Laptop searches at border might get restricted

Monday, 8 December 2008, 4:37 PM EST

Mohamed Shommo, an engineer for Cisco, travels overseas several times a year for work, so he is accustomed to opening his bags for border inspections upon returning to the U.S. But in recent years, these inspections have gone much deeper than his luggage.

Border agents have scrutinized family pictures on Shommo's digital camera, examined Koranic verses and other audio files on his iPod and even looked up Google keyword searches he had typed into his company laptop.

At Wired.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //