Mark Rasch

Cyber Law Editor

Security Current


Email Privacy “In Transition”

Posted on: 19 Dec 2017

A recent kerfuffle between the Office of Special Prosecutor (OSP) Robert Mueller and lawyers representing the Presidential Transition Team (PTT) arose out of Mueller’s reported acquisition of the emails of the transition team from the Government Services Agency (GSA). Transition lawyers argue that the GSA provided Mueller’s team with emails that were subject to various privileges…

Massive Ransomware Attack – Can I Sue?

Posted on: 13 May 2017

In the wake of the massive ransomware attack which hit the UK’s NHS, and tens of thousands of businesses and individuals across Europe and the rest of the world, an attack which may have cost lives, but certainly cost millions of dollars, pounds, Euro, and bitcoin, one question looms over all others. At least to lawyers. Others…

President Issues Executive Order on Cybersecurity – But It’s Not the One You Think

Posted on: 12 May 2017

On May 10, the President released his Executive Order on Cybersecurity.  The comprehensive document is intended to set out the national strategy for ensuring that the Internet is used to promote national values, that it is secured against attack from inside and outside, and to promote national interest in security and security technology. The Executive…

Why Healthcare Is Uniquely Vulnerable to Ransomware Attacks

Posted on: 12 May 2017

We all know that the most recent and pernicious forms of phishing attacks are ransomware attacks. They are increasing in scope and incidence, as well as impact and cost. But a more disturbing trend is that healthcare entities are being targeted for such ransomware attacks. The most recent is the massive ransomware attack against the UK’s NHS, whereby…

The Huma(n) Factor in Infosec

Posted on: 10 May 2017

Remember when the FBI initiated an investigation of the classified emails of State Department employee Huma Abedin found on the laptop computer of her (now estranged) husband, former (and disgraced) New York Congressman Anthony Weiner? Now Former FBI Director James Comey testified that he was obligated to tell members of Congress about these emails during…

The United Airlines Doctor Debacle, The Law and Crisis Communication

Posted on: 11 Apr 2017

The law reflects our values, and our power structure. When Kentucky physician David Dao was dragged off a United Airlines (UAL) flight by Chicago Aviation Police, most people saw outrageous conduct by the airline and possibly the police department. Some saw an uncooperative passenger refusing to quietly exit a plane. What you see depends on how you…

Frankenwarrant – The Police May Be Reading Your Private Facebook Posts

Posted on: 06 Apr 2017

The cops may be reading your private Facebook posts to a friend.  And you may never know about it or be able to do anything about it.  And your friend may never know about it or be able to do anything about it. And, as a result of a New York State court decision on April 5, Facebook…

Broadband Privacy Rules – 5 Myths

Posted on: 03 Apr 2017

With the repeal of the FCC rules on broadband privacy and security, there’s been a lot of misinformation floating around the web. Here’s my attempt to clarify some of the issues. The Rules Gave Preferential Treatment to Edge Providers Like Google One of the reasons given to justify the repeal of the FCC broadband privacy and…

Broadband Privacy Regulations – Repeal and Retrace

Posted on: 29 Mar 2017

On March 28, 2017, the United States Congress voted to repeal regulations issued by the FCC which would have required Internet Service Providers to obtain the consent of their customers before they could sell their information. Currently, if you visit a website like Facebook, Twitter, or Google, the website collects the fact that you have visited,…

An Offer You Can’t (But Must) Refuse – WikiLeaks and Secure Code

Posted on: 14 Mar 2017

Julian Assange has offered to help make your product more secure. Julian Assange has offered to make you a felon. WikiLeaks founder Julian Assange has released information about the CIA’s “Vault 7” Swiss Army knife toolkit for rooting and hacking into computers, phones, routers, networks, and IoT devices. These include a wealth of theoretical, known, and “zero…