Drupal.behaviors.knowyourrights = {
attach: function (context) {
var questions = [
{
number: 1,
question: "I’m a U.S. citizen and just arrived back to the United States from a business trip abroad. While on the trip, I worked on some business documents that my employer considers extremely confidential. Can border agents search my computer?",
answers: [
{ answer: "No, unless the border agent gets a warrant. My Fourth Amendment right against unreasonable search and seizure is just as strong at the border as inside the country.", correct: false },
{ answer: "Maybe. As long as a border agent has reasonable suspicion, he or she can search my laptop.", correct: false },
{ answer: "Yes, a border agent can search my laptop at the border without reasonable suspicion.", correct: true },
{ answer: "Maybe. As long as I consent, a border agent can search my laptop.", correct: false }
],
explanation: "A border agent has the legal authority to search your electronic devices at the border even if he has no reason to think that you've done anything wrong. No reasonable suspicion required!
Want to learn more about your Fourth Amendment rights at the border? Check out “Why Can My Devices Be Searched at the Border?"
},
{
number: 2,
question: "Typically, which entity would be in charge of searching me or my possessions when I enter the United States?",
answers: [
{ answer: "Immigration and Customs Enforcement (ICE)", correct: false },
{ answer: "Customs and Border Protection (CBP)", correct: true },
{ answer: "Transportation Security Administration (TSA)", correct: false },
{ answer: "Immigration and Naturalization Service (INS)", correct: false }
],
explanation: "In all likelihood, a CBP agent will conduct the initial search. However, if that agent determines a more detailed search to be necessary, ICE may take over the investigation. The Transportation Security Administration (TSA) is responsible for transportation security within the United States, and does not perform searches at the border. The INS actually no longer exists, and its responsibilities are now delegated between three components of the Department of Homeland Security: CBP, ICE, and the U.S. Citizenship and Immigration Service.
Confused about the difference between ICE, CBP, TSA, and INS? No problem, check out our helpful sidebar under “How the Government Searches Devices at the Border.”"
},
{
number: 3,
question: "If I’ve protected my computer with an account password, will the data stored on my computer be adequately protected when I cross the border?",
answers: [
{ answer: "Yes, as long as the password I choose is unusual enough and contains a random combination of numbers, letters, and punctuation marks.", correct: false },
{ answer: "Maybe, depending on the sophistication of the agent charged with searching my device.", correct: false },
{ answer: "Yes, creating an account password will prevent access to unencrypted data stored on my device.", correct: false },
{ answer: "No, an account password is easily bypassed by accessing the same disk using a different operating system, leaving unencrypted data stored on my device exposed.", correct: true }
],
explanation: "Something not clicking? We get it. Check out the section on “Account Passwords Versus Full-Disk Encryption."
},
{
number: 4,
question: "If I decide to use a full-disk encryption tool to protect my data, which of the following passphrases is most secure?",
answers: [
{ answer: "THE sleepsmightytonight! JunglejungletheIn lionthe!", correct: true },
{ answer: "Any password is sufficient, as long as it contains a random combination of 7-8 characters comprised of letters, numbers, and punctuation marks.", correct: false },
{ answer: "&&0HfxEV9/NKgKaI", correct: false },
{ answer: "s@;30:[E", correct: false }
],
explanation: "Our calculations confirm that a relatively short series of truly randomly chosen English dictionary words is secure; many people find these somewhat more memorable. Above we used “In the jungle! The mighty Jungle, the lion sleeps tonight!” The important thing is to choose enough words and to choose them in a random un-guessable way, such as by changing the spacing, punctuation, spelling, or capitalization.
Check out some examples of passwords that look effective, but really offer very little protection in “Choosing a Secure Passphrase.”"
},
{
number: 5,
question: "Which of the following is the most secure way to protect your data when crossing the border?",
answers: [
{ answer: "Store sensitive information with an online service (e.g., in “the cloud”), which may have significant benefits for reducing the amount of data that could be exposed to a border agent.", correct: false },
{ answer: "Use a full-disk encryption tool that encrypts everything on your computer rather than a file encryption tool that encrypts individual files separately.", correct: false },
{ answer: "Temporarily limit your own access by having your IT department generate a long and not-very-memorable encryption password, have them hold onto the password for you, and then let you know it when you check in with them again after crossing the border.", correct: false },
{ answer: "Use an external hard drive to make a byte-for-byte image copy of your laptop hard drive before your trip, allowing you to install a fresh operating system for travel purposes, overwriting the laptop contents.", correct: false },
{ answer: "All of the above: There is no one best way to secure your data; you must decide which method suits your situation the best.", correct: true }
],
explanation: "For more information on how to secure your data, check out “Deciding How to Protect Your Data.”"
}
];
var current_question;
var answers;
function initialize_quiz() {
current_question = 0;
answers = {};
jQuery.each(questions, function (key, val) {
answers[val.number] = null;
});
}
initialize_quiz();
function display_question() {
// draw the quiz question
var $quiz = jQuery('
5 out of 5 - L33t!
When it comes to device search and seizure at the U.S. border, you sure do know your stuff. Why not brag about it?
'); } else if(correct_answers <= 4) { $left.append('You scored ' + correct_answers + ' out of 5.
'); } var tweet_link = 'https://twitter.com/?status=I just scored ' + correct_answers + '%2F5 on the %40EFF quiz about electronic privacy at the border. Test yourself%3A https%3A%2F%2Feff.org%2Fr.K7X'; $right.append(''); $left.append('Learn the legal and technical details about bringing electronic devices across the U.S. border through our whitepaper: Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices.
Then sign our petition telling CBP to come hold border agents accountable for how they handle sensitive information at the US border.
'); $left.append( jQuery('
What did you get wrong?