Large-Scale Collection of Cell Phone Data at US Borders

The Washington Post is reporting that the US Customs and Border Protection agency is seizing and copying cell phone, tablet, and computer data from “as many as” 10,000 phones per year, including an unspecified number of American citizens. This is done without a warrant, because “…courts have long granted an exception to border authorities, allowing them to search people’s devices without a warrant or suspicion of a crime.”

CBP’s inspection of people’s phones, laptops, tablets and other electronic devices as they enter the country has long been a controversial practice that the agency has defended as a low-impact way to pursue possible security threats and determine an individual’s “intentions upon entry” into the U.S. But the revelation that thousands of agents have access to a searchable database without public oversight is a new development in what privacy advocates and some lawmakers warn could be an infringement of Americans’ Fourth Amendment rights against unreasonable searches and seizures…

Continue reading Large-Scale Collection of Cell Phone Data at US Borders

Federal Court: Suspicionless Search of Traveler Devices by Border Agents Is Unconstitutional

U.S. Customs agents now must have reasonable cause and suspicion to search traveler devices at points of entry. Continue reading Federal Court: Suspicionless Search of Traveler Devices by Border Agents Is Unconstitutional

US Journalist Detained When Returning to US

Pretty horrible story of a US journalist who had his computer and phone searched at the border when returning to the US from Mexico. After I gave him the password to my iPhone, Moncivias spent three hours reviewing hundreds of photos and videos and emails and calls and texts, including encrypted messages on WhatsApp, Signal, and Telegram. It was the… Continue reading US Journalist Detained When Returning to US

US Journalist Detained When Returning to US

Pretty horrible story of a US journalist who had his computer and phone searched at the border when returning to the US from Mexico. After I gave him the password to my iPhone, Moncivias spent three hours reviewing hundreds of photos and videos and ema… Continue reading US Journalist Detained When Returning to US

Why Are Cryptographers Being Denied Entry into the US?

In March, Adi Shamir — that’s the "S" in RSA — was denied a US visa to attend the RSA Conference. He’s Israeli. This month, British citizen Ross Anderson couldn’t attend an awards ceremony in DC because of visa issues. (You can listen to his recorded acceptance speech.) I’ve heard of at least one other prominent cryptographer who is in… Continue reading Why Are Cryptographers Being Denied Entry into the US?

Why Are Cryptographers Being Denied Entry into the US?

In March, Adi Shamir — that’s the "S" in RSA — was denied a US visa to attend the RSA Conference. He’s Israeli. This month, British citizen Ross Anderson couldn’t attend an awards ceremony in DC because of visa issues. (You can listen to his recorded acceptance speech.) I’ve heard of at least one other prominent cryptographer who is in… Continue reading Why Are Cryptographers Being Denied Entry into the US?

Former Mozilla CTO Harassed at the US Border

This is a pretty awful story of how Andreas Gal, former Mozilla CTO and US citizen, was detained and threatened at the US border. CBP agents demanded that he unlock his phone and computer. Know your rights when you enter the US. The EFF publishes a handy guide. And if you want to encrypt your computer so that you are… Continue reading Former Mozilla CTO Harassed at the US Border

On the Security of Walls

Interesting history of the security of walls: Dún Aonghasa presents early evidence of the same principles of redundant security measures at work in 13th century castles, 17th century star-shaped artillery fortifications, and even "defense in depth" security architecture promoted today by the National Institute of Standards and Technology, the Nuclear Regulatory Commission, and countless other security organizations world-wide. Security advances… Continue reading On the Security of Walls