Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and Society. Jennifer returns to Stanford after working with the internet boutique firm of Zwillgen PLLC. Before that, she was the Civil Liberties Director at the Electronic Frontier Foundation. Jennifer practices, speaks and writes about computer crime and security, electronic surveillance, consumer privacy, data protection, copyright, trademark and the Digital Millennium Copyright Act. From 2001 to 2007, Jennifer was Executive Director of CIS and taught Cyberlaw, Computer Crime Law, Internet intermediary liability, and Internet law and policy. Before teaching at Stanford, Jennifer spent almost a decade practicing criminal defense law in California. She was selected by Information Security magazine in 2003 as one of 20 "Women of Vision" in the computer security field. She earned her law degree from University of California, Hastings College of the Law and her undergraduate degree from the New College of the University of South Florida.
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Yesterday afternoon, the White House put out a statement describing its view of vulnerability disclosure: the contentious issue of whether and when government agencies should disclose their knowledge of computer vulnerabilities. Over at Just Security, I highlight some parts of the announcement for further thought.
Over at Just Security, I have a new piece on the Washington Post's interesting story about the increasingly aggressive role some federal magistrate judges are playing in policing criminal investigations involving digital media.
Today the Fourth Circuit refrained from deciding the first legal challenge to government seizure of the master encryption keys that secure our communications with web sites and email servers. Nevertheless, the Court upheld contempt of court sanctions, because of the Lavabit owner’s foot dragging during proceedings. Lavabit had failed to raise the substantive issues below, it decided, thus precluding appellate review.
Today I filed comments with the Privacy and Civil Liberties Oversight Board (PCLOB) in connection with its hearing on section 702 of the FISA Amendments Act. That law is the legal basis for the PRISM surveillance program and involves warrantless collection of communications contents via targeting non-U.S. individuals or entities reasonably believed to be located abroad. I've written previously about questions the PCLOB should investigate with regards to section 702.
After the Estate of James Joyce refused to allow a scholar to quote Joyce in her book, we successfully defended her right under the fair use doctrine to use the quotes she needed to illustrate her scholarship. After we prevailed in the case, the Estate paid $240,000 of our client’s legal fees.
In this case, two archives challenged statutes that extended copyright terms unconditionally—the Copyright Renewal Act and the Copyright Term Extension Act (CTEA)—as unconstitutional under Copyright Clause and the First Amendment.
Last week’s big cybersecurity news was that the FBI obtained a court order to force Apple to develop new software that would bypass several iPhone security features so the FBI can attempt to unlock the work phone of one of the San Bernardino shooters. Apple plans to challenge that order. (Full disclosure: I am planning on writing a technologists’ amicus brief on Apple’s side in that challenge.)
On Friday, Congress will vote on a mutated version of security threat sharing legislation that had previously passed through the House and Senate. These earlier versions would have permitted private companies to share with the federal government categories of data related to computer security threat signatures. Companies that did so would also receive legal immunity from liability under the Electronic Communications Privacy Act (ECPA) and other privacy laws.
Here’s the latest in the encryption case we’ve been writing about in which the Justice Department is asking Magistrate Judge James Orenstein to order Apple to unlock a criminal defendant’s passcode-protected iPhone. The government seized and has authority to search the phone pursuant to a search warrant.
Pending before federal magistrate judge James Orenstein is the government’s request for an order obligating Apple, Inc. to unlock an iPhone and thereby assist prosecutors in decrypting data the government has seized and is authorized to search pursuant to a warrant.
"“How can we tell if the court process is legitimate if so much of it is under seal?” asked Jennifer Granick, director of civil liberties at Stanford Law School’s Center for Internet and Society."
"“The lawsuit is asking for two things,” said Jennifer Granick, the director of civil liberties at Stanford’s Center for Internet and Society.
“That people be notified eventually, if they are spied on, and, two, it’s asking for a much more scrupulous and discriminating use of gag orders, which are now seemingly routine when they are supposed to be extraordinary.”"
"However, it's unclear how Microsoft's lawsuit will fare. It would be "premature to guess" how successful Microsoft is likely to be, Jennifer Granick, the director of civil liberties at the Stanford Center for Internet and Society, said in an email."
"n addition, defense counsel would undoubtedly demand the right for their own third-party experts to have access not only to the source code, but to further demand the right to simulate the testing environment and run this code on their own systems in order to confirm the veracity of evidence.
On Wednesday, February 17, The Center on Democracy, Development and the Rule of Law at Stanford, The Center for International Governance Innovation, and the Research Advisory Network of the Global Commission on Internet Governance will present an all-day conference entitled "New Alliances in Cybersecurity, Human Rights and Internet Governance." The conference will discuss the challenges of creating a regime of internet governance that pays attention to security and human rights in the digital context.
Over the course of two days in February 2016, the Strauss Center at the University of Texas-Austin will host a unique and timely conference focused on the legal and policy dimensions of cybersecurity.
Co-hosted and presented by The Tech Museum of Innovation and the San Jose Museum of Art.
""What was remarkable was that the public hadn't seen the argument surfaced," says Jennifer Granick at the Stanford Center for Internet and Society. She says Judge Orenstein was trying to stoke a public debate. "Judge Orenstein had concerns about whether the government's legal argument was a valid legal argument."
Jennifer Granick, Director of Civil Liberties, is in this episode discussing Stingray technology.
"Truth and Power" highlights Daniel Rigmaiden, the young tech-genius who exposed STINGRAY - a secret government surveillance technology that hacks into your cell phones. All New Episodes - Fridays at 10 p.m. ET / PT on Pivot. Learn more at http://bit.ly/TruthAndPowerPivot.
ABOUT THE SHOW
""The phone companies may already have data retention obligations under the Communications Act, but there's no additional obligation as a result of USA Freedom having passed," says Jennifer Granick, director of civil liberties at Stanford University's Center for Internet and Society.
"A year ago, a European Court said people had a right to demand Google take down certain search results about them. Theright to be forgotten was born.
“That idea is spreading in some areas,” says Jennifer Granick, Director of Civil Liberties for the Stanford Center for Internet and Society.