1. Analyze the Economic Espionage Act of 1996 and explain in detail how you would go about improving the legislation.
2. Identify five types of business information that are potential targets of economic or industrial espionage and explain why they are valuable to an adversary.
3. In the context of espionage, what are the key differences between the following terms: (1) Threats (2) Vulnerabilities (3) Risks.