Friday, August 28, 2009

Homeland Security says laptop border searches will continue

When the United States Department of Homeland Security announced last summer that anyone can be the laptop, mobile phone, camera or recording to analyze them at the border for a period unknown, criticism was immediate. SEN. Norman Feingold, a Democrat, to move "warning", and it denounced Ayatollah Sistani as a "Fourth Amendment to surrender their rights at the border".

Does this not help that the United States Ninth Circuit Court of Appeal had already blessed operation - meaning that anyone, even American citizens, can muddle your toys in the possession of international arrivals to the borders or Even if 's zero evidence of illegal activities there. (Not for anyone happens in practice, of course, but despite this the Ministry of news about homeland security right.)

On Wednesday, Homeland Security Secretary Janet Napolitano announced new guidelines for arrest and search electronic devices at the border. In the press release, the Department of homeland security claimed that they "increase the monitoring and clarify searches of computers and other electronic media in the United States port of entry".

Rhetoric aside, in fact, little has changed. Laptops and electronic gear can still be held unlimited confiscation, 's need to be the owners of them even returned there six months passed, although pass the necessary supervision if they held over 15 days. Complete contents of a hard drive or memory card is for you to study the evidence of lawbreaking of any kind, even if it underpaying or not pay their parking tickets.

This open ended type of scan should anyone traveling internationally, not just privacy advocates have worried. When we need rules, without stealing the mail, that enough of sharing MP3 files to a federal crime, many college students, many unindicted felony? This file under suspicious - men - and - I'll show you - - unit is a crime.

Harvey Silverglate, criminal defense attorney in Boston and founder of Foundation for Individual Rights in Education is the next book, at this stage in three days to treason. "When the law is so broad that attract very normal activities very difficult," I said in an interview Silverglate: This week for CBSNews.com.

Here Summary of homeland security directive, U. S. Customs and Border Protection: "Officer May electronic devices or copy the information in the detention, for short, reasonable time to perform a detailed search boundary. Ydlaymkhyrat held in May in the search site and is outside the site, and as that may be completed expeditiously. "

After the examination is complete and you know is not criminals, the security of privacy impact assessment "c. When you examine the phone and electronic device (s) is full contact, are sent to you that may make you select - the name (s) during regular business hours where the item (s) was arrested. If it is impossible for you to pick the device, you can c the machine settings We ship you the cost to create ". (Who's responsible if the transport damaged guess everyone is.)

Homeland security said: Thursday that about 1.000 of laptop searches Ydlaymkhyrat 1 October 2008 through 11 August 2009 Ydlaymkhyrat was performed. One way to protect yourself from these searches, the use of encryption like PGP whole disk and make sure that the partner of your laptop completely down that crossing the border.

It is true that under the Obama administration, Homeland Security is trying to add elements to prevent copies of your digital photos or other private files to their personal collections, and has warned that trade secrets, journalists Notes and medical records should be handled carefully. Improve the situation over the Bush administration policy is.

But the government may be better than a simple: require evidence of wrongdoing - at least some suspicion of illegal activities - before the players through the computer and assorted other toys stir. This is what the bill by Senator last year, has been introduced. Feingold have carried. Issue a Wisconsin Democrat wanted to address still exists, let us hope their willingness to solve it as well.

No comments:

Post a Comment