[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Deep Intel on the Damning New F-35 Report

CONFIRMED “A 757 did NOT hit the Pentagon on 9/11” says Military witnesses on the scene

NEW: Armed man detained at site of Kirk memorial: Report

$200 Silver Is "VERY ATTAINABLE In Coming Rush" Here's Why - Mike Maloney

Trump’s Project 2025 and Big Tech could put 30% of jobs at risk by 2030

Brigitte Macron is going all the way to a U.S. court to prove she’s actually a woman

China's 'Rocket Artillery 360 Mile Range 990 Pound Warhead

FED's $3.5 Billion Gold Margin Call

France Riots: Battle On Streets Of Paris Intensifies After Macron’s New Move Sparks Renewed Violence

Saudi Arabia Pakistan Defence pact agreement explained | Geopolitical Analysis

Fooling Us Badly With Psyops

The Nobel Prize That Proved Einstein Wrong

Put Castor Oil Here Before Bed – The Results After 7 Days Are Shocking

Sounds Like They're Trying to Get Ghislaine Maxwell out of Prison

Mississippi declared a public health emergency over its infant mortality rate (guess why)

Andy Ngo: ANTIFA is a terrorist organization & Trump will need a lot of help to stop them

America Is Reaching A Boiling Point

The Pandemic Of Fake Psychiatric Diagnoses

This Is How People Actually Use ChatGPT, According To New Research

Texas Man Arrested for Threatening NYC's Mamdani

Man puts down ABC's The View on air

Strong 7.8 quake hits Russia's Kamchatka

My Answer To a Liberal Professor. We both See Collapse But..

Cash Jordan: “Set Them Free”... Mob STORMS ICE HQ, Gets CRUSHED By ‘Deportation Battalion’’

Call The Exterminator: Signs Demanding Violence Against Republicans Posted In DC

Crazy Conspiracy Theorist Asks Questions About Vaccines

New owner of CBS coordinated with former Israeli military chief to counter the country's critics,

BEST VIDEO - Questions Concerning Charlie Kirk,

Douglas Macgregor - IT'S BEGUN - The People Are Rising Up!

Marine Sniper: They're Lying About Charlie Kirk's Death and They Know It!


Dead Constitution
See other Dead Constitution Articles

Title: DHS: Expect your computer to be seized without suspicion
Source: Betanews
URL Source: http://www.betanews.com/article/DHS ... d-without-suspicion/1251488759
Published: Aug 28, 2009
Author: Scott M. Fulton, III
Post Date: 2009-08-28 22:47:54 by IDon'tThinkSo
Keywords: DHS, WOT
Views: 545
Comments: 18

DHS: Expect your computer to be seized without suspicion

In what was presented to the public this week as a clarification of its privacy policy, the US Dept. of Homeland Security published a paper referring to new guidelines for its immigration and customs agents regarding how they may conduct border searches of travelers' computers and electronic media.

Clarifying the existing law, both sets of guidelines reiterated the department's policy created during the previous administration: Agents may seize, detain, and/or retain individuals' PCs and media without having reason to suspect that those people or those machines and devices are connected with a crime.

Click for Full Text!

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 7.

#7. To: IDon'tThinkSo, *Bilderberg and NWO Watch* (#0)

thanks for posting this very good and mind-boggling article. this is important so i will paste the entire thing here.

------------------

http://www.betanews.com/article/DHS-Expect-your-computer-to-be-seized-without- suspicion/1251488759

DHS: Expect your computer to be seized without suspicion By Scott M. Fulton, III | Published August 28, 2009, 3:55 PM Print Article E-mail Article 19 Comments

In what was presented to the public this week as a clarification of its privacy policy, the US Dept. of Homeland Security published a paper referring to new guidelines for its immigration and customs agents regarding how they may conduct border searches of travelers' computers and electronic media. Clarifying the existing law, both sets of guidelines reiterated the department's policy created during the previous administration: Agents may seize, detain, and/or retain individuals' PCs and media without having reason to suspect that those people or those machines and devices are connected with a crime.

"ICE [Immigration and Customs Enforcement] Special Agents acting under border search authority may search, detain, seize, retain, and share electronic devices, or information contained therein, with or without individualized suspicion, consistent with the guidelines and applicable laws set forth herein," states the new policy for immigration authorities published last August 18 (PDF available here). "Assistance to complete a border search may be sought from other Federal agencies and non-Federal entities, on a case by case basis, as appropriate."

The guidelines for Customs & Border Patrol (CBP) agents says pretty much the same thing, adding that whenever a CBP agent encounters technical trouble figuring out how a mechanism works, or what the meaning of some piece of information is, he can seek help from other US government sources. "In such situations, Officers may transmit electronic devices or copies of information contained therein to seek technical assistance from other federal agencies," reads the CBP guidelines (PDF available here).

What's been a subject of contention ever since the government tightened border inspection policies in the wake of 9/11 hasn't been so much agents' rights to act without suspicion (although for some, that already crosses the line) as the authority DHS grants them to transmit the information they find elsewhere, under the auspices of "seeking help." Both guidelines now state that agents may only seek help from other federal sources, but they are not explicit with regard to what level -- for example, whether a private consultant under retainer for the FBI would qualify.

In their assessment of the extent of the risks this clarified policy might pose to citizens' and visitors' personal privacy, published last Tuesday (PDF available here), both border agencies, acting jointly, identified six specific areas: "(1) travelers may need additional information regarding the authority [agents have] to conduct border searches; (2) the traveler may be unaware of the viewing or detention of his/her information by CBP and ICE; (3) personally identifiable information (PII) may be detained where it is not needed; (4) PII may be misused by CBP and ICE officers; (5) CBP and ICE may disclose PII to other agencies that may misuse or mishandle it; and (6) new privacy risks may arise as the technology involved in this activity is ever-changing."

In other words, individuals may not be fully informed as to the extent of agents' authority, and what safeguards there may be to protect identifying information from falling into the hands of someone who can misuse it -- the privacy threat here being that the traveler may not know what the threat really is. The solution, DHS asserts, is by making that information about the private information that could be misused, public -- specifically, by publishing it in the Federal Register.

Under the heading, "Principle of Transparency," the DHS report explains, "When ICE or CBP retain information from electronic devices, that information may be subject to the requirements of the Privacy Act. The Privacy Act requires that agencies publish a System of Records Notice (SORN) in the Federal Register describing the nature, purpose, maintenance, use, and sharing of the information. This PIA and the several SORNs published by DHS provide notice of the retention of PII at the border and the retention of some of the contents of electronic devices."

So at the very least, an explanation of the events surrounding the detention or seizure of travelers' computers may be available online to those travelers (along with everyone else) on GPOAccess.gov. However, the Department goes on to say, the extent of the information shared online this way may be limited, especially with regard to how much the detained information is being shared, as well as with whom. This is for the good of any investigation that may arise.

"Because notifying the traveler of the sharing of information could impede an investigation or other law enforcement or national security efforts, CBP and ICE do not make the information sharing process fully transparent to the public," the report states. "To ensure the protection of personal data without compromising the investigation, CBP and ICE have instituted strict oversight and review processes. Generally speaking, information, including PII, will be shared with other agencies where CBP and/or ICE require subject matter expertise, decryption, or translation."

Those oversight and review processes will make the sharing of that information with other agencies legal and permissible under the Privacy Act of 1974. Appropriate safeguards and audit trails will be kept to track when and where information is exchanged, but for the sake of privacy, that information will be kept private.

Artisan  posted on  2009-08-29   8:14:44 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 7.

        There are no replies to Comment # 7.


End Trace Mode for Comment # 7.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]