Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Appeals court upholds search of laptop at LAX

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
Newsjock Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 02:56 PM
Original message
Appeals court upholds search of laptop at LAX
Source: Daily Breeze

It may hold our financial records, innermost thoughts and pictures of our loved ones - but there's nothing private about a laptop computer at the nation's borders, a federal appeals court ruled Monday.

In a closely watched search-and-seizure case, the 9th U.S. Circuit Court of Appeals overturned a lower court's decision to toss evidence of alleged child pornography found on a traveler's computer at Los Angeles International Airport.

... Federal prosecutors appealed, arguing successfully that the law allows searches at the nation's borders without reasonable suspicion.

... "I think it will surprise people that their laptops are subject to search without any level of suspicion when they get to a border checkpoint," added Jennifer Chacon, a law professor at the University of California, Davis.

"I think it may change the way people travel," she said.

Read more: http://www.dailybreeze.com/ci_9009312
Printer Friendly | Permalink |  | Top
truebrit71 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 03:00 PM
Response to Original message
1. This is sure to be appealed though...
...no way this is consitutional...
Printer Friendly | Permalink |  | Top
 
tinymontgomery Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-23-08 08:58 AM
Response to Reply #1
21. What's a constitution?
What's a constitution? You must think your in France or Canada or something.
Printer Friendly | Permalink |  | Top
 
truebrit71 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-23-08 08:59 AM
Response to Reply #21
22. It's "just a f*cking piece of paper" according to the current occupant of the WH..
Edited on Wed Apr-23-08 09:00 AM by truebrit71
..
Printer Friendly | Permalink |  | Top
 
mac2 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-23-08 09:02 AM
Response to Reply #21
23. Even they had a constitution.
France is now part of the EU and has lost theirs. Canada part of the Americas Union is about to lose theirs. The huge non-democratic unions are being formed against their and our will.

Boot click.
Printer Friendly | Permalink |  | Top
 
TooBigaTent Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 03:04 PM
Response to Original message
2. The only successful fight against this will be business pukes who fear that their
secrets will get out.

Civil liberties for the rest of us no longer matter.
Printer Friendly | Permalink |  | Top
 
BadgerLaw2010 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 10:44 PM
Response to Reply #2
16. Good luck breaking through most business encryption software.
Printer Friendly | Permalink |  | Top
 
mac2 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-23-08 08:44 AM
Response to Reply #2
19. Fascism
Printer Friendly | Permalink |  | Top
 
izquierdista Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 03:10 PM
Response to Original message
3. The times they are a changin'
Mid-20th century: "Let me see your papers!"

Early 21st century: "Let me see your files!"

Printer Friendly | Permalink |  | Top
 
mac2 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 11:00 PM
Response to Reply #3
17. Boot click
Printer Friendly | Permalink |  | Top
 
Sen. Walter Sobchak Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 03:17 PM
Response to Original message
4. we have had a laptop seized
The user didn't know the administrative password on his company notebook, so they seized it. He (a lawyer) demanded to either be returned his laptop or arrested. Declining either option he was thrown out of the airport. In retrospect he is probably fortunate he was not a victim of a summary execution. It took us quite a while to recover the machine from the government.

We are no longer allowed to travel with our work machines, rather we are issued a shitty old laptops that we are supposed to use Citrix with along with a so-called "Cyanide CD" that we are to use if we had client data on the computer that apprently formats the hard drive 7 times and then loads a backup of some home computer that just looks like the crap on a family PC.
Printer Friendly | Permalink |  | Top
 
mac2 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-23-08 08:48 AM
Response to Reply #4
20. Neither is Lieberman, Boxer, or Sanders when you come
right down to it. Only Kucinich and a few others are. I'd say even that is questionable with their amnesty stand since that will bring us open borders and the Americas.

"Robert Mugabe, Hugo Chavez, Fidel Castro and Che™ are NOT progressives!"
Printer Friendly | Permalink |  | Top
 
crimsonblue Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 03:25 PM
Response to Original message
5. That's why you password protect the F out of your computer
And refuse to divulge the password. The article didn't say, but I suspect that the man did not have his computer protected. It's a bullshit ruling, but I can understand where the judge was coming from. I can only assume that the Appeals Court viewed an unprotected laptop much like a pulled over car-- since the laptops not protected it could be considered "in plain sight" (much like if an officer sees something through the window, he can pretty much instantly demand a search). It is complete bullshit that this guy was arrested because they opened up a picture with two naked women in it. Since when was this a crime? yeah, I know he allegedly had kiddie porn on his computer, but any number of viruses can secretly install condemning info onto the computer. Just wait until the Government starts connecting cords to your laptop in order to "check for terrorist activity" and then proceed to copy and/or delete your entire hard drive.
Printer Friendly | Permalink |  | Top
 
DemocratInSoCal Donating Member (402 posts) Send PM | Profile | Ignore Tue Apr-22-08 03:30 PM
Response to Original message
6. He's A Terrorist & Should Be Detained, Arrested, Castrated, Shot, Waterboarded nt
Printer Friendly | Permalink |  | Top
 
mac2 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-23-08 09:04 AM
Response to Reply #6
24. Yes...he is the worst one yet. What secrets is he hiding?
Even the President is not above the law (the law of the land under Bush, Inc.).
Printer Friendly | Permalink |  | Top
 
SpiralHawk Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 03:39 PM
Response to Original message
7. "All your data are belong to us." - BushCo & Republicon Homelanders
Totally totalitarian. Republicons - Ptooey...
Printer Friendly | Permalink |  | Top
 
mac2 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 10:34 PM
Response to Reply #7
13. "Mr. Bush you do not own this country"...
emm seems he tries to. He is the danger and we should be watching him. He lied about WMD, Katrina, and 911. Shouldn't we put spy devices every where he goes?

So much for rights in this democracy. He decides who has rights and who doesn't. We make the rules in a democracy Mr. Bush.

The computer was probably a plant to once again cause fear and hide the PNAC agenda going on in New Orleans this week.

Boot Click.

Printer Friendly | Permalink |  | Top
 
JCMach1 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 04:14 PM
Response to Original message
8. Strong encryption...
:(
Printer Friendly | Permalink |  | Top
 
Xenotime Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 09:48 PM
Response to Reply #8
10. Doesn't matter. They can crack it.
Printer Friendly | Permalink |  | Top
 
CatholicEdHead Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 10:30 PM
Response to Reply #10
12. Eventually, but not for a very long time
if it is encrypted properly.
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 10:41 PM
Response to Reply #10
15. Nah. Nah they can't. You might think they can, but they can't.
  Really. Not a round-robin multi-algorithm that's steganographically hidden inside another encrypted volume. The only computers that can crack it are the ones that can read your mind to find the password- cause they ain't doing it any other way.

You should check out my post a little lower in the thread.

PB
Printer Friendly | Permalink |  | Top
 
customerserviceguy Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 07:28 PM
Response to Original message
9. OK, I'm going to be the first one to ask
why did he have kiddie porn on his computer?


Probably not the guy you'd prefer for the test case that goes to the Supreme Court.

Printer Friendly | Permalink |  | Top
 
CatholicEdHead Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 10:14 PM
Response to Original message
11. I guess my personal laptop is not making any flights anytime soon
At least I have my iPod Touch to make due for personal trips (just need WiFi for email and DU check).
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Apr-22-08 10:36 PM
Response to Original message
14. Ya'll can protect your computers for free with the open-souce TrueCrypt.
TrueCrypt

Main Features:
Creates a virtual encrypted disk within a file and mounts it as a real disk.


Encrypts an entire partition or storage device such as USB flash drive or hard drive.


Encrypts a partition or drive where Windows is installed (pre-boot authentication).


Encryption is automatic, real-time (on-the-fly) and transparent.


Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:

1) Hidden volume (steganography – more information may be found here).

2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).


Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.



  Damned easy to use and not even quantum computers will be able to crack my stego'd volumes. Pre-boot authentication, that's sizzlin'!

PB
Printer Friendly | Permalink |  | Top
 
Turner Ashby Donating Member (140 posts) Send PM | Profile | Ignore Wed Apr-23-08 12:32 AM
Response to Reply #14
18. I would imagine, knowing the gov't think,
that the very idea that you have your computer so "encrytped" (if that is a word) you are suspicious. Remember, just looking suspicious, makes you suspicious, so the idea that you have made your computer difficult to get into, makes you suspicious. It is circuitous logic, but in prosecutorial eyes, EVERYONE is a criminal. So, the "profile" will soon be, heavily encrypted laptop and that will be reasonable suspicion at the border, and uh... no 4th amendment protection.
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-23-08 09:37 AM
Response to Reply #18
25. Well Turner, in that case, you could make an encrypted volume-within-a-volume drive.
  Say you're at the border and someone asks to see your laptop. You give it over and they boot it up, and it asks for a password. You give them a password and the computer boots up. They search your computer for now-illegal copies of the Bill of Rights- and they find none.

  But what they do not know and what they can absolutely never detect is that there is another encrypted partition on your hard drive which only appears as "free space" on the computer they logged into. It does not exist as a volume or a file, it is data directly written to a part of the drive.

  And since the whole drive is encrypted even free space appears to be random characters.

  The drive-within-a-drive concept, or "stego" drive, is the power here, because there is no way to detect that it even exists. With nested encrypted subvolumes, the following analogy would describe the situation investigators would be in: It would be as though they were entering a room whose four walls, ceiling and floor were slate. With a piece of chalk they could draw a door anywhere but only if it was in the correct place would it reveal the next blackboard room if they pushed. Once in the next blackboard room they would face the same dilemma. It would also be impossible, even residing in the first "room" to know that there were further rooms to explore, where the rabbit hole ended.

PB
Printer Friendly | Permalink |  | Top
 
BreweryYardRat Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-23-08 11:37 AM
Response to Reply #14
26. Thanks.
I'll take a look at this.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 06:27 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC