By Sharon Magen, a master’s student at SciencesPo in the field of International Security.
The recent usage of emerging technologies for purposes of cyber-attacks or acts of cyber-espionage and the subsequent threat posed to the national security interests of governments in the economic sphere specifically is the cornerstone of this paper. Although many have referred to cyber security risks that are directly connected to the security sphere, national security threats posed by cyber-attacks or acts of cyber-espionage in the economic sphere have not been dealt with to the same extent, a rather puzzling state of affairs.
As cyberspace is increasingly utilized for espionage purposes in various areas, it is imperative to further study the possibility of exploiting cyberspace for intentions of espionage in the international economic arena specifically; far-reaching economic globalization has made the international economic scene vastly interconnected, thus intensifying the world economy’s vulnerability to possible cyber security breaches and intensifying the repercussions of a possible breach on national security interests on a wide scale. It is this lack of contemporary research regarding the utilization of cyber means in order to conduct economic espionage and the subsequent consequences regarding national security that has driven me to further examine this subject in this paper.
The growing importance of further observing this phenomenon, where cyber means may be utilized by foreign entities in order to conduct economic espionage so as to achieve strategic goals, has provided for the incentive of this research. The growing risk to national security posed by economic espionage by cyber means, coupled specifically with China’s economic and political rise, rather intensifies the importance of dealing with this issue. As a country seeking to become a game-changer in the global arena, it is plausible that China, significantly more than other countries, makes use of economic espionage through cyber means to the fullest extent, so as to achieve its goals in other spheres, such as the security and political spheres. It is therefore my belief that this issue should be further studied, in order to assert whether cyber espionage in the economic sphere is a threat posed by China especially, and should therefore be taken into consideration while assessing economic integration which Chinese entities.
During the past few decades, cyber interconnectedness and vast economic integration have transformed the global marketplace into an arena in which state actors and others may utilize cyber means to conduct economic espionage and advance other strategic goals. The current global reality of international cyber and economic interconnectedness presents a new type of threat to national security, as these cyber means may be utilized by foreign actors as vessels for conducting harmful economic espionage. In this case, foreign governments, through private or state-owned companies, may choose to target certain economies or foreign companies in order to make an investment which will inter alia allow that government to conduct cyber espionage in the economic sphere, such as obtaining new technologies, an act that may tip the scale in favor of the investing country, that otherwise would not have been able to receive these technologies.
This phenomenon cements cyber espionage in the economic arena as an undeniable threat to national security nowadays. This accusation is mostly directed today towards China by the United States, as Chinese companies, whom are mostly state-owned, are suspected of utilizing global cyber and economic integration as a vessel for conducting economic espionage. However, it is contended by some that China in fact is not the sole committer of cyber espionage in the economic sector, and therefore should not be targeted as such.
All countries today engage in economic espionage through cyber means to a certain degree, and therefore the question in this paper will deal with the reason for the behavior of the United States, spearheading the notion that China conducts gross economic espionage through means of cyber, whilst it is maintained that other countries do so as well. This research underlines the imperativeness of further study of world cyber integration and the economic espionage risk it entails. Although international cyber integration may present an opportunity for growth, countries must take into consideration the risk of exposing their economy to economic espionage via cyber means.
Past Research Pertaining to Cyber Economic Espionage
According to Mary Ellen Stanley, technological advancements and economic integration have vastly altered the perception of national security in the intelligence sphere, due to wide-ranging cyber economic espionage.[i] Similarly, Matthew Crosston argues that typical types of international economic activity may constitute an intelligence collecting structure through means of cyber, meant to aid as an added aspect of military might enhancement.[ii] Alongside these assertions, Souvik Saha specifically stresses the United States’ standpoint which emphasizes the Chinese encompassing involvement in economic espionage, and the undeniable national security threat it poses.[iii] Furthermore, Magnus Hjortdal stresses that cyberspace is a pivotal element in China’s strategy to ascend in the international system, and that one of the key reasons for this is conducting economic espionage to gain strategic advantage.[iv]
However, Ibrahim Erdogan argues that cyber economic espionage is an immensely lucrative industry in which all countries participate,[v] and therefore cannot be attributed to one specific country. Furthermore, when it comes to the United States specifically, Duncan Clarke contends that even allies of Washington, such as Israel, have been committing acts of economic espionage against the United States for years. According to Clarke, Israeli intelligence units continue to utilize existing networks for collecting economic intelligence, including computer intrusion,[vi] thus rendering the argument maintaining that cyber economic espionage against the United States is an act of war spearheaded by its foes, redundant. The assertion that many other countries, apart from China, commit cyber economic espionage acts against Washington, including allies, and are not reprimanded, weakens the severity of China’s acts and the argument made against it by the United States intelligence community, that it is indeed the forefront of the cyber economic espionage.
Regarding the integrity of the American intelligence agencies’ assessments, John Yoo contends that intelligence and national security agencies in the United States do not always depict an accurate portrayal of national security threats.[vii] In other words, it is plausible that the United States uses untruthful means to protect the nation’s security, thus arguably sacrificing the integrity of the government’s efforts. Robert Bejesky similarly throws into question the reliability of these organizations’ assertions; according to Bejesky, allegations maintaining that executive encouragements may induce intelligence assessments to support the position preferred by the executive branch are not without basis. The CIA for instance has a long history of politicizing intelligence, and at a 2001 panel held at a Harvard conference deliberating the account of the CIA, it had been maintained that the agency does not conduct its role faithfully when it comes to sharing unpleasant truths with the executive branch.[viii]
If so, it is feasible to comprehend that although cyber economic espionage may pose a national security threat, the United States’ formal accusation of China being the main committer of cyber economic espionage may be biased. Although China may be committing acts of economic espionage through means of cyber, it cannot be confirmed at this point that it spearheads this area more than any other country.
During the past few decades, technological developments have immensely changed today’s governments’ perception of national security. Conventional acts of espionage which can be traced to a certain perceptible entity have merged significantly with cybersecurity, thus rendering the identity of the intelligence threat ambiguous, and exposing new domains in which harmful data collection may occur, such as the global marketplace.[ix] Today, the world is moving towards a single global economy, due to financial integration.[x] This current reality of cutting-edge technology and worldwide economic integration, has changed the face of espionage, and has created a world in which national security can be harmed, inter alia, via cyber means in the global marketplace.
Today there currently is a necessity to balance a nation’s economic affluence and its national security, as economic globalization may become a vessel for espionage through means of cyber, the bedrock of connectivity in today’s international market. The key methods through which international economic integration may enable cyber economic espionage, are when a foreign state-owned or government associated body conducts business in the host country, or when a foreign entity acquisitions a local business within the country.[xi] It can be contended that this type of activity is not merely a manifest of economic policy, but also functions as a well-planned intelligence collecting scheme intended to serve as an additional facet to military rivalry.[xii] Although it cannot be affirmed that cyber espionage intentions are the main incentive for economic integration, it can be asserted that economic integration enables the possibility of conducting cyber espionage activities. Countries may abuse economic integration in order to conduct cyber economic espionage so as to enhance military might.
In this regard, many claim that China is currently spearheading the sphere of cyber economic espionage.[xiii] According to this approach, China intends to harness today’s worldwide market espionage possibilities in order to enhance its regional and global supremacy. Washington especially perceives Beijing’s intention to commit economic espionage through cyberspace as a dire national security hazard, as China’s success in conducting effective economic espionage may translate into a sharp increase in China’s power potential relative to the United States. China’s current investment policy in economies such as the United States consists of mergers and acquisitions which enable opportunities for undesirable proliferation through means of cyber of intellectual property and trade secrets to Chinese firms.[xiv],[xv]
This type of activity is particularly problematic when Chinese multinational corporations, which are mostly government owned, attempt to purchase American companies with strategic significance or deal with critical infrastructure and assets. According to most recent assessments from the United States intelligence community, there is a heightened assertiveness within China’s international policies, and as part of this it has resorted to massive cyber economic espionage.[xvi] Moreover, according to Pentagon reports, China will continue to aggressively collect sensitive American technological information through cyberspace espionage.[xvii]
However, it can be contended that this assertion, that China is the main global conductor of cyber economic espionage, is meant to serve certain political policies in the United States, rather than represent an accurate status of global cyber economic espionage. Although FBI Director James Comey had stated in May 2014 that the Chinese government blatantly seeks to use cyber espionage to obtain economic advantage for its state-owned industries, Robert Gates, then former United States Secretary of Defense, openly stated that as much as 15 countries at that time were conducting economic espionage in order to take possession of American trade secrets and technology,[xviii] thus shifting the focus from China being the sole leading committer of this act. Furthermore, it has been contended that the United States National Security Agency (NSA) itself had committed cyber economic espionage activities against France.[xix]
Given the circumstances, the main question that arises in this regard is why the vast majority of official American security and intelligence bodies spearhead the notion that China is currently the worldwide main conductor of economic espionage through cyberspace, whilst it is maintained by other sources that other countries are committing cyber economic espionage acts as well, including the United States itself. It can be asserted, that though China does not actually head the world cyber economic espionage sphere, leading security and intelligence institutions in the United States promote this assertion in order to support political needs and policies towards China, who’s growing regional and world dominance is perceived as a threat to the continuation of Washington’s own world dominance and strategic might. In other words, it can be asserted that China’s rise poses a political threat to the United States, a fact which leads to American prosecution of Chinese interests in the economic sphere.
Therefore, another question that arises in this regard is whether other countries similarly argue that China is the global forefront of cyber economic espionage. If it is asserted that other countries equally claim that China is indeed the global leader of cyber economic espionage, another question that would arise in this regard would refer to the reasons supporting this argument. If other countries contend that China is the world leader of cyber economic espionage, despite it being asserted that many other countries in fact participate in cyber economic spying, the question is why they do so. It is my assumption that this is due to security motives, having to do with China’s rise and the security threat it poses via economic growth. This would assist in asserting the assumption that China’s rise de facto poses a threat to American strategic interests.
That being the case, it can be argued that the vast majority of official American security and intelligence bodies currently head the notion that China is the forefront of global cyber economic espionage in order to serve political and foreign policy purposes, and do not therefore portray an accurate assessment of the global cyber economic espionage scene. According to other sources there are a number of global actors that currently take part in cyber economic espionage, therefore not leaving the field for any singular country to spearhead. However, I contend that it is possible that the formal approach of the vast majority of the American intelligence institutions towards China in the cyber economic espionage sphere is intended to serve the United States’ grand strategy towards China’s rise, as they hold the belief that China’s rise may pose a threat to American strategic interests.
The hypothesis claiming that the United States leads the global notion that China is the current forefront for international cyber economic espionage due to political, foreign policy and security reasons can assist in understanding the gap between the popular claim within the American intelligence community and other entities regarding China’s role in the current cyber economic espionage arena. Many contend that China’s vast economic growth coupled with its enhancing military capabilities places it on a collision course with the United States.[xx] It can be asserted that in order to battle against China’s rise, the United States advocates an argument which depicts China as a country with minimal respect for intellectual property, sovereignty, and other critical factors that comprise the bedrock of global trade. International trade serves as China’s bread and butter, fueling its growth and ability to expand its military capabilities. If the United States can damage China’s ability to conduct global trade by asserting that it promotes cyber economic espionage, it would thus damage Beijing’s capabilities in the security sphere.
My methodology for examining this theoretical assumption entails the assessment of other countries’ approach to China’s supposed cyber economic espionage intentions. If other countries similarly claim that China is the main conductor of global cyber economic espionage, despite the fact that it has been asserted that other countries take part in such espionage acts as well, it would be vital to assert what are the reasons for this type of behavior. In order to assess the approach of other countries towards Chinese cyber economic espionage, I contend that it would be most affective to focus on countries that are not western, such as the Middle East countries. This in my opinion may contribute in portraying a more balanced assessment of other countries’ approach towards China’s cyber economic espionage intentions.
Consequently, in this paper I examine the approach of select Middle East countries to China’s massive involvement in world trade and the possibility of its gross cyber economic espionage activities, in order to assess Washington’s claim. To this end, I examine the cases of Turkey and the United Arab Emirates (UAE). The rationalization for choosing these two countries is such; the main nexus that binds Beijing to the Middle East region concerns economic security, as more than half of China’s oil and natural gas imports are sourced from the countries of the region.
However, in contrast to the majority of other actors in the region, hydrocarbons do not play a big role in Turkey’s relations with the China, thus making Ankara a meaningful choice for a study of relations with China within the Middle Eastern context. If so, an outtake on the Turkish possible responses to Chinese alleged cyber economic espionage may provide an original contribution on investigating this matter. Regarding the UAE, it is important to note that the federation is only the third largest economy in the Middle East behind Saudi Arabia and Iran. Being a source of oil and natural gas imports for China, but not one of China’s principal suppliers, the UAE represents a significant case study in this sense, as it cannot be characterized as being overly essential to Chinese interests. Therefore, the UAE’s approach to Chinese cyber espionage intentions will not be tilted in favor of Beijing.
If proven that these two Middle Eastern countries have taken action against Chinese economic transactions, it can be affirmed that this is due to the national security threat posed by cyber economic espionage. The apprehension that through cyber economic espionage China could access key economic interests in a host country’s economy and realize its interests regardless of the host country’s interests could in my opinion propel them into taking action against Chinese economic transactions, thus initiating the suspension or cancellation of Chinese backed investments and so on.
In order to measure these Middle Eastern countries governments’ approach to possible Chinese cyber economic espionage through, I will examine possible objections and restrictions made at a government level towards Chinese economic transactions and Chinese funded projects within the country. I contend that upon presenting a consistent trend of government level objections to projects funded by the Chinese, it can be affirmed that this is due to the fact that there is a tangible threat to national security posed by cyber economic espionage, enabled by economic integration.
Although more than half of China’s oil and natural gas imports are sourced from the countries of the Middle East region, thus deepening Beijing’s dependence on the region, hydrocarbons do not play a pivotal role in Turkey’s relations with China. Nonetheless, Turkey is a rising power in the region, and has not directly experienced the upheavals felt in the Arab world in the past few years, a fact which still places Ankara as a pivotal partner of Beijing in the region, in the economic and political spheres alike.[xxi] Regarding the Turkish government’s stance on possible Chinese cyber economic espionage activities, it is important to note that in November 2015, Ankara had cancelled a 3.4 billion dollars long-range missile defense system tender provisionally awarded to a Chinese state owned firm in 2013.[xxii]
Turkey had originally entered negotiations in 2013 with the China Precision Machinery Import-Export Corporation (CPMIEC) to finalize the billion dollar contact. Even though French-Italian consortium Eurosam and US-listed Raytheon had also submitted offers, the Turkish government had preferred talks with the Chinese company, a fact which raised serious concerns over the compatibility of CPMIEC’s systems with NATO missile defenses, as Turkey is a member. In its official statement given by a representative from Prime Minister Ahmet Davutoglu’s office, the Turkish government had declared that it had cancelled the deal with China mainly because Turkey had decided to launch its own missile project.[xxiii]
Though the Turkish government officially maintained that the core reason for its cancellation of the multi-billion dollar deal with the Chinse frim had been its decision to self-develop the long-range missile defense system, it can be contended that this was actually done because of concrete concern within the Turkish government regarding Chinese cyber economic espionage. As previously asserted, Turkey had led a comprehensive process in order to decide on a foreign company to lead this project. If Turkey had indeed wished to self-develop this defense system, it would have done so from the beginning, and would not have conducted a complete procedure so as to choose a foreign firm to conduct this project.
In other words, it can be argued that after Turkey had decided to continue with CPMIEC in order to further this project, serious concerns had risen within the Turkish government and out of it regarding subsequent possible exposure of sensitive NATO systems to Chinese eyes. Although the deal did not explicitly determine the direct exposure of critical and classified systems to the Chinese, this transaction could have enabled Chinese access to systems through which harmful data collection could be conducted. Transactions such as this may inadvertently permit foreign penetration through means of cyber, as foreign firms gain access and exposure to computerized systems through which such infiltration may be conducted. Such harmful data collecting activities through means of cyber that are enabled by seemingly innocent business transactions are especially perilous when these transactions involve critical infrastructure of the host country.
If so, it is significantly plausible that Turkey had canceled this multi-billion-dollar deal with China due to cyber economic espionage concerns. Although it can be contended that other motives had brought the Turkish government to the decision to call-off the collaboration with the Chinese state-owned firm, such as the formal Turkish response that contended that Turkey had decided to self-develop the long-range missile defense system, this, as stated, is problematic to comprehend as Turkey had initiated a long process of selecting a foreign contractor. If so, it can be contended that the Chinese cyber economic espionage threat was a pivotal motive in Turkey’s decision to call-off the deal, as it is perceived as a real danger by the Turkish government to its national security.
The UAE is a federation comprised of seven separate emirates, which together represent the third largest economy in the Middle East behind Saudi Arabia and Iran. The UAE has the seventh largest proven reserves in the world of both oil and gas, and in 2010 China imported 64,500 tons of liquefied natural gas from the UAE valued at more than 23 million dollars. Furthermore, the China Petroleum Engineering and Construction Corporation (CPECC) assisted with the construction of the Abu Dhabi Crude Oil Pipeline Project, which now enables the transport of 1.5 million barrels of crude oil per day from Abu Dhabi’s collection point at Habshan to the export terminals at Fujairah. Oil transported through the pipeline bypasses the narrow Strait of Hormuz, which Iran has repeatedly threatened to block if it is attacked militarily. However, it is imperative to point out that the 3.3-billion-dollar project had experienced repeated delays, initiated by the UAE.[xxiv]
Although it had been officially stated that The UAE has been forced to delay the construction of a pipeline allowing oil to bypass the Strait of Hormuz due to construction problems,[xxv] according to industry sources close to the project, the reason for the delay was that although CPECC was already preparing to commission the pipeline, the Abu Dhabi Company for Onshore Petroleum Operations (ADCO) was not involved in this initial preparation process, a rather perplexing situation, as ADCO would first have to make sure that the commissioned pipeline design suited its standard prior to commencing the production procedure.[xxvi]
The Chinese commencement of designing the pipeline without the participation and involvement of ADCO, the UAE state firm in charge of the project, plausibly points to the fact that there was a Chinese intention to commit an act of sinister nature, regarding the construction of the pipes; such pipelines include highly sophisticated control software that can be hacked and even manipulated prior to its assembling. In 2004 for instance, Thomas C. Reed, an Air Force secretary in the Reagan administration, wrote that the United States had effectively implanted a software Trojan horse into computing equipment that the Soviet Union had bought from Canadian suppliers, used to control a Trans-Siberian gas pipeline.[xxvii]
If so, it is quit plausible that the Chinese had begun the UAE commissioned pipeline design without involving ADCO because they had something to hide, such as the insertion of cyber espionage measures. This would not be an isolated incident for the Chinese, as in 2013 The former head of the United States’ Central Intelligence Agency (CIA), Michael Hayden, contended that it is clear that Chinese telecoms giant Huawei spies for Beijing,[xxviii] a fact which rather solidifies the argument that China indeed utilizes business transactions in order to conduct cyber espionage. In the case of the Abu Dhabi Crude Oil Pipeline Project, the numerous delays due to Chinese repetitive exclusion of ADCO from the pipeline design process can be explained by the fact that CPECC had engaged in illicit activities concerning the manufacturing of the pipeline, namely the insertion of cyber espionage measures. However, it is important to note that in this case, although it can be contended that China had engaged in cyber economic espionage, the UAE had only delayed the project, and had not opted to cancel it entirely.
If so, it is apparent that although these two Middle East countries do not share Washington’s vehement stance towards the Chinese cyber economic espionage threat, there is an understanding of the possible threat, reflected by their cancellation or delay of business transactions with Chinese firms. Although none of these Middle East countries have gone out and exclaimed, as the Americans have, that China makes use of cyber means in order to conduct economic espionage, their behavior towards major Chinese investment points to a government level comprehension that Chinese economic conduct differs from that of other countries, due to a heightened threat of cyber economic espionage.
These two Middle East countries, as others, are not cemented in great power politics such as the United States, and therefore lack the incentive, as well as the protective means, to denounce Chinese economic conduct due to Beijing’s use of such demeanor in order to conduct cyber espionage and enhance its strategic might. Therefore, although it is possible to witness a government level resistance to major business transactions with Chinese firms, it is mainly done so through inconspicuous ‘soft’ methods such as project suspension. However, project suspension coupled with cancellation of business transactions with Chinese firms in my opinion forms a stable foundation for the argument that Chinese business transactions specifically are not treated the same as transactions done with firms from other countries, therefore pointing to the fact that they pose a threat.
However, due to the fact that the anti-China steps taken in the economic sphere are mostly discreet, it is speculative to assume that these steps were taken in light of Chinese cyber economic espionage intentions. Even when publically announcing the suspension or cancellation of Chinese funded projects, those governments do not state that this is due to misconduct rooted in cyber economic espionage. That being said, it can be conferred from their actions that Chinese economic conduct is in fact treated differently than economic transactions originating from other countries, a fact which perhaps further solidifies the American notion that China’s economic behavior is not innocent, for if it were so, there would be no publically announced suspension or cancellation of major Chinese funded projects in both countries.
In the literature review section of this paper, I have noted Crosston’s approach, which states that typical types of international economic activity may constitute an intelligence collecting structure, meant to aid as an added aspect of military might enhancement. Additionally, according to Saha, recent assessments from the United States intelligence community contend that there is an intensified decisiveness within China’s international policies, and as part of this it has resorted to substantial cyber economic espionage. China’s focus on the infrastructure, energy and telecommunication sectors in terms of business transactions, which are all considered critical to national security, may suggest that the Chinese indeed intend to utilize information gained by means of cyber through economic integration in these sectors for strategic purposes. The suspension and cancellation of key Chinese funded projects, prima facie due to technical reasons, suggests that these governments see Chinese further economic involvement in their countries as a threat.
In conclusion, it is feasible to comprehend the vast impact of global cyber interconnectedness and economic integration on the perception of a country’s national security. Whilst pertaining to be of economic nature only, typical types of international economic activity may constitute an intelligence collecting structure through cyber means, meant to aid as an added aspect of a nations’ power enhancement. International economic conduct may permit opportunities for proliferation of economic intelligence through means of cyber into the investing country’s hands, thus compromising the receiving country’s national security. The American claim that China currently spearheads cyber economic espionage worldwide by means of economic integration seems to be sustained by other governments as well, further to the reaction of the governments of Turkey and the UAE to business transactions with Chinese firms. Although these countries’ reaction is not as intense and straightforward as that of the American government, it is nevertheless apparent that they are striving to restrict or monitor it, at the very least.
In regards to the main question of this research, dealing with the reason for the official American intelligence bodies approach, claiming that China is currently the worldwide main conductor of cyber economic espionage, whilst it is maintained by other sources that other countries are committing economic espionage acts as well, in light of the findings regarding the two previously examined Middle East nations, it can be contended that the United States does so because Chinese investments in particular are conceived as a national security threat, a notion shared by other countries. As seen in the cases Turkey and the UAE, the suspension or suspension of Chinese projects, point to the fact that business transactions with Chinese firms are indeed looked upon, not only by the United States, as a source of peril. Although some sources may maintain that China is no different than any other country when it comes to cyber economic espionage, it is in fact proven that other countries, and not only the United States, perceive China specifically as an ominous threat when it comes to economic integration and possible cyber economic espionage.
Even though the global market place is becoming increasingly interconnected via cyber means, countries must take into consideration the risk of exposing their country to national security risks, due to the fact that international economic integration may prove to be a vessel for cyber economic espionage. Indeed, in this research it has been asserted that the United States is not exaggerating in its description of the cyber economic espionage intentions of the Chinese; rather, as a superpower, it is one of few countries that have the prerogative to openly state their opinion on the matter. It is critical therefore, to assess Chinese business transactions differently than those originating from other countries, in light of the fact that the Chinese specifically use economic integration means in order to conduct cyber espionage and enhance Beijing’s military and strategic might on the path of its rise.
[i] Mary Ellen Stanley, “From China with Love: Espionage in the Age of Foreign Investment,” Brooklyn Journal of International Law 40, no. 3 (2015): 1033-1079.
[ii] Matthew Crosston, “Soft Spying: Leveraging Globalization as Proxy Military Rivalry,” International Journal of Intelligence & Counterintelligence 28, no. 1 (2015): 105-122.
[iii] Souvik Saha, “CFIUS Now made in China: Dueling National Security Review Frameworks as a Countermeasure to Economic Espionage in the Age of Globalization,” Northwestern Journal of International Law & Business 33, no. 1 (2012): 199-235.
[iv] Magnus Hjortdal, “China’s use of Cyber Warfare: Espionage Meets Strategic Deterrence,” Journal of Strategic Security 4, no. 2 (2011): 1-24.
[v] İbrahim Erdoğan, “Economic Espionage as a New Form of War in the Post- Cold War Period,” USAK Yearbook of International Politics and Law no. 2 (2009): 265-282.
[vi] Duncan Clarke, “Israel’s Economic Espionage in the United States,” Journal of Palestine Studies 27, no. 4 (1998): 20-35.
[vii] John Yoo, “The Legality of the National Security Agency’s Bulk Data Surveillance Programs,” Harvard Journal of Law and Public Policy 37, no. 3 (2014): 901-930.
[viii] Robert Bejesky, “Politicization of Intelligence,” Southern University Law Review no. 40 (2013): 243-551.
[ix] Mary Ellen Stanley.
[x] Lucyna Kornecki and Dawna Rhoades, “How FDI Facilitates the Globalization Process and Stimulates Economic Growth in CEE,” Journal of International Business Research 6, no. 1 (2007): 113-126.
[xi] Mary Ellen Stanley.
[xii] Matthew Crosston.
[xiii] Stuart Malawer, “Confronting Chinese Economic Cyber Espionage with WTO Litigation,” New York Law Journal, December 23, 2014.
[xiv] “Foreign Spies Stealing U.S. Economic Secrets in Cyberspace,” The Office of the National Counterintelligence Executive, April 14, 2016, https://www.ncsc.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf
[xv] Souvik Saha.
[xvii] Geoff Dyer, “China in ‘Economic Espionage’,” Financial Times, May 19, 2012.
[xviii] Zachary Keck, “Robert Gates: Most Countries Conduct Economic Espionage,” The Diplomat, December 17, 2015, http://thediplomat.com/2014/05/robert-gates-most-countries-conduct-economic-espionage/
[xix] “WikiLeaks Reveals NSA’s Economic Espionage against France,” Progressive Digital Media Technology News, Jun 30, 2015, http://search.proquest.com/docview/1692699265?accountid=14765
[xx] Souvik Saha.
[xxi]Altay Atli, “A View from Ankara: Turkey’s Relations with China in a Changing Middle East,” Mediterranean Quarterly 26, no. 1 (2015): 117-136.
[xxii] “Turkey Says ‘yes’ to China’s Trade Initiative, ‘no’ to its Missiles,” South China Morning Post, November 15, 2015, http://www.scmp.com/news/china/diplomacy-defence/article/1879097/turkey-says-yes-chinas-trade-initiative-no-its-missiles
[xxiii] “Turkey Cancels $3.4 Bln Missile Deal with China,” The French Chamber of Commerce and Industry in China, November, 15 2015, http://www.ccifc.org/fr/single-news/n/turkey-cancels-34-bln-missile-deal-with-china/
[xxiv] Manochehr Dorraj and James English, “The Dragon Nests: China’s Energy Engagement of the Middle East,” China Report 49, no. 1 (2013): 43-67.
[xxv] “UAE Delays Project to Bypass the Strait of Hormuz,”. Al Bawaba, January 9, 2012,
[xxvi] “UAE Delays Oil Pipeline to Bypass Hormuz to June,” Oil & Gas News, January 16, 2012,http://search.proquest.com/docview/916274658?accountid=14765
[xxvii] John Markoff, “Old Trick Threatens the Newest Weapons,” The New York Times, October 26, 2009, http://www.nytimes.com/2009/10/27/science/27trojan.html?_r=2&ref=science&pagewanted=all
[xxviii] “Huawei Spies for China, Says Former NSA and CIA Chief Michael Hayden,” Business Insider, July 19, 2013,http://www.businessinsider.com/huawei-spies-for-china-says-michael-hayden-2013-7