Mark Rasch

Cyber Law Editor

Security Current


Worst Breach Ever; Why the Sony Breach May be the Most Significant Security Breach in US History

Posted on: 05 Dec 2014

It all sounds like the plot of a major Hollywood blockbuster. Dave Skylark of the TV show “Skylark Tonight” and his producer Aaron Rapoport are recruited by the CIA to assassinate North Korean leader Kim Jong-Un in  the movie, “The Interview.” Haven’t seen it?  It’s no wonder. The film’s distributor, Sony Pictures, was supposed to release…

I’m From the Government, I’m Here to Help- DOJ Announces New Cyber-Security Section

Posted on: 05 Dec 2014

The Department of Justice is establishing a new unit within the Computer Crime and Intellectual Property Section of the Criminal Division designed to actually help entities prevent cybercrime, instead of just prosecuting it after it happens, according to a speech at Georgetown University at the Cybercrime 2020 Symposium by Assistant Attorney General (AAG) Leslie R. Caldwell. The problem…

Sen. Wyden’s Plan to Close Backdoors May Backfire

Posted on: 05 Dec 2014

It has long been suspected that the U.S. government has consistently installed back door programs, remote access programs or other vulnerabilities in U.S. hardware, software, supply chain, telecommunications devices, and well, just about everything. Oh, and they are also beaming signals directly into your brain.  Except that one of these statements is a delusional fantasy.…

State Secrets

Posted on: 26 Nov 2014

I previously wrote about the government’s use of things like Dirt Box and Stingray – technologies that allow the government to surreptitiously intercept either the contents of communications, or the data about those communications (including cell phone locations) without the hassle and bother of actually having to ask the phone company for copies of their…

Top 10 Tips for Credit Card Customers For Black Friday

Posted on: 26 Nov 2014

It’s almost Black Friday, followed by Cyber Monday.  The day’s consumers whip out their credit and debit cards (or just their credit and debit card numbers) and buy buy buy. But in light of the massive hacks and data breaches around this time last year, and the more sophisticated attacks we are seeing now, what should the…

California Revenge Porn Law: A Start

Posted on: 21 Nov 2014

In the wake of the iCloud hack of the pictures of the (very attractive) nude celebrities, it was announced that lawyers had contacted Apple threatening to sue.  ‘Cause that’s what lawyers do.’  They sue.  Or they threaten to sue. But for what? In the case of Apple, the lawsuit would likely be for unfair and deceptive…

Day of Cyber Infamy

Posted on: 13 Nov 2014

NOAA WEATHER STATION – THE AZORES – NIGHT SUPERIMPOSE: NOAA WEATHER STATION – THE AZORES A HARBIN Z-9 military helicopter hovers silently above the antenna clad nondescript building as a team of soldiers in head to toe black rappel to the rooftop.  Though they wear masks, their eyes reveal them as members of the Chinese…

Day of Cyber Infamy

Posted on: 13 Nov 2014

NOAA WEATHER STATION – THE AZORES – NIGHT SUPERIMPOSE: NOAA WEATHER STATION – THE AZORES A HARBIN Z-9 military helicopter hovers silently above the antenna clad nondescript building as a team of soldiers in head to toe black rappel to the rooftop.  Though they wear masks, their eyes reveal them as members of the Chinese…

I’m Sorry, Siri, I’m Afraid I Can’t Do That

Posted on: 11 Nov 2014

Alexa is listening to your every word.  So is Siri.  And Cortana.  And Google.  Or the HAL 9000 computer. Just say the magic words and the devices from Amazon, Apple, Microsoft and Google will obey your commands, give you help with your homework, do math and complete your Christmas shopping (particularly Alexa). Alexa is a…

Three Factor Authentication and The Law – Compelled Decryption by Biometric

Posted on: 03 Nov 2014

We all know what multi-factor authentication is.  Typically, it involves two of three classes of authentication; (1) something you know (a password or passphrase); (2) something you have (a token or key); and (3) something you are (a biometric).  Traditionally, the last of these, a unique biometric signature, has been the holy grail of identification,…