The Center for Internet and Society at Stanford Law School is a leader in the study of the law and policy around the Internet and other emerging technologies.
Government Hacking
-
Government Hacking: Evidence & Court Disclosure of Vulnerabilities (Past Event)
Join Mozilla and Stanford CIS for the fourth and final installment in our series of conversations about government hacking. Information from our first three events, discussing the cybersecurity risk of government hacking, the vulnerabilities disclosure process, and recent changes to Federal Rule of Criminal Procedure 41, can be found here, here, and here. Read more about Government Hacking: Evidence & Court Disclosure of Vulnerabilities
-
Government Hacking: Assessing and Mitigating the Security Risk (Past Event)
Join Mozilla and Stanford Center for Internet and Society for the third installment in a series of conversations about government hacking. Information from our first two events is available online: discussing the vulnerabilities disclosure process and recent changes to Federal Rule of Criminal Procedure 41. Read more about Government Hacking: Assessing and Mitigating the Security Risk
-
Government Hacking: Vulnerabilities Equities Process (Past Event)
Join Mozilla and Stanford CIS for the second installment in a series of conversations about government hacking. Information from our first event, discussing the upcoming changes to Federal Rule of Criminal Procedure 41, are available at that event’s page here. Read more about Government Hacking: Vulnerabilities Equities Process
-
Government Hacking: Rule 41 (Past Event)
On December 1, 2016, significant and controversial changes to Federal Rule of Criminal Procedure 41 are scheduled go into effect. Today, Rule 41 prohibits a federal judge from issuing a search warrant outside of the judge’s district, with some exceptions.Traditionally, federal judges may only issue warrants that will be executed within their own districts. The revised Rule 41 would permit judges to issue search and seizure warrants for computers outside their jurisdictions, in two circumstances: if the computer’s true location has been hidden through technological means (such as Tor), or, in a computer-hacking investigation under the CFAA, if the affected computers are located in five or more districts. Read more about Government Hacking: Rule 41