Search This Blog

Tuesday, April 2, 2019

Are We Ready For An Implant That Can Change Our Moods?

Depressed person and an image of neural networks in brain.
Christina Chung for NPR

Our thoughts and fears, movements and sensations all arise from the electrical blips of billions of neurons in our brain. Streams of electricity flow through neural circuits to govern these actions of the brain and body, and some scientists think that many neurological and psychiatric disorders may result from dysfunctional circuits.

As this understanding has grown, some scientists have asked whether we could locate these faulty circuits, reach deep into the brain and nudge the flow to a more functional state, treating the underlying neurobiological cause of ailments like tremors or depression.

The idea of changing the brain for the better with electricity is not new, but deep brain stimulation takes a more targeted approach than the electroconvulsive therapy introduced in the 1930s. DBS seeks to correct a specific dysfunction in the brain by introducing precisely timed electric pulses to specific regions. It works by the action of a very precise electrode that is surgically inserted deep in the brain and typically controlled by a device implanted under the collarbone. Once in place, doctors can externally tailor the pulses to a frequency that they hope will fix the faulty circuit.

Listen: The Remote Control Brain

This week's Invisibilia podcast features the story of a woman with obsessive-compulsive disorder and depression who signed up for a deep brain stimulation trial. The story describes what it's like to be able to adjust her mood by adjusting the settings on her device. Listen to that story here.

The FDA has only approved deep brain stimulation for a handful of conditions, including movement disorders — dystonia, essential tremor and symptoms of Parkinson's disease — and a type of treatment-resistant epilepsy. Now, many scientists in the U.S. and around the globe are experimenting with the technology for psychiatric conditions like depression or obsessive-compulsive disorder.

The results of clinical studies so far are very mixed: Some patients say they have been totally transformed while others feel no effect at all, or they get worse.

Yet research continues and the technology's potential to instantly and powerfully change mood raises ethical, social and cultural questions. NPR spoke to neuroethicist, James Giordano, chief of the Neuroethics Studies Program at Georgetown University Medical Center, about this new technology and its potential benefits and harms when used for psychiatric treatment. In addition to his work at Georgetown, Giordano has consulted with the U.S. military about these technologies and their possible use.

This interview includes answers from two separate conversations with Giordano, one conducted by Alix Spiegel and one by Jonathan Lambert. It has been edited for clarity and length.

What is deep brain stimulation and how does it work?

Scientists have been stimulating brains for a while now, but it has historically been quite crude. A neurosurgeon [would] touch a brain area with an electrode, and see what happened, what types of functions were affected. But we didn't have a detailed picture of what we wanted to target in the brain, and the electrodes themselves were not very precise.

Now we have a much more detailed map of the networks and nodes of neurons involved in different pathologies [like Parkinson's, obsessive-compulsive disorder, etc.] or different thought patterns or emotions. Deep brain stimulation provides a fairly specific and very precise way to utilize electrodes to deliver electrical current in and around a small set of brain cells to turn them on or modulate their activity.

Modify the circuit, and you can modify the behavior. The goal is to use DBS to modify the circuits in such a way as to improve symptoms in a very specific and precise way.

How do you know what kinds of specific inputs you want the electrode to a deliver, and where in the brain to deliver them?

There's an old adage in brain science: "When you've seen one brain, you've seen one brain." This is certainly true, but all brains have a lot of similarity on which individual variation is built because brain structures are changed and developed as a consequence of experience.

So when implanting a device, we know generally where we're going, but because the patient is awake while we're implanting the device, we can further tailor it to know where precisely to put it for the desired effect. More fine-tuning, in terms of the kind of stimulation to provide, can be done after surgery, because the device can be tuned externally.

Though it's not yet FDA approved for them, there is ongoing research on treating psychiatric disorders with DBS? What is the research finding so far?

Many studies are certainly finding evidence that DBS can be effective for treating disorders like Tourette's syndrome, obsessive-compulsive disorder, and even depression. Patients are reporting a reduction in the symptoms, but we certainly still have many questions that need answering. For example, when do we treat with DBS? Early in the development of a disorder? Later, after other options have been exhausted? These are questions that still need answering.

How would you explain the difference between how an antidepressants affects the brain and how deep brain stimulation works?

A drug like Prozac or antidepressant drugs is basically like throwing water on your face to get a drink of water. Using something like deep brain stimulation is like putting a drop of water on your tongue. We can increase the specificity and precision ... and, in many ways, the precision and specificity of deep brain stimulation makes it a more effective tool. It can be turned on and turned off. It can be adjusted in the very short term so it can be a more flexible tool that allows a much more precise control of mood.

James Giordano is chief of the Neuroethics Studies Program at Georgetown University Medical Center. Courtesy of Angela Huckeby 
 
And compared with antidepressants, are there differences in moral or ethical implications in the use of a treatment that allows us to act so specifically on mood?

Specificity is power. And the moral obligation that comes with great power is overwhelming. The responsibility to understand as best as conceivably possible what you're doing not only on a neurobiological level, but also on an existential and even social level. What are you doing? Are you creating new normal [in terms of mood]? And if you're creating new normal, do we have what I'll call "the ethical equipment" on board to be able to address this? In some cases I think the answer is yes, but I think in other cases what you're going to begin to see is that new ethical principles may need to be developed because of the potential and reality of the way these things are being used.

For example, expressive creativity. Is there an ethical principle of self-creativity ... that I can define myself and say I want to create myself in these ways?

Do you mean, theoretically, in the future, you could go to a doctor and say I want to be a great artist?

Now we're not quite to that point, but I could certainly go to a physician and say I want to be more outgoing, I want to be less inhibited. I'd like to be happier on a daily basis. I'd like to feel more enlightened in my daily experiences ... In an open society, are we saying that one should be able to define 'I want to be this' and this is a tool to get there? Perhaps, but then we also have to balance that. What about others? ... This gets back to a question of fairness. Can everybody get this? Who's going to get this?

What can go wrong with this technology? What should we be worried about?

Well, it is neurosurgery, and there are certainly risks that go along with that, infection, problems with the procedure. Targets could be missed or misidentified. Those are risks that come with the territory.

But there are some more cases more specific to DBS. What if you get effects that you didn't anticipate? By stimulating Area X, it's possible that we could get a spillover effect that modulates other things ancillary to that, like personality, temperament, character, personal preferences. There have been case reports and anecdotal reports of things like that happening, but they're rare.

So could implanting a DBS device have some unanticipated consequences for our tastes or personal characteristics like introversion and extroversion?

One of the better-known cases, for example, was a person whose musical taste had nothing to do with country music. And after a deep brain implant for a movement disorder, [the person] developed a real pathos for Johnny Cash music and was just totally into the aesthetic of Johnny Cash. Is it possible for these things to occur? Of course, it is. The brain works as a coordinated set of nodes and networks that are intercommunicative and reciprocal. So changing the local field electrical activity in one area isn't necessarily going to be completely discrete from the wiring, if you will, of the kind of activities and the functions of other brain areas. These things occurring up- and down-stream represent real effects.

Can treatment with a DBS device change more than just our mood, but also our personality?

Yes, although we have to ask ourselves whether those changes are due to the positive consequences of DBS. If someone with Tourette's was an introvert, and then they get a DBS implant and become more of an extrovert and more socially engaged, is this a side effect of the DBS? Or because they're no longer bearing the burden of being someone with a constant verbal tic?

DBS also raises questions of personal autonomy. Are we going to get cases of people saying "my deep brain stimulator made me do it"? Perhaps. But very often patients report that the condition they had which DBS is treating impaired their autonomy more than they feel the deep brain stimulation is.

What guidance would you give doctors working with DBS in a patient? Because they can affect the state of someone's mood by the levels of the electrical current in the device, how do they know what level to set?

To the point of clinically relevant therapeutic improvement. Just as one would set for example the levels that one could use through any other therapy, [like] cognitive behavioral therapy. Is the person functional? Are they saying, "yes I feel better, my mood is better." The same would be true of a drug, however this is more powerful because you're directly affecting those nodes and networks that appear to be some substrate of the thing that causes this person's mood. So you want to be cautious. The general tenor in the field is start low and go slow.

Beyond DBS, where this might this technology ultimately go?

There is a do-it-yourself market if you will, for not deep brain stimulation but transcranial electrical stimulation. What that's showing is that there is an increased interest in neurotechnologies that are not just oriented toward alleviating a medical condition but that change key aspects of cognition, emotions and behavior. This is sometimes referred to as the cosmetic use or designer use of neurotechnology. [If] I don't like key aspects of personality, [such as being shy], could I modify that for example through the use of these neuro technologies? Those things are coming and it's not in the near future — there's interest now.

What pitfalls do we face if this technology becomes more widely used?

Mistakes will get made. Hopefully, we'll be bright enough to correct them and recognize them when they occur not only in terms of the technological and scientific mistakes but ethical, moral, legal mistakes. In many ways, this represents something of a brave new world of capability. And I think that we have to be very, very sentinel to what the potential of this could yield. Yeah this could yield some really wonderful things but also, along with that, if it's used for cosmetic purposes like self-enhancement, could this lead to potentially violent outcomes? I can guarantee you that things that are at very, very problematic and, in some cases, devastating will occur. Do I believe that the net effect will be beneficial because we will respond appropriately to those mistakes that we make? Yeah that's my hope. Do I know that we will? I don't know.

Genetically modified maize

From Wikipedia, the free encyclopedia

Transgenic maize containing a gene from the bacteria Bacillus thuringiensis
 
Genetically modified maize (corn) is a genetically modified crop. Specific maize strains have been genetically engineered to express agriculturally-desirable traits, including resistance to pests and to herbicides. Maize strains with both traits are now in use in multiple countries. GM maize has also caused controversy with respect to possible health effects, impact on other insects and impact on other plants via gene flow. One strain, called Starlink, was approved only for animal feed in the US, but was found in food, leading to a series of recalls starting in 2000.

Marketed products

Herbicide resistant maize

Corn varieties resistant to glyphosate herbicides were first commercialized in 1996 by Monsanto, and are known as "Roundup Ready Corn". They tolerate the use of Roundup. Bayer CropScience developed "Liberty Link Corn" that is resistant to glufosinate. Pioneer Hi-Bred has developed and markets corn hybrids with tolerance to imidazoline herbicides under the trademark "Clearfield" – though in these hybrids, the herbicide-tolerance trait was bred using tissue culture selection and the chemical mutagen ethyl methanesulfonate, not genetic engineering. Consequently, the regulatory framework governing the approval of transgenic crops does not apply for Clearfield.

As of 2011, herbicide-resistant GM corn was grown in 14 countries. By 2012, 26 varieties herbicide-resistant GM maize were authorised for import into the European Union., but such imports remain controversial. Cultivation of herbicide-resistant corn in the EU provides substantial farm-level benefits.

Insect-resistant corn

The European corn borer, Ostrinia nubilalis, destroys corn crops by burrowing into the stem, causing the plant to fall over.
 
Bt corn is a variant of maize that has been genetically altered to express one or more proteins from the bacterium Bacillus thuringiensis including Delta endotoxins. The protein is poisonous to certain insect pests. Spores of the bacillus are widely used in organic gardening, although GM corn is not considered organic. The European corn borer causes about a billion dollars in damage to corn crops each year.

In recent years, traits have been added to ward off corn ear worms and root worms, the latter of which annually causes about a billion dollars in damages.

The Bt protein is expressed throughout the plant. When a vulnerable insect eats the Bt-containing plant, the protein is activated in its gut, which is alkaline. In the alkaline environment the protein partially unfolds and is cut by other proteins, forming a toxin that paralyzes the insect's digestive system and forms holes in the gut wall. The insect stops eating within a few hours and eventually starves.

In 1996, the first GM maize producing a Bt Cry protein was approved, which killed the European corn borer and related species; subsequent Bt genes were introduced that killed corn rootworm larvae.

Approved Bt genes include single and stacked (event names bracketed) configurations of: Cry1A.105 (MON89034), CryIAb (MON810), CryIF (1507), Cry2Ab (MON89034), Cry3Bb1 (MON863 and MON88017), Cry34Ab1 (59122), Cry35Ab1 (59122), mCry3A (MIR604), and Vip3A (MIR162), in both corn and cotton. Corn genetically modified to produce VIP was first approved in the US in 2010.

In 2018 a study found that Bt-corn protected nearby fields of non-Bt corn and nearby vegetable crops, reducing the use of pesticides on those crops. Data from 1976-1996 (before Bt corn was widespread) was compared to data after it was adopted (1996-2016). They examined levels of the European corn borer and corn earworm. Their larvae eat a variety of crops, including peppers and green beans. Between 1992 and 2016, the amount of insecticide applied to New Jersey pepper fields decreased by 85 percent. Another factor was the introduction of more effective pesticides that were applied less often.

Sweet Corn

GM sweet corn varieties include "Attribute", the brand name for insect-resistant sweet corn developed by Syngenta and Performance Series™ insect-resistant sweet corn developed by Monsanto.

Drought resistance maize

In 2013 Monsanto launched the first transgenic drought tolerance trait in a line of corn hybrids called DroughtGard. The MON 87460 trait is provided by the insertion of the cspB gene from the soil microbe Bacillus subtilis; it was approved by the USDA in 2011 and by China in 2013.

Maize with increased nutritional value

Research has been done on adding a single E. coli gene to maize to enable it to be grown with an essential amino acid (methionine).

Health Safety

In regular corn crops, insects promote fungal colonization by creating "wounds," or holes, in corn kernels. These wounds are favored by fungal spores for germination, which subsequently leads to mycotoxin accumulation in the crop. This can prove to be especially devastating in developing countries with drastic climate patterns such as high temperatures, which favor the development of toxicogenic fungi. In addition, higher mycotoxin levels may lead to market rejection of the grain. GM corn crops encounter less insect attacks, and thus, have lower concentrations of mycotoxins. Less insect attacks also keep corn ears from being damaged, which increases overall yields.

Products in development

In 2007, South African researchers announced the production of transgenic maize resistant to maize streak virus (MSV), although it has not been released as a product.

While breeding cultivars for resistance to MSV isn't done in the public, the private sector, international research centers, and national programmes have done all of the breeding.

As of 2014, there have been a few MSV-tolerant cultivars released in Africa. A private company Seedco has released 5 MSV cultivars.

Refuges

US Environmental Protection Agency (EPA) regulations require farmers who plant Bt corn to plant non-Bt corn nearby (called a refuge) to provide a location to harbor vulnerable pests. Typically, 20% of corn in a grower's fields must be refuge; refuge must be at least 0.5 miles from Bt corn for lepidopteran pests, and refuge for corn rootworm must at least be adjacent to a Bt field.

The theory behind these refuges is to slow the evolution of resistance to the pesticide. EPA regulations also require seed companies to train farmers how to maintain refuges, to collect data on the refuges and to report that data to the EPA. A study of these reports found that from 2003 to 2005 farmer compliance with keeping refuges was above 90%, but that by 2008 approximately 25% of Bt corn farmers did not keep refuges properly, raising concerns that resistance would develop.

Unmodified crops received most of the economic benefits of Bt corn in the US in 1996-2007, because of the overall reduction of pest populations. This reduction came because females laid eggs on modified and unmodified strains alike.

Seed bags containing both Bt and refuge seed have been approved by the EPA in the United States. These seed mixtures were marketed as "Refuge in a Bag" (RIB) to increase farmer compliance with refuge requirements and reduce additional work needed at planting from having separate Bt and refuge seed bags on hand. The EPA approved a lower percentage of refuge seed in these seed mixtures ranging from 5 to 10%. This strategy is likely to reduce the likelihood of Bt-resistance occurring for corn rootworm, but may increase the risk of resistance for lepidopteran pests, such as European corn borer. Increased concerns for resistance with seed mixtures include partially resistant larvae on a Bt plant being able to move to a susceptible plant to survive or cross pollination of refuge pollen on to Bt plants that can lower the amount of Bt expressed in kernels for ear feeding insects.

Resistance

Resistant strains of the European corn borer have developed in areas with defective or absent refuge management.

In November 2009, Monsanto scientists found the pink bollworm had become resistant to first-generation Bt cotton in parts of Gujarat, India – that generation expresses one Bt gene, Cry1Ac. This was the first instance of Bt resistance confirmed by Monsanto anywhere in the world. Bollworm resistance to first generation Bt cotton has been identified in Australia, China, Spain, and the United States. In 2012, a Florida field trial demonstrated that army worms were resistant to pesticide-containing GM corn produced by Dupont-Dow; armyworm resistance was first discovered in Puerto Rico in 2006, prompting Dow and DuPont to voluntarily stop selling the product on the island.

Regulation

Regulation of GM crops varies between countries, with some of the most-marked differences occurring between the USA and Europe. Regulation varies in a given country depending on intended uses.

Controversy

There is a scientific consensus that currently available food derived from GM crops poses no greater risk to human health than conventional food, but that each GM food needs to be tested on a case-by-case basis before introduction. Nonetheless, members of the public are much less likely than scientists to perceive GM foods as safe. The legal and regulatory status of GM foods varies by country, with some nations banning or restricting them, and others permitting them with widely differing degrees of regulation.

The scientific rigor of the studies regarding human health has been disputed due to alleged lack of independence and due to conflicts of interest involving governing bodies and some of those who perform and evaluate the studies.

GM crops provide a number of ecological benefits, but there are also concerns for their overuse, stalled research outside of the Bt seed industry, proper management and issues with Bt resistance arising from their misuse.

Critics have objected to GM crops on ecological, economic and health grounds. The economic issues derive from those organisms that are subject to intellectual property law, mostly patents. The first generation of GM crops lose patent protection beginning in 2015. Monsanto has claimed it will not pursue farmers who retain seeds of off-patent varieties. These controversies have led to litigation, international trade disputes, protests and to restrictive legislation in most countries.

Effects on nontarget insects

Critics claim that Bt proteins could target predatory and other beneficial or harmless insects as well as the targeted pest. These proteins have been used as organic sprays for insect control in France since 1938 and the USA since 1958 with no ill effects on the environment reported. While cyt proteins are toxic towards the insect order Diptera (flies), certain cry proteins selectively target lepidopterans (moths and butterflies), while other cyt selectively target Coleoptera. As a toxic mechanism, cry proteins bind to specific receptors on the membranes of mid-gut (epithelial) cells, resulting in rupture of those cells. Any organism that lacks the appropriate gut receptors cannot be affected by the cry protein, and therefore Bt. Regulatory agencies assess the potential for the transgenic plant to impact nontarget organisms before approving commercial release.

A 1999 study found that in a lab environment, pollen from Bt maize dusted onto milkweed could harm the monarch butterfly. Several groups later studied the phenomenon in both the field and the laboratory, resulting in a risk assessment that concluded that any risk posed by the corn to butterfly populations under real-world conditions was negligible. A 2002 review of the scientific literature concluded that "the commercial large-scale cultivation of current Bt–maize hybrids did not pose a significant risk to the monarch population". A 2007 review found that "nontarget invertebrates are generally more abundant in Bt cotton and Bt maize fields than in nontransgenic fields managed with insecticides. However, in comparison with insecticide-free control fields, certain nontarget taxa are less abundant in Bt fields."

Gene flow

Gene flow is the transfer of genes and/or alleles from one species to another. Concerns focus on the interaction between GM and other maize varieties in Mexico, and of gene flow into refuges.

In 2009 the government of Mexico created a regulatory pathway for genetically modified maize, but because Mexico is the center of diversity for maize, gene flow could affect a large fraction of the world's maize strains. A 2001 report in Nature presented evidence that Bt maize was cross-breeding with unmodified maize in Mexico. The data in this paper was later described as originating from an artifact. Nature later stated, "the evidence available is not sufficient to justify the publication of the original paper". A 2005 large-scale study failed to find any evidence of contamination in Oaxaca. However, other authors also found evidence of cross-breeding between natural maize and transgenic maize.

A 2004 study found Bt protein in kernels of refuge corn.

In 2017, a large-scale study found "pervasive presence of transgenes and glyphosate in maize-derived food in Mexico"

Food

The French High Council of Biotechnologies Scientific Committee reviewed the 2009 Vendômois et al. study and concluded that it "..presents no admissible scientific element likely to ascribe any haematological, hepatic or renal toxicity to the three re-analysed GMOs." However, the French government applies the precautionary principle with respect to GMOs.

A review by Food Standards Australia New Zealand and others of the same study concluded that the results were due to chance alone.
 
A 2011 Canadian study looked at the presence of CryAb1 protein (BT toxin) in non-pregnant women, pregnant women and fetal blood. All groups had detectable levels of the protein, including 93% of pregnant women and 80% of fetuses at concentrations of 0.19 ± 0.30 and 0.04 ± 0.04 mean ± SD ng/ml, respectively. The paper did not discuss safety implications or find any health problems. The paper was found to be unconvincing by multiple authors and organizations. In a swine model, Cry1Ab-specific antibodies were not detected in pregnant sows or their offspring and no negative effects from feeding Bt maize to pregnant sows were observed.

In January 2013, the European Food Safety Authority released all data submitted by Monsanto in relation to the 2003 authorisation of maize genetically modified for glyphosate tolerance.

Starlink corn recalls

StarLink contains Cry9C, which had not previously been used in a GM crop. Starlink's creator, Plant Genetic Systems had applied to the US Environmental Protection Agency (EPA) to market Starlink for use in animal feed and in human food. However, because the Cry9C protein lasts longer in the digestive system than other Bt proteins, the EPA had concerns about its allergenicity, and PGS did not provide sufficient data to prove that Cry9C was not allergenic. As a result, PGS split its application into separate permits for use in food and use in animal feed. Starlink was approved by the EPA for use in animal feed only in May 1998.

StarLink corn was subsequently found in food destined for consumption by humans in the US, Japan, and South Korea. This corn became the subject of the widely publicized Starlink corn recall, which started when Taco Bell-branded taco shells sold in supermarkets were found to contain the corn. Sales of StarLink seed were discontinued. The registration for Starlink varieties was voluntarily withdrawn by Aventis in October 2000. Pioneer had been bought by AgrEvo which then became Aventis CropScience at the time of the incident, which was later bought by Bayer.

Fifty-one people reported adverse effects to the FDA; US Centers for Disease Control (CDC), which determined that 28 of them were possibly related to Starlink. However, the CDC studied the blood of these 28 individuals and concluded there was no evidence of hypersensitivity to the Starlink Bt protein.

A subsequent review of these tests by the Federal Insecticide, Fungicide, and Rodenticide Act Scientific Advisory Panel points out that while "the negative results decrease the probability that the Cry9C protein is the cause of allergic symptoms in the individuals examined ... in the absence of a positive control and questions regarding the sensitivity and specificity of the assay, it is not possible to assign a negative predictive value to this."

The US corn supply has been monitored for the presence of the Starlink Bt proteins since 2001.

In 2005, aid sent by the UN and the US to Central American nations also contained some StarLink corn. The nations involved, Nicaragua, Honduras, El Salvador and Guatemala refused to accept the aid.

Corporate espionage

On December 19, 2013 six Chinese citizens were indicted in Iowa on charges of plotting to steal genetically modified seeds worth tens of millions of dollars from Monsanto and DuPont. Mo Hailong, director of international business at the Beijing Dabeinong Technology Group Co., part of the Beijing-based DBN Group, was accused of stealing trade secrets after he was found digging in an Iowa cornfield.

Industrial espionage

From Wikipedia, the free encyclopedia

Teapot with Actresses, Vezzi porcelain factory, Venice, c. 1725. The Vezzi brothers were involved in a series of incidents of industrial espionage. It was these actions that led to the secret of manufacturing Meissen porcelain becoming widely known.

Industrial espionage, economic espionage, corporate spying or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security. While economic espionage is conducted or orchestrated by governments and is international in scope, industrial or corporate espionage is more often national and occurs between companies or corporations.

Competitive intelligence and economic or industrial espionage

"Competitive intelligence" involves the legal and ethical activity of systematically gathering, analyzing and managing information on industrial competitors. It may include activities such as examining newspaper articles, corporate publications, websites, patent filings, specialised databases, information at trade shows and the like to determine information on a corporation. The compilation of these crucial elements is sometimes termed CIS or CRS, a Competitive Intelligence Solution or Competitive Response Solution, with its roots in market research. Douglas Bernhardt has characterised "competitive intelligence" as involving "the application of principles and practices from military and national intelligence to the domain of global business"; it is the commercial equivalent of open-source intelligence

The difference between competitive intelligence and economic or industrial espionage is not clear; one needs to understand the legal basics to recognize how to draw the line between the two.

Forms of economic and industrial espionage

Economic or industrial espionage takes place in two main forms. In short, the purpose of espionage is to gather knowledge about (an) organization(s). It may include the acquisition of intellectual property, such as information on industrial manufacture, ideas, techniques and processes, recipes and formulas. Or it could include sequestration of proprietary or operational information, such as that on customer datasets, pricing, sales, marketing, research and development, policies, prospective bids, planning or marketing strategies or the changing compositions and locations of production. It may describe activities such as theft of trade secrets, bribery, blackmail and technological surveillance. As well as orchestrating espionage on commercial organizations, governments can also be targets — for example, to determine the terms of a tender for a government contract.

Target industries

During testing, automakers commonly disguise upcoming car models with camouflage paint patterns designed to obfuscate the vehicle's lines. Padded covers, or deceptive decals are also often used. This is also to prevent Motoring Media-outlets from spoiling the model's big reveal.
 
Economic and industrial espionage is most commonly associated with technology-heavy industries, including computer software and hardware, biotechnology, aerospace, telecommunications, transportation and engine technology, automobiles, machine tools, energy, materials and coatings and so on. Silicon Valley is known to be one of the world's most targeted areas for espionage, though any industry with information of use to competitors may be a target.

Information theft and sabotage

Information can make the difference between success and failure; if a trade secret is stolen, the competitive playing field is leveled or even tipped in favor of a competitor. Although a lot of information-gathering is accomplished legally through competitive intelligence, at times corporations feel the best way to get information is to take it. Economic or industrial espionage is a threat to any business whose livelihood depends on information.

In recent years, economic or industrial espionage has taken on an expanded definition. For instance, attempts to sabotage a corporation may be considered industrial espionage; in this sense, the term takes on the wider connotations of its parent word. That espionage and sabotage (corporate or otherwise) have become more clearly associated with each other is also demonstrated by a number of profiling studies, some government, some corporate. The United States government currently has a polygraph examination entitled the "Test of Espionage and Sabotage" (TES), contributing to the notion of the interrelationship between espionage and sabotage countermeasures. In practice, particularly by "trusted insiders", they are generally considered functionally identical for the purpose of informing countermeasures.

Agents and the process of collection

Economic or industrial espionage commonly occurs in one of two ways. Firstly, a dissatisfied employee appropriates information to advance interests or to damage the company. Secondly, a competitor or foreign government seeks information to advance its own technological or financial interest. "Moles", or trusted insiders, are generally considered the best sources for economic or industrial espionage. Historically known as a "patsy", an insider can be induced, willingly or under duress, to provide information. A patsy may be initially asked to hand over inconsequential information and, once compromised by committing a crime, bribed into handing over more sensitive material. Individuals may leave one company to take up employment with another and take sensitive information with them. Such apparent behavior has been the focus of numerous industrial espionage cases that have resulted in legal battles. Some countries hire individuals to do spying rather than use of their own intelligence agencies. Academics, business delegates, and students are often thought to be used by governments in gathering information. Some countries, such as Japan, have been reported to expect students be debriefed on returning home. A spy may follow a guided tour of a factory and then get "lost". A spy could be an engineer, a maintenance man, a cleaner, an insurance salesman, or an inspector: anyone who has legitimate access to the premises.

A spy may break into the premises to steal data and may search through waste paper and refuse, known as "dumpster diving". Information may be compromised via unsolicited requests for information, marketing surveys or use of technical support or research or software facilities. Outsourced industrial producers may ask for information outside the agreed-upon contract.

Computers have facilitated the process of collecting information because of the ease of access to large amounts of information through physical contact or the Internet.

Use of computers and the Internet

Personal computers

Computers have become key in exercising industrial espionage due to the enormous amount of information they contain and its ease of being copied and transmitted. The use of computers for espionage increased rapidly in the 1990s. Information has been commonly stolen by being copied from unattended computers in offices, those gaining unsupervised access doing so through subsidiary jobs, such as cleaners or repairmen. Laptops were, and still are, a prime target, with those traveling abroad on business being warned not to leave them for any period of time. Perpetrators of espionage have been known to find many ways of conning unsuspecting individuals into parting, often only temporarily, from their possessions, enabling others to access and steal information. A "bag-op" refers to the use of hotel staff to access data, such as through laptops, in hotel rooms. Information may be stolen in transit, in taxis, at airport baggage counters, baggage carousels, on trains and so on.

The Internet

The rise of the internet and computer networks has expanded the range and detail of information available and the ease of access for the purpose of industrial espionage. Worldwide, around 50,000 companies a day are thought to come under cyberattack with the rate estimated as doubling each year. This type of operation is generally identified as state backed or sponsored, because the "access to personal, financial or analytic resources" identified exceed that which could be accessed by cybercriminals or individual hackers. Sensitive military or defense engineering or other industrial information may not have immediate monetary value to criminals, compared with, say, bank details. Analysis of cyberattacks suggests deep knowledge of networks, with targeted attacks, obtained by numerous individuals operating in a sustained organized way.

Opportunities for sabotage

The rising use of the internet has also extended opportunities for industrial espionage with the aim of sabotage. In the early 2000s, it was noticed that energy companies were increasingly coming under attack from hackers. Energy power systems, doing jobs like monitoring power grids or water flow, once isolated from the other computer networks, were now being connected to the internet, leaving them more vulnerable, having historically few built-in security features. The use of these methods of industrial espionage have increasingly become a concern for governments, due to potential attacks by terrorist groups or hostile foreign governments.

Malware

One of the means of perpetrators conducting industrial espionage is by exploiting vulnerabilities in computer software. Malware and spyware as "a tool for industrial espionage", in "transmitting digital copies of trade secrets, customer plans, future plans and contacts". Newer forms of malware include devices which surreptitiously switch on mobile phones camera and recording devices. In attempts to tackle such attacks on their intellectual property, companies are increasingly keeping important information off network, leaving an "air gap", with some companies building "Faraday cages" to shield from electromagnetic or cellphone transmissions.

Distributed denial of service (DDoS) attack

The distributed denial of service (DDoS) attack uses compromised computer systems to orchestrate a flood of requests on the target system, causing it to shut down and deny service to other users. It could potentially be used for economic or industrial espionage with the purpose of sabotage. This method was allegedly utilized by Russian secret services, over a period of two weeks on a cyberattack on Estonia in May 2007, in response to the removal of a Soviet era war memorial.

History

Origins

The work of Father Francois Xavier d'Entrecolles to reveal to Europe the manufacturing methods of Chinese porcelain in 1712, is sometimes considered an early case of industrial espionage
 
Economic and industrial espionage has a long history. Father Francois Xavier d'Entrecolles in Jingdezhen, China revealing the manufacturing methods of Chinese porcelain in 1712 to Europe is sometimes considered an early case of industrial espionage.

Historical accounts have been written of industrial espionage between Britain and France. Attributed to Britain's emergence as an "industrial creditor", the second decade of the 18th century saw the emergence of a large-scale state-sponsored effort to surreptitiously take British industrial technology to France. Witnesses confirmed both the inveigling of tradespersons abroad and the placing of apprentices in England. Protests by those such as iron workers in Sheffield and steel workers in Newcastle, about skilled industrial workers being enticed abroad, led to the first English legislation aimed at preventing this method of economic and industrial espionage.

The 20th century

East-West commercial development opportunities after World War I saw a rise in Soviet interest in American and European manufacturing know-how, exploited by Amtorg Corporation. Later, with Western restrictions on the export of items thought likely to increase military capabilities to the USSR, Soviet industrial espionage was a well known adjunct to other spying activities up until the 1980s. BYTE reported in April 1984, for example, that although the Soviets sought to develop their own microelectronics, their technology appeared to be several years behind the West's. Soviet CPUs required multiple chips and appeared to be close or exact copies of American products such as the Intel 3000 and DEC LSI-11/2.

"Operation Brunnhilde"

Some of these activities were directed via the East German Stasi (Ministry for State Security). One such operation, "Operation Brunnhilde," operated from the mid-1950s until early 1966 and made use of spies from many Communist Bloc countries. Through at least 20 forays, many western European industrial secrets were compromised. One member of the "Brunnhilde" ring was a Swiss chemical engineer, Dr. Jean Paul Soupert (also known as "Air Bubble"), living in Brussels. He was described by Peter Wright in Spycatcher as having been "doubled" by the Belgian Sûreté de l'État. He revealed information about industrial espionage conducted by the ring, including the fact that Russian agents had obtained details of Concorde's advanced electronics system. He testified against two Kodak employees, living and working in Britain, during a trial in which they were accused of passing information on industrial processes to him, though they were eventually acquitted.

Soviet spetsinformatsiya system

A secret report from the Military-Industrial Commission of the USSR (VPK), from 1979–80, detailed how spetsinformatsiya (Russian: специнформация i.e. "special records") could be utilised in twelve different military industrial areas. Writing in the Bulletin of the Atomic Scientists, Philip Hanson detailed a spetsinformatsiya system in which 12 industrial branch ministries formulated requests for information to aid technological development in their military programs. Acquisition plans were described as operating on 2 year and 5 year cycles with about 3000 tasks under way each year. Efforts were aimed at civilian as well as military industrial targets, such as in the petrochemical industries. Some information was garnered so as to compare levels of competitor to Soviet technological advancement. Much unclassified information was also gathered, blurring the boundary with "competitive intelligence".

The Soviet military was recognised as making much better use of acquired information, compared to civilian industry, where their record in replicating and developing industrial technology was poor.

The legacy of Cold War espionage

Following the demise of the Soviet Union and the end of the Cold War, commentators, including the US Congressional Intelligence Committee, noted a redirection amongst the espionage community from military to industrial targets, with Western and former communist countries making use of "underemployed" spies and expanding programs directed at stealing such information.

The legacy of Cold War spying included not just the redirection of personnel but the use of spying apparatus such as computer databases, scanners for eavesdropping, spy satellites, bugs and wires.

Notable cases

France and the United States

Between 1987 and 1989, IBM and Texas Instruments were thought to have been targeted by French spies with the intention of helping France's Groupe Bull. In 1993, U.S. aerospace companies were also thought to have been targeted by French interests. During the early 1990s, France was described as one of the most aggressive pursuers of espionage to garner foreign industrial and technological secrets. France accused the U.S. of attempting to sabotage its high tech industrial base. The government of France has been alleged to have conducted ongoing industrial espionage against American aerodynamics and satellite companies.

Volkswagen

In 1993, car manufacturer Opel, the German division of General Motors, accused Volkswagen of industrial espionage after Opel's chief of production, Jose Ignacio Lopez, and seven other executives moved to Volkswagen. Volkswagen subsequently threatened to sue for defamation, resulting in a four-year legal battle. The case, which was finally settled in 1997, resulted in one of the largest settlements in the history of industrial espionage, with Volkswagen agreeing to pay General Motors $100 million and to buy at least $1 billion of car parts from the company over 7 years, although it did not explicitly apologize for Lopez's behavior.

Hilton and Starwood

In April 2009 the US based hospitality company Starwood accused its rival Hilton of a "massive" case of industrial espionage. After being purchased by private equity group Blackstone, Hilton employed 10 managers and executives from Starwood. Under intense pressure to improve profits, Starwood accused Hilton of stealing corporate information relating to its luxury brand concepts, used in setting up its own Denizen hotels. Specifically, former head of its luxury brands group, Ron Klein, was accused of downloading "truckloads of documents" from a laptop to his personal email account.

GhostNet

GhostNet was a "vast surveillance system" reported by Canadian researchers based at the University of Toronto in March 2009. Using targeted emails it compromised thousands of computers in governmental organisations, enabling attackers to scan for information and transfer this back to a "digital storage facility in China."

Google and Operation Aurora

On 13 January 2010, Google announced that operators, from within China, had hacked into their Google China operation, stealing intellectual property and, in particular, accessing the email accounts of human rights activists. The attack was thought to have been part of a more widespread cyber attack on companies within China which has become known as Operation Aurora. Intruders were thought to have launched a zero-day attack, exploiting a weakness in the Microsoft Internet Explorer browser, the malware used being a modification of the trojan "Hydraq". Concerned about the possibility of hackers taking advantage of this previously unknown weakness in Internet Explorer, the governments of Germany and, subsequently France, issued warnings not to use the browser.

There was speculation that "insiders" had been involved in the attack, with some Google China employees being denied access to the company's internal networks after the company's announcement. In February 2010, computer experts from the U.S. National Security Agency claimed that the attacks on Google probably originated from two Chinese universities associated with expertise in computer science, Shanghai Jiao Tong University and the Shandong Lanxiang Vocational School, the latter having close links to the Chinese military.

Google claimed at least 20 other companies had also been targeted in the cyber attack, said by the London Times, to have been part of an "ambitious and sophisticated attempt to steal secrets from unwitting corporate victims" including "defence contractors, finance and technology companies". Rather than being the work of individuals or organised criminals, the level of sophistication of the attack was thought to have been "more typical of a nation state". Some commentators speculated as to whether the attack was part of what is thought to be a concerted Chinese industrial espionage operation aimed at getting "high-tech information to jump-start China's economy". Critics pointed to what was alleged to be a lax attitude to the intellectual property of foreign businesses in China, letting them operate but then seeking to copy or reverse engineer their technology for the benefit of Chinese "national champions". In Google's case, they may have (also) been concerned about the possible misappropriation of source code or other technology for the benefit of Chinese rival Baidu. In March 2010 Google subsequently decided to cease offering censored results in China, leading to the closing of its Chinese operation.

CyberSitter and Green Dam

The US based firm CyberSitter announced in January 2010 that it was suing the Chinese government, and other US companies, for stealing its anti pornography software, with the accusation that it had been incorporated into China's Green Dam program, which was used by the state to censor children's internet access. CyberSitter accused Green Dam creators of copying around 3000 lines of code. They were described as having done 'a sloppy job of copying,' with some lines of the copied code continuing to direct people to the CyberSitter website. The attorney acting for CyberSitter maintained "I don't think I have ever seen such clear-cut stealing".

USA v. Lan Lee, et al.

The United States charged two former NetLogic Inc. engineers, Lan Lee and Yuefei Ge, of committing economic espionage against TSMC and NetLogic, Inc. A jury acquitted the defendants of the charges with regard to TSMC and deadlocked on the charges with regard to NetLogic. In May 2010, a federal judge dismissed all the espionage charges against the two defendants. The judge ruled that the U.S. government presented no evidence of espionage.

Dongxiao Yue and Chordiant Software, Inc.

In May 2010, the federal jury convicted Chordiant Software, Inc., a U.S. corporation, of stealing Dongxiao Yue's JRPC technologies and used them in a product called Chordiant Marketing Director. Yue previously filed lawsuits against Symantec Corporation for a similar theft.

Concerns of national governments

Brazil

Revelations from the Snowden documents have provided information to the effect that the United States, notably vis-à-vis the NSA, has been conducting aggressive economic espionage against Brazil. Canadian intelligence has apparently supported U.S. economic espionage efforts.

United States

A recent report to the US government, by aerospace and defense company Northrop Grumman, describes Chinese economic espionage as comprising "the single greatest threat to U.S. technology". Blogging on the 2009 cyber attack on Google, Joe Stewart of Secureworks referred to a "persistent campaign of 'espionage-by-malware' emanating from the People’s Republic of China (PRC)" with both corporate and state secrets being "Shanghaied" over the past 5 or 6 years. The Northrop Grumann report states that the collection of US defense engineering data through cyberattack is regarded as having "saved the recipient of the information years of R&D and significant amounts of funding". Concerns about the extent of cyberattacks on the US emanating from China has led to the situation being described as the dawn of a "new cold cyberwar". In response to these and other reports, Amitai Etzioni of the Institute for Communitarian Policy Studies has suggested that China and the United States should agree to a policy of mutually assured restraint with respect to cyberspace. This would involve allowing both states to take the measures they deem necessary for their self-defense while simultaneously agreeing to refrain from taking offensive steps; it would also entail vetting these commitments.

According to Edward Snowden, the National Security Agency spies on foreign companies. In June 2015 Wikileaks published documents over National Security Agency spied French companies.

United Kingdom

In December 2007, it was revealed that Jonathan Evans, head of the United Kingdom's MI5, had sent out confidential letters to 300 chief executives and security chiefs at the country's banks, accountants and legal firms warning of attacks from Chinese 'state organisations'. A summary was also posted on the secure website of the Centre for the Protection of the National Infrastructure, accessed by some of the nation's 'critical infrastructure' companies, including 'telecoms firms, banks and water and electricity companies'. One security expert warned about the use of 'custom trojans,' software specifically designed to hack into a particular firm and feed back data. Whilst China was identified as the country most active in the use of internet spying, up to 120 other countries were said to be using similar techniques. The Chinese government responded to UK accusations of economic espionage by saying that the report of such activities was 'slanderous' and that the government opposed hacking which is prohibited by law.

Germany

German counter-intelligence experts have maintained the German economy is losing around €53 billion or the equivalent of 30,000 jobs to economic espionage yearly.

In Operation Eikonal German BND agents received "selector lists" from the NSA – search terms for their dragnet surveillance. They contain IP addresses, mobile phone numbers and email accounts with the BND surveillance system containing hundreds of thousands and possibly more than a million such targets. These lists have been subject of controversy as in 2008 it was revealed that they contained some terms targeting the European Aeronautic Defence and Space Company (EADS), the Eurocopter project as well as French administration, which were first noticed by BND employees in 2005. After the revelations made by whistleblower Edward Snowden the BND decided to investigate the issue whose October 2013 conclusion was that at least 2,000 of these selectors were aimed at Western European or even German interests which has been a violation of the Memorandum of Agreement that the US and Germany signed in 2002 in the wake of the 9/11 terror attacks. After reports emerged in 2014 that EADS and Eurocopter had been surveillance targets the Left Party and the Greens filed an official request to obtain evidence of the violations.

The BND's project group charged with supporting the NSA investigative committee in German parliament set up in spring 2014, reviewed the selectors and discovered 40,000 suspicious search parameters, including espionage targets in Western European governments and numerous companies. The group also confirmed suspicions that the NSA had systematically violated German interests and concluded that the Americans could have perpetrated economic espionage directly under the Germans' noses. The investigative parliamentary committee was not granted access to the NSA's selectors list as an appeal led by opposition politicians failed at Germany's top court. Instead the ruling coalition appointed an administrative judge, Kurt Graulich [de], as a "person of trust" who was granted access to the list and briefed the investigative commission on its contents after analyzing the 40,000 parameters. In his almost 300-paged report Graulich concluded that European government agencies were targeted massively and that Americans hence broke contractual agreements. He also found that German targets which received special protection from surveillance of domestic intelligence agencies by Germany's Basic Law (Grundgesetz) − including numerous enterprises based in Germany – were featured in the NSA's wishlist in a surprising plenitude.

eHealth

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/EHealth e...