Thursday, February 09, 2017

If United States asks foreigners for their passwords, American travelers may face the same

WASHINGTON --   Privacy advocates voiced indignation Thursday at a White House plan to demand that some visa-bearing foreign travelers to the United States provide officials the passwords to their social media accounts and turn over their cellphones to be searched.

The advocates said the plan was unlikely to deter terrorists and might be turned on Americans traveling abroad.

“If we adopt it, other countries are going to adopt it,” said David Kaye, a law professor at the University of California at Irvine. “Americans who travel better be prepared to provide this to other governments.”

Homeland Security Secretary John Kelly laid out the proposal this week on Capitol Hill and again in an interview with National Public Radio that aired on Thursday.

Under the plan, Kelly said, border agents would ask visitors “to give us a list of websites that they visit and the passwords to get on those websites to see what they’re looking at.” Agents would also examine “what they tweet, cellphones, cellphone conversations or cellphone contact books to where we can run them against databases: telephone numbers, people, names.”

To start with, Kelly said, the proposal would be aimed at visitors from the seven nations named in a 90-day travel ban that President Donald Trump set in a Jan. 27 executive order. Those majority-Muslim countries are Iran, Iraq, Libya, Somalia, Sudan, Syria and Yemen. He added that the program “could be” expanded.

“This is security theater. This isn’t actually going to help,” said Nuala O’Connor, a former Department of Homeland Security official who now heads the Center for Democracy & Technology, a civil liberties and privacy group headquartered in Washington.

O’Connor called the proposal “outrageous” and said it was a “sledgehammer response to the San Bernardino terrorist attack” in late 2015 in which 14 people were slain at a holiday party in that Southern California city.

“The theory of the case is, if we could see everybody’s Facebook profiles and LinkedIn profiles and Twitter accounts – both public and private postings – in theory the country could have prevented San Bernardino,” O’Connor said, noting that one of the two assailants, Pakistani-born Tashfeen Malik, is believed to have posted jihadist rants on Facebook before taking part in the terrorist shooting.

“That is totally flawed,” said O’Connor, who served as the chief privacy officer at DHS from 2003 until 2005 under President George W. Bush. “First off, we don’t have enough translators to read all that stuff.”

It’s kind of the equivalent of asking everyone to take off our shoes at the airport because of the shoe bomber. Nuala O’Connor, former Homeland Security official

“It’s kind of the equivalent of asking everyone to take off our shoes at the airport because of the shoe bomber,” O’Connor said, referring to the 2001 case of Richard Reid, a British Muslim who tried but failed to set off a bomb in his shoes on a flight from Paris to Miami.

Questions about the social media activity of foreign travelers began under the Obama administration. Since December, DHS has asked visitors from 38 countries – including European Union nations – that usually travel visa-free to the United States to fill out an online form that has an optional listing of social media used by the traveler.

In a drop-down menu, the form lists 13 social media platforms, including Facebook, Twitter, YouTube, Flickr and LinkedIn but also Vkontakte – used primarily by Russian speakers – and GitHub, popular among programmers. Travelers are asked to provide their user names.

The Trump administration has not outlined how it would store or analyze the information it would collect under the broader policy.

The proposal lit up social media around the world, and one activist said he feared that the information repository of traveler data could become vulnerable.

“From what I heard, when you give up your phone to Homeland Security, they download the contents,” said Jamal Dajani, a journalist, Middle East analyst and founder of Arab Talk Radio, a program based in San Francisco. “Where does that content go to? Where is it kept? How safe? Is it encrypted?”

He noted that U.S. government entities have been hacked by Russia, China and other nations, and that information in the hands of the government is not necessarily safe.

Kaye, who also is serving a three-year term as the United Nations global special rapporteur for freedom of expression, called the plan to search the cellphones of visitors a “disproportionate intrusion into privacy.”

“Everything we do, everything we are, everybody we know, is on our phone. And so if we’re demanding that people provide that to government, we’re opening ourselves up to all kinds of intrusion,” Kaye said.

Travelers from countries in disfavor are likely to respond in a certain way, Kaye said.

“They may not bring their devices, and they could certainly say they are not on social media,” Kaye said. If other governments began demanding the same of Americans, he added, travelers may respond as they do when traveling to China, which already practices deep control of people’s digital lives, foreigners and Chinese alike.

“If you’re going to China, and you are really concerned about maintaining your privacy and your contacts, you leave your phone, your tablet, your computer at home,” Kaye said.

Kaye said he was not given to “slippery slope” arguments but found it difficult not to make one with the latest proposal.

“If we’re doing this at the border, what’s the argument for stopping there? Why not continue on with domestic travel?” Kaye asked.

Source: http://www.myrtlebeachonline.com

1 comment:

  1. In my mind the simplest thing to avoid privacy complaints is for those who do not want to be searched etc. is to avoid traveling to/from the US altogether.

    You come to the US with no traceable track record then you play by our strictest rules, take it or leave it.

    You leave the US with no traceable track record then you play by their strictect rules, take it or leave it.

    Its a two-way street.




    ReplyDelete