Below are various of my publications. Some are working drafts (as noted). Featured publications are in bold.
- The Lawyers Obligations when Coming into Inadvertent Acquisition of or Access to Child Pornography (March 01, 2025 working draft for consideration of publication in the Wisconsin Lawyer)
- Going from Virtual Hero to Virtual Fraud: How to Spot Deepfake Experts (March, 2025 working draft, currently subject of forthcoming article by an investigative journalist)
- Restoring Federal Firearm Rights for Wisconsin Clients with a History of Civil Commitment (February 28, 2025 working draft for consideration of publication in the Wisconsin Lawyer)
- Contributing author/editor to forthcoming revisions to AAMI TIR57:2016 and ANSI/AAMI SW96:2023
- Medical Device Vulnerability Scanning, forthcoming H-ISAC publication of multiple author-contributors
- Contributor to Playbook for Threat Modeling Medical Devices, MITRE Corporation and Medical Device Innovation Consortium (2021)
- Privacy Law Primer (chapter co-authored with Ellie K Vilendrer, Esq., Business Law Deskbook 2021 ed., Minnesota Practice, Thomson Reuters)
- Why the Equifax Breach Could be the Tipping Point (Thomson Reuters Westlaw® November, 2017)
- Minnesota State Bar Ass’n Computer & Technology Law Section blog(since 2007 – 2017), http://mntech.typepad.com | Permalink (2007-2011)
- A sale, a breach, a wave of class actions, The Daily Journal (San Francisco & Los Angeles legal publication), October 6, 2016
- What Lawyers Need to Know About Cyber Insurance (33 The Computer & Internet Lawyer 2, Feb., 2016)
- Cyber Insurance: What Minnesota Lawyers Need To Know, 72 BENCH & B. MINN. 16, 18 (Nov. 2015)
- Secrets to Effective Electronic Documents in the Appellate Process, GPSolo (American Bar Ass’n, Oct., 2015)
- Cyber Security Active Defense: Playing with Fire or Sound Risk Management? 20 Rich. J.L. & Tech 12 (2014)
- “Professional Ethics for the Digital Forensics Discipline” Digital Forensic Investigator News (Part 1, Winter/Spring, 2014; Part 2, summer, 2014)
- Official (ISC)²® Guide to the Cyberforensics Certified Professional (CFCP) CBK® (Code of Ethics chapter – July, 2014)
- Using Technology to Facilitate Production of E-Discovery, 40 Wlm. Mitchell L. Rev. 588 (2014)
- “Hacking Back”: Legitimate Corporate Security or Risky Business? The CIP Report, George Mason Univ. Center for Infrastructure Protection & Homeland Security (October, 2013)
- “Incorporating Extrinsic Evidence into the Digital Forensics Investigation,” Digital Forensic Investigator News (Winter/Spring, 2013)
- “Data Encryption in Criminal Cases” Forensic Focus Newsletter (April, 2012)
- Interview: Nancy Crotti, “Cloud Control: Feeling at ease with online files,” Minn. Lawer, 03/2012
- Collaborating with a Digital Forensics Expert: Ultimate Tag Team or Disastrous Duo, 38 Wlm. Mitchell L. Rev. 353 (Jan., 2012)
- “AccessData FTK 4.0: Initial Impressions” ForensicFocus.com (March 12, 2012).
- “Is your client an attorney? Be aware of possible constraints on your investigation. ” Forensic Focus Newsletter (“Part 1,” Sept. 29, 2011; “Part 2,” Nov. 29, 2011).