Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - DHS Laptop Policy Gets Even More Invasive (

HangingChad writes: "As if the laptop search at the border wasn't invasive enough, DHS published a new policy that's positively jaw-dropping. According to the article officials may "...may take a traveler's laptop or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies...". It gets better. "...officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16..." DHS claiming the right to clone off your laptop contents to decrypt and analyze at their convenience. A policy so invasive even our do-nothing Congress has taken note. "The policies . . . are truly alarming," said Sen. Russell Feingold (D-Wis.), who is probing the government's border search practices." Really? Ya think?"

Submission + - Laptops may be taken at border without cause

dstates writes: The Washington Post reports that a new Department of Homeland Security policy allows agents to seize a laptop or other electronic device at a border crossing without the need to show any cause for suspicion. Further, the device can be held for an unspecified period of time, and both the device and its contents may be shared with other government agencies and private entities. The new policies apply to anyone entering the country, including U.S. citizens and covers "any device capable of storing information in digital or analog form," including hard drives, flash drives, cellphones, iPods, pagers, beepers, video and audio tapes and "all papers and other written documentation," including books, pamphlets and "written materials commonly referred to as 'pocket trash' or 'pocket litter.'" Sen. Russell Feingold (D-Wis.) is quoted as saying "The policies . . . are truly alarming,". He is probing the government's border search practices and intends to introduce legislation soon that would require reasonable suspicion for border searches. The full DHS policy statement is available on line.

Submission + - USB Thumb Drive Encryption Catch 22 2

SuperCharlie writes: Working at a University and with the increasing amount of security break ins, lost data and the real potential for massive identity theft due to the data that my departments deal with, we have decided to implement a USB thumb drive encryption policy.

After two days of trying many many free and paid software solutions I am finding that there is a real problem in usability and portability of encrypted data on USB drives. The goal is to provide a seamless, easy way for users to simply drag and drop their files.

Every solution I have come across so far either requires an administrator to install the file system level drivers or leaves the data un-encrypted until it is specifically selected and encrypted. Neither of these solutions will work as I know my users and when they bring their PowerPoint slides to remote locations they will not have administrator access and relying on them to manually select and encrypt/decrypt files is simply not going to happen.

Are there any solutions where a user can simply plug in the USB drive, put in their password, and drag and drop encrypted files?

Slashdot Top Deals

In less than a century, computers will be making substantial progress on ... the overriding problem of war and peace. -- James Slagle