Jump to content
Search In
  • More options...
Find results that contain...
Find results in...
Sik K Brah

Expect your computer to be seized without suspicion

Recommended Posts

if you dont wanna read the whole article...

 

Homeland security can now take your computer and search through all your files..

 

 

 

HACK DA PLANET

 

 

 

 

 

In what was presented to the public this week as a clarification of its privacy policy, the US Dept. of Homeland Security published a paper referring to new guidelines for its immigration and customs agents regarding how they may conduct border searches of travelers' computers and electronic media. Clarifying the existing law, both sets of guidelines reiterated the department's policy created during the previous administration: Agents may seize, detain, and/or retain individuals' PCs and media without having reason to suspect that those people or those machines and devices are connected with a crime.

 

 

"ICE [immigration and Customs Enforcement] Special Agents acting under border search authority may search, detain, seize, retain, and share electronic devices, or information contained therein, with or without individualized suspicion, consistent with the guidelines and applicable laws set forth herein," states the new policy for immigration authorities published last August 18 (PDF available here). "Assistance to complete a border search may be sought from other Federal agencies and non-Federal entities, on a case by case basis, as appropriate."

 

 

The guidelines for Customs & Border Patrol (CBP) agents says pretty much the same thing, adding that whenever a CBP agent encounters technical trouble figuring out how a mechanism works, or what the meaning of some piece of information is, he can seek help from other US government sources. "In such situations, Officers may transmit electronic devices or copies of information contained therein to seek technical assistance from other federal agencies," reads the CBP guidelines (PDF available here).

 

 

What's been a subject of contention ever since the government tightened border inspection policies in the wake of 9/11 hasn't been so much agents' rights to act without suspicion (although for some, that already crosses the line) as the authority DHS grants them to transmit the information they find elsewhere, under the auspices of "seeking help." Both guidelines now state that agents may only seek help from other federal sources, but they are not explicit with regard to what level -- for example, whether a private consultant under retainer for the FBI would qualify.

 

 

In their assessment of the extent of the risks this clarified policy might pose to citizens' and visitors' personal privacy, published last Tuesday (PDF available here), both border agencies, acting jointly, identified six specific areas: "(1) travelers may need additional information regarding the authority [agents have] to conduct border searches; (2) the traveler may be unaware of the viewing or detention of his/her information by CBP and ICE; (3) personally identifiable information (PII) may be detained where it is not needed; (4) PII may be misused by CBP and ICE officers; (5) CBP and ICE may disclose PII to other agencies that may misuse or mishandle it; and (6) new privacy risks may arise as the technology involved in this activity is ever-changing."

 

 

In other words, individuals may not be fully informed as to the extent of agents' authority, and what safeguards there may be to protect identifying information from falling into the hands of someone who can misuse it -- the privacy threat here being that the traveler may not know what the threat really is. The solution, DHS asserts, is by making that information about the private information that could be misused, public -- specifically, by publishing it in the Federal Register.

 

 

Under the heading, "Principle of Transparency," the DHS report explains, "When ICE or CBP retain information from electronic devices, that information may be subject to the requirements of the Privacy Act. The Privacy Act requires that agencies publish a System of Records Notice (SORN) in the Federal Register describing the nature, purpose, maintenance, use, and sharing of the information. This PIA and the several SORNs published by DHS provide notice of the retention of PII at the border and the retention of some of the contents of electronic devices."

 

 

So at the very least, an explanation of the events surrounding the detention or seizure of travelers' computers may be available online to those travelers (along with everyone else) on GPOAccess.gov. However, the Department goes on to say, the extent of the information shared online this way may be limited, especially with regard to how much the detained information is being shared, as well as with whom. This is for the good of any investigation that may arise.

 

"Because notifying the traveler of the sharing of information could impede an investigation or other law enforcement or national security efforts, CBP and ICE do not make the information sharing process fully transparent to the public," the report states. "To ensure the protection of personal data without compromising the investigation, CBP and ICE have instituted strict oversight and review processes. Generally speaking, information, including PII, will be shared with other agencies where CBP and/or ICE require subject matter expertise, decryption, or translation."

 

Those oversight and review processes will make the sharing of that information with other agencies legal and permissible under the Privacy Act of 1974. Appropriate safeguards and audit trails will be kept to track when and where information is exchanged, but for the sake of privacy, that information will be kept private.

Share this post


Link to post
Share on other sites

Simple.

 

Create a backup file. If they come, restore your comp to factory. They leave, put back ur pronz and such.

 

I win.

olive_trede_saundra_signs.JPG.60a79ccb99dac40ca8a1765ecd4ffd15.JPG

100_3010.jpg.8705dca883f58f86e2703a7661ad990e.jpg

Share this post


Link to post
Share on other sites

AMERICA FUCK YEAH!

 

I wonder what the constitution would look like if they had cellies back in the day

G wash is turning in his grave right now.

I can guarentee you in 2020, their will be a Homeland security party running for office under the same pretense as the fucking nazis

Heil Bush!

Share this post


Link to post
Share on other sites

I'd probably get locked up for assaulting someone who I thought was robbing me illegally.

There is no way this shit is constitutional or even slightly helping our security.

Share this post


Link to post
Share on other sites
Any time now, Lord_Casek or Seffiks will come in here with a solution.

 

No, you pretty much nailed it.

 

If I was gonna travel and didn't want to deal with any hassles at borders I'd just leave my laptop at home. If I HAD to bring my laptop (business or whatever) I'd swap out the hard drive and do a clean Linux install before I left. Or get a netbook.

 

Anyway, this is pretty old news...ICE was talking about doing this last year. Everyone's had ample lead time to deal with this.

 

What's going to be funny is when there's that ONE agent who assumes that all mp3s must be pirated and indiscriminately starts impounding laptops, cell phones and iPods...then watching the lawsuits roll in.

Share this post


Link to post
Share on other sites
Any time now, Lord_Casek or Seffiks will come in here with a solution.

 

 

Don't travel.

 

 

 

 

 

 

 

Or travel by crate.

  • Like 1

Share this post


Link to post
Share on other sites

Whats going to be even funnier is when someone on the edge already needs their electronic devices and data to earn a living.

Then the pompus ass piggies take it for no reason and now without means to make their living the person has nothing to loose.

News reports of a border station full of dead piggies and another "random" shooting surface.

Then I'll laugh.

Share this post


Link to post
Share on other sites
Whats going to be even funnier is when someone on the edge already needs their electronic devices and data to earn a living.

Then the pompus ass piggies take it for no reason and now without means to make their living the person has nothing to loose.

News reports of a border station full of dead piggies and another "random" shooting surface.

Then I'll laugh.

 

 

Expect the less violent lawsuits first.

Share this post


Link to post
Share on other sites

I know, I know,

Anything to get rid of the tax dollars we have way too much of all ready.

I hate it when my paycheck isn't fully raped by the government.

This will help.

Share this post


Link to post
Share on other sites
I know, I know,

Anything to get rid of the tax dollars we have way too much of all ready.

I hate it when my paycheck isn't fully raped by the government.

This will help.

 

 

I took the middle man out of the equation and just sent my wallet to the Whitehouse.

 

 

/Keep the "Change"

Share this post


Link to post
Share on other sites

homeland security can and will do anything, and having been fucked by them before i suggest to stay the fuck out of their way and keep a low profile in the first place.

Share this post


Link to post
Share on other sites

Hahah, I'm not fully against Obama, yet, if Michele wasn't the hottest first lady in history I'd be mad at him.

I do find this very disturbing, some piggly semitard can just take your shit for no reason, legally.

Share this post


Link to post
Share on other sites

There's always Truecrypt. You could encrypt everything, then send the 32 random character key in an email to yourself (sight unseen) and tell ICE "I swear, I don't know the password" when they try to shake you down.

Share this post


Link to post
Share on other sites

You ever seen that movie where Sean Pen does a juvy bid.

One of the kids puts gasoline in a light bulb, wires up explosives in the boom box.

That's the type of thinking needed to combat this piggery.

Share this post


Link to post
Share on other sites

who the fuck saves data on hardware anymore???

 

all my shit is locked up in cloud computing, no data tracking for me ó¿ó

 

i pop onto the interwebs, pull up my WebOS and there are all my files

Share this post


Link to post
Share on other sites

Register for a 12ozProphet forum account or sign in to comment

You need to be a forum member in order to comment. Forum accounts are separate from shop accounts.

Create an account

Register to become a 12ozProphet forum member.

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×