
Based on real e-commerce case studies disputed on international level, this paper will draw on the legal perspective of cyberspace, identifying the relationship between cyberspace and state sovereignty, and outlining the mechanisms by which cyberspace could cross borders and the territory of the state despite all the precautions taken by the state to protect its sovereignty. Cyber espionage, or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons. Philipp, Joshua, The staggering cost of economic espionage against the US, Epoch Times.

Throughout history, nation states have been trying.
Cyber espionage epoch times series#
The issue of the dynamicity of time and place will be taken into consideration, where activities carried out over the internet are characterized by their cross-border dimension. Trade Secrets Clarification Act, Orrick News Alert (2013). 9 min read - Threat Intel’s ‘History of’ series will look at the origins and evolution of notable developments in cybersecurity.


The objective of the current research is to draw attention to the impact of international characteristics of e-commerce on the sovereignty of state, and to identify the factors affecting this sovereignty. This paper discusses one of the contemporary challenging issues-it is the challenge of e-commerce to the sovereignty of the state, where governments are unable to implement their own laws on disputed cases resulting from trans-border e-commerce interactions. An Israeli company that specializes in cyber espionage tools reportedly negotiated a multi-million-dollar deal with Saudi Arabia to sell a technology that allows governments to hack their.
