[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Why do men lose it when their chicky-poo dies?

Christopher Caldwell: How Immigration Is Erasing Whites, Christians, and the Middle Class

SSRI Connection? Another Trans Shooter, Another Massacre – And They Erased His Video

Something 1/2 THE SIZE of the SUN has Entered our Solar System, and We Have NO CLUE What it is...

Massive Property Tax Fraud Exposed - $5.1 Trillion Bond Scam Will Crash System

Israel Sold American Weapons to Azerbaijan to Kill Armenian Christians

Daily MEMES YouTube Hates | YouTube is Fighting ME all the Way | Making ME Remove Memes | Part 188

New fear unlocked while stuck in highway traffic - Indian truck driver on his phone smashes into

RFK Jr. says the largest tech companies will permit Americans to access their personal health data

I just researched this, and it’s true—MUST SEE!!

Savage invader is disturbed that English people exist in an area he thought had been conquered

Jackson Hole's Parting Advice: Accept Even More Migrants To Offset Demographic Collapse, Or Else

Ecuador Angered! China-built Massive Dam is Tofu-Dreg, Ecuador Demands $400 Million Compensation

UK economy on brink of collapse (Needs IMF Bailout)

How Red Light Unlocks Your Body’s Hidden Fat-Burning Switch

The Mar-a-Lago Accord Confirmed: Miran Brings Trump's Reset To The Fed ($8,000 Gold)

This taboo sex act could save your relationship, expert insists: ‘Catalyst for conversations’

LA Police Bust Burglary Crew Suspected In 92 Residential Heists

Top 10 Jobs AI is Going to Wipe Out

It’s REALLY Happening! The Australian Continent Is Drifting Towards Asia

Broken Germany Discovers BRUTAL Reality

Nuclear War, Trump's New $500 dollar note: Armstrong says gold is going much higher

Scientists unlock 30-year mystery: Rare micronutrient holds key to brain health and cancer defense

City of Fort Wayne proposing changes to food, alcohol requirements for Riverfront Liquor Licenses

Cash Jordan: Migrant MOB BLOCKS Whitehouse… Demands ‘11 Million Illegals’ Stay

Not much going on that I can find today

In Britain, they are secretly preparing for mass deaths

These Are The Best And Worst Countries For Work (US Last Place)-Life Balance

These Are The World's Most Powerful Cars

Doctor: Trump has 6 to 8 Months TO LIVE?!


Resistance
See other Resistance Articles

Title: Government Directive Addresses Traveler's Attempt To Prevent Search In A Timely Fashion
Source: .
URL Source: http://libertyfight.741.com/government_searches_computers.html
Published: Aug 29, 2009
Author: .
Post Date: 2009-08-29 11:12:35 by Artisan
Keywords: None
Views: 95
Comments: 2

Government Directive Addresses Traveler's Attempt To Prevent Search In A Timely Fashion
LibertyFight.com
8.29.09

After reading an excellent article by Scott M. Fulton, III entitled DHS: Expect your computer to be seized without suspicion, I clicked on one of the four links he included, Border Searches of Electronic Devices. Referred to as 'Directive No. 7-6.1" and issued on August 19, 2009, the ICE Immigrations & Customs Enforcement document contains some interesting info which deserves to be examined. Few people probably read such dry directives, so I read it and have posted a brief overview of the interesting and relevent sections of it.

Section 1.1 begins "This Directive provides legal guidance and establishes policy and procedures within U.S. Immigration and Customs Enforcement (ICE) with regard to border search authority to search, detain, seize, retain, and share information contained in electronic devices possessed by individuals at the border, the functional equivalent of the border"... Let's stop right there. The term "functional equivalent of the border" is a tricky and subjective term, as evidenced by the great work of Terry Bressi of CheckpointUSA.org, and his refusal to answer questions at internal suspicionless checkpoints coducted by ICE. I highly recommend his videos to everyone as an excellent educational tool as to how to exert your rights.

Moving further into the document, once again the bugaboo of 'terr'ism' and drug smuggling are used as a pretext to seize computers and cell phones, cameras, and any other number of devices:

4. BACKGROUND. ICE is responsible for ensuring compliance with customs, immigration, and other Federal laws at the border. To that end, Special Agents may review and analyze computers, disks, hard drives, and other electronic or digital storage devices. These searches are part of ICE'S long-standing practice and are essential to enforcing the law at the United States border. Searches of electronic devices are a crucial tool for detecting information concerning terrorism, narcotics smuggling, and other national security matters; alien admissibility; contraband including child pornography; laundering monetary instruments; violations of copyright or trademark laws; and evidence of embargo violations or other import or export control laws.
5.2 Electronic Devices. Any item that may contain information, such as computers, disks, drives, tapes, mobile phones and

other communication devices, cameras, music players, and any other electronic or digital devices.

"Individualized suspicion" is not required to seize property, according to ICE, although one sections pays lip service to "constitutional, privacy, civil rights, and civil liberties training":

6.1-6.3: ICE Special Agents acting under border search authority may search, detain, seize, retain, and share electronic devices, or information contained therein, with or without individualized suspicion, consistent with the guidelines and applicable laws set forth herein.


7.2 Special Agents in Charge (SACS) and Attaches are responsible for: Border Searches of Electronic Devices 1) Implementing the provisions of this Directive and ensuring that Special Agents in their area of responsibility (AOR) receive a copy of this Directive and are familiar with its contents; 2) Ensuring that Special Agents in their AOR have completed any training programs relevant to border searches of electronic devices, including constitutional, privacy, civil rights, and civil liberties training related to such searches, as may be required by ICE Headquarters;

Section 7.4 outlines how the status of a search analysis is to be given by ICE within 10 days of the seizure. Section 8.1 2) entitled "Knowledge and Presence of the Traveler", outlines "To the extent practicable, border searches should be conducted in the presence of, or with the knowledge of, the traveler". It goes on to state "Permitting an individual to be present in the room during a search does not necessarily mean that the individual will be permitted to witness the search itself", if doing so reveals the governments techniques or operational secrets. Section 8.1 3) is perhaps the most galling of all, stating "Consent Not Needed. At no point during a border search of electronic devices is it necessary to ask the traveler for consent to search."

Section 8.1 5) states "Devices will be returned to the traveler as expeditiously as possible at the conclusion of a negative border search". 8.2 4) titled "Notice to traveler" states "Whenever ICE detains, seizes, or retains original electronic devices, the Special Agent is to provide the traveler with a copy of the applicable chain of custody form or other appropriate documentation."

Section 8.3., entitled Duration of Border Search dicusses "reasonable time" and includes some interesting information regarding their views on a traveller's attempts to prevent the search of his property. They refer to the fact that "courts have reviewed" the issue, and although they don't reference any specific court cases, ICE seems to be aware of possible legal repercussions, specifically mentioning the traveller who "has taken affirmative steps to prevent the search of his or her property in a timely fashion". They reference this despite their earlier claim in section 8.1 3), where they contend that the traveler has no say in the matter and that consent is not needed. This serves as a good reminder that we should always invoke what I consider our God given right to privacy and exert our Constitutional protections.:

3) In determining "reasonable time," courts have reviewed the elapsed time between the detention and the completion of the border search, taking into account any additional facts and circumstances unique to the case. As such, ICE Special Agents are to document the progress of their searches, for devices and copies of information therefrom, and should consider the following factors: a) The amount of information needing review; b) Whether the traveler was deprived of his or her property and, if so, whether the traveler was given the option of continuing his or her journey with the understanding that ICE would return the property once its border search was complete or a copy could be made; c) Whether assistance was sought and the type of such assistance; d) Whether and when ICE followed up with the agency or entity providing assistance to ensure a timely review; e) Whether the traveler has taken affirmative steps to prevent the search of his or her property in a timely fashion; and f) Any unanticipated exigency that may arise.

Section 8.5. 1)a) is the first time the document mentions probable cause. So it seems that the government's contention is that seizure does not require probable cause, but retention of the device

does:

8.5 Retention, Sharing, Safeguarding, And Destruction. 1) By ICE a) Seizure and Retention with Probable Cause. When Special Agents determine there is probable cause of unlawful activity-based on a review of information in electronic devices or on other facts and circumstances-they may seize and retain the electronic device or copies of information therefrom, or relevant portions thereof, as authorized by law.

Section 8.6 reiterates their claim that all electronic devices are subject to search, yet outline vague guidelines regarding legal confidentiality, trade secrets, and medical privacy:

8.6. Review, Handling, and Sharing of Certain Types of Information. 1) Border Search. All electronic devices crossing U.S. borders are subject to border search; a claim of privilege or personal information does not prevent the search of a traveler's information at the border. However, the nature of certain types of information are subject to special handling by Special Agents, whether through policy or laws such as the Privacy Act and the Trade Secrets Act.

The document is signed by "John Morton" Assistant Secretary U.S. Immigration and Customs Enforcement. I noticed one odd thing about this; when you copy paste the name "J6hn Morton" from the ICD PDF document,the letter "o" in the name John appears as a number 6.

The following are various excerpts of ICE Directive 7-6.1 which I referred to in this article.:



http://www.dhs.gov/xlibrary/assets/ice_border_search_electronic_devices.pdf

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Artisan (#0)

At no point during a border search of electronic devices is it necessary to ask the traveler for consent to search.

Technically speaking, they should be able to get away with this one because technically speaking, "the border" is not US Territory and therefore the US Constitution may not be operative there. Until you are admitted to "The United States" you are in limbo.

Tricky folks. Make sure you are on US Soil where the Constitution IS in effect, or what is left of it is in effect.

"We're looking for [Obama] supporters," said DeHaven of Hoover, one of the event's organizers. "We're not looking for a fight. That will come later, when we have an army."

mirage  posted on  2009-08-29   11:15:50 ET  Reply   Trace   Private Reply  


#2. To: Artisan (#0)

Good article!


Click for Privacy and Preparedness files

PSUSA  posted on  2009-08-29   12:52:27 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]