Australian Gov't Likes Intrusive Border Device Searches Just As Much As The US Does

from the privacy-continues-to-be-the-biggest-victim-of-terrorist-attacks dept

Australians will be thrilled to discover they won’t have to visit the United States to have their electronic devices brutalized and mercilessly probed in the name of security. Why spend all that money flying halfway around the world when you can experience the same intrusive discomfort at home?

A British-Australian citizen travelling through Sydney airport has had his devices seized, and believes his laptop password cracked and his digital files inspected by Border Force officers, in what privacy groups say is a worrying development.

Nathan Hague, a 46-year-old software developer, was detained apparently at random for 90 minutes while the officers took his phone and password-protected laptop into a back room.

Hague had no reason to be treated with extra suspicion, but extra suspicion was there all the same, simply because the random selection process told border officers to be as intrusive as possible. He asked officers a reasonable question — if you search my other belongings in public because I’m a randomly selected “threat,” why can’t you search my devices out in the open. There was, of course, no response.

Other questions about the Border Force’s handling of the contents of Hague’s devices also went unanswered. Officers refused to say whether data would be copied and/or retained, as well as refusing to explain what they were looking for.

Why did the Border Force perform this intrusive search? Because it can.

“Officers may question travellers and examine goods if they suspect the person may be of interest for immigration, customs, biosecurity, health, law-enforcement or national security reasons,” said a spokesperson for the ABF.

So, for any reason or no reason, so long as the word “security” is chanted during the proceedings. Who could limit the Border Force’s intrusive, suspicionless searches? Only the people who’ve already decided they’re not going to.

Under the Customs Act, officers have the right to examine travellers’ personal items, including accessing electronic devices and making copies of their files. The Customs Act imposes no legal threshold or requirement that officers need to meet in order to use this power

The Border Force offered quasi-reasons in defense of its handling of Hague and his devices. The law itself doesn’t even compel a quasi-rationalization.

And the law might get worse. Proposed changes would give citizens with password-protected devices two choices: hand over the password or spend 5-10 years in prison. At this point, Hague was free to refuse the request, but that likely would have meant not seeing those devices again for weeks or months. The Border Force has extended an invitation to the software developer to file a complaint with its redress black hole, just in case Hague wants to spend more time being jerked around by the Australian government.

This is status quo in the so-called free world: suspicionless, highly-intrusive searches requiring minimal, if any, justification… all done in the name of national security. While citizens may realize a security/freedom tradeoff is necessary in some extreme cases, their governments have already determined the exchange rate and made it clear the freedom side will continue to lose value indefinitely.

Filed Under: , , , , , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Australian Gov't Likes Intrusive Border Device Searches Just As Much As The US Does”

Subscribe: RSS Leave a comment
29 Comments
Anonymous Coward says:

not bad for a country that started it’s white occupation with nothing but criminals from a country that was then, i believe, known as Great Britain! Australia is going down the same path as the USA, UK, New Zealand, Canada and others where anything can be deemed legal for security forces when using ‘National Security’ as the excuse and all freedom and privacy is being removed/dismissed from the people under the excuses of stopping terrorism and saving the children!

Anonymous Coward says:

I, a US citizen, just returned from Sydney and was “randomly” selected for an extra scan. I was carrying a laptop, tablet and cell phone. The scan consisted of an additional X-ray conveyor off to the left operated the same as the regular scan I went through immediately afterward. There was no device search or seizure involved.

My first thought is there was something else about Mr. Hague that drew their suspicion. That or the additional security measures were also random and he drew the shortest straw possible.

That One Guy (profile) says:

Border 'security', the dream job for voyeurs everywhere

Officers refused to say whether data would be copied and/or retained, as well as refusing to explain what they were looking for.

I think I can answer those for him, based upon their refusal to do so.

  1. Yes.
  2. Yes.
  3. Whatever looks interesting and/or incriminating.

If the answer was ‘no’ then they would have said it, that they refused to answer means the default assumption is ‘yes’ to the first two, and ‘whatever catches our eyes’ for the third.

Anonymous Coward says:

At least in Australia, they don’t have anything like Sarbanes Oxley, so he could have wiped his devices, and re-installed the operating system to keep the Australian Border Force from finding anything he did not want found, and would have been breaking current Australian laws.

It is only illegal right now, in Britain and the USA to wipe data to prevent Customs from being able to get anything.

Of course, laws like Sarbanes Oxley in the USA or Perverting the Course Of Justics in Britain is spurring manufacturers of wiping software to improve their products.

That is what Evidence Eliminator does not exist anymore. Better products that make it harder for prosecutors to prove that you wiped data to hide data from investigators are being written all the disk.

Programs that completely wipe the disk make it all but impossible for prosecutors to prove you wiped the disk, once you have re-installed the operating system and all your programs.

That is why that part of Sarbanes Oxley needs to be repealed, as makers of wiping software will just make their products better and harder to detect.

The software developers, themselves, cannot be prosecuted in the United States or Britain for making usage of their products hard to detect, since all the latest programs now are manufactured outside the USA or Britain, so their products are not subject to the laws of the United States or Britain.

If prosecutors cannot prove the drive was ever wiped, they have no case.

Anonymous Coward says:

Re: Re:

For cell phones, one way to fool Customs, would be to encrypt the phone, then reset it and reinstall your apps. Once the phone has been reset, the decryption key needed to decrypt the data is gone.

Encrypting data to hide it from Customs does not violate Sarbanes Oxley, in the USA, though it might be considered Perverting The Course Of Justice in Britain.

If they cannot decrypt your data, the worst that can happen to you is that you are denied entry. They cannot prosecute you for hiding data with encryption, so the worst that can happen is that you are denied entry.

Anon says:

Re: Re:

You privacy and warrant protection in Australia has long been lower in Australia than the US. Australia has lower equivalent to fourth and fifth amendment protections (just as it has less first and second amendment liberties). Search warrant requirements are much lower there, just as evidence from warrants unspecified on the warrant is much more likely to be allowed in court.. I lived there for five years, they also hand out $300 fines for adults not wearing a helmet or not having a bell on their bike. It is the ultimate nanny state

Anonymous Coward says:

Which is why you should backup your device in the cloud that you can trust. Maybe your own NAS if need be. Then wipe your device. At least wipe Say you have your Laptop, Delete all your personal files after they’re backed up. Not a simple delete either. Use real software that will actually delete the files where they can’t just be easily restored. All that’s really left is bascially Windows and your Log-In account. Search away all you want.

You can look at it as a Chromebook where everything is already in the cloud. Have your normal Chromebook account. And then a Worthless account. When you’re going to go to a boarder, wipe the Chromebook to new and then use your bogus account. You can have some worthless files on that account you don’t care about just so it looks like you use it.

With Windows, It’s harder as the files are normally all local. But it can be done. Don’t do a simple delete as it can be easily restored. Your Smartphone, you can do the same. Setup 2 accounts. Your normal one and your B.S. One. All your normal stuff on an iPhone is backed up to iCloud right? Reset your phone, wiping it to new, and log in using your B.S. account. An account that has a few Important Phone numbers in it. Maybe a couple of apps. That’s is. So long as it looks like your phone. You can even have it password protected. Here you go, I unlocked it, look away all you want!!!

Once through the checkpoint, go to the nearest McDonalds or where ever there’s free Wifi, Reset your phone to new again, and restore with your real account. If you have a ton of stuff on your phone, get the important things like your contacts and stuff which are small files, and worry about all your apps later. Or you can go to the app store and do a search and load a few you really need up faster, giving them higher priority.

This is really what it’s come down to. I have every right to my privacy.

Anonymous Coward says:

Re: Re:

If you are going to wipe your device, you will need to totally wipe and resintall, and using programs were Customs will never detect that wiping software is used. This is to avoid problems with Sarbanes Oxley in the USA or Perverting The Course Of Justice in Britain. So when doing this, get the latest software where usage will not be detected by either CBP in the USA or HM Customs in Britain.

If you use a program that totally wipes the hard disk, and then reinstall the OS and all your programs, there is no possible way they could ever find out you wiped your device.

Having your own home VPN, or a VPN service is also good when using a public WiFi when travelling out out state.

California’s computer crime law and the CFAA both require that you have used an illegally obtained password, for it to be illegal access, but that laws of some states may be different.

When I go to my favourite campground in Nevadafor stargazing, the nearest place I can go to get on the Internet is 65 miles away in Eureka, Nevada at the Sundowner Motel. I have a USB adapter with a 10 watt linear amplifier built in where I can park at the Chevron station in town to get onto the WiFi

While sitting at the gas station and using that motel’s wifi, from about a mile away, without being a guest, does not violate the CFAA, I am not sure of Nevada law, so I use a VPN outside the United States, so they cannot determine where I went, based on their router logs. Since the VPNs I use are not in the United States, they are not subject to the jurisdiction of ANY court in the United States.

I also pay with cash, when I put gas in my car before going back to the campground, so there is no money trail to follow me, in case Nevada investigators do ever come around there. The transaction records will only show that someone bought gas with cash, and no way to find out who made that purchase.

Anonymous Coward says:

Re: Re: Re:

“At a recent computer security conference in Las Vegas, I was struck by the fact that every computer security vendor was advertising its product, software, service or consulting services as, “100% Sarbanes Oxley Compliant.” It’s sort of like the saying of being fat free and having reduced carbs. It got me wondering, does the Sarbanes Oxley law really have anything at all to do with computer security? The quick answer is, not as much as you might suspect, but more than the law did before.”

https://www.theregister.co.uk/2005/05/03/sarbanes_oxley_for_it_security/

Anonymous Coward says:

Re: Re: Re: Re:

However, offshore manufacturers of disk wiping software are are not subject to Sarbanes Oxley, or any US laws. While the user could be prosecuted, the manufacturer of wiping programs, are not subject to Sarbanes Oxley, or any US laws.

The law does not prohibit the possession of wiping programs, incuding those that could be used to violate Sarbanes Oxley.

And making the programs to where authorities cannot detect their usage, is not illegal.

Anonymous Coward says:

I blame priviledge

Government officials get to travel with diplomatic bags and official business related papers which means they don’t get border hassled like commoners. If they had to experience equal treatment under the law they’d flip out and demand that unjust practices be put to an end immediately.

That One Guy (profile) says:

Re: I blame priviledge

If they had to experience equal treatment under the law they’d flip out and demand that unjust practices be put to an end immediately.

Or insist on an exception that would apply only to those wit the right connections/rank/wealth, like what they currently enjoy.

But yes, a whole lot of problems could be solved if politicians actually had to deal with what the rest of the public does, rather than getting the silk glove treatment.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...