The DHS has responded to a Freedom of Information Act request filed by the ACLU asking when and how it decides whose laptop to search at the border. It explained its legal rationale for conducting these searches with a blank page:
On Page 18 of the 52-page document under the section entitled “First Amendment,” several paragraphs are completely blacked out. They simply end with the sentence: “The laptop border searches in the [Immigration and Customs Enforcement] and [Customs and Border Protection] do not violate travelers’ First Amendment rights as defined by the courts."
More excellence from "the most transparent administration in American history." Also, the DHS rejected claims that it should limit searches to situations where it had reasonable grounds for suspicion, because then they would have to explain their suspicion:
First, commonplace decisions to search electronic devices might be opened to litigation challenging the reasons for the search. In addition to interfering with a carefully constructed border security system, the litigation could directly undermine national security by requiring the government to produce sensitive investigative and national security information to justify some of the most critical searches. Even a policy change entirely unenforceable by courts might be problematic; we have been presented with some noteworthy CBP and ICE success stories based on hard-to-articulate intuitions or hunches based on officer experience and judgment. Under a reasonable suspicion requirement, officers might hesitate to search an individual's device without the presence of articulable factors capable of being formally defended, despite having an intuition or hunch based on experience that justified a search.
Feds say they can search your laptop at the border but won’t say why [Cyrus Farivar/Ars Technica]
The Freedom of the Press Foundation’s lawsuit against the DoJ has resulted in the release of documents showing that a bill with that was nearly unanimously supported in Congress and the Senate was killed by behind-the-scene lobbying by the Department of Justice, which feared that they would lose the ability to arbitrarily reject Freedom of […]
Lee Jae-yong is nominally “vice-chairman” of Samsung, but his father, Samsung chairman Lee Kun-hee, is considered to be a mere figurehead, with Lee Jae-yong as the true boss of the company.
NSO is an Israel cyberarms dealer, which buys or researches vulnerabilities in software and then weaponizes them; claiming that these cyberweapons will only be used by democratic governments and their police forces to attacks serious criminals and terrorists — a claim repeated by its competitors, such as Italy’s Hacking Team and Gamma Group.
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]