NYC judge asked to throw out border search lawsuit

Jul 08, 2011

(AP) -- A federal judge in New York City is questioning why laptops and smartphones should be excluded from random searches done by U.S. customs agents protecting the border.

Judge Edward Korman heard arguments Friday in Brooklyn on a lawsuit brought against the by Pascal Abidor.

Abidor's laptop was confiscated last year at the Canadian border while en route to New York from Montreal. He says that when it was returned, it was clear agents had looked at personal files.

Civil rights lawyers representing Abidor argue the search was unconstitutional. The government says it can search belongings at the border without cause.

The judge suggested Friday no cause is needed because the searches are meant to stop terror attacks. He will rule later on whether to dismiss the case.

Explore further: Study shows role of media in sharing life events

4 /5 (2 votes)
add to favorites email to friend print save as pdf

Related Stories

Tighter oversight on border laptop searches

Aug 27, 2009

(AP) -- The Obama administration on Thursday put new restrictions on searches of laptops at U.S. borders to address concerns that federal agents have been rummaging through travelers' personal information.

Federal judge tosses warrantless wiretap cases

Jun 03, 2009

(AP) -- A federal judge on Wednesday tossed out more than three dozen lawsuits filed against the nation's telecommunications companies for allegedly taking part in the government's e-mail and telephone eavesdropping program ...

Protection asked for Arkansas woodpecker

Feb 07, 2006

A federal judge has been asked to stop a $319 million eastern Arkansas public works project to protect the newly discovered ivory-billed woodpecker.

Recommended for you

Study shows role of media in sharing life events

8 hours ago

To share is human. And the means to share personal news—good and bad—have exploded over the last decade, particularly social media and texting. But until now, all research about what is known as "social sharing," or the ...

UK: Former reporter sentenced for phone hacking

15 hours ago

(AP)—A former British tabloid reporter was given a 10-month suspended prison sentence Thursday for his role in the long-running phone hacking scandal that shook Rupert Murdoch's media empire.

Evaluating system security by analyzing spam volume

15 hours ago

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...

Surveillance a part of everyday life

16 hours ago

Details of casual conversations and a comprehensive store of 'deleted' information were just some of what Victoria University of Wellington students found during a project to uncover what records companies ...

European Central Bank hit by data theft

16 hours ago

(AP)—The European Central Bank said Thursday that email addresses and other contact information have been stolen from a database that serves its public website, though it stressed that no internal systems or market-sensitive ...

Twitter admits to diversity problem in workforce

19 hours ago

(AP)—Twitter acknowledged Wednesday that it has been hiring too many white and Asian men to fill high-paying technology jobs, just like several other major companies in Silicon Valley.

User comments : 7

Adjust slider to filter visible comments by rank

Display comments: newest first

mrlewish
not rated yet Jul 09, 2011
Maybe because nothing of value to terrorist can be found on a lap top? If they are looking for "terrorist files" there is something called the internet that can transfer unlimited information anywhere.
RaiderUK
5 / 5 (2) Jul 09, 2011
A quick scan of the laptop or phone for explosives should be enough. Its just another example of the gov using the fear of terrorism to have more comtrol over its people.
Vendicar_Decarian
1 / 5 (1) Jul 09, 2011
You mean the Judicial branch of government is in Kahoots with the Legislative branch for the evil purpose of controlling your brain waves?

Just wear a tin foil cap and you will be ooooooooookayyyyyyyyy
gwrede
not rated yet Jul 09, 2011
Sigh.

All they could possibly hope to get at is Amateur Terrorists' files. Professionals would either encrypt the sensitive stuff, or even better, hide it. (The average 5-year old laptop contains 50,000 files. Saving your terrorist buddies' names somewhere else than the home directory, in a file with a name reminiscent of some system files goes a long way already.) Or both.

The government can't possibly expect a border officer to be all that proficient with computers. At the end of the day, this is simply undue infringement on citizens' basic rights.
I_Dont_Have_A_Name
1 / 5 (1) Jul 11, 2011
If I was a terrorist I would do what most terrorists are known to do. Any security expert will tell you that heavy encryption and security are implemented by terrorists. I mean hell, I've been hiding things attached to JPG's for YEARS using the command prompt trick copy /b filename 1 filename 2 filename_end

One line of code and you can hide Gigabytes in one small image and no one would know if you hid it.
I'm more worried about where to hide my weed...stupid government :-< trying to steal my porn.
J-n
not rated yet Jul 11, 2011
I suspect that all a terrorist may need to do to hide their files from the border cops would be to use a non-standard OS. Linux or BSD or Haiku, have it set to open in CLI mode... I doubt any of the TSA Luddites could make their way into any files of any real meaning.

Then again,if i were a terrorist trying to smuggle in/out documents it would be very easy to just upload them to a secure server using SSL or some other encryption, or save all my documents to a small usb drive and condom/swallow it. They don't check phones, you could save all the important info to the phone's memory stick, they could then also hide the memory stick within the phone it's self.

One could also save the info on the computer, then delete it and rely on an "undelete" program to recover the "lost" files. Then unless they're copying bit-by-bit the whole drive they'll not even know the files are there.

J-n
not rated yet Jul 11, 2011
If really concerned my thoughts would be thus:

Disable startup from CD, USB, and other external devices in the BIOS

Password Protect BIOS (conveniently forget password if asked)

Startup into the CLI (command line) Mode for your OS (Pick a non-standard OS).

Do not automatically mount the Partition with your sensitive informaiton.

Encrypt the Partition with your sensitive data.

Rename, copy into, or otherwise hide your data to look like it is data of another type (Picture like previously suggested, an innocent looking text file, etc etc).

There are many other OS or File System spesific "Tricks" you can do to hide your data, i would always suggest using a variety of these on data you wish to keep secure from prying eyes.