Re: [TSCM-L] {2774} Expert urges China visitors to encrypt data

From: Carl H. Matthews <matth..._at_yahoo.com>
Date: Sun, 3 Aug 2008 15:43:25 -0700 (PDT)

Travelers' Laptops May Be Detained At Border

No Suspicion Required Under DHS Policies

 
Washington Post Staff Writer, Friday, August 1, 2008;
 

Federal agents may take a traveler's laptop computer or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed.
Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement.
"The policies . . . are truly alarming," said Sen. Russell Feingold (D-Wis.), who is probing the government's border search practices. He said he intends to introduce legislation soon that would require reasonable suspicion for border searches, as well as prohibit profiling on race, religion or national origin.
DHS officials said the newly disclosed policies -- which apply to anyone entering the country, including U.S. citizens -- are reasonable and necessary to prevent terrorism. Officials said such procedures have long been in place but were disclosed last month because of public interest in the matter.
 
Civil liberties and business travel groups have pressed the government to disclose its procedures as an increasing number of international travelers have reported that their laptops, cellphones and other digital devices had been taken -- for months, in at least one case -- and their contents examined.
The policies state that officers may "detain" laptops "for a reasonable period of time" to "review and analyze information." This may take place "absent individualized suspicion."
The policies cover "any device capable of storing information in digital or analog form," including hard drives, flash drives, cellphones, iPods, pagers, beepers, and video and audio tapes. They also cover "all papers and other written documentation," including books, pamphlets and "written materials commonly referred to as 'pocket trash' or 'pocket litter.' "
Reasonable measures must be taken to protect business information and attorney-client privileged material, the policies say, but there is no specific mention of the handling of personal data such as medical and financial records.
When a review is completed and no probable cause exists to keep the information, any copies of the data must be destroyed. Copies sent to non-federal entities must be returned to DHS. But the documents specify that there is no limitation on authorities keeping written notes or reports about the materials.
"They're saying they can rifle through all the information in a traveler's laptop without having a smidgen of evidence that the traveler is breaking the law," said Greg Nojeim, senior counsel at the Center for Democracy and Technology. Notably, he said, the policies "don't establish any criteria for whose computer can be searched."
Customs Deputy Commissioner Jayson P. Ahern said the efforts "do not infringe on Americans' privacy." In a statement submitted to Feingold for a June hearing on the issue, he noted that the executive branch has long had "plenary authority to conduct routine searches and seizures at the border without probable cause or a warrant" to prevent drugs and other contraband from entering the country.
Homeland Security Secretary Michael Chertoff wrote in an opinion piece published last month in USA Today that "the most dangerous contraband is often contained in laptop computers or other electronic devices." Searches have uncovered "violent jihadist materials" as well as images of child pornography, he wrote.
With about 400 million travelers entering the country each year, "as a practical matter, travelers only go to secondary [for a more thorough examination] when there is some level of suspicion," Chertoff wrote. "Yet legislation locking in a particular standard for searches would have a dangerous, chilling effect as officers' often split-second assessments are second-guessed."
In April, the U.S. Court of Appeals for the 9th Circuit in San Francisco upheld the government's power to conduct searches of an international traveler's laptop without suspicion of wrongdoing. The Customs policy can be viewed at: http://www.cbp.gov/linkhandler/cgov/travel/admissability/search_authority.ctt/search_authority.pdf.
 
 
 

--- On Sun, 8/3/08, James M. Atkinson <j..._at_tscm.com> wrote:
From: James M. Atkinson <j..._at_tscm.com>
Subject: [TSCM-L] {2774} Expert urges China visitors to encrypt data
To: TSCM-..._at_googlegroups.com
Date: Sunday, August 3, 2008, 5:17 PM

http://www.reuters.com/article/internetNews/idUSN3130781320080801

Expert urges China visitors to encrypt data
Fri Aug 1, 2008 1:26am EDT

WASHINGTON (Reuters) - China's blocking of Web sites has embarrassed 
the International Olympic Committee, but a computer security expert 
said on Thursday that visitors to Beijing also needed to protect 
their data from prying eyes.

"People who are going to China should take a clean computer, one with 
no data at all," said Phil Dunkelberger, chief executive of security 
software firm PGP Corp.

Travelers carrying smart cell phones, blackberries or laptop 
computers could unwittingly be offering up sensitive personal or 
business information to officials who monitor state-controlled 
telecommunications carriers, Dunkelberger said.

He said that without data encryption, executives could have business 
plans or designs pilfered, while journalists' lists of contacts could 
be exposed, putting sources at risk.

Dunkelberger said that during unrest in Tibet in March, overseas 
Tibetan activists found their computer systems under heavy pressure 
from Chinese security agencies trying to trace digital communications.

"What the Chinese tried to do was infiltrate their security to see 
who in China the Tibet movement was talking to," he said.

China's security policies clashed with Olympic norms on Thursday, 
when IOC officials said they were embarrassed by last-minute 
disclosures by the Chinese government that media covering the August 
8-24 Olympics would not have unfettered access to the Internet.

On Tuesday, U.S. Sen. Sam Brownback, a Kansas Republican, said China 
had installed Internet-spying equipment in all the major hotel chains 
serving the Olympics.

Citing hotel documents he received, Brownback said journalists, 
athletes' families and others attending the Olympics next month "will 
be subjected to invasive intelligence-gathering" by China's Public 
Security Bureau.

Dunkelberger, whose firm serves many multinational corporations 
operating in China, said, "A lot of places in the world, including 
China, don't have the same view of personal space and privacy that we 
do in the United States."

"You've got to suspect that every place you're doing work is being

monitored and being watched," he said.

His advice for travelers was to keep their electronic devices in the 
their possession at all times, and if they could not take a clean 
computer, be sure to encrypt the computer, files and even e-mails.

"Whether it's a file or an e-mail, if you're worried about it, you

should probably encrypt it," Dunkelberger said.


----------------------------------------------------------------------------------------------------
   World Class, Professional, Ethical, and Competent Bug Sweeps, and
Wiretap Detection using Sophisticated Laboratory Grade Test Equipment.
----------------------------------------------------------------------------------------------------
  James M. Atkinson                              Phone:  (978) 546-3803
  Granite Island Group                          Fax:      (978) 546-9467
  127 Eastern Avenue #291                 Web:    http://www.tscm.com/
  Gloucester, MA 01931-8008              E-mail:  mailto:jm..._at_tscm.com
----------------------------------------------------------------------------------------------------
  We perform bug sweeps like it's a full contact sport, we take no
prisoners,
and we give no quarter. Our goal is to simply, and completely stop the spy.
----------------------------------------------------------------------------------------------------






Received on Sat Mar 02 2024 - 00:57:25 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:45 CST