Thursday, October 10, 2013

How to Keep Border Guards From Reading Your Laptop



Did you know that U.S. immigration agents can seize your laptop, cellphone, digital camera and any other electronic devices at the U.S. border, no justification required?



The U.S. government's ability to search citizens at the border without a warrant is nothing new -- it dates back to the 1977 Supreme Court ruling in United States v. Ramsey. But as digital technologies become more prevalent, this so-called "exception to the Fourth Amendment" has come under renewed scrutiny.



"The problem is, now people bring with them a lot more stuff — not physically, but digitally," said Hanni Fakhoury, a staff attorney at the Electronic Frontier Foundation, a nonprofit digital rights group based in San Francisco.



"Computers, cellphones, tablets have lots of information," Fakhoury said. "The issue becomes: Do the prior justifications of a broad searching authority still extend to [the contents of] digital devices?"



MORE: 7 Computer-Security Fixes to Make Right Now



The answer to that question remains unclear. For now, there's no way you can prevent the feds from getting the gadgets if they want them — but you can make sure none of your sensitive data can be read.



Of course, the No. 1 way to safeguard your digital privacy is to not bring any digital devices with you to the border. But for many people, going without laptops and mobile phones is just not an option.



Here are some suggestions for what you can do to keep your sensitive data close to hand, but safe from prying eyes.



Bring a clean computer to the border



If you have the cash to burn, you can buy a cheap laptop or tablet to bring with you across the border. Then, before you leave on your trip, put all the documents and accounts you'll need in a secure cloud storage system.



Google Docs works, but you can also consider more secure cloud storage options such as SpiderOak, as well as the cloud-encryption software BoxCryptor.



So long as you're careful not to store any documents from the cloud onto your computer, you're not technically bringing any data to the border.



MORE: 13 Security and Privacy Tips for the Truly Paranoid



There's another way to bring a clean computer to the border: Wipe your own. But before you do, purchase an external hard drive and use it to create an image backup of your computer.



After that, you'll need to securely wipe everything on your laptop. You can do this by going into your computer's control panel and doing a factory reset, or you can install a whole new operating system on your computer, which will overwrite all of your computer's contents.



Leave the external hard drive at home, and take your newly blank laptop with you to the border.  Once you get home, you can copy your hard drive's contents back onto your laptop and get back to work.



These methods are expensive, as they require spending at least a hundred dollars for a good external hard drive, or even more for a laptop that you'll rarely use.



The advantage is that if a border agent requests to view your device, you can comply without worrying about your privacy. This might also be the way to go if you're particularly eager to avoid a confrontation at the border.



The Fifth Amendment right against self-incrimination does protect you from having to hand over your password, even at the border. Yet many people feel uncomfortable saying "no" to a federal official. If the only devices you bring to the border are clean, even handing over your password won't compromise your data.



Encrypt your data



Another option is to encrypt the data on your devices. This will take more time than purchasing a whole new device, especially if you're new to encryption. But it's not too difficult once you've gotten the hang of it, and you can encrypt your data with the same secure algorithms used by the military without spending a dollar.



On your computer, programs such as the free open-source program TrueCrypt can encrypt a few of your documents, or even your entire hard drive. The only way to see your data is to enter a password.



MORE: 13 Free Software That Encrypt Your Data



TrueCrypt also has a feature that lets you create a decoy password, so that you cannot only lock your data up, but also hide it away in what's called a "hidden volume."



Think of it as a box within a box — the only difference is that anyone looking in the outer box won't be able to tell that the inner box is there.



If someone demands access to your encrypted files, you can give them the password to the outer box, or volume, and they'll be able to see any documents you chose to store in that area.



However, they won't even know that your truly sensitive data is stored in a second layer of encryption.



For your part, you can access the hidden volume by entering the hidden volume's password instead of the outer volume's. In this way, the outer volume, and the outer volume password, are merely dummies you can surrender to others so that it seems like you're complying.



Just remember to choose a secure password, preferably more than 10 random characters in length. You can also use a passphrase, such as a sentence or verse, so long as it's more than 50 characters in length.



You may be wondering: Does encryption make you look more suspicious to border agents and other security personnel?



The official answer is no. According to the Supreme Court case United States v. Cotterman, which ruled that border inspectors need to prove "reasonable suspicion" before conducting a forensic test on a seized device, encryption alone is not to be considered suspicious.



Unofficially, however, Fakhoury says that "the government takes the position that [encryption] is a sign of someone trying to hide something."



Some of the documents leaked by former National Security Agency contractor Edward Snowden, for example, suggest that intelligence agencies pay extra attention to encrypted communications, and that a legal loophole allows the agencies to store these encrypted communications for a longer period of time.  



So if you take a computer with encrypted documents across the border, you should prepare to spend some extra time in customs, as you might find yourself being detained.



You don't have to give up your password or passphrase, but if you'd like to avoid the stress and hassle entirely, extensive encryption might not be your best option.



Computers aren't the only data storage devices you have to worry about at the border. Nowadays, it's possible to go without your laptop for a few days. But your mobile phone? Not so much.



Most phones contain contacts, emails, banking and credit card info from shopping apps, location-based data and tracking information, photos and more.



Despite this wealth of sensitive data, there are some challenges to secure storage on a mobile phone, challenges that don't exist with computers. For one, it's more difficult to truly delete files on a mobile phone.



If you're a customer of T-Mobile or AT&T, or any other carrier that uses the international Global System for Mobile Communications (GSM) standard, you can buy a cheap phone and move your SIM card into it.



That way, you can leave your data-rich phone at home and people will still be able to contact you using your existing number.



If you put a passcode on an iPhone, the device will also encrypt its data using that passcode as the key, thus adding another layer of security.



If you have an Android smartphone you can use the "Encrypt Phone" feature to secure your data. There are also several apps that provide strong additional encryption, such as "SSE-Universal Encryption App" and "WhisperCore."



You can also use encrypted messaging services like Wickr and Silent Text that can securely delete messages soon after they're sent.



For an excellent comprehensive guide to the legal and practical considerations of crossing the U.S. border, check out the Electronic Frontier Foundation's PDF "Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices."



This story was provided by Tom's Guide, a sister site to LiveScience. Email jscharr@techmedianetwork.com or follow her @JillScharr. Follow us @TomsGuide, on Facebook and on Google+. Originally published on Tom's Guide.



Copyright 2013 LiveScience, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Source: http://news.yahoo.com/keep-border-guards-reading-laptop-215203560.html
Tags: Cressida Bonas   amber alert   breast cancer awareness   oarfish   Maria Mitchell  

Saturday, July 20, 2013

Soccer-Barcelona coach Vilanova to step down - reports

MADRID, July 19 (Reuters) - Barcelona coach Tito Vilanova is to step down due to ill health, Sport, El Mundo Deportivo and other Spanish media reported on Friday, without identifying the source of their information.

Vilanova, 44, has been battling throat cancer for the past couple of years and spent two months having treatment in New York last season.

Barca president Sandro Rosell and sporting director Andoni Zubizarreta are due to hold a news conference at 1830 GMT on Friday. (Writing by by Iain Rogers in Madrid, editing by Alison Wildey)

Source: http://news.yahoo.com/blank-headline-received-160305154.html

martin luther king jr quotes Inauguration 2013 Tony Gonzalez Richard Blanco Anna Burns Welker Martin Luther King, Jr. Mlk Quotes

Ryan Gosling's 'Only God Forgives': The Reviews Are In!

Critics aren't forgiving of director Nicolas Winding Refn's 'Drive' follow-up.
By Amy Wilkinson

Source: http://www.mtv.com/news/articles/1710851/ryan-gosling-only-god-forgives-reviews.jhtml

cooking a turkey toysrus how to carve a turkey ipad 2 wal mart happy thanksgiving Macys Thanksgiving Day Parade 2012

Friday, July 19, 2013

'I'll take care of it': Bulger strangled Boston woman, ex-crony testifies

David Boeri

Surveillance footage of James "Whitey" Bulger, left and his partner Stephen Flemmi outside Bulger's home in an undated photo.

Courtesy Steve Davis

Debra Davis was murdered in 1981. In court on Friday, her former boyfriend, Stephen Flemmi testified that James "Whitey" Bulger strangled her.

By Tracy Connor, Staff Writer, NBC News

As James "Whitey" Bulger stewed at the defense table, his former partner in crime took the witness stand Friday and portrayed him as a rat and a lady-killer.

In chilling detail, Boston gangster Stephen "The Rifleman" Flemmi described how Bulger allegedly orchestrated and carried out the murder of Flemmi's girlfriend ? strangling her with his bare hands as he dragged her down a flight of stairs and making Flemmi dig a riverbank grave.

Flemmi, 79, who is serving life after admitting to 10 murders, said he didn't want to kill Debra Davis but Bulger thought she was a distraction and knew too much about the Winter Hill Gang's relationship with corrupt FBI agents.

One night in 1981, Bulger had him bring the 26-year-old Davis to an empty house in South Boston.

"She walked in the entrance and he grabbed her by the neck," Flemmi said.


Bulger knew his right-hand man couldn't bring himself to do the deed.

"I'll take care of it," Bulger supposedly told Flemmi.

He grabbed Davis around the throat "and strangled her," continuing to choke her as he took her down the stairs to the basement, Flemmi said.

Flemmi told the court he wrapped his dead girlfriend in a tarp and when it got dark, he and Bulger went to the Neponsit River with the corpse and shovels.

Bulger, he said, sat and watched while he dug the hole.

Boston Police Dept.; FBI via AP

Booking photos of Stephen "The Rifleman" Flemmi and James "Whitey" Bulger.

Flemmi said he would be affected by his mistress' fate "until the day I die." At least one juror shed tears as he testified, the Boston Herald reported.

Davis' brother, Steve Davis, said he wanted to "lash out" during the testimony but didn't want to get thrown out of court like he did in 2003 when Flemmi pleaded guilty.

"It's been like throwing salt on an open wound," he said of the courtroom discussion of his sister. "I'm tired of it. I just want this case to end."

The tale of Davis's death capped a day of testimony from Flemmi that spanned decades and included stories of 1960s gangland figures with nicknames like Punchy, Wimpy and Suitcase.

In quick succession, he recounted murder after murder, including the 1975 slaying of loose-lipped tavern owner Edward Connors. He said Bulger emptied a double-barreled shotgun and a pistol on a phone booth where Connors was cornered and that he also fired.

U.S. Attorney's Office of Massachusetts via Reuters

Bar owner Eddie Connors' body is shown lying in a phone booth after a 1975 shooting allegedly carried out by James "Whitey" Bulger.

??We just stepped out from the side of the building ? the garage ? and shot him,?? Flemmi said. ??We just fired on him.??

After Flemmi first took the stand Thursday afternoon for just 15 minutes, he and Bulger traded hard stares and angry remarks. There were no fireworks Friday, but reporters tweeted that Bulger, 83, appeared flushed with controlled anger as Flemmi wrapped up his testimony.

Bulger, who spent 16 years on the lam before being nabbed in 2011, has reportedly insisted that he would never kill a woman ? although he's charged with the murder of two, including Davis.

He's also infuriated by any suggestion that he was a government informant who ratted out mobsters in exchange for protection from rogue law-enforcement agents.

Flemmi ? who was transferred to a more comfortable prison and escaped the death penalty as part of his cooperation agreement with the feds ? said he heard Bulger give information to crooked FBI agent John Connolly hundreds of times.

"Who did most of the talking at these meetings?" prosecutor Fred Wyshak asked.

"James Bulger," Flemmi said.

The Associated Press and Reuters contributed to this report.

?

?

Source: http://feeds.nbcnews.com/c/35002/f/663306/s/2ee8c26d/l/0Lusnews0Bnbcnews0N0C0Inews0C20A130C0A70C190C19560A6190Eill0Etake0Ecare0Eof0Eit0Ebulger0Estrangled0Eboston0Ewoman0Eex0Ecrony0Etestifies0Dlite/story01.htm

London 2012 closing ceremony Shark Week 2012 UFC 150 Caster Semenya Medal Count 2012 Olympics victoria beckham London 2012 rhythmic gymnastics

How These Simple Scimitar Winglets Make the 737 a Whole New Plane

How These Simple Scimitar Winglets Make the 737 a Whole New Plane

In what will be its first widespread commercial use, Split Scimitar Winglets have officially been giving the go-ahead to grace United Boeing 737-800s all across the country. While winglets themselves are nothing new, this more aerodynamic incarnation should cut fuel costs by 2%?in other words, pushing their total winglet-related savings to $200 million.

Read more...

Source: http://gizmodo.com/how-these-simple-scimitar-winglets-make-the-737-a-whole-837341873

greystone sidney crosby at the drive in alternative minimum tax modeselektor gran torino gloria steinem

Thursday, July 18, 2013

Google Play Music All Access extends to New Zealand and Australia


Google Play Music All Access extends to New Zealand and Australia

When Google Music received the huge improvement of All Access unlimited streaming of music to take on Pandora and Spotify, many were sad to hear it was only for the US. Google?s just pushed Music All Access and Google Play Books to multiple new regions and countries and figured a quick shout out was in order.

Screen-Shot-2013-05-29-at-3.55.04-PM-540x383

Google Play Music All Access is the biggest news here, as it?s no longer a US exclusive. While big markets are still waiting for it, as I?m sure Google?s hard at work dealing with record labels, All Access can now be enjoyed in New Zealand and Australia. Down under can enjoy some classic tunes Google style.

According to a Google Support Page we can expect more regions in the future, but sadly have nothing to announce. Google Music is my new go-to music option, and I?ve since uninstalled Rdio and Spotify so the few new areas should be happy to give it a try. Too bad the discounted trial ended in June, and now you?ll be charged $9.99 per month for unlimited music.

Then according to Google multiple countries should now be seeing Google Play Books in their market on devices and the web. According to what we?re hearing Books are now in places like Romania, the Netherlands, Czech Republic, Denmark, Greece and even Hungary. Oh and we almost forgot Poland and Finland both have access now too. Hopefully Google Music reaches more locations soon, and we?ll report once we learn anything else.

', enableHover: false, enableTracking: true, buttons: { twitter: {via: 'androids'}}, click: function(api, options){ api.simulateClick(); api.openPopup('twitter'); } }); jQuery('#facebook').sharrre({ share: { facebook: true }, template: '

{total}

', enableHover: false, enableTracking: true, click: function(api, options){ api.simulateClick(); api.openPopup('facebook'); } }); jQuery('#googleplus').sharrre({ share: { googlePlus: true }, template: '

{total}

', enableHover: false, enableTracking: true, urlCurl: 'http://androidcommunity.com/wp-content/themes/ac/js/sharrre.php', click: function(api, options){ api.simulateClick(); api.openPopup('googlePlus'); } }); });

Source: http://androidcommunity.com/google-play-music-all-access-extends-to-new-zealand-and-australia-20130718/

solicitor general neighborhood watch dodgers sale tami roman jetblue captain los angeles dodgers christie brinkley

Vicki Gunvalson & Brooks Ayers Involved In Testy Twitter Beef With Users Over Deadbeat Dad Past

A big swirling bucket of the latest rumors, celebrity news and Hollywood gossip. The premier celebrity gossip app.

Gossip Bucket

Gossip Bucket aggregates and streams the latest gossip news and headlines from the top sources in one place.


Follow

Source: http://gossipbucket.com/radar-online/285233/vicki-gunvalson-brooks-ayers-involved-in-testy-twitter-beef-with-users-over-deadbeat-dad-past/

lionel richie kenny rogers avatar the last airbender david wright cory booker cubs cj wilson