Below are various of my publications. Some are working drafts (as noted). Featured publications are in bold.
- The Lawyers Obligations when Coming into Inadvertent Acquisition of or Access to Child Pornography (May, 2025 working draft for consideration of publication in the June, 2025 issue of the Wisconsin Lawyer)
- From Virtual Hero to Virtual Fraud: Deepfake Frauds (March, 2025 working draft, currently subject of forthcoming article by an investigative journalist)
- Restoring Federal Firearm Rights for Wisconsin Clients with a History of Civil Commitment (February 28, 2025 working draft for consideration of publication in the Wisconsin Lawyer)
- Contributing author/editor to forthcoming revisions to AAMI TIR57:2016 and ANSI/AAMI SW96:2023
- Medical Device Vulnerability Scanning, forthcoming H-ISAC publication of multiple author-contributors
- Contributor to Playbook for Threat Modeling Medical Devices, MITRE Corporation and Medical Device Innovation Consortium (2021)
- Privacy Law Primer (chapter co-authored with Ellie K Vilendrer, Esq., Business Law Deskbook 2021 ed., Minnesota Practice, Thomson Reuters)
- Why the Equifax Breach Could be the Tipping Point (Thomson Reuters Westlaw® November, 2017)
- Minnesota State Bar Ass’n Computer & Technology Law Section blog(since 2007 – 2017), http://mntech.typepad.com | Permalink (2007-2011)
- A sale, a breach, a wave of class actions, The Daily Journal (San Francisco & Los Angeles legal publication), October 6, 2016
- What Lawyers Need to Know About Cyber Insurance (33 The Computer & Internet Lawyer 2, Feb., 2016)
- Cyber Insurance: What Minnesota Lawyers Need To Know, 72 BENCH & B. MINN. 16, 18 (Nov. 2015)
- Secrets to Effective Electronic Documents in the Appellate Process, GPSolo (American Bar Ass’n, Oct., 2015)
- Cyber Security Active Defense: Playing with Fire or Sound Risk Management? 20 Rich. J.L. & Tech 12 (2014)
- “Professional Ethics for the Digital Forensics Discipline” Digital Forensic Investigator News (Part 1, Winter/Spring, 2014; Part 2, summer, 2014)
- Official (ISC)²® Guide to the Cyberforensics Certified Professional (CFCP) CBK® (Code of Ethics chapter – July, 2014)
- Using Technology to Facilitate Production of E-Discovery, 40 Wlm. Mitchell L. Rev. 588 (2014)
- “Hacking Back”: Legitimate Corporate Security or Risky Business? The CIP Report, George Mason Univ. Center for Infrastructure Protection & Homeland Security (October, 2013)
- “Incorporating Extrinsic Evidence into the Digital Forensics Investigation,” Digital Forensic Investigator News (Winter/Spring, 2013)
- “Data Encryption in Criminal Cases” Forensic Focus Newsletter (April, 2012)
- Interview: Nancy Crotti, “Cloud Control: Feeling at ease with online files,” Minn. Lawer, 03/2012
- Collaborating with a Digital Forensics Expert: Ultimate Tag Team or Disastrous Duo, 38 Wlm. Mitchell L. Rev. 353 (Jan., 2012)
- “AccessData FTK 4.0: Initial Impressions” ForensicFocus.com (March 12, 2012).
- “Is your client an attorney? Be aware of possible constraints on your investigation. ” Forensic Focus Newsletter (“Part 1,” Sept. 29, 2011; “Part 2,” Nov. 29, 2011).