Position / Title:
jennifer at law dot stanford dot edu
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Over at Just Security, I have a post about the latest iteration of the USA Freedom Act. Basically, civil liberties groups are withdrawing support for the bill because it no longer clearly ends bulk collection of metadata and other information under Section 215 of the Patriot Act, the NSL statutes, and the intelligence pen/trap statute as the bill was supposed to do. I explain the language changes that gutted the bill, and lament the state of Congress. Read more here.
Yesterday I attended a conference at the Hoover Institution on “Intelligence Challenges.” I also spoke on a panel in the morning about Civil Liberties. A version of my prepared remarks is below. Ben Wittes has an interesting post on the event.
Over at Just Security I have an analysis of the USA Freedom Act as changed by a recent Manager's Amendment. Basically, I conclude that the Manager's Amendment fails to prohibit "back door searches" for US person information caught up in the NSA dragnet, which was supposedly one of the mail goals of the original bill.
Yesterday afternoon, the White House put out a statement describing its view of vulnerability disclosure: the contentious issue of whether and when government agencies should disclose their knowledge of computer vulnerabilities. Over at Just Security, I highlight some parts of the announcement for further thought.
Last week, we argued that the public discussion surrounding two of the government’s most controversial mass surveillance programs – PRISM and Upstream – has not sufficiently acknowledged the broad scope of collection under these programs, which take place under section 702 of the Foreign Intelligence Surveillance Act (FISA). In short, hiding behind the counterterrorism justifications for section 702 is a broad surveillance program that sucks up massive amounts of irrelevant private data.
The legal authority behind the controversial PRISM and Upstream surveillance programs used by the NSA to collect large swaths of private communications from leading Internet companies – Section 702 of the Foreign Intelligence Surveillance Act (FISA) – is scheduled to expire on December 31, 2017. In recent months, Congress began to review these programs to assess whether to renew, reform, or retire section 702. Unfortunately, it appears the debate has already been skewed by misconceptions about the true scope of surveillance conducted under the contentious provision.
Slides from the BlackHat 2016 presentation by Jennifer Granick and Riana Pfefferkorn titled "When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement."
"“Congress has subpoena power, of course,” says Al Gidari, the director of privacy at Stanford Law School’s Center for Internet and Society, who previously represented several big tech companies in national security cases.
"Albert Gidari, Director of Privacy for the Center for Internet and Society at Stanford Law School, told us he agrees with the EFF’s argument:
Asking for metadata on everyone that visits a particular website implicates more than just the particularity required by the 4th Amendment. It implicates the 1st Amendment rights of anyone that visited the site.
"It can be tempting to try to hide information or use technological tricks such as 'duress passwords' that, if used instead of the genuine one, unlock the device but keep a portion of the data hidden and encrypted. But Jennifer Granick, who studies cybersecurity law at Stanford University in California, warns against such strategies. “You don't want to lie to a government agent. That can be a crime.” And border guards are not likely to be sympathetic to the argument that a researcher has a legal duty to prevent anyone from seeing confidential data.
"Jennifer Stisa Granick is an attorney, educator and the director of civil liberties for the Center for Internet and Society (CIS) at Stanford Law School. A prominent advocate for intellectual property law, free speech and privacy, she has represented a number of high-profile hackers, including internet activist Aaron Swartz.
"Not only will it likely reveal more about the secret NSA surveillance program, but it could also potentially end such surveillance, explained Jennifer Granick, director of civil liberties at Stanford Law School’s Center for Internet and Society. “This is a chance for a real challenge to the programmatic nature of the surveillance.”"
Stanford CIS brings together scholars, academics, legislators, students, programmers, security researchers, and scientists to study the interaction of new technologies and the law and to examine how the synergy between the two can either promote or harm public goods like free speech, innovation, privacy, public commons, diversity, and scientific inquiry
Co-hosted and presented by The Tech Museum of Innovation and the San Jose Museum of Art.
For more information and to purchase tickets visit: https://www.eventbrite.com/e/death-of-the-open-internet-a-black-hat-qa-w...
Welcome to Startup Policy Lab’s The Policy Series, hosted by Runway! For our first October session, we go one-on-one with Jennifer Granick, Director of Civil Liberties at Stanford Center for Internet and Society (CIS).
The Lifecycle of a Revolution
Speaker: Jennifer Granick, Stanford University NSA stands for National Security Agency, but the agency is at odds with itself in its security mission. Undermining global encryption standards, intercepting Internet companies' data center transmissions, using auto-update to spread malware, and demanding law enforcement back doors in products and services are all business as usual. What legal basis does NSA and FBI have for these demands, and do they make the country more or less safe?
If you attended a recent march to protest, wrote a check to the ACLU, or recently visited a politically leaning website, consider yourself an activist, says Stanford legal scholar Granick. Not only might the government be watching you, but your digital footprint could end up being visible to people and organizations you never imagined would care. Know your risks and take safety precautions, advises Granick, or don’t be surprised at the troubling outcome.
In the post-Snowden era, we don't have to tell you how important it is to stay engaged with (and vigilant about) the surveillance state in America. Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and Society, and author of the new book American Spies — and this week she joins us for an in-depth discussion about the surveillance sta
Intelligence agencies in the U.S. (aka the American Spies) are exceedingly aggressive, pushing and sometimes bursting through the technological, legal and political boundaries of lawful surveillance.
The Snowden revelations, while dramatic, have done little to amp up public concern about personal surveillance.
After all, thanks to technology, electronic spying is cheap — so cheap the government can’t afford not to do it.
The internet makes access to information incredibly easy, and we normally see that as a good thing. But what if the information being accessed is details of our private lives? And what if the person accessing them is a government intelligence agency? This week we speak with Jennifer Granick, author of "American Spies" and director of civil liberties at the Stanford Center for Internet and Society, about the quest for privacy in the age of surveillance.