High Res Photo of Jennifer Granick
Photo credit: Michael Sugrue
Tomorrow, the U.S. House Judiciary Committee will hold a hearing on reforming the Computer Fraud and Abuse Act (CFAA). Before you start thinking, "it's about time", note that the witness list includes someone from the Department of Justice, the Federal Bureau of Investigation and the Business Software Alliance. The only reform proponent is former computer crime prosecutor Orin Kerr, now a Professor at George Washington University Law School.
Today, Rep. Zoe Lofgren in conjunction with Reps.
Yesterday, the White House declared "It's Time to Legalize Cell Phone Unlocking". The call was in immediate response to a petition with over 114,000 signatures on it, decrying the Librarian of Congress' decision last October to let lapse an exemption ensuring people who unlocked their phones would not be in violation of the anti-circumvention provisions of the Digital Millennium Copyright Act of 1998 (DMCA),
Thanks to our speakers and everyone who came out last night for the Innovation or Exploitation event, highlighting problems the Computer Fraud and Abuse Act (CFAA) poses for security research, innovation, tinkering, academic research and libraries. I learned a lot, including that much of what librarians do today -- like making court records and academic articles widely available and cataloging books -- requires "scraping" and da
Reply brief in support of January 2019 objections to magistrate judge's report and recommendation.
Come meet CIS and hear about our exciting work and ways to get involved.
On January 19, 2012, Kim DotCom was arrested in a dramatic raid after being indicted on federal criminal charges that he knew that his website, MegaUpload, was a haven of piracy and counterfeiting. In the days that followed, the media commented on the presumed guilt of MegaUpload. In this debate, Jim argues that the law and evidence clearly point to MegaUpload's officers being found guilty, while Jennifer will argue that the MegaUpload case is built on unprecedented and wrongheaded interpretations of copyright law, and thus the principles should be found not guilty.
Prompted by the Google Street View WiFi sniffing scandal, the question of whether and how the law regulates interception of unencrypted wireless communications has become a hot topic in the courts, in the halls of the FCC, on Capitol Hill, and in the security community. Are open WiFi communications protected by federal wiretap law, unprotected, or some strange mix of the two? (Surprise: it may be the last one, so you'll want to come learn the line between what's probably illegal sniffing and what's probably not.)
Has it really been 15 years? Time really flies when keeping up with Moore's law is the measure. In 1997, Jeff Moss held the very first Black Hat. He gathered together some of the best hackers and security minds of the time to discuss the current state of the hack. A unique and neutral field was created in which the security community--private, public, and independent practitioners alike—could come together and exchange research, theories, and experiences with no vendor influences. That idea seems to have caught on. Jeff knew that Black Hat could serve the community best if it concentrated on finding research by some of the brightest minds of the day, and he had an uncanny knack for finding them.