FastSaying

The bad guy will have gone through many, many steps to conceal his identity, through pirated or hacked accounts.

Mark Rasch

IdentityWill

Related Quotes

This guy didn't participate in the misappropriation, and probably didn't conspire with anybody to misappropriate it. Once it's posted online, it's just not secret anymore. At some point it becomes public information.
— Mark Rasch
ConspireGuyMisappropriation
They sell it, and they make money off the personal information that I have given them. And what we are recognizing now on the Internet is that personal information is commodity.
— Mark Rasch
InformationMoney
What I would as a parent argue is that I can consent to my kid's monitoring. Hey, it's my kid. I can read their mail, but the federal law doesn't make any distinction. If I'm reading anybody's communications without their consent or without a consent of one party, I'm violating federal law.
— Mark Rasch
Reverse engineering is not clearly illegal.
— Mark Rasch
Engineering
They're going to have to grow that identity with some younger players and some of the veteran guys that they brought in to fill that void. You know, the one thing obviously in Jersey is Marty is there. That's a huge reason why they've been successful for so long, as well.
— Mark Recchi
Identity