Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/4669
Title: | Defensive Industrial Policy: Cybersecurity Interventions to Reduce Intellectual Property Theft |
Authors: | Chad Dacus, Carl (Cj) Horn |
Keywords: | USTRANSCOM Acquisition (US) intellectual Property Cybersecurity Industrial Policy |
Issue Date: | 6-May-2022 |
Publisher: | Acquisition Research Program |
Citation: | Published--Unlimited Distribution |
Series/Report no.: | Acquisition Management;SYM-AM-22-155 |
Abstract: | Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is better protected from China’s sophisticated hackers. We call for selective interventions in nascent industries—especially those with important implications for national defense. U.S. policymakers must consider both the supply and demand aspects of the “market” for intellectual property theft to make informed decisions as to how to steer resources. This paper offers insight that the supply side of the equation has been given relatively short shrift. We offer a spectrum of potential interventions to address underinvestment in cybersecurity leading to IP theft and discuss where to go from here. |
Description: | SYM Presentation |
URI: | https://dair.nps.edu/handle/123456789/4669 |
Appears in Collections: | Annual Acquisition Research Symposium Proceedings & Presentations |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SYM-AM-22-155.pdf | Presentation | 891.8 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.