by Alec Goodrich | Nov 11, 2022 | Arbitration, China, Cybersecurity, Financial, Intellectual Property, Internet Law, National Security, North America, Trade, U.S. Foreign Policy
International intellectual property (IIP) theft occurs when foreign actors infringe upon, or outright steal, intellectual property (IP) owned by a domestic entity. IIP theft takes many forms, from the manufacture and export of counterfeit Birkin bags to sophisticated...
by Evan Conner | Oct 7, 2022 | All, Cybersecurity, Elections, Europe, Internet Law, Trade, United Kingdom
The international financial system is by no means unified. Currencies, securities, assets, cryptos, and commodities have no centralized exchange and no single regulator. Instead, the institutions of modern international finance are knit together with derivatives:...
by Katherine Dolgenos | Mar 23, 2022 | All, Asia, China, Covid-19, Cybersecurity, Human Rights, Internet Law, National Security
After initially downplaying the COVID-19 pandemic and preventing medical professionals from speaking out, the Chinese government reversed course and acted swiftly to stop the virus from spreading. The government’s public health measures included extensive data...
by Gabrielle Hangos | Nov 6, 2021 | All, China, Cybersecurity, U.S. Foreign Policy
In the new age of digital threats and extensive use of computers for hacking and other crimes, governments are facing the brutal reality that preventing crime and catching criminals is more complex than ever. Common crimes and tools used by criminals via the Internet...
by Samantha Carswell | Oct 21, 2021 | All, Cybersecurity, National Security, U.S. Foreign Policy
Social media has brought the entire world to our fingertips. It’s easier than ever to find like-minded individuals. Most of us trust that there is a human on the other end of that Tweet or Facebook post we see on our feed. However, some people believe that the...
by Christopher Shoemaker | Mar 8, 2021 | All, Cybersecurity, National Security
The SolarWinds data breach has renewed debates over the application of international law to hostile cyber operations. As the staggering scope of the intrusion unfolds, U.S. leaders have likened the hack to an act of war, calling for immediate retaliation against the...