Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

PA Seizes Newspaper's Computers 314

twitter writes "Computer equipment from the Lancaster Intelligencer Journal was seized for alleged improper data access and disclosure. From the article: 'If the reporters used the Web site without authorization, officials say, they may have committed a crime.' Journalist are understandably upset that confidential information, that has nothing to do with the investigation, will be found and used for retribution."
This discussion has been archived. No new comments can be posted.

PA Seizes Newspaper's Computers

Comments Filter:
  • Logs? (Score:5, Insightful)

    by CaptainZapp ( 182233 ) * on Wednesday March 15, 2006 @07:27AM (#14922987) Homepage
    Couldn't they prove their case with their own, damn webserver logs?

    This seems to me like impounding your car to take it apart to prove that you drove 7Mls over the speed limit.

    Or in other words: Harrassement!

  • by Opportunist ( 166417 ) on Wednesday March 15, 2006 @07:29AM (#14922993)
    That seems to be the slogan. After all, without them, some not really legal actions taken by governments could be more easily covered up.

    So if you can give them the impression that even when a newspaper grants you anonymity, the feds will somehow find out who you are. Sure, you can still execute your freedom of speech.

    But will you dare to when it pretty much means your career is over because it's this easy for the government to grab any kind of information they want? So take your share of the cake and shut up. It's better for you.
  • by BadAnalogyGuy ( 945258 ) <BadAnalogyGuy@gmail.com> on Wednesday March 15, 2006 @07:30AM (#14922998)
    If a newspaper company commits a crime, infiltrating password-protected government computers in this case, should it be allowed to continue because of the First Amendment guarantee of Freedom of the Press?

    According to the 4th Amendment, the right to be secure in our belongings is still subject to the will of a judge to issue a warrant. The warrant was issued in this case, and the judge has taken personal responsibility to act as escrow for the information that reaches the prosecutors.

    I don't know what else can really be guaranteed the newspaper, except that they will have their day in court. Their protests about informant confidentiality is a red herring, designed to take our attention away from the possibility that they were involved in illegal activities.
  • by SkankinMonkey ( 528381 ) on Wednesday March 15, 2006 @07:37AM (#14923010)
    I'm not going to argue with you on the main points because I agree with you on them BUT one thing has come along with digital media that really calls for other protections for defendants to be put into place. For one, since computers do store massive amounts of data, and many stories are theoretically being worked on with this computer, shouldn't the defense have some sort of representative available while said computer is being accessed to make sure that only relevant data is accessed OR to take note of data that was accessed as to make sure that their computers are being properly confiscated and this isn't just a setup for a SLAP suit?
  • by kafka47 ( 801886 ) on Wednesday March 15, 2006 @07:38AM (#14923011) Homepage

    First off, if the coroner had indeed provided the system's password, wasn't he the one contravening security policy (if not the law)?

    Their justification for the computer seizure doesn't explain it at all. If they were concerned about a possible breach (even one obtained through some fraud or password sharing), they'd be able to ascertain the truth more reliably and certainly via access logs from the host systems, or even the intervening logs from the newspaper's ISP. Period.

    Searching through the hard drives would be a last ditch effort for a legitimate investigation, since the cache could have been modified or deleted (thus requiring a forensic examination of the suspect systems).

    The investigators are either stupid or lying about their true motivations. I can smell a lawsuit of significant proportion.

    /K

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Wednesday March 15, 2006 @07:38AM (#14923012)
    Comment removed based on user account deletion
  • by Threni ( 635302 ) on Wednesday March 15, 2006 @07:40AM (#14923017)
    > Their protests about informant confidentiality is a red herring, designed to
    > take our attention away from the possibility that they were involved in illegal
    > activities.

    Wrong - the computers will contain all sorts of information, and there's no guarantee whatsoever that any sort of control over the information retrieved will be implemented. So it's possible that stories, interviews, research etc about corrupt governmental officials, policemen etc could leak out, or that rival news organisations with friends in high places will have access to information that this news organisation may have obtained itself.

    Just another argument for encryption, and perhaps also for some method of storing information about seperate subjects seperately so that only some subset of the encrypted data need be decrypted, and not just everything.

  • by amcdiarmid ( 856796 ) <amcdiarm.gmail@com> on Wednesday March 15, 2006 @07:48AM (#14923033) Journal
    Is that the AG said that since the Newspaper did not show proof that confidential information exists, the Newspaper has no claim not to have the drives examined. (Say for confidential information about weak security at the police IT department.)

    In similar news, I understand that Congress is going to pass a law making it a crime to disclose illegal spying by the government.
  • Re:Logs? (Score:5, Insightful)

    by G)-(ostly ( 960826 ) on Wednesday March 15, 2006 @07:49AM (#14923035) Journal
    You don't need to follow basic computer security principles involved in "proving" behaviors if you have enough guns at your disposal.
  • by ObsessiveMathsFreak ( 773371 ) <obsessivemathsfreak.eircom@net> on Wednesday March 15, 2006 @07:49AM (#14923037) Homepage Journal
    ....what's that?
  • by RagingFuryBlack ( 956453 ) <NjRef511@[ ]il.com ['gma' in gap]> on Wednesday March 15, 2006 @07:49AM (#14923038) Homepage
    It looks like the state is trying to investigate leaks from inside its offices. Last time I checked, wasn't there some sort of confidentiality/privlage attached when you're an "Unnamed Source" for a paper? Wouldn't this be violating a few people's Constitituinal rights?
  • by capt.Hij ( 318203 ) on Wednesday March 15, 2006 @07:57AM (#14923052) Homepage Journal
    Besides, what they did was a crime and they knew it. Who in their right mind would have accessed a private police network to publish public reports? Gee, you'd think as a reporter that maybe the coroner is setting you up there and you might want to contact the police to get him nailed and not you.

    Not only that but anybody who talks to a reporter should know that there is no guarantee that the reporter will not be forced to tell law inforcement their source. When reporters write something down it should be assumed that it may be investigated. This raises the question of why reporters would put information on a computer and not encrypt it. If they have sensitive information it should be encrypted. How hard is it to use pgp? That is the only way to insure that the information they have will remain private.

    If reporters really want to protect their sources they will not rely on judges to back them up but take precautions to insure that their information is secure from prying eyes.

  • by Half a dent ( 952274 ) on Wednesday March 15, 2006 @08:02AM (#14923065)
    Just because you have been given a key to a building by an employee does not mean you are not guilty of trespass if you go ahead and use it. Same deal here.

    Seizure may be going too far though - all depends on the specifics of the case.

    --

    (I never read facts - they spoil my arguments)
  • encryption for FSs (Score:5, Insightful)

    by WindBourne ( 631190 ) on Wednesday March 15, 2006 @08:07AM (#14923075) Journal
    I wonder how many reporters are using encryption on their Filesystems these days? If they are not, now is the time to start. A bit of a hassle, but maybe less hassle than spending 3 years in prison.
  • by Morgaine ( 4316 ) on Wednesday March 15, 2006 @08:08AM (#14923082)
    One of the lessons in this story is that any organization involved in investigative reporting needs to keep its data systems under heavy cryptographic lock and key. Quite separate from any possible legal wrongdoing on the part of one or more of their reporters, all their other stories and investigations are now severely comprimised by the seizure, as others have pointed out. Their whole business could be at risk because of the ease with which computer equipment can be taken away.

    This inevitably brings to mind today's story about Amazon's new storage service. If Lancaster Intelligencer Journal had stored their encrypted records and work files on such a storage service, would Amazon (or Google etc) have got raided and their computers taken away?

    Obviously not (I think), but where does the boundary between yes and no actually lie? What if LIJ stored their encrypted data at some small 3rd party outfit?

    This whole area is likely to become a tangled quagmire, as well as sadly a legal goldmine.
  • by BlueStrat ( 756137 ) on Wednesday March 15, 2006 @08:13AM (#14923094)

    Just another argument for encryption, and perhaps also for some method of storing information about seperate subjects seperately so that only some subset of the encrypted data need be decrypted, and not just everything.


    Encryption wouldn't do much good when a judge will just order you to reveal the password(s) under pain of a contempt charge and jail until you concede, regardless of claims of bad memory, etc. There could also be destruction of evidence and obstruction of justice charges for wiping or destroying the hardrives.

    Keeping the data private from investigators is possible, if one is willing to spend some serious time in the justice and penal systems. I'm all for standing on ones' principals, but when you're looking at a long stretch in prison, with a whole life, a career, and a family to consider, priorities can change in a hurry.

    IANAL, YMMV, etc...

    Strat
  • I agree that the protests about all the data they don't want the government to find is a red herring. In reporting this story, it's pretty clear they're trying to shape public opinion of the big, bad, invasive government vs the good-natured press. What is really the story is that law enforcement (the REAL good guys, in case you didn't know) busted a reporter so desperate for information, that they violated the security of the municipality, and who knows what other laws they broke. The freedom of the press, isn't the freedom to be above the law... and just to help out the FUD, when you attempt to access a protected computing system, you will get a notice that reads something like this...

    ATTENTION! THIS COMPUTING SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS, AND NETWORK DEVICES ARE PROVIDED ONLY FOR AUTHORIZED U.S. GOVERNMENT USE. ONLY AUTHORIZED USERS ARE PERMITTED ACCESS TO THIS SYSTEM. DOD COMPUTER SYSTEMS MY BE MONITORED FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THEIR USE IS AUTHORIZED.

    I think it's pretty clear even if someone gave you a password, you should know you are not authorized to use it.

  • Philadelphia does not control the Pennsylvania Attorney General and has no authority over Lancaster county - you know, where the Amish live?

    Jeez.

    Next up, "Rudy Guiliani orders torture of Al-Queda suspect at Gitmo"
  • by djmurdoch ( 306849 ) on Wednesday March 15, 2006 @08:24AM (#14923117)
    ATTENTION! BLAH BLAH BLAH ...

    Click through agreements have trained people not to read anything presented in all caps.
  • by digitaldc ( 879047 ) * on Wednesday March 15, 2006 @08:24AM (#14923119)
    Whatever happened to 1st Amendment rights? Should people be afraid of what they write?

    They need to contact http://www.firstamendmentcenter.org/ [firstamendmentcenter.org]
  • Re:Logs? (Score:5, Insightful)

    by thedletterman ( 926787 ) <thedletterman@ho ... .com minus punct> on Wednesday March 15, 2006 @08:25AM (#14923121) Homepage
    So a bank notices an employee key card is missing, and it was used to open the front door and the vault door. they even find a hundred thousand dollars missing from the bank, and a review of the security cameras reveals the offender. Should they bother to get a warrant to search their house, or is that just harrassment?
  • I dont get it. (Score:3, Insightful)

    by TenLow ( 812875 ) on Wednesday March 15, 2006 @08:30AM (#14923130)
    They're punishing reporters for reporting? If they were given access when they shouldnt have had it, wouldnt it be the fault of the person who gave them access, not them for accessing it?

    All I know is this'll sure make a good news story. Oh; wait, nevermind.

  • TrueCrypt (Score:2, Insightful)

    by HangingChad ( 677530 ) on Wednesday March 15, 2006 @08:39AM (#14923159) Homepage
    Pretty sad when newspapers in this country have to start worrying about encrypting their source data. Welcome to Republican Amerika, formerly known as the land of the free.
  • Re:Logs? (Score:1, Insightful)

    by CaptainZapp ( 182233 ) * on Wednesday March 15, 2006 @08:39AM (#14923160) Homepage
    That's really a pretty rotten analogy. For starters: the article doesn't mention if the web server logs (which would be the primary lever into any such investigation) where checked at all. But let's look at your analogy a little further:

    So a bank notices an employee key card is missing,

    How did they notice that? Did the employee report the loss?

    and it was used to open the front door and the vault door.

    Either the card was missing and used by thives or it was not missing in the first place. Would you mind making up your mind?

    a review of the security cameras reveals the offender

    So, was it the employee with the missing or not missing key card caught on tape or was it the thieve of the key card and if it was the thieve would you mind telling us why a warrant for the employees premises should be issued?

    Besides that: I wouldn't know of any bank, which permits access to the vault based on a key card without additional security measures. Which is another reason why your analogy sucks.

    Besides a class in logic 101 would be probably a good idea.

    HTH HAND

  • by Red Flayer ( 890720 ) on Wednesday March 15, 2006 @08:40AM (#14923161) Journal
    "One of the lessons in this story is that any organization involved in investigative reporting needs to keep its data systems under heavy cryptographic lock and key."

    Pointless, since it is illegal to not provide the key when asked by law enforcement who've gotten a warrant for it.

    If you are concerned about your data being seized, you're better off having it on a portable storage device that you can either toss or give to someone else for safekeeping if you think the hammer's going to drop on your investigation.

    Third parties would have to give up your files if they are prsented with a warrant for them. The key would be to use an offshore storage company, and do all your online activity through an offshore proxy. I'm sure they'll have tons of fun trying to serve a warrant then.
  • Re:Logs? (Score:3, Insightful)

    by thedletterman ( 926787 ) <thedletterman@ho ... .com minus punct> on Wednesday March 15, 2006 @08:41AM (#14923168) Homepage
    I don't see where the article suggests the investigators did not check the logs. I'm pretty sure that's how they figured out whose password was used to access this website.
  • Re:Logs? (Score:5, Insightful)

    by Technician ( 215283 ) on Wednesday March 15, 2006 @08:49AM (#14923188)
    Exactly what do you have to hide, citizen?

    1 Tax records
    2 Full credit card information including card number, pin, phone numbers to call if lost or stolen.
    3 Full bank details for online banking
    4 Password list for various websites i log into once in a while. After all, I can't use Technician as a logon for AOL IM. So when I do use it on occasion, I need to look up my id.
    5 Alarm system master password and user password. I seldom use the master password.

    Can you think of any reason to leave any of that out for law enforcement or a burglar to dig through? It's nothing I would want either to have.

  • How is this even relevant? The newspapers were discolsing secret details of crime investigations.. you know, those little details they use to confirm confessions that are sensitive to leads in the investigations? This newspaper, desperate to give more details than the others, compromised the police departments ability to investigate crimes. I'm scratching my head wondering how this should be glorified, and how whistleblowing applies?
  • by InsaneGeek ( 175763 ) <slashdot@RABBITi ... minus herbivore> on Wednesday March 15, 2006 @08:54AM (#14923209) Homepage
    I wouldn't use the word reporters but more of the word criminals. Should be:

    I wonder how many criminals are using encryption on their Filesystems these days? If they are not, now is the time to start. A bit of a hassle, but maybe less hassle than spending 3 years in prison.

    As using someone elses password to get to information that you aren't allowed access to is a criminal act, and that is what will get you the three years in prison. Possible concern over source privacy, etc for reporters won't get you in prison for three years and is a totaly different statement than what you said.
  • by MathFox ( 686808 ) on Wednesday March 15, 2006 @09:02AM (#14923230)
    How many computers does the newspaper have left after the four computers are taken... Freedom of the press isn't worth a thing when all your ink is taken away "for investigation".

    I agree that journalists should be punishable for crimes they commit, but "criminal investigation" is commonly used as an excuse for government intimidation. (Not often in the USA, but read the reports from Reporters without borders [rsf.org].) Is this happening here, the secrecy around all this makes me worry!

  • Re:i got a 404 (Score:1, Insightful)

    by Anonymous Coward on Wednesday March 15, 2006 @09:05AM (#14923237)
    It's not that nobody got it, it just wasn't funny.
  • by Anonymous Coward on Wednesday March 15, 2006 @09:29AM (#14923316)
    What he means is that is your outward appearance. no matter how hard the feds look into you they can find nothing. It is really easy to do this but takes effort.

    If you personally do what he said, but secretly do the opposite under a psudeoname that you change every time and use different ways of releasing it to the world then you are safe.

    I.E. you HAVE to play the spy game. send encrypted hidden files to sources overseas afer you sent them the encryption key in a seperate manner earlier and from a throw away account or via a pair of relays through other countries, etc....

    The only way to say out of jail is do everything in your power to keep your self 100% squeaky clean. your personal computer NEVER has anything in it. you do your subversive stuff from a live boot CD onto a USB drive or USB thumb drive that is encrypted.

    Think deeper before you react. you haveto think like an opressed person because in america that is what you ARE!
  • by 00Dan ( 903094 ) on Wednesday March 15, 2006 @09:40AM (#14923365)
    I keep reading people write "Freedom of the press" like that trumps any illegal activity. Am I missing something here? A couple reporters gets the username/password of the local coroner (with or without his knowledge is in debate right now) and proceed to access a restricted web site. How is this not illegal?

    Is a reporter allowed to run red lights? Can they break into the mayors office to rummage thru his files? How is this any different???

    /and on the subject of server logs... This is slashdot, I thought you guys knew better. Even if you track the IP back to the newspaper, all that says is someone connected to that IP accesssed the system, not which system behind the firewall it was (and do they have free wireless in their lobby?)
  • Re:Logs? (Score:5, Insightful)

    by ozmanjusri ( 601766 ) <aussie_bob@hoMOSCOWtmail.com minus city> on Wednesday March 15, 2006 @09:57AM (#14923425) Journal
    Exactly what do you have to hide, citizen?

    "Give me six lines written by the most honorable of men, and I will find an excuse in them to hang him."
    Cardinal Richelieu

  • by yuna49 ( 905461 ) on Wednesday March 15, 2006 @09:57AM (#14923427)

    From TFA:
    Feudale ruled Feb. 23 that the state could seize the computers but view only Internet data relevant to the case. The judge also ordered the agent who withdraws the data to show them to him first - before passing them to prosecutors - to ensure that the journalists' other confidential files are not compromised.

    Personally I think the entire process ought to be handled by a third-party on behalf of the court, and not by the state which is a party at interest. How could anyone be sure that only the material shown to the judge is made available to the prosecutors? How can anyone be sure that a complete copies of the entire contents of the drives weren't made and handed to the prosecution on the sly?

    I also had the same reaction as the initial commentators here. Why isn't it proof enough that webserver log entries exist showing access to the restricted areas from the IPs of the newspaper? Sure IP addresses don't give you any information about the actual identity of the person(s) accessing the site, but seizing the computers is no better. How can you prove that the use of the computers wasn't by an unauthorized person? In fact, if you're out to undermine a local newspaper, sneaking into their offices and accessing a protected government website and then claiming foul sounds like a good strategy.

    And, for those of you who want to analogize this situation to a simple burglary, remember that there are important press freedom issues here that don't arise in normal criminal acts. When printing presses were invented, states first tried destroying them, then licensing them. Governments have a very strong incentive to restrict press access as much as possible. That's why we have a First Amendment.

  • by Billosaur ( 927319 ) * <<wgrother> <at> <optonline.net>> on Wednesday March 15, 2006 @10:04AM (#14923462) Journal

    On the one hand:

    "This is horrifying, an editor's worst nightmare," said Lucy Dalglish, executive director of the Reporters Committee for Freedom of the Press in Washington. "For the government to actually physically have those hard drives from a newsroom is amazing. I'm just flabbergasted to hear of this."

    We have the potential for confidential sources and other non-related data to be exposed to the light of day. On the other hand:

    The grand jury is investigating whether the Lancaster County coroner gave reporters for the Lancaster Intelligencer Journal his password to a restricted law enforcement Web site. The site contained nonpublic details of local crimes. The newspaper allegedly used some of those details in articles.

    If the reporters used the Web site without authorization, officials say, they may have committed a crime.

    We have reporters, eager to scoop the competition to drive up circulation by exposing little know details of crimes, committing a crime themselves in cahoots with the coroner, who must have been getting something out of the deal.

    Either way you cut it, it's a legal quagmire and a constitutional nightmare.

  • by EdMcMan ( 70171 ) <moo.slashdot2.z.edmcman@xoxy.net> on Wednesday March 15, 2006 @10:36AM (#14923658) Homepage Journal
    I thought this was interesting, since the Intelligencer Journal's HQ is about 2 miles from my house. Anyway, it sounds more like the reporter's computers were stolen, rather than Intelligencer Journal's.

    State agents raided Kirchner's home outside Lancaster last month and took computers, he said. He said he had had no other contact with authorities since.

    I can see the issue of having confidential secrets being found by the government, but at the same time being in the press does not absolve you from having evidence collected on you. The best thing the government can do is find a 3rd party to do the evidence collection (that is trusted by both sides).
  • by Notabadguy ( 961343 ) on Wednesday March 15, 2006 @10:39AM (#14923676)
    More chilling than law enforcement seizing assets from a newspaper for inspection is the sheer arrogance of individuals in the media industry believing that they are above the law. Literally. The first amendment has - time and again - protected our media from censorship. I cannot possibly imagine how one could arrive at the conclusion that the first amendment also protects the media (or anyone else) from criminal investigations. I'm a member of the computer forensics community; I know what is going to happen to the computers in Harrisburg, and the ridiculous allegations thrown about by a few individuals discredit the media community as a whole. I'm sure you're aware of the adage "A bad apple spoils a bunch?" It holds especially true in the media. You have a larger audience than a nameless person unheard by the masses. To see wild claims from someone in the media about government conspiracies and constitutional violations over a matter of criminal investigation do a great discredit to your once noble profession. If the seized computer's slack space, RAM, or more simple tracking means contain data showing access to the web page in question, someone (or several someones) are going to spend an exquisitely long time in prison. Invest in soap-on-a-rope now. Honestly though...simply for the belief that the First Amendment somehow grants the media immunity from criminal behavior, I sincerely wish that the rest of your industry would scorn you, decry you as unworthy, and distance themselves from such unethical beliefs. Unfortunately, I don't think they will. Thus, the growing scorn for American media. Thanks for being a part of the division.
  • Newspapers (Score:1, Insightful)

    by Anonymous Coward on Wednesday March 15, 2006 @10:56AM (#14923849)
    I live in Lancaster myself, and I read the Intelligencer everyday.

    There's ALOT more to this story then people see and read.

    A high ranking person gave an illegal password to the intelligencer, who used it to get into confidential sites. However, the high ranking person is on trial for many many things, and they need to gather evidence against him

    Nothing illegal whatsoever. The intelligencer is also willingly giving the computers over, not being forced.
  • Re:Logs? (Score:3, Insightful)

    by Elm Tree ( 17570 ) on Wednesday March 15, 2006 @11:10AM (#14923993) Homepage
    But if the newspaper is using NAT then they wouldn't know who at the newspaper was guilty, they'd need to examine each computer and see which has the necessary files.
  • Re:Logs? (Score:2, Insightful)

    by deesine ( 722173 ) on Wednesday March 15, 2006 @01:40PM (#14925529)

    They may be able to delete my data, but they can't access it.

    Judge: What's the password/key?

    You: I'm not gonna tell you.

    Judge: Have a stay in our luxurious county jail then.

    Encryption might keep out the hoods, but it ain't gonna stop a judge's order.

  • Re:Logs? (Score:2, Insightful)

    by Anonymous Coward on Wednesday March 15, 2006 @02:19PM (#14925895)
    "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

    You decide. The Fourth Amendment is pretty clear, and there are no exceptions for the obviously guilty citizen.
  • Re:Logs? (Score:3, Insightful)

    by bigpat ( 158134 ) on Wednesday March 15, 2006 @02:24PM (#14925938)
    "Give me six lines written by the most honorable of men, and I will find an excuse in them to hang him."
    Cardinal Richelieu

    That number also works for guilt by association, since only 6 degrees seperate us all.

  • by KagatoLNX ( 141673 ) <kagato@@@souja...net> on Wednesday March 15, 2006 @02:47PM (#14926155) Homepage
    While I don't disagree with the principle that seizure can be reasonable in the face of a real crime, the nature of seizure and of leaked confidential information makes this not so cut and dry.

    Since businesses do a better job obtaining and preserving their protections than the public seems to do, just look to them for the precedent. They refuse to release things all the time claiming "irrepairable harm". Admittedly those are usually civil cases involving trade secrets and the like. However, the point stands. The Bill of Rights protects against unreasonable search and seizure for exactly that reason. Leaking information that can be used for retribution against citizen or, almost more importantly, against the press causes irrepairable harm. The belief of the paper is that the seizure, in this case, was far beyond what a constitution warrant would allow.

    Admittedly computers and networks of them are very tightly integrated. It's hard to seize just the right parts of them. However, having witnessed the aftermath of a few police seizures of computer equipment I can assure you that it probably was overkill. People don't usually work well with things they don't understand. You can be that your average police department usually goes overboard in situations like this.

    The claim could be made that the police made the most limited seizure practical, but I don't believe that's provides a defense against a clear Fourth Amendment claim (IANAL). The Fourth Amendment sends a clear message. Unfettered search and seizure is at odds with a citizen's ability to participate in a democracy because of the potential it creates for abuse. Any pretense of a crime can be used as a gateway to retribution. Especially considering that computers actually have made it easier to search and seize.

    In the past, thousands of papers would have to meticulously found, catalogued, and archived. Now, digital copies can be made trivially, evidence integrity can be certified by third party signature, and search can be heavily automated. The sad fact is that the police are willfully ignoring the fact that they don't have to seize the entire computer so that they don't have to work as hard (not that they're lazy, but their resources ARE limited). Make no mistake, a single man can now seize libraries worth of data in minutes and search it just as quickly.

    What nobody realizes about the Bill of Rights is that it was made to safeguard the ability of the people to revolt again if necessary. The government and courts has slowly disarmed the people, nibbled away at their speech protections, removed their autonomy, and generally preserve democracy by ensuring the government is subject to the will of the people--by force if necessary. This is always done in the spirit of "making people accountable", "keeping the peace", or "protecting people from criminals". The humbling reality is that every one of the founders of our government would have been dead if they were accountable to the government in their time. The peace would have been kept, it's true, but in a world where the people are made criminals for enjoying their freedom, what does it matter?

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...