In addition to conventional warfare, it was recently confirmed by an arm of the Ukraine Ministry of Defense that it hacked trade secrets from a Russian state nuclear utility, and then leaked the trade secrets to a public website to harm the utility’s commercial prospects. Such “hack and leak” operations have been done before by nation-affiliated hackers to attempt to influence political activities of other nations, but this may be the first operation of this type concerning technical trade secrets during warfare. Although the economic impact from this particular operation may be difficult to gauge at this time, this hack and leak of nation state-affiliated company trade secrets may be a sign of things to come in future armed conflicts.
Continue Reading A New Battlefront: Ukraine Resistance Includes Leaks of Russian Trade Secrets
Recent United States Department of Justice (“DOJ”) indictments of Chinese hackers provide a reminder that trade secrets and other intellectual property stored on databases are attractive targets to bad actors. The DOJ
This week, the U.S. government continued its enforcement activity against Chinese government-sponsored trade secret theft, indicting two Chinese hackers for allegedly stealing data from 25 domestic and international companies, including targeting those now researching COVID-19 testing, vaccines, and treatment. The two defendants had allegedly acquired hundreds of millions of dollars worth of trade secrets and other valuable business information across a span of nearly eleven years. This announcement follows in the wake of the indictment of Dr. Charles Lieber, a former Harvard professor, who allegedly lied about his participation in China’s “Thousand Talents Plan,” a program that has been accused of facilitating the stealing of American trade secrets. Our coverage of that indictment is
On May 22, the Eleventh Circuit clarified trade secrets misappropriation analysis under the Florida Uniform Trade Secrets Act (“FUTSA”), strengthening the trade secret protection offered by the statute. The decision vacated a magistrate judge’s finding that the defendants had not misappropriated trade secretes following a bench trial in the Compulife Software Inc. v. Newman et al. matter (No. 18-12004). The court found error in the magistrate’s failure to “consider the several alternative varieties of misappropriation” contemplated by FUTSA and the magistrate’s reasoning that the public availability of life insurance quotes on the plaintiff’s website “automatically precluded a finding that scraping those quotes constituted misappropriation.”
The COVID-19 crisis has presented an array of novel issues for companies, including new and unexpected cybersecurity threats. In addition to the now well-known security limitations of video platforms such as Zoom, we are seeing cyber-attacks in the form of COVID-19 related phishing attempts and ransomware attacks. In at least some of these attempted hacks, cybercriminals are hoping to steal trade secrets.
Companies and other organizations increasingly must face serious and complex threats to their business and infrastructure. Whether the threat is trade secret theft, rogue insiders, cybercrime adversaries, aggressive competitors, or misconduct by business and supply chain partners, companies should remain constantly vigilant and defense ready. Adversaries, including especially cybercriminals operating exclusively in the digital domain, are often highly motivated, sophisticated, resourced, and innovative. The opaque, pervasive, and global nature of modern digital networked environments presents opportunities for criminals. The sophistication and relentless creativity of these bad actors pose significant challenges to companies and law enforcement agencies in being able to detect, assess, mitigate, attribute, and deter these threats. Because available tools and real-world practices to address these threats often outpace the law, companies are called upon to develop their own comprehensive approaches to investigate and remediate these forms of risk. In doing so, companies must be willing to assume a certain level of risk to effectively investigate and obtain sufficient insight to counter the problems.
On April 23rd, 2019, China’s Standing Committee on the National People’s Congress adopted amendments to the Anti-Unfair Competition Law, significantly strengthening China’s protection of trade secrets. The bolstering of intellectual property safeguards in China comes in advance of important trade negotiations between China and the international community, including the United States. The changes to the
The Criminal Court of Mechelen (Belgium) ruled in favor of Bofin Biscuits against a former production assistant accused of having stolen the assistant director of the cookie baker’s laptop. The laptop allegedly contained the secret recipes of all the cookies produced by Bofin Biscuits. This case is interesting because of the nature of the secrets and also when compared to that of the