Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy Portables Hardware

The Failing Right of Laptop Privacy 315

davidwr writes "Wired has an interesting editorial on laptop searches and seizures. It raises some interesting issues, including employee rights against police searches in the workplace, routine vs. non-routine searches at ports of entry, and police use of unrelated data found in a database search. The article ends saying: 'Of course, there's a chance that the courts will not recognize the different scope of privacy interests at stake in computer searches, or will not be adept at crafting a rule that gives enough leeway and guidance to law enforcement, while also protecting privacy. At that point, the Constitution may fail us, and we will have to turn to Congress to create rules that are better adapted for the information age.'"
This discussion has been archived. No new comments can be posted.

The Failing Right of Laptop Privacy

Comments Filter:
  • by Anonymous Coward on Saturday January 20, 2007 @05:52PM (#17697440)
    The constitution certainly left the building back in the age of the new deal, possibly even as early as aliens and sedition.
    • by genrader ( 563784 ) on Saturday January 20, 2007 @06:39PM (#17697740) Homepage Journal
      AMEN. The New Deal was not the last of the Constitution though. Alien and Sedition Acts were bad, as were many other things, but the death of the Constitution was in 1913, when Congress took away its own power to coin money and gave it to a private bank, as well as the introduction of the income tax and the end of Senators being elected by states. The only reason we have it so good now is because of our wariness of tyranny and the great age of capitalism, but that will all end when the right tyrant comes along.
      • Re: (Score:3, Insightful)

        by The Warlock ( 701535 )
        the introduction of the income tax and the end of Senators being elected by states.

        Oh, what bullshit. Look, if the constitution wasn't supposed to be amended, then Article Five wouldn't be there in the first place, would it?
        • Re: (Score:3, Interesting)

          by RexRhino ( 769423 )
          Oh, what bullshit. Look, if the constitution wasn't supposed to be amended, then Article Five wouldn't be there in the first place, would it?

          Sure, the constitution can be amended... but much like prohibition, eliminating state legislators from electing senators sucks, amendment or not.
      • by k1e0x ( 1040314 ) on Saturday January 20, 2007 @08:08PM (#17698276) Homepage

        Word.

        1913 was the *start* of us loosing our rights but with the recent stuff (patriot act, land seizures, warrant less wire taping, military tribunals) its all gone now.

        I cant think of a single part of the bill of rights that we still have.

        Why is speech "limited" at political rallies or universities? Why is hate speech a crime? ..because the 1st Amendment is meaningless.

        Why are there gun laws restricting firearms? ..because the 2nd Amendment is meaningless.

        The 3rd.. is possibly impractical.. and also probably meaningless as well.. but if not, the feds will find a way to make it legal.

        The government can search practically anything they want now? Laptops, Phone records, E-Mail, you name it, why? ..because the 4th Amendment is meaningless.

        How can the City of New London takes peoples land and give it to Pfizer? ..because the 5th Amendment is meaningless.

        Why is José Padilla been in jail for 4 years being tortured, when his case is still pre-trail? ..because the 6th (and 8th) Amendment, are meaningless.

        Why does just about everyone accused of mutable crimes seek a plea bargain for a lesser offence instead of standing up for there rights? Why does the state tack on so many charges with extreme punishment (101 years for spamming)? ..because the 7th Amendment is -basically- meaningless.

        Why is a man being sentenced to 101 years for spamming? Why is another man sentenced (and denied appeal) to 50 years in prison for selling pot? Why are children being convicted of molesting each other? ..because the 8th Amendment is meaningless.

        Why does the government have the power to do anything we don't specially say they don't have or can pick apart and widdle down the other rights we have? Why is it the people reserve no rights beyond what's listed in the constitution .. that or what the government allows? ..because the 9th and 10th Amendments are meaningless.

        We have a "vestige" of the construction.. we don't actually have enforceable rights in the same sense as they were written. The Ed Brown case is part of this, the court would not allow him to use constructional law in his court. read that again.. you can't use the construction.. the highest law on of land in a U.S. federal court. The judges swear an oath to it but its entirely irreverent anymore.
      • Re: (Score:3, Insightful)

        by westlake ( 615356 )
        The New Deal was not the last of the Constitution though. Alien and Sedition Acts were bad, as were many other things, but the death of the Constitution was in 1913, when Congress took away its own power to coin money and gave it to a private bank, as well as the introduction of the income tax and the end of Senators being elected by states

        Pfui.

        You both sound like you would be more comfortable with a hereditary House of Lords

        ---or is it the Corporate State of Microsoft?

        The late nineteenth century Senat

  • by photomonkey ( 987563 ) on Saturday January 20, 2007 @05:53PM (#17697442)

    When the day comes that the Constitution can no longer protect us in the information age, we have a Congress actually interested and willing to step in on behalf of the people.

    • For myself, though, I must admit reading the last sentence of the summary more like this:

      "At that point, the Constitution may fail us, and we will be screwed."

    • by kfg ( 145172 ) on Saturday January 20, 2007 @06:03PM (#17697508)
      Democracy is a device that ensures we shall be governed no better than we deserve. -G.B. Shaw

      KFG
      • Re: (Score:2, Insightful)

        by Caffeinate ( 1031648 )
        Shaw was close, but I would make a slight modification . . .

        Democracy is a device that ensures we shall be governed no better than the majority deserves.

        Democracy is a horrible system of government for the minority dissenters in the group . . .

        • by kfg ( 145172 ) on Saturday January 20, 2007 @07:04PM (#17697928)
          Democracy is a device that ensures we shall be governed no better than the majority deserves.

          Shaw used the royal "we" and his observation was directed at your point. Democratic forms of government at best serve the lowest common demoniator (which is something rather different than the majority). At worst it is, of course, nothing more than a self-satisfied lynch mob.

          Which is why the framers gave us a Congress instead of a democracy (they knew about Athens), under a constitution (they knew about Rome). They anticipated Shaw's further observation that anyone who robs Peter to pay Paul can always count on the support of Paul.

          It is not the fault of Congress if the least common denominator has demanded more and more democracy while deserving it less and less.

          It is the fundamental premise of our governmental philosophy that the government will be corrupted and that it is the responsibility of The People, freemen all, to see to their own freedoms.

          Where The People demand the "freedom" to be endentured in order that they may be "free" to watch Survivor and Big Brother on a really big TV, that is the freedom they will get.

          Freedom is messy and uncomfortable. The People would rather be comfortable serfs than uncomfortable freemen, in numbers far greater than a simple majority. Let's call it, ooooooooh (pulling a number out of my ass that probably isn't too far wrong) - 98%.

          Give me liberty, or give me. . .ooooooooooooooo, shiney!

          KFG

    • Re:And Hopefully... (Score:5, Informative)

      by zCyl ( 14362 ) on Saturday January 20, 2007 @06:24PM (#17697648)
      When the day comes that the Constitution can no longer protect us in the information age

      Uh, but it does, and plainly so. Not only is a laptop part of a person's "effects" as protected explicitly in the fourth amendment, but the contents of a laptop are ones papers. The search of papers inside of a laptop is thus the same as the search of papers inside of an envelope. The transmission of a paper via email is no different than the transmission of a paper via postal mail. The constitution plainly and clearly provides protection for this, and it is simply a question of whether the courts will acknowledge this now, or come to their senses later. It is not exactly a matter of interpretation when the language is that clear.
      • Re: (Score:2, Insightful)

        This was my first thought on reading the summary. The thing is, almost all of the examples given in the article are either speculation about what could possibly maybe happen or instances where the computer does not belong to the person being investigated. I think that an employer has a right to monitor their own computers. Employers should also have a right to let investigators search their computers.
      • Re: (Score:3, Insightful)

        by cptgrudge ( 177113 )

        Perhaps we'll just need to bring the papers and effects closer to our "person" in the interim. How many people might get a little bio-engineered implant that holds a relatively large amount of data? Access it over bluetooth, direct via your mind, or something else.

        Of course, there are a lot of steps between that technology and reality, but I think forcing a person into surgery to get at some data which may or may not be hidden away inside of them would rub a lot of people the wrong way.

        • by h2g2bob ( 948006 )
          You better get some antivirus for that.
        • They are already doing this with DNA testing to some degree. How more personal could an effect or paper be if it is the very genetic code that makes up who you are. Sure it isn't exactly surgury but not far off.
      • Re: (Score:2, Insightful)

        by JimXugle ( 921609 )
        Keep in mind that a regular email is like a post card in the postal system... anyone can read it.
        encrypted email on the other hand is more like a sealed envelope.
    • Re: (Score:2, Insightful)

      by Mike Rice ( 626857 )
      The Constitution already provides protection to us. The real problem is, we have failed to protect the Constitution.

      We've let our rights be whittled away over the centuries... a DMCA here, a 'Patriot' Act there... because we the people have failed to enforce our rights are under the Constitution, and our 'leaders' have chosen to ignore the Constitution altogether, except where it suits themselves.

      Ironically, the Founding Fathers wrote the Bill of Rights in the first place BECAUSE they were afraid that futu
      • Excuse me but if you put such a vague word as "unreasonable" in the constitution, then you get what you deserve: vague, variable "interpretations" of the "spirit" of the law and its writer's "intention". THAT's why you need absolutes in laws rather than the idiocy you can read in any contemporary legislative document. Your constitution did a better job but still fails, precisely because of these somewhat wide cracks. Remember that the more flexible something is, the more it will be distorted - for good or f
        • Re: (Score:3, Insightful)

          by blincoln ( 592401 )
          THAT's why you need absolutes in laws

          Right, because modern legal language like the kind used to write EULAs and NDAs is so superior to the Constitution, which can be read and understood by normal people.

          Just because modern Americans tend to be so petty and self-serving that they demand things be explained with a page of words instead of a sentence does not mean that's how things should be done.
    • Will never fail us. Its the people that are sworn to abide by it who will fail. ( and have )
  • by Anonymous Coward on Saturday January 20, 2007 @05:55PM (#17697452)
    "we will have to turn to Congress to create rules that are better adapted for the information age.'"

    Turn to congress for help in protecting our liberties? Haha, that's a good one. He must be new here.
    • by Divebus ( 860563 )
      we will have to turn to Congress to create rules that are better adapted for the information age

      Oh, yeah... go ahead and mod me down, but... SOLD TO THE HIGHEST BIDDER!... or most influence.

    • But Nancy is in charge of congress now! She promised she would look out for us! Don't you ... believe her?
  • one word... (Score:2, Interesting)

    ...encryption.

    TrueCrypt or PGPDisk or....
    • Re:one word... (Score:5, Informative)

      by Elemenope ( 905108 ) on Saturday January 20, 2007 @06:05PM (#17697516)

      Many countries, such as Britain, criminalize witholding encryption keys from law enforcement to the extent that unless you are actually a terrorist with detailed and executable plans of action labeled 'evil plot' stupidly stored on your laptop, you are probably better off (in the criminal liability sense) just giving it to them. Sadly, I don't think that the US is far behind on this one, either.

      • Many countries, such as Britain, criminalize witholding encryption keys from law enforcement to the extent that unless you are actually a terrorist with detailed and executable plans of action labeled 'evil plot' stupidly stored on your laptop, you are probably better off (in the criminal liability sense) just giving it to them. Sadly, I don't think that the US is far behind on this one, either.

        We're not there yet, AFAIK...

        http://www.latimes.com/news/nationworld/columnone/ la-me-pellicano2mar02,1,8581 [latimes.com]

      • Re:one word... (Score:4, Interesting)

        by dgatwood ( 11270 ) on Saturday January 20, 2007 @06:53PM (#17697824) Homepage Journal

        That's what a steganographic filesystem is for: plausible deniability. You have multiple layers of data encryption, none of which know about the lower layers, each of which stores data in the free space left behind by the upper layer. They ask you for the password, you provide the password to financial records at the first encrypted layer. For that matter, you could have an unencrypted layer on top so that there's no proof that any encrypted data even exists. In the unlikely event that they find the crypto tool, though, you have financial records at the first encrypted level. Say that there's nothing else, but under duress, admit to a second level with something a little more embarrassing (e.g. your porn collection). Keep anything that has to be kept secret at the third level.

        There are two big problems, though: 1. Writes to the upper layer overwrite data at the lower layers, so the redundancy at the lower layers is pretty crucial to avoid data loss, and even then, beyond a certain point, you'll start losing data. 2. All the implementations I've seen out there are Linux-only (or at best UNIX/Linux), which makes them less than useless for most of the general public.

        • Re: (Score:3, Informative)

          by MrSteveSD ( 801820 )

          All the implementations I've seen out there are Linux-only (or at best UNIX/Linux), which makes them less than useless for most of the general public.


          TrueCrypt allows for hidden volumes (i.e. encrypted areas within encrypted areas) and it's a windows program. They claim it's not possible to detect the hidden volumes, but I have to take their word for it.
          • Re: (Score:3, Interesting)

            by SeaFox ( 739806 )

            TrueCrypt allows for hidden volumes (i.e. encrypted areas within encrypted areas) and it's a windows program. They claim it's not possible to detect the hidden volumes, but I have to take their word for it.

            Actually, they say it is possible to detect hidden volumes [truecrypt.org] a few ways, one being if you're using a journaled filesystem on the host device. It will be possible to see changes to hard disk sectors that the directory will say are not being used by files. So the solution is not to format the source disk as N

        • by SeaFox ( 739806 )

          There are two big problems, though: 1. Writes to the upper layer overwrite data at the lower layers, so the redundancy at the lower layers is pretty crucial to avoid data loss, and even then, beyond a certain point, you'll start losing data.

          I think the solution is to make the outer encrypted volume a set size, and then create the inner volume to be flexible for size requirements. Before you create the inner volume, put a few financial-related documents in the volume. Now if they open it, here's a few docume

      • With TPM, I won't have the keys to at least one section of my own computer's hard drive. Trusted computing at its finest.
      • Thats what TrueCrypt's hidden volumes function is for.
    • one word... ...encryption.

      It's too bad that having encrypted documents (or encryption software) is probably grounds to have you "detained."
    • one word... encryption

      two words: probable cause. search warrant. three words: contempt of court. obstruction of justice. to the judge your laptop is just another lockbox: surrender the key or go to jail.

      for no fixed term, but simply at the court's pleasure.

      • by grahammm ( 9083 ) *

        three words: contempt of court. obstruction of justice.to the judge your laptop is just another lockbox: surrender the key or go to jail.

        If, rather than the files being stored on computer, they were on paper in filing cabinet but written in a code or cipher, would the judge be allowed to demand that the documents be decoded? Surely an encrypted document is much more like a paper document written in code than a locked safe? Encryption is not a container (to be opened) like a safe, but is like a code, cipher or a foreign (but not understood to the reader) language.

        • Encryption is not a container (to be opened) like a safe

          "To every lock there is a key..."

          I think a judge will see encryption as a container. It isn't uncommon for a Geek to speak of "wrapping" content in encryption.

  • So? (Score:5, Interesting)

    by Robber Baron ( 112304 ) on Saturday January 20, 2007 @06:01PM (#17697494) Homepage
    So keep your sensitive personal data on a server at home, where the protections against warrantless search and seizure are more clearly defined, and take with you on your laptop only what you need. Also there are all sorts of ways to remotely access your at-home data securely (DNS Forwarder/VPN, etc). That way your data is there when YOU need it and not sitting on your portable when you are crossing borders or sitting in your employer's office.
    I have made it quite clear to contractors that their laptops will be subject to scrutiny prior to their being permitted to access our corporate LAN, as well there my be periodic spot-checks, especially if I suspect that a laptop might have become infected with something nasty.
    • Re:So? (Score:4, Insightful)

      by E8086 ( 698978 ) on Saturday January 20, 2007 @06:58PM (#17697878)
      But there are still so many who fail to keep work out of the rest of their lives or the rest of their lives out of their work laptop. The article's author freely admints that her laptop was purchased by not her, possibly an employer. If it's not yours it's, well, not yours and anything no matter how personal you put on it is not yours. Unless you have some written agreement allowing all data stored on it to be your personal property, think lease, you don't own what's on it either. I've made it a point to NOT have a work laptop, or e-leash as it should be called as you may be expected to take it home and put in some late night or weekend unpaid time.
      If you have to have carry some personal data around with you, and/or don't happen to have a secure server at home, encrypt(and hidden file) it and stick it on the non-music/video area or notes folder of an ipod. They're far more common than linux running laptops and probably far less likely to create draw unwanted attention.

      airport/boarder/other security guard/storm trooper: what's that?
      you: my ipod
      guard: turn it on
      you: ok
      guard: looks good, these are not the droids we're looking for, move along

      Or it may remain unnoticed and unquestioned in your pocket
      • by grahammm ( 9083 ) *

        The article's author freely admints that her laptop was purchased by not her, possibly an employer. If it's not yours it's, well, not yours and anything no matter how personal you put on it is not yours.

        Why does that follow? Surely there is a distinction between the owner of the 'container' and the owner of the items stored in the container. In the same way that if you put your lunchbox in your desk drawer at work, you still own your own lunch and box. The location where an item (whether tangible or intangible) is stored (or located) does not affect its ownership.

      • Re: (Score:3, Informative)

        by humphrm ( 18130 )
        The article's author's presumptions are flawed, and the posters here (at least so far) are absolutely correct. There has never been a presumption of privacy in the workplace, and there has always been an exception for warrantless search and siezure at borders. That's been well known and upheld in the courts for years. So you decided to put your personal data on a company asset for which you know that no presumption of privacy exists, and that's the courts fault? Eh? How does that work, Jennifer? I fin
        • What you've got here is a deliberate attempt to muddy the waters of searching laptops... they're arguing is that you shouldn't worry about your work laptop being searched because it's not yours, and usually work disallows you from putting private data on there anyway. There's two problems with that. First, if it's a work laptop the TSA is searching, YOU are not the owner, especially if you are following the rules, what would you do with an encrypted volume or such work put on there to keep your email or c
    • So keep your sensitive personal data on a server at home, where the protections against warrantless search and seizure are more clearly defined, and take with you on your laptop only what you need.


      Or alternatively, keep your important stuff stored on a CompactFlash (or SmartMedia) card or whatever, and have that card "installed" in your digital camera.

  • Two words (Score:4, Insightful)

    by HangingChad ( 677530 ) on Saturday January 20, 2007 @06:04PM (#17697510) Homepage

    Disk encryption. You can get TrueCrypt for free and encrypt a partition with a hidden partition inside. Keep it on a USB drive or external hard drive. See you in about five years after the NSA's supercomputer has been trying to decrypt it.

    Of course, in the US today they'll probably just disappear you to GITMO while they work on it.

  • by cje ( 33931 ) on Saturday January 20, 2007 @06:08PM (#17697534) Homepage
    It doesn't matter if you're worried about a snooping government, script kiddies, nosy roommates or family members, or anybody else you don't want looking at your data. In this day and age, there really is no substitute for encryption, and there's also really no excuse to not be using it, given the amount of options (many of them free, as in speech and beer) available today. There's no reason to leave things like tax returns, sensitive work projects, etc. sitting out in the open.

    One of the best things that I've done recently is to wipe and randomize a 40-gig partition on one of my drives and set up a 256-bit AES-encrypted ext3 filesystem. Unless I enter my lengthy passphrase, there is no way to mount the volume, much less look at its contents. Barring some unforseen weakness in AES, this is now data that nobody but me will ever see (unless I do something silly like forget to unmount it).

    It is, in many ways, a brave new world, but people need to know that there are things they can do to protect themselves. This, of course, is not news to the Slashdot crowd, but it is something that the less-clueful public needs to hear about.
    • Re: (Score:3, Insightful)

      by Anonymous Coward
      Real option... are you really prepared for it? Let's say you're at the border with an encrypted partition. Are you hoping they won't notice the partition? Let's say they find it.

      Officer: What is this 40-gig partition here?

      You: I don't know, random junk.

      Officer: So you don't mind if we zero it?

      You: Don't do that! It's my personal files... encrypted.

      Officer: Please unlock it so we can take a look.

      You: No thanks. It's just my personal files anyway.

      Officer: You know, this is the equivalent of transporting a saf
      • Just out of curiosity, what rights does a non-American have when arriving at the border?
        • by elgaard ( 81259 )
          They have the right to go back home if they are not charged with anything.

          Which is a usefull option if e.g., you are entering a foreign country with a laptop full of your employers trade secrets.
        • Re: (Score:3, Interesting)

          by mrchaotica ( 681592 ) *

          Well, out of the Bill of Rights [cornell.edu], Amendments 1, 7, and 8 make absolute statements prohibiting certain acts of Congress (e.g. "Congress shall make no law..."); Amendments 2, 4, 9, and 10 refer to "the people" which could mean all people or 'the people of the United States' (i.e., citizens); and Amendments 5 and 6 use language referring to "no person" or "the accused," which can only mean that they apply to all people, not just citizens. (And for completeness, Amendment 3 would only be relevant for people who

      • Re: (Score:2, Insightful)

        by Anonymous Coward
        Correct answer: "I do not consent to warrantless searches of my papers and personal information."

        Like me, you should back up your laptop's encrypted partition daily. If they wipe the partition, you can get it back next time you're online. But the important thing in these searches is to put them on notice that you don't consent, because consenting, or failing to assert the opposite, will make an otherwise illegal search, legal. By putting them on notice, they run the risk of conducting an illegal search of

    • 1) password strength is important (and used only 1 thing)
      2) If they can HEAR you type it, they can guess it
      3) They can install a keyloggers of many kinds
      4) ENCRYPT YOUR SWAP FILE-- don't assume that memory is locked
      5) Encrypted swap implementation has to properly handle the keys
      6) You must be in control of the information, 3rd parties can give into probable cause
      7) Using a rare filesystem has gotten people off in some cases
      8) Beware of wireless keyboards
      9) Some forms of security without government back door
    • by GoofyBoy ( 44399 )
      >One of the best things that I've done recently is to wipe and randomize a 40-gig partition on one of my drives and set up a 256-bit AES-encrypted ext3 filesystem.

      Relax guy, its just pr0n. Trust me, everyone has a directory full of it. Just rename the directory "Taxes" and your mother will never be the wiser.

      Seriously, if someone really wanted to get at your data, once they realized you had an entire partition encrypted, they would keylog you to get the passphrase. Who has 40 gigs of personal data tha
    • Encrypt everything but /boot and use loop-aes with GPG, and put the key on a USB drive. If somebody demands that you decrypt, you accidentally drop the USB drive on the floor and step on it. Or flush it down the toilet. I don't expect this to protect my data from large governments that really want it, but it will probably make it enough of a hassle to ignore me if they are just being jerks and don't have a reason to believe that I actually committed a crime.
    • I hope you are also encrypting /swap and /tmp and pointing /usr/tmp and /var/tmp to /tmp, else your encrypted partition may well leak data elsewhere.
    • Re: (Score:3, Informative)

      by Technician ( 215283 )
      Barring some unforseen weakness in AES, this is now data that nobody but me will ever see (unless I do something silly like forget to unmount it).


      At home, the alarm drops power to the UPS which initiates a shutdown. Unexpected visitors while I am away auto lock sensitive data if I forget.
  • by pla ( 258480 ) on Saturday January 20, 2007 @06:10PM (#17697550) Journal
    or will not be adept at crafting a rule that gives enough leeway and guidance to law enforcement

    A perfectly good non-electronic equivalent situation already exists: Personal diaries.

    Would the readily-apparent evidence suffice to justify confiscating and reading someone's diary?

    If not, then stay the hell away from my laptop.
    • Would the readily-apparent evidence suffice to justify confiscating and reading someone's diary?

      The airport case [law.com] in question, you are screwed. The courts reasoned that searches at airports are routine, so just about anything goes. They should be ashamed of themselves. Until they come to their senses, I suggest you keep your diary, paper or electronic at home. The electronic one is easier to access, but you better move it around by ground transport.

      • Wow, I missed this one a few days back. [soonews.ca] It looks like the entire contents of your automobile, including your laptop, is fair game at the US Canada border.

        Once again, leave your data at home and get to it though password protected and encrypted network access.

      • Which is interesting because it seems to me that the entire TSA is basically unconstitutional. This is, I assume, one of the reasons the task was originally left to the airlines to perform: What would be a violation of the fourth amendment for the government to do is perfectly reasonable when stipulated as a condition of sale for a private entity.
      • Boot the laptop from a Linux CD. Encrypt the entire /dev/hda with a suitable key. Travel. Reach the destination. Boot from the CD again, decrypt /dev/hda. Optionally set and later unset the ATA password on the disk. Same approach can be used for sending data by mail or courier service.
    • Would the readily-apparent evidence suffice to justify confiscating and reading someone's diary?

      UK Immigration are known to do this. They'll even phone some of the numbers in it and ask questions if they want to test your story.

  • Story (Score:3, Funny)

    by eosp ( 885380 ) on Saturday January 20, 2007 @06:11PM (#17697556) Homepage
    My airport must really not like me. They not only said, "take your laptop out of its bag", they decided to say "turn it on". I did, flipped to FreeBSD, and as soon as they saw a command prompt they called in the dogs.
    • Re: (Score:2, Funny)

      by Anonymous Coward
      They called the dogs? What for? Whoever uses FreeBSD with a command line interface has clearly an extremely high pain threshold.
  • HA! (Score:2, Funny)

    by nickcoons ( 1053636 )
    "At that point, the Constitution may fail us, and we will have to turn to Congress to create rules that are better adapted for the information age."

    Is it possible to mod the article +1 Funny?
  • I didn't see anyone suggest a second hard drive, encrypted and not carried in the computer case?

    If you only have a 'test drive' in the laptop, they can look at it all they want. They would still have to find and recognize the other drive as well as the boot USB drive, and then ask for encryption keys ... that is if you don't immediately blame them for corrupting your data rather than admit it is encrypted...

    Just a thought...
  • whiny!!! (Score:4, Insightful)

    by AmigaAvenger ( 210519 ) on Saturday January 20, 2007 @06:40PM (#17697752) Journal
    wow, can she whine any more? Laptop is owned by her employer... It was bought for her use, NOT for her as a personal item. So now she gets her panties in a bunch when she realizes her employer has the right to do whatever they want with that computer. Guess what, it is theirs! Just because you scattered your useless garbage all over the HD doesn't make it yours. If you want privacy, buy a personal laptop, and then it becomes much, much harder for someone to take a look at it.
    • I agree.

      Moreover, it's simply not that hard to store one's personal data on a usb key which, these days, are more than large enough to store everything she's whining about. The problem is not that laws don't protect her, it's that she doesn't protect herself.
    • by elgaard ( 81259 )
      Read the artice.
      She is not worried about what her employer do, but what the government do.
    • Re: (Score:3, Insightful)

      by gstoddart ( 321705 )

      So now she gets her panties in a bunch when she realizes her employer has the right to do whatever they want with that computer.

      She's not really talking about her employer looking through the laptop. She's talking about law enforcement. If you'd RTFA, you'd find this paragraph on page 2:

      I hope for the best, as I do in United States v. Ziegler, the case that found private employees have no reasonable expectation of privacy in their workplace computers. Defense attorneys have asked for a rehearing, and the

  • by whoever57 ( 658626 ) on Saturday January 20, 2007 @06:44PM (#17697772) Journal
    Here is someone who could easily afford their own computer. She should keep her private data on her own computer, not her work computer. What's so hard to understand about that?

    Even if her own computer is too expensive for her, how much does a USB key cost these days? Combined with Firefox Portable and Thunderbird Portable (and others) this provides a simple and elegant solution.
  • Failed what? (Score:5, Insightful)

    by ScrewMaster ( 602015 ) on Saturday January 20, 2007 @06:44PM (#17697780)
    At that point, the Constitution may fail us, and we will have to turn to Congress to create rules that are better adapted for the information age.

    Nonsense. The Constitution hasn't "failed us", it is our commitment to honoring its provisions that has wavered. The Constitution is just as relevant and meaningful now as it was two centuries ago. Furthermore, I would argue that it is more important than ever that we observe Constitutional law and hold our elected (and unelected!) officials accountable for their deviances from it.

    So far as Congress crafting better rules for the Information Age is concerned ... I'd not hold your breath. When they passed the DMCA and the Patriot Act I lost all hope of Congress ever being willing or able to legislate us out of this mess, given that they're most of the reason that we're in it.
  • by Anonymous Coward
    He references a Court Decision in regards to an employee's expectation of privacy on the employers computer in which the court determined that the hardware was owned by the employer and provided for the employees use to the employers benefit. That's right the company owned the computer and the employee used it to fulfill their day2day job duties. During an internal investigation of either a harasment or other issue, they discovered the emoployee had downloaded and saved porn on their computer and fired them
  • "and we will have to turn to Congress to create rules that are better adapted for the information age"

    Oh that's good, tell another one!
  • by Anonymous Coward
    My laptop computer was purchased by Stanford, but my whole life is stored on it. ... In short, my computer is my most private possession. I have other things that are more dear, but no one item could tell you more about me than this machine.

    In short: you're an idiot and are abusing company property to meet your own personal demands. The company didn't provide you with that laptop to store your own personal life on it, the idea behind it was actually to make you more mobile while still having the access a
    • There is a new old trend to compile OSS applications with statically linked libraries, as a so called portable application, the way it used to be done on good old DOS, so that the application can run directly off a USB stick or CDROM. I use this method for personal schtuff - that which is inconvenient to access from my home server. The company machine has only company schtuff.
  • Rights (Score:2, Insightful)

    by turbofisk ( 602472 )
    Every time you talk rights with a US citizen they bash the Europeans for having no constitution which protects them... Well how does that do any good when the US government simply circumvents the constitution? Isn't it illegal, with the DMCA and all, to circumvent stuff? :-)
  • According to AG Gonzales, Americans not only don't have a right to privacy with regards to their laptops, we don't even have a right to habeas corpus. See the FireHose [slashdot.org] for my (rejected) story submission.

    Cheers,

    b&

  • All the more reason to keep your personal data encrypted on a server (or two) that you control, and log everyone to whom you give a copy of any of it.

    And all the more reason to pressure your state/local/Federal governments towards a Privacy Amendment to the (respective) Constitution. Which would reiterate the 4th Amendment (and implicit) rights to privacy in your "papers and effects". By requiring the government to protect your privacy by restricting copying/transmitting your personal data to only within th
    • Doesn't matter. People that don't grasp the importance of data privacy (which is, unfortunately, most of us) are easily swayed by the use of the T and C words. They're just too powerful ... no politician, however well-meaning, can stand up to them.
  • Contending that the contents of a company-owned laptop belong to the employee carrying it is nonsense. If you are using the company's computer, everything on it belongs to them. A company laptop can be searched by the company anytime, or by the police anytime the company permits it. If you don't like that, get your own.
    I worked Desktop Support in an environment where we were forbidden to say or write the letters "PC" because they stood for "Personal Computer:" we were required to describe computers as works
  • All of these issues are totally unrelated to laptops.

    A laptop purchased buy your employer is the property of your employer, not you. So if the government has a warrant(or reasonable cause) to search your employer's property they have the right to search your laptop(and they should have, or else every dodgy company in the world would keep all their financial records on laptops and make the government get hundreds of warrants to search it all). Don't keep private stuff on your company laptop!!! Buy your own,

  • My laptop is dual booting and the Linux partitions are encrypted, while the Windows partition is plain text. The border guards can search all they like on Windows...
  • by thorkyl ( 739500 ) on Saturday January 20, 2007 @09:14PM (#17698606)
    1 - Separate work and private laptops
            I carry mine to work and don't plug it into the network
            I don't use the work machine for any internet searches, I use my laptop through cell card

    2 - Separate your data sets
            Carry your sensitive data on something other than laptop
            I carry mine on a CD, they can't call that a bomb

    3 - If they want to search it...
            Ask "What exactly are you looking for?" and write down the answer!
            If they say its just a routine inspection let them look, don't let them open files
            If they want to see a file ask for the warrant
            If they insist ask (don't) demand to see a supervisor

    4 - Be nice, calm, and ask the supervisor to witness
            Any search (with understanding you are under protest) as there is no warrant.
            Ask the supervisor for a full accounting of all files opened/accessed prior to boot/power on
                    (this is critical as they cant log all files accessed during boot)

    5 - Best of all, don't give them a reason to search it
  • Doofus (Score:3, Insightful)

    by Spazmania ( 174582 ) on Sunday January 21, 2007 @01:37AM (#17699994) Homepage
    My laptop computer was purchased by Stanford, but my whole life is stored on it. [...] In short, my computer is my most private possession.

    If your most private possession is owned by someone else, the police are not even close to your worst worry.

    First, there are several new cases that suggest that agents can search computers at the border

    No, that's not accurate. The cases state that agents may make a search a requirement for crossing the border with the computer. You have the right to refuse the search and ship the computer back the way you came.

    Second, a recent case in the 9th U.S. Circuit Court of Appeals has held that private employees have no reasonable expectation of privacy

    This has been true since the country's inception. Nor is it difficult to understand: Its not the employee's office or the employee's computer. They're not even under contract to you the way an apartment or hotel room would be. These things belong to the employer and the employer has a right to grant a warrantless search of its posessions just as you have the right to permit the police to search your house if you so choose.

    The employer also has a right to refuse a warrantless search, you as you would of your posessions. The difference is: why would the employer want to? If you're breaking the law at work, they want to know about it just as much as the police do.
  • by McLuhanesque ( 176628 ) on Sunday January 21, 2007 @01:34PM (#17703556) Homepage
    The overwhelming response of the sysadmins, and many others, is, it's the employer's computer, therefore everything on it is available to the employer (ie. no expectation of privacy as confirmed by 9th Circuit). But there is another perspective that might be reasonably argued (Of course, IANAL; I am a media theory researcher and prof).

    If we consider that electronic stuff (hardware, software and data) as containers within containers, the hardware might be owned by the employer, and the employer might have a right to see what containers are placed on the hardware. However, many of those containers (files) might contain so-called intellectual property that belongs to the person herself. The employer has no right to that (leaving aside, for the moment, contracts in which the individual stupidly gives all IP rights to the employer, even for private, non-work-related, non-compensated creations). The mere fact of physical location does not give the employer the right of unwarranted search. For example, the person's purse happens to be located in the desk drawer of the employer-supplied desk, within the employer's office. The employer does not have the right to search the purse, nor take possession of its contents. By analogy, I would argue that the content of personal data files (not necessarily the wrapper that is the file structure itself) is off-limits to the employer.

    In short: the employer has the right (according to court ruling) to see the files on their property, but not necessarily the file content. The courts have not distinguished among respective ownerships of the hardware, the data structures, and the data contents. This distinction is something that will eventually be tested in court, I expect.

    Like other posters, I agree that the employer could demand immediate return of the laptop and the individual would lose all of her personal information, and therefore the person must assume that risk of loss, encryption or no encryption. And I use my own laptop for my work - the employer does not have the right to access my machine. If they want my work (which they do) they agree to my terms. Every so often I hear the dire warning of the IT department about not providing me support. But then again, I've had occasion to fix some of the messes on other users' computers that were "supported" by the IT department.

"The vast majority of successful major crimes against property are perpetrated by individuals abusing positions of trust." -- Lawrence Dalzell

Working...