Mark Rasch

Cyber Law Editor

Security Current

Parler Talk – Free Speech, Social Media and Section 230

Posted on: 12 Nov 2020

Both conservatives and liberals are convinced that “mainstream” social media “censors” their views and opinions. Liberals point out that so-called conspiracy theories like those peddled by Q-Anon, white supremacist and white nationalist organizations get traction from social media and are amplified by their algorithms, and that as a result, more conservative viewpoints are expressed online…

Healthcare Ransomware Readiness – What You Need to Do Today, Tomorrow and the Day After

Posted on: 29 Oct 2020

On October 28, 2020, officials from the FBI and the U.S. Department of Homeland Security assembled a conference call with healthcare industry executives warning them about an “imminent cybercrime threat to U.S. hospitals and healthcare providers.” The agencies on the conference call, which included the U.S. Department of Health and Human Services (HHS), warned participants…

Hunter Biden’s Laptop – Part Deux – Subpoena vs Warrant

Posted on: 27 Oct 2020

A report on Fox News’ website describes the grand jury subpoena issued for the seizure and search of a laptop computer assertedly belonging to former Vice President Joe Biden’s son, Hunter. For all of the intrigue around the contents of the laptop, its provenance, and whether there is or is not evidence of corruption or criminal…

Blind Mac’s Bluff

Posted on: 16 Oct 2020

There’s currently a controversy around some Hunter Biden emails found on a laptop that he apparently flew from his home in Los Angeles and dropped off with a blind Mac repairman in Wilmington Delaware over a year ago and never picked up. Actually, several controversies — including whether social media like Twitter and Facebook should permit the…

Five [Prying] Eyes – Western Democracies Want Weaker Encryption

Posted on: 14 Oct 2020

The government thinks your emails are too secure. And your text messages. Oh, and your messaging apps. In fact, anything that relies on cryptography. Your messages are too secure in transit. And they are too secure when stored. They are too secure on your computers, your phone, in the cloud, in the control of third…

Cat Videos and National Security

Posted on: 18 Sep 2020

Unless someone blinks, this coming Sunday September 20, Chinese company ByteDance’s TikTok dies. The President’s executive order, which prohibits any “transactions” with ByteDance thereafter has now been clarified to note that “transactions” include both the transfer of data to and from TikTok, as well as the hosting or downloading of the applications that make TikTok work. As…

Conceal and Fail to Report – The Uber CSO Indictment

Posted on: 21 Aug 2020

The InfoSec world has been atwitter over the indictment of former Uber CSO (and current Cloudflare CISO) Joe Sullivan on criminal charges related to the failure to report to the FTC a massive data breach involving millions of personal records stolen from the ride sharing service. The allegations in the complaint are that the Federal Trade Commission…

Gotta Book – Supreme Court Rules that Generic Words Coupled With Domain Suffix May Have Trademark Protection

Posted on: 30 Jun 2020

On June 30, the U.S. Supreme Court held  that the company could hold a valid federal trademark in the name “” even though the term “booking” is a generic term for making a reservation. The case recognizes that the addition of a domain suffix like .com can transform something generic into something descriptive. The case is…

POST Haste – NYC Proposes Law to Require NYPD Disclose ALL Surveillance Techniques

Posted on: 26 Jun 2020

Quis custodiet ipsos custodes? In the wake of allegations that the Customs and Border Patrol was running surveillance drones over protest sites in Minnesota and other places, and that government agencies were collecting cell phone data about those who attended BLM protests, that law enforcement agencies are arresting people based on faulty facial recognition algorithm, or that police are…