestic product through trade secret theft alone. the defense department has said that every year an amount of intellectual property larger than that contained in the library of congress is stolen from computer networks belonging to american businesses and government.
4:40 am
estimates of the value of i.p. stolen by foreign actors are as high as $300 billion. general keith alexander, until recently the head of the nsa and of cyber command at the pentagon, has characterized the cyber theft of american intellectual property as "the greatest transfer of wealth in history." of course, we are on the losing end of it. no estimate can fully capture the real impact of trade secret theft because when other countries and foreign businesses steal our trade secrets, they are stealing our ideas. they are stealing our innovation. most importantly, they are stealing our jobs. in my own state of rhode island, we continue to face unacceptably high unemployment. despite having some of the most innovative businesses in the country. if we do not protect our
4:41 am
businesses from those who steal their intellectual property, then we are letting that innovation go to waiste and we are letting american jobs go overseas. in the past, some companies were reluctant to talk about this issue. because no one likes to admit that they have been victimized. but many are now coming forward to speak out because they recognize how important it is that we work together to address this common threat. i particularly want to thank the company representatives who are appearing before us today in the second panel. as well as many, many others who have worked closely with me and with other senators on this issue. i'm encouraged that the administration last year released a blueprint for a strategy to combat trade secret theft. in agencies across the government are increasing to address this problem.
4:42 am
the administration must recognize that the theft of intellectual property is one of the most important foreign policy challenges we face. and it must communicate to china and other nations that stealing from our businesses to help their businesses is unacceptable. we in congress must do our part. we need to make sure that our criminal laws in this area are adequate and up to date. last fall, senator graham and i released a discussion draft of legislation designed to clarify that state sponsored overseas hacking could be prosecuted as economic espionage and to strengthen criminal protection of trade secrets. we received valuable comments and suggestions about this legislation and we look forward to hearing from our witnesses today about how to improve our laws and what we can do to help
4:43 am
defend our industries. we hope to introduce our legislation in the coming weeks. companies also need civil remedies against those who steal from them. while state law has traditionally provided company with remedies for misappropriation of trade secrets, there's no federal law that allows companies themselves to seek civil remedies against those who steal from them. senators coons and hatch have recently introduced legislation to give victims of trade secret theft the option of pursuing thieves in federal court. senator flake has also introduced legislation to give companies a federal civil remedy for trade secret theft. i hope that the judiciary committee will act soon on legislation to strengthen both the criminal and civil protections against trade secret theft. i look forward to working with those colleague toward that goal.
4:44 am
today, we will hear from witnesses in government, industry and the non-profit sector who confront the threat of trade secret theft on a daily basis. what i hope will be clear by the end of the hearing is that be need an all-in approach to this hearing. we must strengthen our criminal laws and our law enforcement agencies must prioritize stopping trade secret theft before it occurs and investigating and prosecute it when it does occur. i will add that there remains an urgent need for us to pass broader cyber security legislation. i appreciate working with senator graham on that effort. i look forward to hearing from our witnesses today and to working with my colleagues on both sides of the aisle to address this critical issue. our first witness is randall c. coleman, assistant director of the count erintelligence divisin at the fbi.
4:45 am
mr. coleman is responsible for ensuring that the fbi carries out its mission to defeat foreign intelligence threats. mr. coleman began his career as a special agent with the fbi in 1997 and has served as assistant special agent in charge of the san antonio division, chief of the counter espionage session and special agent in charge of the little rock division. prior to his appointment to the fbi, he served as an officer in the united states army for nine years. we are delighted that che could join us today. we ask him to proceed with his testimony. proceed, sir. >> good afternoon, chairman whitehouse. i am pleased to be here to discuss the f bi's efforts to combat economic espionage and theft of trade secrets. the fbi considers this a top
4:46 am
priori priority. in 2012, the national counterintelligence estimated a range of loss to the u.s. economy approaching $400foreigi our nation's advantage in the market, this threatens our economy and preventing such loss requires vigilance and aggressive mitigation. the fbi is diligently working to investigate and apprehend targets pursuing economic espionage against academic institutions, defense contractors and government agencies. it has made significant progress in putting some of the most egregious offenders behind bars. economic espionage and theft of trade secrets are increasingly linked to the growing trend of cyber-enabled trade secret
4:47 am
threat. the insider may steal for personal gain or a spy for other organizations or a country. foreign competitors aggressively target and recruit insiders to take the most pry pry teary information. the fbi however cannot protect the nation's economy by acting alone. the fbi counterintelligence oversees more than 80 special agents that are serving as program coordinators who work hand in hand with industry and academic institutions across the country. these partnership coordinators conduct classified and unclassified threat presentations and briefings. it's an early referral mechanism for reports of possible economic espionage, theft of trade secrets and cyber intrusions. working through the more than 15,000 contacts nationwide, this program helps companies detect,
4:48 am
deter and defend against attacks of sensitive proprietary information from foreigned av r adversaries. by forming close partnerships with local, logical businesses and ak deppic and government indid i stugss, the fbi wishes to have a greater impact on deferring trade secrets before any loss can actually occur. thank you again for the opportunity to testify and i look forward to answering any of yr questions, sir. >> i would like to talk with you about a couple of things. first of all, have you any specific reaction to the draft legislation that senator graham and i circulated for discussion purposes? >> sir, i will -- i will stand on this that any legislation that allows the fbi to have ray better advantage at going after
4:49 am
our foreign adversaries as it relates to economic espionage and theft of proprietary information the fbi is in favor of. >> the people we are working with at the department of justice, you support that? >> yes, sir. >> the arguments and points they are making? >> absolutely. >> one of the things that i have observed having watched this for a while while, is that whenever hear about a case that is brought for intellectual property theft, in every case i hear, so far, there has been some nexus to old-fashioned theft. somebody taking the dcd home, somebody taking something out of a factory. we have seen an explosion of pure cyber intrusions and theft
4:50 am
of property with no other technique involved. and to my knowledge, there have been no charges brought ever against anyone for that type of activity. i understand that these cases are very complicated. i understand that three have huge forensic issues, that there's an overlay with national intelligence services that requires a lot of effort. i understand that some of the targets are overseas and that creates a whole array of other issues. trust me, having served as a united states attorney, i can see how very challenging these cases are to make. but when you have general alexander say we're on the losing end of the biggest theft in history, we'd like to see more prosecution activity. can you tell me what you think is behind that difficulty, and
4:51 am
is there anything that we can do? is it just a resource question? what can we do in congress to start putting points on the board against these people in criminal courts? >> i think you described it to a t. obviously, when you get outside the borders of the united states and where there's a foreign nexus, our ability to conduct effective investigations is diminished greatly. i will tell you that we do have ongoing investigations that i would foresee as having a logical conclusion that i think you would agree, as you described. in fact, the, the fbi has placed se cyber assets working with the counterintelligence resources at
4:52 am
our national cyber intrugs task force that are working hand in hand and shoulder to shoulder on these specific investigations. so i think technology plays a critical role in the advancement of technology makes the threat that much more complicated. but i think there has been tremendous progress made by the fbi, along with our partners. at investigating these type crimes. so i'm hopeful, as we go forward, that we'll be able to demonstrate that we have been effective and will be effective in this arena. >> i wouldn't want to suggest that the fbi has not been effective. i've been out to the ncijtv. i i've seen what you guys do out there. if i had to take my concern and turn it into a single phrase, it would not be the fbi's not effective. it would be the fbi's so busy trying to keep track of who's coming through the doors and
4:53 am
windows and trying to warn all the companies that they're hacking into that there is a resource constraint in taking all that effort which could be devoted to tracking all these attacks and trying to help our businesses, is it the capability or enough capability to sit down and go through putting a prosecution package together, working it through the intelligence agencies and doing all the other steps that need to be done. so in many ways i'm trying to throw you a friendly question, saying let's let us help you do what needs to be done in terms of the resorurceresources. i wouldn't want to take anybody off to put a package together. do we indict chinese generals
4:54 am
who are pulling this thievery off. >> another thing that is important and the threat is so i am men am, immense, that that's what make it is so important to bring in the academic institutions to work hand in hand with us to get out in front of this threat. you're absolutely right. the threat is so immense that the fbi cannot take this on along. whatever help we can get in those industries and sectors is of great help to us. >> there's a provision in the last appropriations bill that requires the department of justice to do a report for us, looking forward, looking out a couple years. and thinking about what the structure should being, like for
4:55 am
addressing this particular threat. it's exploded, as you know. it explodes even further every year. it grows just at massive levels. i'm not convinced at this point that the present setup makes sense. and if you look at another area that exploded. if you look at what happened when aviation began and what its effect was on the conduct of warfare, you started with the army air effort as a sub part of the signal corps. and then it became a sub part of the army, and it really wasn't until after world war ii that you had a full-on u.s. air force. and sense then, we've been a very successful leader in that theater of military operations. but until then we really weren't set up right. i'm not convinced that we're set
4:56 am
up right. and i would invite you to comment on this. but let me also ask it as a question for the record that you can take back to headquarters. how does it make sense to have these kind of cases, perhaps in your counter intell jns division, perhaps in the cyber division, perhaps in the criminal division. how do you sort amongst those three divisions to have this be efficient and smooth flowing? because i understand that each of those different sections have a piece of this. >> i think the first part of your comment is are we structured right. and i will tell you that i, i look at this on a daily basis. it is certainly a priority for the, our director as to look at, are we efficiently and effectively addressing the threats, and i will tell you in the counter intelligence
4:57 am
division, economic espionage has become a priority because of the expansion of the threat. so there are always ways that we are looking to better address this. and some of the more significant effort that we've made is to really have outreach, and i can't stress how important that is to this process and what benefits that we've seen from that. the, we've expanded our contacts across the country to 15,000 contacts. and we are starting to see the maturity of these relationships is starting to pay off, in the fact that companies are starting to come to us. academic institutions are actually coming to us, early on, and calling that contact, so we can get engaged in the problem at the very early period, versus after a bad actor has left the company with two or three terabytes of information has
4:58 am
already left. so that's absolutely a victory for us in this process, but we have a lot of room for impro improvement that we will continue to do. and we're always looking at ways to improve that. >> well, in the context of that, if you could take it as a question for the record and get an official response from your organization, i'm interested in whether you think five years out, ten years out, that similar division across all those separate parts of the bureau will continue to be a wise allocation or whether we're in sort of a transenterstep. >> thank you for your service. i know this is a challenging area that calls on all sorts of different resources, and i'm proud of the way the fbi conducts itself in this area, and i appreciate your service it this country. >> thank you very much for
4:59 am
having me today. >> we'll take a two-minute recess while the next panel gets itself sorted out and come back into action then.
5:00 am
all right. the hearing will come back to order. and i thank the witnesses for attending and participating in this hearing. we have a terrific panel of witnesses, and i'm delighted that you all are here. this is very promising. peter hoffman is the vice president of intellectual
5:01 am
property management for the boeing company which has plenty of intellectual property to manage. he has worked there since 1984. in his current role he manages the company's patent portfolio, protection of its trade secrets and licensing of technical data images, consumer patents. prior to being appointed to his current position, he served as t the director of global strategy for boeing, which is the company's advanced research section. we'll open up for questions after that. please proceed, mr. hoffman. >> good afternoon. on behalf of the boeing company i thank you for convening this hearing and m grateful for your efforts to improve trade secret
5:02 am
laws. it's a privilege to be part of this panel. boeing first began making twin float airplanes in 1915 from a small rid boathouse in seattle. while much has changed since then, our company remains unique in that we assemble and test most of our products in the united states. mostly in washington and south carolina but we have facilities in multiple states, including organize organization, florida, california, montana and utah. our defense and space-related production is primarily located in california, missouri, pennsylvania, texas, arizona, florida, and alabama. boeing employs 160,000 people, across the united states. since 2005, we have created more than 15,000 new high-paying jobs driven by our backlog of over 5,000 commercial airplanes. last year we paid $48 billion to
5:03 am
businesses which support a 1.5 million jobs across the country. boeings significant contribution to the economy is a result of the ingenuity of our employees. they develop the most sought-after products and technologies in the world. boeing's cutting edge technology takes years to develop at an enormous expense, approximately $3 billion in research and development spent every year. and the bulk of our operations are protected as trade secrets. boeing does not have one recipe for its secret sauce. we have thousands. unfortunately, boeing's valuable engineering and business information is at significant risk. once publicly disclosed, rights and trade secrets may be lost forever.
5:04 am
the investments wiped out in an instant along with the competitive advantage those trade secrets provided. of course boeing is on constant guard to prevent theft of our trade secrets, but today, companies cannot simply lock trade secrets in a safe. the vast the majority is trade electronically. it has brought productivity but risk. we could lose a trade secret through a breach in our network, through disclosure by one of our employees or partners or through an escape at one of our suppliers. fear of trade secret theft is not just a concern for boeing but many small companies have as muff or more to fear than big companies, technically if their survival depends on a single pro duct or service. more needs to be done to prevent thieves from steeling our trade secrets. we must send a clear message that we will not stand by as
5:05 am
thieves steal or secrets and harm our economy. we support your efforts and the efforts of ranking member graham to call attention to the issue and provide law enforcement with additional tools to deter trade secret theft. the act provides protections, but the standards and procedures adapted can vary state to state. as such, it is a real concern of u.s. companies that state action under the uniform trade secrets act may not in some cases be immediate enough to prevent the loss of a trade secret. so we also ak nobl the need for companies to have the ability to take immediate action of our own in federal court to prevent the loss of our valuable trade secrets when state courts and federal law enforcement cannot act quickly enough. therefore, we would also like to thank senator kuhns and hatch and your efforts to establish the right for a company to file
5:06 am
an application in federal district court in order to seize property, proprietary property containing trade secrets stolen from a company. we look forward to working with senator kuhns and hatch on this bill and support your efforts for the congress to work quickly and pass this legislation. we're also encouraged that the new laws if passed would strengthen overseas trade secret enforcemen enforcement. in conclusion, we applaud your efforts to highlight this issue and to strengthen u.s. trade secret laws and there by help protect our valuable assets. thank you for your time in hearing our concerns. >> thank you, mr. hoffman. i appreciate your testimony. our next witness is pamela passman, the president and ceo of the center for responsible
5:07 am
enterprise and trade, also known as create is a global, non-governmental organization dedicated to helping companies and supply chain members implement leading practices for preventing corruption and protecting intellectual property. prior to finding create in october 2011, ms. passman was the corporate vice president and deputy general counsel for global corporate and regulatory affairs at microsoft where she had worked since 1996. and i have to say, i have, as a lawyer, i am impressed by microsoft's legal shop, particularly the really path-breaking work that they did to go after spammers and people who are coming after them on the net with civil theories that
5:08 am
dated back to, probably 15th century english common law. it was quite impressive to see such ancient doctrines applied to such a new problem, and i think the microsoft complaints in that area have really set a model, not only for the rest of the corporate sector in that area of law, but even for government enforcement in that area of law. so you come from a good place. and welcome. >> thank you very much, chairman white house. again, my name is pamela passman, and i'm the ceo for i appreciate the opportunity to testify. create is a non-profit dedicated to helping companies reduce corruption and intellectual property theft, including trade secret theft. we provide resources to cops, large and small, that help them assess their risks and develop strategies to protect their trade secrets and other i.p.
5:09 am
assets, boast within their organizations and in their supply chains. in today's intergrated goebel economy, companies that succeed into turning their knowledge and know how into competitive advantage are the ones that will create new jobs and drive economic growth. increasingly, companies rely on trade secret laws to protect this knowledge. through tremendous value, it also makes them prime targets for theft. create recently teamed up with price waterhouse coopers to assess the economic impact of theft. a copy of the create pwc report is attached to my written testimony. the report makes clear that the problem of trade secret theft is massive and inflicts material damage on the u.s. and other economies. if we are to energize our economy by enabling innovative companies to protect their trade
5:10 am
secrets we need to focus on two key goals. first, we need to innocent advise companies to take proactive measures and secure their trade secrets on the front end, both within their own organizations and their supply chains. second, we need a consistent, predictable and harm nietzed legal system to provide remedies when a trade secret theft has occurred. it occurs through many avenues, and companies need different tools and strategies to protect against each type of threat actor. businesses need to be technically cognizant of risks that arise in their supply chains. supply chains have given many firms an enormous competitive edge, but companies using chains must often share highly valuable
5:11 am
business information with their suppliers, which may be located in a different country with different laws and different corporate norms. in the face of this reality, it is absolutely essential that companies implement effective strategies to protect trade secrets, not just within their own four walls, but with their suppliers as well. in the create pwc report, we recommend a 5-step approach for safeguarding trade secrets and mitigating potential threats. we suggest that companies, one, identify and categorize their trade secrets. two, conduct a risk assessment. three, identify the most valuable trade secrets to their operations. four, assess the economic impact of losing those secrets. and five, use the data collected to allocate resources and stree strengthen existing processes for protection. create recently created a pilot
5:12 am
program with more than 60 countries and countries around the world that helped them assess vulnerabilities and implement procedures to mitigate threats. based on that pilot program, we just launched a system to help companies to manage their systems for anticorruption. unfortunately, no amount of protection can completely safeguard all trade secrets from theft. companies also need a system that provides support and meaningful action. i applaud you for your focus on law enforcement. i'm also encouraged by the efforts of senators kuhns and hatch to create a model for around the world. the problem of theft that happens entirely overseas is worthy of further study.
5:13 am
governments and companies both play a role in improving protection for trade secrets. in our view, companies would benefit from taking a more proactive role in assessing vulnerabilities and employing best practices to manage their risks. they also need an effective legal system through which to enforce their rights when their know how has been misappropri e misappropriat misappropriated. i look forward to your questions. >> thank you, ms. passman. our next witness is drew greenblatt. he's owned this company since 1998. the company exports baskets and sheet metal fabrications to 36 countries and has been recognized as one of the 5,000 fastest growing companies in the united states for each of the last two years. he serves as a board member of the national association of manufacturers. and on the regional
5:14 am
manufacturing institute of maryland. he's also a member of the maryland commission of manufacturing competitiveness as well as an advisory counsel. -- council. >> thank you. thank you for the focus on this critical challenge of trade secret theft and the opportunity to testify today. as you mentioned, my name is drew greenblatt. we're based in baltimore city and are the leading manufacturer for custom wire baskets and sheet metal fabrications. we make everything in the usa. i'm very proud to report that we export to 36 countries, and my favorite country that we export to is china. we cater to the automotive, pharmaceutical industries. i'm here for three reasons. number one, trade secrets aren't just important for manufacturers that are big but for small
5:15 am
manufacturers like myself. number two, america's trade secret laws and policies must keep pace with today's threats which increasingly are not only interstate but international threats. null three, manufacturers need your help to effectively and efficiently protect and enforce trade secrets. we need to secure strong commitments in our trade agreemen agreements. like so many other manufacturers, marlin steel competes on a global economy. we succeed through investing in ideas and innovations and the hard work of our dedicated employees. when i bought marlin in 1998, we were a local business, and we made commodity bagel baskets, 18 employees, $800,000 in sales. last year we almost hit $5 million in sales, and we now have over 24 employees. we're proud member of the national association of manufacturers. we average about 40 member, 40 employees in the national
5:16 am
association of manufacturers, and we have 12,000 members. i'm also the co-founder and chairman of the national alliance for jobs and innovation, 380 members. both are working hard to strengthen and protect trade secret and intellectual property rights. we want to level the playing field for manufacturers and businesses throughout the united states. trade secrets are more important than ever. they include things like drawings, proprietary the manufacturing processes, software, formulas. all of these things are very valuable to the nation. $5 trillion for public companies and even more when you include small companies. small companies, our secret sauce is those trade secrets. that's our intellectual property. we leverage the expertise of our employees. 27% of them are engineers. think come up with
5:17 am
characteristics for our baskets that make us unique and different than our chinese competitors. some think 3% of our gdp is lost to these trade secrets being stolen. in our grandparents day, they would be stolen from across town. now it can be done on a thumb drove and sold to can companies and governments across the world. these cyber incursions are very threatening to us. we have lasers in our company, robots. if they can hack into our system, they can manipulate our equipment and possibly hurt our employees. that would be devastating to us. the thing i'm most proud about, we've gone over 1,981 days without a safety incident. if they were able to hack into our systems and hurt our systems they could hurt our team. we spend so much money hardening our network that we could hire another unemployed steelworker
5:18 am
to fill that job remember than spending money on these other activities. the good news is washington is starting to recognize this problem. we need washington to do three things. first of all, we need to you have strong operational collaboration between the federal agencies. we cannot have the silo approach we have right now. we need the fbi cooperating with the justice department cooperating with customs and tsa. number two, we need access to federal, civil enforcement to trade secrets theft. well conceived legislation recently introduced by senator kuhn and hatch. this is going to give us the ability to pursue people in the federal people, not on the state level. finally, we need to meet the global challenge of trade secret theft with global solutions. good trade agreements to stop these thefts. in conclusion, chairman white house, senator hatch, trade
5:19 am
secrets are vital for manufacturers, small and large. america's trade secret laws must keep pace with today's threats. manufacturers need your help to ensure that they can effectively and efficiently protect and enforce their trade secrets. i applaud your attention to this critical challenge and your focus on solutions, with strong global partnerships and closer collaborations between agencies and government and business, including federal, civil enforcement, we can have a real impact, we desperately need it now. thank you for the opportunity to testify this afternoon. i look forward to answering your questions. our final witness is douglas norman, the vice president for e l ely lily company. he is chair of the national manufacturers sub committee for
5:20 am
intellectual property. mr. norman has previously served as the 2002 co-chair of the intellectual property and anti-trust task force. please proceed. >> good afternoon chairman whitehouse, thank you for the opportunity to testify today on the issue of great importance not only to my company and not only to my industry, but to all segments of the american economy. ely lily was founded and headquartered in indianapolis, indiana on may 10, last saturday, lily celebrated its 138th birthday as a u.s. company. our mission is to discover and develop medicines to help people live healthier, longer lives. to fulfill this vision, lily
5:21 am
must rely on intellectual property protection that includes patents, trademarks and trade secrets. unfortunately, like too many innovative firms, lily has recently been the victim of trade secret theft. lily is part of a group that supports s 2267, which would accomplish this objective. we thanks senators kuhns and hatch for their leadership. and we're also encouraged by your work, chairman whitehouse and racking member graham to ensure law enforcement has the tools it needs to prosecute trade secret theft. and we appreciate the efforts by senator flake to highlight the continued problem of trade secret theft that occurs abroad. the bipartisan interest in trade secret protection is important
5:22 am
to our abilities. trade secrets are a sanction form of property. whether you're a major pharmaceutical firm like ely lily or start-up software company. your trade secrets are a big part of your competitive edge and part of keeping workers on the job. firms keeping jobs in america are the targets. trade secrets are technically vulnerable to theft given the rise of global supply chains and the rapid technological advances in greater connectivity. it can come through cyberattacks, voluntary or involuntary disclosure by an employee or by a joint venture
5:23 am
partner. the act makes a theft of trade secret a federal crime. the tool thieves use in their attempts to steal american trade secrets are growing more sophisticated by the day, however. our laws must keep pace. the eea, as a criminal statute necessarily has limitations. while we're very much appreciate the cooperation we get from federal law enforcement agencies, the fbi and department of justice have limited resources at the time and will never be able to prosecute all cases. state trade secret laws developed and made as soon as at a time when misappropriation was largely a local matter. but for it to deal with state lines, the array of state laws is inefficient and often inadequate. it's also inconsistent with how other forms of intellectual
5:24 am
property are protected. trade secrets are likely to involve movement across state lines. this is particularly true when the theft is by an individual looking to flee the country. once a trade secret has been divulged trade secrets may be lost forever and the harm from disclosure and is very often irreparable harm. we want to provide trade secret owners the same right to protect their rights as others have. it focuses on software, biotechnology, agricultural and apparel, demonstrates the importance of a harmonized federal/civil recommend difficult. they've already announced their support for the bill, and we are
5:25 am
united on this front. we look forward to working with chairman whitehouse and senator graham. similarly, we look forward to working with senator flake and agree it's important to study ways in which to address overseas theft effectively. in conclusion, companies are trading global. and this is essential it our global competitiveness. the act will establish the gold standard for laws globally and serve as an important base for ha harm onization. thank you again for the opportunity to testify today. i look forward to your questions. >> thank you, mr. norman. let me welcome senator hatch and senator kuhns to the hearing. and before i turn to them for
5:26 am
their questions, let me askew nan muss consent that chairman leahy's statement be put into the record, which it will be without objection. and let me ask each of you, just very simply and quickly, using your own words and your own experience, explain what you think the scope is of this problem for our country and its industries, starting with mr. hoffman. >> it is a tremendously big problem for us as a company, and i think more broadly as an industry, because of so much of our intellectual property is protected as trade secrets. and right now a lot of those are very vulnerable, considering the changing landscape, the sophistication of the means of which our intellectual property and trade secrets can be
5:27 am
obtained. so anything that helps to improve law enforcement's ability to protect our trade secrets and allows us to be more secure and keeping those secrets so they're still valuable is very much appreciated by boeing. >> ms. passman, from your experience, the scope of the problem? >> well, with companies having almost 75% of their value in intangible property including trade secrets, the problem is quite significant. and in the create pwc report we attempted to put a figure to the magnitude of the problem. looking at the different threat actors involved, looking at the fact that other advanced economies rely on supply chains, and we looked at other check activity as a proxy for this, since it's a figure that is very difficult to get someone's arms
5:28 am
around because companies themselves don't know the magnitude of the strtrade secre they have. we looked at other examples of elicit activity and came to a figure of 1% to 3% of gdp. quite significant. >> thank you. mr. greenblatt, in your experience? >> this problem is out of control. we need your help. we're being attacked daily. if we can get this legislation enacted, this will save jobs. in baltimore city, unemployed steelworkers will be employed. we are getting things stolen left and right. we need your help. >> and mr. norman? >> how's that for clarity, by the way. >> i'll try to asome clarity
5:29 am
myself the issue is enormous. i speak on behalf of pharmaceutical firms that spend billions of dollars in research and development. as we move forward and try to develop new, life-saving medicines, we continually build chemical platforms and pharmaceutical platforms in hopes of reaching a point where we can apply for patents. what we are seeing are numerous instances where interlopers are stepping in and trying to steal our trade secrets on our form la, prior to the form we can reduce those into a pat pt application. it very often may take two, three, perhaps longer, two or three years or longer to do enough research to get to
5:30 am
senator hatch? >> thank you, mr. chairman. >> i should say, both to you and senator kuhns, that before you got here, your names were sung with praise, over and over again for the legislation. it was almost as if you were summoned here by those voices. >> that's always unusual. we're happy to have you all
5:31 am
here. under u.s. law, protections for trade secrets are already some of the most rebust in the world. and we're hoping to make those provisions, protections even stronger. but protecting trade secrets in numerous countries is a challenging, is a challenge, it seems to me. facing many trans-national companies. something i'm very concerned about. now, mr. norman and mr. hoffman, how will changes we make to u.s. law have an impact, either positive or negative on what other countries are doing this this area, and do we need to be careful here? mr. norman, you can go first. >> sure. thank you, again, senator hatch for the legislation you've introduced. we greatly appreciate your leadership. the instances of what it would
5:32 am
do on a positive standpoint is that we believe the legislation to obtain a federal trade secret remedy, particularly, the ability to seek an ex parte seizure of stolen materials and prevent further disclosure or divestment of that information broadly, would be a very positive gold standard for future discussions on harmonization of trade secrets around the world with our trading partners. it's important to get beyond the state trade secrets laws, which are often a bit unwieldy and difficult to enforce across state lines. simply because the procedures aren't always set up to work very well along those lines, but with a federal standard, with the appropriate kind of ex parte control, i believe we can show the rest of the world what the
5:33 am
gold standard would look like as far as giving us the rights, on our own, to take a private civil action and protect other trade secrets. >> thank you. >> yes, i fully agree with my colleague. any opportunity for our trade negotiators to be able to point to improvements in trade secret laws in the united states and thus strength be ten the laws oe of our borders with global companies such as ours will be very helpful to protecting our trade secrets. >> a question for the whole panel. trade secrets seem to be a lot more difficult to protect than patents. i understand that there may be industry best practices and model policies, but i imagine these vary widely, based on the industry and type of process or information that you're trying to protect.
5:34 am
so i'm very interested in, as a practical matter, how do you determine what measures are reasonable to protect your trade secrets? >> well, when it comes to, you know, trade secret versus patent, we actually base that upon the reverse engineering ability of the innovation, but once we decide to go the trade secret route, we have to have the processes and the systems in place in order to assure that those secrets are, those trade secrets are secure, and, as mentioned previously, 60% of what we sell we buy from others as a company. so the sharing of the intellectual property is an area where we have to be very careful that they have the same type of procedures in place, and that we protect our interlick actual property at the same level. >> in our work with companies around the world, we've found that this is something that's
5:35 am
not very mature inside their businesses or with their supply chain partners. so in the create work with pwc we laid out a five-step framework for companies to begin to get their arms around how to best manage their intellectual property and really first being able to identify and categorize where are you, whether you're a small company or a large company who has global operations. we also recommend that companies conduct a risk assessment and identify who are the primary threat actors, who's interested in their trade secrets and intellectual property and their vulnerabilities in their policies, in their internal control, it's really looking inside their company and in their supply chain and identify those trade secrets that would have the greatest impact on the company's operations and business. also looking at the economic impact of a loss of a trade secret, understand the magnitude that that would have on their business. and finally, taking all of this
5:36 am
information and allocating resources to better protect your trade secrets. thinking of it as an investment, not just a cost. >> senator kuhns. >> thank you, senator whitehouse. i'd like to thank you for chairing this hearing and for the great work that you and senator graham have done to protect america's intellectual property. we've heard from an array of witnesses today of what's really at stake here. up to $5 trillion in value held in america's intellectual property. we have criminal law prosecutions. the espionage act is a good platform, a good beginning, but as we've heard from you today as witnesses, there are significant gaps, and i applaud the chair, senator whitehouse and graham for their efforts to deal with that. the department of justice has many priorities and limited resources, so it's unsurprising
5:37 am
to me that there were just 25 trade secret case brought last year. before he leaves, i need to say my profound personal thanks to senator hatch for being a good partner and leader on this issue. >> well, it's the same here. this young man has really done a very good job. >> you even got a young man out of it. [ laughter ] >> i should refer to you as one, too. >> as a former intern for this committee, i will say that i never imagined there would be a day when senator hatch would be patting me on the shoulder and saying i look forward to passing a bill with this young man when at the time i was mostly passing cups of coffee. it is a tremendous sense of satisfaction that i've gotten through working with senator hatch and with ely lily and a number of other companies represented here today. and i'm grateful to the national association of manufacturers and the coalition for the protection of trade secretes.
5:38 am
the protect trade secrets coalition. as we've crafted this bill and tried to get to a place that makes sense and that can help stem the gap in u.s. law to ensure that we really vigorously defend trade secrets. let me ask a series of questions of the panel if i might before we run out of time. first, if i might, mr. hoffman, boeing does business globally as your testimony thoroughly demonstrates. most of the significant trade secrets today originate from other countries around the world. can you respect for how respect for trade secrets vary around the world and how our laws domestically and what we might enact as far as measures to strengthen our domestic laws could strengthen our u.s. i.p. internationally. >> when you look at trade secret threat, regardless of whether it's coming from domestic or
5:39 am
internationally, it hurts boeing and other companies. but the best thing we can do is to set the standard and provide the tools necessary for efficient and effective protection of our trade secrets and give those, those standards to our trade negotiators to press the issue counterpar counterparts. >> mr. greenblatt, a company that has grown under your leadership, trade secrets pose a an existential threat. in your case, very harmful to ely lily or boeing, but for a firm like marlin steel, a loss of trade secrets could literally mean the end. in asserting your rights in court can be expensive relative to the size of your business. and i saw this in my own
5:40 am
experience as in-house counsel for a manufacturing firm. can you speak to how a right of action would reduce the cost of protecting your trade secrets and having one uniform standard would help going after those who steal your secrets? >> the act is very well crafted. it's going to help us go around the state system, which is very inefficient, it's very slow and very expensive. little companies can't afford having lawyers in five different states on retainers trying to go after a bad actor. it would be much more elegant to have a federal ability. to stop bad actors and get good
5:41 am
results. >> thank you again for your hardworking leadership and in particular one of the sections weigh worked on was the ex parte injunctive relief. if you'd explain why an authority like that is technically important to ely lily or other companies facing trade secret theft. >> yes, sir. we often run into situations where we find that an ex-employee has left and is going to work for a competitor, and we fine out something, such that in once they turn in their lily issued computer that there's been a download of a number of documents which contain highly confidential lily trade secrets. these occurrences almost always happen on a late friday afternoon. and therefore the best part, i believe, about the ex parte seizure aspect of the bill
5:42 am
that's currently pending is the fact that we could go to federal court, and in one action kick out an ounce of prevention rather than worrying with a pound of cure a week or two later, when we can get the indiana state courts involved or the new jersey state courts involved or perhaps both the indiana and nunl state courts involved, leading to a whole lot more expense if we have to go through state court, a whole lot more risk because we may not be able to isolate and seize the stolen materials as quickly, and therefore, a federal cause of action where we can go to a single court and institute power of the federal court system to seize stolen materials would be extraordinarily helpful in those situations, and i thank you for your leadership on this bill. >> thank you. if my math is right, that it's $450 billion in trade secret
5:43 am
theft. your leadership in strengthening the protections for companies is admirable and i look forward to working with you to pass these bills in tandem with you to strengthen the innovations of thousands of companies. >> and now lindsey graham. >> thank you, mr. chairman. i think we have two challenges, protecting the nation from what i think is a cyber attack on a large scale. the question is will we do something in time. that's one problem the nation faces. the other is the private sector trying to business in a very complicated, interconnected world. and the other thing america's had going for her is we're good at thinking outside the box and other people are good at copies.
5:44 am
we're trying to put teeth in this law. mr. hoffman, when you're overseas representing boeing or trying to do a joint venture, what do you worry about the most? i mean, if you're going, some countries require you to have a 51% partner, is that correct? . >> it varies by country. in some cases you can have a majority share and some cases you have a minority share. >> but you have a forced partnership based on the host country's laws. >> whatever the laws are, typically it is some type of partnership, yes. >> well, these partnerships are created by the host country, not at your own choosing. i suppose you can choose who to do business with. but you have to have a local partner for lack of a better terrell. >> in general, yes. >> how does the private sector and government interact when there's a trade secret theft offer intellectual property theft in a foreign country?
5:45 am
what more can we do? and how does that sis tell woys? >> i'm not an expert in those area, but we a very globally spread company. and when we make a decision to go into a country and do business, we study the laws and how we need to establish ourselves as a business and are prepared to defend our trade secrets as best we can knowing it's going to be a very different environment than we have here at home in some case. >> mr. norman, when you do business overseas, and you have a local partner, what's your biggest concern? >> the biggest concern, of course, is losing our trade secrets. losing the value of all the investment that we put in -- >> having a company across the street from where you locate, doing exactly the same thing you're doing? >> exactly. we're always careful about the
5:46 am
type of research and disclosure that we make outside the united states. >> and if we had laws holding an entity liable for that kind of theft, do you think it would make business easier overseas? >> if we could get other countries to change their laws and more harmonizing with the way we would like to see trade secrets protected. >> is it fair to say, many countries, it's the wild, wild west? >> there's definitely different threat levels out there, and i agree with my colleague that we choose carefully about what we do outside the united states. >> is this an impedestrianment
5:47 am
to job creation? >> i think anytime we lose t, i is a huge job issue. we employ thousands of scientists and engineers who will work years trying to develop a drug product. and if a competitor can step in and take that away from us right before we cross the finish line, it's devastating. >> i want to thank chairman whitehouse. i've never known someone to know more about the subject matter. >> it's been a pleasure working with senator graham on a variety of cyber issues. and i thank senator flake. >> thank you for being here. i apologize for not being here earlier and hope i'm not plowing old ground here, but i'm concerned about the rate at
5:48 am
which trade secrets are be being stolen. as opposed to domestically. i want to get some sense of that. i've introduced legislation, the future of america innovation act, the fair act. if the bad actor is located abroad or acting on behalf of a foreign entity, and ms. passman, there was a recent report on successful or unsuccessful attempts. the ben fishery of the theft is known 70% of the time. do you see this as a growing problem, then, the foreign nature of the threat? >> certainly in an integrated
5:49 am
economy with very global supply chains we're going to see the problems with the trade secrets. american companies benefit from having participate in these global supply chains, and as they move their business overseas, whether it's a supplier oversaeas or a custome overseas, they need to realize the environment in which they're working. we're working with companies in china and other emerging markets that want to mature their systems. but we advise companies to unstan the environment that they're entering and to put business processes in place to better protect and manage their intellectual property inside of their business as well as with their supply chain. >> well, thank you, mr. hoffman, and your testimony, you note that one of the few cases d.o.j. has prosecuted under section 1831 was against a defendant who
5:50 am
stole trade secrets from boeing related to space shuttle and the delta iv rocket to benefit a foreign entity. do you also see an uptick in this foreign activity? >> that particular case, the gentleman was charged with stealing our trade secrets. there was no particular focus on what happened to those. in fact, once it leaves, the damage has been done. i might defer to our department of justice colleagues regarding those issues. >> all right. what is boeing doing to combat this? what measures have you taken. sorry if i'm plowing old ground here. >> in terms of our overseas presence, we hold our subsidiaries and our relationships wi we have in the united states. the complexities are that we are in a different country and we have to adhere to their laws,
5:51 am
and they may not be as harmonized with ours and as effective as ours. >> do you think it's important to have legislation that protects both, protects companies against domestic and foreign trade secret theft then? all of you agree with that good, we'll proceed with the legislation. i appreciate. >> let the record reflect the nods. >> if you could do that more audibly next time, that would be great. thank you for your testimony. >> let he ask one last, well, maybe two last questions from everybody. there's been some reluctance on the part of corporate victims of trade secret theft to engage in the criminal law enforcement process. and within of the thione of the heard is that taking that step rather than trying to bury
5:52 am
things could actually make things worse as the trade secret rattled around through the case and became more public and further compromised the company's secrecy and its advantage. is that something that is a real concern? are there other concerns we should be looking at in terms of things having to do with the process of a criminal case that are deterring criminal victims from taking vac advantage of th means of redress. mr. norman? >> yes, chairman whitehouse, that is very much a deep concern that we have as we look at the question of criminal prosecution arising from a disclosure of trade secrets outside the bounds of our corporate entity, and i
5:53 am
applaud you, particularly, for the lang wablg that you have in your legislation, concerning the ability to protect a trade secret, even during the time that the court is reviewing, because it is, it is often difficult to question witnesses. it's very difficult to come forward with documentation. it's very difficult to seek expert testimony that can help prove that a theft has occurred if you can't talk about specifically in open court what the means of the disclosure was or what the subject matter of the disclosure was. because once it's made it its way into open court it is no longer a trade secret and you lose it anyway. so many of the mechanisms that have been proposed and the mechanism that i've seen technically in your legislation, i believe is a great leap forward in helping us move into an arena where we could help
5:54 am
prosecute these cases much more readily than we've been able to in the past, and i thank you for that. >> a final question for mr. greenblatt. you indicated earlier that one of the things that we as senators should focus on is improving coordination among the agencies. you used the term silos. when i go out to the unofficially termed fusion centers, if you will, where the fbi or homeland security, they've got all the agencies there. they've got everybody represented. it's all up on screens. it looks like a model of interagency cooperation, at least at that level. obviously, you had a different experience down at the level of the attacks on your company and the experience that you had.
5:55 am
could you articulate more specifically exactly what your concerns were about the silo problem and the problem of coordination. >> so for example, if the februafbi identifies a bad actor, we would like that that company can't import things into america, and the customs agency halts their products from coming into america. the only way we get their attention is by the wallet. and if we could stop them from shipping into the greatest, biggest economy in the world, we'll get their attention. >> so you're not, your experience wasn't that on the investigative side there was discoordination but you're talking about an additional penalty for them. >> exactly. we want everybody to work together and quickly resolve these topics, and we just can't
5:56 am
have each agency in their own little zone. we have to have everybody working together and collaborate as much as possible. and then we have to stop these bad actors from bringing their parts into america. >> let me thank all of the witnesses for coming in. this is a very helpful process for us. we have a lot of things going for us with this legislation. for one thicng, it's a real isse that is causing americans to be hurt in very concrete and meaningful ways. second, as you've seen today, couldn't be more bipartisan. so i don't see us getting dragged into the partisan turmoil. we're following regular order and having proper hearings and so forth so that we can pull this together and forward and i hope that we can make progress. and the advice and the counsel of all that are here, some of
5:57 am
whom have been very helpful in the preparation of the legislation and testimony about it is something that we are all very grateful for. i think senator flake, senator hatch, kuhn, graham, and myself have all put considerable effort into putting different aspects into this problem. and i'm confident that we will all work together to solve this problem so you have one less thing to worry about and you can focus your k. skills on making the best products in the world and ex-panning your businesses. thank you very much. the hearing will stay open for an additional week for anybody who wishes to add anything. but subject to that, we are adjourned.
5:58 am
5:59 am
6:00 am


info Stream Only

Uploaded by TV Archive on