Border Crossing Best Practices
Protecting Your Devices, Data and Self In Liminal Legal Zones
While some of the advice below is US-specific, it can also be helpful and relevant in any other border crossing situation.
Create a "Check-In Circle" Group
INVITE: Invite at least two people, a friend and family member, who are available to support you, to a dedicated group chat to monitor your travel
CHECK-IN: When you land, before immigration, let them know where you are, and that you will check-in again in 1-3 hours. Confirm receipt, and wait.
ACTIVATE: If no response after 3 hours, support circle should activate response to legal and other community resources
Minimize the Data You Carry Across the Border
LEAVE: Leave unnecessary devices at home.
BURNER: Use a temporary device or travel-specific accounts.
PRINT: Use paper to keep important information like contact phone numbers and travel documents
Use Encryption to Protect Your Devices and Data
ENCRYPT: Enable full-disk encryption on your laptop and phone.
PASSWORD: Choose strong passwords instead of fingerprint or face ID authentication, as biometric data may not be legally protected.
POWER-OFF: Power off your devices before reaching the border to reset security protections.
Avoid Implicit Consent to Searches
CLARIFY: If border agents ask for access, clarify whether it is a request or an order.
DECLINE: If it is a request, politely decline.
PROTEST: If ordered, consider stating that you are complying under protest.
Secure Your Social Media and Online Accounts
LOGOUT: Log out of accounts before crossing the border.
REMOVE: Consider uninstalling sensitive apps or removing saved login credentials.
DEACTIVATE: Temporarily deactivate social media profiles or adjust privacy settings to restrict access.
Know Your Rights and the Risks of Refusal
SEIZED: U.S. citizens cannot be denied entry but may have their devices seized.
DENIED: Non-citizens can be denied entry if they refuse to comply.
DEPORTED: Lawful permanent residents and non-citizens alike face potential complications regarding their status.
Use Strong Passwords and Avoid Biometric Authentication
STRENGTH: A complex password is more secure than a fingerprint or face ID.
PROTECT: Some courts have ruled that passwords are protected under the Fifth Amendment, but fingerprints or other biometrics are not.
Back Up Your Data Before Traveling
BACKUP: Have an encrypted backup stored at home or in a secure cloud.
LOSS: If your device is seized, you won’t lose valuable information.
Document Rights Violations
DETAIL: write down the details as soon as possible.
IDENTIFY: Note officers’ badge numbers and names.
COMPLAIN: Consider filing a complaint with a legal advocacy group.
Stay Calm, Be Respectful, and Do Not Lie
TRUTH: Lying to a federal agent is a crime.
CALM: Do not physically interfere with agents’ searches.
COMPOSED: Remain composed and strategically decide whether to comply or refuse.
Read and review more from these sources:
EFF Digital Privacy at the U.S. Border: Protecting the Data On Your Devices: https://www.eff.org/wp/digital-privacy-us-border-2017
EFF Border Search Pocket Guide: https://www.eff.org/document/eff-border-search-pocket-guide
Device Security: Preparing for Theft, Loss or Confiscation: https://guide.globalsupport.link/physical/device-security-preparing-for-theft-loss-or-confiscation
A Safe Trip: It's All in the Preparation: https://guide.globalsupport.link/physical/a-safe-trip-its-all-in-the-preparation
Last updated
Was this helpful?