High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Last Friday, a New York federal judge joined in the contentious current debate over whether tech companies should be forced to provide law enforcement the ability to decipher encrypted data stored on smartphones and in the cloud.
In two years, section 702 of the FISA Amendments Act will expire. It is essential the public to have confidence that any reforms to section 702 will actually address problems with PRISM and Upstream surveillance. To get that confidence, we have to know a lot more about how the intelligence community is using section 702. That understanding requires more investigation.
Today we sent a letter to lawmakers expressing security experts' opposition to the Cybersecurity Information Sharing Act (CISA) as well as two other pending bills that purport to be about security information sharing, the Protecting Cyber Networks Act (PCNA), and the National Cybersecurity Protection Advancement Act of 2015. These experts agree that the information sharing bills unnecessarily waive privacy rights because they focus on sharing information beyond that needed for cybersecurity.
Objections to Magistrate Judge's Report and Recommendation to deny the Petition, plus supporting documents (supporting declaration of Jennifer Granick, administrative motion, proposed orders).
Last week, the Justice Department filed criminal charges against a North Korean operative for a malware attack that endangered hospital systems and crippled the computers of businesses, governments, and individuals around the world. Americans might be surprised to learn that the software used for this 2017 attack — known as “WannaCry” — was based on a hacking tool created by the U.S. government itself.
Included in this PDF are:
- Petitioners' Notice of Motion and Motion for Leave to file Motion for Reconsideration
- Exhibit A Petitioners' [Proposed] Notice of Motion and Motion for Reconsideration of the May 1, 2018 Order
- Declaration of Jennifer Stisa Granick in Support of Petitioners' Motion for Leave to File a Motion for Reconsideration
- [Proposed] Order Granting Petitioners' Motion for Leave to File Motion for Reconsideration Pursuant to Local Rule 7-9.
For decades, U.S. policies on international data sharing have balanced privacy, principles of comity (respect for the jurisdiction of other countries), and respect for Congress’ power to regulate foreign affairs. Foreign countries seeking data held by U.S. companies generally must follow a process laid out in Mutual Legal Assistance Treaties, or MLATs, which are agreements between governments that facilitate cooperation in investigations. Increasingly, however, countries have complained that the MLAT process in the U.S. is slow and that it allows the U.S.
"“We are thinking very much about functionality. What happens if the box is taken? Then obviously, if the box is taken we have technological concerns about the contents escaping,” Granick said. She added, “if someone does either subpoena or hack their way into the box we need to make sure that they’re not going to be able to see anything, without any opportunity for us to get into court to challenge it."
"“YouTube as a private company is well within its rights,” said Jennifer Granick, a speech and technology expert at the American Civil Liberties Union. But “YouTube will make mistakes, and over-censor.”"
"Jennifer Granick, a surveillance and cybersecurity counsel with the ACLU, explains that the purpose of the law “isn’t necessarily to protect the tech companies, but to protect the American people in having a platform where you can post information and post our stories, because if the platforms were liable for information that their users publish, then they wouldn’t be able to publish that information. They would have to go through some kind of advanced review process.”"
"In a Stanford CIS blog post, Pfefferkorn said she found hope in the opinion. “For one, the court rejected the government’s unfounded attempt to argue that we lack standing to seek to unseal these records at all,” she wrote. “It is well-established that members of the public have standing to seek to unseal sealed court records, and the court refused to depart from that settled law.
"Jennifer Granick, surveillance and cybersecurity counsel for the American Civil Liberties Union, told USA TODAY Sports that delayed-notice warrants often lack guidelines to protect bystanders caught during surveillance under a provision of the Patriot Act.
Come meet CIS and hear about our exciting work and ways to get involved.
On January 19, 2012, Kim DotCom was arrested in a dramatic raid after being indicted on federal criminal charges that he knew that his website, MegaUpload, was a haven of piracy and counterfeiting. In the days that followed, the media commented on the presumed guilt of MegaUpload. In this debate, Jim argues that the law and evidence clearly point to MegaUpload's officers being found guilty, while Jennifer will argue that the MegaUpload case is built on unprecedented and wrongheaded interpretations of copyright law, and thus the principles should be found not guilty.
Prompted by the Google Street View WiFi sniffing scandal, the question of whether and how the law regulates interception of unencrypted wireless communications has become a hot topic in the courts, in the halls of the FCC, on Capitol Hill, and in the security community. Are open WiFi communications protected by federal wiretap law, unprotected, or some strange mix of the two? (Surprise: it may be the last one, so you'll want to come learn the line between what's probably illegal sniffing and what's probably not.)
Has it really been 15 years? Time really flies when keeping up with Moore's law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community--private, public, and independent practitioners alike—could come together and exchange research, theories, and experiences with no vendor influences. That idea seems to have caught on. Jeff knew that Black Hat could serve the community best if it concentrated on finding research by some of the brightest minds of the day, and he had an uncanny knack for finding them.
In the realm of big data, privacy is a significant, and often controversial, issue. In this clip, Jennifer Granick takes on the alleged trade-off between “privacy versus security,” and proposes an alternate framing. She is the Director of Civil Liberties at the Center for Internet and Society at Stanford Law School.
This video is a preview of Worldview Stanford's unique online and on-campus course, Behind and Beyond Big Data. We are currently accepting applications for the course. Learn more and apply here: worldview.stanford.edu/course/behind-and-beyond-big-data
The director of civil liberties for the Center for Internet and Society at Stanford Law School discusses net neutrality, privacy and the NSA.
"State of Surveillance" examines new technologies police departments are using to fight crime and the civil liberties concerns raised by these tools.
Law enforcement agencies say that many of the technologies make it easier to solve and, in some cases, even prevent crime. But privacy advocates warn that expanded databases could become dragnets that are increasingly populated with information about law-abiding citizens.
The following is audio of the conference last week in Austin hosted by the Intelligence Studies Project, a joint venture of the Strauss Center and Clements Center at the University of Texas at Austin. The conference was entitled, “The National Security Agency at the Crossroads.”
The Internet makes lives better, around the world, in ways people couldn't have imagined not even a decade ago. It sparks prosperity, inspires dissent, improves education, and encourages freedom. But all of the good it does is under threat, largely from governments. David Drummond will discuss where those threats are coming from, and the critical importance for us all that we overcome them. Drummond joined Google in 2002, initially as vice president of corporate development.