Position / Title:
jennifer at law dot stanford dot edu
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Third year student Jennifer Elliott prevailed in her efforts to quash a subpoena issued by Nymox Corporation seeking personal identifying information about a psuedonymous Yahoo! message board poster. The District Court Judge ruled that the posts in questions were not actionable and upheld the right to speak anonymously on-line.
In the past dozen years, we have witnessed an accelerating set of changes in
the ways in which music and movies are made and distributed. Enormous
social and economic benefits could be reaped through full exploitation of
the new technologies. Sadly, the legal system has thus far frustrated
rather than facilitated realization of those benefits. This talk will
explain how and why things went awry and then explore three alternative ways
in which the legal system might be reformed.
Cyberlaw Clinic student Jennifer Elliott argued before Judge William Alsup on Thursday that the Court should quash a subpoena issued by Nymox Pharmaceutical Corporation to Yahoo! Inc. for the identities of several online pseudonymous posters. The Court took the matter under submission and a ruling is expected soon.
Reply brief of Movants-Appellants EFF, ACLU, and Riana Pfefferkorn to the Ninth Circuit in our appeal from the district court's denial of our motion to unseal filings in a sealed case wherein the Department of Justice allegedly sought to compel Facebook to comply with a wiretap order for Facebook's end-to-end encrypted voice calling app, Messenger.
Opening brief of Movants-Appellants EFF, ACLU, and Riana Pfefferkorn to the Ninth Circuit in our appeal from the district court's denial of our motion to unseal filings in a sealed case wherein the Department of Justice allegedly sought to compel Facebook to comply with a wiretap order for Facebook's end-to-end encrypted voice calling app, Messenger.
Brief of amici curiae ACLU, ACLU of Georgia, and Riana Pfefferkorn in support of appellant Victor Mobley in Mobley v. State, a Georgia Supreme Court case presenting the question of whether the Fourth Amendment requires a warrant for the seizure of digital data stored by a vehicle -- specifically, a car's event data recorder (EDR).
Reply brief in support of January 2019 objections to magistrate judge's report and recommendation.
"Jennifer Granick, the ACLU’s surveillance and cybersecurity counsel, said the public “deserves to know why the government thought it could dismantle measures that protect their right to privacy online.”
"If voice-based accent detection can determine a person’s ethnic background, it opens up a new category of information that is incredibly interesting to the government, said Jennifer King, director of consumer privacy at Stanford Law School’s Center for Internet and Society.
“If you’re a company and you’re creating new classifications of data, and the government is interested in them, you’d be naive to think that law enforcement isn’t going to come after it,” she said.
"“The question in these cases often is, ‘What’s the minimum of interference?’ ” said Jennifer Granick, surveillance and cybersecurity counsel at the American Civil Liberties Union."
"The Apple-FBI fight over encryption was a rare event. Most of the time, the public never has a clue when authorities come knocking and ask a company for “technical assistance” to help get access to digital communications. That makes the true scale of U.S. government surveillance hard to assess—even if we can glean that it’s pervasive nowadays. And probably equally as important, it doesn’t really allow the public to tell just how difficult it is for prosecutors to convince a judge that communications should be turned over.
"Jennifer Granick had harsh words at the Our Security Advocates Conference for the growing state of mass surveillance and government hacking in the United States.
Granick, surveillance and cybersecurity counsel at the American Civil Liberties Union, took the stage at OURSA on Tuesday to discuss the state of modern surveillance and hacking performed by the U.S. government, arguing that both cross the line of traditional legal searches.
To celebrate the one-year anniversary of the Stanford Cryptography Policy Project, we are holding an afternoon event highlighting our research and accomplishments over the past year. As our keynote speakers, it is our pleasure to welcome the Honorable Stephen W. Smith, Magistrate Judge of the Southern District of Texas, and Paul S. Grewal, former Magistrate Judge of the Northern District of California.
What kind of surveillance assistance can the U.S. government force companies to provide? This issue has entered the public consciousness due to the FBI's demand in February that Apple write software to help it access the San Bernardino shooter's encrypted iPhone. Technical assistance orders can go beyond the usual government requests for user data, requiring a company to actively participate in the government's monitoring of the targeted user(s).
On Wednesday, February 17, The Center on Democracy, Development and the Rule of Law at Stanford, The Center for International Governance Innovation, and the Research Advisory Network of the Global Commission on Internet Governance will present an all-day conference entitled "New Alliances in Cybersecurity, Human Rights and Internet Governance." The conference will discuss the challenges of creating a regime of internet governance that pays attention to security and human rights in the digital context.
Over the course of two days in February 2016, the Strauss Center at the University of Texas-Austin will host a unique and timely conference focused on the legal and policy dimensions of cybersecurity.
Synopsis: CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film explores the impact this new connectivity has on our ability to remain human while maintaining our personal privacy and security. As we struggle to comprehend the wide-spanning socio-technical fallout causd by data collection and social networks, oru modern culture is caught in an undercurrent of cyber-attacks, identity theft and privacy invasion.