Feeds

Of laptops and US border searches

Feds seek unfettered access

The essential guide to IT transformation

Recently, I was going through an airport with my shoes, coat, jacket, and belt off as well as with my carry-on bag, briefcase, and laptop all separated for easy inspection. I was heading through security at the Washington D.C., Ronald Reagan National Airport in Arlington, Virginia, or "National" as we locals call it. As I passed through the new magnetometer which gently puffed air all over my body - which to me seems to be a cross between a glaucoma test and Marilyn Monroe in Gentlemen Prefer Blondes - a TSA employee absent-mindedly asked if he could "inspect" my laptop computer. While the inspection was cursory, the situation immediately gave me pause: What was in my laptop anyway?

Similar thoughts must have gone through the head of Michael Timothy Arnold on July 17, 2005. He was having a bad day that was about to get much worse.

Arnold arrived at the International Arrivals Building at Los Angeles International Airport after a 20-hour flight from the Philippines. He might have looked like any other US traveler arriving from Manila after what he said was a three-week vacation visiting friends--tired, haggard, and casual. The Customs and Border Patrol agents were a bit suspicious, because they knew the Philippines is a haven for "sex tourism." They were also suspicious because Arnold could not remember the name of the company where he had once worked as a night auditor and appeared "fidgety." They demanded that Arnold power up his laptop, which the agents then examined for child pornography - which they ultimately found.

The Federal District Court rejected the government's argument that a search of a laptop is no different than rifling through luggage during arrivals inspection, and they suppressed the warrantless and essentially "suspicious-less" laptop search as unreasonable. The case was argued before the federal appellate court in October 2007 and a decision is imminent. The salient question: To what extent may customs, border, immigration, or other government officials search, mirror, copy, or analyze the contents of electronic gadgets with neither probable cause nor a warrant?

At the edge of law

It is clear that people traveling into and out of a country have a lower expectation of privacy at the border. Perhaps more accurately, a governmental search at the border is more likely to be considered "reasonable."

The agents get to do things they can't do if, for example, they simply stop you on the street. They can question you, they can rifle through your unmentionables, and even examine documents you are bringing with you. The agents can even disassemble your gas tank, looking for hidden compartments that you could be using to smuggle things. In the Arnold case, the government argued that its search authority at the border is "plenary" or unrestricted, except that to do an invasive body cavity search, it would have to have some kind of suspicion.

But searches of things? Well, they can do whatever they want it would seem.

The customs agents' job is to protect the nation from "anything harmful," to gather intelligence, prevent terrorism, and to enforce all of the laws, including child pornography and copyright laws. The computer is no different from any other "closed container" that the agent may search. Just as the agent needs no probable cause to search your underwear, they need no probable cause to rummage through your laptop. And besides, they are doing it to protect the country and enforce the laws and prevent terrorist attacks. You don't have any privacy rights at the border anyway, so what's the problem?

Same planet, different worlds

So, for example, is a computer the same as a briefcase or suitcase, under the law? I mean, if you don't want your stuff searched, don't bring it with you. You abandon your "expectation of privacy" at the border, right?

The government's position is as frightening as it is naíve. A computer is not the same thing as a briefcase. Nor, for that matter, is an iPod, a thumb drive, or a cell phone. It is both quantitatively and qualitatively different, and that makes all of the difference in this case. It seems that the government and the lower court are speaking past, and not at, each other. The government says, "We can do anything for any reason," and the court says, "No, you need reasonable suspicion to search a laptop."

Indeed, they are both wrong.

Secure remote control for conventional and virtual desktops

Next page: Luggage or laptop?

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
Pedals and wheel in that Google robo-car or it's off the road – Cali DMV
And insists on $5 million insurance per motor against accidents
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.