Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Introduction
00:00 • 2min
Microsoft's Storm 0558 Attack on Government Email Accounts
02:29 • 2min
Microsoft's Attribution of the Hack to a China-Based Threat Actor
04:46 • 4min
The US-China Relationship
08:42 • 3min
How to Distinguish Between Positioning, Warning, and Influence in Cyber Espionage
11:53 • 4min
Microsoft Opens Up Its Cybersecurity Tools to Consumers for Free
15:43 • 2min
The Economic Effects of Sanctions on the US-China Relations
17:37 • 5min
The Evolution of Cyber Espionage
22:31 • 4min
The PRC Is Steadily Improving Its Cyber Collection Capabilities Directed Against the U.S. And Our Allies
27:00 • 2min
The Emerging International Law on the Regulation of Cyber Activities
28:38 • 5min
The Disagreement of International Law on Cyber Activities
33:10 • 4min
The Convergence of Low Intensity Cyber Operations and Peacetime Espionage Operations
37:14 • 4min
The Ethics of Secret Intelligence
40:51 • 6min
The Evolution of the International Law of Espionage
46:32 • 3min