Border searches of laptops may be conducted off-site for cause, court rules
Computer searches OK at backup facility if reasonable suspicion exists, judge finds
Computerworld - In recent cases, U.S. courts have supported the government's right to search the contents of computers and other electronic devices carried by travelers arriving at U.S borders.
A federal court in Michigan this week added that if such a search could not be performed at the border, the government has the right to seize and transport a computer to a secondary inspection facility, as long as there's reasonable suspicion.
The issue of border laptop searches is important for business travelers who arrive at U.S airports carrying computers they use for work. Privacy advocates, security analysts and others have expressed concern that such searches could result in the exposure of sensitive company or customer data. The U.S. Department of Homeland Security has previously asserted its right to inspect, copy or download the contents of computers or other electronic devices belonging to travelers at U.S. borders even without cause.
The federal court's ruling was first reported by the Web site FourthAmendment.com. The ruling was in response to a motion filed by the defendant in a child pornography case, who alleged that U.S. customs officials violated his Fourth Amendment rights when they took away one of his computers at Detroit Metropolitan Airport.
The defendant, Theodore Stewart, is charged with transporting child pornography on two laptop computers that were in his possession when he arrived at the Detroit airport after a trip to Indonesia last May. According to court papers, a U.S. immigration and customs agent discovered images that appeared to depict child pornography on one of Stewart's computers during a secondary inspection of his belongings at the airport.
Customs officials were unable to immediately inspect the other computer, however, because its battery was damaged and no adapter was available to power up the system. Both computers were seized, and Stewart was allowed to go after being informed that the seized devices were being transported to a separate forensic facility for inspection.
Stewart was later charged with transporting child pornography based on evidence gathered from both computers during the inspection at the secondary facility. To do the inspection on the second computer, forensics agents had to remove the hard disk and mount it on another system.
Stewart sought to have the evidence from the second computer suppressed. In a brief, Stewart argued that while the initial inspection of one computer at the airport may have been valid, the seizure of the second computer and its inspection at the forensic facility amounted to an unreasonable, extended border search. Stewart also claimed that the evidence found on the second computer was discovered in violation of his Fourth Amendment rights against unreasonable seizure and search.
The government contended that the search at the forensic facility was a continuation of the search at Detroit airport. Having found what appeared to be evidence of child pornography on one computer, it was reasonable to suspect that the other one might also contain such content, the government said. It claimed that the search of the second computer was no different than multiple entries being made into a premises using a single search warrant.
In a 10-page ruling, Judge David Lawson of the U.S. District Court for the Eastern District of Michigan said he could not fully accept either argument.
"Removing the laptops from the point of entry into the country and transporting them to a remote forensic laboratory may result in an intrusion greater than one might reasonably expect upon entering or re-entering the United States," Lawson wrote. Stewart was therefore correct in arguing that he was subjected to an extended border search, the judge wrote.
However, the search of the computer was valid, because agents clearly had reason to believe it might contain child pornography based on their inspection of the first computer at the airport, Lawson said.
In dismissing Stewart's motion to suppress evidence from the second computer, the judge also stressed that the search was only justified because the government was able to show "a particularized and objective" basis for suspicion in the case. The fact that the inspections were conducted within a day of the computers being seized also made it a reasonable search, he said.
"There comes a point when the passage of time or other circumstances can transform a seizure of property reasonable at its outset into an unreasonable intrusion," he said. But in this case that did not happen, Lawson wrote.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Privacy in Computerworld's Privacy Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts