May 8, 2008

Border Agents Can Search Laptops Without Cause, Appeals Court Rules

By Ryan Singel April 22, 2008 | 6:21:20 PM 

Dellborders

Federal agents at the border do not need any reason to search through travelers' laptops, cell phones or digital cameras for evidence of crimes, a federal appeals court ruled Monday, extending the government's power to look through belongings like suitcases at the border to electronics.

The unanimous three-judge decision reverses a lower court finding that digital devices were "an extension of our own memory" and thus too personal to allow the government to search them without cause. Instead, the earlier ruling said, Customs agents would need some reasonable and articulable suspicion a crime had occurred in order to search a traveler's laptop.

On appeal, the government argued that was too high a standard, infringing upon its right to keep the country safe and enforce laws. Civil rights groups, joined by business traveler groups, weighed in, defending the lower court ruling.

The 9th U.S. Circuit Court of Appeals sided with the government, finding that the so-called border exception to the Fourth Amendment's prohibition on unreasonable searches applied not just to suitcases and papers, but also to electronics.

The ruling (.pdf) came in a case where customs agents searched the laptop of Michael Arnold who was returning from the Philippines. They found images they believed to be child pornography, seized the laptop and later arrested him. While the lower court ruling excluded from trial the pictures of young boys the government says it found on the hard drive, they now can be used again.

The panel chose to follow the reasoning of a similar case from the 4th Circuit, known as Ickes (.pdf), which held that the government did not need any reason to search a vehicle crossing the border.

The 9th's ruling did not, however, clarify whether a traveler has to help the government search his computer, by providing the login information, or what would happen when the government decided to search a laptop with encrypted data on the drive. The defendant in the case can appeal the decision to the U.S. Supreme Court, but the Court is unlikely to take up an issue that two separate appeals courts have agreed upon.

In the meantime, travelers should be aware that anything on their mobile devices can be searched viagra no prescription by government agents, who may also seize the devices and keep them for weeks or months. When in doubt, think about whether online storage or encryption might be tools you should use to prevent the feds from rummaging through your journal, your company's confidential business plans or naked pictures of you and your-of-age partner in adult fun.

The case is Arnold vs. USA.

See Also:

Permalink • Print • Comment

March 17, 2008

Clarity Sought on Electronics Searches

U.S. Agents Seize Travelers' Devices  

By Ellen Nakashima
Washington Post Staff Writer
Thursday, February 7, 2008; A01

Nabila Mango, a therapist and a U.S. citizen who has lived in the country since 1965, had just flown in from Jordan last December when, she said, she was detained at customs and her cellphone was taken from her purse. Her daughter, waiting outside San Francisco International Airport, tried repeatedly to call her during the hour and a half she was questioned. But after her phone was returned, Mango saw that records of her daughter's calls had been erased.

A few months earlier in the same airport, a tech engineer returning from a business trip to London objected when a federal agent asked him to type his password into his laptop computer. "This laptop doesn't belong to me," he remembers protesting. "It belongs to my company." Eventually, he agreed to log on and stood by as the officer copied the Web sites he had visited, said the engineer, a U.S. citizen who spoke on the condition of anonymity for fear of calling attention to himself.

Maria Udy, a marketing executive with a global travel management firm in Bethesda, said her company laptop was seized by a federal agent as she was flying from Dulles International Airport to London in December 2006. Udy, a British citizen, said the agent told her he had "a security concern" with her. "I was basically given the option of handing over my laptop or not getting on that flight," she said.

The seizure of electronics at U.S. borders has prompted protests from travelers who say they now weigh the risk of traveling with sensitive or personal information on their laptops, cameras or cellphones. In some cases, companies have altered their policies to require employees to safeguard corporate secrets by clearing laptop hard drives before international travel.

Today, the Electronic Frontier Foundation and Asian Law Caucus, two civil liberties groups in San Francisco, plan to file a lawsuit to force the government to disclose its policies on border searches, including which rules govern the seizing and copying of the contents of electronic devices. They also want to know the boundaries for asking travelers about their political views, religious practices and other activities potentially protected by the First Amendment. The question of whether border agents have a right to search electronic devices at all without suspicion of a crime is already under review in the federal courts.

The lawsuit was inspired by two dozen cases, 15 of which involved searches of cellphones, laptops, MP3 players and other electronics. Almost all involved travelers of Muslim, Middle Eastern or South Asian background, many of whom, including Mango and the tech engineer, said they are concerned they were singled out because of racial or religious profiling.

A U.S. Customs and Border Protection spokeswoman, Lynn Hollinger, said officers do not engage in racial profiling "in any way, shape or form." She said that "it is not CBP's intent to subject travelers to unwarranted scrutiny" and that a laptop may be seized if it contains information possibly tied to terrorism, narcotics smuggling, child pornography or other criminal activity.

The reason for a search is not always made clear. The Association of Corporate Travel Executives, which represents 2,500 business executives in the United States and abroad, said it has tracked complaints from several members, including Udy, whose laptops have been seized and their contents copied before usually being returned days later, said Susan Gurley, executive director of ACTE. Gurley said none of the travelers who have complained to the ACTE raised concerns about racial or ethnic profiling. Gurley said none of the travelers were charged with a crime.

"I was assured that my laptop would be given back to me in 10 or 15 days," said Udy, who continues to fly into and out of the United States. She said the federal agent copied her log-on and password, and asked her to show him a recent document and how she gains access to Microsoft Word. She was asked to pull up her e-mail but could not because of lack of Internet access. With ACTE's help, she pressed for relief. More than a year later, Udy has received neither her laptop nor an explanation.

ACTE last year filed a Freedom of Information Act request to press the government for information on what happens to data seized from laptops and other electronic devices. "Is it destroyed right then and there if the person is in fact just a regular business traveler?" Gurley asked. "People are quite concerned. They don't want proprietary business information floating, not knowing where it has landed or where it is going. It increases the anxiety level."

Udy has changed all her work passwords and no longer banks online. Her company, Radius, has tightened its data policies so that traveling employees must access company information remotely via an encrypted channel, and their laptops must contain no company information.

At least two major global corporations, one American and one Dutch, have told their executives not to carry confidential business material on laptops on overseas trips, Gurley said. In Canada, one law firm has instructed its lawyers to travel to the United States with "blank laptops" whose hard drives contain no data. "We just access our information through the Internet," said Lou Brzezinski, a partner at Blaney McMurtry, a major Toronto law firm. That approach also holds risks, but "those are hacking risks as opposed to search risks," he said.

The U.S. government has argued in a pending court case that its authority to protect the country's border extends to looking at information stored in electronic devices such as laptops without any suspicion of a crime. In border searches, it regards a laptop the same as a suitcase.

"It should not matter . . . whether documents and pictures are kept in 'hard copy' form in an executive's briefcase or stored digitally in a computer. The authority of customs officials to search the former should extend equally to searches of the latter," the government argued in the child pornography case being heard by a three-judge panel of the Court of Appeals for the 9th Circuit in San Francisco.

As more and more people travel with laptops, BlackBerrys and cellphones, the government's laptop-equals-suitcase position is raising red flags.

"It's one thing to say it's reasonable for government agents to open your luggage," said David D. Cole, a law professor at Georgetown University. "It's another thing to say it's reasonable for them to read your mind and everything you have thought over the last year. What a laptop records is as personal as a diary but much more extensive. It records every Web site you have searched. Every e-mail you have sent. It's as if you're crossing the border with your home in your suitcase."

If the government's position on searches of electronic files is upheld, new risks will confront anyone who crosses the border with a laptop or other device, said Mark Rasch, a technology security expert with FTI Consulting and a former federal prosecutor. "Your kid can be arrested because they can't prove the songs they downloaded to their iPod were legally downloaded," he said. "Lawyers run the risk of exposing sensitive information about their client. Trade secrets can be exposed to customs agents with no limit on what they can do with it. Journalists can expose sources, all because they have the audacity to cross an invisible line."

Hollinger said customs officers "are trained to protect confidential information."

Shirin Sinnar, a staff attorney with the Asian Law Caucus, said that by scrutinizing the Web sites people search and the phone numbers they've stored on their cellphones, "the government is going well beyond its traditional role of looking for contraband and really is looking into the content of people's thoughts and ideas and their lawful political activities."

If conducted inside the country, such searches would require a warrant and probable cause, legal experts said.

Customs sometimes singles out passengers for extensive questioning and searches based on "information from various systems and specific techniques for selecting passengers," including the Interagency Border Inspection System, according to female version of viagra a statement on the CBP Web site. "CBP officers may, unfortunately, inconvenience law-abiding citizens in order to detect those involved in illicit activities," the statement said. But the factors agents use to single out passengers are not transparent, and travelers generally have little access to the data to see whether there are errors.

Although Customs said it does not profile by race or ethnicity, an officers' training guide states that "it is permissible and indeed advisable to consider an individual's connections to countries that are associated with significant terrorist activity."

"What's the difference between that and targeting people because they are Arab or Muslim?" Cole said, noting that the countries the government focuses on are generally predominantly Arab or Muslim.

It is the lack of clarity about the rules that has confounded travelers and raised concerns from groups such as the Asian Law Caucus, which said that as a result, their lawyers cannot fully advise people how they may exercise their rights during a border search. The lawsuit says a Freedom of Information Act request was filed with Customs last fall but that no information has been received.

Kamran Habib, a software engineer with Cisco Systems, has had his laptop and cellphone searched three times in the past year. Once, in San Francisco, an officer "went through every number and text message on my cellphone and took out my SIM card in the back," said Habib, a permanent U.S. resident. "So now, every time I travel, I basically clean out my phone. It's better for me to keep my colleagues and friends safe than to get them on the list as well."

Udy's company, Radius, organizes business trips for 100,000 travelers a day, from companies around the world. She says her firm supports strong security measures. "Where we get angry is when we don't know what they're for."

Staff researcher Richard Drezen contributed to this report

Permalink • Print • Comment

March 8, 2008

New Telecom Whistleblower Describes Open Surveillance Gateway

Trio of Commerce Chairmen Call for Further Investigation Based on Latest Spying Allegations

Washington D.C. – Three powerful House Commerce Committee Chairmen strongly urged their colleagues Thursday to defer acting on requests for retroactive immunity and to demand more information from the White House and the telecommunications companies in the wake of disclosures by another whistleblower that the government apparently has been granted an open gateway to customer information and calls by a major telecommunications company.

Babak Pasdar, a computer security consultant, has gone public about his discovery of a mysterious "Quantico Circuit" while working for an unnamed major wireless carrier. Pasdar believes that this circuit gives the U.S. government direct, unfettered access to customers' voice calls and data packets. These claims echo the disclosures from retired AT&T technician Mark Klein, who has described a "secret room" in an AT&T facility.

The White House is putting heavy pressure on lawmakers to grant the telecoms immunity from lawsuits over the spying as part of Foreign Intelligence Surveillance Act (FISA) legislation pending in Congress. But in today's letter — written by John Dingell, Chairman of the House Committee on Energy and Commerce; Ed Markey, Chairman of the House Subcommittee on Telecommunications and the Internet; and Bart Stupak, Chairman of the Subcommittee on Oversight and Investigations — the congressmen argue that lawmakers must not "vote in the dark" on the immunity issue when "profound privacy and security risks" are involved.

"When you put Mr. Pasdar's information together with that of AT&T whistleblower Mark Klein, there is troubling evidence of telecom misconduct in massive domestic surveillance of ordinary Americans," said Cindy Cohn, Legal Director of the Electronic Frontier Foundation (EFF).

"Congress needs to have hearings and get some answers about whether American telecommunications companies are helping the government to illegally spy on millions of us.

Retroactive immunity for telecom companies now ought to be off the table in the ongoing FISA debate."

EFF represents the plaintiffs in Hepting v. AT&T, a class-action lawsuit brought by AT&T customers accusing the telecommunications cheap viagra 100mg company of violating their rights by illegally assisting the National Security Agency in widespread domestic surveillance. The Hepting case is just one of many suits aimed at holding telecoms responsible for knowingly violating federal privacy laws with warrantless wiretapping and the illegal transfer of vast amounts of personal data to the government.

For the full letter:

http://www.eff.org/files/newwhistleblower.pdf

For more on the telecoms' role in warrantless spying:

http://www.eff.org/issues/nsa-spying

For this complete release:

http://www.eff.org/press/archives/2008/03/06

Permalink • Print • Comment

February 29, 2008

FISA News and Updates

The battle against telecom immunity continues in Washington DC, with a fear-mongering press blitz from the Administration and other supporters of immunity for lawbreaking telecoms.

EFF Senior Staff Attorney Kurt Opsahl counters some of the many myths delivered by the White House Press Secretary Dana Perino during a recent briefing:

http://www.eff.org/deeplinks/2008/02/myth-facts-about-retroactive-immunity-and-attorneys

EFF buying viagra Designer/Activist Hugh D'Andrade documents the "slips and stalls" perpetrated by proponents of immunity, whose yowling arguments for immunizing the telecoms are later contradicted by facts that they must acknowledge:

http://www.eff.org/deeplinks/2008/02/republican-slips-and-stalls

And this past week, four former senior level intelligence officials wrote to Director of National Intelligence Mike McConnell to challenge recent statements on telecom immunity and its relationship to surveillance and security:

http://www.eff.org/deeplinks/2008/02/four-former-intelligence-professionals-write-dni-mcconnell

For the text of the letter from the former intelligence officials to DNI Mike McConnell:

http://www.nsnetwork.org/node/253

Permalink • Print • Comment

EFF Lawsuit Demands Records of Contacts Between Former Justice Department Official and Google

DOJ's Top Privacy Lawyer Left Government Post for Job with Online Giant

Washington, D.C. – The Electronic Frontier Foundation (EFF) filed suit against the Department of Justice (DOJ) this week, demanding information about communications between the DOJ's former top privacy official and Google, the official's current employer.

Jane C. Horvath was named the DOJ's first Chief Privacy and Civil Liberties Officer in February of 2006. At that time, Google was fighting a massive DOJ subpoena asking for the text of every query entered into the search engine over a one-week period. The DOJ request — part of a court battle over the constitutionality of a law regulating adult materials on the Internet — ignited a national debate about Internet privacy.

The DOJ later scaled back its request, and a judge eventually allowed access to only 5000 random Google search queries. In a subsequent news article, Horvath was publicly critical of the DOJ's initial subpoena, saying buying viagra in uk she had privacy concerns about the massive request for information.

Horvath's new job as Google's Senior Privacy Counsel was announced in August of 2007.

EFF asked the DOJ for information about communications between Horvath and Google with a Freedom of Information Act (FOIA) request as Horvath prepared to leave the agency, but the DOJ has not responded to the request more than six months after it was submitted.

"Google has an unprecedented ability to collect and retain very personal information about millions of Americans, and the DOJ and other law enforcement agencies have developed a huge appetite for that information," said EFF Senior Counsel David Sobel. "We want to know what discussions DOJ's top privacy lawyer had with Google before leaving her government position to join the company."

EFF's suit demands records of all correspondence, email, or other communications between Horvath and Google, and asks the court to order the DOJ to immediately process the documents for release.

This FOIA lawsuit is part of EFF's FLAG Project, which uses FOIA requests and litigation to expose the government's expanding use of technologies to invade privacy. Previous EFF FOIA requests have uncovered misuse of National Security Letters (NSLs) by the FBI, as well as improper FBI access to email from an entire computer network.

For the full complaint against the DOJ:

http://www.eff.org/files/filenode/doj_google/foia_complaint_filed.pdf

For more on EFF's FLAG Project:

http://www.eff.org/issues/foia

For this release:

http://www.eff.org/press/archives/2008/02/26

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and a healthy dose of Semiologic • Sky Gold skin by Denis de Bernardy