Hot News
Sylndr, with fresh $15.7M, allows users to buy, sell, finance, and service used cars in Egypt
F1 announces partnership with Disney starting in 2026
The Benefits of High-Intensity Interval Training (HIIT) for Your Heart – MAXPRO Fitness
Brendan Foster: “I think it’s fantastic we’ve got these new shoes”
Hilary Duff Just Wore the Stylish Mom Jeans of the Summer
Breaking News and USA Updates with USAUpdate24
  • Home
  • Breaking
  • USA
  • Business
    • CEO
    • Founder
    • Entrepreneur
    • Journalist
    • Realtor
  • Health
    • Doctor
    • Plastic surgeon
    • Beauty cosmetics
  • Crypto
    • Trading
  • Entertainment
  • Science
  • Sports
    • Athlete
    • Coach
    • Fitness trainer
  • Technology
Reading: Locking down your device when crossing borders
  • bitcoinBitcoin(BTC)$105,577.442.15%
  • ethereumEthereum(ETH)$2,542.475.36%
  • tetherTether(USDT)$1.000.02%
  • rippleXRP(XRP)$2.362.55%
  • binancecoinBinance Coin(BNB)$649.061.43%
  • solanaSolana(SOL)$168.273.60%
  • usd-coinUSDC(USDC)$1.000.00%
  • dogecoinDogecoin(DOGE)$0.2244003.34%
  • cardanoCardano(ADA)$0.741.93%
  • staked-etherLido Staked Ether(STETH)$2,541.086.04%
Breaking News and USA Updates with USAUpdate24Breaking News and USA Updates with USAUpdate24
  • Home
  • Breaking
  • USA
  • Business
  • Health
  • Crypto
  • Entertainment
  • Science
  • Sports
  • Technology
Search
  • Home
  • Breaking
  • USA
  • Business
    • CEO
    • Founder
    • Entrepreneur
    • Journalist
    • Realtor
  • Health
    • Doctor
    • Plastic surgeon
    • Beauty cosmetics
  • Crypto
    • Trading
  • Entertainment
  • Science
  • Sports
    • Athlete
    • Coach
    • Fitness trainer
  • Technology
Follow US
©2025 USA Update24. All Rights Reserved.
Home » Blog » Locking down your device when crossing borders
USA

Locking down your device when crossing borders

Olivia Brown
Olivia Brown
Published April 13, 2025
Share

Contents
What should I do before leaving?What child or search will be on borders?Who is at risk of being registered and what are they looking for?What should I do when I get to the border?What happens if I refuse?What about social networks?What else can you look for?What not to do?What about other destinations?

By Kelvin Chan, AP business writer

London – Planning of an international trip? Travelers must prepare for the possibility of additional scrutiny of their phones when crossing borders, especially when they enter the United States.

The Canadian government warned travelers in a recent travel warning that the border agents of the United States have the right to search their electronic devices and “do not need to provide a reason when requesting a password to open their device.”

Some recent cases have made travelers nervous about their privacy, as a professor at Brown University with an American visa he was deported to Lebanon after the border agents found a photo of Hezbollah’s leader on his phone.

“While 100% privacy can be impossible in these situations, there are some things that can easily do that they make it much more difficult for someone to see their private data even with physical access to their device,” said Patricia Egger, Security Director of Service Proton Mail.

Here are tips to protect the privacy of your device while traveling:

What should I do before leaving?

Experts say that the best strategy is to reduce the amount of information it carries while traveling.

If possible, leave your phone at home. If you need one on your trip, ask a tactic used by corporate executives who seek to avoid hackers: get a temporary or “burner” device. You can contain only the information you need for your trip. Download anything else from the cloud when you need it.

If you have to carry your portable phone or computer, load confidential information to a cloud storage service that uses end -to -end encryption, then remove the originals from your device.

In addition, the storage unit of your telephone or laptop and protect it with a safe password. Keep in mind that this is different from having a single blocking of access code, which is fierce more easily or end -to -end encryption on its favorite communication platforms.

Turn off the functions of fingerprints or facial recognition and use the pin or password code.

A Customs and Patrol Officer observes how the National Secretary of National Security calls the San Ysidro entrance port, Sunday, March 16, 2025, in San Diego. (AP Photo/Alex Brandon)
A Customs and Patrol Officer observes how the National Secretary of National Security calls the San Ysidro entrance port, Sunday, March 16, 2025, in San Diego. (AP Photo/Alex Brandon)

What child or search will be on borders?

There are two types of searches, according to the US Customs and Border Protection website.

In a basic search, an officer moves through the photos, emails, applications and files of his phone. You don’t need to suspect irregularities to perform this type of search.

In an advanced search, the content of your device could be copied for analysis. But a senior manager must sign and there must be a “reasonable suspicion” or a legal violation, wait if there is any concern for national security, chordination to electronic Frontier Foundation (EFF).

Who is at risk of being registered and what are they looking for?

“It’s hard to say,” says Sophia Cope, EFF senior personnel lawyer, who sacrifices an extensive online guide of border privacy. Arrest orders are not needed to inspect devices that belong to anyone entering the country.

Customs agents and border protection of the USA. UU. They made a total of more than 47,000 searches for electronic devices last year, more than a decade ago.

Basic searches “can be without any reason, totally random or based on a simple hnech about anyone, perhaps depending on whether they seem or an answer, they face a preliminary question,” Cope said.

Travel history can also be relevant, for example, if a traveler originates from somewhere where terrorism, drug trafficking or child sex tourism is common, he said. Border agents can also look for devices “in the BEEST” of other agencies such as the FBI or if they are associated with some other place of interest, such as the source of a journalist, a commercial partner or a family member.

What should I do when I get to the border?

The best thing is to turn off your devices when it lands.

According to the current policy, US border agents can only look at the information stored on the device, and not nothing in the cloud. So, if you have to leave your phone on, make sure it stays on the plane or disconnect from the Internet by Wi-Fi or cellular data.

“Before crossing the edge, place your airplane mode device to ensure that remote files are not accidentally discharged,” warns the Canadian government.

But keep in mind that there may be data stored in cache that are still on your phone, such as archives in the garbage that have been emptied.

What happens if I refuse?

American citizens can be denied entry to the United States for refusing to consent to device searches. The same should be applied to permanent legal residents, such as green card holders, says the American Union of Civil Libertads.

But agents can hinder things if they are rejected. Travelers could be interrogated, temporarily detained or that their devices are seized and not return for days or even week, the rights groups say.

Foreign travelers could be returned if they say no.

If you are forced to unlock your device, Egger advises that “where you can, log in instead of disseminating any pin or password, and if you are forced to share passwords, change them as soon as I can.”

Experts say that the reason you should not use the digital footprint of your device or the facial recognition function is that it is easy to force it to unlock your device with biometry. A border agent could simply keep his phone to his face, force him to press his finger on his device. There are also their fears that the police can use digital footprints stored in government databases.

Vaining its devices is another way to protect against sophisticated attacks in case you do not consent to a search.

Most modern phones and some laptops encrypt their data using strong accessible cryptographic keys when the user unlocks it with the password code, said Will Greenberg, EFF main personnel technology.

If the device is blocked but not off, the key remains loaded in the device’s memory. The powerful piracy tools made by companies such as Cellebrite can recover the key and decipher the data.

But if the device is off, the key is downloaded and cannot be accessed until it is turned on again and unlocks with the pass code.

“That is why a border agent cannot simply turn on a device to use a tool like Cellebrite,” Greenberg said.

What about social networks?

To be sure, eliminate your social networks applications and reinstall them later. Although the content bothers mainly on the servers of social media companies, COPE says that some publications or images can remain in the memory cache of their phone and, therefore, can be seen in plane mode.

What else can you look for?

They are not just phones and laptops. You can look for digital cameras, smart watches, tablets, external hard drives and other electronic devices.

What not to do?

Some tactics can be counterproductive. If you are tempted to complete your phone or hard drive from the laptop before traveling, experts warn that the scrutiny could increase.

“If it is detected by a border agent, the fact that your hard drive is cleaned can ask why it did,” says the EFF guide. “Simply travel without devices or data that most travelers usually have could attract suspicions and questions.”

Nor do you try to hide information on your device, because border agents could find out, says the group. “Lying border agents can be a serious crime, and agents can have a very wide vision of what constitutes lying,” he says.

What about other destinations?

See the local laws of your destination before traveling. For example, the Law on Terrorism of Great Britain allows the police to demand that people pass through the country’s border hand on devices together with passwords and pins. If they refuse, they can be accused of terrorism.

Is there any technological theme that you think you need to explain? Write us in onetechtip@ap.org with your suggestions for future editions or technological council.

Originally published: April 13, 2025 at 6:00 am pdt

Previous Article ‘SNL’ spoofs Trump tariffs in ‘White Lotus’ sketch
Next Article Giants vs. Yankees odds, prediction
Popular News
Rahul Yadav Indian Entrepreneur Expands Business to South Africa
Bryan Kohberger’s Amazon Ka-Bar records ‘catastrophic’ for defense, experts say
Boston Mayor Michelle Wu blasts ‘presidents who think they are kings’
Fox News Digital’s News Quiz: March 21, 2025
Mysterious radio pulses from the Milky Way ‘are unlike anything we knew before’
Supernovas may have played a role in two of Earth’s largest mass extinctions, study suggests
  • USA
  • Entertainment
  • Market
  • Science
  • Technology
  • Business
  • CEO
  • Founder
  • Entrepreneur
  • Journalist
  • Crypto
  • Trading
  • Health
  • Doctor
  • Plastic Surgeon
  • Beauty Cosmetics
  • Sports
  • Athlete
  • Coach
  • Fitness Trainer
© 2017-2025 USA update24. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?