[Infowarrior] - Peter Swire: No, You Can't Search My Laptop
Richard Forno
rforno at infowarrior.org
Sat Aug 2 01:25:46 UTC 2008
http://www.americanprogress.org/issues/2008/06/laptop_testimony.html
No, You Can't Search My Laptop
Testimony to the Senate Judiciary Subcommittee on the Constitution
By Peter Swire | June 25, 2008
Peter Swire is a Senior Fellow at the Center for American Progress
Action Fund and a professor at the Moritz College of Law the Ohio
State University.
In recent months I have become increasingly aware of what I consider a
deeply flawed policy. The U.S. Customs and Border Patrol now takes the
position that it can seize and copy the contents of a laptop or other
computing device for a traveler entering the United States, based
simply on its authority to do traditional border searches.
The government seems to believe that, if they can open a suitcase at
the border, then they can open a laptop as well. This simplistic legal
theory ignores the massive factual differences between a quick glance
into a suitcase and the ability to copy a lifetime of files from
someone’s laptop, and then examine those files at the government’s
leisure.
This issue has come into sharp focus since the April decision of the
Ninth Circuit Court of Appeals in U.S. v. Arnold. That panel clearly
ruled that CPB can seize a laptop computer at the border, and examine
its contents, without any reasonable suspicion of unlawful activity.
Affidavits in that case and other credible reports show that agents at
the border are going further—they are requiring travelers to reveal
their passwords or encryption keys so that government agents can
examine the full content of the laptop or other computing device.
Other witnesses today will go into depth about crucial objections to
these laptop border searches, including constitutional prohibitions
under the First and Fourth Amendments, ethnic profiling, and severe
impact on commercial and individual travelers who are forced to reveal
confidential records to the government.
My focus is different, drawing on my personal involvement in the
encryption policy battles from a decade ago. My thesis is that laptop
border searches bear a striking similarity to the federal encryption
policy that was attempted during the 1990s but reversed in 1999. My
testimony presents a brief history of these “crypto wars,” as they
were called. In particular, the testimony describes the so-called
“Clipper Chip,” where the government hoped to gain the encryption keys
in advance for telecommunications devices. The testimony then examines
eight precise analogies between the failed encryption policy of the
1990s and laptop border searches. For each of the eight critiques, the
testimony explains how the critique applied to encryption policy and
how the same argument applies to today’s border searches:
1. Traditional legal arguments apply badly to new facts about computing
2. Government forces disclosure of encryption keys
3. Severe violation of computer security best practices
4. U.S. policy creates bad precedents that totalitarian and other
regimes will follow
5. Severe harm to personal privacy, free speech, and business secrets
6. Disadvantaging the U.S. economy
7. Political coalition of civil liberties groups and business
8. Technical futility of U.S. policy
Since I became aware of the issue of laptop border searches I have
spoken to an array of businesspeople, computer security experts, civil
liberties advocates, and ordinary people who hear what the government
is doing. The reaction has been uniform: “The government is doing
that? They are just stopping people at the border, opening people’s
laptops and making copies of what’s inside? It could happen to anyone,
even if they’ve done nothing wrong? That is simply not right.”
I hope today’s hearing will be an important step toward curbing the
current practices.
Read the full testimony (pdf)
http://www.americanprogress.org/issues/2008/06/pdf/swire_laptop_testimony.pdf
Peter Swire is a Senior Fellow at the Center for American Progress
Action Fund and a professor at the Moritz College of Law the Ohio
State University.
More information about the Infowarrior
mailing list