Homeland Security Still Plans To Search Laptops At Borders With No Probable Cause

from the ain't-no-due-process-at-the-border dept

There’s been plenty of concern over the past few years with regards to Homeland Security’s claims that it has the right to inspect the contents of your laptop at the border, even without any probable cause. While it may be well established that the 4th Amendment doesn’t apply until you’re actually in the country, that doesn’t mean there aren’t some serious questions raised. I, like many others, have no problem with border searches of actual physical containers and luggage at the border. That makes perfect sense, because it’s physical goods that you’re purposely trying to bring directly into the country. You packed them with the specific idea of bringing them into the country.

But stuff on your laptop is different in two very important ways:

  1. You mostly store everything on your laptop. So, unlike a suitcase that you’re bringing with you, it’s the opposite. You might specifically choose what to exclude, but you don’t really choose what to include.
  2. The reason you bring the contents on your laptop over the border is because you’re bringing your laptop over the border. If you wanted the content of your laptop to go over the border you’d just send it using the internet. There are no “border guards” on the internet itself, so content flows mostly freely across international boundaries. Thus if anyone wants to get certain content into a country via the internet, they’re not doing it by entering that country through border control.

Thus, it makes little sense for border control to search the contents of your laptop other than if the gov’t wants a random “free pass” at checking out some content about you. DHS’ insistence that it needed the right to search laptops at the border made little sense, and some of our elected officials pushed out bills to curb such border searches, though none have passed.

Instead, the new head of DHS has “revised” the rules for laptop searches, but they’re only slightly better in that the old rules were “anything goes,” while the new rules are “we’re still searching laptops, but we have a few rules.” The main components of the new rules are that you’re allowed to be present in the same room as your laptop, phone or device as it’s being searched — but not necessarily to see what border patrol is doing. Also, they can’t keep your laptop for more than five days, which seems pretty damn long to me. Though, as some note, this basically means that you should make sure any encryption on your laptop takes more than five days to crack.

DHS boss Janet Napolitano’s reasoning for the searches is hardly compelling:

“Keeping Americans safe in an increasingly digital world depends on our ability to lawfully screen materials entering the United States,”

Um… right, but, again, the contents of the a computer laptop can easily enter the United States via the internet with no border control process whatsoever. The whole claim that this has anything to do with screening materials entering the US is totally bogus.

On top of this, the other thing that’s not at all clear is how far the “search” can go. With a growing number of “cloud” based services in use, many of which act as if they’re local, can the border patrol search those as well? For example, I use Jungledisk, which gives me a virtual drive that shows up in my file system as if it were a local hard drive, even though it’s hosted in some data center somewhere. It looks like a local drive… but it’s not actually on my laptop. Would border patrol have the right to search that, even though the contents of that drive are not actually traveling across the border?

Filed Under: , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Homeland Security Still Plans To Search Laptops At Borders With No Probable Cause”

Subscribe: RSS Leave a comment
98 Comments
Anonymous Coward says:

The border people don’t need probably cause. Your rights when you are in the border area are EXTREMELY limited, as you have not yet been granted access to the US. You are in a virtual no-man’s land.

Anything you bring over the border is subject to inspection, to whatever degree they feel is needed. if you are driving across the border, the guards can pretty much disassemble your can down the pieces to inspect for anything they like without any justification, and they can hand it back to you in pieced.

Mike, you need to chat with your “lawyer friends” about the border. It isn’t the same as the rest of the US.

Anonymous Coward says:

Re: Re: Re:

It is important because the rest of it is a rant about nothing – once you start with the basic idea (you have limited rights at the border) the rest of it is not important.

If they search your papers (not laptop) and find an address, they can ask you about the address. They can ask you about the people there. They can check THOSE people for criminal records. They can contact those people to see if your story checks out. Laptop or no laptop, nothing changes.

If you have connectivity on your laptop to a remote site without a passord (how foolish!), by carrying it through the border you have granted them rights for anything they can “see”. That remote content is what you are bringing through with you.

Like I said, once you accept and deal with the idea that you have very limited rights, the rest of your rant seems somehow meaningless.

interval says:

Re: Re: Re:2 Re:

@Chronno: “…the same data can just be E-Mailed to yourself.”

Right. Which leads me back to my favorite point on this topic; the more power a government creates for itself in the name of protecting its citizens, the more it tends to simply victimize its own citizens.

This is about power, people. The rulers believe its their job to make rules, its its not about what kinds of sense those rules make.

For a simple illustration compare the effectiveness of airport security in Israel, with a much smaller government, and the supposed security in a US airport. Israel doesn’t make Grandma take off her shoes to look for a bomb, and Israeli security is 1000 times more effective. Why do they make her do that here?

btr1701 (profile) says:

Re: Re:

> Your rights when you are in the border area
> are EXTREMELY limited, as you have not yet
> been granted access to the US.

Where in the US Constitution does it say that my rights as a citizen disappear at the border or that the US government doesn’t have to recognize them so long as I’m not in the country?

Please quote the article and section, please.

Lawrence D'Oliveiro says:

Re: Re: Re: Encryption Strength

imbrucy wrote:

256? Come on you can’t call your self a true geek with anything under 1024.

You should be clear what kind of encryption you’re talking about hear. 1024 bits is a reasonable key length for RSA public-key encryption, but for a secret-key algorithm like AES, 128 is ample.

By the way, weaknesses have recently been found in 256-bit AES. So it’s wisest to stick to AES-128 for now.

interval says:

Re: Re: Re:

@Kazi: “Can’t incriminate yourself by giving up the key.”

Well, the Homeland Gestapo have already shown that the constitution doesn’t really apply to them, so hiding behind that little fact isn’t going to help in my opinion. They aren’t really supposed to be searching our laptops anyway, what leads you to believe they can’t imprison (“waylay”) you until you give them access to whatever they want?

Yohann says:

What about alternative OSes?

Obviously someone this moronic wouldn’t know the first thing about Linux, Unix, Solaris, etc. I happen to run Linux, so all I need to do is make a separate login that’s perfectly clean (if I had anything to hide, that is). Would they want the root password? If these people are thinking that information can’t come in through the internet in some encrypted file, then I sure as hell wouldn’t want these doorknobs poking around in an OS they don’t know anything about. Last thing I need is, “Good news. Your laptop is clean. Bad news. It’s *really* clean. Hope you backed up.”

Fiercedeity (profile) says:

I’m not very knowledgeable about encryption, but I believe I read once of a product that can easily create an undetectable encrypted partition. So basically, even if you were looking for it, you’d still never find any evidence of it. I can imagine that if someone *really* wanted to get something across the border, they could do that and the searchers would never know.

Someantimalwareguy says:

Re: Re:

The containers can be discovered forensically. The best advice is to keep your sensitive data away from your travel computer/device and only access it through a secure connection to your home system or to your company’s servers. Further, you need to keep that computer in a static mode while in a vulnerable position or place so some form of virtualization while accessing that data is important from a forensic perspective…

To be secure, you need to actively participate, not rely on what some sales or technical forum guru told you is safe!

JMHO
SAG

edgebilliards (profile) says:

Limited Rights-ish

the push to search laptop contents at the border gained a lot of ground as soon as child pornography started turning up. the searches have nothing to do with national security (there’s no “digital terrorism” you can commit inside the physical borders that you can’t outside of them) and all about using anything related to underage porn as a whipping boy for political gain.

that’s what makes United States v. Boucher so ironic. while the general public has to have their files haphazardly poked at by a customs official, just a little bit of pgp can make it all fruitless.

Dark Helmet (profile) says:

Hmmm....

So, not to give the stereotypical Dark Helmet response here, but I noticed that one point seemed to get repeted over and over again in the story:

–The government’s reasoning for the border searches doesn’t make sense because there is not virtual policing being done over the internet–

The conclusion everyone, including Mike, seems to be reaching is a logical one: the government is lying about its reasons.

Question: What if that conclusion we’re all reaching is the wrong one of the two possible? What if, and I’m not technical to know if this is truly even possible, but what if the government DOES have a way to monitor incoming international traffic with a system sophisticted enough to monitor and analyze digital traffic (telephone, fax, email, etc.) for whatever parameters it desires? Maybe this would utilize the Echelon System that was previously used against the Russians. Maybe this would fall under COINTELPRO.

If that was the case, then it would make sense that the government would be worried about malicious digital malware/software/etc. sneaking through the physical weak point of the border crossing.

Unless someone can tell me that such a scenario is ABSOLUTELY, 100% impossible….well, doesn’t that just make more sense?

Dark Helmet (profile) says:

Re: Re: Hmmm....

“Oh look at you. Your back. Tinfoil hat and all.”

Okay, you can think I’m wrong all you want, and lord knows the whole bury your head in the sand and call people who question things “alarmists” or “conspiracy theorists” is an age-old concept, but what about the questions?

Or the fact that information on the Echelon Network and COINTELPRO is partially declassified?

I mean, I’m not just making this stuff up. Both of those things are 100% real and are things the government has admitted exist.

Chronno S. Trigger (profile) says:

Re: Re: Re: Hmmm....

Because one, it would need a computer watching for the flagged content, and two, if it was a computer, it could be programed to search for the little things like MP3s, Movies, books, and so on along with the terrorist things, so we’d be hearing more about people being slammed for that. Besides, if the did have anything like that in use, how could they keep track of Http, Ftp, E-Mail, torrent, IM, and however many thousands of other programs, all of which could be encrypted.

Not calling you a conspiracy nutter, just saying that it’s damn near impossible. With all the data coming over the borders, the delay for checking would probably be longer than the 5 days for the laptop.

Anonymous Coward says:

Re: Hmmm....

Even if they somehow manage to examine the utterly insane amounts of data that flow in and out of the country, there’s still encryption, SSL is, when used correctly, secure.

Also the routers that shuffle stuff over seas are privately owned, and it’s expensive enough building hardware that can just keep up with the traffic, monitoring it, while not utterly impossible, is entirely impractical, even for the NSA or whatever spooks.

And as I mentioned, if you want to get something in/out and you really are paranoid there’s always encryption, and the NSA probably doesn’t have a magic way to crack SSL.

Dark Helmet (profile) says:

Re: Re: Hmmm....

That’s all probably true, but the possibility left open is still intriguing.

Particularly if the Echelon Network includes some kind of Angel/OA God algorithm or SSL cracking capability.

After all, let’s again look at motivations and making sense of things. The Echelon Network was used against the Russians AT LEAST up until the fall of the Soviets (although many argue it is being used against them and others to this day). When was SSL protocol first utilized?

If there were such simple ways to get around all of this monitoring the government has admitted to doing on other nations, why would they bother doing it? Doesn’t it follow that they can crack or subvert most/all known encryption and tunneling techniques?

Dan says:

Goverment packet sniffing

The only scenario where the government stance makes any sense is either the government is monitoring all the internet packets entering the U.S., or terrorist organizations BELIEVE our government is doing so.

Given our track record since the Patriot Act, I could believe it myself.

But I do think it is a wasted effort. Our border guards are best used for other things.

teknosapien (profile) says:

you missed something

nice write, but your missing a bigger picture here
DHS has jurisdiction over 200 miles from any entry point in the US.

This is particularly troubling when you actually look at what that covers (a very small area in the center of this country)

I was never a conspiracy theorist until the last presidency ended and some of their tactics came out

Yohann says:

It's all BS anyway.

One person with limited knowledge of computers and networking sitting on high in an important position thought this sounded like a great idea to showboat and let everyone know they are focused on the “greater good” of the country and its safety. That’s it.

Whoever signed it probably wasn’t aware of the sheer numbers of ways of getting around this problem. If child pornography is going to get into the country, it’s going to get in one way or another, either in an encrypted file or over a private FTP sealed with ssh.

I’m sorry, but I don’t see Janet Napolitano as being heavily computer literate, nor do I think she knows anything about networking and communication. She probably wanted to show off how much she cared about the safety and security of America’s people, and one of her advisors thought this would be a great idea.

not this time says:

I regularly travel into the US with my laptop, and although I have never been searched, I have broken customs rules more than one time, with stuff a lot more dangerous, and nobody seemed to care. For instance, I entered with more (a lot more) than 10 grand in cash. I entered with plant material (it was tulip bulbs from the netherlands, but it could have been something a lot nastier). With so many other potential things to search for, why bother with a laptop full of torrents?

Paul Brinker (profile) says:

The responsibility is for physical safety, not information safety

When you cross the boarder the guards job is to prevent you from bringing in prohibited items. Digital information for the most part is not prohibited (CP, State Secrets, Crypto can be). The general rule is that boarder guards cant prevent you from coming into the US if your holding a US Passport. Its also held you don’t have to give your passwords. So ultimately those people from the US coming back just have to say “no” to giving any password and the boarder guards really cant do anything about it.

In addition, there not trained in handling most computer systems anyway, most guards just don’t care and the few that do have most likely flagged you for something else and will take your computer as part of the process.

Its about the sane non-issue as People from the US going to Cuba, we tell you its against the law but when some guy did it and told the boarder guards he went there (he was attempting to get arrested over the issue) all he got was some extra screening.

All we have is the illusion of security with out anything really happening. If the gov cared about all information coming in and out we would have the great firewall of china that would only allow “clear” traffic.

Anonymous Coward says:

Re: Re: Actually...

You miss the point – if there is data on your laptop that in encrypted, it might actually make them want to hold you longer – perhaps you are smuggling state secrets or plans for the next 9/11.

It’s sort of like denying a cop the right to search your car when you are pulled over. You may win that fight, but you will probably lose the battle (can you say probably cause?). If you specifically deny a border agent access to a file on your laptop, I would say your stay at the border is going to be very long indeed.

Yohann says:

Re: Encryption

That’s only true if you’re planning to export the encryption to an outside country so that the country can use it against the US. The software and hardware requires it to be licensed and approved by the US government. I don’t believe having it installed on your laptop doesn’t actually count as ‘export’, as bringing one bottle of wine from Italy is considered ‘smuggling’.

Anyone could potentially write a ‘munitions grade’ encryption program for themselves, take it out of the country, and give it to a friend. But if you’re a company that writes the program and sells it to other countries, then you have to go through the licensing and declaration.

Ed says:

Confiscation

For those that think they can encrypt or hide the data or boot into non-GUI, well, Homeland has the right to confiscate your laptop, copy the hard drive to a third party for hacking. Oh, and all this without liability.

So, let’s say you are innocent of every law there is and they don’t believe that you are that squeaky clean, they could still take your harddrive, pull the data, send it to Hackers-R-Us who then looses the data (with your passwords, etc), which eventually falls into the lap of Mr. Credit Thief, which then pulls all your money out of your bank to support his / her habit. Let’s even say you have a clear path with evidence that the government was responsible for Mr Theif to get access to your bank, well, the government doesn’t care and you have no recourse… Good Luck!

Jason says:

Re: Confiscation

Yeah, I think that’s a pretty huge and somewhat paranoid stretch of reality. While its possible that some government agent might run a identity theft ring on the side, it’s highly speculative, quite unlikely, and would naturally be governed by appropriate internal regulations in addition to government law code.

The real issue here is that the power for unwarranted search shifts the role of government beyond the nature of what was intended by our constitution — whether the purpose for doing so is valid or not.

Yes, we need to protect our borders, but when you give officers the power of search and seizure without warrant, you are in effect creating a quasi-hostile relationship where none previously existed and where there was no cause to do so, and this is a breach of the trust given the government by its people.

The situation with border control has unique interests because of a general need for national defense, but it does not change the fundamental relationship between the government and the governed. A citizen’s travel status of “entering into the country” as opposed to “already being in the country” in no way changes responsibilities and powers of those governing, nor does it change the citizen’s rights and responsibilities.

Without some prior cause, how can the government, on a regular basis, treat its citizens as though they were hostile parties? I recognize the need for exceptions for general defense, but it must be reasonable with appropriate acceleration of probable cause.

Blank check access to your hard drive with no cause is so far short of reasonable as to be utterly stupid.

Rekrul says:

Fill your laptop with the most disgusting pictures and videos you can find. Make your password something like “F*ck you assh*le, you piss-drinking, sh*t-eating piece of inbred maggot infested goat-f*cker.” Keep making small mistakes, like forgetting to mention the commas and claim that the keyboard has been acting up a little, so that they need to type it multiple times to get in. Have it play one of the Two Girls, One Cup style videos as soon as the desktop loads.

In other words, make them regret looking at it.

NullOp says:

Not Likely

Searching the contents of your laptop is very unlikely as it is somewhat difficult to do. My laptop has thousands of files on it and I make an effort to keep it clean. Most people are not very tidy when it comes to their PC/laptop. Few machines would be searched during the course of a day and it would be a wasted effort. If I want to sneak anything in I can just email or even mail it to myself. I don’t even need the laptop while I’m crossing the border. Duh!

Anonymous Coward says:

So let’s take this apart:

“Homeland Security Still Plans To Search Laptops At Borders With No Probable Cause”

The title is midleading, because “Homeland Security” isn’t doing the searches randomly on the street. It is only at border crossing. So while it is Homeland Security in theory, in practical terms it is the US Customs and Border Protection (an agency under Homeland Security). The title would be equally misleading if it said “Whitehouse Still Plans to Search Laptops” as Homeland Security is under control of the Commander in Chief. Heck, the title could be “Obama Stills Plans to Search Laptops”. It would be equally as misleading.

Further, the laptops are only searched at border crossings, a place where probably cause is NOT required to conduct a search. In technical terms, your wanting to enter the country is probably cause, if you want to look at it that way.

So now we know that the entire concept of Mike’s article is lost.

The rest of the story is a nice little rant, but in the end, customs is responsible to make sure that undesirable people, objects, contraband, and anything else illegal isn’t entering into the US – that would include (remarkably) all those kiddie porn pictures on your laptop, as well as the next unreleased video from Osama Bin Hiding. Heck, it could include the address of the safe house where you are keeping those illegal immigrants you keep smuggling in on your carry on luggage (they are small).

So it’s all a rant about nothing at all – whatever you show up with at the border can be inspected, and if your laptop happens to connect automatically to a remote server or service, it is likely also to be inspected. In the words of Bill Curtis, he always has space to carry the internet.

Anonymous Coward says:

Re: Re: Re:

Sorry dude, but there is a huge difference – my point is saying “homeland security” you might as well say “Obama himself” because it isn’t any more accurate.

Homeland Security in and of itself is doing NOTHING – it’s the customs people, an agency UNDER Homeland Security that is doing it.

The difference between direct and indirect. The shoe is on the other foot when you guys get all fussy about if a torrent file (or listing site) is infringing or not. Same freaking deal here.

Accuracy is something sorely lacking these days around here.

ChurchHatesTucker (profile) says:

Re: Re: Re: Re:

“Homeland Security in and of itself is doing NOTHING – it’s the customs people, an agency UNDER Homeland Security that is doing it.”

I’m still staring at you like you’re an idiot.

I’m not saying you are, understand, because you obviously have great insight into bureaucratic distinctions, which takes a keen intellect. I’m just looking at you *as if* you were.

I’m sure you’ll appreciate the difference.

Anonymous Coward says:

Re: Re: Re:2 Re:

Go ask a customers person who they work for, and they say “US Customers and Border Protection”. Most of them actually hate being lumped under Homeland Security.

Homeland Security was basically created to get a bunch of different organizations to talk to each other and work together, but the reality is that mostly it trod on toes and invaded different little fiefdoms that poeple had built up over many, many years.

Homeland Security is like “head office”, the idiots who send down stupid memos and ask you to file everything in duplicate. Customs is the actual people running the office and doing the work. Homeland Security ain’t sending anyone to check laptops, they send a memo to Customs saying “check more laptops” and Customs works on it.

I just stare back at you *as if* you were being an arrogant shit. I’m not saying it, just looking *as if*

Anonymous Coward says:

Re: Re: Re: Re:

Except, if I read the news right, the policy regarding this is set by the Department of Homeland Security. The policy was announced by Department of Homeland Security personnel. The policy covers what Customs and Boarder Protection officers can do, BUT those officers of Customs and Border Protection do not set the policy.

The Immigration and Customs Enforcement is a branch of Homeland Security, and does not sound to create their own rules and policies, instead they are given down.

So, to look at what your saying, if Obama himself said “These are the new rules.” It would NOT be Obama or the Obama Administration who made the rule, but the officer who decides to follow the new directive?

Or am I missing something in my reading?

Anonymous Coward says:

They'll just beat it out of you

First, you can’t plead the Fifth because giving up a key isn’t expressive. The government can force you to give up unencrypted documents without running afoul of the Fifth Amendment; they can certainly ask for your encrypted documents as well.

Second, encryption won’t help you. They won’t crack the encryption, they will crack you. You can be jailed indefinitely until you give up your encryption key. A year in jail will effectively ruin your career regardless of whether you are convicted or not.

Anonymous Coward says:

Re: Re: They'll just beat it out of you

Remember! You aren’t entirely under US law at that point – the border is never never land. The border people can refuse you entry FOR ANY REASON. They can detain you for long periods of time, well beyond the standard 48 hour hold. You aren’t being jailed as a US citizen, you are jailed pretty much as nobody.

You have very, very few rights at the border.

gr8oldies (profile) says:

I wouldn't worry to much about this

I drive a Semi truck and have a laptop mounted on the dash (kind like the police do)I run GRLevel three doppler radar to monitor weather and road conditions via WiFi. I also run OTS AV DJ software with about 5 thousand songs with the audio patched into the stereo.I cross the border into Canada and back into the U S on an average of 6 times a week have been doing so for years and I have never had a border guard give me a second look with the exception of one time when a young female guard noticed the music it was playing and thought it was neat and was impressed that an old fart like me was running such a setup. So I wouldn’t worry to much, this is just another “Feel Good” thing the government is doing to make you think they are watching out for our best intrest. Like one of the posters stated above if they mess with you they have you flagged for something else and it’s a way to screw with you further.

mattarse (profile) says:

Re: I wouldn't worry to much about this

The problem with that attitude is that one day they may decide to start inspecting each and every laptop. If you haven’t protested when they made the policy saying they could do – how will you be able to protest when they do start doing it.
Today they may only be looking for the stuff we all find horrendous (child porn) but tomorrow they may arrest you for not having proof that you own the CD’s related to the mp3’s you are playing.

Noone says:

STOP

When did we begin to accept that our rights only apply within the borders of America? If a person is a representative of the United States dealing with a United States citizen, they should treat them with the same rights (Which we used to consider inalienable) as they would someone 10 feet away inside of the country’s borders.

Overcast (profile) says:

You don’t need encryption or anything else – if you really want to hide data from them, put it on a FTP site or a Webmail site. That or ZIP it and rename the file to make it appear like something else. “Dang, what a shame that database is corrupted”.

It’s a stupid waste of time – if they were so worried about security at the border, why not do something about the thousands of illegals that cross the border weekly?

Darren Chaker (user link) says:

Border Laptop Search

As technology evolves, so to does government interest. It use to be top secret papers would need to be copied and given to a KGB handler, to get back to Moscow, now, mini-SD chips fit 8+ GB, which can hold thousands of pages of documents.

American’s have the Fourth Amendment as a shield to protect them from unreasonable searches and seizures. The Fourth Amendment has evolved with technology. See, United States v. Blas, 1990 WL 265179, at *21 (E.D. Wis. Dec. 4, 1990) (”[A]n individual has the same expectation of privacy in a pager, computer, or other electronic data storage and retrieval device as in a closed container.”). However, the Fourth Amendment ceases when you want to enter back into the USA. Every body cavity and computer is open to inspection with little more than reasonable cause. A true border search can be made without probable cause, without a warrant, and, indeed, without any articulatable suspicion at all. The only limitation on such a search is the Fourth Amendment stricture that it be conducted reasonably. Note that the reasonableness calculus is different at the border (i.e., looser) than it is inland.

Despite such, when entering the USA, and, for the purposes of this post, a person has the Fifth Amendment as a shield. In a recent decision in Vermont, In re Boucher, a federal magistrate judge held that the Fifth Amendment right against compelled self-incrimination protects a suspect against having to reveal the password permitting access to his computer files. The software the defendant used, and which I recommend, besides using file wiping software in conjunction with other counter-forensic measures, is PGP whole disk encryption. Nothing has broken this encryption. The court determined that if Boucher was “forced” to provide the passphrase, then the contents could incriminate Boucher thus violate the Fifth Amendment. You can find the court’s opinion here: http://www.volokh.com/files/Boucher.pdf

The end result, if you have material on a computer you do not want inspected, encrypt it. If the government can get a warrant to place spy ware on your computer while ‘inspecting it’ to reveal your pass phrase, then encrypt the file on a thumb drive. Of course, if your ‘vacation’ included taking pictures, then transfer those pix to an encrypted drive and insure the SD card from the camera is securely wiped.

In short, for every measure to obtain information, there’s a counter-measure. However, if you are doing something while outside of the USA which can attract the Feds, I recommend—DON’T DO IT. Freedom is not free, but stupidity will put the most intelligent in prison.

Darren Chaker

roxanneadams (profile) says:

Does anyone else remember this happening? In 1990, I had to turn in and plug up my laptop at airport security to show that it worked. This happened to me more than once, in both the DC and Atlanta airports, but I can’t remember it happening anywhere else. I had been told that if I didn’t have my power cord, and the battery was dead in the laptop, then it couldn’t go on the plane with me.

This wasn’t such a big deal, but what p**d me off was the security screeners would insist on handling my camera, looking through the viewfinder and pressing buttons before they gave it back to me. I had the feeling that they really didn’t know what they were doing, but were going through some act, probably for the benefit of the morons who were supervising them. I never carried film in the camera – I always mailed the finished 35mm rolls to Kodak, because I didn’t want anyone at the airport to ruin my pictures.

I was really surprised that after 9/11, airport security didn’t start doing this again. These acts were as pointless as taking off your shoes and walking barefoot through the screening area.

Mitchell (profile) says:

I am pretty much a bleeding heart liberal and I feel that anybody entering the country should definitely be subject to having their laptop searched. There was even some talk that the authorities were being given keys that could defeat encryption software, so they could immediately unencrypt suspect files…and I agree with that too, but I think I read that doing so was actually not allowed without arrest..

Leave a Reply to senshikaze Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...