Daily Compliance News: July 25, 2025, The New Sheriff in Town Edition
All Things Investigations – Navigating Secondary Tariffs with Mike Huneke and Brent Carlson
FCPA Compliance Report: The Impact of Secondary Tariffs on Global Trade with Mike Huneke and Brent Carlson
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Regulatory Ramblings: Episode 73 - Geopolitical Risk: Thai Tensions / Sanctions, Tariffs & FCPA Enforcement in Asia
Daily Compliance News: June 23, 2025, The Is Walmart Cool Edition
Regulatory Ramblings: Episode 71 – Crypto Fault Lines: Stablecoins, Meme Coins & the Fight for Clarity PLUS: Sanctions, Shell Companies & Fragmented Global Trade
Episode 372 -- DOJ Applies False Claims Act to Tariff and Trade Violations
Hot Topics in International Trade - Tariff Mitigation Strategies
Daily Compliance News: May 30, 2025, The Leissner Sentenced Edition
Regulatory Ramblings: Episode 70 – Lessons for Compliance from a Law Enforcement Career + Regional Geopolitical Risks in 2025 with Mark Nuttall and Steve Vickers
Daily Compliance News: May 21, 2025, The I Want You Back Edition
Hot Topics in International Trade Terrified by Tariffs Braumiller Law
2 Gurus Talk Compliance: Episode 52 – The Big Jet Plane Edition
10 For 10: Top Compliance Stories For the Week Ending May 10, 2025
Daily Compliance News: May 6, 2025 the Made in China Edition
Daily Compliance News: May 5, 2025, The Washing Edition
Daily Compliance News: April 30, 2025, The 4 AM Wake-Up Call Edition
10 For 10: Top Compliance Stories For the Week Ending April 26, 2025
Daily Compliance News: April 25, 2025, The Trouble in Travel Edition
The Federal Communications Commission (FCC) has taken significant steps to institutionalize national security within its regulatory framework through the creation of the Council on National Security (CNS). Chaired by Chairman...more
On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more
In the short span of the 21st Century, the world’s two top powers, the United States and China, have moved inexplicably toward a showdown. This evolved from a commercial competition into something more akin to permanent...more
Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more
The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more
Ending the Crude Oil Export Ban - On September 17, the House Energy and Commerce Committee passed a bill to end the 40-year-old ban on the export of domestic crude oil. The Committee vote was passed by a Republican...more
President Xi's State Visit Brings Announcements on Cybersecurity and Climate Change - In late September, Chinese President Xi Jinping made his first state visit to the United States. Cybersecurity and climate change...more
Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more
In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more
On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more
This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more
For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more
No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more
We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more