As a Potential Privacy Violation

Total Page:16

File Type:pdf, Size:1020Kb

As a Potential Privacy Violation Digital Privacy at the U.S. Border PROTECTING THE DATA ON YOUR DEVICES Sophia Cope, Staff Attorney Amul Kalia, Analyst Seth Schoen, Senior Staff Technologist Adam Schwartz, Senior Staff Attorney DECEMBER 2017 ELECTRONIC FRONTIER FOUNDATION EFF.ORG 1 Table of Contents ..................................................................................................................................................1 Digital Privacy at the U.S. Border.............................................................................................1 EXECUTIVE SUMMARY.................................................................................................... PART 1: DIGITA# PRIVACY GUIDE F%R TRAVE#ERS...............................................& 'hat i( the Border)..............................................................................................................& Ri(* A((es(+ent Factor(.......................................................................................................& $actor( a-o.t Yo...............................................................................................................................& $actor( A-o.t Yo.r Data a,d Device(............................................................................................10 Before Yo. Arrive at the Border..........................................................................................11 Tal* to Yo.r Em1loyer....................................................................................................................11 Mi,i+i2e the Data 3at Yo. Carry Acro(( the Border..................................................................12 Protect 'hat Yo. Carry %ver the Border.................................................................................14 Social Media a,d %,li,e Acco.,ts................................................................................................17 'he, Yo. Are at the Border...............................................................................................18 'hat to Ex1ect...............................................................................................................................18 Ba(ic R.le( for Everyo,e.................................................................................................................19 Try to Avoid I+1licit “Co,(e,t:.....................................................................................................19 'hat Co.ld ;a11e, 'he, Yo. Co+1ly 'ith a, %rder)...........................................................4/ If Yo. Co+1ly 'ith a, %rder< Sho.ld Yo. State 3at It I( U,der Prote(t?.................................4/ 'hat Co.ld ;a11e, if Yo. Re0.(e to Co+1ly 'ith a, %rder)...................................................4/ Sho.ld Yo. Atte+1t to Per(.ade the Age,ts to 'ithdra= 3eir %rder)......................................21 A0ter Yo. Leave the Border.................................................................................................21 Ma*e a Record of 'hat ;a11e,ed................................................................................................21 Cha,ge Yo.r Pa((=ord( a,d #ogi, Crede,tial(.............................................................................44 "over,+e,t %>ce( 3at May ;el1 Yo........................................................................................44 PART 2: C%?STITUTI%?A# RI";TS< GOVER?ME?T P%#ICIES< A?D PRIVACY AT T;E B%RDER.............................................................................................4@ 3e Law o0 Border Searches and Sei2.res...........................................................................4@ 3e $o.rth A+e,d+e,t at the Border! Digital Privacy.................................................................45 3e Defa.lt Co,(titutio,al Privacy R.le...................................................................................45 3e Border Search Exce1tio,.....................................................................................................45 3e Exce1tio, to the Exce1tio,! 9?o,ARo.ti,e: Searche(........................................................4 Border Searche( of Digital Device(............................................................................................4 I,terior Chec*1oi,ts..................................................................................................................46 3e $ir(t A+e,d+e,t at the Border! $reedo+ to Privately S1ea*< A((ociate< AcB.ire I,for+atio,< a,d "ather ?e=(.......................................................................................................46 3e $i0th A+e,d+e,t at the Border! $reedo+ $ro+ Sel0AI,cri+i,atio,.....................................@/ ELECTRONIC FRONTIER FOUNDATION EFF.ORG 2 Pa((=ord(....................................................................................................................................@/ $i,ger1ri,ts................................................................................................................................31 3e $ir(t, $i0th, a,d $o.rtee,th A+e,d+e,t I,ter(ectio, at the Border! $reedo+ $ro+ Di(cri+i,atio,.................................................................................................................................@4 Co,(e,t: 'aivi,g Co,(titutio,al Rights at the Border..................................................................@@ 'hat If Yo. Are ?ot a U.S. Citi2e,).............................................................................................@@ $ederal Policies and Practices o, Digital Searches..............................................................@5 $ederal Age,cie( 3at %ver(ee the Border.....................................................................................@5 Device Search Policie(.....................................................................................................................@ Search.........................................................................................................................................@ Sei2.re........................................................................................................................................@C Searchi,g Social Media a,d %ther Clo.d Co,te,t 'itho.t U(i,g Traveler(D Device(.................@6 PART 3: T;E TEC;?%#%GY O$ PRIVACY PR%TECTI%?....................................@& E,cry1tio,..........................................................................................................................@& U,der(ta,di,g 'ea*er Scree,A#oc* or U(er Acco.,t Pa((=ord(.................................................@& Stro,g $.llADi(* Storage Encry1tio,.............................................................................................5/ Activati,g Encry1tio,.....................................................................................................................41 Choo(i,g a Stro,g Pa((=ord...........................................................................................................41 Do ?ot $orget Yo.r Pa((=ord........................................................................................................54 T.r, %E Yo.r Device......................................................................................................................5@ Sec.re Deletio, and Foren(ic(.............................................................................................5@ So+e 9Deleted: I,for+atio, I( ?ot Really Deleted.......................................................................5@ %vervie= of Sec.re Deletio,..........................................................................................................55 Built-i, $actory Re(et $eature(.......................................................................................................55 'i1i,g ;ard Drive( a,d Re+ova-le Media..................................................................................5 I,divid.al $ile Sec.re Deletio,......................................................................................................5C Cleari,g $ree S1ace.........................................................................................................................5C $la(h Media.....................................................................................................................................5C Encry1tio, a,d Sec.re Deletio,.....................................................................................................56 Clo.d Storage.....................................................................................................................56 3e Role of Clo.d Storage i, a Border Data Protectio, Strategy..................................................56 $ore,(ic(..........................................................................................................................................57 Ri(*( A((ociated =ith Clo.d Storage.............................................................................................57 Per(o,al Clo.d Storage...................................................................................................................57 More Elaborate Data Mi,i+i2atio, Ideas..........................................................................5& C%?C#USI%?..................................................................................................................... / ELECTRONIC FRONTIER FOUNDATION EFF.ORG 3 Authors: So1hia Cope< Seth Schoe,< Ada+ Schwart2 With assistance from: ;.gh D’Andrade< Gennie Gebhart<
Recommended publications
  • Search and Seizure of Electronic Devices at The
    SEARCH AND SEIZURE * OF ELECTRONIC DEVICES AT THE BORDER Laura K. Donohue** I. INTRODUCTION .............................................................................................................................. 1 II. BORDER SEARCH AUTHORITIES RELATED TO CUSTOMS ............................................................... 4 A. Commercial Regulation versus Revenue Generation ............................................................. 5 B. Contraband in the Early American Republic .......................................................................... 6 C. Contemporary Search Authorities at Border Crossings .......................................................... 8 D. Mail Search ........................................................................................................................... 10 E. Special Protections Afforded the Home ............................................................................... 11 F. Extended Border Search and the Functional Equivalent ...................................................... 13 G. Restrictions on Customs Searches: Who and Why ............................................................... 14 III. BORDER SEARCH AUTHORITIES RELATED TO IMMIGRATION .................................................... 15 IV. BORDER SEARCH OF ELECTRONIC DEVICES .............................................................................. 17 A. Not Subject to Reasonable Suspicion ................................................................................... 18 B. Supported by Reasonable
    [Show full text]
  • The Rights and Liberties of the Palau Constitution
    The Rights and Liberties of the Palau Constitution Kevin Bennardo* INTRODUCTION ............................................................................................ 3 I. SUPREMACY AND AUTHORITY OF THE PALAU CONSTITUTION ............... 4 A. Supremacy of the National Constitution ....................................... 4 B. Delegation of Governmental Powers Including Authority Over Harmful Substances ...................................................................... 6 II. TERRITORY AND LANGUAGE ............................................................... 12 A. Territory of Palau ....................................................................... 12 B. Establishment of Permanent Capital .......................................... 14 C. Official and National Languages ............................................... 14 III. SPECIAL RIGHTS OF PALAUANS ........................................................... 14 A. Citizenship .................................................................................. 14 B. Acquisition of Land ..................................................................... 16 C. Voting Rights ............................................................................... 18 D. Right of Migration ...................................................................... 19 E. Non-Impairment of Contracts by Legislation ............................. 20 F. Examination of Government Documents .................................... 21 G. Health Care and Education .......................................................
    [Show full text]
  • "Border Searches" Under the Fourth Amendment
    Order Code RL31826 Protecting the U.S. Perimeter: “Border Searches” Under the Fourth Amendment Updated June 27, 2008 Yule Kim Legislative Attorney American Law Division Protecting the U.S. Perimeter: “Border Searches” Under the Fourth Amendment Summary Many border security initiatives were developed after the events of September 11, 2001.1 Because security initiatives often contain a search and seizure component, Fourth Amendment implications may arise. The Fourth Amendment establishes that a search or seizure conducted by a governmental agent must be reasonable, and that probable cause supports any judicially granted warrant. The Supreme Court has interpreted the Fourth Amendment to include a presumptive warrant requirement on all searches and seizures conducted by the government, and has ruled that any violations of this standard will result in the suppression of any information derived therefrom. The Supreme Court, however, has also recognized situations that render obtaining a warrant impractical or against the public’s interest, and has accordingly crafted various exceptions to the warrant and probable cause requirements of the Fourth Amendment. Few exceptions to the presumptive warrant and probable cause requirements are more firmly rooted than the “border search” exception. Pursuant to the right of the United States to protect itself by stopping and examining persons and property crossing into the country, routine border searches are reasonable simply by virtue of the fact that they occur at the border. Courts have recognized two different legal concepts for authorizing border searches away from the actual physical border: (1) searches at the functional equivalent of the border; and (2) extended border searches.
    [Show full text]
  • Case No. 125550 in the SUPREME COURT of ILLINOIS PEOPLE OF
    125550 06 E-FILED 3/3/2021 12:33 PM Carolyn Taft Grosboll Case No. 125550 SUPREME COURT CLERK IN THE SUPREME COURT OF ILLINOIS PEOPLE OF THE STATE OF ILLINOIS, ) Appeal from the Appellate Court of ) Illinois, Third District, Plaintiff-Appellant, ) No. 3-17-0830 ) ) There on Appeal from the Circuit ) Court of the Tenth Judicial Circuit, v. ) Peoria County, Illinois, ) No. 14 CF 282 ) JOHN McCAVITT, ) The Honorable ) David Brown & Albert Purham, Defendant-Appellee. ) Judges Presiding. MOTION OF THE AMERICAN CIVIL LIBERTIES UNION AND AMERICAN CIVIL LIBERTIES UNION OF ILLINOIS FOR LEAVE TO FILE BRIEF OF AMICI CURIAE IN SUPPORT OF DEFENDANT-APPELLEE The American Civil Liberties Union and the American Civil Liberties Union of Illinois, pursuant to Rules 345 and 361 of the Illinois Supreme Court, respectfully move this Court for leave to file the accompanying brief of amici curiae in support of defendant-appellee John T. McCavitt. In support of this motion, amici state the following: INTERESTS OF AMICI CURIAE 1. The American Civil Liberties Union (“ACLU”) is a nationwide, nonprofit, nonpartisan organization dedicated to the principles of liberty and equality embodied in the Constitution and our nation’s civil rights laws. The American Civil Liberties Union of SUBMITTED - 12421638 - Rebecca Glenberg - 3/3/2021 12:33 PM 125550 Illinois (“ACLU of Illinois”) is the Illinois state affiliate of the national ACLU. Since its founding in 1920, the ACLU has frequently appeared before the Supreme Court and other state and federal courts in numerous cases implicating Americans’ right to privacy in the digital age, including as counsel in Carpenter v.
    [Show full text]
  • Secure Data Deletion
    Research Collection Doctoral Thesis Secure Data Deletion Author(s): Reardon, Joel Publication Date: 2014 Permanent Link: https://doi.org/10.3929/ethz-a-010411932 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library Diss. ETH No. 22475 Secure Data Deletion A thesis submitted to attain the degree of DOCTOR OF SCIENCES of ETH ZURICH (Dr. sc. ETH Zurich) presented by Joel Reardon Master of Mathematics, University of Waterloo born 31.07.1983 citizen of Canada accepted on the recommendation of Prof. Dr. Srdjan Capkun,ˇ examiner Prof. Dr. David Basin, coexaminer Prof. Dr. Ari Juels, coexaminer Prof. Dr. Paul Van Oorschot, coexaminer Dr. Alessandro Sorniotti, coexaminer 2014 Abstract Secure data deletion is the task of deleting data from a physical medium so that the data is irrecoverable. This irrecoverability is what distin- guishes secure deletion from regular deletion, which ostensibly deletes unneeded data only to reclaim resources. We securely delete data to prevent an adversary from gaining access to it, and so secure deletion is a natural part of the confidentiality of data. In this thesis, we examine secure deletion in a variety of different systems and different layers: from the hardware level of ensuring a storage medium can efficiently delete data to the system level of deleting data from unreliable and untrusted servers. We examine related work in detail, identify the deficiencies and unsolved problems, and build our own solutions to advance the state of the art.
    [Show full text]
  • Developments in Federal Search and Seizure Law
    FEDERAL PUBLIC DEFENDER DISTRICT OF OREGON LISA C. HAY Federal Public Defender Oliver W. Loewy STEPHEN R. SADY 101 SW Main Street, Suite 1700 Elizabeth G. Daily Chief Deputy Defender Portland, OR 97204 Conor Huseby Gerald M. Needham Robert Hamilton Thomas J. Hester 503-326-2123 / Fax: 503-326-5524 Bryan Francesconi Ruben L. Iñiguez Ryan Costello Anthony D. Bornstein Branch Offices: Irina Hughes▲ Susan Russell Kurt D. Hermansen▲ Francesca Freccero 859 Willamette Street 15 Newtown Street Devin Huseby + C. Renée Manes Suite 200 Medford, OR 97501 Kimberly-Claire E. Seymour▲ Nell Brown Eugene, OR 97401 541-776-3630 Jessica Snyder Kristina Hellman 541-465-6937 Fax: 541-776-3624 Cassidy R. Rice Fidel Cassino-DuCloux Fax: 541-465-6975 Alison M. Clark In Memoriam Brian Butler + Nancy Bergeson Thomas E. Price 1951 – 2009 Michelle Sweet Mark Ahlemeyer ▲ Eugene Office Susan Wilk + Medford Office Research /Writing Attorney DEVELOPMENTS IN FEDERAL SEARCH AND SEIZURE LAW Stephen R. Sady Chief Deputy Federal Public Defender October 2020 Update Madeleine Rogers Law Clerk TABLE OF CONTENTS Page A. Introduction ..................................................................................................................... 3 B. What Constitutes A Search? ............................................................................................ 3 C. What Constitutes A Seizure? ......................................................................................... 14 D. Reasonable Expectation of Privacy ..............................................................................
    [Show full text]
  • 6 Informer 18
    Department of Homeland Security Federal Law Enforcement Training Centers Office of Chief Counsel Legal Training Division June 2018 THE FEDERAL LAW ENFORCEMENT -INFORMER- A MONTHLY LEGAL RESOURCE AND COMMENTARY FOR LAW ENFORCEMENT OFFICERS AND AGENTS Welcome to this installment of The Federal Law Enforcement Informer (The Informer). The Legal Training Division of the Federal Law Enforcement Training Centers’ Office of Chief Counsel is dedicated to providing law enforcement officers with quality, useful and timely United States Supreme Court and federal Circuit Courts of Appeals reviews, interesting developments in the law, and legal articles written to clarify or highlight various issues. The views expressed in these articles are the opinions of the author and do not necessarily reflect the views of the Federal Law Enforcement Training Centers. The Informer is researched and written by members of the Legal Division. All comments, suggestions, or questions regarding The Informer can be directed to the Editor at (912) 267-3429 or [email protected]. You can join The Informer Mailing List, have The Informer delivered directly to you via e-mail, and view copies of the current and past editions and articles in The Quarterly Review and The Informer by visiting https://www.fletc.gov/legal-resources. This edition of The Informer may be cited as 6 INFORMER 18. Get THE INFORMER Free Every Month Click HERE to Subscribe THIS IS A SECURE SERVICE. You will receive mailings from no one except the FLETC Legal Division. The Informer – June 2018 Case Summaries United States Supreme Court City of Hays, Kansas v. Vogt: Whether the Fifth Amendment’s Self Incrimination Clause prohibits the use of compelled statements at a probable cause hearing..................................6 Collins v.
    [Show full text]
  • Electronic Media Sanitization Standard
    Electronic Media Sanitization Background Computing systems (including desktops, laptops, tablets, networking equipment, cellular phones, smart phones and other devices) store data on a wide variety of storage media (e.g., hard drives, USB flash drives, solid-state drives, floppy disks, CD-ROM's, DVD’s, Blu-Ray’s, tapes, memory, etc.). This data must be securely removed from the media once the data and/or device is no longer required in order to prevent unauthorized disclosure of the data. This is particularly important if the device contains Export Controlled or Restricted data as defined in the Data Governance & Classification Policy. Data could be disclosed through many avenues including computers or equipment sold, recycled or disposed without appropriate media sanitization practices, equipment with storage media returned to vendors as defective or as a trade-in for new equipment, or mobile media not being properly sanitization and or destroyed after use. Standard The NIST Special Publication 800-88r1 - Guidelines for Media Sanitization is used as the primary guide for this document. NIST Special Publication 800- 88r1 explains the need for proper media sanitization, types of sanitization, roles and responsibilities and much more information related to this topic. The Electronic Media Sanitization Standard is mandatory for media that contains Export Controlled or Restricted data and is recommended for media that contains Controlled data. Export Controlled data may have additional sanitization requirements, see Export Controls Office for additional information. Each college or department must adhere to the University General Retention Schedule unless the college or department has an approved unique schedule. When Export Controlled or Restricted data has been stored on media where that media is to be reused or forwarded to UC Surplus Management for appropriate disposition, it is imperative that measures be taken to sanitize the media before it leaves control of the department of responsibility.
    [Show full text]
  • "Border Searches" Under the Fourth Amendment
    Order Code RL31826 Protecting the U.S. Perimeter: “Border Searches” Under the Fourth Amendment Updated January 15, 2008 Yule Kim Legislative Attorney American Law Division Protecting the U.S. Perimeter: “Border Searches” Under the Fourth Amendment Summary Many border security initiatives were developed after the events of September 11, 2001.1 Because security initiatives often contain a search and seizure component, Fourth Amendment implications may arise. The Fourth Amendment establishes that a search or seizure conducted by a governmental agent must be reasonable, and that probable cause supports any judicially granted warrant. The Supreme Court has interpreted the Fourth Amendment to include a presumptive warrant requirement on all searches and seizures conducted by the government, and has ruled that any violations of this standard will result in the suppression of any information derived therefrom. The Supreme Court, however, has also recognized situations that render obtaining a warrant impractical or against the public’s interest, and has accordingly crafted various exceptions to the warrant and probable cause requirements of the Fourth Amendment. Few exceptions to the presumptive warrant and probable cause requirements are more firmly rooted than the “border search” exception. Pursuant to the right of the United States to protect itself by stopping and examining persons and property crossing into the country, routine border searches are reasonable simply by virtue of the fact that they occur at the border. Courts have recognized two different legal concepts for authorizing border searches away from the actual physical border: (1) searches at the functional equivalent of the border; and (2) extended border searches.
    [Show full text]
  • Unwanted Data
    www.osbplf.org Malpractice Prevention Education for Oregon Lawyers Unwanted Data: How to Properly Destroy Data in Hardware If you have old computers and other office Options for Permanent Data equipment in your law office or home, there is Erasure a good reason they are still with you and not in the dumpster. This article will discuss why you You have two ways to completely destroy should be concerned about the data in your de- data: (1) use specialized software to overwrite the vices and the proper way to dispose of them. data or (2) physically destroy the hard drive. Why It Matters Using Data Sanitization Software Oregon Rule of Professional Conduct 1.6(c) Specialized software tools permanently de- requires lawyers to take reasonable steps to pre- lete files from your computer by overwriting vent the inadvertent disclosure of or unauthorized the information with random data. When this access to client information. To comply with this “data sanitization” method is used, overwritten rule, you need to make sure client data stored data can never be un-deleted with a file recov- in your computer and other media aren’t com- ery tool. Software programs that permanently promised when you get rid of the devices. This delete selected files are called file shredder pro- April 2017 requires you to ensure that data stored on these grams. Software programs that completely erase Issue 131 devices cannot be reconstituted after they leave the entire hard drive, not just selected files, are your control. It’s necessary that you permanently called data destruction programs.
    [Show full text]
  • The Fourth Amendment and Privacy Implications of Interior Immigration Enforcement
    The Fourth Amendment and Privacy Implications of Interior Immigration Enforcement Anil Kalhan* This Article proposes privacy as a descriptive and normative framework to analyze the constellation of recent initiatives to expand interior enforcement of federal immigration laws. By expanding the circumstances in which individuals are expected to demonstrate their lawful presence in the United States, these various initiatives seek to transform the significance of immigration and citizenship status in day-to-day life from something largely invisible and irrelevant to something visible and salient in a variety of settings. This transformation, however, carries underappreciated social costs. Building upon scholarship theorizing privacy as protecting a set of social or structural interests, and using the U.S. Supreme Court’s decision in Katz v. United States as a conceptual starting point, the Article argues that recognizing and protecting immigration and citizenship status privacy in certain contexts serves valuable social purposes. While the Fourth Amendment itself may ultimately establish a weak constraint against interior enforcement, in other contexts courts and state and local governments have increasingly recognized and protected privacy interests in immigration and citizenship * Visiting Assistant Professor, Fordham Law School. A.B., Brown University; M.P.P.M., Yale School of Management; J.D., Yale Law School. I am grateful to Tim Casey, Jennifer Chacón, Sherry Colb, Michael Dorf, Hiroshi Motomura, Alison Nathan, Smita Narula, Jayashri Srikantiah, Shoba Sivaprasad Wadhia, Verity Winship, and Michael Wishnie for helpful conversations and reviews of earlier drafts, to Meagan Crowley and Ashok Mathai for their dedicated research assistance, and to Kirin Gill and the UC Davis Law Review staff for their excellent editorial work.
    [Show full text]
  • Guidelines for Media Sanitization
    NIST Special Publication 800-88 Revision 1 Guidelines for Media Sanitization Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-88r1 C O M P U T E R S E C U R I T Y NIST Special Publication 800-88 Revision 1 Guidelines for Media Sanitization Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine Computer Security Division Information Technology Laboratory This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-88r1 December 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Acting Under Secretary of Commerce for Standards and Technology and Acting Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A-130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]