{"id":10345,"date":"2014-02-07T14:48:33","date_gmt":"2014-02-07T14:17:56","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2014-02-07T14:17:56","slug":"en-US","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=10345","title":{"rendered":"No, border computer searches did not start with Obama"},"content":{"rendered":"<p>No, dear readers, the Obama Administration did not start border computer searches. It started early in the <a href=\"http:\/\/www.dhs.gov\/xlibrary\/assets\/ice_border_search_electronic_devices.pdf\">middle of the Bush Administration<\/a>. Then it became policy. The first reported cases were right after 9\/11. See <a href=\"https:\/\/www.lexis.com\/research\/retrieve?_m=d278ce070347b16e014a560d39f5099a&amp;csvc=lt&amp;cform=byCitation&amp;_fmtstr=FULL&amp;docnum=1&amp;_startdoc=1&amp;wchp=dGLzVzB-zSkAA&amp;_md5=ec206d0a6b9e461973a2f2d02949452e\">Treatise \u00a7 35.19 n.1<\/a>; see e.g., <a href=\"http:\/\/scholar.google.com\/scholar_case?case=6617780725605214433&amp;q=393+F.3d+501&amp;hl=en&amp;as_sdt=1006\">United States v. Ickes<\/a>, 393 F.3d 501 (4th Cir. 2005).<\/p>\n<p>This keeps <a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/12\/gadget-border-searches-2\/\">coming<\/a> <a href=\"http:\/\/www.dailypaul.com\/309120\/maniac-fascism-court-upholds-willy-nilly-gadget-searches-along-us-border\">up<\/a>, even today, and it&#8217;s just wrong. It&#8217;s been going on for more than a decade. Keep up. One headline doesn&#8217;t mean that it&#8217;s new.<\/p>\n<p><!--more--><\/p>\n<blockquote><p>The law review articles in \u00a7 35.19 n.1 are: See, e.g., Christine A. Coletta, Note, Laptop Searches at the United States Borders and the Border Search Exception to the Fourth Amendment, 48 B.C. L. Rev. 971 (2007); Rasha Alzahabi, Note, Should You Leave Your Laptop at Home When Traveling Abroad?: The Fourth Amendment and Border Searches of Laptop Computers, 41 Ind. L. Rev. 161 (2008); Harvey Rishikof, Symposium: The Fourth Amendment at the International Border: Combating Terrorism in the Digital Age: a Clash of Doctrines: The Frontier of Sovereignty&#8211;National Security and Citizenship&#8211;The Fourth Amendment&#8211;Technology and Shifting Legal Borders, 78 MISS. L.J. 381 (2008); Robert M. Bloom, Symposium: The Fourth Amendment at the International Border: Border Searches in the Age of Terrorism, 78 Miss. L.J. 295 (2008).<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=10345\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-10345","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/10345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10345"}],"version-history":[{"count":0,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/10345\/revisions"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10345"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}