Chinese cyber espionage and cyber-attack capabilities will continue to support China’s national security and economic priorities,” says Dan Coats, the Director of National Intelligence “Americans should not buy Huawei or ZTE products.” In March 2017 the Chinese Telecom company, ZTE, plead guilty to shipping US technology to Iran and North Korea, and reached a settlement
Joanne Rapuano
Joanne Rapuano, a member of the firm’s Business Litigation Practice Group and Manufacturing Industry Group, focuses her practice on international trade and federal regulatory compliance matters, including government enforcement. Ms. Rapuano provides clients with advice on how to comply with federal trade regulations, including Export Administration Regulations and International Traffic in Arms Regulations. Prior to joining Robinson+Cole, she handled trade compliance matters for United Technologies Corporation and Sikorsky Aircraft Corporation, a Lockheed Martin Company. Ms. Rapuano also advises on U.S. import regulations, the Foreign Corrupt Practices Act, Office of Foreign Assets Control matters, antiboycotting rules, corporate compliance programs, business disputes, and trade association activities. She has broad regulatory experience, including advising organizations with compliance challenges, providing legal advice to foreign companies entering the U.S. market, and conducting internal audits and investigations. In addition to her trade compliance experience, Ms. Rapuano has handled complex commercial and employment litigation for corporate clients. Read her full rc.com bio here.
The Report to the President for “Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats”
Back in January, a draft report from the U.S. Department of Commerce and the U.S. Department of Homeland Security was released to President Trump in order to address his May 11, 2017 Executive Order, which called for strengthening “Cybersecurity of federal Networks and Critical infrastructure”.
The Departments approached this issue by “hosting a workshop, publishing…
Russian Hackers: Desperate for U.S. Information
The latest report regarding Russia stealing U.S. cyber secrets is yet again centered around the National Security Agency (NSA), using Contractors to gain access, in some cases, to classified data.
It has been reported that a NSA Contractor (fired back in 2015) put highly classified U.S. cyber secrets on his home computer, which included information…
Do You Have “Security Fatigue”?
Every day it seems a new data security breach has occurred, a new “cyber hack” is in the news…making us run to our phones, computers, bank accounts, you name it, to see if we could be the “one” affected. As a result, more and more online transactions, websites, financial institutions, for work or personal, require longer and more complicated login user names and passwords. I can barely remember my name as it is….let alone the now at least 25 unique user names and passwords I have to keep in a notebook. I have security fatigue!
Continue Reading Do You Have “Security Fatigue”?
To Be Cyber Secure – May Not Mean You Are Export Secure
Ensuring that technical data is compliant with both export regulations and cybersecurity requires an understanding of what export controlled technical data/technology relate to and how they work together. The two major export control regulations, The International Traffic In Arms Regulations (ITAR) and the Export Administration Regulations (EAR), define controlled technical data/technology differently. Click for the…
To Travel With My Laptop …or Not!
Tricky decision to make if you are among the millions that travel for work…. how safe is it? Will the new “laptop travel ban” affect me? What airports am I connecting through that are of concern? Is public Wi-Fi secure? Did that person just look over my shoulder (a.k.a. Shoulder Surfing) while I was opening an email with client information all over it?
Some examples of reported incidents: full disk copies made while laptop owner was out of the hotel room, laptops stolen at security screening lines, wireless access services have been monitored by third parties to gain information transmitted through Wi-Fi service, malicious software installations (including viruses), and programs that capture log-in data and automatically transmit key data to other locations.
Continue Reading To Travel With My Laptop …or Not!