High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Yesterday's report from the independent Privacy and Civil Liberties Oversight Board, or PCLOB, confirms what Christopher Sprigman and I said back in June of last year in our New York Times Op Ed “The Criminal NSA”. The NSA’s telephone record metadata program, in which it collects the calling records of almost everyone inside the United States, is illegal. Amend that: it’s screamingly illegal. Flat out.
When should courts follow legal precedent and when should the law change? This is a debate that underlies this month’s contrary decisions about the constitutionality of government collection of telephone call metadata under section 215 of the USA PATRIOT Act. And despite this week’s dual holdings in favor of the government—on this issue and on the issue of laptop border searches—a judicial consensus may be emerging that the Fourth Amendment must evolve along with technology and government surveillance capabilities.
Yesterday, I wrote that the report from the President’s Review Group on Intelligence and Communications Technologies--"Liberty And Security In A Changing World”—suggests reforms that would improve U.S. surveillance law’s protection of the rights of foreigners. My non US-person friends seem underwhelmed, so I thought I’d take a moment to elaborate on the changes I’m talking about. Read More.
The Eleventh Circuit Court of Appeals said no this week to tracking your movements using data from your cell phone without a warrant when it declared that this information is constitutionally protected.
Reed Hundt proposes democratic action in response to our government’s secret infrastructure for monitoring and controlling modern communications. “Citizens,” he writes, “should be encouraged to take action on behalf of their own privacy and security.”
Yesterday afternoon, the White House put out a statement describing its vulnerability disclosure policies: the contentious issue of whether and when government agencies should disclose their knowledge of computer vulnerabilities. The statement falls far short of a commitment to network security for all and fails to provide the reassurance the global public needs in the midst of the NSA’s security scandal.
“He is trying to do the right thing,” Ms. Granick said."
To celebrate the one-year anniversary of the Stanford Cryptography Policy Project, we are holding an afternoon event highlighting our research and accomplishments over the past year. As our keynote speakers, it is our pleasure to welcome the Honorable Stephen W. Smith, Magistrate Judge of the Southern District of Texas, and Paul S. Grewal, former Magistrate Judge of the Northern District of California.
What kind of surveillance assistance can the U.S. government force companies to provide? This issue has entered the public consciousness due to the FBI's demand in February that Apple write software to help it access the San Bernardino shooter's encrypted iPhone. Technical assistance orders can go beyond the usual government requests for user data, requiring a company to actively participate in the government's monitoring of the targeted user(s).
On Wednesday, February 17, The Center on Democracy, Development and the Rule of Law at Stanford, The Center for International Governance Innovation, and the Research Advisory Network of the Global Commission on Internet Governance will present an all-day conference entitled "New Alliances in Cybersecurity, Human Rights and Internet Governance." The conference will discuss the challenges of creating a regime of internet governance that pays attention to security and human rights in the digital context.
Over the course of two days in February 2016, the Strauss Center at the University of Texas-Austin will host a unique and timely conference focused on the legal and policy dimensions of cybersecurity.