Asian business espionage

Duration: 9min 37sec Views: 1362 Submitted: 20.01.2020
Category: Fisting
Authorities: Researcher contacted on LinkedIn by Chinese company to leak secrets. OSAKA -- A former researcher at Sekisui Chemical is accused of leaking trade secrets involving a key smartphone component after being approached on LinkedIn, highlighting the growing risks posed to companies by the rise of social media. Authorities allege the year-old man divulged information on the production of conductive particles used in touch screens between August and January to Chaozhou Three-Circle Group , a producer of communications equipment parts based in China's Guangdong Province. Sekisui dismissed the employee in May following an internal investigation, and Osaka police have referred the case to prosecutors in a potential step toward filing charges.

Chinese espionage in the United States

Chinese espionage in the United States - Wikipedia

After a three-year hiatus, the cyber-enabled theft of intellectual property by Chinese hackers is once again a point of contention in the U. Cybersecurity firms have reported new attacks on U. Trump administration officials have claimed that China is ignoring a agreement in which both countries pledged not to conduct hacking to benefit commercial entities. Ira A. While the Trump administration is mounting a broad campaign to pressure Beijing into ending the theft of intellectual property IP and trade secrets from U.

Prosecuting Chinese “Spies”: An Empirical Analysis of the Economic Espionage Act

Ruling party guards against Chinese spies in industry and academia. The communication intensified, to the point where Xu was encouraging the employee to download company documents onto a portable hard drive. When Xu arrived, he was arrested by Belgian authorities as part of an international sting operation and extradited to the U. Creating a new body specifically to investigate and analyze economic security issues -- something Japan's intelligence agencies reportedly lack -- is expected to be a centerpiece of the LDP recommendations, which will be submitted this year. The U.
Cybersecurity specialists widely acknowledge the cyber vulnerabilities of industrial hardware supply chains as a pressing concern. However, the combination of complex supply chains and shadowy cyber threats reduces the ability of companies to mount robust cyber defenses. Companies will benefit from reading the intelligence report recently released by information security firm Crowdstrike, which sheds light on how supply chain cyber attacks occur. Combining information from United States Department of Justice indictments and its own cyber threat monitoring research, Crowdstrike developed an in-depth case study deconstructing how MSS Jiangsu Bureau, a Chinese intelligence unit, successfully executed a cyber espionage operation to steal lucrative technical secrets about a state-of-the-art turbine engine designed by major aerospace supplier CFM International. The C, a potential competitor to market-leading commercial airliners offered by the U.