[Infowarrior] - WaPo OpEd: Search and Replace (Laptops)

Richard Forno rforno at infowarrior.org
Wed Aug 13 13:02:20 UTC 2008


Search and Replace
Congress needs to set the rules for how border agents can delve into  
travelers' laptops.

http://www.washingtonpost.com/wp-dyn/content/article/2008/08/12/AR2008081202744_pf.html

Wednesday, August 13, 2008; A14

WHEN ATTEMPTING to enter or reenter the United States, noncitizens and  
citizens alike have become accustomed to all manner of searches.  
Luggage is examined at international airports by agents looking for  
illegal drugs, smuggled fruit, explosive devices and other forms of  
contraband. At the border, agents routinely search vehicles even when  
they don't have reasonable suspicion of wrongdoing. The Supreme Court  
has upheld such searches and unanimously concluded that the  
government's "interest in preventing the entry of unwanted persons and  
effects is at its zenith at the international border." Border  
searches, the justices have said, "are reasonable simply by virtue of  
the fact that they occur at the border."

Recently, the Department of Homeland Security disclosed that it is  
using the same broad authority to search travelers' laptop computers  
and other electronic devices. This may very well be legal under  
existing laws; two federal appeals courts have concluded as much. But  
it should not remain U.S. policy.

Laptops have become the repository of people's most private thoughts,  
their most sensitive financial, medical and professional documents.  
Unlike a hard-copy book or notebook, the entire contents of a laptop  
-- including a history of Web sites visited -- can be copied with a  
push of a button. These copies can then be disseminated to various  
government agencies. This capacity to store a vast array of  
information opens up possibilities for mischief that do not exist with  
more traditional receptacles of information; it also makes laptops  
potentially invaluable tools for law enforcement.

The Department of Homeland Security argues that it has the right to  
search and seize a laptop without a warrant or even suspicion. Yet it  
concedes that it is impossible for it to conduct searches on every  
laptop that enters the country. As a result, the department says it  
already applies a "reasonable suspicion" standard to determine which  
laptops to search. For security reasons, the department declines to  
say what triggers such "reasonable suspicion." But the standard is  
generally so low that it can be triggered by a traveler's appearing  
nervous or giving inconsistent answers to routine questions, such as  
how long and where he or she will be staying while in the country.

The reasonable-suspicion standard should be written into law.  
Legislation should also specify that owners of laptops must be present  
while an agent conducts a preliminary search. Line agents should be  
required to get approval from a supervisor before copying files from  
or seizing a laptop and must be able to articulate, at that point,  
that there is probable cause to believe the laptop owner may have  
violated U.S. law.

These reasonable compromises should in no way impede the government's  
ability to search laptops for such things as child pornography or  
terrorist plans. But they would go a long way toward giving the  
average, innocent traveler some protection against frivolous or  
mischievous intrusions.


More information about the Infowarrior mailing list