You are here
Home › Bill Lindner › Laptops and Electronic Devices Subject To Detainment at U.S. BordersLaptops and Electronic Devices Subject To Detainment at U.S. Borders
The U.S. Department of Homeland Security (DHS) has reportedly decided that the U.S. Customs and Border Patrol reserves the right to seize -- for an indefinite amount of time and without probable cause -- documents and electronic media or copies thereof for further review, as well as make copies of, and "analyze the information transported by any individual attempting to enter, re-enter, depart, pass through, or reside in the United States."
The documents and electronic media may be detained for further review, either on-site at the place of detention or at an off-site location. Translated, that means that government contractors, the FBI and The National Security Agency, can hold the electronic media if asked to provide 'decryption assistance,' language translation or other reasons by the DHS. The new "policy" used by the DHS appears to be a result of the draconian Anti-Counterfeiting Trade Agreement we reported on in June.
Supposedly, the seized information will be destroyed unless there is a good reason to keep it, but given the U.S. Government's past history, don't count on a thumbstick bonfire. Earlier this year the security of data held by the CIA, the FBI and the U.S. Department of Defense was reportedly compromised after one of their 'partner' agency's allowed zone transfer access of its Domain Name Services.
Electronic media includes, but is not limited to: laptops, cameras, or "any device capable of storing information in digital or analog form" including hard drives, compact discs, DVDs, flash drives, portable music players, cell phones, pagers, beepers and videotapes. It also includes books, pamphlets and other printed material.
The DHS claims that the border searches of electronic information are useful in detecting terrorists, drug smugglers, alien admissibility, contraband like child pornography, monetary instruments, information in violation of copyright or trademark laws, and evidence of embargo violations or other import or export control laws.
The new DHS policies do not establish any criteria for determining which computers to search. Senator Russell Feingold (D-Wis) reportedly plans to introduce a bill requiring reasonable suspicion for border searches. As noted by CNET, unless Congress changes the law, the DHS may be able to get away with its new rules. Earlier this year, a U.S. Federal Appeals Court -- whose judges are appointed by the President -- ruled that an in-depth analysis of a laptop with forensics software is permissable with no probable cause or warrants under the border search doctrine.
The DHS says they protect the average citizen's rights, but they certainly show a blatant disregard for civil liberties. The Policy (PDF) regarding U.S. Customs and Border Protection and The ICE Policy (PDF) on U.S. Immigration and Customs Enforcement can be found from The Center for Democracy & Technology. More information on the new powers allowing the complete invasion of your privacy can be found from The Electronic Frontier Foundation (EFF). Information for preparing yourself to leave or enter the U.S. is available from CNET and The EFF. A couple examples of what happens when you become the racially profiled victim are available from The Daily Kos and SecondPageMedia.com.
Visit Bill's Links and More for more great tips, just like this one!
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.