Position / Title:
jennifer at law dot stanford dot edu
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Over at Just Security, I have a new piece on the Washington Post's interesting story about the increasingly aggressive role some federal magistrate judges are playing in policing criminal investigations involving digital media.
Today the Fourth Circuit refrained from deciding the first legal challenge to government seizure of the master encryption keys that secure our communications with web sites and email servers. Nevertheless, the Court upheld contempt of court sanctions, because of the Lavabit owner’s foot dragging during proceedings. Lavabit had failed to raise the substantive issues below, it decided, thus precluding appellate review.
Today I filed comments with the Privacy and Civil Liberties Oversight Board (PCLOB) in connection with its hearing on section 702 of the FISA Amendments Act. That law is the legal basis for the PRISM surveillance program and involves warrantless collection of communications contents via targeting non-U.S. individuals or entities reasonably believed to be located abroad. I've written previously about questions the PCLOB should investigate with regards to section 702.
Last week, the New York Times reported that the U.S. is spying on router company Huawei to get information about the Chinese government and to learn how to surveil our allies and other countries that might purchase Huawei routers. On Just Security, I refute the argument of some that it is not “in the public interest to reveal how democracies spy on dictatorships”.
Encryption helps human rights workers, activists, journalists, financial institutions, innovative businesses, and governments protect the confidentiality, integrity, and economic value of their activities. However, strong encryption may mean that governments cannot make sense of data they would otherwise be able to lawfully access in a criminal or intelligence investigation.
Arguing that a defendant’s conviction for website hacking should be overturned because legitimate, highly valuable security and privacy research commonly employs techniques that are essentially identical to what the defendant did and that such independent research is of great value to academics, government regulators and the public even when – often especially when — conducted without a website owner’s permission.
Arguing that if the court should not compel Apple to create software to enable unlocking and search of the San Bernardino shooter’s iPhone, it will jeopardize digital and personal security more generally.
After the Estate of James Joyce refused to allow a scholar to quote Joyce in her book, we successfully defended her right under the fair use doctrine to use the quotes she needed to illustrate her scholarship. After we prevailed in the case, the Estate paid $240,000 of our client’s legal fees.
Today, the Office of the Director of National Intelligence (ODNI) announced that it would stop some of the surveillance it conducts on the telecommunications backbone under authority granted by section 702 of the FISA Amendments Act.
On Wednesday, the Republican chair of the House Intelligence Committee, Devin Nunes (R-CA), gave a press conference in which he reported that Trump transition team members’ communications were intercepted by US intelligence agencies through “incidental collection.” This follows on Nunes’ concerns, after Michael Flynn stepped down following intelligence reports that he had talked to the Russian ambassador.
"Riana Pfefferkorn, associate director of surveillance and cybersecurity at Stanford University’s Center for Internet and Society, said the strategy provided a false choice. "There’s this fundamental gut-level disgust that basically everyone has for the abuse of children,” Pfefferkorn said. “So, you can paint people who are trying to protect security and enhance [digital] protections as unsympathetic to preventing child sex abuse. I think it’s extremely cynical.”
Concerns are growing around privacy and government surveillance in today’s hyper-connected world. Technology is smarter and faster than ever — and so are government strategies for listening in.
"“We are thinking very much about functionality. What happens if the box is taken? Then obviously, if the box is taken we have technological concerns about the contents escaping,” Granick said. She added, “if someone does either subpoena or hack their way into the box we need to make sure that they’re not going to be able to see anything, without any opportunity for us to get into court to challenge it."
"“YouTube as a private company is well within its rights,” said Jennifer Granick, a speech and technology expert at the American Civil Liberties Union. But “YouTube will make mistakes, and over-censor.”"
"Jennifer Granick, a surveillance and cybersecurity counsel with the ACLU, explains that the purpose of the law “isn’t necessarily to protect the tech companies, but to protect the American people in having a platform where you can post information and post our stories, because if the platforms were liable for information that their users publish, then they wouldn’t be able to publish that information. They would have to go through some kind of advanced review process.”"
The American Bar Association White Collar Crime Committee Presents:
The Internet’s Own Boy: A Discussion Of U.S. v. Aaron Swartz And The Prosecution And Defense Of Cyber-Crime
Featuring Brian KNAPPENBERGER, Filmmaker And Director Of The Internet’s Own Boy, Jennifer GRANICK, Director Of Civil Liberties For The Center For Internet And Society At Stanford Law School, And More.
Only LLM and SPILS students are invited.
Lunch will be provided.
Please join Giancarlo Frosio and Jennifer Granick on Tuesday for a presentation on the activities of the Stanford Intermediary Liability Lab (SILLab).
Because of Edward Snowden’s remarkable public service, we know that the National Security Agency, with the cooperation of some large firms, has amassed an unprecedented database of personal information. The ostensible goal in collecting that information is to protect national security. The effect, according to Reed Hundt, is to undermine democracy.
Come meet CIS and hear about our exciting work and ways to get involved.
You will meet:
Barbara van Schewick - Associate Professor of Law and Helen L. Crocker Faculty Scholar at Stanford Law School, Director of Stanford Law School’s Center for Internet and Society, and Associate Professor (by courtesy) of Electrical Engineering, Stanford University
Jennifer Granick - Director - Civil Liberties
Aleecia McDonald - Director - Privacy
Three dimensional printing turns bits into atoms. The technology is simply amazing. These machines draw on programming, art and engineering to enable people to design and build intricate, beautiful, functional jewelry, machine parts, toys and even shoes. In the commercial sector, 3D printing can revolutionize supply chains as well. As the public interest group Public Knowledge wrote once, "It will be awesome if they don't screw it up."
Jennifer Granick appears at 46:44.
Ask Americans what the Constitution’s most important feature is, and most will say it’s the guarantees of liberty enshrined in the Bill of Rights, the first ten amendments of the Constitution.
Americans are fiercely proud of their freedoms but they continue to argue about what those basic rights are and how they can be sustained in a changing world. Are our rights unchangeable, or should they evolve over time? What is the proper role for the courts in interpreting rights?