Tech Security While Crossing Borders
Planning Ahead: Before Your Trip
Minimize What You Carry
- Leave devices at home when possible - border agents cannot search what you don't bring
- Use a temporary "travel" device with minimal data loaded on it
- Remove sensitive information from devices you must bring
- Consider which apps you actually need - fewer is better
Backup Everything
- Make complete backups of all devices to encrypted storage (leave at home)
- Ensure cloud backups are current and accessible remotely after crossing
- Document device serial numbers for insurance/tracking purposes
- Remember: You may need to factory reset devices, so backups are critical
Protect Data You Carry Over the Border
Encryption (Most Important)
- Use full-disk encryption on all devices (FileVault for Mac, BitLocker for Windows, built-in for iOS/Android)
- Encryption makes data unreadable without your password
- Create a strong password for your devices: Use 4-6 random words or a long passphrase (12+ characters)
- Do NOT rely on biometric locks alone (fingerprint, Face ID) - use strong passwords or PINs
Power Off Your Devices
- Turn off all devices completely before reaching the border (don't just sleep/lock them)
- This protects against sophisticated attacks that only work on powered-on devices
- Powering off also forces password entry rather than biometric unlock
Additional Preparations
- Log out of cloud services and apps you won't need during travel
- Clear browser history and remove saved passwords
- Consider temporarily uninstall messaging apps
- Consider making social media profiles temporarily private
At the Border: Know Your Rights
Your Legal Status Matters
U.S. Citizens:
- Cannot be denied entry to the U.S. for refusing to unlock devices or provide passwords
- However, refusal may result in device seizure, extensive questioning, and significant delays
- You have the right to remain silent and cannot be compelled to answer questions about religion or political beliefs
Lawful Permanent Residents (Green Card Holders):
- Generally cannot be denied re-entry for refusing to unlock devices
- However, agents may raise questions about your continued status as a resident
- Do not give up your green card voluntarily
Foreign Visitors (Visa/VWP travelers):
- May be denied entry for refusing to unlock devices or provide passwords
- Face the highest risk of consequences for non-compliance
- Should carefully weigh risks before traveling with sensitive data
What Border Agents Can Do
- Border agents claim authority to search electronic devices without any suspicion
- They can demand that you unlock devices, provide passwords, or disclose social media information
- They can seize devices for extended examination (days, weeks, or months)
Important Legal Developments:
- A 2019 federal court ruled that suspicionless searches of electronic devices may be unconstitutional
- However, current CBP policy still allows searches without individualized suspicion
- Legal protections continue to evolve - this is contested territory
If Asked to Unlock Your Device
Basic Rules for Everyone:
- Stay calm and respectful - getting emotional may escalate the situation
- Do not lie - lying to federal agents is a federal crime
- Do not physically interfere - comply with demands to hand over devices
- Document everything - try to note agent names, badge numbers, and what was accessed
Your Options:
Option 1: Comply
- If you unlock your device, agents can search all content and make copies
- Consider stating you are complying "under protest and without consent"
- Request that searches be conducted in front of a supervisor
Option 2: Decline
- Politely ask whether they are ordering or requesting you unlock the device
- If it's a request, you can decline
- If it's an order and you refuse:
- U.S. Citizens: May face device seizure, delays, additional questioning, but cannot be denied entry
- LPRs: Similar to citizens, but may face immigration status questions
- Foreign visitors: May be denied entry to the U.S.
If Your Device is Seized:
- Request a receipt (Customs Form 6051D) documenting what was taken
- Ask when you can expect the device to be returned
- Do not expect quick return - devices may be held for months
Special Considerations
Attorney-Client Privilege:
- If you're an attorney carrying privileged communications, inform agents
- CBP policy requires agents to consult their legal office before searching privileged materials
- However, this is not a complete protection
Journalists:
- Protecting confidential sources is critical
- Consider not traveling with sensitive source information
- Document any attempts to access source materials
Cloud Data:
- CBP policy (as of 2017) states agents should only search data "physically resident on the device"
- They should not use your device to access cloud content
- However, enforcement of this policy is unclear
- If asked for cloud account passwords, you can decline (but face consequences noted above)
- Border agents may ask for social media identifiers/handles
- They may ask to see social media content on your phone
- Foreign visitors on Visa Waiver Program are asked to "voluntarily" provide social media identifiers
After Crossing: Post-Travel Security
Immediate Actions
- Change all passwords if you unlocked devices for border agents or provided passwords
- Review account activity logs for unauthorized access
- Check devices for new apps, configuration changes, or suspicious files
- Enable 2FA if it was disabled for travel
Device Inspection
- Consider devices potentially compromised if seized or extensively searched
- Have IT staff conduct security inspection if you have organizational support
- For highly sensitive situations, wipe device and restore from backup
Documentation and Reporting
- Write down everything that happened as soon as possible
- Note all agents involved (names, badge numbers, agencies)
- If your rights were violated, contact:
- EFF at borders@eff.org
- ACLU for civil rights complaints: https://www.dhs.gov/file-civil-rights-complaint
- Your organization's legal counsel
High-Risk Travelers: Special Precautions
Journalists, Attorneys, Healthcare Workers, Activists:
- You have professional obligations to protect confidential information
- Strongest protection: Don't bring sensitive data across the border
- Access via secure cloud connection after clearing border
- Use burner devices with minimal/no sensitive data
- Ship devices separately (though they can still be searched)
Organizations Should:
- Establish clear travel security policies
- Identify which roles require burner devices
- Provide temporary travel devices when needed
- Create protocols for accessing sensitive data remotely after crossing
- Have incident response procedures for device seizures
Resources
Official Guides:
- EFF's Digital Privacy at the U.S. Border: https://www.eff.org/wp/digital-privacy-us-border-2017
- ACLU Know Your Rights: https://www.aclu.org/know-your-rights/what-do-when-encountering-law-enforcement-airports-and-other-ports-entry-us
Tools and Services:
- Full-disk encryption: FileVault (Mac), BitLocker (Windows), built-in (iOS/Android)
- Password managers: 1Password, Bitwarden
- Secure deletion tools: See EFF's Surveillance Self-Defense guide
- Cloud storage: Consider services with client-side encryption like Tresorit
File Complaints:
- CBP: https://www.cbp.gov/contact/ports
- DHS Office of Civil Rights and Civil Liberties: https://www.dhs.gov/file-civil-rights-complaint
- Traveler Redress Inquiry Program (TRIP) if you believe you're on a watchlist: https://www.dhs.gov/dhs-trip