Mark Rasch

Cyber Law Editor

Security Current


Top 10 Tips for Credit Card Customers For Black Friday

Posted on: 26 Nov 2014

It’s almost Black Friday, followed by Cyber Monday.  The day’s consumers whip out their credit and debit cards (or just their credit and debit card numbers) and buy buy buy. But in light of the massive hacks and data breaches around this time last year, and the more sophisticated attacks we are seeing now, what should the…

California Revenge Porn Law: A Start

Posted on: 21 Nov 2014

In the wake of the iCloud hack of the pictures of the (very attractive) nude celebrities, it was announced that lawyers had contacted Apple threatening to sue.  ‘Cause that’s what lawyers do.’  They sue.  Or they threaten to sue. But for what? In the case of Apple, the lawsuit would likely be for unfair and deceptive…

Day of Cyber Infamy

Posted on: 13 Nov 2014

NOAA WEATHER STATION – THE AZORES – NIGHT SUPERIMPOSE: NOAA WEATHER STATION – THE AZORES A HARBIN Z-9 military helicopter hovers silently above the antenna clad nondescript building as a team of soldiers in head to toe black rappel to the rooftop.  Though they wear masks, their eyes reveal them as members of the Chinese…

Day of Cyber Infamy

Posted on: 13 Nov 2014

NOAA WEATHER STATION – THE AZORES – NIGHT SUPERIMPOSE: NOAA WEATHER STATION – THE AZORES A HARBIN Z-9 military helicopter hovers silently above the antenna clad nondescript building as a team of soldiers in head to toe black rappel to the rooftop.  Though they wear masks, their eyes reveal them as members of the Chinese…

I’m Sorry, Siri, I’m Afraid I Can’t Do That

Posted on: 11 Nov 2014

Alexa is listening to your every word.  So is Siri.  And Cortana.  And Google.  Or the HAL 9000 computer. Just say the magic words and the devices from Amazon, Apple, Microsoft and Google will obey your commands, give you help with your homework, do math and complete your Christmas shopping (particularly Alexa). Alexa is a…

Three Factor Authentication and The Law – Compelled Decryption by Biometric

Posted on: 03 Nov 2014

We all know what multi-factor authentication is.  Typically, it involves two of three classes of authentication; (1) something you know (a password or passphrase); (2) something you have (a token or key); and (3) something you are (a biometric).  Traditionally, the last of these, a unique biometric signature, has been the holy grail of identification,…

The Internet and Ebola

Posted on: 29 Oct 2014

When Doctor Craig Spencer returned from West Africa to New York, having treated Ebola patients while wearing protective gear and being asymptomatic and non-infectious, he engaged in a rigorous course of self-assessment for symptoms like fever, nausea, vomiting and fatigue. Dr. Spencer also did things like go to the popular High Line for coffee, travel…

Gone Catfishing: Police, Subterfuge and the Internet

Posted on: 29 Oct 2014

I’ve said it before, and I’ll say it again.  Cops lie.  They are allowed to.  In the course of conducting investigations, they can go undercover, pretend to be other people, lie, cheat, steal and even inject spyware into people’s computers. They can (and have) set up fake Facebook pages in the names of real people,…

Is the FBI Really “Going Dark?”

Posted on: 24 Oct 2014

FBI Director Comey complained about the problem of people, “going dark,” in a speech before the Brookings Institution on October 16, 2014. He explained, “the law hasn’t kept pace with technology, and this disconnect has created a significant public safety problem. We call it ‘Going Dark,’ and what it means is this: Those charged with protecting our people…

In (Partial) Defense of the Comey Plan

Posted on: 23 Oct 2014

A terrorist assaults the Canadian Parliament, and is shot dead.  Police, fearing a Mumbai-style mass attack, seize the gunman’s cell phone to look for contacts, communications, text messages, or other information from which they could determine whether the attack is that of a lone gunman, or part of a more concerted attack. The phone is…