[Infowarrior] - DHS Report on Border Laptop Searches
Richard Forno
rforno at infowarrior.org
Tue Sep 29 03:05:14 UTC 2009
DHS privacy report: Laptop searches at airports infrequent
Jaikumar Vijayan
25.09.2009 kl 17:45 | IDG News Service
http://news.idg.no/cw/art.cfm?id=F2595FA7-1A64-67EA-E4B4ED6EA03241AB
The U.S. Department of Homeland Security's annual privacy report card
revealed more details on the agency's controversial policy involving
searches of electronic devices at U.S. borders.
The U.S. Department of Homeland Security's annual privacy report card
revealed more details on the agency's controversial policy involving
searches of electronic devices at U.S. borders.
The 99-page report, which was released Thursday, also offered details
on the agency's efforts to address privacy risks in social media and
the use of imaging technologies that produce whole-body scans at
airport security checkpoints.
The report is the first DHS privacy assessment released to Congress
since the new administration took office. It covers the activities of
the DHS Privacy Office between July 2008 and June 2009.
For the most part, the report is a compilation of privacy-related
activities across the DHS during this period. However, it also offered
lesser-known details about some DHS programs. For instance, numbers
released in the report indicate that warrantless searches of
electronic devices at U.S. borders are occurring less frequently than
some privacy and civil rights advocates might have feared.
Of the more than 144 million travelers that arrived at U.S. ports of
entry between Oct. 1, 2008 and May 5, 2009, searches of electronic
media were conducted on 1,947 of them, the DHS said.
Of this number, 696 searches were performed on laptop computers, the
DHS said. Even here, not all of the laptops received an "in-depth"
search of the device, the report states. A search sometimes may have
been as simple as turning on a device to ensure that it was what it
purported to be. U.S. Customs and Border Protection agents conducted
"in-depth" searches on 40 laptops, but the report did not describe
what an in-depth search entailed.
The numbers add new perspective to the issue of border searches of
electronic devices. While the DHS has insisted on the need to perform
such searches, privacy and civil rights groups maintain such searches
are intrusive and violate an individual's constitutional rights
against unreasonable searches.
Social networking tools get close look
The report also noted the "myriad of complex legal, security and
privacy issues" raised by the use of social networking tools in the
federal government. As part of an effort to address such issues, the
DHS Office of Policy and the Office of Public Affairs have established
a Social Media Roundtable Working Group with representatives from
offices throughout the department, the report said.
The privacy office is also implementing a compliance process to ensure
that the department's use of social media tools complies with all
privacy laws, including the Privacy Act and the Homeland Security Act.
The DHS privacy office is asking all of the department's component
units to conduct so-called privacy threshold analyses to identify the
uses of social media within the DHS and their impact on privacy.
The report also noted the "heightened public interest" around the
Transportation Security Administration's use of imaging technologies
to search for items that passengers might be hiding beneath their
clothing. The report said the TSA has taken steps to mitigate the
privacy impact of the technology, for example, by having the person
viewing the scans in a remote location and by placing a blur over the
facial image. TSA is also working with technology providers to further
anonymize images by converting them to an abstract image, such as a
cartoon, the report said.
The report chronicled similar efforts to monitor the privacy
implications of a range of projects that privacy groups are also
watching. Examples include Einstein 2.0 network monitoring technology
that improves the ability of federal agencies to detect and respond to
threats, and the Real ID identity credentialing program. The DHS's
terror watch list program, its numerous data mining projects and the
secure flight initiative were also mentioned in the report.
More information about the Infowarrior
mailing list