Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Facebook is starting to feed its Meta AI with private, unpublished photos

    June 27, 2025

    How vulnerable is critical infrastructure to cyberattack in the US?

    June 27, 2025

    I’m an Outdoor Writer. I’m Shopping 28 Deals From REI’s July 4 Sale

    June 27, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » How to Protect Yourself From Phone Searches at the US Border
    Security

    How to Protect Yourself From Phone Searches at the US Border

    News RoomBy News RoomApril 29, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Privacy and digital rights advocates largely prefer the approach of building a travel device from scratch, but they caution that a phone that is too squeaky clean, too much like a burner phone, can arouse suspicion.

    “You have to ‘seed’ the device. Use the phone for a day or even for a few hours. It just can’t be clean clean. That’s weird,” says Matt Mitchell, founder of CryptoHarlem, a security and privacy training and advocacy nonprofit. “My recommendation is to make a finsta for travel, because if they ask you what your profile is, how are you gonna say ‘I don’t use any social media’? Many people have a few accounts anyway. One ratchet, one wholesome—add one travel.”

    Cyr, from Amnesty International, also points out that a true burner phone would be a “dumb” phone, which wouldn’t be able to run apps for encrypted communications. “The advantage that we all have with smartphones is that you can communicate in an encrypted way,” Cyr says. “People should be conscious that any nonencrypted communication is less secure than a phone call or a message on an application like Signal.”

    While a travel device doesn’t need to use a prepaid SIM card bought with cash, it should not share your normal phone number, since this number is likely linked to most if not all of your key digital accounts. Buy a SIM card for your trip or only use the device on Wi-Fi.

    Traveling With Your Primary Phone

    The other approach you can take to protecting your device during border crossings is to modify your primary smartphone before travel. This involves removing old photos and messages and storing them somewhere else, cleaning out nonessential apps, and either removing some apps altogether or logging out of them with your main accounts and logging back in with travel accounts.

    Mohammed Al-Maskati, digital security helpline director at the rights group Access Now, says that people should consider this type of clean-out before they travel. “I will look at my device and see what apps I need,” he says. “If I don’t need the app, I just remove it.”

    Al-Maskati adds that he suggests people particularly remember to remove dating apps and anything related to LGBTQI communities, especially if they consider themselves to be at higher risk of facing a device search. And generally, this approach is only safe if you are particularly diligent about removing every app that might expose you to risk.

    You could use your own phone as a travel phone by backing it up, wiping it, building a travel device with only the apps you really need while traveling, going on your trip, and then restoring from the backup when you get home. This approach is doable but time consuming, and it creates more opportunities for operational security mistakes or what are known as “opsec fails.” If you try to delete all of your old, unwanted apps, but miss one, you could end up exposing an old social media account or other historic service that has forgotten data in it. Messaging apps can have easily searchable archives going back years and can automatically save photos and files without you realizing it. And if you back up all of your data to the cloud and take it off your device, but are still logged into the cloud account underpinning other services (like your main Google or Apple account), you could be asked to produce the data from the cloud for inspection.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleTrump’s Tariffs Will Widen the Digital Divide
    Next Article Whatever happened to the Kids Online Safety Act?

    Related Posts

    What Satellite Images Reveal About the US Bombing of Iran’s Nuclear Sites

    June 27, 2025

    Here’s What Federal Troops Can (and Can’t) Do While Deployed in LA

    June 25, 2025

    Truth Social Crashes as Trump Live-Posts Iran Bombing

    June 25, 2025

    ‘No Kings’ Protests, Citizen-Run ICE Trackers Trigger Intelligence Warnings

    June 23, 2025

    Israel Says Iran Is Hacking Security Cameras for Spying

    June 23, 2025

    Iran’s Internet Blackout Adds New Dangers for Civilians Amid Israeli Bombings

    June 22, 2025
    Our Picks

    How vulnerable is critical infrastructure to cyberattack in the US?

    June 27, 2025

    I’m an Outdoor Writer. I’m Shopping 28 Deals From REI’s July 4 Sale

    June 27, 2025

    The best deals on 4K TVs

    June 27, 2025

    Disney Just Threw a Punch in a Major AI Fight

    June 27, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Google’s carbon emissions just went up again

    By News RoomJune 27, 2025

    Google’s carbon emissions jumped yet again as the company continues to push ahead in AI.…

    Eufy’s Omni C20 mopping robovac is $300 off for a limited time

    June 27, 2025

    Meta Wins Blockbuster AI Copyright Case—but There’s a Catch

    June 27, 2025

    What Meta and Anthropic really won in court

    June 27, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.