Вы находитесь на странице: 1из 6

By

C
David Z. Bodenheimer loaked in the disguise of a cor-
and Gordon Griffin porate insider, the spy penetrates
the outer perimeter, slips past the
lurking guardians, cracks the interior
vault, loots the corporate secretsand
then turns off the computer and gets
another coffee after the high-technology
heist. In todays age of rampant cyber
espionage, bet-the-company secrets and
billion-dollar technology may be sto-
len in seconds or exfiltrated for months
before detection. And this threat is here
and nowand huge:

President Obama:
[In 2008] alone cyber criminals
stole intellectual property from
businesses worldwide worth up
to $1 trillion.1

NSA Director General Keith


Alexander:
The ongoing cyber-thefts from
the networks of public and pri-
vate organizations, including
Fortune 500 companies, rep-
resent the greatest transfer of
wealth in human history.2

Representative Rogers:
They are stealing everything that
isnt bolted down, and its getting
exponentially worse.3

Pillaging
For this exponentially expanding
topic, we will tackle four core questions
about cyber espionage:

the What are the technologies tar-

Digital
geted for cyber espionage?
How do the cyberspies crack the
digital defenses?

Treasure
What is the economic impact
of cyber espionage and digital
thefts?
What are the legal implications

Troves
for cybervictims?

What Are the Technology Targets


for Cyber Espionage?
Perhaps the simplest test to identify
The Technology, Economics, espionage targets is to ask this: Do you
have any technology or secrets worth
a nd Law of Cyber espionage stealing? If so, you are probably an
espionage target. Intelligence reports,
Published in The SciTech Lawyer, Volume 10, Issue 2, Winter 2014. 2014 American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof may
not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association.
corporate surveys, and other data have Corporate surveys have also spear-phishing attack or watering-hole
confirmed the broad spectrum of US underscored the pervasiveness of exploitation.11 Once the target network
technologies and secrets coveted by for- the economic espionage waged in had been compromised, the attacker
eign nations and corporate competitors. cyberspace: will bypass the host networks firewall
In a landmark report in 2011, the protection, instead establishing a con-
Office of the National Counterintelli- Economic espionage, through nection that originates inside the host
gence Executive (ONCIX) catalogued cyber attacks committed by for- network.12 The attacker then downloads
the technologies of greatest interest for eign intelligence services and more malware that both: (a) allows the
cybertheft and economic espionage: other criminal enterprises is so espionage team to bypass authentica-
pervasive that in a recent poll, 90 tion processes; and (b) facilitates later
Information and communica- percent of companies admitted re-entry into the system.
tions technology; their networks had been breached
Military technologies, including in the past 12 months; while the Mapping the Network
marine systems and aerospace; other 10 percent could not say Once cyberspies have established basic
Civilian and dual-use technolo- with certainty that they had not access to the network, reconnaissance
gies, including clean technologies been penetrated.7 proceeds. One of the famous cyber
and advanced materials and man- espionage groups (dubbed Advanced
ufacturing techniques; Similarly, a survey of 200 industry Persistent Threat1 or APT1 by Man-
Health care, pharmaceuticals, executives from the power, oil, gas, and diant) used batch scripts deploying
and related technologies; and water sectors indicated that 85 percent system commands to return a text file
Agricultural technology.4 of respondents experienced network with information on the networks con-
intrusions and that government-spon- figuration, accounts, and connections.13
More recently, the Defense Security Ser- sored sabotage and espionage was the This technique opened a wide-angle
vice (DSS) identified the Top Targeted most often cited cyber threat.8 picture into the nature of the compro-
Technologies as including among oth- In summary, cyber espionage cuts mised network, while also revealing the
ers: information systems; electronics; across a broad spectrum of cutting-edge type of data housed inside the network.
lasers, optics, and sensors; aeronautics technologies and affects the overwhelm-
systems; materials and processes; space ing majority of major corporations and Escalating Privileges
systems; positioning, navigation, and industrial sectors. After reconnoitering the network,
time systems; marine systems; infor- cyberspies then proceed with escalat-
mation security; and manufacturing How Do Cyberspies Crack ing privileges within the host network.
processes.5 Similarly, the Director of Digital Defenses? Commonly, this step involves acquiring
National Intelligence (DNI) led off his Only the limits of imagination define legitimate user credentials (user names
offices overall threat assessment with the ways that cyberspies may break into and passwords) to impersonate autho-
cyberthreatamong which he listed the networks to steal intellectual property or rized network users. On networks that
loss of proprietary technologies and high-value secrets. Recently, the Russian have hashed their users passwords,
sensitive business information due to gift bags handed out to world leaders at a number of publicly available soft-
cyber espionage activities.6 the G-20 summit contained USB thumb ware tools allow cyberspies to acquire
drives and three-pronged recharger the password hashes from the host net-
David Z. Bodenheimer, a partner in cables bugged with Trojan horses to spy work. In some instances, cyberspies can
Crowell & Moring LLPs Government upon the leaders communications.9 use a hashed password as is, bypassing
Contracts Group, heads the Homeland One of the classic cyber espionage the hash, or (if the attackers have suf-
Security Practice and currently serves techniques employs a five-step process ficient computing resources) cracking
as the ABAs Section of Science & (with some steps overlapping or mov- the hash with brute force and deter-
Technology Law Division Co-Chair ing in parallel): (1) establishing the mining the actual password.14
(Security, Privacy, and Information foothold; (2) mapping the target net-
Law), SciTech Committee Co-Chair work; (3) escalating the privileges; (4) Entrenchment
(Homeland Security), and Public entrenchment; and (5) exfiltration of Next, cyberspies work to ensure unfet-
Contract Law Section (PCL) Committee data. These processes can take place over tered access to and a resilient presence
Co-Chair (Cybersecurity, Privacy, and a period of years, with target companies on the network in the event that the
Data Protection). Gordon Griffin, an or agencies completely unaware of the victim discovers and deletes the initial
associate in Crowell & Moring LLPs malicious presence on their networks.10 backdoor. This entrenchment typically
Government Contracts Group, works involves the installation of new back-
and speaks on a range of technology, Establishing the Foothold doors in other corners of the network
cybersecurity, and privacy issues. Often the penetration begins with a labyrinth and the use of web portals
Published in The SciTech Lawyer, Volume 10, Issue 2, Winter 2014. 2014 American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof may
not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association.
and virtual private networks (VPNs) to National Security Agency and economic impact of cyberattacks and
bypass network security.15 Virtual pri- commander of U.S. Cyber Com- data theft may literally bet the com-
vate networks and web portals both mand, assessed that the financial panys future ability to compete in the
function on the same premise: they turn value of these losses is about $338 global market.
the attackers computer into a thin cli- billion a year, including intel- For example, a 2011 FBI report
ent that in turn uses network resources lectual property losses and the noted, a company was the victim of
for computing. Like a double agent, the down-time to respond to penetra- an intrusion and had lost 10 years
cyberspy has effectively turned the vic- tions, although not all those losses worth of research and development
tims network into the attackers own are [due] to Chinese activity.19 datavalued at $1 billionvirtually
computer. In networks that only require overnight.23
single-factor authentication, stolen user These macrocyberthreats and losses In another instance, Britains head
credentials can allow a high degree of may not readily translate into a com- of the MI5 domestic security service
access through VPNs and web portals. prehensible business case for a chief stated that digital intruders targeting
executive officer (CEO), chief financial a major London listed company had
Exfiltration of Data officer (CFO), or general counsel to take caused a loss of 800 million pounds
Once the cyberspies have mapped out aggressive action to bolster cyberde- ($1.3 billion), in part because of the
a network and gained access to the cov- fenses within an individual corporation, resulting disadvantage in contrac-
eted data and technology, the final step laboratory, or university. However, a tual negotiations.24 Another company
is a physical spys equivalent of the compelling business case does exist. At nearly lost one-eighth of its profits
handoff or dead-drop: bundling the data the individual entity level, the cyber- when a departing employee unlawfully
into manageable packets and export- threat isin a wordcatastrophic. The downloaded proprietary paint formulas
ing them outside of the host network to examples below illustrate the havoc that valued at $20 million.25
a location controlled by the attackers. cyber espionage wreaks upon individual
Cyberspies can accomplish this by using corporations and organizations. Compromised Mergers and
an archiving utility, and then transfer- Negotiations
ring the files using existing backdoors or Lost Terabytes Increasingly, hackers have targeted
file transfer protocols (FTPs). With skyrocketing cyberthefts, data high-value corporate mergers and
losses for individual companies must negotiations, thus compromising
What Are the Economic Impacts often be measured in terabytes. Accord- highly sensitive data, putting corporate
of Cybertheft? ing to Mandiants report, the Chinese victims at serious disadvantage during
The US economy runs on the rocket APT1 hackers have systematically sto- negotiations, and even undermining
fuel of intellectual property, trade len hundreds of terabytes of data from the parties ability to close deals.
secrets, and innovative technologies at least 141 organizations, including
which account for $5.06 trillion of the one instance of APT1 stealing 6.5 tera- $2.4 Billion M&A Deal. The PLA
domestic product.16 Unfortunately, this bytes of compressed data from a single in 2009 may have conducted a
same intellectual wealth attracts relent- organization over a ten-month time spearphishing campaign against
less cyberlooters. According to a public period.20 In another instance, cyber- the Coca-Cola Corporation. The
report of a classified National Intel- spies stole millions of pages of sensitive alleged attack coincided with
ligence Estimate (NIE), the United research documents over several years Coca-Colas attempts to acquire
States is the target of a massive, sus- from a robotics companythat then China Huiyuan Juice Group for
tained cyber-espionage campaign that saw a competing robotics firm use its $2.4 billion, which would have
is threatening the countrys economic design in China.21 Perhaps the most been the largest foreign takeover
competitiveness.17 dramatic loss involved a single com- of a Chinese company. Hackers
As a result, cyber espionage has now pany losing 38 terabytes of data to a gained access to sensitive cor-
escalated to the greatest transfer of cyberpenetration: porate documents, presumably
wealth in human history.18 Although As an example of the scale of the targeting Coca-Colas negotia-
estimates vary, the cybertheft losses now threat, one American company had 38 tion strategy. Shortly after the
tally to hundreds of billions of dollars: terabytes of sensitive data and intel- FBI informed Coca-Cola that its
lectual property exfiltrated from its network was compromised, the
Chinas cyber espionage against computersequivalent to nearly dou- acquisition collapsed.26
U.S. commercial firms poses a ble the amount of text contained in the $40 Billion M&A Deal. China-
significant threat to U.S. busi- Library of Congress.22 based cyberthieves, for instance,
ness interests and competitiveness hacked into the computer net-
in key industries. General Keith Economic Losses works of seven law firms in 2010
Alexander, Director of the For individual corporations, the to get more information about
Published in The SciTech Lawyer, Volume 10, Issue 2, Winter 2014. 2014 American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof may
not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association.
BHP Billiton Ltd.s ultimately SEC Cybersecurity Guidelines
unsuccessful $40 billion bid to In October 2011, the Securities and
acquire Canadian company Pot- Exchange Commission (SEC) issued
ash Corp. of Saskatchewan, Inc., guidance for publicly traded compa-
Bloomberg reported in January.27 nies to report on material risks relating
Double-Digit Negotiation Loss. to cybersecurity.30 In this cybersecurity
Over the following 2.5 years, guidance, the SEC identified several
APT1 stole an unknown num- key risk areas to be addressed by pub-
ber of files from the victim and licly traded companies.
repeatedly accessed the email
accounts of several executives, Material Risks. Due to cyberat-
including the CEO and General tacks, companies must weigh the
Counsel. During this same time risks relating to lost intellectual Only the
period, major news organizations
reported that China had success-
property, disrupted operations,
security breach remediation, and limits of
fully negotiated a double-digit
decrease in the price per unit
reputational damage.
Cyberrisk Assessment. The cor-
imagination
with the victim organization for
one of its major commodities.28
porate risk assessments for
cyberattacks should include the
define the
probability of cyberattacks, the ways that
In summary, these gargantuan losses
of intellectual property, trade secrets,
quantitative and qualitative mag-
nitude of such cyberrisks, and cyberspies
and technology pose some rather fun-
damental questions for that individual
potential impact of costs and
other consequences resulting
may break
corporation. from misappropriation of assets
or sensitive information, cor-
into
Will the company survive? ruption of data or operational networks
If so, will the CEO, CFO, and
General Counsel have jobs
disruption.31
Adequacy of Cybersafeguards. to steal
tomorrow?
If so, what will they say to the
In making their cyberrisk
assessment, companies should
intellectual
regulators, investigators, share-
holders, and media?
consider the adequacy of pre-
ventative actions taken to reduce
property or
cybersecurity risks in the con- high-value
Standing alone, the losses$1 bil-
lion in technology, a $2.4 billion
text of the industry in which they
operate and risks to that security, secrets.
business deal, or 38 terabytes of data including threatened attacks of
represent a body blow for nearly any which they are aware.32
company. But such losses may be only Intellectual Property Losses. The
the first cycle of pain. The next cycle SEC guidelines expressly address
may commence with regulatory inves- corporate reporting duties for
tigations, shareholder litigation, and/or intellectual property losses: For
onerous reporting obligations. example, if material intellec-
tual property is stolen in a cyber
What Are the Legal Implications attack, and the effects of the theft
for Cybervictims? are reasonably likely to be mate-
In the recent past, silence often rial, the registrant should describe
shrouded massive data breaches and the property that was stolen and
intellectual property losses from cyber the effect of the attack on its
espionage.29 However, escalating disclo- results of operations, liquidity, and
sure duties make silence an ever-more financial condition and whether
risky strategy. Three areas illustrate the attack would cause reported
the legal risks of remaining mum after financial information not to be
cyberspies execute digital heists of cor- indicative of future operating
porate secrets and technology. results or financial condition.33
Published in The SciTech Lawyer, Volume 10, Issue 2, Winter 2014. 2014 American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof may
not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association.
Shareholder and Fiduciary Obligations On November 13, 2013, the Department
Increasingly, shareholders and business of Defense (DoD) issued regulations
partners have significant concerns about to counter this threat, mandating that
how stout a corporations cybersecu- defense contractors implement addi-
rity defenses may be. Global Payments tional cybersecurity measures to protect
stock fell more than nine percent before controlled technical information.39
trading was halted34 following a secu- The regulations broadly define techni-
rity breach unrelated to cyber espionage. cal information to include research and
Another company saw its stock plunge 90 engineering data, engineering drawings,
percent after cyberspies stole its source and associated lists, specifications, stan-
code and began producing competing dards, process sheets, manuals, technical
products.35 Such losses of market value reports, technical orders, and more.40
will expose companies to heightened Among other requirements, this regula-
litigation risks. In its landmark report tion requires contractors to:
on cyber espionage, the Office of the
National Counterintelligence Executive Report within 72 hours of discov-
emphasized the Judicial Mandate for ery any cyber incident (defined
Do you Boards of Directors to Secure Corporate
Information, raising the specter of share-
as an action that results in an actual
or potentially adverse impact on
have any holder actions against the corporation
and Board of Directors for intellectual
an information system and/or the
information residing therein);
technology property and trade secret losses stem- Preserve relevant data for at least

or secrets ming from inadequate cybersecurity


defenses:
90 days;
Conduct an internal review of the
worth Delawares Court of Chancery
contractors network for evidence
and extent of any compromise of
stealing? ruled in the 1996 Caremark case
that a directors good faith duty
data;
Cooperate with DoD investigations
If so, you are includes a duty to attempt to for damage assessments; and

probably ensure that a corporate informa-


tion and reporting system exists
Flow the clause down to subcon-
tractors (even for commercial
an espionage and that failure to do so may ren-
der a director liable for losses
items).41

target. caused by the illegal conduct of


employees. The Delaware Supreme
Conclusion
Like smashing atoms, the fusion of
Court clarified this language in the economic espionage and cybertheft
2006 Stone v. Ritter casedeciding techniques has fundamentally and irre-
that directors may be liable for the versibly transformed the world: (1)
damages resulting from legal viola- cyber espionage now targets a virtually
tions committed by the employees boundless list of innovations, tech-
of a corporation, if directors fail nologies, and secrets; (2) the impact
to implement a reporting system of a major cyberheist can be a virtual
or controls or fail to monitor such bet-the-company (or bet-your-career)
systems.36 event; and (3) silence about a major
breach and loss of intellectual property
or trade secrets may expose a company
Military Technology to serious sanctions and litigation, thus
Multiple reports have warned that US compounding the economic impact
defense contractors remain near the of the losses themselves. In the Age of
top of the list as targets for cyber espio- Cyber Espionage, organizations now
nage.37 For example, the FBI described have even more powerful business cases
the theft of dual-use technology and for hardening cyberdefenses to protect
military grade equipment from unwit- the very technologies, innovations, and
ting U.S. companies as one of the most secrets upon which they have built their
dangerous threats to national security.38 reputations and staked their futures. u
Published in The SciTech Lawyer, Volume 10, Issue 2, Winter 2014. 2014 American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof may
not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association.
Endnotes Property and Technology: Hearings before House Threat, FBI, Baltimore, MD, 2011.
1. Remarks by the President on Securing Our Subcomm. on Oversight and Investigations of 24. Ben Elgin, Dune Lawrence & Michael
Nations Cyber Infrastructure, The White House the Energy Comm., 113th Cong. (July 9, 2013) Riley, Coke Gets Hacked and Doesnt Tell Anyone,
Office of the Press Secretary (May 29, 2009) (statement of Larry M. Wortzel) (hereinaf- Bloomberg.com (Nov. 4, 2012) (http://www.
(http://www.whitehouse.gov/the-press-office/ ter 2013 House Cyber Espionage Hearings) bloomberg.com/news/2012-11-04/coke-hacked-
remarks-president-securing-our-nations- (http://energycommerce.house.gov/hearing/ and-doesn-t-tell.html).
cyber-infrastructure). cyber-espionage-and-theft-us-intellectual- 25. ONCIX Economic Espionage Report, at 3.
2. An Introduction by General Alexander, property-and-technology). 26. 2013 House Cyber Espionage Hearings
The Next Wave, Vol. 19, No. 4 (2012) (http:// 11. Alex Cox, The Cyber Espionage Blueprint: (statement of Larry Wortzel).
www.nsa.gov/research/tnw/tnw194/article2. Understanding Commonalities in Targeted Mal- 27. Ben Elgin, Dune Lawrence & Michael
shtml). ware Campaigns (July 2013) (https://blogs.rsa. Riley, Coke Gets Hacked and Doesnt Tell Any-
3. Michael Riley & John Walcott, China- com/wp-content/uploads/2013/07/ one, Bloomberg.com (Nov. 4, 2012) (http://
Based Hacking of 760 Companies Shows Cyber BLUEPRINT_WP_0713_final.pdf). www.bloomberg.com/news/2012-11-04/coke-
Cold War, Bloomberg.com (Dec. 14, 2011) 12. Verizon, 2013 Data Breach Investigations hacked-and-doesn-t-tell.html).
(http://www.bloomberg.com/news/2011-12-13/ Report, at 31 (http://www.verizonenterprise. 28. Mandiant Report, at 25.
china-based-hacking-of-760-companies- com/resources/reports/rp_data-breach- 29. Ben Elgin, Dune Lawrence & Michael
reflects-undeclared-global-cyber-war.html). investigations-report-2013_en_xg.pdf). Riley, Coke Gets Hacked and Doesnt Tell Anyone,
4. ONCIX, Foreign Spies Stealing US Eco- 13. Mandiant Corp., APT1: Exposing One of Bloomberg.com (Nov. 4, 2012) (http://www.
nomic Secrets in Cyberspace, at 89 (Oct. 2011) Chinas Cyber Espionage Units, pp. 3536 (Feb. bloomberg.com/news/2012-11-04/coke-hacked-
(http://www.ncix.gov/publications/reports/ 12, 2013) (http://intelreport.mandiant.com/ and-doesn-t-tell.html).
fecie_all/Foreign_Economic_Collection_2011. Mandiant_APT1_Report.pdf) (hereinafter 30. SEC, Cybersecurity: CF Disclosure Guid-
pdf) (hereinafter ONCIX Economic Espionage Mandiant Report). ance: Topic No. 2 (Oct. 13, 2011) (http://www.
Report). 14. Kapersky Lab Global Research and Anal- sec.gov/divisions/corpfin/guidance/cfguidance-
5. DSS, Targeting U.S. Technologies, at ysis Team, The Icefog APT: A Tale of Cloak and topic2.htm).
9 (2013) (http://www.dss.mil/documents/ Three Daggers (http://www.securelist.com/en/ 31. Id., at 3.
ci/2013%20Unclass%20Targeting%20US%20 downloads/vlpdfs/icefog.pdf). 32. Id.
Technologies_FINAL.pdf). 15. Mandiant Report, pp. 3637. 33. Id., at 4.
6. DNI, Worldwide Threat Assessment of 16. 2012 House Economic Espionage 34. GAO, Information Security: Cyber Threats
the US Intelligence Community, at 2 (Mar. 12, Hearings (statement of Mr. Graham, Chief Facilitate Ability to Commit Economic Espionage,
2013) presented to the Senate Select Commit- Economist, U.S. Patent and Trademark Office). at 7 (GAO-12-876T) (June 28, 2012) (http://
tee on Intelligence (http://www.dni.gov/files/ 17. Ellen Nakashima, U.S. Said to Be Target www.gao.gov/products/GAO-12-876T).
documents/Intelligence%20Reports/2013%20 of Massive Cyber-Espionage Campaign, Wash. 35. 2013 House Cyber Espionage Hearings
ATA%20SFR%20for%20SSCI%2012%20 Post (Feb. 10, 2013). (statement of Rep. Murphy).
Mar%202013.pdf). 18. An Introduction by General Alexander, 36. ONCIX Economic Espionage Report,
7. Economic Espionage: A Foreign Intel- The Next Wave, Vol. 19, No. 4 (2012) (http:// Annex A, at A-2 to A-3.
ligence Threat to American Jobs and www.nsa.gov/research/tnw/tnw194/article2. 37. See, e.g., DSS, Targeting U.S. Technologies,
Homeland Security: Hearings Before House shtml). at 9 (2013); ONCIX Economic Espionage Report,
Homeland Security Comm., 112th Cong. 19. 2013 House Cyber Espionage Hear- pp. 89.
(June 28, 2012) (statement of Rep. Higgins) ings (statement of Larry Wortzel); see also id. 38. 2012 House Economic Espionage Hear-
(hereinafter 2012 House Economic Espio- (statement of James Lewis estimating losses at ings (statement of Mr. Woods, Asst. Director,
nage Hearings) (http://www.cq.com/doc/ 1% of Americas GDP); McAfee and CSIS, U.S. Immigration & Customs Enforcement,
congressionaltranscripts-4116637?print=true). The Economic Impact of Cybercrime and Cyber DHS).
8. ONCIX Economic Espionage Report, Espionage, at 16 (July 2013) (estimating cyber 39. 78 Fed. Reg. 69273, 69279 (2013), imple-
Annex B (Oct. 2011). espionage and crime at between $70 billion to menting Department of Defense Acquisition
9. Carol Williams, Kremlin Slips Spying Gad- $140 billion). Regulation Supplement (DFARS) Subpart
gets Into G20 Summit Gift Bags, Newspapers 20. Mandiant Report, at 3. 204.73 Safeguarding Unclassified Controlled
Say, L.A. Times (Oct. 29, 2013) (http://articles. 21. 2013 House Cyber Espionage Hearings Technical Information (http://www.gpo.gov/
latimes.com/2013/oct/29/world/la-fg-wn- (statement of Larry Wortzel). fdsys/pkg/FR-2013-11-18/pdf/2013-27313.pdf).
russia-g20-summit-gifts-spy-devices-20131029). 22. Sen. Sheldon Whitehouse, We Need to 40. Id.
10. See Ryan Sherstobitoff, Itai Liba, and Act on Cybersecurity, Natl. L.J. (May 10, 2010). 41. Id., at 6927982.
James Walter, Dissecting Operation Troy: 23. Congressional Research Service (CRS),
Cyberespionage in South Korea (http://www. The 2013 Cybersecurity Executive Order: Over-
mcafee.com/us/resources/white-papers/ view and Considerations for Congress, pp. 23
wp-dissecting-operation-troy.pdf); see also (Mar. 1, 2013) quoting Executive Assistant
Cyber Espionage and the Theft of U.S. Intellectual Director Shawn Henry, Responding to the Cyber
Published in The SciTech Lawyer, Volume 10, Issue 2, Winter 2014. 2014 American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof may
not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association.

Вам также может понравиться