Articles by Mark Rasch


April 11, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

The law reflects our values, and our power structure. When Kentucky physician David Dao was dragged off a United Airlines (UAL) flight by Chicago Aviation Police, most people saw outrageous conduct by the airline and possibly the police department.  

Some saw an uncooperative passenger refusing to quietly exit a plane. What you see depends on how you feel about the situation. Nevertheless, there is no doubt that the incident was a public relations nightmare for United, exacerbated by its weak and somewhat feckless response to the hullabaloo. Correct response? A tweet that says, OMG! 


April 6, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

The cops may be reading your private Facebook posts to a friend.  And you may never know about it or be able to do anything about it.  And your friend may never know about it or be able to do anything about it. And, as a result of a New York State court decision on April 5, Facebook may not be able to do anything about it.  


April 3, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

With the repeal of the FCC rules on broadband privacy and security, there’s been a lot of misinformation floating around the web. Here’s my attempt to clarify some of the issues.


March 29, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

On March 28, 2017, the United States Congress voted to repeal regulations issued by the FCC which would have required Internet Service Providers to obtain the consent of their customers before they could sell their information. Currently, if you visit a website like Facebook, Twitter, or Google, the website collects the fact that you have visited, and what you did on that site.  


March 14, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

Julian Assange has offered to help make your product more secure. Julian Assange has offered to make you a felon. 

WikiLeaks founder Julian Assange has released information about the CIA’s “Vault 7” Swiss Army knife toolkit for rooting and hacking into computers, phones, routers, networks, and IoT devices. These include a wealth of theoretical, known, and “zero day” vulnerabilities and exploits – many of which have been floating around in the research community, but some of which are genuinely new. 


March 4, 2017

By Mark Rasch
Attorney and Cybersecurity Expert

The New York Times recently reported that ride sharing service Uber used a tactic – approved by their lawyers – called “greyballing” – to thwart efforts by law and code enforcement agencies from catching Uber drivers and the company operating in prohibited areas.

Without commenting on the legality of the particular service itself, the case raises the question of the extent to which private entities may use fraud, deception, traps, snares, big data and data surveillance (you know, the techniques used by cops) in furtherance of their own business objectives. 


March 3, 2017

By Mark Rasch
Attorney and Cybersecurity Expert

Once again the United States Supreme Court steps into the thicket of how and when the States may regulate the content and actions of users or social media. In oral arguments on February 27, the Supreme Court considered the constitutionality of a North Carolina law that prohibited the use of Facebook or other social media sites by registered sex offenders. The case presents the issue of whether social media and similar websites are essentially necessities in public life.


February 28, 2017

By Mark Rasch
Attorney and Cybersecurity Expert

It has been reported that Presidential spokesperson Sean Spicer called an emergency meeting of his staff to hunt for leaks.  At that meeting, reportedly approved by and supervised by White House counsel, Spicer demanded that the staffers produce their cell phones (government and personal) for examination to determine whether or not they were the leakers, and also to advice the staffers that the use of so-called “read and destroy” features (such as the messaging app “confide”) likely violate the provisions of the Presidential Records Act.


February 27, 2017

By Mark Rasch
Attorney and Cybersecurity Expert

Earlier, I wrote about the efforts by the Bentonville, Arkansas police department to compel Amazon to produce – by search warrant issued by an Arkansas judge – the contents of conversations that either the perpetrator or victim of a murder might have had in the presence of an Amazon Echo. 


February 23, 2017

By Mark Rasch
Attorney and Cybersecurity Expert

It sounds like a classic law school exam question.  A border patrol agent in the United States, without adequate provocation or justification, fires a shot across the Mexican border, hitting an innocent Mexican teenager in the head – killing him.  

Does the family of the deceased have any recourse in the US courts, specifically under the Fourth and Fifth Amendments through the unjustified use of deadly physical force?  That’s what the Supreme Court will decide after oral argument on February 21, in a case called Hernandez v. Mesa


Page 1 of 17 : First   1 2 3 4 5 6 7 8 9 10 Last

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter