High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Round Two of my debate with Orin Kerr about whether the bulk collection of phone call records is regulated by the Fourth Amendment is now published on the Just Security blog. In this round, I argue that normative considerations, including those associated with bulk data collection, are explicitly part of existing Fourth Amendment jurisprudence. The 1979 case of Smith v.
A new online platform launches today called Just Security, a forum on law, rights, and U.S. national security. Just Security aims to promote principled and pragmatic solutions to the problems decision-makers face in U.S. national security law and practice. The legal analysis and policy prescriptions proposed by Just Security will provide balanced and broad perspectives currently missing in the national security dialogue.
We here at CIS are delighted to welcome Giancarlo Frosio to our team. Giancarlo is our new Intermediary Liability Fellow, studying the ways that liabilities, immunities and safe harbors for global communications platforms affect freedom of expression and innovation online. Frosio is an Italian lawyer, fluent in several languages, with an S.J.D. and an LL.M. from Duke University Law School and an LL.M. from the University of Strathclyde in the U.K.
On July 30, 2013, I had the pleasure of having dinner with General Keith Alexander, Director of the National Security Agency. Just a few weeks earlier, NYU Law Professor Christopher Sprigman and I had called the NSA’s activities “criminal” in the digital pages of the New York Times, so I thought it was particularly gracious of him to sit with me. [more]
Today, Lavabit, an email service provider that promised its customers better privacy and security than other publicly available services, shut its doors. Reading between the lines of a cryptic message posted on the site’s homepage, about six weeks ago the service was served with some kind of demand for user information, as well as a gag order preventing the company from disclosing both the details of that order as well as its very existence. Rather than cooperate, owner Ladar Levison has decided to close the doors on his 10-year-old company. In his letter
Last week, the Justice Department filed criminal charges against a North Korean operative for a malware attack that endangered hospital systems and crippled the computers of businesses, governments, and individuals around the world. Americans might be surprised to learn that the software used for this 2017 attack — known as “WannaCry” — was based on a hacking tool created by the U.S. government itself.
Included in this PDF are:
- Petitioners' Notice of Motion and Motion for Leave to file Motion for Reconsideration
- Exhibit A Petitioners' [Proposed] Notice of Motion and Motion for Reconsideration of the May 1, 2018 Order
- Declaration of Jennifer Stisa Granick in Support of Petitioners' Motion for Leave to File a Motion for Reconsideration
- [Proposed] Order Granting Petitioners' Motion for Leave to File Motion for Reconsideration Pursuant to Local Rule 7-9.
For decades, U.S. policies on international data sharing have balanced privacy, principles of comity (respect for the jurisdiction of other countries), and respect for Congress’ power to regulate foreign affairs. Foreign countries seeking data held by U.S. companies generally must follow a process laid out in Mutual Legal Assistance Treaties, or MLATs, which are agreements between governments that facilitate cooperation in investigations. Increasingly, however, countries have complained that the MLAT process in the U.S. is slow and that it allows the U.S.
Jennifer Granick, Director of Civil Liberties, will speaking at the ISSA-LA Summitt.
More information: https://issalasummit9.wpengine.com/?page_id=285/#Granick
Title: American Spies, Modern Surveillance, and You
Jennifer Granick talks about how notions of privacy have changed over the years and where she thinks things are headed in the future. She is a professor at the Stanford School of Law and Director of Civil Liberties at the Center for Internet and Society, where she specializes in the intersection of engineering, privacy and the law.
What kind of surveillance assistance can the U.S. government force companies to provide? This issue has entered the public consciousness due to the FBI's demand in February that Apple write software to help it access the San Bernardino shooter's encrypted iPhone. Technical assistance orders can go beyond the usual government requests for user data, requiring a company to actively participate in the government's monitoring of the targeted user(s).
In this week's feature interview we're chatting with Stanford's very own Jennifer Granick about a recent ruling in a Virginia court that appears to give the FBI permission to hack into any computer it wants, sans warrant. Well that's what the headlines are screaming, anyway. But as you'll hear, it's not quite that black and white.
""What was remarkable was that the public hadn't seen the argument surfaced," says Jennifer Granick at the Stanford Center for Internet and Society. She says Judge Orenstein was trying to stoke a public debate. "Judge Orenstein had concerns about whether the government's legal argument was a valid legal argument."