You have nothing to hide. I found some chilling news that everybody already expected from Says Uncle. Apparently the TSA has been searching the electronic devices of travelers and going so far as to copy files and send them to third parties. From the link:
• In a span of just nine months, CBP officials searched over 1,500 electronic devices belonging to travelers. Under the current policy, they were not required to justify a single one of these searches.
• Travelers’ laptops are not the only devices at risk of being examined, detained, or seized by the government. In fact, cell phones were the most commonly searched and seized devices between October 2008 and June 2009.
• Other types of devices that were searched and detained during this time period include digital cameras, thumb drives, hard drives, and even DVDs.
• Between July 2008 and June 2009, CBP transferred electronic files found on travelers’ devices to third-party agencies almost 300 times. Over half the time, these unknown agencies asserted independent bases for retaining or seizing the transferred files. More than 80 percent of the transfers involved the CBP making copies of travelers’ files.
We need to have a chat for a second. When you have sensitive information it should be encrypted. A great tool to created encrypted partitions is TrueCrypt. It’s a great utility that even goes so far as to allow you to create hidden encrypted partitions in such a way you have plausible deniability should you be asked for the encryption key to a hidden partition (You can’t prove it’s there so they can’t hold you indefinitely if you say there isn’t one). On all of my computers my entire home directory is encrypted (Mac OS has a feature called FileVault that allows for easy home directory encryption). Furthermore important files are then put into a TrueCrypt partition.
Another option to consider when traveling with important and secure data is to not have it on any device you travel with. Put the information on a server and download it when you get to your destination. Some companies have started doing this practice. Nobody can get your data if it doesn’t exist.
Either way this is important and scary information. I know almost everybody assumed this was the case but it’s finally been confirmed. Encrypt everything, period.