Position / Title:
jennifer at law dot stanford dot edu
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Yesterday's report from the independent Privacy and Civil Liberties Oversight Board, or PCLOB, confirms what Christopher Sprigman and I said back in June of last year in our New York Times Op Ed “The Criminal NSA”. The NSA’s telephone record metadata program, in which it collects the calling records of almost everyone inside the United States, is illegal. Amend that: it’s screamingly illegal. Flat out.
When should courts follow legal precedent and when should the law change? This is a debate that underlies this month’s contrary decisions about the constitutionality of government collection of telephone call metadata under section 215 of the USA PATRIOT Act. And despite this week’s dual holdings in favor of the government—on this issue and on the issue of laptop border searches—a judicial consensus may be emerging that the Fourth Amendment must evolve along with technology and government surveillance capabilities.
Yesterday, I wrote that the report from the President’s Review Group on Intelligence and Communications Technologies--"Liberty And Security In A Changing World”—suggests reforms that would improve U.S. surveillance law’s protection of the rights of foreigners. My non US-person friends seem underwhelmed, so I thought I’d take a moment to elaborate on the changes I’m talking about. Read More.
Objections to Magistrate Judge's Report and Recommendation to deny the Petition, plus supporting documents (supporting declaration of Jennifer Granick, administrative motion, proposed orders).
Last week, the Justice Department filed criminal charges against a North Korean operative for a malware attack that endangered hospital systems and crippled the computers of businesses, governments, and individuals around the world. Americans might be surprised to learn that the software used for this 2017 attack — known as “WannaCry” — was based on a hacking tool created by the U.S. government itself.
Included in this PDF are:
For decades, U.S. policies on international data sharing have balanced privacy, principles of comity (respect for the jurisdiction of other countries), and respect for Congress’ power to regulate foreign affairs. Foreign countries seeking data held by U.S. companies generally must follow a process laid out in Mutual Legal Assistance Treaties, or MLATs, which are agreements between governments that facilitate cooperation in investigations. Increasingly, however, countries have complained that the MLAT process in the U.S. is slow and that it allows the U.S.
"Riana Pfefferkorn, associate director of surveillance and cybersecurity at Stanford University’s Center for Internet and Society, said the strategy provided a false choice. "There’s this fundamental gut-level disgust that basically everyone has for the abuse of children,” Pfefferkorn said. “So, you can paint people who are trying to protect security and enhance [digital] protections as unsympathetic to preventing child sex abuse. I think it’s extremely cynical.”
Concerns are growing around privacy and government surveillance in today’s hyper-connected world. Technology is smarter and faster than ever — and so are government strategies for listening in.
"“We are thinking very much about functionality. What happens if the box is taken? Then obviously, if the box is taken we have technological concerns about the contents escaping,” Granick said. She added, “if someone does either subpoena or hack their way into the box we need to make sure that they’re not going to be able to see anything, without any opportunity for us to get into court to challenge it."
"“YouTube as a private company is well within its rights,” said Jennifer Granick, a speech and technology expert at the American Civil Liberties Union. But “YouTube will make mistakes, and over-censor.”"
"Jennifer Granick, a surveillance and cybersecurity counsel with the ACLU, explains that the purpose of the law “isn’t necessarily to protect the tech companies, but to protect the American people in having a platform where you can post information and post our stories, because if the platforms were liable for information that their users publish, then they wouldn’t be able to publish that information. They would have to go through some kind of advanced review process.”"
Come meet CIS and hear about our exciting work and ways to get involved.
On January 19, 2012, Kim DotCom was arrested in a dramatic raid after being indicted on federal criminal charges that he knew that his website, MegaUpload, was a haven of piracy and counterfeiting. In the days that followed, the media commented on the presumed guilt of MegaUpload. In this debate, Jim argues that the law and evidence clearly point to MegaUpload's officers being found guilty, while Jennifer will argue that the MegaUpload case is built on unprecedented and wrongheaded interpretations of copyright law, and thus the principles should be found not guilty.
Prompted by the Google Street View WiFi sniffing scandal, the question of whether and how the law regulates interception of unencrypted wireless communications has become a hot topic in the courts, in the halls of the FCC, on Capitol Hill, and in the security community. Are open WiFi communications protected by federal wiretap law, unprotected, or some strange mix of the two? (Surprise: it may be the last one, so you'll want to come learn the line between what's probably illegal sniffing and what's probably not.)
Has it really been 15 years? Time really flies when keeping up with Moore's law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community--private, public, and independent practitioners alike—could come together and exchange research, theories, and experiences with no vendor influences. That idea seems to have caught on. Jeff knew that Black Hat could serve the community best if it concentrated on finding research by some of the brightest minds of the day, and he had an uncanny knack for finding them.
Three dimensional printing turns bits into atoms. The technology is simply amazing. These machines draw on programming, art and engineering to enable people to design and build intricate, beautiful, functional jewelry, machine parts, toys and even shoes. In the commercial sector, 3D printing can revolutionize supply chains as well. As the public interest group Public Knowledge wrote once, "It will be awesome if they don't screw it up."
Jennifer Granick appears at 46:44.
Ask Americans what the Constitution’s most important feature is, and most will say it’s the guarantees of liberty enshrined in the Bill of Rights, the first ten amendments of the Constitution.
Americans are fiercely proud of their freedoms but they continue to argue about what those basic rights are and how they can be sustained in a changing world. Are our rights unchangeable, or should they evolve over time? What is the proper role for the courts in interpreting rights?