Close X
Thursday, April 17, 2025
ADVT 
Tech

One Tech Tip: Locking down your device when crossing borders

Darpan News Desk The Canadian Press, 10 Apr, 2025 12:17 PM
  • One Tech Tip: Locking down your device when crossing borders

LONDON (AP) — Planning an international trip? Travelers should prepare for the possibility of extra scrutiny of their phones when crossing borders, especially when entering the United States.

The Canadian government warned travelers in a recent travel advisory that U.S. border agents are entitled to search yourelectronic devices and “don’t need to provide a reason whenrequesting a password to open your device.”

Some recent cases have made travelers nervous about their privacy, such as when a Brown University professor with a U.S. visa was deported to Lebanon after border agents found a photo of Hezbollah’s leader on her phone.

“While 100% privacy may be impossible in these situations, there are a few things you can easily do that make it much harder for someone to see your private data even with physical access to your device,” said Patricia Egger, head of security at encrypted service Proton Mail.

Here are tips on protecting your device privacy while travelling:

What should I do before I set off?

Experts say the best strategy is to reduce the amount of information you’re carrying while traveling.

If possible, leave your phone at home. If you need one on yourtrip, borrow a tactic used by corporate executives looking to avoid hackers: get a temporary or “burner” device. It can contain just the information you need for your trip. Download anything else from the cloud when you need it.

If you have to bring your phone or laptop, upload sensitive information to a cloud storage service that uses end-to-end encryption, then delete the originals from your device.

Also, encrypt your phone or laptop’s storage drive and protect it with a strong password. Be aware this is different from merely having a device passcode lock, which is more easily cracked, or the end-to-end encryption on your favorite communication platforms.

Turn off fingerprint or facial recognition features and use the PIN or passcode instead.

What kind of search will be done at borders?

There are two kinds of searches, according to the U.S. Customs and Border Protection website.

In a basic search, an officer scrolls through your phone’s photos, emails, apps and files. No suspicion of wrongdoing is needed to conduct this type of search.

In an advanced search, the contents of your device could be copied for analysis. But a senior manager needs to sign off and there needs to be “reasonable suspicion” of a legal violation, except if there’s any concern for national security, according to the Electronic Frontier Foundation (EFF).

Who’s at risk of getting searched and what are they looking for?

“It’s hard to say,” says Sophia Cope, senior staff attorney at the EFF, which offers an extensive online guide to border privacy. Warrants are not needed to inspect devices belonging to anyone entering the country.

U.S. Customs and Border Protection agents carried out a total of more than 47,000 electronic device searches last year, up tenfold from a decade ago.

Basic searches “can be for no reason at all, totally random, or based on a mere hunch about someone – maybe based on how they look or an answer they gave to a preliminary question,” said Cope.

Travel history can also be relevant, for example, if a traveler originates from someplace where terrorism, drug trafficking, or child sex tourism is common, she said. Border agents can also search devices “at the behest” of other agencies like the FBI or if they’re associated with someone else of interest, such as a journalist’s source, a business associate or a family member.

What should I do when I get to the border?

Best to power off your devices when you touch down.

Under current policy, U.S. border agents are only allowed to look at information stored on the device, and not anything that’s kept in the cloud. So if you have to leave your phone on, make sure it’s kept in airplane mode or otherwise disconnected from the internet by Wi-Fi or cellular data.

“Before crossing the border, put your device in airplane mode to ensure remote files don’t get downloaded accidentally,” the Canadian government warns.

But keep in mind there might be cached data that still remains on your phone, such as files in the trash that haven’t been emptied.

What if I refuse?

American citizens can’t be denied entry to the United States for refusing to consent to device searches. The same should apply to lawful permanent residents such as green card holders, the American Civil Liberties Union says.

But agents can make things difficult if they’re refused. Travelers could be questioned, detained temporarily or have their devices seized and not returned for days or even weeks, rights groups say.

Foreign travelers could be turned back if they say no.

If you’re forced to unlock your device, Egger advises that “where you can, log in yourself rather than divulging any PINs or passwords, and if forced to share passwords, change them as soon as you can.”

Experts say the reason you should not use your device’s fingerprint or facial recognition feature is that it’s easier to compel you to unlock your device with biometrics. A border agent could simply hold your phone up to your face or force you to press your finger onto your device. There are also fears that police could use fingerprints stored on government databases.

Powering off your devices is another way to protect against sophisticated attacks in case you don’t consent to a search.

Most modern phones and some laptops encrypt their data using a strong cryptographic keys only accessible when the user unlocks it with the passcode, said Will Greenberg, the EFF’s senior staff technologist.

If the device is locked but not turned off, the key remains loaded on the device’s memory. Powerful hacking tools made by companies like Cellebrite can recover the key and decipher the data.

But if the device is off, the key is unloaded and can’t be accessed until it’s turned on again and unlocked with the passcode.

“This is why a border agent can’t simply turn a device on to use a tool like Cellebrite,” Greenberg said.

What about social media?

To be on the safe side, delete your social media apps and reinstall them later. Even though content is mainly stored on a social media company’s servers, Cope says some posts or images might remain on your phone’s memory cache and therefore viewable even in airplane mode.

What else can be searched?

It’s not just phones and laptops. Digital cameras, smartwatches, tablets, external hard drives and other electronic devices can be searched.

What not to do?

Some tactics might backfire. If you’re tempted to completely wipe your phone or laptop hard drive before you travel, experts warn it could raise scrutiny.

“If detected by a border agent, the fact that you wiped yourhard drive may prompt the agent to ask why you did so,” the EFF’s guide says. “Even traveling without devices or data that most travelers typically have could attract suspicion and questions.”

Also don’t try to hide information on your device, because border agents could find out, the group says. “Lying to border agents can be a serious crime, and the agents may take a very broad view of what constitutes lying,” it says.

What about other destinations?

Check local laws of your destination before you travel. For example, Britain’s counterterrorism law allows police to demand that people passing through the country’s border hand over devices along with passwords and PINs. If they refuse, they can be charged with terrorism.

MORE Tech ARTICLES

UBC scientists invent stir stick that detects drugs in drinks

UBC scientists invent stir stick that detects drugs in drinks
A team of researchers at the University of British Columbia want to make a stir stick drug testing tool for spiked drinks the norm in the hospitality industry, and they're gearing up to start "real-world testing" in hopes of commercializing the idea.

UBC scientists invent stir stick that detects drugs in drinks

AI Growth Expectations for 2025: The Next Frontier

AI Growth Expectations for 2025: The Next Frontier
AI is expected to become more pervasive and intuitive, with advancements in natural language processing, computer vision, and autonomous systems. Models such as OpenAI's GPT series are expected to offer more nuanced conversational abilities and a greater understanding of complex tasks. These AI tools will likely be embedded in everyday applications, from personalized virtual assistants to healthcare diagnostics and financial planning.

AI Growth Expectations for 2025: The Next Frontier

Google brings new Pixel 9 devices with advanced AI to India, expands footprint

Google brings new Pixel 9 devices with advanced AI to India, expands footprint
Doubling down on its India growth plans, Google on Tuesday unveiled its latest Pixel 9 series of devices with latest AI features for users in the country. To make Pixel smartphones more accessible, Google also announced expansions in its after-sales services with the launch of three Google-owned walk-in centres, in collaboration with Flipkart’s service arm.

Google brings new Pixel 9 devices with advanced AI to India, expands footprint

Group in charge of Google's $100M for news outlets lays out its governance model

Group in charge of Google's $100M for news outlets lays out its governance model
The Canadian Journalism Collective submitted plans to Canada's broadcasting regulator this week outlining the structure of the board that will ultimately oversee the funds. That submission was made public on Wednesday.

Group in charge of Google's $100M for news outlets lays out its governance model

Vancouver tech leaders launch new detection service to identify deepfake content

Vancouver tech leaders launch new detection service to identify deepfake content
A chance meeting 18 years ago of two dads dropping off their kids for kindergarten has started a technology journey that may change the face of protection against online harm. The dads are Praveen Varshney and Charles Gadalla, partners in a new company called Verifiction (link to website), based in Vancouver, which uses 17 different algorithms monitoring factors from blood flow to light sensitivity to determine the likelihood of content being real or fake.

Vancouver tech leaders launch new detection service to identify deepfake content

Musk's X faces major outage globally, including India

Musk's X faces major outage globally, including India
According to the outage monitor website DownDetector, over 64 per cent of people reported problems while using the application, 29 per cent while using the website, and 7 per cent with server connection.

Musk's X faces major outage globally, including India

PrevNext