Economic Espionage

Password Sharing Is Not a Crime, Ninth Circuit Reassures in Denial of Nosal’s Request for Rehearing

Since the early days of this blog, we’ve been covering the ongoing legal battle involving ex-Korn Ferry recruiter David Nosal as it winds its way through the courts. The latest chapter in this saga came on December 8, 2016, when a Ninth Circuit panel clarified that the Computer Fraud and Abuse Act (CFAA) does not criminalize innocent password sharing, in a published opinion denying Nosal’s request for a rehearing en banc. READ MORE

Amendment to Federal Criminal Procedural Rule Could Impact Trade Secret Cases

Much attention, including here at Trade Secrets Watch, has been focused in recent weeks on the Defend Trade Secret Act (“DTSA”), which overwhelmingly passed both houses of Congress in April and was signed into law by President Obama on May 11th. The DTSA gives companies new tools for combatting alleged trade secret theft, including a direct path to federal court via the addition of a private right of action to the Economic Espionage Act (EEA) and the ability to apply for ex parte seizure orders to prevent propagation or dissemination of stolen trade secrets. READ MORE

Aviation Contractor Glides Away From Liability After Receiving Unsolicited Email Containing Trade Secrets

If a third party sends you someone’s trade secrets, and you delete them as soon as you know they’re trade secrets, you’re off the hook for misappropriation.

That, in a nutshell, is what a Florida federal judge held on January 14, when he dismissed Dyncorp International LLC’s allegations that rival contractor AAR Airlift Group, Inc. stole trade secrets to gain an unfair advantage in securing a multibillion-dollar government contract. The contract, which Dyncorp had performed for more than 20 years, was to provide aviation support to the U.S. State Department for its counter-narcotics operations. READ MORE

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest threat might still be a pair of quick hands.  For instance, in the restaurant industry, opening the kitchen doors to a new employee creates real risks.  As we’ve discussed, sometimes the decision whether to print or download can have major legal ramifications.  And with computer forensics technology growing in leaps and bounds, sometimes an old-school paper trail might be more enticing to would-be perps than a digital one.  That said, the FBI has a track record of turning up bags of shredded documents in grocery store dumpsters. READ MORE

A Preview of the CFAA Arguments in United States v. Nosal, Part II: Could “Phishing” be a Factor?

Oral arguments for the next round in United States v. Nosal have been set for October 20, 2015 at the Ninth Circuit in San Francisco.  So we figured it may be a good time to review both sides’ arguments related to the Computer Fraud and Abuse Act. After doing so, it seems to us that one topic not given any consideration in the briefs, but that may play a role during oral argument is the phenomenon known as phishing schemes, and how such schemes might be compared and contrasted with the scheme alleged in this case. READ MORE

Once More, With Feeling! Congress Swings for the Fences with the Defend Trade Secrets Act of 2015

On July 28, broad bipartisan support ushered the “Defend Trade Secrets Act of 2015” onto the floor of both the House and Senate. This DTSA treads the well-worn path of many similar (and, to date, hapless) bills that fruitlessly preceded it. TSW has exhaustively covered prior attempts, aptly titling our first post “Pols Gone Wild: Congress Discovers Trade Secret Theft and Cybersecurity Are Problems; We Sort Through the Explosion of Legislation”—chart and all. READ MORE

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it appears these hijinks have evolved in today’s electronic world. As the New York Times first reported, the FBI and Department of Justice prosecutors are investigating front-office personnel for the St. Louis Cardinals, one of Major League Baseball’s most beloved franchises, for allegedly infiltrating the internal network of the Houston Astros. READ MORE

First Foreign Hacker Is Convicted In The United States Of Hacking Crimes Involving Theft Of Trade Secrets From American Companies

A 22-year-old Canadian hacker has been sentenced to federal prison by a Delaware court for engaging in a conspiracy to break into the computer networks of several large gaming companies, to steal trade secret and other information related to unreleased products, and to commit criminal copyright infringement.  According to the Government’s Sentencing Memorandum, David Pokora of Ontario, sentenced last Thursday was “a leading member in an international computer hacking ring . . . that committed numerous unlawful intrusions into the computer networks of various technology companies involved in the $22 billion-dollar video gaming industry.”  The conspiracy’s victims included Microsoft, Epic Games (which develops the highly popular “Gears of War” series), and Activision Blizzard (which published, among many other successful games, “Call of Duty: Modern Warfare 3”). READ MORE

POTUS Declares Cybercrime a National Emergency, Announces New Penalties for Trade Secrets Theft

Declaring cybercrime a “national emergency,” President Obama today empowered Treasury to freeze assets that are the fruits of cybercrime, according to an Executive Order issued this afternoon. The agency can block money or property in the United States or in the control of any United States person determined to have engaged in “cyber-enabled activities” originating or directed from outside the United States. Targeted activities include harming computer networks in critical infrastructure sectors; significantly disrupting a computer network; or causing significant misappropriation of trade secrets and other protected information. The EO also enables seizure of money or property of any persons involved in misappropriating trade secrets by “cyber-enabled means” that impact the national security, foreign policy, or economic health or financial stability of the United States.

TSW is tracking the EO and will report further developments.

Five Minutes With … National Security and Cybercrime Professor Ahmed Ghappour

This marks the inaugural “Five Minutes With” feature that Trade Secrets Watch will run occasionally.  These will be question-and-answers with notable figures in the trade secrets world.

TSW got a chance to sit down with UC Hastings College of the Law professor and Liberty, Security & Technology Clinic founder Ahmed Ghappour.  He had a lot to say about trade secrets, cybersecurity, and encrypting “all the things.”
 
TSW:  Ahmed, TSW is dying to know what you’ve been up to lately in the world of economic espionage.  What’s the inside scoop? READ MORE