Feds claim right to laptops

Powered by SC Magazine
 

The United States Department of Homeland Security (DHS) will continue to allow its agents to seize notebook computers and retain the devices indefinitely.

The DHS said in a report that it will allow agents of the US Customs and Border Patrols (CBP) to seize electronic devices and copy or obtain them as part of a normal search procedure. The rule would allow agents to examine notebooks without any suspicion of a crime and copy the hard drive.

If no evidence of a crime is found, the agents will be forced to destroy the copies.

The practice of seizing and searching laptops in standard border searches has become a major point of contention between the DHS and civil liberties advocates. In a June statement, congressman Ross Feingold wrote that the practice was overly invasive and outside of the realm of a reasonable search.

"Customs agents must have the ability to conduct even highly intrusive searches when there is reason to suspect criminal or terrorist activity, but suspicionless searches of Americans’ laptops and similar devices go too far. Congress should not allow this gross violation of privacy," he wrote.

The DHS, however, defended the practice, saying that it was essential to national security.

"These examinations are part of CBP's long-standing practice and are essential to uncovering vital law enforcement information," the department argued.

"For example, examinations of documents and electronic devices are a crucial tool for detecting information concerning terrorism, narcotics smuggling, and other national security matters."

Copyright ©v3.co.uk


 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 327

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 136

Vote