They can do whatever they want to do in Constitution-free zones.
It is best to encrypt your data. I donât have anything interesting on my laptop but do have an encrypted volume. This not only give me a place to keep confidential data in the event I need to, but if more of us have such a volume, it adds to the general difficulty of laptop searches in border zones. At this point, you canât be forced to reveal the password to your encryption in the US.
I worked for a place, that sent people overseas with freshly-imaged laptops, and a managed online backup service.
Youâd back up to the States daily, and were supposed to wipe and re-image before crossing ANY borderâŚ
Lets hope the terrorists donât get their hands on elite backup technology.
Hey Hey Hey Whatâs that you say?
We lose a bit of freedom everyday!
Yeah, itâs not like itâs HARD. We just paid for a separate instance of a commercial service. . .
Of course, the one time I went overseas, after wiping the box prior to returning to the US, I downloaded a bunch of LOLcats, and placed them in a folder marked âKitty Pornâ.
And of course, they didnât search my laptop . . .
My solution would be full-disk encryption with the password having to be entered before the machine can boot and get to the login screen. Iâd also require a password to log in to my user account. And Iâd arrange it so I didnât know the passwords. Theyâd be randomly generated, set and sent to my server for later retrieval so if anyone asks for them I can legitimately say I just donât have them on me. I wonât be able to use the computer until I get home and retrieve the passwords, but any data on it is inaccessible.
Better yet would be to store everything server-side. Partition my disk so I have a D: drive for data and use it to store everything, then shovel it up to a server and wipe and reformat D: before I travel. C: could be a stock Windows image taken right after Iâd installed and configured things, I can wipe it and load the image on from a DVD or USB stick and remove any traces of anything but a completely clean, sterile system. The best way to deal with a search is to have nothing to find.
If the problem is lack of connectivity where youâre going, get 2 SSD hard drives. One is your working drive (with full-disk encryption, natch), the other is a vanilla unencrypted Windows installation with nothing on it. Before you head home, pull the working drive out and replace it with the vanilla Windows drive. Ship the working drive home separately. Let them search, the only things theyâll find will be profoundly uninteresting. They wonât be able to legitimately complain you didnât cooperate, after all thereâs the computer you handed over and it works and everything and they can see everything on it, itâs not your fault thereâs nothing they wanted to find there.
I wonder how soon the courts will just rule that the government can do whatever the hell it wants in all circumstances?
After all, if requiring reasonable suspicion for a border laptop search could lead to litigation, or reveal national security information, why then, the same is true of searching your laptop in your home, is it not?
Or searching your home. Or your body cavities. Or putting you in a cell indefinitely without charges. All in the name of keeping us safe, of course. From the terrorists, that is. No need to keep us safe from our own government; because, you know, theyâre the good guys.
By the way â if the search is done out of your sight, well then! Say hello to your new hardware. Or rather, their hardware, attached to your computer to snoop on you. Unless they checked and found the factory-installed snoops intact. Jacob Applebaumâs recent 30c3 presentation goes into a lot of details on that sort of thing.
Man, the case for some trusted home server or trusted online source and just bring a burner cheap laptop with a lightweight linux distro clean install just gets more and more made. If it gets taken for search then just consider it suspect and sell/trash it and get another cheap one after crossing.
Encryption of the local drive is NOT the right answer - even if the law doesnât allow them to force you to reveal your password, the law isnât that much of a deterrent for these people.
Walk across the border with a clean laptop, put your data in an encrypted file in the cloud, restore it when you arrive at your destination.
And remember, the border is a zone 100 miles in from the map-line border; that takes in around 2/3 of the US population. The area around international airports and other major transportation hubs are also within the border, so that takes in most of the rest.
someone should draw a map which illustrates exactly how much of the US is considered to be âborderâ - perhaps shaded blue for âPatriotic Border Searches for any reason OK at anytime within this areaâ and red for âgodless commies and hippies in this areaâ ⌠or sumfink.
Iâd do it, but my shoop skillz sux0rz. Call David McCandless, stat!
great, now the border can search your laptop and bottom
Here is a map showing 100 miles from the border:
Do borders include ports, harbours and airports?
many thanks fireshadow, but yeah; that map doesnât appear(?) to include 100m circles around inland airports? (and ports along, say, the Mississippi?)
That doesnât seem like the kind of thing the ACLU would get wrong, though
(1) External boundary. The term external boundary, as used in section 287(a)(3) of the Act, means the land boundaries and the territorial sea of the United States extending 12 nautical miles from the baselines of the United States determined in accordance with international law.
(2) Reasonable distance. The term reasonable distance, as used in section 287(a) (3) of the Act, means within 100 air miles from any external boundary of the United States or any shorter distance which may be fixed by the chief patrol agent for CBP, or the special agent in charge for ICE, or, so far as the power to board and search aircraft is concerned any distance fixed pursuant to paragraph (b) of this section.
8 USC § 1357 - Powers of immigration officers and employees:
(a) Powers without warrant
Any officer or employee of the Service authorized under regulations prescribed by the Attorney General shall have power without warrantâ
[ ⌠]
(3) within a reasonable distance from any external boundary of the United States, to board and search for aliens any vessel within the territorial waters of the United States and any railway car, aircraft, conveyance, or vehicle, and within a distance of twenty-five miles from any such external boundary to have access to private lands, but not dwellings, for the purpose of patrolling the border to prevent the illegal entry of aliens into the United States;
Would the definition of âexternal boundaryâ be read as not applying to airports? I googled a lot, but mostly came up with people asking about airports and no one saying that they were 100% either way.
One criticism of the map that I saw was that it should not be following the land lines in the Michigan area. I found some other â100 mile boundaryâ maps that where created when Congress tried to pass some laws that would allow DHS to ignore environmental laws within 100 miles of the border (HR1505 and HR2578). This map goes across Lake Michigan, as do this map and this map (although the last two do not include the east/west coasts for some reason).
So the short answer is that I have lots of maps, but no definite answer
Most of the laptop searches will be at airports, surely.