DHS Confirms There Will Be More And Greater Intrusiveness During Border Searches

from the welcome-to-America,-land-of-the-heavily-surveilled dept

DHS boss John Kelly continues to push for ultimate government intrusiveness, whether at the borders where the CBP will handle the getting all up in your everything, or at airports, where the TSA will examine the hell out of travelers' electronics while overlooking explosives, guns, and other more dangerous contraband.

The DHS is no longer perched atop a slippery slope. It's enthusiastically sliding down it with both hands in the air. The Center for Democracy and Technology asked the DHS the same questions a few legislators have: what are you doing to protect the rights of US citizens at the border? The answer, in the form of a noncommittal letter, is an official shrug of indifference.

Back in March, CDT, along with more than 50 other civil society groups and trade associations, wrote a letter to Department of Homeland Security Secretary John Kelly urging that he back away from DHS proposals to use border searches as a tool to collect passwords and other social media information. Today we received a response. Unfortunately, the reply largely ducks our concerns, ignoring the main issues at play and doing little to shed light on the government’s plans or put to rest controversy about its contentious proposal. This non-answer is deeply troubling because it seems to indicate that Customs and Border Protection (CBP, which is a sub agency of DHS) is doing nothing to change course from a recent, dangerous trend: the use of the U.S. border as a tool to conduct broad surveillance.

The letter [PDF] from the DHS explains almost nothing, while assuring CDT all of this is completely above board. But, as Chris Calabrese of CDT points out, we've come a long way from physical strip searches. Searches of travelers' electronic devices are far more intrusive. And yet, the DHS still seems to feel device searches are no different than taking a look in a vehicle's trunk or opening up a suitcase. Check out the spin job being done here: intrusive device searches are just a team effort on behalf of America and Americans should just be more willing to pitch in.

All items entering the country are subject to inspection, and CBP may seek the traveler's assistance in presenting his or her effects including electronic devices in a condition that allows inspection of the item and its contents. This inspection may include searching computers, disks, drives, tapes, mobile phones, and other communication devices, cameras, music and other media players, and any other electronic or digital devices. In instances where an electronic device, or portions of the content on the device, are locked or password-protected or otherwise not readily available for inspection, CBP may take Iawful measures, as appropriate, to inspect the device and its contents consistent with longstanding authority to perform border searches. These practices are consistent with various laws authorizing searches and detention…

The DHS has reduced "exposing your entire digital life" to "presenting effects." This isn't an answer to CDT's queries. It's just propaganda.

The DHS also unhelpfully points to a 2009 Privacy Impact Assessment, which covers the search of electronic devices at the border. Again, this does little more than inform readers many of their rights are gone and won't be coming back. After spending several pages saying DHS/CBP will do all it can to minimize intrusion, protect harvested data/communications, and require badges and such to prevent unlawful access to seized digital goods, the report closes with the sheet handed to travelers when their devices have been taken by CBP officers. It states, in plain English, that CBP officers can perform suspicionless searches of electronics and hope it morphs into a justified search by the time the CBP is done searching them.

CBP will contact you by telephone when the examination of the electronic device(s) is complete, to notify you that you may pick-up the item(s) during regular business hours from the location where the item(s) was detained. If it is impractical for you to pick up the device, CBP can make arrangements to ship the device to you at our expense. CBP may retain documents or information relating to immigration, customs, and other enforcement matters only if such retention is consistent with the privacy and data protection standards of the system in which such information is retained. Otherwise, if there is no probable cause to seize information after review, CBP will not retain any copies.

As Calabrese points out, none of this seems likely to make the nation safer, much less minimize Constitutional violations.

As we told DHS back in March, the practical result is that border crossing will require full digital disclosure – exposing not just our personal information but also the tools we use to bank, communicate, and participate in our digital lives. This will not just infringe on free expression and privacy, but will also expose our personal information to the federal government who has a terrible track record of keeping such information safe. Ironically, it’s unlikely to have any security value, since bad actors conceal their accounts and the government drowns in information from innocent people.

The DHS has no answers. Things will get worse and are unlikely to get better. It's easy for government power to expand but almost impossible for it to retract. Since terrorism will always exist in one form or another, the government will always be able to justify mission creep and the further diminishment of civil liberties.


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    aerinai (profile), 19 Jul 2017 @ 7:45am

    Honeypot Accounts

    I'd say that if you have a laptop, setting up a honey pot account for precisely this type of intrusive crap would be a great idea. That way they rifle through just what you want them to and can protect your privacy. Setup a few social media accounts you don't use as well, just in case they want those as well.

    None of this should be necessary, mind you, but in this day in age... gotta do something or you will be put on a secret list and never allowed to travel again.

    reply to this | link to this | view in chronology ]

    • icon
      Ninja (profile), 19 Jul 2017 @ 8:31am

      Re: Honeypot Accounts

      That. If I need to go to the US again at some point that's what I'll be doing. And I suspect that's what any terrorist worth his/her salt would do as well but for entirely different reasons.

      reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 19 Jul 2017 @ 9:43am

      Re: Honeypot Accounts

      The more standard technique is to upload all your data somewhere, then wipe the laptop securely and optionally install a fresh OS image. Bring the installation media, and, after crossing the border, reinstall (if you didn't already, or if the CBP attached anything to the laptop) and re-download your data. Some companies require this when bringing a corporate laptop to the USA.

      Of course, by CBP logic, they have the authority to inspect every packet entering and leaving the country, and make the 'importer' decrypt it...

      reply to this | link to this | view in chronology ]

      • identicon
        Anonymous Coward, 19 Jul 2017 @ 11:16am

        Re: Re: Honeypot Accounts

        I could just keep on my personal stuff in the cloud on my NAS. Have very little on my computer. Wipe any passwords that may be stored on it. Wipe any software that I need to that can be easily installed once again.

        reply to this | link to this | view in chronology ]

        • icon
          Bergman (profile), 23 Jul 2017 @ 6:24pm

          Re: Re: Re: Honeypot Accounts

          The problem is, how do you know where the computer ends and the cloud begins? From within an app on the computer, it's seamless -- that's a feature that makes the app useful.

          And since they demand passwords not just physical access, they'd be able to open those apps.

          reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 19 Jul 2017 @ 10:21am

      Re: Honeypot Accounts

      Yes, said it myself too. The best way to protect your privacy is to have 2 PCs and 2 smart phones. One PC and phone used for all that piracy, with some accounts and user names and etc. Then use other PC and other phone for all the "legit" stuff and also with other accounts and user names. Whenever they require your stuff or whatever you just hand out the second pair.

      reply to this | link to this | view in chronology ]

    • icon
      Jeremy2020 (profile), 19 Jul 2017 @ 11:56am

      Re: Honeypot Accounts

      I'm just going to infect the hell out of laptop and go through the border. I figure the TSA is so very competent that it shouldn't cause them a problem.

      reply to this | link to this | view in chronology ]

      • identicon
        Anonymous Coward, 19 Jul 2017 @ 12:11pm

        Re: Re: Honeypot Accounts

        Just don't tell them about it before hand .... opps, too late.

        reply to this | link to this | view in chronology ]

      • icon
        That One Guy (profile), 19 Jul 2017 @ 2:15pm

        "It's their own fault your honor."

        "I told them, repeatedly, that I was a security researcher and that that it would be a really bad idea for them to open up and attempt to copy over any data from my devices your honor, yet despite this they still did so."

        "What kind of security researcher are you again?"

        "I engage in the study of malicious code and programs your honor, and part of this involves keeping copies of those programs on my system for study and to find ways to fight against them. While I do my best to secure all the malicious code sometimes some of them slip through the cracks, and so when they attempted to make a copy of what was on my device, well..."

        reply to this | link to this | view in chronology ]

      • icon
        Bergman (profile), 23 Jul 2017 @ 6:25pm

        Re: Re: Honeypot Accounts

        Or better yet, load it up with things Man Was Not Meant To See.

        Clown porn, for example.

        reply to this | link to this | view in chronology ]

    • icon
      Bergman (profile), 23 Jul 2017 @ 6:23pm

      Re: Honeypot Accounts

      Unfortunately, lying to a federal agent -- and setting up a fake/fraudulent account would probably be considered a lie -- is a felony all by itself.

      It's actually more than one felony, since under the current DoJ interpretation of the unauthorized access clause of the CFAA, violating the TOS while using a computerized service constitutes an unauthorized access, which is also a felony.

      So if you comply with the 'request' for your password, even on a fake account, you have still committed at least one felony and possibly more.

      Flatly refusing their 'request' is far less illegal, and carries far shorter prison sentences.

      reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Jul 2017 @ 9:36am

    Police State of America! what the hell was the point of fighting the War of Independence, to get away from the oppression of another country only to substitute it for oppression from our own government, which is even worse? this has absolutely nothing to do with stopping terrorism or catching terrorists and everything to do with knowing, every second, what every person, everywhere, American or not, is doing, saying, reading, writing, going and looking at!! disgraceful! USA has encouraged the same practices elsewhere but kicks off when another country does it!

    reply to this | link to this | view in chronology ]

    • identicon
      mike, 19 Jul 2017 @ 10:47am

      Re:

      Are you going to call your Federal Senator and House Rep? Yep, thought you wouldn't.

      The terrorists won a long time ago because the people of USA don't care to put a stop to this. Welcome to East Germany in the 1960s.

      reply to this | link to this | view in chronology ]

      • identicon
        Anonymous Coward, 19 Jul 2017 @ 11:17am

        Re: Re:

        It's Germany to this day!

        reply to this | link to this | view in chronology ]

      • identicon
        Anonymous Coward, 20 Jul 2017 @ 2:38am

        Re: Re:

        Hahahahahaha!

        Really, do think at this point that "calling your federal senator" is going to do jack shit? Ahahahahahaha! If anything it will get you added to a watch list. The watch list of "citizens who still think they own the place" or "citizens to bump off once we finally pull back the curtain on our new corporatist state."

        God, at least try to come up with something convincing for fixing the corrupt system from within. Sitting there and begging those who make money from taking away your rights to not do so isn't going to work. Nor will your constant insistence that playing by the same laws that are designed to work against you accomplish your goal.

        Wake up and smell the shit that you're up to your eyeballs in. At this point it's not the politicians that have their head buried in the sand to escape reality, they are perfectly aware of their actions and don't care, It's the public that's in denial. The sooner you admit that problem exists, the sooner this crap can actually start getting fixed.

        reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 19 Jul 2017 @ 12:15pm

      Re:

      " what the hell was the point "

      the point was, and still is - you get to be injured or dead so that they can enjoy all the ill gotten gains. Oh, and all those promises about the VA and GI bill - well you've been had.

      reply to this | link to this | view in chronology ]

  • icon
    Roger Strong (profile), 19 Jul 2017 @ 10:06am

    When they vacuum up your contacts and emails from your device, they have little ability to judge their credibility. They can't tell whether a contact actually knows you, let alone has read your email to them. A record will go into the TSA's database regardless with possible repercussions years later.

    Which brings me to my new patent application, "Method for character assassination using border crossing security theatre."

    reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 19 Jul 2017 @ 10:31am

      Re:

      Terrorists have come with another patent too. Don't bring guns, explosives or drugs from the outside, just buy them or fabricate them inland. loooool.

      reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Jul 2017 @ 10:11am

    We're all guilty until we can prove otherwise. Thus, we are all guilty.

    reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Jul 2017 @ 10:14am

    How come when I copy files the MPAA and RIAA screech "THEEEEFT!!!" from the fucking rooftops but when the government does it it's business as usual?

    reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 19 Jul 2017 @ 10:33am

      Re:

      Or when they do it. Remember MPAA and RIAA have to actual spy, monitor and track you (a clear invasion of your privacy) so they can actually get an IP and a case against you.

      reply to this | link to this | view in chronology ]

      • icon
        Roger Strong (profile), 19 Jul 2017 @ 11:46am

        Re: Re:

        If you refer to tracking torrent downloads, how is it "a clear invasion of your privacy?" When you download a movie, you're publishing your IP address and saying "Send the file here!" and by default "Here's some other parts of the file for you!"

        Reading the IP address you sent is no more an invasion of your privacy than reading the post you made above. And with that evidence in hand, in America at least, it's legal for the copyright enforce to demand the account holder of that IP address.

        (Yes, after that it breaks down even without Prenda and Rightscorp style scams. Proving the user is impossible and even proving the account holder at that moment is unreliable.)

        reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Jul 2017 @ 10:18am

    Guess how many terrorists will try to pass explosives by
    plane?

    Guess how many of them will do it by sea?

    Guess how many will simply fabricate it inland?

    And the guns part, utter ridiculous! hahaha, To check the traffic of guns...INSIDE THE BIGGEST GUN PRODUCER COUNTRY IN THE WORLD! that is just funny.

    reply to this | link to this | view in chronology ]

  • identicon
    bt garner, 19 Jul 2017 @ 10:26am

    Oh really?

    "CBP will contact you by telephone when the examination of the electronic device(s) is complete"

    And how the hell are you going to do that when you have my phone?

    reply to this | link to this | view in chronology ]

    • icon
      Anonymous Anonymous Coward (profile), 19 Jul 2017 @ 10:40am

      Re: Oh really?

      Simple. You just have to give them a minute by minute agenda with contact information for all stops. They are part of the conspiracy, don't you know.

      reply to this | link to this | view in chronology ]

  • icon
    Roger Strong (profile), 19 Jul 2017 @ 10:27am

    The Long Arm Of The Law

    Over a decade ago the US put passport requirements on the Canadian border for Canadians and Americans alike. Now they have their devices searched - by American border officials - at Canadian airports before flying home.

    But the US was also worried about Americans visiting a third country from Canada. So it has agreements with Canada and other countries such that any time an American flashes their passport crossing between other countries, the US government is notified.

    I'll be that that digital strip searches of Americans - when crossing between other countries - required by the American government - isn't too far in the future.

    reply to this | link to this | view in chronology ]

  • identicon
    peter, 19 Jul 2017 @ 10:32am

    Hmmmm. I have a plan.

    So just before I go to America, I buy a laptop, disable all firewalls and AV programmes and spend an happy few hours surfing porn.

    I wonder how many fits the Homeland system will throw whilst scanning my computer from all the viruses.

    reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 19 Jul 2017 @ 10:36am

      Re: Hmmmm. I have a plan.

      I can see some smart hackers using this to let their laptops be "checked" only for them to infect with some virus some government agency.

      reply to this | link to this | view in chronology ]

      • icon
        John Snape (profile), 19 Jul 2017 @ 10:59am

        Re: Re: Hmmmm. I have a plan.

        I was thinking that people would start putting this inside their laptops or phones, so when they are searched, the device trying to read the data will get fried.

        https://www.usbkill.com/

        reply to this | link to this | view in chronology ]

        • identicon
          Anonymous Coward, 19 Jul 2017 @ 11:22am

          Re: Re: Re: Hmmmm. I have a plan.

          Leave one of these in your luggage and in your pocket! If someone wants it, they can have it. Go ahead, plug it into of of your computers and see it fry!

          reply to this | link to this | view in chronology ]

          • icon
            Anonymous Anonymous Coward (profile), 19 Jul 2017 @ 11:26am

            Re: Re: Re: Re: Hmmmm. I have a plan.

            Be prepared to be charged with destruction of government property, along with whatever else they might make up and/or plant on you.

            reply to this | link to this | view in chronology ]

  • icon
    Seegras (profile), 19 Jul 2017 @ 11:19am

    reply to this | link to this | view in chronology ]

  • icon
    Jeremy2020 (profile), 19 Jul 2017 @ 11:57am

    "If it is impractical for you to pick up the device, CBP can make arrangements to ship the device to you at our expense."

    Great, we get to pay for the facility, the tools, the personnel and not we even get to pay shipping too!

    reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 19 Jul 2017 @ 12:18pm

    Ok - now ... why am I bringing this device with me?

    Hmmm - good question. I really do not need it, might as well leave it at home.

    reply to this | link to this | view in chronology ]

  • icon
    John85851 (profile), 19 Jul 2017 @ 2:40pm

    When are companies going to stand up to this?

    When are companies going to stand up to this kind of search and seizure? Or are they not worried that the government (and its agencies) are collecting data from their employee's computers? Or have companies not said anything because it hasn't happened to them yet?

    I seem to remember a case a few months ago where a scientist from the Joint Propulsion Lab (JPL) visited some relatives in the Middle East, but then his computer was confiscated by border patrol when returned. And look at all the designs on his computer- he's obviously a terrorist planning something and he must have falsified his JPL credentials.

    In all seriousness, the guy was trying to do some work while on vacation and now border patrol has his computer, which means he can't do his work *and* the JPL has to get him a new one *and* all of his documents and data are now in the red tape of "we'll return it eventually".

    Are people not supposed to take their laptops/ pads/ phones with them so they can get some work done?

    reply to this | link to this | view in chronology ]

  • icon
    Ed (profile), 19 Jul 2017 @ 3:06pm

    Security Theater

    On a recent trip, I boarded a flight from Frankfurt International Airport.

    After passing through security screening at Frankfurt, I noticed a shop selling nail scissors, clippers, manicure sets, and Swiss Army knives. These were all available to take on board international flights exiting Germany.

    I asked the vendor about travel requirements for these items and was told that recent changes to regulations meant that knives with a blade length of under 6cm are now allowed on international flights.

    Nice to see some countries toning down the terror-induced hysteria involved in air travel.

    On the other hand, it is now quite easy to fly to the USA armed with a few Swiss Army knives. The 9/11 terrorists had carpet cutters. But, after you have hijacked a plane and crashed it into a building somewhere, your phone will be searched.

    reply to this | link to this | view in chronology ]

  • identicon
    Winston Smith, 20 Jul 2017 @ 9:56am

    Dazed and confused

    What I do not understand is, what if a traveler has no electronic devices of any kind, but does have paper documents of personal diaries and business related sensitive documents related to propriety business secrets, etc.,, do the border thugs have the right to photocopy everything?

    I recall something from elementary school days about being secure from search of personal papers, yada yada.

    reply to this | link to this | view in chronology ]

    • identicon
      Personanongrata, 20 Jul 2017 @ 10:48am

      Re: Dazed and confused

      I recall something from elementary school days about being secure from search of personal papers, yada yada.

      It's off to room #101 for a little re-education with Mr. O'brien.

      “Who controls the past controls the future. Who controls the present controls the past.” ~ George Orwell, from his novel 1984

      reply to this | link to this | view in chronology ]

  • identicon
    Personanongrata, 20 Jul 2017 @ 10:35am

    Together We Stand, Divided We Fall

    Again, this does little more than inform readers many of their rights are gone and won't be coming back.

    Wrong! Every tyrant in the history of humanity has fallen and the US government is no exception. Yes there may be periods of unpleasantness associated with tyranny but humanity has survived and has always come back stronger (eg Magna Carta, habeas corpus, Bill of Rights, etal).

    The only way the criminal entity known as the US government can revoke our rights is if we allow it to happen. Get up off of your knees stand on your feet and demand to be treated as a citizen of the Republic not the governments property.

    Power concedes nothing without a demand. It never did and it never will. ~ Frederick Douglass

    The moment a government beings to operate outside of the law the unspoken social compact between citizens and government is severed.

    A cursory examination of recent human history clearly shows one of the most effective measures that can be employed against tyrants in defense of liberty is the use of peaceful non-violent civil disobedience (eg Mahatma Gandhi independence from UK, Vietnam anti-war protesters and US Civil Rights movement) and education.

    When one party to a debate/argument needs to resort to the use of violence said party has lost the debate/argument.

    Greater than 65% of the US governments operating revenue is generated via taxes on consumer spending.

    Boycott early, boycott often.

    Peace through superior deficit spending (an insolvent empire is unable to wage war).

    Citizens of the Republic must remember that we have much more in common with each other than we have in difference and must leverage our strength in numbers in order to affect positive change.

    In the inspiring words of Anthony Hopkins character, Colonel William Ludlow, from the motion picture Legends of the Fall:

    Screw the government!

    reply to this | link to this | view in chronology ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Use markdown for basic formatting. HTML is no longer supported.
  Save me a cookie
Follow Techdirt
Special Affiliate Offer
Anonymous number for texting and calling from Hushed. $25 lifetime membership, use code TECHDIRT25
Report this ad  |  Hide Techdirt ads
Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

Close

Email This

This feature is only available to registered users. Register or sign in to use it.