Feeds

ACLU challenges US laptop border searches

Civil liberties assessment still pending

The essential guide to IT transformation

Privacy campaigners are continuing a legal challenge against random laptop border searches by US customs amid concerns there may be a racial bias in those delayed and inconvenienced by stop and search powers introduced as part of the war on terror.

The ACLU also argues that searches of mobile phones by US border agents in the absence of any reason to be suspicious also pose a unwarranted invasion of privacy while delivering few tangible benefits.

Customs and Border Protection agents searched over 1,500 electronic devices at the US border over a period of nine months between October 2008 and June 2009, according to documents obtained by the ACLU as part of a Freedom of Information Act lawsuit and published on Thursday.

The documents also show that customs (CBP) agents forwarded electronic files found on travelers' devices to other agencies almost 300 times.

Some of the travelers inconvenienced by these searches complained that they ceaselessly accused of wrongdoing or otherwise embarrassed or inconvenienced by the searches, which agents are not obliged to justify under tightened regulations in force since July 2008. The policy was started by the Bush administration and continued by the Obama government.

THE ACLU is concerned that travelers have been left unable to carry medical records, financial information, and photos when they travel without the possibility of government inspection for no good reason.

"The CBP's ability to take and view the personal files of anyone passing through U.S. borders without any suspicion not only presents an inconvenience to travelers, but also fails to protect sensitive personal information that is commonly stored in laptops and cell phones," said Catherine Crump, staff attorney with the ACLU First Amendment Working Group. "Fundamental constitutional problems with this policy exist, and must be addressed."

"The government has a legitimate interest in searching electronic devices where there is individualized suspicion of wrongdoing, but CBP's policy allows officials to exercise their power arbitrarily," she added.

The ACLU is concerned there may be an element of racial profiling in those selected for data searches. CBP promised to issue a civil liberties assessment of the policy within six months but failed to make that deadline and is yet to issue a report. ®

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?