Privacy Military International Trade

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

Chinese national hacker pleads guilty to sending U.S. military data to China

The FBI and DOJ continue their effort to bring cyber hackers to justice. Last week, Chinese national Su Bin pled guilty to stealing data related to Boeing’s C-17 military cargo plane and of trying to steal information...more

FBI’s cyber most wanted: Spotlight on Firas Dardar and Ahmed Agha

New additions to the FBI’s Cyber’s Most Wanted List show “the line between ordinary criminal hackers and potential national security threats is increasingly blurry,” according to Assistant Attorney General for National...more

State Department Discusses Whether to Add 'Cyber Products' to the USML

Recent trends and discussions relating to export controls and national security concerns may now capture the attention of software manufacturers, technology firms, and online retailers of software, as well as their global...more

Lawyer Sues DDTC Over "Public Domain"

A New York City attorney is suing the U.S. State Department over a proposed change to the International Traffic in Arms Regulations (ITAR). The change pertains to how the regulations define “public domain,” and, if...more

Analysis of Close Proximity Issues in Transactions Reviewed by CFIUS

A US business’ close proximity to facilities or areas considered sensitive by the US Government can raise concerns when the Committee on Foreign Investment in the United States (CFIUS) is evaluating the potential national...more

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

DOD Adopts Interim Cyber Rules As Claims of Chinese Cyber Attacks Continue

U.S. officials have blamed Chinese government-backed attackers for many of the recent cyber attacks on U.S. government and business computer networks: “Researchers and government officials have determined that the Chinese...more

New Cyber Strategy Issued By Pentagon

In a speech at Stanford University on April 23, 2015, Department of Defense (“DoD” or the “Pentagon”) Secretary Ash Carter unveiled the Pentagon’s new cyber strategy (the “Strategy”) and called on the technology sector to...more

Secretary Of Homeland Security Seeks Cooperation Between Public And Private Sectors In Fight Against Cybercriminals

On April 21, 2015, Department of Homeland Security (“DHS”) Secretary Jeh Johnson spoke at the annual RSA Conference 2015. In his remarks, Johnson explained that, while the DHS was established primarily to focus on...more

Read the Directions Carefully Before Playing: State Department Releases Military Drone Export Guidance

The United States has a responsibility, or so the State Department tells us, to ensure the sales and exports of Unmanned Aerial Systems (UAS) are consistent with U.S. national security interests, U.S. policy, and even U.S....more

Final US ITAR Rule on Dual and Third Country Nationals Raises New Challenges

Today, the U.S. State Department’s Directorate of Defense Trade Controls (DDTC) published in the Federal Register the final rule containing its long-awaited amendments to the International Traffic in Arms Regulations...more

Wikileaks - Deception and Disinformation?

WIKILEAKS - DECEPTION AND DISINFORMATION? Perhaps more attention than is deserved is being given by government and the media to the release, by Wikileaks, of alleged "secret" diplomatic communications. In this "letter...more

US Withdrawal from Iraq Raises Questions about Future of Biometric Database

President Obama's address on the end of the combat mission in Iraq has left open the question of what will happen to the massive biometric databases on Iraqis, assembled by the United States, during the course of the...more

14 Results
View per page
Page: of 1

Follow Privacy Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.