It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
According to Dr. Von Der Haar’s complaint, armed CBP officers detained both her and Mr. Papatheodoropoulos, took them into separate rooms, and stood blocking the exit door while they interrogated Dr. Von Der Haar about, “the nature of her relationship with Mr. Papatheodoropoulos … the contents of email messages that Dr. Von Der Haar and Mr. Papatheodoropoulos had sent each other … [and] if she and Mr. Papatheodoropoulos were having sexual relations.”
Given that Mr. Papatheodoropoulos had retained his hard drive that contained the emails, the only way that the Customs and Border Protection Agents could have reviewed the emails is for someone to have surreptitiously monitored the communications between Dr. Von Der Haar and Mr. Papatheodoropoulos and reported those communications to the agents questioning her.
Defendant Lieba [the CBP agent] admitted that employees of the United States had read email communications between Dr. Von Der Haar and Mr. Papatheodoropoulos.
I remember when a president was forced to resign because he unlawfully spied on someone important...
Indiana University cherishes the diversity of values and perspectives inherent in an academic institution and is therefore respectful of intellectual freedom and freedom of expression. The university does not condone censorship, nor does it endorse the routine inspection of electronic files or monitoring of network activities related to individual use. At times, however, legitimate reasons exist for persons other than the account holder to access computers, electronic files, or data related to use of the University network, including but not limited to: ensuring the continued confidentiality, integrity, and availability of university systems and operations; securing user and system data; ensuring lawful and authorized use of university systems; providing appropriately de-identified data for institutionally approved research projects; and responding to valid legal requests or demands for access to university systems and records. This policy seeks to balance individual freedom and privacy with the need for access by persons other than the account holder when necessary to serve or protect other core values and operations within the university or to meet a legal requirement.