Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Privacy Security Software United States Hardware Technology

Border Agents Fail To Delete Personal Data of Travelers After Electronic Searches, Watchdog Says (gizmodo.com) 89

The Department of Homeland Security's internal watchdog, known as the Office of the Inspector General (OIG) found that the majority of U.S. Customs and Border Protection (CBP) agents fail to delete the personal data they collect from travelers' devices. Last year alone, border agents searched through the electronic devices of more than 29,000 travelers coming into the country. "CBP officers sometimes upload personal data from those devices to Homeland Security servers by first transferring that data onto USB drives -- drives that are supposed to be deleted after every use," Gizmodo reports. From the report: Customs officials can conduct two kinds of electronic device searches at the border for anyone entering the country. The first is called a "basic" or "manual" search and involves the officer visually going through your phone, your computer or your tablet without transferring any data. The second is called an "advanced search" and allows the officer to transfer data from your device to DHS servers for inspection by running that data through its own software. Both searches are legal and don't require a warrant or even probable cause -- at least they don't according to DHS. It's that second kind of search, the "advanced" kind, where CBP has really been messing up and regularly leaving the personal data of travelers on USB drives.

According to the new report [PDF]: "[The Office of the Inspector General] physically inspected thumb drives at five ports of entry. At three of the five ports, we found thumb drives that contained information copied from past advanced searches, meaning the information had not been deleted after the searches were completed. Based on our physical inspection, as well as the lack of a written policy, it appears [Office of Field Operations] has not universally implemented the requirement to delete copied information, increasing the risk of unauthorized disclosure of travelers' data should thumb drives be lost or stolen."
The report also found that Customs officers "regularly failed to disconnect devices from the internet, potentially tainting any findings stored locally on the device." It also found that the officers had "inadequate supervision" to make sure they were following the rules. There's also a number of concerning redactions. For example, everything from what happens during an advanced search after someone crosses the border to the reason officials are allowed to conduct an advanced search at all has been redacted.
This discussion has been archived. No new comments can be posted.

Border Agents Fail To Delete Personal Data of Travelers After Electronic Searches, Watchdog Says

Comments Filter:
  • by fustakrakich ( 1673220 ) on Tuesday December 11, 2018 @06:48PM (#57789532) Journal

    Raise your hand if you didn't expect that one...

    The still untried solution awaits

    • by rtb61 ( 674572 ) on Tuesday December 11, 2018 @07:03PM (#57789612) Homepage

      Let's all guess why they are keeping it secret. I'll bet pretty much anything, that a bunch of customs agents where going through attractive women's photo albums and pilfering images used for sexting, oh yeah and doing it a lot.

      • Don't be so sexist... I'm sure there are plenty of gay TSA agents too!
      • It's a sad state of affairs as our worst tin hat paranoiac fantasies come true.

        Let this be a reminder that all those silly "privacy policies" out there are just as phony.

      • Let's all guess why they are keeping it secret. I'll bet pretty much anything, that a bunch of customs agents where going through attractive women's photo albums and pilfering images used for sexting, oh yeah and doing it a lot.

        Remember, these are the same people who steal the iphones and laptops from your checked baggage.

    • At least a couple of federal courts have ruled that Customs needs a warrant to search your computer or phone.
      • Good luck enforcing that when you're facing the TSA at an airport and want to get somewhere.

    • by gweihir ( 88907 )

      They have no accountability, they do not get punished whatever misdeeds they do, they have wayyyy too much power. Of course they would do this.

  • by bobbied ( 2522392 ) on Tuesday December 11, 2018 @06:51PM (#57789550)

    I'm surprised that two out of the five actually did delete the data.

    I wonder how much of this is "Quick Format" and "Hey we found old data here!" kind of things?

    But I think we buried the lead here. What really concerns me is that the documentation about the searches and why they where conducted is woefully lacking (see page 6 of the PDF). Seems that this process is ripe for abuse and that the controls in place for keeping this on the up and up are being ignored.

    Think of it this way.. IF nobody is documenting why and when this is being done, there is no real proof and no real way to get it to stop if it really is out of hand.

  • by Anonymous Coward

    The USA is actually hard copying data from travelers phones? Jesus I'm glad I stopped flying through the US 5 years ago.

    • by Anonymous Coward

      We're glad too.

  • by wolfheart111 ( 2496796 ) on Tuesday December 11, 2018 @07:00PM (#57789596)
    They can sell it :(
  • Well of course every hot chick is a potential security threat...

  • So... (Score:4, Interesting)

    by Locke2005 ( 849178 ) on Tuesday December 11, 2018 @07:16PM (#57789660)
    What's to stop you from removing the Micro SDHC card from your phone before the search? They're not getting their hands on MY MP3 files!
    • Re:So... (Score:5, Informative)

      by wonkey_monkey ( 2592601 ) on Tuesday December 11, 2018 @07:41PM (#57789746) Homepage

      What's to stop you encrypting your data and storing it somewhere on the internet instead of taking a physical copy through a checkpoint?

      If a terrorist wants to bomb a plane, he's going to need to smuggle a bomb past security, so checking people for bombs isn't exactly a stupid idea (whether the balance between safety, security, privacy, and theatrics is good is a whole different matter). But if he's got some "terrorist data" to move around, why would he physically carry it?

      • "But if he's got some "terrorist data" to move around, why would he physically carry it?"

        Because sneakernetting doesn't get you a JDAM visit in the middle of the night. Taliban used sneakernet for that very reason.

        The internet cannot ever be considered secure (let's not pretend otherwise) so using it is asking to get whacked.

    • by Anonymous Coward

      With wifi just about everywhere and the possibility of setting up VPN tunnels back to private storage, why is there any reason to keep anything on your phone at a border crossing? upload before crossing, Wipe the device, redownload once you're across.

  • So... (Score:5, Insightful)

    by TheDarkMaster ( 1292526 ) on Tuesday December 11, 2018 @08:44PM (#57790068)
    So the border guards can steal your data without having to give any explanation and without having to fear consequences. And I'm not talking about "MP3 files", I'm talking about company documents, tax documents, industrial documents, all sorts of perfectly legal information that is private property of a company or an individual.

    One more reason not to travel to the US, even to tourism.
    • by AHuxley ( 892839 )
      The US gov is not after "company documents, tax documents, industrial documents". The NSA/MI6/GCHQ/CIA can get all that for free in real time globally.

      The US gov wants a person to lie directly when asked a simple question.
      The US mil and its support in other nations already know who is entering the USA and what they did globally while on "holiday".
      The questions and search at the international border allows for people tracked globally by the US mil/CIA to be questioned as a very random "event".
      Such peop
    • by Anonymous Coward

      One more reason not to travel to the US, even to tourism.

      With dozens already to choose from, what's one more? Only a fool would willingly set foot in that sh!thole of a country.

    • And yet, there have been those on this site who argue that making a copy isn't "theft" because the owner isn't deprived of their copy.

      In this case, for foreigners with sensitive business documents, the CIA and NSA would be seriously remiss in their duties if they didn't try to mine such info at every opportunity and analyse it 6 ways from Sunday to give the US any edge in security (and lets be honest, any edge in prosperity too)

      Terrorists, at least, tech savvy terrorists, wouldn't have sensitive data on

      • And yet, there have been those on this site who argue that making a copy isn't "theft" because the owner isn't deprived of their copy.

        That's because it isn't theft. Theft is where you take someone from someone and they are subsequently deprived of it. Copying someone's data without their permission is not theft, it is violation of copyright. We have an entire separate body of law for copyright specifically because it is different from theft. Were it otherwise, we could simply have different sentencing guidelines under the existing laws governing theft to cover theft of data. But it isn't, so we don't, because you can't.

  • Why should they? They do whatever the hell they want. Who's going to stop them? Who's going to jail?
  • by pipedwho ( 1174327 ) on Tuesday December 11, 2018 @10:15PM (#57790406)

    So let me get this straight.

    Some random customs officer takes a USB stick and puts it into someones laptop. A laptop with total control of its own I/O systems, peripheral ports, and software execution environment. Maybe they try to run some custom software that exists on the USB stick. Maybe they try to boot your machine off their USB stick, or have it somehow run something from the USB stick before you host OS takes control.

    Then they take out the USB stick, hopefully wipe it off, and put it into someone else's laptop and do the same thing?

    And they think this is a good idea?

    I'll leave it up to the reader to see if they can find the problem with this.

    • I'd assume that a machine CBP touched should be immediately destroyed. I have no faith that they haven't installed something or that they may have made security mistakes that allowed the machine to be compromised. I'd probably tell them to keep it.

      • by Anonymous Coward

        I've heard from security folks that standing policy for Dutch govt. Officials is to only use disposable devices when going into China any Russia. I think they've extended that to the USA. For the EU defense industry the US was already off limits for hardware across the border after a few incidents in the late 90's.

        If I ever travel to the USA or China, my phone will be clean. Facebook... I will close it soon. Have to go to China next year and they also like to grab a copy of your info.

        Twitter is no problem.

  • I wonder if the private data coming from the device of an attractive woman makes any change to the odds of it being "accidentally" left on the USB? A local tech shop has had to fire a few employees over the years because they would make a point of skimming through the hard drives of attractive women, hoping to score some nude selfies.

    Plus, is anyone making sure that these thumb drives aren't growing legs? The DHS doesn't have a good track record there. There has been apparently a lot of cases of valuables

  • I don't travel often and generally refuse to fly when I do, seeing how air travel has devolved to treating passengers like livestock over the past couple decades. Is there even a "safe" way to travel in and out of the U.S. with any devices (laptops, cellphones) at all? Seems one would be better served by carrying *nothing*, and procuring necessary (disposable) devices when at destination, and discarding them before return trip. If I have nothing on me or in my luggage that has digital content at all, the

Marvelous! The super-user's going to boot me! What a finely tuned response to the situation!

Working...