Jennifer Granick in the News

Total Page:16

File Type:pdf, Size:1020Kb

Jennifer Granick in the News JENNIFER GRANICK IN THE NEWS source: Stanford Law School Library/Digital Reserves Granick CNET News.com Feb. 1, 2001, Thur. Cyberlawyer: Don't Blame The Hackers, by Robert Lemos Granick The Atlanta Journal And Const. p.4E Feb. 7, 2001, Wed. Parody Webmaster Defends CNNf Spoof, by Jeffry Scott Granick Information Security p.66 Mar-01 We're The Freedom People, Interview by Richard Thieme Granick Wired News 2:00 AM PST Mar. 9, 2001, Fri. Lawyers With Hacking Skills, by Aparna Kumar Granick The San Francisco Chronicle p.B1 Mar. 15, 2001, Thur. Intimate Details: Credit Cards, Social Security Numbers And… Granick ZDNet News May 1, 2001, Tue. Lawyers Slam FBI 'Hack', by Robert Lemos Granick The Lawyers Weekly May 18, 2001, Fri. Is 'Hacktivism' A Crime?, by Lesia Stangret Granick Stanford Lawyer p.8 Summer 2001 Cyber Expert Lessig Founds Center For Internet And Society Granick InfoWorld Daily News Jul. 16, 2001, Mon. Def Con, Black Hat: Hacker Shows Offer Tips, Tricks Granick ZDNet News from ZDWire Jul. 17. 2001, Tue. FBI Nabs Russion Expert At Def Con, by Robert Lemos Granick ZDNet News from ZDWire Jul. 18, 2001, Wed. Arrest Fuels Adobe Copyright Fight, by Robert Lemos Granick TheStandard.com (The Industry St.) Jul. 18, 2001, Wed. Russsian Arrested For Alleged DMCA Violations, IDG Granick InfoWorld Daily News Jul. 18, 2001, Wed. Def Con: Russian Arrested For Alleged Copyright Violations Granick EFF (http://www.eff.org/) Jul. 22, 2001, Sun. For Immediate Release: July 17, 2001: S.F., The FBI arrested… Granick The Milwaukee Journal Sentinel Jul. 31, 2001 Tue. Man Accused Of Hacking Alleges Illegal Search Granick American Libraries Sep. 1, 2001, Sat. DMCA Nets A Criminal Prosecution And Prompts A Protest Granick The San Francisco Chronicle p.A21 Oct. 3, 2001, Wed. Computer Hacker - Vandal Or Terrorist, by Jennifer Granick Granick Los Angeles Times p.T1 Oct. 25, 2001, Thur. Safeguards Punish Consumers, Not Pirates, by Dave Wilson Granick Computerworld Nov. 12, 2001, Mon. Tech - QuickStudy: Reverse-Engineering, by Mattew Schwartz Granick The Milwaukee Journal Sentinel Nov. 25, 2001, Sun. Qualcomm Hacker Case Set To Begin Soon In San Diego Granick Palo Alto Daily News p.9 Dec. 10, 2001, Mon. Stanford Student Wins Privacy Ruling Granick Los Angeles Times Cal. Prt.2, p.7 Dec. 11, 2001, Tue. The State: Ruling Backs Anonymity Of Net Messages; Legal: … Granick San Francisco Chronicle p.B3 Dec. 12, 2001, Wed. Judge Asks Firm To Prove Libel In Internet Postings; Until Then… Granick Business Wire Dec. 13, 2001, Thur. Internet Law Pioneer And Former Yahoo! General Counsel… Granick Daily Journal Newswire Dec. 17, 2001, Mon. Arguments Weren't Bad For A 3rd-Year Law Student Granick NPR Dec. 18, 2001, Tue. Forum With Michael Krasny Granick San Francisco Chronicle p.B3 Jan. 8, 2002, Tue. Ampex Wins A Round In Its Online Slander Lawsuit Granick The Filter (Berkman Center) Feb. 25, 2002, Mon. Chilling Effects Launches Granick AP Newswire Feb. 25, 2002, Mon. AS Web Legal Rights: New Web Site--www.chillingeffects.org--… Granick PC World Mar. 1, 2002, Fri. New Technologies Threaten Privacy: The FBI's 'Magic Lantern'… Granick California Law Bus. p.16 Mar. 4, 2002, Mon. Law Schools - Intellectual Property Blowout - Trend Setters: … Granick SecurityFocus News 6:20 P PT Mar. 18, 2002, Mon. Heckenkamp Jailed At Court Appearance; Alleged Hacker Angers… JENNIFER GRANICK IN THE NEWS source: Stanford Law School Library/Digital Reserves Granick AP Newswire Mar. 20, 2002, Wed. Accused eBay Hacker Makes Bizarre Court Appearance Granick San Francisco Chronicle p.B1 Mar. 20, 2002, Wed. Hacker Suspect Sent To Jail After Hearing, by Carrie Kirby Granick The San Diego Union-Tribune Mar. 21, 2002, Thur. Courtroom Antics Keep Tech Hacker Behind Bars Granick The Recorder p.1 Apr. 25, 2002, Thur. Student Counsel, by Brenda Sandburg Granick ZDNet News from ZDWire May 2, 2002, Thur. DrinkOrDie Pirate Sent To Prison, by Lisa M. Bowman Granick The New York Times Sec.C, p.7 Jun. 10, 2002, Mon. Gotcha! Private Internet Police Use Stings To Detect Online… Granick Criminal Defense Weekly Jun. 24, 2002, Mon. Cyber Crime According To Defense Attorney Jennifer Stisa Granick Granick ZDNet News from ZDWire Jul. 1, 2002, Mon. Wireless Attacks: Wave A White Flag?, by Robert Lemos Granick Network World Jul. 1, 2002, Mon. Op Ed.: Do Pirates Deserve Jail Time?, by Jennifer Granick Granick Chicago Sun-Times p.6 Jul. 11, 2002, Thur. Deceptive Names Promote Anti-Abortion Site Granick The Washington Post p.A02 Jul. 26, 2002, Fri. Yale Tells FBI Of Rival's Breach Of Web Site; Princeton Suspends… Granick The Philadelphia Inquirer Jul. 28, 2002, Sun. Princeton Aide Breaks Into Yale Web Site Granick Reuters Engl. News Serv. Aug. 3, 2002, Sat. Computers Under Attack Can Hack Back, Expert Says Granick InfoWorld Daily News Aug. 5, 2002, Mon. Def Con: Politics Plays Larger Role This Year, by Sam Costello Granick InfoWorld Dialy News Aug. 5, 2002, Mon. Generic: Black Hat, Def Con Rumors Swirl, Tricks Continue Granick The Recorder Aug. 22, 2002, Thur. "Friends" In High Places Granick The Recorder Aug. 29, 2002, Thur. "Friends" In High Places; In A Sign Of What's At Stake, State… Granick ZDNet.com News Sept. 23, 2002, Mon. When Is Hacking A Crime? Granick Newsweek p.38 Oct. 14, 2002, Mon. I Was A Wi-Fi Freeloader, by Steven Levy Granick SierraTimes.com Oct. 30, 2002, Wed. More Surveillance On The Way, by Robin Mejia Granick Information Security p.61 Nov-02 Retrospective & Crystal Ball, by Anne Saita Granick EFFector Nov. 1, 2002, Fri. Stanford's Cyberlaw Clinic To Defend Domain Name Owners Granick Wired News Nov. 6, 2002, Wed. Stage Set For Homeland Act, by Ryan Singel Granick The New York Times (online) Nov. 13, 2002, Wed. Technology: Greeting Card Virus Licensed To Spread Granick Security Focus 12:23 PM P Nov. 21, 2002, Thur. Lawyers Fear Misuse Of Cyber Murder Law; Defense Attorneys… Granick Los Angeles Times p.A1 Dec. 4, 2002, Wed. A Move To Muzzle E-Mail; A Court May Decide If A Fired... Granick The New York Times Dec. 18, 2002, Wed. Russian Company Acquitted Of Digital Piracy, by Mark Richtel Granick The Filter Dec. 19, 2002, Thur. In The News - EXTRA: Granick Tom's Hard News 04:46 A ET Dec. 19, 2002, Thur. Software Hackers 1, DMCA 0 Granick Palo Alto Weekly p.14 Jan. 1, 2003, Wed. Un-Wired: Roaming The Streets For Free Internet Access Granick The New York Times p.A1 Jan. 21, 2003, Tue. Courts Split On Internet Bans, by Matt Richtel Granick BusinessWeek Online 3:47 P PT Feb. 20, 2003, Thur. Lawyers: Hackers Sentenced Too Harshly, by Robert Lemos JENNIFER GRANICK IN THE NEWS source: Stanford Law School Library/Digital Reserves Granick 2600 News Feb. 23, 2003, Sun. Defense Lawyers Warn That Computer Abuse Penalties Don't Fit… Granick San Jose Mercury News p.5E Feb. 27, 2003, Thur. Is Open Access An Invitation? Techie Hobby Seen As Security Threat Granick Law Technology Product News Mar-03 Web Watch: Lawyers As Pundits, Via Blogs, by Robert J. Ambrogi Granick San Jose Mercury Mar. 30, 2003, Sun. Ex-Intel Worker's Case Goes To High Court; State Supreme... Granick Chicago Tribune Sep. 16, 2001, Sun. Legal Matters - Suits May Redefine Internet Libel Law Granick Stockwatch 17:00 ET Apr. 14, 2003, Mon. World's Largest E-Security Event Opens In San Francisco Granick San Jose Mercury News p.C1 Apr. 16, 2003, Wed. Honeypot Snares Raise Ethical And Legal Issues Granick Security Focus 9:19 PM Apr. 15, 2003. Tue. Debate: Should You Hire A Hacker?, by Deborah Radcliff Granick Computer Reseller News p.82 Apr. 21, 2003, Mon. RSA Conference Spurs Debate -- Hacker Hiring, Security… Granick San Francisco Chronicle p.A1 Apr. 28, 2003, Mon. Protester's Trials -- History On Their Side; On Eve Of Court Dates,... Granick BusinessWeek Online May 16, 2003, Fri. IRC Operators May Out-Hack Fizzer; Administrators Of Internet... Granick San Jose Mercury News May 27, 2003, Tue. DVD Piracy Case Targets Free Speech; Set Thursday In State... Granick Newsweek Web Exclusive Jul. 11, 2003, Fri. An Early Issue Of The Comic That Inspired The New Adventure... Granick Texas Lawyer p.11 Jul. 14, 2003, Mon. Verdict Search; Computer Fraud and Abuse Act Granick PR Newswire Jul. 23, 2003, Wed. Black Hat Briefings 2003 Keynotes Include Top Computer... Granick CNet News.com 11:24 A PT Jul. 31, 2003, Thur. Black Hat Puts Hacker On Mock Trial, by Declan McCullagh Granick National Journal's Tech. Daily Aug. 13, 2003, Wed. Intellectual Property Granick San Francisco Bay Guardian Aug. 13, 2003, Wed. Why Go To Law School? For Activists, A Legal Career Might Help... Granick San Jose Mercury News Aug. 30, 2003, Sat. Minnesota Teenager Arrested In Search For Blaster Culprit Granick Information Security Sep-03 "Women Of Vision" Award Honors Women Whose Extraordinary… Granick Chronicle Of Higher Education Sept. 11, 2003, Thur. Law Students Offer Online Advice To People Accused Of Signal… Granick BBC News Online visited 9/29/03 Does Virtual Crime Need Real Justice?, by Mark Ward Granick AP Newswire 10:17 P ET Oct. 15, 2003, Wed. Prosecutors Admit Error In Conviction Granick Los Angeles Times Prt.3, p.1 Oct. 16, 2003, Thur. U.S. Admits Convicted Man Is No Hacker, by Joseph Men Granick PBS Oct. 17, 2003, Fri. Newshour With Jim Lehrer: About Wi-Fi Internet Access Granick Washington Internet Daily Oct. 22, 2003, Wed. Admission Of Bad Conviction Shows Hacking Act... Granick SecurityFocus 10:52 AM Oct. 24, 2003, Fri. Tech Ignorance, Vague Laws Lead To Mistaken Conviction Granick The Tallahassee Democrat Oct.
Recommended publications
  • By James Juo
    , by James Juo • AT AGE 14, Aaron Swartz was working with leading tech­ extortion by threat of damage to a computer.9 In addition nologists to craft standards for openly sharing informa­ to traditional computer hacking, the statute also has tion on the Interner.! He then helped Lawrence Lessig with been asserted against employees who take trade secrets Creative Commons, which promotes the use of simple, stored on their employer's computer before leaving to join standardized copyright licenses that give the public per­ the competition. IO In 1984, Congress enacted the CFAA mission to share and use creative works.2 At 19, he was to criminalize the hacking of computers in connection with a founding developer of Reddit, a widely used social national security, financial records, and government prop­ news Web site where users can post news links and vote erty.11 The statute was originally designed to cover unau­ on them.3 Aaron later became a political activist for thorized access of such protected computers having a Internet freedom and social justice issues and formed the specified federal interesr. 12 advocacy group Demand Progress.4 At 26, facing a crim­ The CFAA has been expanded a number of times. 13 inal trial under the Computer Fraud and Abuse Act For example, a 1994 amendment expanded the statute to (CFAA) for allegedly circumventing computer restric­ allow private entities to assert a civil cause of action and tions to an online database of academic articles, Aaron obtain compensatory damages and other equitable relief. 14 Swartz hanged himself in January.s In 1996, the CFAA was further amended to expand the Since then, Internet groups have criticized the U.S.
    [Show full text]
  • The Lost Nuance of Big Data Policing
    THE LOST NUANCE OF BIG DATA POLICING 94 TEX. L. REV. __ (forthcoming 2015) Jane Bambauer* The third party doctrine permits the government to collect consumer records without implicating the Fourth Amendment. The doctrine strains the reasoning of all possible conceptions of the Fourth Amendment and is destined for reform. So far, scholars and jurists have advanced proposals using a cramped analytical model that attempts to balance privacy and security. They fail to account for the filterability of data. Filtering can simultaneously expand law enforcement access to relevant information while reducing access to irrelevant information. Thus, existing proposals will distort criminal justice by denying police a resource that can cabin discretion, increase distributional fairness, and exculpate the wrongly accused. This Article offers the first comprehensive analysis of third party data in police investigations by considering interests beyond privacy and security. First, it shows how existing proposals to require suspicion or a warrant will inadvertently conflict with other constitutional values, including equal protection, the First Amendment, and the due process rights of the innocent. Then it offers surgical reforms that address the most problematic applications of the doctrine: suspect-driven data collection, and bulk data collection. Well-designed reforms to the third party doctrine will shut down the data collection practices that most seriously offend civil liberties without impeding valuable, liberty-enhancing innovations in policing.
    [Show full text]
  • September 11 Attacks
    Chapter 1 September 11 Attacks We’re a nation that is adjusting to a new type of war. This isn’t a conventional war that we’re waging. Ours is a campaign that will have to reflect the new enemy…. The new war is not only against the evildoers themselves; the new war is against those who harbor them and finance them and feed them…. We will need patience and determination in order to succeed. — President George W. Bush (September 11, 2001) Our company around the world will continue to operate in this sometimes violent world in which we live, offering products that reach to the higher and more positive side of the human equation. — Disney CEO Michael Eisner (September 11, 2001) He risked his life to stop a tyrant, then gave his life trying to help build a better Libya. The world needs more Chris Stevenses. — U.S. Secretary of State Hillary Clinton (September 12, 2012) We cannot have a society in which some dictators someplace can start imposing censorship here in the United States because if somebody is able to intimidate us out of releasing a satirical movie, imagine what they start doing once they see a documentary that they don’t like or news reports that they don’t like. That’s not who we are. That’s not what America is about. — President Barack Obama (December 19, 2014) 1.1 September 11, 2001 I was waking up in the sunny California morning on September 11, 2001. Instead of music playing on my radio alarm clock, I was hearing fragments of news broadcast about airplanes crashing into the Pentagon and the twin towers of the World Trade Center.
    [Show full text]
  • Download Legal Document
    UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK IN RE ORDER REQUIRING APPLE, INC. TO ASSIST IN THE EXECUTION OF A SEARCH WARRANT ISSUED BY THIS COURT. No. 1:15-mc-01902-JO BRIEF OF AMICI CURIAE AMERICAN CIVIL LIBERTIES UNION, NEW YORK CIVIL LIBERTIES UNION, ELECTRONIC FRONTIER FOUNDATION, AND JENNIFER GRANICK AND RIANA PFEFFERKORN Arthur Eisenberg Esha Bhandari Mariko Hirose Alex Abdo New York Civil Liberties Union American Civil Liberties Union 125 Broad Street, 19th Floor Foundation New York, NY 10004 125 Broad Street, 18th Floor Tel: 212-607-3300 New York, NY 10004 [email protected] Tel: 212-549-2500 [email protected] Jennifer Stisa Granick (CA Bar #168423) Andrew Crocker Director of Civil Liberties* Nathan D. Cardozo Riana Pfefferkorn (CA Bar #266817) Electronic Frontier Cryptography Policy Fellow* Foundation Stanford Law School 815 Eddy Street Center for Internet and Society San Francisco, CA 94109 559 Nathan Abbott Way Tel: 415-436-9333 Stanford, CA 94305 [email protected] Tel: 650-736-8675 [email protected] * For affiliation purposes only TABLE OF CONTENTS TABLE OF AUTHORITIES .............................................................................................................ii SUMMARY OF ARGUMENT .........................................................................................................2 BACKGROUND ...............................................................................................................................3 ARGUMENT .....................................................................................................................................3
    [Show full text]
  • Digital Switzerlands
    ARTICLE DIGITAL SWITZERLANDS KRISTEN E. EICHENSEHR† U.S. technology companies are increasingly standing as competing power centers that challenge the primacy of governments. This power brings with it the capacity to bolster or undermine governmental authority, as well as increasing public demands for the companies to protect users from governments. The companies’ power raises serious questions about how to understand their role. Scholars have proposed varying conceptions, suggesting that the companies should be understood as public utilities, information fiduciaries, surveillance intermediaries, or speech governors. This Article takes up another possibility, one suggested by the companies themselves: that they are “Digital Switzerlands.” The Digital Switzerlands concept encompasses two ideas: (1) that the companies are on par with, not subordinate to, the countries that try to regulate them, and (2) that they are, in some sense, neutral. This Article critically evaluates the plausibility of these claims and explores how the companies differ from other powerful private parties. The Digital Switzerlands concept sheds light on why the companies have begun to resist both the U.S. government and foreign governments, but it also means that the companies do not always counter governments. Understanding the relationship between companies, users, and governments as triangular, not purely hierarchical, * This Article reflects developments through February 2019, when it was finalized for publication. † Assistant Professor, UCLA School of Law. For
    [Show full text]
  • Perception Versus Punishment in Cybercrime James T
    Journal of Criminal Law and Criminology Volume 109 Article 4 Issue 2 Spring Spring 2019 Perception Versus Punishment in Cybercrime James T. Graves Alessandro Acquisti Ross Anderson Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons Recommended Citation James T. Graves, Alessandro Acquisti, and Ross Anderson, Perception Versus Punishment in Cybercrime, 109 J. Crim. L. & Criminology 313 (1019). https://scholarlycommons.law.northwestern.edu/jclc/vol109/iss2/4 This Criminology is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. 0091-4169/19/10902-0313 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 109, No. 2 Copyright © 2019 by James T. Graves, Alessandro Acquisti & Ross Anderson Printed in U.S.A. CRIMINOLOGY PERCEPTION VERSUS PUNISHMENT IN CYBERCRIME JAMES T. GRAVES, ALESSANDRO ACQUISTI & ROSS ANDERSON* TABLE OF CONTENTS I. INTRODUCTION .............................................................................. 314 II. BACKGROUND .............................................................................. 317 A. Factors Affecting Sentencing Under the Computer Fraud and Abuse Act ................................................................ 317 1. Maximum Sentences ................................................. 317 2. Sentencing Guidelines ..............................................
    [Show full text]
  • A REEVALUATION of the COMPUTER FRAUD and ABUSE ACT by Reid Skibelt
    CYBERCRIMES & MISDEMEANORS: A REEVALUATION OF THE COMPUTER FRAUD AND ABUSE ACT By Reid Skibelt ABSTRACT This Article contends that the Computer Fraud and Abuse Act is an overly punitive and largely ineffective approach to combating computer crime based on two fundamental critiques. The 1986 version of the CFAA contemplated a core distinction between harmless trespass and more substantial intrusions. Over time, this distinction has become ob- scured and is resulting in over-criminalization of offenders. Furthermore, the increased penalties for computer crime created by the USA PA- TRIOT Act, and the Cyber Security Enhancement Act, are unjust in ap- plication and ineffectual in deterring prospective computer criminals. TABLE OF CONTENTS I. IN TRO DUCTION ....................................................................................................... 9 10 II. THE EVOLUTION OF THE COMPUTER FRAUD AND ABUSE ACT ............................... 912 III. W HAT EXACTLY IS A "HACKER"? ..................................... .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. 917 IV. COPYING OF FILES AND THE TROPHY PROBLEM ..................................................... 922 V. M ENS REA AND THE $5,000 THRESHOLD ................................................................ 926 A. The Problem of "Resecuring" Costs .............................................................. 928 B. The Problem of Calculating Intangible Harms .............................................. 932 VI. THE USAPA AND THE PUNITIVE APPROACH TO CYBERCRIME ..............................
    [Show full text]
  • The National Security Agency at the Crossroads Speaker
    THE NATIONAL SECURITY AGENCY AT THE CROSSROADS SPEAKER BIOS WEDNESDAY, APRIL 2 8:30 pm EVENING ADDRESS [invitation only] Mr. John C. (Chris) Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. As the NSA Deputy Director, Mr. Inglis acted as the Agency's chief operating officer, responsible for guiding and directing strategies, operations and policy. Mr. Inglis holds advanced degrees in engineering and computer science from Columbia University, Johns Hopkins University, and the George Washington University. He is also a graduate of the Kellogg Business School executive development program, the USAF Air War College, Air Command and Staff College, and Squadron Officers' School. Mr. Inglis’ military career includes over 30 years of service in the US Air Force -- nine years on active duty and twenty-one years in the Air National Guard - - from which he retired as a Brigadier General in 2006. He holds the rating of Command Pilot and commanded units at the squadron, group, and joint force headquarters levels. Mr. Inglis' significant Awards include the Clements award as the US Naval Academy's Outstanding Military Faculty member (1984), three Presidential Rank Awards (2000, 2004, 2009), the USAF Distinguished Service Medal (2006), the Boy Scouts of America Distinguished Eagle Scout Award (2009), the Director of National Intelligence Distinguished Service Medal (2014), and The President’s National Security Medal (2014). THURSDAY, APRIL 3 8:50 am WELCOME REMARKS Bobby Chesney is Director of the Robert Strauss Center for International Security and Law and the Charles I.
    [Show full text]
  • Split Over the Use of the CFAA Against
    Split Over the Use of the CFAA In recent years, employers have used the Computer Fraud and Abuse Act (CFAA)’s focus on the issue of computer trespass against disloyal employees who take proprietary computer data to a competitor. However, lower courts are divided on the CFAA’s scope, and a circuit split has developed over interpretation of the CFAA on the question of authorized access. BY JAMES JUO 50 • THE FEDERAL LAWYER • JAN/FEB 2014 Against Disloyal Employees he Computer Fraud and Abuse Act allowing an unauthorized person to use the valid password of 13 14 (CFAA), a computer trespass statute, another; violating a website’s terms of service; and accessing information stored on an employer’s computer for a competing Thas been called “one of the broadest business.15 In recent years, employers have used the CFAA against federal criminal laws currently on the books.”1 disloyal employees who take proprietary computer data to a com- petitor.16 Indeed, disgruntled employees who are about to resign When enacted in 1984, the act was intended still have access to computer systems and the ability to copy data to criminalize computer hacking.2 One Con- prior to their departure.17 One advantage of using the CFAA is its focus on the issue of computer trespass rather than on the quality gressman noted that “[t]he hacker of today of the computer data being accessed.18 can become the white-collar crime superstar However, the lower courts “are deeply divided on the of tomorrow.”3 Originally designed to protect [CFAA’s] scope, with some courts concluding that the law is re- markably broad.”19 And a circuit split has developed over how computers having a specified federal interest, to interpret the CFAA on the question of authorized access, such as national security, financial records, including whether employers can continue to use the CFAA against disloyal employees.
    [Show full text]
  • Electronic Frontier Foundation, Access Now, New America's Open Technology Institute, Jennifer Granick
    Case 2:16-cv-00538-JLR Document 58 Filed 09/02/16 Page 1 of 5 1 The Honorable James L. Robart 2 3 4 5 6 UNITED STATES DISTRICT COURT 7 WESTERN DISTRICT OF WASHINGTON AT SEATTLE 8 9 MICROSOFT CORPORATION, Case No. 2:16-cv-00538-JLR 10 Plaintiff, MOTION TO FILE BRIEF OF AMICI v. CURIAE ELECTRONIC FRONTIER 11 FOUNDATION, ACCESS NOW, NEW THE UNITED STATES DEPARTMENT AMERICA’S OPEN TECHNOLOGY 12 OF JUSTICE, and LORETTA LYNCH, in INSTITUTE, AND JENNIFER GRANICK her official capacity as Attorney General of IN SUPPORT OF PLAINTIFF’S 13 the United States, OPPOSITION TO GOVERNMENT’S MOTION TO DISMISS 14 Defendants. Noted on Motion Calendar: 15 September 23, 2016 16 \ 17 18 TO: ALL PARTIES HEREIN AND THEIR COUNSEL OF RECORD 19 AND TO: CLERK OF THE ABOVE-ENTITLED COURT 20 Amici curiae Electronic Frontier Foundation, Access Now, New America’s Open 21 Technology Institute, and Jennifer Granick submit this request for leave to file the attached 22 amicus brief pursuant to this Court’s order on August 23, 2016 [Dkt. 42] in support of Plaintiff 23 Microsoft Corporation’s Opposition to Government’s Motion to Dismiss [Dkt. 38].1 24 25 26 27 1 Amici also requested and received consent to file from the government defendants. focal PLLC MOTION TO FILE BRIEF OF AMICI CURIAE 900 1st Ave. S., Suite 203 Seattle, Washington 98134 (Case No. 2:16-cv-00538) – 1 telephone (206) 529-4827 fax (206) 260-3966 Case 2:16-cv-00538-JLR Document 58 Filed 09/02/16 Page 2 of 5 1 I.
    [Show full text]
  • Proactive Cybersecurity: a Comparative Industry and Regulatory Analysis
    PROACTIVE CYBERSECURITY: A COMPARATIVE INDUSTRY AND REGULATORY ANALYSIS Amanda N. Craig, JD*, Scott J. Shackelford, JD, PhD**, & Janine S. Hiller, JD*** ABSTRACT This Article analyzes recent business realities and regulatory trends shaping the proactive cybersecurity industry. To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shaped by the applicable law in the United States and other G8 nations. We then catalogue the proactive cybersecurity practices of more than twenty companies, focusing on four case studies that we consider in the context of polycentric “global security assemblages.” Finally, we assess the emergence of proactive cybersecurity norms, both within industry and international law, and consider the implications of this movement on contemporary Internet governance debates about the role of the public and private sectors in regulating cyberspace. Ultimately, we maintain that proactive cybersecurity, especially if pursued with improved legal clarity and global cooperation, demonstrates an opportunity for polycentric partnerships to result in better protected IT assets. 1 Electronic copy available at: http://ssrn.com/abstract=2573787 TABLE OF CONTENTS INTRODUCTION ................................................................................................................................................. 3 I. A SHORT HISTORY OF PROACTIVE CYBERSECURITY: CONCEPTS, IMPLEMENTATION, AND LEGALITY ......................................................................................................
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
    hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future.
    [Show full text]