US Ninth Circuit says forensic laptop searches at the border without suspicion are unconstitional

An en banc (all the judges together) decision from the 9th Circuit has affirmed that you have the right to expect that your laptop and other devices will not be forensically examined without suspicion at the US border. It’s the first time that a US court has upheld electronic privacy rights at the border, and the court also said that using an encrypted device that can’t be casually searched is not grounds for suspicion. The judges also note that the prevalence of cloud computing means that searching at the border gives cops access to servers located all over the world. At TechDirt, Mike Masnick has some great analysis of this welcome turn of events: The ruling is pretty careful to strike the right balance on the issues. It notes that a cursory review at the border is reasonable: Officer Alvarado turned on the devices and opened and viewed image files while the Cottermans waited to enter the country. It was, in principle, akin to the search in Seljan, where we concluded that a suspicionless cursory scan of a package in international transit was not unreasonable. But going deeper raises more questions. Looking stuff over, no problem. Performing a forensic analysis? That goes too far and triggers the 4th Amendment. They note that the location of the search is meaningless to this analysis (the actual search happened 170 miles inside the country after the laptop was sent by border agents to somewhere else for analysis). So it’s still a border search, but that border search requires a 4th Amendment analysis, according to the court. It is the comprehensive and intrusive nature of a forensic examination—not the location of the examination—that is the key factor triggering the requirement of reasonable suspicion here…. Notwithstanding a traveler’s diminished expectation of privacy at the border, the search is still measured against the Fourth Amendment’s reasonableness requirement, which considers the nature and scope of the search. Significantly, the Supreme Court has recognized that the “dignity and privacy interests of the person being searched” at the border will on occasion demand “some level of suspicion in the case of highly intrusive searches of the person.” Flores-Montano, 541 U.S. at 152. Likewise, the Court has explained that “some searches of property are so destructive,” “particularly offensive,” or overly intrusive in the manner in which they are carried out as to require particularized suspicion. Id. at 152, 154 n.2, 155–56; Montoya de Hernandez, 473 U.S. at 541. The Court has never defined the precise dimensions of a reasonable border search, instead pointing to the necessity of a case-by-case analysis…. The court is led by Chief Judge Alex Kozinski, who is a fan of my book Little Brother (which features a scene where DHS officials force a suspect to decrypt his devices, on the grounds that his encryption itself is suspicious), and was kind enough to write me a blurb for the new edition of the book. I’m not saying that Little Brother inspired Kozinski to issue this decision, but I’m delighted to discover that something I’ve been pushing through fiction since 2008 has made it into law in 2013. 9th Circuit Appeals Court: 4th Amendment Applies At The Border; Also: Password Protected Files Shouldn’t Arouse Suspicion

View the original here:
US Ninth Circuit says forensic laptop searches at the border without suspicion are unconstitional

How an algorithm came up with Amazon’s KEEP CALM AND RAPE A LOT t-shirt

You may have heard that Amazon is selling a “KEEP CALM AND RAPE A LOT” t-shirt. How did such a thing come to pass? Well, as Pete Ashton explains, this is a weird outcome of an automated algorithm that just tries random variations on “KEEP CALM AND,” offering them for sale in Amazon’s third-party marketplace and printing them on demand if any of them manage to find a buyer. The t-shirts are created by an algorithm. The word “algorithm” is a little scary to some people because they don’t know what it means. It’s basically a process automated by a computer programme, sometimes simple, sometimes complex as hell. Amazon’s recommendations are powered by an algorithm. They look at what you’ve been browsing and buying, find patterns in that behaviour and show you things the algorithm things you might like to buy. Amazons algorithms are very complex and powerful, which is why they work. The algorithm that creates these t-shirts is not complex or powerful. This is how I expect it works. 1) Start a sentence with the words KEEP CALM AND. 2) Pick a word from this long list of verbs. Any word will do. Don’t worry, I’m sure they’re all fine. 3) Finish the sentence with one of the following: OFF, THEM, IF, THEM or US. 4) Lay these words out in the classic Keep Calm style. 5) Create a mockup jpeg of a t-shirt. 6) Submit the design to Amazon using our boilerplate t-shirt description. 7) Go back to 1 and start again. There are currently 529,493 Solid Gold Bomb clothing items on Amazon. Assuming they survive this and don’t get shitcanned by Amazon I wouldn’t be at all surprised if they top a million in a few months. It costs nothing to create the design, nothing to submit it to Amazon and nothing for Amazon to host the product. If no-one buys it then the total cost of the experiment is effectively zero. But if the algorithm stumbles upon something special, something that is both unique and funny and actually sells, then everyone makes money. Dictionary + algorithm + PoD t-shirt printer + lucrative meme = rape t-shirts on Amazon

Continue Reading:
How an algorithm came up with Amazon’s KEEP CALM AND RAPE A LOT t-shirt

Dial-up handshaking illustrated

Oona Räisänen has written a thorough and engrossing article about the noises emitted by dial-up modems while they connect and handshake, and the accompanying graphic (ZOMG HUGE) is nothing short of spectacular. It would make a great full-size poster — maybe a framed art-print. Now the modems must address the problem of echo suppression. When humans talk, only one of them is usually talking while the other one listens. The telephone network exploits this fact and temporarily silences the return channel to suppress any confusing echoes of the talker’s own voice. Modems don’t like this at all, as they can very well talk at the same time (it’s called full-duplex). The answering modem now puts on a special answer tone that will disable any echo suppression circuits on the line. The tone also has periodic “snaps” (180° phase transitions) that aim to disable yet another type of circuit called echo canceller. Now the modems will list their supported modulation modes and try to find one that both know. They also probe the line with test tones to see how it responds to tones of different frequencies, and how much it attenuates the signal. They exchange their test results and decide a speed that is suitable for the line. After this, the modems will go to scrambled data. They put their data through a special scrambling formula before transmission to make its power distribution more even and to make sure there are no patterns that are suboptimal for transfer. They listen to each other sending a series of binary 1’s and adjust their equalizers to optimally shape the incoming signal. The sound of the dialup, pictured ( via JWZ )

Read more here:
Dial-up handshaking illustrated