High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
On Friday, Congress will vote on a mutated version of security threat sharing legislation that had previously passed through the House and Senate. These earlier versions would have permitted private companies to share with the federal government categories of data related to computer security threat signatures. Companies that did so would also receive legal immunity from liability under the Electronic Communications Privacy Act (ECPA) and other privacy laws.
Here’s the latest in the encryption case we’ve been writing about in which the Justice Department is asking Magistrate Judge James Orenstein to order Apple to unlock a criminal defendant’s passcode-protected iPhone. The government seized and has authority to search the phone pursuant to a search warrant.
Pending before federal magistrate judge James Orenstein is the government’s request for an order obligating Apple, Inc. to unlock an iPhone and thereby assist prosecutors in decrypting data the government has seized and is authorized to search pursuant to a warrant.
Last week, we wrote about an order from a federal magistrate judge in New York that questioned the government’s ability, under an ancient federal law called the All Writs Act, to compel Apple to decrypt a locked device which the government had seized and is authorized to search pursuant to a warrant.
"“YouTube as a private company is well within its rights,” said Jennifer Granick, a speech and technology expert at the American Civil Liberties Union. But “YouTube will make mistakes, and over-censor.”"
"Jennifer Granick, a surveillance and cybersecurity counsel with the ACLU, explains that the purpose of the law “isn’t necessarily to protect the tech companies, but to protect the American people in having a platform where you can post information and post our stories, because if the platforms were liable for information that their users publish, then they wouldn’t be able to publish that information. They would have to go through some kind of advanced review process.”"
"In a Stanford CIS blog post, Pfefferkorn said she found hope in the opinion. “For one, the court rejected the government’s unfounded attempt to argue that we lack standing to seek to unseal these records at all,” she wrote. “It is well-established that members of the public have standing to seek to unseal sealed court records, and the court refused to depart from that settled law.
"Jennifer Granick, surveillance and cybersecurity counsel for the American Civil Liberties Union, told USA TODAY Sports that delayed-notice warrants often lack guidelines to protect bystanders caught during surveillance under a provision of the Patriot Act.
"“Normally we think of the judiciary as being the overseer, but as the technology has gotten more complex, courts have had a harder and harder time playing that role,” said Jennifer Granick, surveillance and cybersecurity counsel at the American Civil Liberties Union. “We’re depending on companies to be the intermediary between people and the government.”"
Three dimensional printing turns bits into atoms. The technology is simply amazing. These machines draw on programming, art and engineering to enable people to design and build intricate, beautiful, functional jewelry, machine parts, toys and even shoes. In the commercial sector, 3D printing can revolutionize supply chains as well. As the public interest group Public Knowledge wrote once, "It will be awesome if they don't screw it up."
Jennifer Granick will be presenting her paper Principles for Regulation of Government Surveillance in the Age of Big Data.
For more information visit: http://law.scu.edu/hightech/2013-internet-law-wip.cfm
Solutions to many pressing economic and societal challenges lie in better understanding data. New tools for analyzing disparate information sets, called Big Data, have revolutionized our ability to find signals amongst the noise. Big Data techniques hold promise for breakthroughs ranging from better health care, a cleaner environment, safer cities, and more effective marketing. Yet, privacy advocates are concerned that the same advances will upend the power relationships between government, business and individuals, and lead to prosecutorial abuse, racial or other profiling, discrimination, redlining, overcriminalization, and other restricted freedoms.
Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer.
The Journal of National Security Law & Policy and The Georgetown Center on National Security and the Law proudly present "Swimming in the Ocean of Big Data: National Security in an Age of Unlimited Information".