Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The oldest Fire TV devices are losing Netflix support soon

    May 24, 2025

    The Breville Oracle Jet Is Like the iPad of Home Espresso Machines

    May 24, 2025

    The Best Coffee Pod Machines for Hot and Cold Brew

    May 24, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » How to Protect Yourself From Phone Searches at the US Border
    Security

    How to Protect Yourself From Phone Searches at the US Border

    News RoomBy News RoomApril 29, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Privacy and digital rights advocates largely prefer the approach of building a travel device from scratch, but they caution that a phone that is too squeaky clean, too much like a burner phone, can arouse suspicion.

    “You have to ‘seed’ the device. Use the phone for a day or even for a few hours. It just can’t be clean clean. That’s weird,” says Matt Mitchell, founder of CryptoHarlem, a security and privacy training and advocacy nonprofit. “My recommendation is to make a finsta for travel, because if they ask you what your profile is, how are you gonna say ‘I don’t use any social media’? Many people have a few accounts anyway. One ratchet, one wholesome—add one travel.”

    Cyr, from Amnesty International, also points out that a true burner phone would be a “dumb” phone, which wouldn’t be able to run apps for encrypted communications. “The advantage that we all have with smartphones is that you can communicate in an encrypted way,” Cyr says. “People should be conscious that any nonencrypted communication is less secure than a phone call or a message on an application like Signal.”

    While a travel device doesn’t need to use a prepaid SIM card bought with cash, it should not share your normal phone number, since this number is likely linked to most if not all of your key digital accounts. Buy a SIM card for your trip or only use the device on Wi-Fi.

    Traveling With Your Primary Phone

    The other approach you can take to protecting your device during border crossings is to modify your primary smartphone before travel. This involves removing old photos and messages and storing them somewhere else, cleaning out nonessential apps, and either removing some apps altogether or logging out of them with your main accounts and logging back in with travel accounts.

    Mohammed Al-Maskati, digital security helpline director at the rights group Access Now, says that people should consider this type of clean-out before they travel. “I will look at my device and see what apps I need,” he says. “If I don’t need the app, I just remove it.”

    Al-Maskati adds that he suggests people particularly remember to remove dating apps and anything related to LGBTQI communities, especially if they consider themselves to be at higher risk of facing a device search. And generally, this approach is only safe if you are particularly diligent about removing every app that might expose you to risk.

    You could use your own phone as a travel phone by backing it up, wiping it, building a travel device with only the apps you really need while traveling, going on your trip, and then restoring from the backup when you get home. This approach is doable but time consuming, and it creates more opportunities for operational security mistakes or what are known as “opsec fails.” If you try to delete all of your old, unwanted apps, but miss one, you could end up exposing an old social media account or other historic service that has forgotten data in it. Messaging apps can have easily searchable archives going back years and can automatically save photos and files without you realizing it. And if you back up all of your data to the cloud and take it off your device, but are still logged into the cloud account underpinning other services (like your main Google or Apple account), you could be asked to produce the data from the cloud for inspection.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleTrump’s Tariffs Will Widen the Digital Divide
    Next Article Whatever happened to the Kids Online Safety Act?

    Related Posts

    Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials

    May 24, 2025

    3 Teens Almost Got Away With Murder. Then Police Found Their Google Searches

    May 22, 2025

    Authorities Carry Out Elaborate Global Takedown of Infostealer Heavily Used by Cybercriminals

    May 22, 2025

    We Made Luigi Mangione’s 3D-Printed Gun—and Fired It

    May 21, 2025

    Who Even Is a Criminal Now?

    May 20, 2025

    The Internet’s Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge

    May 19, 2025
    Our Picks

    The Breville Oracle Jet Is Like the iPad of Home Espresso Machines

    May 24, 2025

    The Best Coffee Pod Machines for Hot and Cold Brew

    May 24, 2025

    Whoop is reportedly replacing defective MG trackers

    May 24, 2025

    Our Favorite Computer Monitors for PC Gaming

    May 24, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Twelve South’s slick 3-in-1 charging stand has dropped to a new low price

    By News RoomMay 24, 2025

    Memorial Day marks the unofficial start of summer, and if you somehow managed to skip…

    Fujifilm’s X Half, a New OnePlus Tablet, and Fender’s GarageBand Rival—Your Gear News of the Week

    May 24, 2025

    X is down

    May 24, 2025

    15 Best Memorial Day Tech Deals

    May 24, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.