Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

'Big Sis' Reasserts Unlimited Power to Seize and Inspect Laptops
Townhall.com ^ | February 13, 2013 | Bob Barr

Posted on 02/14/2013 10:07:55 AM PST by Kaslin

President Obama did not mention it in his State of the Union address last night, and there hasn’t been much attention devoted to it in the Congress of late; but, the fundamental right to privacy Americans have a right to expect from their own government, has suffered yet another body blow.

On the surface, things seem to be in order. For example, at the beginning of February, the Federal Trade Commission released a staff report outlining consumer privacy recommendations for developers of mobile phone apps. FTC Chairman Jon Leibowitz called the recommendations “best practices” intended to “safeguard consumer privacy,” that would “build trust in the mobile marketplace.”

Unfortunately, the rest of the Obama Administration hasn’t gotten the message.

The Department of Homeland Security (DHS), headed by Secretary Janet (“Big Sis”) Napolitano, just reaffirmed its policy that Americans returning home from travels abroad are subject to arbitrary searches and seizures of their computers and other electronic devices.

The controversy surrounding warrantless and suspicion-less searches at the U.S. border has been brewing for years. In 2009, for example, Napolitano asserted the government’s right to inspect and detain electronics from all persons traveling into the United States, and to copy any information stored on those devices. Continuing this view, the department’s Office for Civil Rights and Civil Liberties last week released its “Civil Liberties Impact Assessment” of the directives after originally setting a 120-day deadline back in August 2009.

As has become typical, the report contends the government can have its cake and eat it too. Confusingly, DHS concludes “current border search policies comply with the Fourth Amendment,” but that actually requiring federal agents to follow the Constitution would be “operationally harmful without concomitant civil rights/civil liberties benefits.” In other words, what government is doing is constitutional even though the cost of following the Constitution would outweigh the benefits to be realized by the citizens. Clear? As mud.

Courts have long recognized the federal government’s robust power to inspect people and goods entering the country. After all, the very foundation of national sovereignty is a nation’s ability to protect its borders. Until recently, however, this “border search” power was reasonably considered to be limited to physical searches necessary to discover illegal contraband attempted to be brought into the country; inspecting a traveler’s suitcases, for example.

The proliferation of electronic communications devices -- personal computers, iPads, Blackberries, and what not -- and the potential treasure trove of information contained in such devices, however, has pushed the government to assert the power and the right to inspect such devices and anything stored thereon, under the “border search” provision.

In Uncle Sam’s view, because evidence of potential criminal activity can be found in a laptop computer’s hard drive just as in the tourist’s suitcase following a visit to Mexico, the former enjoys no more protection against government snooping than the latter. This limitless perspective, and the vast power grab reflected in it -- based on nothing more than the fact that a person has travelled abroad and is returning to their home -- is preposterous. More important, this assertion seriously undermines the Fourth Amendment’s guarantee against unreasonable searches and seizures.

The average American returning from a trip abroad likely -- and understandably -- assumes the contents of his or her electronic device does not come close to meeting the threshold of “criminal” activity, such as would give a government agent the right to seize and peruse their iPad just because they are returning from a vacation. Government agents at our borders and ports of entry, however, are undeterred by such common sense and historically-sound notions of privacy.

In Napolitano’s view, just because an iPad is being carried by an American student returning from a semester studying in London, instead of returning to New York from Los Angeles, it becomes fair game for her agents to seize, inspect, download and retain data; all without any suspicion whatsoever the device’s owner has engaged in any illegal activity.

The “exhaustive,” three-year study conducted by the Department of Homeland is as flawed as most government “reports.” Unfortunately, unlike many other such projects, this one does more than just cost American taxpayers money; it comes at a heavy price to their fundamental, God-given right to privacy guaranteed by the Fourth Amendment to our Constitution.


TOPICS: Culture/Society; Editorial
KEYWORDS: barackobama; bigsis; bordersecurity; dhslaptopseizures; electronicdevices; immigration; stateoftheunion
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 last
To: ctdonath2

Everything on a computer can be read.Hackers can’t be stopped.


61 posted on 02/15/2013 9:09:11 AM PST by Vaduz
[ Post Reply | Private Reply | To 19 | View Replies]

To: Vaduz
You implied we don't have the right to privacy from our government. That's where we disagree. Tell me about that...I already know about credit reporting agencies - and what they can and can't collect. So leave the private sector out of this ...

Do you believe the United States government has the right to spy on private citizens. (without court orders)

62 posted on 02/15/2013 11:13:10 AM PST by GOPJ ( Illegal immigrants: violent boorish party crashers. Send them home, call police - make them leave.)
[ Post Reply | Private Reply | To 60 | View Replies]

To: GOPJ

You implied we don’t have the *right* to privacy from our government.
Not true I said there is no privacy.
Every transaction you do is recorded.Information on from birth to death is on file.
Ever wonder how much the IRS alone knows about you?.


63 posted on 02/16/2013 9:09:12 AM PST by Vaduz
[ Post Reply | Private Reply | To 62 | View Replies]

To: al baby
"...amble bosoms."

Are amble bosoms the kind that like to go out for a stroll by themselves? ;-)

64 posted on 02/16/2013 9:14:10 AM PST by Joe 6-pack (Qui me amat, amat et canem meum.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Joe 6-pack

Yes damits


65 posted on 02/16/2013 9:22:36 AM PST by al baby (Hi Mom)
[ Post Reply | Private Reply | To 64 | View Replies]

To: hiredhand

Do you know of any “partition encrypters” that they are not known to be able to get into?


66 posted on 03/05/2013 12:26:31 PM PST by DuncanWaring (The Lord uses the good ones; the bad ones use the Lord.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: DuncanWaring
Yes.... DM-Crypt for Linux. The default encryption algorithms (AES) are considered "strong", but it's not the algorithm alone which gives the system it's strength.

It's strength is in the way you set it up. The way I prefer is to encrypt the partition in question BUT keep the keys on a USB stick. But the USB stick itself has a DM-Crypt partition... inside of which is contained the clear-text keys for your hard disk's DM-Crypt partition.

In addition, you "could" create multiple partitions on the USB stick and keep trivial documents, and/or photos in them. Make sure that those partitions contain FAT or NTFS file systems so that a Windows system has no trouble reading them. "Most" people who examine such a USB stick never notice that one of the partitions is UNUSEABLE, nor do they pursue trying to discover what's in it.

I actually had it working such for awhile that the DM-Crypt partition was on my Android phone's SD card in a loop filesystem file. The phone wouldn't use it, but the Linux laptop DID when the phone was connected via USB! I ditched it though because I don't trust the Android that much. :-)

With the encryption keys kept separate from the laptop, accessing the laptop becomes nearly impossible without assistance from the owner. Also, concealing a micro-SD card with the "other" DM-Crypt partition on it, is a lot easier than hiding an entire laptop. :-)

Ubuntu Linux, Debian Linux, and MacOX come with partition level encryption capabilities. BUT... keeping your keys on separate media is still a subject which is off the beaten path. There's a LOT of info out there on how to do it with Linux. Just search Google (USE TOR!) using a string such as - "linux dm-crypt howto" and you'll get the answer. :-)

Since somebody is liable to ask... I'm going to tell you right now that keeping data on a fully encrypted partition brings with it other "issues". For starters, be sure to encrypt the swap space. A LOT of very useful information can be gleaned from unencrypted swap space. Encrypting swap space is easy though. :-) Also, backing it up is now an issue. I mean... HOW do you back up encrypted data, and keep the data secure if you simply back it up to other media? Well... you "could" DM-Crypt your media (external hard drive). I opted against this and instead use GNU Privacy Guard (GNUPG) and plain ole "tar". I stream the data to be backed up through gpg and tar, created a gpg encrypted tar archive as an end product. Oh... and the secret key for gnupg is on that USB stick INSIDE the DM-Crypt partition.

Anyway... pretty nerdy stuff... but that's just my preference. :-)
67 posted on 03/07/2013 10:20:55 AM PST by hiredhand
[ Post Reply | Private Reply | To 66 | View Replies]

To: hiredhand

Arg... forgive any typos in that posting. It posted before I meant to... got “button happy”. :-)


68 posted on 03/07/2013 10:22:36 AM PST by hiredhand
[ Post Reply | Private Reply | To 67 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson