High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Over at Just Security, I have a new piece on the Washington Post's interesting story about the increasingly aggressive role some federal magistrate judges are playing in policing criminal investigations involving digital media.
Today the Fourth Circuit refrained from deciding the first legal challenge to government seizure of the master encryption keys that secure our communications with web sites and email servers. Nevertheless, the Court upheld contempt of court sanctions, because of the Lavabit owner’s foot dragging during proceedings. Lavabit had failed to raise the substantive issues below, it decided, thus precluding appellate review.
Today I filed comments with the Privacy and Civil Liberties Oversight Board (PCLOB) in connection with its hearing on section 702 of the FISA Amendments Act. That law is the legal basis for the PRISM surveillance program and involves warrantless collection of communications contents via targeting non-U.S. individuals or entities reasonably believed to be located abroad. I've written previously about questions the PCLOB should investigate with regards to section 702.
Last week, the New York Times reported that the U.S. is spying on router company Huawei to get information about the Chinese government and to learn how to surveil our allies and other countries that might purchase Huawei routers. On Just Security, I refute the argument of some that it is not “in the public interest to reveal how democracies spy on dictatorships”.
Objections to Magistrate Judge's Report and Recommendation to deny the Petition, plus supporting documents (supporting declaration of Jennifer Granick, administrative motion, proposed orders).
Last week, the Justice Department filed criminal charges against a North Korean operative for a malware attack that endangered hospital systems and crippled the computers of businesses, governments, and individuals around the world. Americans might be surprised to learn that the software used for this 2017 attack — known as “WannaCry” — was based on a hacking tool created by the U.S. government itself.
Included in this PDF are:
- Petitioners' Notice of Motion and Motion for Leave to file Motion for Reconsideration
- Exhibit A Petitioners' [Proposed] Notice of Motion and Motion for Reconsideration of the May 1, 2018 Order
- Declaration of Jennifer Stisa Granick in Support of Petitioners' Motion for Leave to File a Motion for Reconsideration
- [Proposed] Order Granting Petitioners' Motion for Leave to File Motion for Reconsideration Pursuant to Local Rule 7-9.
For decades, U.S. policies on international data sharing have balanced privacy, principles of comity (respect for the jurisdiction of other countries), and respect for Congress’ power to regulate foreign affairs. Foreign countries seeking data held by U.S. companies generally must follow a process laid out in Mutual Legal Assistance Treaties, or MLATs, which are agreements between governments that facilitate cooperation in investigations. Increasingly, however, countries have complained that the MLAT process in the U.S. is slow and that it allows the U.S.
"Some cyberlaw experts fear a ruling against Grindr will put the creativity of the internet as we know it at risk. They say that requiring platforms to more closely monitor users would give an advantage to tech giants like Facebook, Twitter, and Google while hindering smaller startups with niche audiences, including Grindr. It would be more expensive to start new businesses online because of the cost of hiring watchdogs, said Jennifer Granick, surveillance and cybersecurity counsel at the American Civil Liberties Union.
""So far, we've likely only seen the tip of the iceberg when it comes to the government’s use of hacking in criminal and immigration investigations,” Jennifer Granick, the ACLU's surveillance and cybersecurity counsel, said in a statement after the suit was filed."
"Jennifer Granick, the ACLU’s surveillance and cybersecurity counsel, said the public “deserves to know why the government thought it could dismantle measures that protect their right to privacy online.”
"If voice-based accent detection can determine a person’s ethnic background, it opens up a new category of information that is incredibly interesting to the government, said Jennifer King, director of consumer privacy at Stanford Law School’s Center for Internet and Society.
“If you’re a company and you’re creating new classifications of data, and the government is interested in them, you’d be naive to think that law enforcement isn’t going to come after it,” she said.
"“The question in these cases often is, ‘What’s the minimum of interference?’ ” said Jennifer Granick, surveillance and cybersecurity counsel at the American Civil Liberties Union."
Stanford CIS brings together scholars, academics, legislators, students, programmers, security researchers, and scientists to study the interaction of new technologies and the law and to examine how the synergy between the two can either promote or harm public goods like free speech, innovation, privacy, public commons, diversity, and scientific inquiry
Co-hosted and presented by The Tech Museum of Innovation and the San Jose Museum of Art.
For more information and to purchase tickets visit: https://www.eventbrite.com/e/death-of-the-open-internet-a-black-hat-qa-w...
Welcome to Startup Policy Lab’s The Policy Series, hosted by Runway! For our first October session, we go one-on-one with Jennifer Granick, Director of Civil Liberties at Stanford Center for Internet and Society (CIS).
The Lifecycle of a Revolution
Speaker: Jennifer Granick, Stanford University NSA stands for National Security Agency, but the agency is at odds with itself in its security mission. Undermining global encryption standards, intercepting Internet companies' data center transmissions, using auto-update to spread malware, and demanding law enforcement back doors in products and services are all business as usual. What legal basis does NSA and FBI have for these demands, and do they make the country more or less safe?
In the realm of big data, privacy is a significant, and often controversial, issue. In this clip, Jennifer Granick takes on the alleged trade-off between “privacy versus security,” and proposes an alternate framing. She is the Director of Civil Liberties at the Center for Internet and Society at Stanford Law School.
This video is a preview of Worldview Stanford's unique online and on-campus course, Behind and Beyond Big Data. We are currently accepting applications for the course. Learn more and apply here: worldview.stanford.edu/course/behind-and-beyond-big-data
The director of civil liberties for the Center for Internet and Society at Stanford Law School discusses net neutrality, privacy and the NSA.
"State of Surveillance" examines new technologies police departments are using to fight crime and the civil liberties concerns raised by these tools.
Law enforcement agencies say that many of the technologies make it easier to solve and, in some cases, even prevent crime. But privacy advocates warn that expanded databases could become dragnets that are increasingly populated with information about law-abiding citizens.
The following is audio of the conference last week in Austin hosted by the Intelligence Studies Project, a joint venture of the Strauss Center and Clements Center at the University of Texas at Austin. The conference was entitled, “The National Security Agency at the Crossroads.”
The Internet makes lives better, around the world, in ways people couldn't have imagined not even a decade ago. It sparks prosperity, inspires dissent, improves education, and encourages freedom. But all of the good it does is under threat, largely from governments. David Drummond will discuss where those threats are coming from, and the critical importance for us all that we overcome them. Drummond joined Google in 2002, initially as vice president of corporate development.