Legal Recourse for International Economic Espionage Activities Thomas Finch.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Viruses & Spyware A Module of the CYC Course – Computer Security
MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY.
World Intellectual Property Organization (WIPO) Dispute Settlement and Effective Enforcement of IP.
International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
PHISHING By, Himanshu Mishra Parrag Mehta. OUTLINE What is Phishing ? Phishing Techniques Message Delivery Effects of Phishing Anti-Phishing Techniques.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Page 1 International Economic Intelligence Knowledge and Information Supply of Strategy in Taiwan: Basis for the Development of Conceptual Networking for.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Threats To A Computer Network
Threats and Attacks Principles of Information Security, 2nd Edition
Quiz Review.
Herbert Bos Erik van der Kouwe Remco Vermeulen Andrei Bacs
Norman SecureSurf Protect your users when surfing the Internet.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Cyber Crimes.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
APT29 HAMMERTOSS Jayakrishnan M.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Viruses & Destructive Programs
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
 a crime committed on a computer network, esp. the Internet.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
World Trading System: Rules and Commitments. The Effect of Protectionism on World Trade: January February March April May June July August September.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
China IP’s Challenge Since joining the World Trade Organization (2001), China has strengthened its legal framework and amended its IPR laws and regulations.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Understand Malware LESSON Security Fundamentals.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
Dispute Mediation Procedures The WTO Framework The OIE Framework Dr Gillian Mylrea Deputy Head, International Trade Department World Organisation for Animal.
Chapter 10: International Cooperation Among Nations International Business, 4 th Edition Griffin & Pustay.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
10-1 Chapter 10: International Cooperation Among Nations International Business, 4 th Edition Griffin & Pustay.
Hyperlinks Links for Other Pages. Hyperlink (aka Link) Text (or image) user can click Takes user to different location In general, location can be: On.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Nation State Actors Lex Dunlap.
Cyberwar Becomes a Reality
Employee clicks on fake
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Norton Antivirus Password Not Working Norton technical support phone number
Phishing is a form of social engineering that attempts to steal sensitive information.
Metasploit Project For this exploit I will be using the following strategy Create backdoor exe file Upload file to website Have victim computer download.
Cybersecurity Awareness
A Proposed New Standard: Common Privacy Vulnerability Scoring System (CPVSS) Jonathan Fox, Privacy Office/PDIT Harold A. Toomey, PSG/ISecG Jason M. Fung,
The World Trade Organization WTO
Shandong University of Finance and Economics, China
PROTECTED B Regulating Immigration Consultants
Presentation transcript:

Legal Recourse for International Economic Espionage Activities Thomas Finch

The Problem: Limited legal options for recourse in international cases of economic (industrial) espionage. Companies/governments conspire to use various computer resources to steal information from companies overseas. U.S. laws don’t apply, since theft was initiated from overseas platform. International regulations don’t have the strength to be enforced.

Operation Aurora: Occurred in second half of Systematic attack (now assumed launched by Chinese universities with ties to the military) on primarily American based corporations. Primary victim was Google. Chinese hackers stole Google’s intellectual property. Used Google to access confidential DoD information. Chinese claimed it was an “American Conspiracy”, never admitted responsibility. No options available for legal recourse, as China never claimed responsibility.

Operation Aurora: “A targeted user received a link in or instant message from a “trusted” source. The user clicked on the link which caused them to visit a website hosted in Taiwan that also contained a malicious JavaScript payload. The user’s browser downloaded and executed the malicious JavaScript, which included a zero day Internet Explorer (IE) exploit. The exploit downloaded a binary disguised as an image from Taiwan servers and executed the malicious payload. The payload set up a backdoor and connected to command and control servers in Taiwan.”

Operation Aurora: Because there were no legal options for recourse, Google suspended some services in China for a time. Smaller companies don’t have this luxury, require some option to recoup losses.

United States of America v. Wang Dong: Several members of the People’s Liberation Army (including Wang Dong) were indicted in 2014 on charges of economic espionage. Indictment != Conviction Allegedly used a series of malware attacks to steal confidential information from several American companies. Confidential information then used by Chinese companies to under-bid on contracts and steal American business. Arrest warrants issued. Case cannot proceed any farther, as individuals in question reside in China, and Chinese government is refusing to cooperate.

United States of America v. Wang Dong: Indicted under Economic Espionage Act of Used in processing domestic cases of economic espionage, U.S. v. Wang Dong is first case of it being used to attempt to prosecute internationals. Cannot proceed without consent of Chinese government, more of a political statement than actual attempt at legal action. Companies in question have no way to recoup losses caused by theft of information.

Proposed Solution: TRIPS Agreement already exists. Agreement on Trade-Related Aspects of Intellectual Property Rights WTO Agreement, technically binding to all industrialized countries. However, no means of enforcement. Creation of a WTO dispute settlement committee to impartially investigate and prosecute cases of international economic espionage. Countries cannot be allowed to continue to steal from each other with no recourse.