Will DHS Border Search Logic Be Used To Allow Gov't Screening Of All Internet Traffic?

from the bad-potential-precedent dept

We've already explained how ridiculous it is for DHS to say that border patrol agents need to search laptops to prevent dangerous information from getting into the country. Obviously, if that was the intent of the individual, they'd just send the info electronically and not have to deal with any customs agents. Slashdot points us to a blog post by Steven M. Bellovin where he takes that same thought and flips it on its head, noting that, based on the DHS's statements, DHS may believe that it also has the right to scan any data entering or leaving the country. On top of that, he points out that this could potentially mean that if you encrypt that data you send over a border (say, via a VPN), you could potentially be violating laws that bans "hiding" goods that you send over the border. While the courts have not at all ruled in this way, you could pretty easily see the government making this sort of case.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: border searches, customs, data transfer, laptops


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Anonymous Coward, 7 Aug 2008 @ 6:58am

    Re: Re: Uhhh what?

    the thing a lot of people are forgetting is that there is a pattern and communication to the encryption. if someoen has the full conversation there are two possibilities that will make it very easy to crack the encryption.

    the first is if the encryption used has to send the key to the other party, if you capture that you can decode the whole message.

    the second and much more likely method is that each packet has a pattern because it was encrypted with the same formula. this means the more packets you get the easier it is to figure out the key. why do you think all forms of wireless encryption is so easy to crack? because when you have a few hundred thousand packets (that's on the low end) that are all encrypted with the same technique it is easy to find a pattern.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here



Subscribe to the Techdirt Daily newsletter




Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Special Affiliate Offer

Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.