Feeds

ACLU challenges US laptop border searches

Civil liberties assessment still pending

Using blade systems to cut costs and sharpen efficiencies

Privacy campaigners are continuing a legal challenge against random laptop border searches by US customs amid concerns there may be a racial bias in those delayed and inconvenienced by stop and search powers introduced as part of the war on terror.

The ACLU also argues that searches of mobile phones by US border agents in the absence of any reason to be suspicious also pose a unwarranted invasion of privacy while delivering few tangible benefits.

Customs and Border Protection agents searched over 1,500 electronic devices at the US border over a period of nine months between October 2008 and June 2009, according to documents obtained by the ACLU as part of a Freedom of Information Act lawsuit and published on Thursday.

The documents also show that customs (CBP) agents forwarded electronic files found on travelers' devices to other agencies almost 300 times.

Some of the travelers inconvenienced by these searches complained that they ceaselessly accused of wrongdoing or otherwise embarrassed or inconvenienced by the searches, which agents are not obliged to justify under tightened regulations in force since July 2008. The policy was started by the Bush administration and continued by the Obama government.

THE ACLU is concerned that travelers have been left unable to carry medical records, financial information, and photos when they travel without the possibility of government inspection for no good reason.

"The CBP's ability to take and view the personal files of anyone passing through U.S. borders without any suspicion not only presents an inconvenience to travelers, but also fails to protect sensitive personal information that is commonly stored in laptops and cell phones," said Catherine Crump, staff attorney with the ACLU First Amendment Working Group. "Fundamental constitutional problems with this policy exist, and must be addressed."

"The government has a legitimate interest in searching electronic devices where there is individualized suspicion of wrongdoing, but CBP's policy allows officials to exercise their power arbitrarily," she added.

The ACLU is concerned there may be an element of racial profiling in those selected for data searches. CBP promised to issue a civil liberties assessment of the policy within six months but failed to make that deadline and is yet to issue a report. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.