Wrong as in not true?Well, this is basically completely wrong.
or
Wrong as in immoral?
Wrong as in not true?Well, this is basically completely wrong.
I can see that. Picking a minor border crossing over a major run would run questions in my mind.It freaks them on both sides of the border.
Same thing lets say you live in Toronto, have been in Montreal and are now going to New York City and you take the scenic route and cross at say Noyan, Québec -Alburgh, Vermont or St-Armand/Phillipsburg, Québec - Highgate Springs, Vermont. Expect all sorts of questions as to why you are taking such a convoluted path, even if everything is on the up and up.
That's pretty crazy considering my exes family has a lengthly criminal history and we never had any problems at any borders. I also don't remember ever declaring that I had any electronics (cell phone, laptop) with me when I last travelled abroad.US officials have access to CPIC. Police put all KINDS of shit on CPIC inclosing intelligence. So if they suspect you are an escort it will be on CPIC. Also they put "aliases" up there. So if they received any report or intelligence that you are Miss Maya Blue they will have that alias on CPIC. That is why US customs searches lap tops because of teh shit pigs put on your CPIC. CPIC is abused like crazy and a cop who hates you can destroy your life with no consequence
That's pretty crazy considering my exes family has a lengthly criminal history and we never had any problems at any borders. I also don't remember ever declaring that I had any electronics (cell phone, laptop) with me when I last travelled abroad.
IME you have a choice of several different "lines" to get in, leading to certain booths. Each lineup has two booths. If you want to avoid female immigration officers, you get in the lineup with fewer or no female officers. There is nothing suspicious about this. Although once at the front of the specific line you choose, it could look suspicious if you tried to avoid the next available officer out of the two possibilities. .
I am guessing there is some random choice involved, it also probably looks at your travel history. The machine asks you questions similar to that which are on the landing card, prints a receipt that you give to a customs agent to exit the area. That agent likely decides if you are going for a secondary interview.II think they have this in Vancouver, too, but never tried it. How does the machine decide who gets interogated? Random choice? IME i've been sent for "interogation" at least 50% of the time.
Isn't this how they found that pedophile Catholic priest a few years ago in Halifax? I think they checked his laptop at the airport...so, whenever i travel i am entirely paranoid about the US customs people possibly searching my data. someone once put this idea in my head that they can, and they do, im curious if anyone has ever had this happen to them or heard of it happening to someone they know.
i imagine i will still clean things up when traveling, but i wonder if i am being a little too paranoid?
Smart lady here folks . It's not worth it . If you want to tour then go out West . Lots of money out there .I was toying of the idea of touring the US but not now... I dont even think I will answer emails or visit terb when abroad...
Correct me if I'm wrong but I think that he was coming back home and the Canadian Border Guards are the one's that checked his laptop .Isn't this how they found that pedophile Catholic priest a few years ago in Halifax? I think they checked his laptop at the airport...
Timbit
Yes, he was stopped on his way back into Canada. But it's naive to think this was a random stop and search. Rather, as I alluded in my previous post, the good Bishop's profile was steadily developed over a period of time and they had developed enough intelligence to pick him off when they did. He was set up, big time...Correct me if I'm wrong but I think that he was coming back home and the Canadian Border Guards are the one's that checked his laptop .
Clergy profiling.the good Bishop's profile was steadily developed over a period of time
What I would do is simply setup remote desktop on your home computer and use your laptop to access the home computers desktop when abroad. Basically all it's doing is your laptop is acting as a terminal, when it connects to the home computer... all your getting is a "Keyboard, Mouse, and Video" connections ... everything you're doing is still kept of the home computer.. nothing on the remote laptop. You're basically still using your home computer... which is nice because you will have access to all you files too. As for customs if they check you laptop they will find nothing.. and the remote desktop program is already built into windows so that will not look like anything unusual to them... since everyone already has it on their computers.I was toying of the idea of touring the US but not now... I dont even think I will answer emails or visit terb when abroad...
I think it was the frequent trips to SE Asia that clued in Customs officials.Clergy profiling.
Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices
Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Thanks to protections enshrined in the U.S. Constitution, the government generally can’t snoop through your laptop for no reason. But those privacy protections don’t safeguard travelers at the U.S. border, where the U.S. government can take an electronic device, search through all the files, and keep it for a while for further scrutiny – without any suspicion of wrongdoing whatsoever.
For doctors, lawyers, and many business professionals, these border searches can compromise the privacy of sensitive professional information, including trade secrets, attorney-client and doctor-patient communications, research and business strategies, some of which a traveler has legal and contractual obligations to protect. For the rest of us, searches that can reach our personal correspondence, health information, and financial records are reasonably viewed as an affront to privacy and dignity and inconsistent with the values of a free society.
Despite the lack of legal protections against the search itself, however, those concerned about the security and privacy of the information on their devices at the border can use technological measures in an effort to protect their data. They can also choose not to take private data across the border with them at all, and then use technical measures to retrieve it from abroad. As the explanations below demonstrate, some of these technical measures are simple to implement, while others are complex and require significant technical skill.
That's exactly why a lot of encrypted computer systems have what's called "plausible deniability". Two passwords, one opens up (unencrypt) a dummy system (be sure to put some mildly interesting spreadsheets there at least for them to look at) and the real password opens the real system you use all the time - done so cleverly the existence of real encrypted system is actually impossible to prove even with the most sophisticated forensic examination. I won't name names as I don't want to help the kiddie porn perverts but you can PM me for details if in doubt. It is a matter of concern for me as I have to t**********se the US shortly. While I have no interest in any type of porn, I do object to them having the right to read my emails as there is often proprietary information therein. Pre 9/11 there is no question such an invasion of privacy would be considered an illegal search.They don't need that long . They will ask you to open it . If you don't then you'll be labeled a terrorist. They don't Fu*k around .
Best Crypt does this... they call it a "Ghost System" They design this stuff for secret agents that must pass undetected into foreign lands. Not only that Best Crypt is located in Finland and is not required to have any backdoor keys, like encryption products sold in the USA, under NSA rules.That's exactly why a lot of encrypted computer systems have what's called "plausible deniability". Two passwords, one opens up (unencrypt) a dummy system (be sure to put some mildly interesting spreadsheets there at least for them to look at) and the real password opens the real system you use all the time - .
Not so sure about that and surely the GOV, FBI, etc., know of these programs.That's exactly why a lot of encrypted computer systems have what's called "plausible deniability". Two passwords, one opens up (unencrypt) a dummy system (be sure to put some mildly interesting spreadsheets there at least for them to look at) and the real password opens the real system you use all the time - done so cleverly the existence of real encrypted system is actually impossible to prove even with the most sophisticated forensic examination.
Yes I have to agree it's a bad idea to lie in anyway to these guys... trust me they know when you're telling a lie as they've been trained extensively as in what to look for, the body language... you look up and to the left... or is it the right... when you lie... because you're using the side of the brain that holds the creative mind.My problem is you have to lie to the border guy, which in itself is a big deal if you get caught.
The second laptop enables complete honesty. You can even tell them that it is your second laptop without personal data!