Border Crossing Best Practices

Protecting Your Devices, Data and Self In Liminal Legal Zones


While some of the advice below is US-specific, it can also be helpful and relevant in any other border crossing situation.

  1. Create a "Check-In Circle" Group

    • INVITE: Invite at least two people, a friend and family member, who are available to support you, to a dedicated group chat to monitor your travel

    • CHECK-IN: When you land, before immigration, let them know where you are, and that you will check-in again in 1-3 hours. Confirm receipt, and wait.

    • ACTIVATE: If no response after 3 hours, support circle should activate response to legal and other community resources

  2. Minimize the Data You Carry Across the Border

    • LEAVE: Leave unnecessary devices at home.

    • BURNER: Use a temporary device or travel-specific accounts.

    • PRINT: Use paper to keep important information like contact phone numbers and travel documents

  3. Use Encryption to Protect Your Devices and Data

    • ENCRYPT: Enable full-disk encryption on your laptop and phone.

    • PASSWORD: Choose strong passwords instead of fingerprint or face ID authentication, as biometric data may not be legally protected.

    • POWER-OFF: Power off your devices before reaching the border to reset security protections.

  4. Avoid Implicit Consent to Searches

    • CLARIFY: If border agents ask for access, clarify whether it is a request or an order.

    • DECLINE: If it is a request, politely decline.

    • PROTEST: If ordered, consider stating that you are complying under protest.

  5. Secure Your Social Media and Online Accounts

    • LOGOUT: Log out of accounts before crossing the border.

    • REMOVE: Consider uninstalling sensitive apps or removing saved login credentials.

    • DEACTIVATE: Temporarily deactivate social media profiles or adjust privacy settings to restrict access.

  6. Know Your Rights and the Risks of Refusal

    • SEIZED: U.S. citizens cannot be denied entry but may have their devices seized.

    • DENIED: Non-citizens can be denied entry if they refuse to comply.

    • DEPORTED: Lawful permanent residents and non-citizens alike face potential complications regarding their status.

  7. Use Strong Passwords and Avoid Biometric Authentication

    • STRENGTH: A complex password is more secure than a fingerprint or face ID.

    • PROTECT: Some courts have ruled that passwords are protected under the Fifth Amendment, but fingerprints or other biometrics are not.

  8. Back Up Your Data Before Traveling

    • BACKUP: Have an encrypted backup stored at home or in a secure cloud.

    • LOSS: If your device is seized, you won’t lose valuable information.

  9. Document Rights Violations

    • DETAIL: write down the details as soon as possible.

    • IDENTIFY: Note officers’ badge numbers and names.

    • COMPLAIN: Consider filing a complaint with a legal advocacy group.

  10. Stay Calm, Be Respectful, and Do Not Lie

  • TRUTH: Lying to a federal agent is a crime.

  • CALM: Do not physically interfere with agents’ searches.

  • COMPOSED: Remain composed and strategically decide whether to comply or refuse.

Read and review more from these sources:

Last updated

Was this helpful?