Reason.com - Free Minds and Free Markets
Reason logo Reason logo
  • Latest
  • Magazine
    • Current Issue
    • Archives
    • Subscribe
    • Crossword
  • Video
  • Podcasts
    • All Shows
    • The Reason Roundtable
    • The Reason Interview With Nick Gillespie
    • The Soho Forum Debates
    • Just Asking Questions
    • The Best of Reason Magazine
    • Why We Can't Have Nice Things
  • Volokh
  • Newsletters
  • Donate
    • Donate Online
    • Donate Crypto
    • Ways To Give To Reason Foundation
    • Torchbearer Society
    • Planned Giving
  • Subscribe
    • Reason Plus Subscription
    • Print Subscription
    • Gift Subscriptions
    • Subscriber Support

Login Form

Create new account
Forgot password

Nanny State

Erase Your Porn

Radley Balko | 4.23.2008 10:55 AM

Share on FacebookShare on XShare on RedditShare by emailPrint friendly versionCopy page URL
Media Contact & Reprint Requests

The Ninth Circuit becomes the second federal appeals court to rule that border agents can search your laptop without probable cause. The ruling wasn't surprising, but it is unfortunate. Probably good for the external drive and web hosting industries, though.

Start your day with Reason. Get a daily brief of the most important stories and trends every weekday morning when you subscribe to Reason Roundup.

This field is for validation purposes and should be left unchanged.

NEXT: D.I.Y. Eminent Domain

Radley Balko is a journalist at The Washington Post.

Nanny StatePrivacyPornography
Share on FacebookShare on XShare on RedditShare by emailPrint friendly versionCopy page URL
Media Contact & Reprint Requests

Hide Comments (55)

Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.

  1. T   17 years ago

    TrueCrypt, baby! The man will never find your porn!

    Works on thumb drives, too.

  2. sixstring   17 years ago

    Well, I guess my “Michael Cheroff is a Terrorist” screensaver will have to go…

  3. Jennifer   17 years ago

    Serious question: if you’re going on a trip and decide to replace your lovely “Starry Night” screensaver/background with something vile like a goatse picture, is this kosher or are you expected to make sure nothing on your computer offends the delicate sensibilities of the overpaid high-school dropouts playing security theater roles these days?

  4. John-David   17 years ago

    I’d have a folder entitled “Secret Terrorist Plans” but every file in it would be the Rick Astley video.

  5. LarryA   17 years ago

    Finally! Now at least someone will read my stories. And who knows? One of the TSA folks may have a sister who’s married to a Hollywood producer who…

    Aw, come on. It’s as likely as them catching a terrorist by randomly snooping hard drives.

  6. Jake Boone   17 years ago

    Jennifer –

    If you do that, try to get in line near a small child, so you can also accuse the TSA guy of showing obscene material to a minor.

  7. Dr. Logan   17 years ago

    I’d have a folder entitled “Secret Terrorist Plans” but every file in it would be the Rick Astley video.

    When you rickroll the TSA, everybody wins.

  8. Episiarch   17 years ago

    Aigghhh, joke handle.

  9. Warty   17 years ago

    Serious question: how do they determine if a picture is child porn? There are some really young-looking 18 year olds, and for that matter, some frighteningly overdeveloped 14-year olds.

  10. Neu Mejican   17 years ago

    Arnold argued that a laptop is like a home – and therefore receives the same privacy protections. But O’Scannlain countered that you cannot live in a laptop and it travels with you, so there is less privacy expectation.

    Doesn’t your second life avatar have privacy expectations?

    Warty,

    Any more questions like that an you will be subject to a reasonable cause search.

    ;^)

  11. P Brooks   17 years ago

    Ummm, what the fuck is the border patrol looking for? Virtual illegal aliens?

    If I have photos of the Hoover Fucking Dam on my computer, am I going to be detained?

  12. P Brooks   17 years ago

    I have one of those really cool “earthrise from the moon” pictures on my desktop; will they assume I took it myself from my secret moonbase fortress?

  13. Jennifer   17 years ago

    Two girls. One cup. ‘Nuff said.

  14. American Heroes   17 years ago

    Mr. Brooks, I’m afraid you’re going to have to… “GET ON THE GROUND! NOW MOTHERF#(*#&@!”

  15. Bingo   17 years ago

    What if someone brought a lethal computer virus across the border on their laptop?? I, for one, am glad that the TSA will be keeping us safe from such terrorist activities.

  16. ed   17 years ago

    I don’t own a laptop, cell phone or wristwatch.
    I was a quiet man who blended in.
    They never saw it coming.

  17. Alex Jones   17 years ago

    P Brooks | April 23, 2008, 11:41am | #

    In that case they would want to find out how you broke through the radiation belt and reached the moon, since they never did.

  18. Your Good Buddy Johnny Clarke   17 years ago

    Y’know, I don’t have a huge issue with people being cavity searched when they cross the border. That’s just the way it works.

    The problem is “the border” is now defined as every square inch of land up to 100 miles from the border, so huge sections of this country lost the 4th Amendment decades ago and never even knew it.

  19. Your Good Buddy Johnny Clarke   17 years ago

    Uhm, Bingo, do you honestly think a TSA agent would have the slightest clue how to locate a virus on someone’s laptop? If I have a heart attack from laughing this hard, I’m sending you the bill.

  20. Naga Sadow   17 years ago

    T,

    Awesome looking program, but I suspect that the NSA’s code breaking mainframes in the basement would make mincemeat of the virtual encryption.

  21. Guy Montag   17 years ago

    From my warm, sticky, fingers . . .

  22. Bingo   17 years ago

    The borders of our internet are insecure! Millions of IllegalMexicanImmigrants and IslamicTerrorists are free to browse American websites on American servers. They have clear and open access to the White House, FBI, Department of Defense. They can insert a virtual weapon of mass destruction at any moment and destroy millions and interrupt ebay and eshopping and email.

    Do you want an Islamofascist foreigner talking to your teenage daughter on Myspace? Or what about a Chinese spy looking at your son’s facebook information? The Russian mafia can send your children pornography and drug information, completely unhindered!

    We should demand the government do something about this threat. If we don’t secure the borders of our tubes for the children, then the terrorists will have won.

  23. Reinmoose   17 years ago

    Bingo –
    Where did you copy and paste that post from? It was way too good to have been your own snark.

  24. Elemenope   17 years ago

    Ummm, what the fuck is the border patrol looking for? Virtual illegal aliens?

    Yes. And virtual drugs. And usage of encryption and/or steganography.

    If I have photos of the Hoover Fucking Dam on my computer, am I going to be detained?

    Yes. Welcome to Amerika.

  25. P Brooks   17 years ago

    Millions of IllegalMexicanImmigrants and IslamicTerrorists are free to browse American websites on American servers. They have clear and open access to the White House, FBI, Department of Defense.

    Not only that, foreign investors, newly made rich by the debasement of the Federal Reserve asswipe Note, will have unfettered access to the Hud Home listings! Do you really want The French buying houses in this country? Homes freshly repossessed from god-fearing, red-blooded American house-flippers?

    Oh, for shame…

  26. johnnykrisma   17 years ago

    ~Naga Sadow

    It’s not virtual encryption, it is a virtual drive that is encrypted that they mean. And while it is probably the case that NSA can break AES-256 with their monster server farms, let’s see how they do when everyone coming across the border has many gigs of material encrypted thusly. Are we all supposed to wait for them to decrypt before I board the plane? Talk about delays…

    If we’d all just encrypt every message we send online, even if it’s “hey Jennifer, go see this goatse picture…” then we’d not have to worry about AT&T setting up listening posts.

  27. Naga Sadow   17 years ago

    Johnnykrisma,

    There was a computer engineer at USM who basically said the same thing. So much information and too few personel to review everything. He theorized that any eavesdropping was carried out by using certain phrases and keywords, that were indexed by using other databases such as the FBI’s, CIA’s, etc.

  28. too many steves   17 years ago

    “Probably good for the external drive and web hosting industries, though.”

    Until an Executive Order is signed authorizing, and demanding, access to said external drive(s) and web hosting services in the interest of NATIONAL SECURITY and THE CHILDREN a la the “terrorist” phone call monitoring program.

  29. Bingo   17 years ago

    Hey now Reinmoose! No need to doubt my snarkiness 😉

    LMNOP: I think you mean steganography. Time to encrypt all my important docs into 2girls1cup and goatse

    I’m actually surprised the social conservatives haven’t tried to get legislation for a national firewall (like China). For the children, of course.

  30. P Brooks   17 years ago

    I’m going to go out on a limb and guess QTParted will do a better job of erasing/ formatting my hard drive than whatever crap Windows has built in.

    —-

    Once upon a time, I had an atom bomb mushroom cloud as a desktop picture. All I have to do is find it, and photoshop the Chrysler building into it, and I won’t ever have to worry about flying again.

    But I don’t really want to spend the rest of my days in a dog kennel, either…
    fuck it.

    I better get to work.

  31. Jennifer   17 years ago

    And while it is probably the case that NSA can break AES-256 with their monster server farms, let’s see how they do when everyone coming across the border has many gigs of material encrypted thusly. Are we all supposed to wait for them to decrypt before I board the plane? Talk about delays…

    Actually, I wouldn’t put it past the government to adopt the default attitude “if it’s encrypted, it’s probably illegal and proof that you need to be detained.” What does the TSA have to lose if everybody misses their flight? Nothing. TSA gets paid either way. Why should the Border Patrol give a shit if citizens are stranded outside the country and forbidden access back in? It’s not like they’re ever rated on matters like “customer satisfaction.”

  32. Reinmoose   17 years ago

    Bingo –
    It wasn’t in doubt of your snarkiness, it just looked too life-like to be snark. It’s a compliment.

  33. Other Matt   17 years ago

    Actually, I wouldn’t put it past the government to adopt the default attitude “if it’s encrypted, it’s probably illegal and proof that you need to be detained.”

    No, they’ll let you go on, leaving your laptop behind until it’s decrypted, or destroyed. Or, you can give them the password, it’s your choice.

  34. Bingo   17 years ago

    Other Matt: The TrueCrypt hidden volume feature works pretty well there. One password pulls up the fake volume and the other password pulls up the real one. Put some financial docs and some soft-core porn in the fake volume and let ’em take a look if they want. They can’t tell if you have a hidden volume and you get a plausible excuse for encrypting it.

  35. P Brooks   17 years ago

    leaving your laptop behind until it’s decrypted, or destroyed.

    Or put up for sale on Ebay, to help fund the Global War on Scary Badguys. Or beer money.

  36. Marshall   17 years ago

    No, they’ll let you go on, leaving your laptop behind until it’s decrypted, or destroyed. Or, you can give them the password, it’s your choice.

    In looking at TrueCrypt (which looks sweet), there is a way around this.

    TSA bimbos are unlikely, imho, to figure this all out.

    Edit: in preview, Bingo beat me to it. :p

  37. Rex Rhino   17 years ago

    Awesome looking program, but I suspect that the NSA’s code breaking mainframes in the basement would make mincemeat of the virtual encryption

    Yeah, lets see how well the NSA’s code breaking mainframes work on a one time pad, shall we?!?!

    Actually, I wouldn’t put it past the government to adopt the default attitude “if it’s encrypted, it’s probably illegal and proof that you need to be detained.”

    How will they even know that there is encrypted data on a machine? How is encrypted data different than say unencrypted data? It is all just ones and zeros.

  38. Johnnykrisma   17 years ago

    IIRC there is a precedent for the use of encryption in a child porn case being part of the *evidence* of a trial. I guess much like the “if you’ve got nothing to hide, then what does it matter” argument, if you’re using encryption, then you must have something to hide.

  39. johnnykrisma   17 years ago

    Yeah, lets see how well the NSA’s code breaking mainframes work on a one time pad, shall we?!?!

    They’ll just subpoena your pads

    How will they even know that there is encrypted data on a machine? How is encrypted data different than say unencrypted data? It is all just ones and zeros.

    TSA wouldn’t know their ass from a hole in the ground, but is possible to tell if something is encrypted. Most files even programs will have some type of plaintext in it. header files, constants, etc. Encrypted files are pure ‘gibberish’ for lack of a better term.

  40. Jerry   17 years ago

    “…has failed to distinguish how the search of his laptop and its electronic contents is logically any different from the suspicionless border searches of travelers’ luggage that the Supreme Court and we have allowed…”

    So if I put my laptop in my suitcase, can they still search the laptop? Or can they only look at it and determine it’s value from a catalogue?

  41. bill   17 years ago

    The big question is can they force you to reveal or enter your password to open an encrypted volume? What about if you have your Windows password on? Can they make you enter it just to even be able to get into OS?

  42. Kolohe   17 years ago

    As part of this side disgression, didn’t “they” try in the 90’s to make it illegal to possess anything other than authorized encryption technology? The ‘clipper chip’ or something like that? (TLTG – thanks for the acronym J sub D!)

  43. Rex Rhino   17 years ago

    They’ll just subpoena your pads

    How will they know that a one time pad is even being used?.

    TSA wouldn’t know their ass from a hole in the ground, but is possible to tell if something is encrypted. Most files even programs will have some type of plaintext in it. header files, constants, etc. Encrypted files are pure ‘gibberish’ for lack of a better term.

    Here is an example of what someone can do:

    Take a family photo (or more likely multiple photographs) with a digital camera, and take their encrypted data… then take each bit of that encrypted data, and add 1 or zero to the red channel of that pixel, corresponding to the bit from the encrypted file.

    The photographs with the encrypted data will be indistinguishable from a normal photograph, as that one bit is below the noise level of digital cameras.

    You copy these photographs to your laptop and travel to the U.S.. Meanwhile, your contact in the U.S. has a version of these photographs without the encrypted file superimposed. Diff the files, and you have that encrypted file again.

    You can do it with any sort of file (sound, images, etc.). Do it with a music file in your iPod, which is unlikely ever to be searched, and even if it is, they have only discovered a perfectly normal audio file.

    And what I am giving as an example is a gross simplification. There are much more sophisticated ways to hide the data. But basically, very smart people work very hard to hide data from national intelligence services, let alone from the idiots at the TSA. It is possible to hide and encrypt data such that virtually no-one will know that you have encrypted data, let alone be able to unencrypted it.

  44. P Brooks   17 years ago

    It is possible to hide and encrypt data such that virtually no-one will know that you have encrypted data, let alone be able to unencrypted it.

    Homeland Security must be issued massive electro-magnets to scramble the memory of every electronic data storage device which crosses the border in either direction. That way, it will be impossible for Islamoterrorverts to transfer information from one part of the world to another.

  45. Dee   17 years ago

    Just set your laptop to boot from a drive that does not exist before you come and go “freely.” When nothing happens but Hard Disk not found you can just say the laptop just crapped out and look depressed.

    From the looks of those the government employs for these jobs getting past them should not be difficult at all.

    Boot passwords, OS passwords, Encryption passwords not to mention whole partitions of data not visible if you run a dual boot setup.

    Face it if those folks had 1/2 the computer skills to get around all that they would not be working where they are now.

    It is true that collecting data seems great on the face of it but there comes a point where you have more data than you can manage and make sense from. Someone has to sift through the data at sometime and even cursory searches of really large volumes of data will yield really large quantities of information. They can’t keep track of anything hardly now as it stands yet they seem to think collecting more is the answer. To what I have no idea other than someones desire for a total police state.

  46. John C. Randolph   17 years ago

    Mac users, go to System Preferences, Security, FileVault. Turn it on. Problem solved.

    -jcr

  47. T   17 years ago

    I actually wondered what they would do if you simply look at them and say you don’t have the password. Company policy prohibits me giving out my password. What do I care if TSA confiscates the laptop? It ain’t my laptop. I’ll hand IT a receipt and say “Gimme new laptop.”

  48. Ali   17 years ago

    I wonder if TSA is reading this blog entry.

  49. johnnykrisma   17 years ago

    The fact is TSA are probably not the sharpest tools in their shed, so resorting to something like Steganography or even encryption is ridiculous. You could easily set up a innocuous looking partition to be your default boot drive and then when you wanted to get to your kiddie pr0n, nuclear device plans, or source code to Diebold’s voting machines, just boot from that partition.

    Just looked, Dee beat me to this idea, so yeah, what (s)he said…

  50. James Anderson Merritt   17 years ago

    # Your Good Buddy Johnny Clarke | April 23, 2008, 11:57am | #

    # Y’know, I don’t have a huge issue with people
    # being cavity searched when they cross the
    # border. That’s just the way it works.

    But where in the Constitution does this permission to forgo warrants reside? In the word “unreasonable”? I thought a “reasonable” search was a warranted one, or one that, because of serious and exceptional “exigent circumstances” could not wait for a warrant.

    How do routine Customs searches qualify? I think this is another power that the courts simply made up, pretty much as they made up the “immigration” power out of whole cloth as “an inherent power of nations,” without recourse to any specific language in the Constitution (which takes pains to make explicit other “inherent powers,” such as taxation, for example, and then to say that anything not explicitly permitted for the Federal government to do was forbidden to it).

    Just because we may have become used to “routine” Customs searches doesn’t mean they are right, even if the Justices have (mistakenly) said so in years past. I hope this guy appeals.

  51. gr   17 years ago

    “Probably good for the external drive and web hosting industries, though.”

    Using the same logic as this ruling they can probably search your hard drives and media that you bring with you too.

  52. TallDave   17 years ago

    Sheesh, this is awful.

    They might as well put up a sign:

    “You Are Now Entering America. Please Check Your Rights At The Border.”

  53. TallDave   17 years ago

    Using the same logic as this ruling they can probably search your hard drives and media that you bring with you too.

    I have faith the average border guard can’t be bothered to figure out a USB connection.

  54. LarryA   17 years ago

    One laptop – $800
    100 Firefly flash drives – $900
    Look on TSAguy’s face – Priceless

  55. Clackalackin   17 years ago

    You go through US Customs and Border Patrol at the border Ports of entry. They are Federal Officers and can arrest you at the border. Totally, different than TSA.

    Presenting yourself at the border is all it takes to satisfy any 4th amendment issues. Like it or not that’s the facts.

    Go ahead and believe they don’t know about USB ports, encryption software, phone chips, sim cards or your box of 25 Cubans.

Please log in to post comments

Mute this user?

  • Mute User
  • Cancel

Ban this user?

  • Ban User
  • Cancel

Un-ban this user?

  • Un-ban User
  • Cancel

Nuke this user?

  • Nuke User
  • Cancel

Un-nuke this user?

  • Un-nuke User
  • Cancel

Flag this comment?

  • Flag Comment
  • Cancel

Un-flag this comment?

  • Un-flag Comment
  • Cancel

Latest

How Tariffs Are Breaking the Manufacturing Industries Trump Says He Wants To Protect

Eric Boehm | From the July 2025 issue

The Latest Escalation Between Russia and Ukraine Isn't Changing the Course of the War

Matthew Petti | 6.6.2025 4:28 PM

Marsha Blackburn Wants Secret Police

C.J. Ciaramella | 6.6.2025 3:55 PM

This Small Business Is in Limbo As Owner Sues To Stop Trump's Tariffs

Eric Boehm | 6.6.2025 3:30 PM

A Runner Was Prosecuted for Unapproved Trail Use After the Referring Agency Called It 'Overcriminalization'

Jacob Sullum | 6.6.2025 2:50 PM

Recommended

  • About
  • Browse Topics
  • Events
  • Staff
  • Jobs
  • Donate
  • Advertise
  • Subscribe
  • Contact
  • Media
  • Shop
  • Amazon
Reason Facebook@reason on XReason InstagramReason TikTokReason YoutubeApple PodcastsReason on FlipboardReason RSS

© 2024 Reason Foundation | Accessibility | Privacy Policy | Terms Of Use

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

r

Do you care about free minds and free markets? Sign up to get the biggest stories from Reason in your inbox every afternoon.

This field is for validation purposes and should be left unchanged.

This modal will close in 10

Reason Plus

Special Offer!

  • Full digital edition access
  • No ads
  • Commenting privileges

Just $25 per year

Join Today!