{"id":184519,"date":"2017-03-23T13:32:21","date_gmt":"2017-03-23T17:32:21","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-bill-of-rights-at-the-border-the-first-amendment-and-the-right-eff\/"},"modified":"2017-03-23T13:32:21","modified_gmt":"2017-03-23T17:32:21","slug":"the-bill-of-rights-at-the-border-the-first-amendment-and-the-right-eff","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/first-amendment-2\/the-bill-of-rights-at-the-border-the-first-amendment-and-the-right-eff\/","title":{"rendered":"The Bill of Rights at The Border: The First Amendment and the Right &#8230; &#8211; EFF"},"content":{"rendered":"<p><p>    The U.S. border has been     thrown into the spotlight these last few months, with    border agents detaining travelers for hours, demanding    travelers     unlock devices, and even     demanding passwords and social media handles as a    prerequisite for certain travelers entering the country. As the    U.S. government issues a dizzying array of     new rules and     regulations, people in the U.S. and abroad are asking: are    there meaningful constitutional limits on the ability of border    agents to seize and search the data on your electronic devices    and in the cloud?  <\/p>\n<p>    The answer is: Yes. As well explain in a series of posts on    the Bill of Rights at the border and discuss in detail in our        border search guide, border agents and their activities are    not exempt from constitutional scrutiny.  <\/p>\n<p>    In this first post, well focus on the First Amendment.  <\/p>\n<p>    The First Amendment is meant to safeguard five fundamental    rights: speech, assembly, religion, press, and petition to the    government for redress of grievances. The First Amendment also    protects the right to exercise these basic rights anonymously    because, as Supreme Court Justice John Paul Stevens     wrote:  <\/p>\n<p>    But when border agents scrutinize the massive volume of    sensitive information in our digital devices or in the cloud,    they infringe on First Amendment rights in at least four    distinct ways.  <\/p>\n<p>    Border searches of our digital devices and cloud data thus    implicate core free speech rights. Therefore, border agents    should at least be required to obtain a warrant supported by    probable cause before any such search of our private digital    information.  <\/p>\n<p>    Indeed, the First Amendment requires even more. For example,    when police officers demand purchasing records from booksellers    (implicating the right to access information anonymously), the    First Amendment requires not only probable cause, but a        compelling need, the     exhaustion of less restrictive investigative methods, and a    substantial nexus between the information sought and the    investigation. Given that a digital device search is far more    invasive upon First Amendment rights than disclosure of what    books a person buys at a single bookseller, border agents    should be required to do the same.  <\/p>\n<p>    And the government should take special care with respect to    journalists. The     Privacy Protection Act prohibits the government from    searching or seizing a journalists materials without probable    cause that the journalist has committed a crime. While    the statute    exempts border searches for the purpose of enforcing the    customs laws, it does not exempt border searches for    other purposes, such as a criminal investigation.  <\/p>\n<p>    Unfortunately, so far,     courts have refused to recognize the     free speech implications of digital border searches. But we    hope and expect that will change as courts are forced to weigh    the increasing amount of sensitive information easily    accessible on our devices and in the cloud, and the increasing    frequency and scope of border searches of this information.  <\/p>\n<p>    Without First Amendment protections at the border, the threat    of self-censorship looms large. Travelers faced with the risk    of border agent intrusion into such sensitive data are more    prone to self-censorship when expressing themselves, when    considering private membership in political groups, or when    deciding whether to access certain reading or media material.    This is especially true for people who belong to unpopular    groups, who espouse unpopular opinions, or who read unpopular    books or view unpopular movies.  <\/p>\n<p>    Likewise, confidential sources that provide invaluable    information to the public about government or corporate    malfeasance may refrain from whistleblowing if they fear    journalists cannot protect their identities during border    crossings. This is    why EFF is calling for stronger Constitutional protection of    your digital information and urging people to contact    Congress on this issue today.  <\/p>\n<p>    Were also collecting stories of border search abuses at:    <a href=\"mailto:borders@eff.org\">borders@eff.org<\/a>  <\/p>\n<p>    The good news is theres a lot you can do at the border to    protect your digital privacy. Take the time to review our    pocket guides on Knowing    Your Rights and Protecting    your Digital Data at the border. And for a deeper dive into    these issues, take a look at our     Border Search Guide on protecting the data on your devices    and in the cloud.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.eff.org\/deeplinks\/2017\/03\/bill-rights-border-first-amendment-and-right-anonymous-speech\" title=\"The Bill of Rights at The Border: The First Amendment and the Right ... - EFF\">The Bill of Rights at The Border: The First Amendment and the Right ... - EFF<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The U.S.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/first-amendment-2\/the-bill-of-rights-at-the-border-the-first-amendment-and-the-right-eff\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94877],"tags":[],"class_list":["post-184519","post","type-post","status-publish","format-standard","hentry","category-first-amendment-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/184519"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=184519"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/184519\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=184519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=184519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=184519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}