Cyber Espionage

News & Analysis as of

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

Business Litigation Alert: "Business Lessons from the Database Hack of the Houston Astros"

Christopher Correa, a former scout for the St. Louis Cardinals, was recently sentenced to almost four years in prison for hacking the Houston Astros player-personnel database. While it seems far-fetched that hacking would...more

Ex-Cardinals scouting director sentenced to serve time in jail for Astros database hacking

Back in January, we wrote about the ex-Cardinals Scouting Director pleading guilty to hacking the Houston Astros database. Now, this week, Christopher Correa, former scouting director and director of baseball development, was...more

Major League Baseball investigating Cardinals-Astros hacking

Promptly following the sentencing of Christopher Correa on July 18, 2016, Major League Baseball Commissioner Rob Manfred announced that Major League Baseball (MLB) is looking further into the hacking incident involving...more

When Stealing in Baseball Can Land You in Jail: Computer Fraud Sentencing Announced in MLB Case

Although stealing bases, and even signs, in baseball may be part of the game, stealing another team’s trade secrets can land you in federal prison, as one executive recently learned the hard way. As we previously...more

US CHINA TRADE WAR–Trump, Trade Policy, NME, TPP, Trade, Customs, False Claims, Products Liability, Antitrust and Securities

Dear Friends, After returning from a two week trip to China to work on the Solar Cells case, this March blog post will cover trade policy, including Trump’s impact on Trade Policy, trade, Customs, False Claims Act, the...more

Former Cardinals Scouting Director Pleads Guilty to Hacking Astros’ Computer Systems

Economic espionage and computer hacking can touch all industries and business types. Computer hacking is a federal crime, and federal prosecutors are aggressively targeting cases involving the unauthorized access of a...more

Senate Committee Considers Legislation To Address Theft Of Trade Secrets

On December 2, 2015, the Senate Judiciary Committee held a hearing entitled “Protecting Trade Secrets: the Impact of Trade Secret Theft on American Competitiveness and Potential Solutions to Remedy This Harm.” The hearing...more

G20 Nations Reach Economic Cyber-Espionage Pledge

On November 16, 2015, the leaders of the “Group of 20” (“G20”) – the world’s richest and most powerful nations – reached an agreement not to conduct economic cyber-espionage. The agreement, reached during the G20’s...more

Final TPP Language on Trade Secret Protection Disclosed

On October 5, 2015, years of protracted negotiations of the Trans-Pacific Partnership Agreement (“TPP”) concluded. The TPP is a proposed trade agreement between 12 Pacific Rim nations that lowers trade barriers such as...more

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

US China Trade War

The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more

Trade & Manufacturing - October 2015

Ending the Crude Oil Export Ban - On September 17, the House Energy and Commerce Committee passed a bill to end the 40-year-old ban on the export of domestic crude oil. The Committee vote was passed by a Republican...more

Trade & Manufacturing - News of Note - October 2015

President Xi's State Visit Brings Announcements on Cybersecurity and Climate Change - In late September, Chinese President Xi Jinping made his first state visit to the United States. Cybersecurity and climate change...more

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

US-China Cyber Deal Big on Promises, Short on Action

In the aftermath of recent cyberattacks attributed to China’s government and citizens, many observers prepared for a rather uncomfortable state visit by Chinese President Xi Jinping last week. Then, as President Xi began his...more

Keep Your Frenemies Close: Proposed China Sanctions and the Price of Escalation

On August 30, 2015, the Washington Post broke a story that the Obama administration is developing a package of economic sanctions that will target Chinese companies and individuals who have benefitted from cybertheft. The new...more

DOD Adopts Interim Cyber Rules As Claims of Chinese Cyber Attacks Continue

U.S. officials have blamed Chinese government-backed attackers for many of the recent cyber attacks on U.S. government and business computer networks: “Researchers and government officials have determined that the Chinese...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Verizon 2015 Data Breach Investigations Report Out

If you have never taken a close look at Verizon’s yearly Data Breach Investigations Report, we highly recommend that you do. It just came out, and is once again, a very informative read....more

New US sanctions program to combat cybercrimes: 3 action steps for tech companies

The new sanctions in President Barack Obama’s Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities,” target individuals and...more

Are Cyber War & Cyber Terrorism Insurable?

The frequency of cyber war and terrorism is no longer the risk. The magnitude of the potential damages is the real threat. It’s conceivable that an enemy of the U.S. government could hack a U.S. energy, water, or fuel...more

Data Security Compliance and APTs: New Insights from "Putter Panda"

On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

35 Results
View per page
Page: of 2
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.