🌐
Global Support Link
  • Welcome to Your Help Desk
  • 📱Digital Security
    • Keeping Your Devices and Physical Space Safe
    • Safeguard your Conversation and Shared Secrets
    • You are the Best Antivirus
    • Better Living through Threat Modeling!
  • 🛅Physical Security
    • Analyzing Risk
    • A Safe Trip: It's All in the Preparation
    • Device Security: Preparing for Theft, Loss or Confiscation
    • Hotel Security
    • Tips to Mitigate Common Risks
    • Border Crossing Best Practices
  • 👯About Us
  • ☎️Ask for Help!
Powered by GitBook

Languages

  • Español
On this page

Was this helpful?

  1. Physical Security

Border Crossing Best Practices

Protecting Your Devices, Data and Self In Liminal Legal Zones


While some of the advice below is US-specific, it can also be helpful and relevant in any other border crossing situation.

  1. Create a "Check-In Circle" Group

    • INVITE: Invite at least two people, a friend and family member, who are available to support you, to a dedicated group chat to monitor your travel

    • CHECK-IN: When you land, before immigration, let them know where you are, and that you will check-in again in 1-3 hours. Confirm receipt, and wait.

    • ACTIVATE: If no response after 3 hours, support circle should activate response to legal and other community resources

  2. Minimize the Data You Carry Across the Border

    • LEAVE: Leave unnecessary devices at home.

    • BURNER: Use a temporary device or travel-specific accounts.

    • PRINT: Use paper to keep important information like contact phone numbers and travel documents

  3. Use Encryption to Protect Your Devices and Data

    • ENCRYPT: Enable full-disk encryption on your laptop and phone.

    • PASSWORD: Choose strong passwords instead of fingerprint or face ID authentication, as biometric data may not be legally protected.

    • POWER-OFF: Power off your devices before reaching the border to reset security protections.

  4. Avoid Implicit Consent to Searches

    • CLARIFY: If border agents ask for access, clarify whether it is a request or an order.

    • DECLINE: If it is a request, politely decline.

    • PROTEST: If ordered, consider stating that you are complying under protest.

  5. Secure Your Social Media and Online Accounts

    • LOGOUT: Log out of accounts before crossing the border.

    • REMOVE: Consider uninstalling sensitive apps or removing saved login credentials.

    • DEACTIVATE: Temporarily deactivate social media profiles or adjust privacy settings to restrict access.

  6. Know Your Rights and the Risks of Refusal

    • SEIZED: U.S. citizens cannot be denied entry but may have their devices seized.

    • DENIED: Non-citizens can be denied entry if they refuse to comply.

    • DEPORTED: Lawful permanent residents and non-citizens alike face potential complications regarding their status.

  7. Use Strong Passwords and Avoid Biometric Authentication

    • STRENGTH: A complex password is more secure than a fingerprint or face ID.

    • PROTECT: Some courts have ruled that passwords are protected under the Fifth Amendment, but fingerprints or other biometrics are not.

  8. Back Up Your Data Before Traveling

    • BACKUP: Have an encrypted backup stored at home or in a secure cloud.

    • LOSS: If your device is seized, you won’t lose valuable information.

  9. Document Rights Violations

    • DETAIL: write down the details as soon as possible.

    • IDENTIFY: Note officers’ badge numbers and names.

    • COMPLAIN: Consider filing a complaint with a legal advocacy group.

  10. Stay Calm, Be Respectful, and Do Not Lie

  • TRUTH: Lying to a federal agent is a crime.

  • CALM: Do not physically interfere with agents’ searches.

  • COMPOSED: Remain composed and strategically decide whether to comply or refuse.

Read and review more from these sources:

PreviousTips to Mitigate Common RisksNextAbout Us

Last updated 2 months ago

Was this helpful?

EFF Digital Privacy at the U.S. Border: Protecting the Data On Your Devices:

EFF Border Search Pocket Guide:

Device Security: Preparing for Theft, Loss or Confiscation:

A Safe Trip: It's All in the Preparation:

🛅
https://www.eff.org/wp/digital-privacy-us-border-2017
https://www.eff.org/document/eff-border-search-pocket-guide
https://guide.globalsupport.link/physical/device-security-preparing-for-theft-loss-or-confiscation
https://guide.globalsupport.link/physical/a-safe-trip-its-all-in-the-preparation