News & Analysis as of

National Security Cyber Espionage

Alston & Bird

6th Circuit Upholds 20-year Sentence of Chinese Spy, Convicted of Espionage Crimes, Attempting to Steal Trade Secrets

Alston & Bird on

On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more

King & Spalding

Executive Order Restricts Foreign Access to U.S. Data, Citing National Security Risks

King & Spalding on

On February 28, 2024, President Biden signed Executive Order (EO) 14117 titled “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” On March 5,...more

Orrick - Trade Secrets Group

Tariff Chess Match Escalates Between China and the United States

Trade Secrets Watch has been covering the escalating economic tension between China and the U.S., including the U.S. Trade Representative’s investigation on China’s alleged IP theft under Section 301 of the Trade Act of 1974,...more

Robinson+Cole Data Privacy + Security Insider

Chinese Telecom Companies in Hot Water

“Chinese cyber espionage and cyber-attack capabilities will continue to support China’s national security and economic priorities,” as stated by Dan Coats, the Director of National Intelligence “Americans should not buy...more

Robinson+Cole Data Privacy + Security Insider

Russian Hackers: Desperate for U.S. Information

The latest report regarding Russia stealing U.S. cyber secrets is yet again centered around the National Security Agency (NSA), using Contractors to gain access, in some cases, to classified data....more

Sheppard Mullin Richter & Hampton LLP

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

Troutman Pepper

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

Troutman Pepper on

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide