Cyber Counterespionage

Cloaked in the disguise of a corporate insider, the spy penetrates the outer perimeter, slips past the lurking guardians, cracks the interior vault, loots the corporate secrets—and then turns off the computer and gets another coffee after the high-technology heist. In today’s age of rampant cyber espionage, bet-the-company secrets and billion-dollar technology may be stolen in seconds or exfiltrated for months
before detection. And this threat is here and now—and huge...


Download this excellent pdf on Cyber Espionage from the folks at Crowell & Moring

"Pillaging the Digital Treasure Troves" The Technology, Economics, and Law of Cyber espionage

Comments