Travelers' Laptops May Be Detained At Bord= er
No Suspicion Required= Under DHS Policies
|
|
Det. Michael T. O'Rourke, LPI SPS
Det. Mich= ael J. Dellose (FBI Ret.)
Inv. Mari= o A. Campana (FBI Ret.)
Inv. Domi= nec A. “Tony” Desderio (FBI Ret.)
Inv. Dona= ld P. Atkins, Jr. (FBI Ret.)
Inv. Bob = Rush (FBI Ret.)
Inv. Char=
les
Inv. Andy= Stack (DSP Ret.)
Inv. Jame= s F. Pietschmann (DOC Ret.)
CORPORATE HEADQUARTERS:
O'Rourke Investigative Associates, Inc.
FIELD OFFICES:
(Licensin= g: DE 03-90A PA 0100-9343/210 FL A-2700350 C-2700965)
Phone: (302)
e-mail: <= /FONT>DEIr..._at_aol.com website: www.orourkeinvestigative.com
427-3600
= TR>
--- On Sun, 8/3/08, Carl H. Matthews <mat= t..._at_yahoo.com> wrote:
From: Carl H. Matthews <matt..._at_yahoo.com>
S= ubject: Re: [TSCM-L] {2774} Expert urges China visitors to encrypt data
= To: TSCM-..._at_googlegroups.com
Date: Sunday, August 3, 2008, 6:43 PM
<= BR>
Travelers' Laptops May Be Detained At Bord= er
No Suspicion Required= Under DHS Policies
Washington Post Staff Writer, Friday, Aug= ust 1, 2008;Federal agents may take a traveler's laptop computer or other electron= ic device to an off-site location for an unspecified period of time without= any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed.Also, officials may share copies of the laptop's contents with other a= gencies and private entities for language translation, data decryption or o= ther reasons, according to the policies, dated July 16 and issued by two DH= S agencies,U.S. Customs and Border Protection and U.S. Immigration and Customs= Enforcement."The policies . . . are truly alarming," said Sen. R= ussell Feingold (D-Wis.), who is probing the government's border= search practices. He said he intends to introduce legislation soon that wo= uld require reasonable suspicion for border searches, as well as prohibit p= rofiling on race, religion or national origin.DHS officials said the newly disclosed policies -- which apply to anyo= ne entering the country, including U.S. citizens -- are reasonable and nece= ssary to prevent terrorism. Officials said such procedures have long been i= n place but were disclosed last month because of public interest in the mat= ter.Civil liberties and business travel groups have pressed the government= to disclose its procedures as an increasing number of international travel= ers have reported that their laptops, cellphones and other digital devices = had been taken -- for months, in at least one case -- and their contents ex= amined.The policies state that officers may "detain" laptops "for a reasonabl= e period of time" to "review and analyze information." This may take place = "absent individualized suspicion."The policies cover "any device capable of storing information in digit= al or analog form," including hard drives, flash drives, cellphones, iPods, pagers, beepers, and video and audio tapes. They also = cover "all papers and other written documentation," including books, pamphl= ets and "written materials commonly referred to as 'pocket trash' or 'pocke= t litter.' "Reasonable measures must be taken to protect business information and = attorney-client privileged material, the policies say, but there is no spec= ific mention of the handling of personal data such as medical and financial= records.When a review is completed and no probable cause exists to keep the in= formation, any copies of the data must be destroyed. Copies sent to non-fed= eral entities must be returned to DHS. But the documents specify that there= is no limitation on authorities keeping written notes or reports about the= materials."They're saying they can rifle through all the information in a travel= er's laptop without having a smidgen of evidence that the traveler is break= ing the law," said Greg Nojeim, senior counsel at the Center for D= emocracy and Technology. Notably, he said, the policies "don't e= stablish any criteria for whose computer can be searched."Customs Deputy Commissioner Jayson P. Ahern said the efforts "do not i= nfringe on Americans' privacy." In a statement submitted to Feingold for a = June hearing on the issue, he noted that the executive branch has long had = "plenary authority to conduct routine searches and seizures at the border w= ithout probable cause or a warrant" to prevent drugs and other contraband f= rom entering the country.Homeland Security Secretary Michael Chert= off wrote in an opinion piece published last month in US= A Today that "the most dangerous contraband is often contained i= n laptop computers or other electronic devices." Searches have uncovered "v= iolent jihadist materials" as well as images of child pornography, he wrote= .With about 400 million travelers entering the country each year, "as a= practical matter, travelers only go to secondary [for a more thorough exam= ination] when there is some level of suspicion," Chertoff wrote. "Yet legis= lation locking in a particular standard for searches would have a dangerous= , chilling effect as officers' often split-second assessments are second-gu= essed."In April, the U.S. Co= urt of Appeals for the 9th Circuit in San Francisco upheld the g= overnment's power to conduct searches of an international traveler's laptop= without suspicion of wrongdoing. The Customs policy can be viewed at: h= ttp:/ / www.cbp.gov/ linkhandler/ cgov/ travel/ admissability/ search_autho= rity.ctt/ search_authority.pdf.
--- On Sun, 8/3/08, James M. Atkinson <j..._at_tscm.com><= /I> wrote:From: James M. Atkinson <j..._at_tscm.com>
Subj= ect: [TSCM-L] {2774} Expert urges China visitors to encrypt data
To: TSC= M-..._at_googlegroups.com
Date: Sunday, August 3, 2008, 5:17 PMhttp://www.reuters.com/article/internetNews/idUSN3130781320080801 Expert urges China visitors to encrypt data Fri Aug 1, 2008 1:26am EDT WASHINGTON (Reuters) - China's blocking of Web sites has embarrassed the International Olympic Committee, but a computer security expert said on Thursday that visitors to Beijing also needed to protect their data from prying eyes. "People who are going to China should take a clean computer, one with no data at all," said Phil Dunkelberger, chief executive of security software firm PGP Corp. Travelers carrying smart cell phones, blackberries or laptop computers could unwittingly be offering up sensitive personal or business information to officials who monitor state-controlled telecommunications carriers, Dunkelberger said. He said that without data encryption, executives could have business plans or designs pilfered, while journalists' lists of contacts could be exposed, putting sources at risk. Dunkelberger said that during unrest in Tibet in March, overseas Tibetan activists found their computer systems under heavy pressure from Chinese security agencies trying to trace digital communications. "What the Chinese tried to do was infiltrate their security to see who in China the Tibet movement was talking to," he said. China's security policies clashed with Olympic norms on Thursday, when IOC officials said they were embarrassed by last-minute disclosures by the Chinese government that media covering the August 8-24 Olympics would not have unfettered access to the Internet. On Tuesday, U.S. Sen. Sam Brownback, a Kansas Republican, said China had installed Internet-spying equipment in all the major hotel chains serving the Olympics. Citing hotel documents he received, Brownback said journalists, athletes' families and others attending the Olympics next month "will be subjected to invasive intelligence-gathering" by China's Public Security Bureau. Dunkelberger, whose firm serves many multinational corporations operating in China, said, "A lot of places in the world, including China, don't have the same view of personal space and privacy that we do in the United States." "You've got to suspect that every place you're doing work is being monitored and being watched," he said. His advice for travelers was to keep their electronic devices in the their possession at all times, and if they could not take a clean computer, be sure to encrypt the computer, files and even e-mails. "Whether it's a file or an e-mail, if you're worried about it, you should probably encrypt it," Dunkelberger said. ---------------------------------------------------------------------------= Content-Type: multipart/alternative; boundary=----------------------- ------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------= Content-Type: multipart/alternative; boundary=----------------------- ------------------------- James M. Atkinson Phone: (978) 546-3803 Granite Island Group Fax: (978) 546-9467 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 E-mail: mailto:jm..._at_tscm.com ---------------------------------------------------------------------------= Content-Type: multipart/alternative; boundary=----------------------- ------------------------- We perform bug sweeps like it's a full contact sport, we take no prisoners, and we give no quarter. Our goal is to simply, and completely stop the spy. ---------------------------------------------------------------------------= Content-Type: multipart/alternative; boundary=----------------------- -------------------------Received on Sat Mar 02 2024 - 00:57:26 CSTThis archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:46 CST