High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Round Two of my debate with Orin Kerr about whether the bulk collection of phone call records is regulated by the Fourth Amendment is now published on the Just Security blog. In this round, I argue that normative considerations, including those associated with bulk data collection, are explicitly part of existing Fourth Amendment jurisprudence. The 1979 case of Smith v.
A new online platform launches today called Just Security, a forum on law, rights, and U.S. national security. Just Security aims to promote principled and pragmatic solutions to the problems decision-makers face in U.S. national security law and practice. The legal analysis and policy prescriptions proposed by Just Security will provide balanced and broad perspectives currently missing in the national security dialogue.
We here at CIS are delighted to welcome Giancarlo Frosio to our team. Giancarlo is our new Intermediary Liability Fellow, studying the ways that liabilities, immunities and safe harbors for global communications platforms affect freedom of expression and innovation online. Frosio is an Italian lawyer, fluent in several languages, with an S.J.D. and an LL.M. from Duke University Law School and an LL.M. from the University of Strathclyde in the U.K.
On July 30, 2013, I had the pleasure of having dinner with General Keith Alexander, Director of the National Security Agency. Just a few weeks earlier, NYU Law Professor Christopher Sprigman and I had called the NSA’s activities “criminal” in the digital pages of the New York Times, so I thought it was particularly gracious of him to sit with me. [more]
Today, Lavabit, an email service provider that promised its customers better privacy and security than other publicly available services, shut its doors. Reading between the lines of a cryptic message posted on the site’s homepage, about six weeks ago the service was served with some kind of demand for user information, as well as a gag order preventing the company from disclosing both the details of that order as well as its very existence. Rather than cooperate, owner Ladar Levison has decided to close the doors on his 10-year-old company. In his letter
Last week’s big cybersecurity news was that the FBI obtained a court order to force Apple to develop new software that would bypass several iPhone security features so the FBI can attempt to unlock the work phone of one of the San Bernardino shooters. Apple plans to challenge that order. (Full disclosure: I am planning on writing a technologists’ amicus brief on Apple’s side in that challenge.)
On Friday, Congress will vote on a mutated version of security threat sharing legislation that had previously passed through the House and Senate. These earlier versions would have permitted private companies to share with the federal government categories of data related to computer security threat signatures. Companies that did so would also receive legal immunity from liability under the Electronic Communications Privacy Act (ECPA) and other privacy laws.
Here’s the latest in the encryption case we’ve been writing about in which the Justice Department is asking Magistrate Judge James Orenstein to order Apple to unlock a criminal defendant’s passcode-protected iPhone. The government seized and has authority to search the phone pursuant to a search warrant.
Pending before federal magistrate judge James Orenstein is the government’s request for an order obligating Apple, Inc. to unlock an iPhone and thereby assist prosecutors in decrypting data the government has seized and is authorized to search pursuant to a warrant.
Last week, we wrote about an order from a federal magistrate judge in New York that questioned the government’s ability, under an ancient federal law called the All Writs Act, to compel Apple to decrypt a locked device which the government had seized and is authorized to search pursuant to a warrant.
Three dimensional printing turns bits into atoms. The technology is simply amazing. These machines draw on programming, art and engineering to enable people to design and build intricate, beautiful, functional jewelry, machine parts, toys and even shoes. In the commercial sector, 3D printing can revolutionize supply chains as well. As the public interest group Public Knowledge wrote once, "It will be awesome if they don't screw it up."
Jennifer Granick will be presenting her paper Principles for Regulation of Government Surveillance in the Age of Big Data.
For more information visit: http://law.scu.edu/hightech/2013-internet-law-wip.cfm
Solutions to many pressing economic and societal challenges lie in better understanding data. New tools for analyzing disparate information sets, called Big Data, have revolutionized our ability to find signals amongst the noise. Big Data techniques hold promise for breakthroughs ranging from better health care, a cleaner environment, safer cities, and more effective marketing. Yet, privacy advocates are concerned that the same advances will upend the power relationships between government, business and individuals, and lead to prosecutorial abuse, racial or other profiling, discrimination, redlining, overcriminalization, and other restricted freedoms.
The Journal of National Security Law & Policy and The Georgetown Center on National Security and the Law proudly present "Swimming in the Ocean of Big Data: National Security in an Age of Unlimited Information".
Synopsis: CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film explores the impact this new connectivity has on our ability to remain human while maintaining our personal privacy and security. As we struggle to comprehend the wide-spanning socio-technical fallout causd by data collection and social networks, oru modern culture is caught in an undercurrent of cyber-attacks, identity theft and privacy invasion.