Till Hacks Do Us Part

As a former prosecutor and defense counsel, I was often asked how I could handle dealing with criminals.  I explained that the difference between criminal law and family law was that in criminal law, you were dealing with bad people at their best. In family law, you are dealing with good people at their worst. A…

Details

It’s 10 PM. Do You Know Where Your Data Is? By Mark Rasch

This morning, the United States Supreme Court heard oral argument on a case that could decide the fate of the Cloud, the Internet, and the fate of the free world. Or not. The case deals with the thorny issue of “data sovereignty,” that is, whether the location of the data impacts the ability of governments…

Details

Worst Responders

Some years ago, I attended a training program sponsored by the United States Secret Service which was training cyber first responders such as state and local police departments, sheriff’s offices, county police, and other local law enforcement agents. I was struck by several things. First, how rudimentary the training was. Second, by the naiveté to think…

Details

When Disclosing a Data Breach is the Wrong Thing to Do

Inevitably, after a major data breach, when a company disclosed the fact of the breach, security professionals question the timing of the disclosure. “Why did you wait so long to make a disclosure?” is the outcry! Sometimes, like in the case of Uber, which delayed notification for almost a year, the criticism is warranted. But even when the…

Details

iPhone X Facial Recognition – Human Emojis

I really want an iPhone X. It has lots of cool features: a headphone jack (oops), edge to edge display (well, almost edge to edge), and the ability to create anthropomorphic poop. What’s not to like? However, as with other technologies, advances are a double-edged sword; in this case, the face ID program. The newest iPhone abandons the…

Details

Cell Phone Access at Issue in Texas Church Shooting Case

In the wake of the horrific shooting at a Texas church in November, law enforcement officials are attempting to obtain access to the contents of the suspect’s cell phone, according to published reports. The FBI Agent in Charge of the San Antonio Field Office responsible for the investigation noted, “With the advance of the technology and…

Details