{"id":20781,"date":"2018-01-23T09:00:22","date_gmt":"2018-01-23T14:00:22","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=20781"},"modified":"2019-11-15T06:42:13","modified_gmt":"2019-11-15T11:42:13","slug":"digital-searches-at-border","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/digital-searches-at-border\/20781\/","title":{"rendered":"Digital device searches at the border: 11 tips for safe travel"},"content":{"rendered":"<p>In the last couple of years, we\u2019ve seen a number of disturbing news items about people being stopped at border crossings and their digital devices being searched. At the Chaos Communication Congress, Kurt Opsahl and William Budington of the Electronic Frontier Foundation broke down what is actually happening in this area. Here\u2019s a recap of the talk with a dozen key facts and tips.<\/p>\n<h3>1. The agents don\u2019t care about your privacy<\/h3>\n<p>Governments treat borders like especially dangerous areas and tend to assert more power and authority to conduct searches at borders than they do in the rest of the country.<\/p>\n<p>It\u2019s safe to assume that border agents in any country you visit follow policies or laws that allow them to search your digital devices. It\u2019s also fair to assume they don\u2019t care much about safeguarding your privacy. (In cases where such searches aren\u2019t permitted, Opsahl and Budington, privacy advocates, didn\u2019t speak highly of border agents\u2019 adherence to the rules, either.)<\/p>\n<p>What can happen if you refuse to give agents your passwords to facilitate their search? Border agents have enough power to make your life harder if you don\u2019t comply. They can:<\/p>\n<ul>\n<li>Deny your entry if you are a visitor to the country (not if you\u2019re a citizen or a permanent resident);<\/li>\n<li>Waste a lot of your time, potentially making you miss a connecting flight and wrecking your travel\/business schedule;<\/li>\n<li>Seize your property, including digital devices.<\/li>\n<\/ul>\n<p>All in all, it\u2019s very stressful, especially after a long international flight, when you\u2019re eager to get out of the airport as fast as possible. But that doesn\u2019t mean you have to give up your privacy right away. A better way would be to prepare in advance, and that\u2019s exactly what this post is about.<\/p>\n<h3>2. Digital searches never happen at first-line check<\/h3>\n<p>The border agent you see first thing on arrival does a so-called first-line check. If everything seems all right, you\u2019re allowed entry and that\u2019s that. But if something about you looks suspicious, the agent will send you to the second-line check \u2014 and this is where your property, including digital devices, may be searched.<\/p>\n<p>Therefore, if you want to avoid digital searches (as well as other searches) it\u2019s a good idea to avoid second-line checks. Of course, it\u2019s not totally up to you, but at least you can do your best not to look suspicious. Some typical triggers that may cause a secondary check are:<\/p>\n<ul>\n<li>Communication difficulties;<\/li>\n<li>Irregularities in documentation;<\/li>\n<li>Database signals or database mismatches with your paper documents (for example, the wrong dates or a different spelling of your name on your travel visa).<\/li>\n<\/ul>\n<p>So before traveling, make sure your documents are in order. Prepare to show the border agent any additional papers you may be asked for (return tickets, hotel bookings, and such). At the border, be polite, calm, confident, and ready to explain where you are going and why, when you\u2019re planning to return home, and so on.<\/p>\n<h3>3. Digital searches don\u2019t happen very often<\/h3>\n<p>Even if you are sent to second-line check, that doesn\u2019t necessarily mean your devices will be searched. Numbers vary greatly for the largest European airports, from just 7% at Frankfurt to 48% at Paris Charles de Gaulle. In any case, there\u2019s a good chance that second-line screening will be limited to an interview and an additional documents check.<\/p>\n<p>All in all, although the number of digital searches is steadily increasing, they still don\u2019t happen very often. For example, in the US, the number of media searches at borders has grown from 4,764 in 2015 to 23,877 in 2016 and an estimated 30,000 in 2017, but that\u2019s out of about 400 million total border crossings per year, or about 1 in 13,000.<\/p>\n<h3>4. Lying to border agents is not recommended \u2014 and don\u2019t even think about getting physical<\/h3>\n<p>Lying to border agents is a crime in most countries. Probably not something to try. On top of that, if you\u2019re exposed in a lie, the odds of your device being searched skyrocket. With that said, the lie that you can\u2019t unlock your phone because you forgot your password is not a particularly clever or original one.<\/p>\n<p>Trying to interfere physically with border agents searching through your stuff is probably the worst course of action: They are well trained, and the consequences would not be nice.<\/p>\n<h3>5. Agents may have some tricks up their sleeves<\/h3>\n<p>Border agents may have special equipment for quick and effective extraction of data from mobile devices. The most notable examples are devices made by Cellebrite that can extract even deleted information. At least in some cases, this equipment can extract data even from locked devices.<\/p><div id=\"attachment_20782\" style=\"width: 780px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/01\/23074757\/Cellebrite-UFED-data-dump-main-page.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-20782\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/01\/23074757\/Cellebrite-UFED-data-dump-main-page.png\" alt=\"\" width=\"770\" height=\"716\" class=\"size-full wp-image-20782\"><\/a><p id=\"caption-attachment-20782\" class=\"wp-caption-text\">Note that Cellebrite software shows even deleted entries from a phone\u2019s call history, contacts, text messages, and so on<\/p><\/div>\n<h3>6. Fingerprints are weaker than passwords<\/h3>\n<p>Passwords are somewhat protected by the right to remain silent (not ultimate protection, but it\u2019s better than nothing), but fingerprints are not. Therefore, it\u2019s easier for border agents to order you to unlock a fingerprint-protected device than a password-protected one.<\/p>\n<p>Moreover, border agents don\u2019t actually have to ask for your fingerprint: They can just grab your finger and unlock your device. Additionally \u2014 although this is extraordinarily unlikely for the average traveler \u2014 if they have your fingerprints in a database, they can unlock your devices with a forged copy.<\/p>\n<p>The best way to ensure that won\u2019t happen is this: Enable Full Disk Encryption (FDE) in your operating system and switch off the device before you get to the border. You will be prompted to enter your password when you switch on the device, even if you normally use a fingerprint to unlock the screen. And using FDE is a good practice anyway.<\/p>\n<h3>7. People who are searched should document everything \u2014 and change their passwords<\/h3>\n<p>If you\u2019re searched, write down every detail: what agencies were involved, the names of the agents, badge numbers, what you were ordered to do, and so on. If any of your property is seized, get a receipt.<\/p>\n<p>After the encounter, immediately change any passwords you gave up to border agents. A good <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/advert\/password-manager?redef=1&amp;THRU&amp;reseller=gl_kdaily_acq_ona_smm__onl_b2c_kasperskydaily_ban____kpm___\" rel=\"noopener noreferrer nofollow\">password manager<\/a> can make this part a lot easier for you by creating strong, random passwords and storing them for you.<\/p>\n<h3>8. Cloud data is probably better protected than local data<\/h3>\n<p>Nowadays, we are used to privacy being ruined on a daily basis by government agencies sniffing around the cloud while not doing much to data stored locally on your devices. But when you\u2019re crossing a border, data in the cloud is likely to be better protected than data stored in device memory. At least, that\u2019s the case in the US. Border agents can search your device and data stored on it, but they don\u2019t have the right to search your data stored in the cloud.<\/p>\n<h3>9. Work devices probably fall under employer policies<\/h3>\n<p>Find out if your employer is OK with you taking your work devices over a border \u2014 and with the possible consequences of a digital search. Make sure you bear no responsibility in case such consequences, which could include corporate data loss or a data leak, take place. Consider leaving work devices at work if you don\u2019t really need them with you.<\/p>\n<h3>10. The best solution is not to bring your devices or data<\/h3>\n<p>Consider leaving behind not only your work devices, but personal devices as well. If you don\u2019t have the devices on you, there\u2019s nothing to search. However, having no devices at all can look very suspicious to border agents, so one solution would be to bring temporary devices.<\/p>\n<p>The same goes for your data: Don\u2019t bring it with you if you don\u2019t really need it. Store the data in the cloud, but do so securely: Either use cloud storage that supports client-side encryption (unfortunately, most popular service providers do not, but we <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/secure-dropbox-alternatives\/17270\/\" rel=\"noopener noreferrer nofollow\">have a guide on the services that do<\/a>) or encrypt the data before uploading.<\/p>\n<h3>11. Data safety is never guaranteed<\/h3>\n<p>Back up all of your data before traveling. Use strong passwords for every service or app and log out of the services before crossing any borders. It should go without saying that you need to protect your devices\u2019 operating systems with good passwords as well. As a bonus, these measures will help you if your device gets stolen which is more likely when you travel than at home.<\/p>\n<p>Delete any data that you don\u2019t need or that might raise questions at your destination (photos that might not matter at home but would be problematic in other countries, for example \u2014 showing a lot of skin, say, or drug use). Keep in mind that when you simply delete files, they are not really erased from the disk, so delete data securely.<\/p>\n<p>Deleting files securely is quite easy on laptops \u2014 you have plenty of options here, including plain and simple disk formatting (but keep in mind that you have to perform a \u201clow-level format,\u201d not a \u201cquick format\u201d), or special utilities that are available for all desktop operating systems. For example, <a target=\"_blank\" href=\"https:\/\/www.bleachbit.org\/download\" rel=\"noopener noreferrer nofollow\">BleachBit<\/a> wipes files and can clean browser and recent document history as well as somewhat obscure things like thumbnails (yep, these tiny previews of your files can persist even after the files are deleted).<\/p>\n<p>Secure deletion on mobile devices is a lot trickier, but still possible: Enable Full Disk Encryption and then wipe the encryption keys, making data nondecryptable. This operation is built into factory reset in iOS and in the \u201cpower wash\u201d function on Chromebooks (unfortunately, it\u2019s not available in Android).<\/p>\n<p>To learn more, I recommend watching the whole talk by Kurt Opsahl and Daniel Wegemer. It contains a lot of additional nuance, both legal and technical.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/HsGZKrjRYZI?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.<\/p>\n","protected":false},"author":421,"featured_media":20783,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1788],"tags":[2801,2800,2802,191,1198,43,192,2810],"class_list":{"0":"post-20781","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"tag-34c3","10":"tag-ccc","11":"tag-chaos-communication-congress","12":"tag-data","13":"tag-eff","14":"tag-privacy","15":"tag-protection","16":"tag-state-border"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/digital-searches-at-border\/20781\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/digital-searches-at-border\/12280\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/digital-searches-at-border\/10196\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/digital-searches-at-border\/14466\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/digital-searches-at-border\/12696\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/digital-searches-at-border\/12361\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/digital-searches-at-border\/14959\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/digital-searches-at-border\/19538\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/digital-searches-at-border\/4652\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/digital-searches-at-border\/9977\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/digital-searches-at-border\/15739\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/digital-searches-at-border\/9241\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/digital-searches-at-border\/19295\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/digital-searches-at-border\/19415\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/digital-searches-at-border\/19415\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/34c3\/","name":"34c3"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20781"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20781\/revisions"}],"predecessor-version":[{"id":29827,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20781\/revisions\/29827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20783"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}