Defense Dynamics: Navigating the Post-Election Landscape for the National Security Sector
Ask a CFIUS Expert: Is Crypto Spying on Us?
Hot Topics in International Trade-Braumiller Law Group-FDI Into Mexico from China
4 Key Takeaways | Solar Industry & Chinese Tariff Update
10 Key Trade Developments: Trade Remedy Cases
Episode 309 -- Alex Cotoia on Compliance with the Uyghur Forced Labor Prevention Act
10 Key Trade Developments: China
Noteworthy Points in the Rules for the Implementation of China's Patent Law 2023
JONES DAY TALKS®: Corporate Compliance in Asia: Managing Rapid Regulatory Change and Ambiguity
Hot Topics in International Trade. Braumiller Law Group Partner & Founder Adrienne Braumiller joins Vp of Marketing Bob Brewer for an Update on Forced Labor
Episode 292 -- 3M's $6.5 Million FCPA Settlement with the SEC
5 Key Takeaways | How to Effectively Leverage the Chinese Patent System
Third Party Observation in Patent Prosecution in China
The Grace Period for Novelty in Chinese Patent Law
One Month to a More Effective Compliance Program with Boards – Day 14 - Boards and Doing Business in China
Episode 276 -- Review of Phillips and Franks Int'l SEC FCPA Settlements
Sanction and the Increasing Complexity of Trade Compliance
Braumiller Law Group Help With China Imports
Coming Conflict with China: Part 5 - Good Compliance Is Good Business
JONES DAY PRESENTS®: Taiwan's Enhanced Trade Secret Restrictions and Stricter Penalties
On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more
In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent...more
Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more
On February 10, 2020, Attorney General William Barr announced the indictment of four members of the Chinese military on charges of hacking into Equifax’s computer networks, maintaining unauthorized access to those networks...more
Trade Secrets Watch has been covering the escalating economic tension between China and the U.S., including the U.S. Trade Representative’s investigation on China’s alleged IP theft under Section 301 of the Trade Act of 1974,...more
“Chinese cyber espionage and cyber-attack capabilities will continue to support China’s national security and economic priorities,” as stated by Dan Coats, the Director of National Intelligence “Americans should not buy...more
In January of this year, Chinese wind turbine manufacturer Sinovel Wind Group Co. Ltd. was convicted of stealing trade secrets from U.S. company AMSC Inc. ...more
Dear Friends, After returning from a two week trip to China to work on the Solar Cells case, this March blog post will cover trade policy, including Trump’s impact on Trade Policy, trade, Customs, False Claims Act, the...more
On October 5, 2015, years of protracted negotiations of the Trans-Pacific Partnership Agreement (“TPP”) concluded. The TPP is a proposed trade agreement between 12 Pacific Rim nations that lowers trade barriers such as...more
The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more
Ending the Crude Oil Export Ban - On September 17, the House Energy and Commerce Committee passed a bill to end the 40-year-old ban on the export of domestic crude oil. The Committee vote was passed by a Republican...more
President Xi's State Visit Brings Announcements on Cybersecurity and Climate Change - In late September, Chinese President Xi Jinping made his first state visit to the United States. Cybersecurity and climate change...more
Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more
In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more
On August 30, 2015, the Washington Post broke a story that the Obama administration is developing a package of economic sanctions that will target Chinese companies and individuals who have benefitted from cybertheft. The new...more
U.S. officials have blamed Chinese government-backed attackers for many of the recent cyber attacks on U.S. government and business computer networks: “Researchers and government officials have determined that the Chinese...more
On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more
This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more
For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more
No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more
We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more