{"id":3224,"date":"2025-03-30T00:01:54","date_gmt":"2025-03-30T00:01:54","guid":{"rendered":"https:\/\/gunowner-news.com\/?p=3224"},"modified":"2025-03-30T00:01:54","modified_gmt":"2025-03-30T00:01:54","slug":"crossing-the-u-s-border-heres-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/gunowner-news.com\/?p=3224","title":{"rendered":"Crossing the U.S. Border? Here\u2019s How to Protect Yourself"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"has-underline\">The crackdown is<\/span> already happening. First, Mahmoud Khalil was <a href=\"https:\/\/theintercept.com\/2025\/03\/11\/mahmoud-khalil-columbia-ice-louisiana\/\">snatched <\/a>from his home in New York. Then, immigrants in the U.S. were <a href=\"https:\/\/theintercept.com\/2025\/03\/28\/ice-warrants-columbia-students-gaza-protests\/\">targeted<\/a> for their <a href=\"https:\/\/theintercept.com\/2025\/03\/24\/briefing-podcast-momodou-taal\/\">political views<\/a>, and foreigners reported being denied entry at the border after having their devices searched.<\/p>\n<p>Even before Donald Trump was sworn in, border searches of electronics were steadily rising. With fears mounting about the Trump administration\u2019s attack on dissent, citizens and noncitizens alike are wondering how to protect their privacy.<\/p>\n<p>Experts say it is important to have a plan before you cross the border, to know the law, and to do what you can to minimize your digital footprint. The plans can vary widely based on a person\u2019s immigration status and other factors.<\/p>\n<p>Here are some tips on the law \u2014 and how to prevent the U.S. government from using your own data against you.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-know-the-law\">Know the Law<\/h2>\n<p>If you think you will simply be able to decline when a border agent asks you to hand over your phone or computer, think again.<\/p>\n<p>U.S. Customs and Border Protection claims broad authority to rifle through the electronic devices of traveling into and out of the country, regardless of their citizenship status. American citizens can decline to hand over their password or PIN code \u2014 but that could result in travel delays and in device confiscation, experts warn.<\/p>\n<p>CBP claims to place some limits on its own searches of devices, and courts have issued <a href=\"https:\/\/www.aclu.org\/news\/privacy-technology\/can-border-agents-search-your-electronic\">conflicting rulings<\/a> about the extent of the government\u2019s authority to search electronic devices collected at the border.<\/p>\n<p>One of CBP\u2019s policies states that border agents are not supposed to search information that has only been stored remotely. As a practical matter, that often means that border agents put a phone into airplane mode before searching it.<\/p>\n<p>Sophia Cope, an attorney with the Electronic Frontier Foundation, said it was useful to know CBP policies.<\/p>\n<p>\u201cWe know federal officers often don\u2019t follow the law and their own policy,\u201d said Cope, whose organization has<a href=\"https:\/\/www.eff.org\/wp\/digital-privacy-us-border-2017\"> published its own guide for travelers<\/a>. \u201cIf you know they\u2019re supposed to put the phone in airplane mode, for example, you can ask them about that.\u201d<\/p>\n<p>CBP <a href=\"https:\/\/www.cbp.gov\/travel\/cbp-search-authority\/border-search-electronic-devices\">says<\/a> that its officers can conduct \u201cbasic\u201d searches \u2014 where an officer scrolls through a device\u2019s contents on the spot \u2014 at their discretion. \u201cAdvanced,\u201d forensic searches where devices are connected to outside devices for review are only supposed to occur upon \u201creasonable\u201d suspicion of legal violations or a national security concern.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-have-a-plan\">Have a Plan<\/h2>\n<p>It is important to think about what you will do if a border agent asks for your personal devices well before you head to the airport. The last thing you want to do is to be caught flat-footed, Cope said.<\/p>\n<p>Her organization has recommended that travelers conduct a risk analysis based on their personal profile, including whether they are a citizen, lawful permanent resident, or visa holder, as well as what kind of data is stored on their device.<\/p>\n<p><!-- BLOCK(cta)[0](%7B%22componentName%22%3A%22CTA%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%7D) --><\/p>\n<p><!-- END-BLOCK(cta)[0] --><\/p>\n<p>Citizens have the right to reenter the U.S., but they can still have their devices seized. The ACLU <a href=\"https:\/\/www.aclu.org\/news\/privacy-technology\/can-border-agents-search-your-electronic\">says the same \u201cshould\u201d be true<\/a> for lawful permanent residents, also known as green card holders. However, the group also recommends that noncitizens concerned about having their devices searched \u201cshould consult with an immigration lawyer about your particular circumstances before traveling.\u201d<\/p>\n<p>Visa holders, meanwhile, could be outright refused entry.<\/p>\n<p>\u201cIt really just depends on what the person\u2019s unique situation is, and what their tolerance level is for confrontation and delay and short-term detention and missing their flights and \u2014 in more extreme cases \u2014 having their immigration status questioned,\u201d Cope said.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-consider-leaving-your-usual-devices-at-home\">Consider Leaving Your Usual Devices at Home<\/h2>\n<p>The best way to protect your personal and work devices from search and seizure is simply to leave them at home. Get separate devices that you only use when traveling, and reset them before each trip.<\/p>\n<p>Cheaper and refurbished devices may suffice for many trips. If you absolutely need your usual devices on your trip, consider mailing them to your destination, although this could raise its own risks.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-log-out-and-power-down\">Log Out and Power Down<\/h2>\n<p>Before you get to a security checkpoint, and ideally before you\u2019re even at your port of entry or exit, fully power off all of your devices. This is important because some devices are\u00a0in a more secure state before you log in to it for the first time after you\u2019ve previously shut it down. For instance,<a href=\"https:\/\/theintercept.com\/2022\/02\/08\/cellebrite-phone-hacking-government-agencies\/\"> forensics<\/a> firms <a href=\"https:\/\/cellebrite.com\/en\/what-can-be-recovered-from-bfu-data-collection\/\">distinguish<\/a> between iPhones in \u201cbefore first unlock\u201d versus \u201cafter first unlock\u201d states, with the former coyly described as \u201cless helpful\u201d for data extraction.<\/p>\n<p>Part of practicing strong digital security is making sure you\u2019re exercising what\u2019s known as \u201cdefense in depth\u201d: Making sure that should one level of security fail, another layer of protection is in place, just in case. For this reason, be sure to log out of all of your accounts before you power down. You could go as far as deleting the apps you\u2019ve logged out from altogether, and reinstalling them after you\u2019re safely beyond the security checkpoint.<\/p>\n<p>If you are worried about remembering a long list of passwords, that is a good sign you should use password manager software instead. <a href=\"https:\/\/ssd.eff.org\/module\/choosing-the-password-manager-that-s-right-for-you\">Recommended by many experts<\/a>, a password manager allows you to use one password to unlock all of your passwords. If your password manager has a <a href=\"https:\/\/1password.com\/features\/travel-mode\/\">travel mode<\/a> that lets you restrict which specific accounts to display for the duration of your travel, enable it.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-disable-biometrics\">Disable Biometrics<\/h2>\n<p>Make sure that you\u2019re using an alphanumeric password to access your phone and other devices. Turn off all biometrics like fingerprint access and facial recognition (branded Touch ID and Face ID, respectively, on iPhones). Otherwise, authorities could put your phone up in front of your face to gain access.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-protect-your-data\">Protect Your Data<\/h2>\n<p>Aside from making sure you\u2019re not logged into sensitive accounts, you should also make sure you\u2019re not storing sensitive data on your phone. One option is to download data from your phone onto an encrypted device you\u2019re not traveling with and leave it at home. Another option, if you need access to some data on the road, is to encrypt it using a tool like <a href=\"https:\/\/cryptomator.org\/\">Cryptomator<\/a>, store it on a cloud storage provider, and then download it when you\u2019ve reached your destination.<\/p>\n<p>If you\u2019re using an iPhone, you could back up your phone data using iCloud \u2014 just make sure you have Apple\u2019s end-to-end encryption solution, <a href=\"https:\/\/support.apple.com\/guide\/security\/advanced-data-protection-for-icloud-sec973254c5f\/web\">Advanced Data Protection<\/a>, enabled. (If you\u2019re in certain regions, such as <a href=\"https:\/\/www.theguardian.com\/technology\/2025\/feb\/21\/apple-removes-advanced-data-protection-tool-uk-government\">the U.K.<\/a>, you\u2019ll need to switch your region location before you can use this feature.)<\/p>\n<p>Don\u2019t forget to make sure you also protect any sensitive contacts. Go through your contacts lists and remove any persons whose affiliation with you may potentially cause issues; for instance, if you have the names of activists, human rights defenders, or other sensitive sources. You could even export and then delete your entire contacts list and restore it later.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-at-high-risk\">At High Risk?<\/h2>\n<p>If you believe you are at especially high risk when crossing the border, there are more advanced steps you can take.<\/p>\n<p>One option goes beyond leaving your phone at home. You could also leave your SIM card and phone number behind too. Let your contacts know that you\u2019ll have a temporary number while traveling. You can purchase a <a href=\"https:\/\/theintercept.com\/2023\/04\/29\/phone-laptop-security-international-travel\/\">temporary SIM<\/a> once you\u2019re in the country, or beforehand. The reason to leave behind your number is the same as leaving behind your phone \u2014 you don\u2019t want the authorities or anyone else to take control of your phone number. For instance, if the authorities take your SIM card and place it into their own device, they may be able to receive messages and calls meant for you.<\/p>\n<p><!-- BLOCK(newsletter)[1](%7B%22componentName%22%3A%22NEWSLETTER%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%7D) --><\/p>\n<div class=\"newsletter-embed flex-col items-center print:hidden\" id=\"third-party--article-mid\" data-module=\"InlineNewsletter\" data-module-source=\"web_intercept_20241230_Inline_Signup_Replacement\">\n<div class=\"-mx-5 sm:-mx-10 p-5 sm:px-10 xl:-ml-5 lg:mr-0 xl:px-5 bg-accentLight hidden\" data-name=\"subscribed\">\n<h2 class=\"font-sans font-light uppercase text-[30px] leading-8 text-white tracking-[0.01em] mb-0\">\n      We\u2019re independent of corporate interests \u2014 and powered by members. Join us.    <\/h2>\n<p>    <a href=\"https:\/\/join.theintercept.com\/donate\/now\/?referrer_post_id=488797&amp;referrer_url=https%3A%2F%2Ftheintercept.com%2F2025%2F03%2F29%2Fcustoms-us-border-travel-airports-phone-searches%2F&amp;source=web_intercept_20241230_Inline_Signup_Replacement\" class=\"border border-white !text-white font-mono uppercase p-5 inline-flex items-center gap-3 hover:bg-white hover:!text-accentLight focus:bg-white focus:!text-accentLight\" data-name=\"donateCTA\" data-action=\"handleDonate\"><br \/>\n      Become a member      <span class=\"font-icons icon-TI_Arrow_02_Right\"\/><br \/>\n    <\/a>\n  <\/div>\n<div class=\"group default w-full px-5 hidden\" data-name=\"unsubscribed\">\n<div class=\"px-5 border-[10px] border-accentLight\">\n<div class=\"bg-white -my-2.5 relative block px-4 md:px-5\">\n<h2 class=\"font-sans font-body text-[30px] font-bold tracking-[0.01em] leading-8 mb-0 xl:text-[37px] xl:leading-[39px]\">\n          <span class=\"group-[.subscribed]:hidden\"><br \/>\n            Join Our Newsletter          <\/span><br \/>\n          <span class=\"group-[.default]:hidden\"><br \/>\n            Thank You For Joining!          <\/span><br \/>\n        <\/h2>\n<p class=\"text-[27px] mb-3.5 font-bold text-accentLight tracking-[0.01em] leading-[29px] font-sans xl:text-[37px] xl:leading-[39px]\">\n          <span class=\"group-[.subscribed]:hidden\"><br \/>\n            Original reporting. Fearless journalism. Delivered to you.          <\/span><br \/>\n          <span class=\"group-[.default]:hidden\"><br \/>\n            Will you take the next step to support our independent journalism by becoming a member of The Intercept?          <\/span>\n        <\/p>\n<p>        <a href=\"https:\/\/join.theintercept.com\/donate\/now\/?referrer_post_id=488797&amp;referrer_url=https%3A%2F%2Ftheintercept.com%2F2025%2F03%2F29%2Fcustoms-us-border-travel-airports-phone-searches%2F&amp;source=web_intercept_20241230_Inline_Signup_Replacement\" class=\"group-[.default]:hidden border border-accentLight text-accentLight font-sans px-5 py-3.5 inline-flex items-center gap-3 text-[20px] font-bold\" data-action=\"handleDonate\"><br \/>\n          Become a member          <span class=\"font-icons icon-TI_Arrow_02_Right\"\/><br \/>\n        <\/a><\/p>\n<div class=\"font-sans text-accentLight text-[10px] leading-[13px] text-balance [&amp;_a]:text-accentLight [&amp;_a]:font-bold [&amp;_a:hover]:underline group-[.subscribed]:hidden\">\n<p>By signing up, I agree to receive emails from The Intercept and to the <a href=\"https:\/\/theintercept.com\/privacy-policy\/\">Privacy Policy<\/a> and <a href=\"https:\/\/theintercept.com\/terms-use\/\">Terms of Use<\/a>.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p><!-- END-BLOCK(newsletter)[1] --><\/p>\n<p>Keep in mind that if you\u2019re using SMS verification as a form of two-factor authentication for any accounts, you\u2019ll need to temporarily update it to your current number, or have someone with access to your phone at home be able to log you in.<\/p>\n<p>Ideally, however, you shouldn\u2019t be using SMS for two-factor authentication in the first place, as it\u2019s vulnerable to <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365-life-hacks\/privacy-and-safety\/what-is-sim-swapping\">attackers taking control of your phone number<\/a>. If there is no other form of two-factor authentication, SMS authentication is still better than nothing at all.<\/p>\n<p>If you\u2019re apprehensive that having a phone with minimal information on it may in itself cause you to stand out during an intrusive security check \u2014 which experts say is a legitimate concern \u2014 keep in mind that it may be preferable to revealing sensitive information.<\/p>\n<p>Another, more elaborate protection option, is\u00a0what the intelligence community calls <a href=\"https:\/\/aleph.occrp.org\/datasets\/1061?cslimit=30#mode=search&amp;preview%3Aid=5cf88370716b0d35f5f6f298ceb07ced6301bdd4.3ff78af3808ce6d817cc6f7dd3ce7dbd33bafa24&amp;preview%3Aprofile=true\">persona development<\/a>: Creating alternate accounts which don\u2019t contain any sensitive information. In other words, you can snap innocuous photos and upload them to separate social media accounts for traveling. If your phone is searched, only these accounts will then be visible to the authorities.<\/p>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/theintercept.com\/2025\/03\/29\/customs-us-border-travel-airports-phone-searches\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The crackdown is already happening. First, Mahmoud Khalil was snatched from his home in New York. Then, immigrants in the U.S. were targeted for their political views, and foreigners reported being denied entry at the border after having their devices searched. Even before Donald Trump was sworn in, border searches of electronics were steadily rising. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3225,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":{"0":"post-3224","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-usa-news"},"_links":{"self":[{"href":"https:\/\/gunowner-news.com\/index.php?rest_route=\/wp\/v2\/posts\/3224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gunowner-news.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gunowner-news.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gunowner-news.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gunowner-news.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3224"}],"version-history":[{"count":0,"href":"https:\/\/gunowner-news.com\/index.php?rest_route=\/wp\/v2\/posts\/3224\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gunowner-news.com\/index.php?rest_route=\/wp\/v2\/media\/3225"}],"wp:attachment":[{"href":"https:\/\/gunowner-news.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gunowner-news.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gunowner-news.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}