Feeds

Of laptops and US border searches

Feds seek unfettered access

Top 5 reasons to deploy VMware with Tegile

The consequences of the government's argument would be that they could, at the border, seize your daughter's iPod and lock her up if they thought the songs were not licensed. They could copy the entire contents of your computer, read your e-mail, medical records, communications with doctors, lawyers, or priests. They could examine deleted files, create a database of your friends and associates, and provide any or all of this information to the CIA, Interpol, the NSA, the FBI, or for that matter, the Iraqi intelligence services. All without probable cause, suspicion, or warrant, because you had the unmitigated gall to cross the border with your laptop.

Encrypting files on the laptop would be of little utility because, if they win their argument in another border search case in Vermont, they could compel you to provide them with the encryption key. The only thing you could do is not take your laptop or wipe it clean before you come back.

The consequences of the defendant's argument are likewise unappealing. If the government could not search computers at the border (or needed reasonable suspicion, which they don't need to search luggage), there is some merit to the argument that the computer will become the medium of choice for transporting contraband (although it's still easier to simply e-mail it to yourself.)

Luggage or laptop?

The government's argument is predicated on the assumption that a laptop is no different from any other container. Yet, that assumption is simply is not true.

Computers contain vast quantities of confidential and private information, communications, and relationships, for which most people would agree should be maintained with a reasonable expectation of privacy, even when they cross the border. While all of this information is entitled to legal protection against unreasonable (e.g. warrantless) searches by the government inside the country, some of it is entitled to even greater protection. Stored electronic communications, privileged materials, trade secrets, financial records, and other information are particularly protected against government intrusion.

While most people do not travel internationally with a copy of every chat they have ever had, or every Facebook friend's picture in their Samsonite, or every picture they have of their boyfriends or girlfriends, they have exactly this information on their laptops. They have their checkbook information, passwords, financial records, medical records, correspondence, records of books purchased, Web sites reviewed, and more. In short, communicative and expressive materials.

In 1958, the State of Alabama required the NAACP to provide it with the names and addresses of all of its members, a requirement that the Supreme Court held violated the expressive and due process rights of the organization. Yet, according to the current government's argument, if this information was contained somewhere on a laptop computer traveling across national borders, the information could be accessed, copied, and entered into a central depository, even absent of any evidence of criminal activity.

Secure remote control for conventional and virtual desktops

Next page: A compromise

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.