Cyber Espionage China

News & Analysis as of

Final TPP Language on Trade Secret Protection Disclosed

On October 5, 2015, years of protracted negotiations of the Trans-Pacific Partnership Agreement (“TPP”) concluded. The TPP is a proposed trade agreement between 12 Pacific Rim nations that lowers trade barriers such as...more

US China Trade War

The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more

Trade & Manufacturing - October 2015

Ending the Crude Oil Export Ban - On September 17, the House Energy and Commerce Committee passed a bill to end the 40-year-old ban on the export of domestic crude oil. The Committee vote was passed by a Republican...more

Trade & Manufacturing - News of Note - October 2015

President Xi's State Visit Brings Announcements on Cybersecurity and Climate Change - In late September, Chinese President Xi Jinping made his first state visit to the United States. Cybersecurity and climate change...more

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

US-China Cyber Deal Big on Promises, Short on Action

In the aftermath of recent cyberattacks attributed to China’s government and citizens, many observers prepared for a rather uncomfortable state visit by Chinese President Xi Jinping last week. Then, as President Xi began his...more

Keep Your Frenemies Close: Proposed China Sanctions and the Price of Escalation

On August 30, 2015, the Washington Post broke a story that the Obama administration is developing a package of economic sanctions that will target Chinese companies and individuals who have benefitted from cybertheft. The new...more

DOD Adopts Interim Cyber Rules As Claims of Chinese Cyber Attacks Continue

U.S. officials have blamed Chinese government-backed attackers for many of the recent cyber attacks on U.S. government and business computer networks: “Researchers and government officials have determined that the Chinese...more

Data Security Compliance and APTs: New Insights from "Putter Panda"

On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

Cyber Espionage And Insurance Coverage

In the United States alone, it is estimated that the cost of “[c]yber-espionage and other malicious cyber crimes...[i s] between $24 billion and $120 billion annually.” In 2008, the U.S. Department of Defense’s classified...more

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

APT Threat Report Shows Cybersecurity Risks Not Limited to Identity Theft

We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more

15 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.