Mark Rasch

Last updated
Mark Rasch
Born (1958-08-02) August 2, 1958 (age 65)
Alma mater State University of New York at Albany, University of Buffalo Law School
Occupation Lawyer

Mark D. Rasch (born August 2, 1958) is an American attorney and author, working in the areas of corporate and government cybersecurity, privacy and incident response. He is the former Chief Security Evangelist for Verizon Communications after having been Vice President, Deputy General Counsel, and Chief Privacy and Data Security Officer for SAIC. From 1983 to 1992, Rasch worked at the U.S. Department of Justice within the Criminal Division's Fraud Section. Rasch earned a J.D. in 1983 from State University of New York at Buffalo and is a 1976 graduate of the Bronx High School of Science.

He prosecuted Robert Tappan Morris in the case of United States v. Morris (1991) . [1] He was an amicus curiae related to data encryption in Bernstein v. United States, [2] [3] and prosecuted Presidential candidate Lyndon LaRouche, [4] and organized crime figures in New York associated with the Gambino crime family He also helped uncover the individual responsible for the so-called "Craigslist murder" in Boston. [5]

Rasch has been a regular contributor to Security Current and SecurityFocus and Security Boulevard on issues related to law and technology and is a regular contributor to Wired Magazine. He was also a longtime columnist for Storefront Backtalk, a now-defunct publication that tracked global retail technology. He has appeared on or been quoted by MSNBC, [6] Fox News, [7] The New York Times, [8] Forbes, PBS, The Washington Post, NPR [9] and other national and international media.

Books

Notes and references

Related Research Articles

<span class="mw-page-title-main">Robert Tappan Morris</span> American computer scientist; creator of Morris Worm; associate professor at MIT

Robert Tappan Morris is an American computer scientist and entrepreneur. He is best known for creating the Morris worm in 1988, considered the first computer worm on the Internet.

<span class="mw-page-title-main">Computer Fraud and Abuse Act</span> 1986 United States cybersecurity law

The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.

The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. On December 10, 1948, the United Nations General Assembly adopted the Universal Declaration of Human Rights (UDHR), originally written to guarantee individual rights of everyone everywhere; while the right to privacy does not appear in the document, many interpret this through Article 12, which states: "No one shall be subjected to arbitrary interference with their privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks."

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Electronic Communications Privacy Act</span> 1986 United States federal law

The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer, added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act, and added so-called pen trap provisions that permit the tracing of telephone communications . ECPA was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968, which was primarily designed to prevent unauthorized government access to private electronic communications. The ECPA has been amended by the Communications Assistance for Law Enforcement Act (CALEA) of 1994, the USA PATRIOT Act (2001), the USA PATRIOT reauthorization acts (2006), and the FISA Amendments Act (2008).

<span class="mw-page-title-main">Orin Kerr</span> American legal scholar (born 1971)

Orin Samuel Kerr is an American legal scholar and professor of law at the UC Berkeley School of Law. He is known for his studies of American criminal procedure and the Fourth Amendment to the United States Constitution, as well as computer crime law and internet surveillance. Kerr is one of the contributors to the law-oriented blog titled The Volokh Conspiracy.

<span class="mw-page-title-main">Hans A. Linde</span> American jurist (1924–2020)

Hans Arthur Linde was a German Jewish American legal scholar who served as a justice of the Oregon Supreme Court from 1977 to 1990.

<span class="mw-page-title-main">Jennifer Granick</span> American attorney and educator

Jennifer Stisa Granick is an American attorney and educator. Senator Ron Wyden has called Granick an "NBA all-star of surveillance law." She is well known for her work with intellectual property law, free speech, privacy law, and other things relating to computer security, and has represented several high-profile hackers.

Ontario v. Quon, 560 U.S. 746 (2010), is a United States Supreme Court case concerning the extent to which the right to privacy applies to electronic communications in a government workplace. It was an appeal by the city of Ontario, California, from a Ninth Circuit decision holding that it had violated the Fourth Amendment rights of two of its police officers when it disciplined them following an audit of pager text messages that discovered many of those messages were personal in nature, some sexually explicit. The Court unanimously held that the audit was work-related and thus did not violate the Fourth Amendment's protections against unreasonable search and seizure.

<i>United States v. Morris</i> (1991) American legal case

United States v. Morris was an appeal of the conviction of Robert Tappan Morris for creating and releasing the Morris worm, one of the first Internet-based worms. This case resulted in the first conviction under the Computer Fraud and Abuse Act. In the process, the dispute clarified much of the language used in the law, which had been heavily revised in a number of updates passed in the years after its initial drafting. Also clarified was the concept of "unauthorized access," which is central in the United States' computer security laws. The decision was the first by a U.S. court to refer to "the Internet", which it described simply as "a national computer network."

Matthew E. Yarbrough is an American lawyer and a former Assistant United States Attorney for the North District of Texas, where he was the lead prosecutor in several notable alien smuggling, illegal immigration and cyber hacking cases. He is now the founder and Managing Partner of Yarbrough Blackstone Law in Dallas, Texas.

<span class="mw-page-title-main">Marc Zwillinger</span>

Marc Zwillinger is the founder and managing member of the Washington, D.C. based data privacy and information security law firm ZwillGen. Zwillinger has been active in the field of Internet law on issues such as encryption, data security, government access to user data, data breaches, and fantasy sports.

<i>Florida v. Harris</i> 2013 United States Supreme Court case

Florida v. Harris, 568 U.S. 237 (2013), was a case in which the United States Supreme Court addressed the reliability of a dog sniff by a detection dog trained to identify narcotics, under the specific context of whether law enforcement's assertions that the dog is trained or certified is sufficient to establish probable cause for a search of a vehicle under the Fourth Amendment to the United States Constitution. Harris was the first Supreme Court case to challenge the dog's reliability, backed by data that asserts that on average, up to 80% of a dog's alerts are wrong. Twenty-four U.S. States, the federal government, and two U.S. territories filed briefs in support of Florida as amici curiae.

Stephen P. Heymann is an attorney who formerly served as an Assistant U.S. Attorney for the District of Massachusetts. He is no longer with the U.S. Attorney's office. He headed U.S. Attorney Carmen Ortiz's Internet and Computer Crimes Unit.

<i>Craigslist Inc. v. 3Taps Inc.</i> 2013 Northern District of California Court case

Craigslist Inc. v. 3Taps Inc., 942 F.Supp.2d 962 was a Northern District of California Court case in which the court held that sending a cease-and-desist letter and enacting an IP address block is sufficient notice of online trespassing, which a plaintiff can use to claim a violation of the Computer Fraud and Abuse Act.

<span class="mw-page-title-main">Cybersecurity Information Sharing Act</span>

The Cybersecurity Information Sharing Act is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate on October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private businesses to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police.

Google's changes to its privacy policy on March 16, 2012, enabled the company to share data across a wide variety of services. These embedded services include millions of third-party websites that use AdSense and Analytics. The policy was widely criticized for creating an environment that discourages Internet innovation by making Internet users more fearful and wary of what they do online.

Carpenter v. United States, 585 U.S. 296, 138 S.Ct. 2206 (2018), is a landmark United States Supreme Court case concerning the privacy of historical cell site location information (CSLI). The Court held that the government violates the Fourth Amendment to the United States Constitution when it accesses historical CSLI records containing the physical locations of cellphones without a search warrant.

Van Buren v. United States, 593 U.S. ___ (2021), was a United States Supreme Court case dealing with the Computer Fraud and Abuse Act (CFAA) and its definition of "exceeds authorized access" in relation to one intentionally accessing a computer system they have authorization to access. In June 2021, the Supreme Court ruled in a 6–3 opinion that one "exceeds authorized access" by accessing off-limit files and other information on a computer system they were otherwise authorized to access. The CFAA's language had long created a circuit split in case law, and the Court's decision narrowed the applicability of CFAA in prosecuting cybersecurity and computer crime.