How to protect your privacy when crossing borders of other countries

US border agents have already searched more than 30, 000 electronic devices for travelers during 2017. In 2015, that number was 8, 000. The data indicate a worrying trend: Enhanced state surveillance, paired with an alleged security need that threatens individual freedoms and undermines citizens' privacy, is growing.

Please be aware that if you do not allow searching on smartphones and notebooks when entering a country, you will probably be denied entry.

ProtonMail, known for one of the most robust encryption emails on the market, decided to address this theme: “Crossing an international border is often a stressful experience. It becomes even more stressful if you are pulled for further inspection. Border searches, including on smartphones and notebooks, have become more common in recent years, particularly in the United States. But the US is not the only country where your device can be investigated, seized or analyzed at the border. The UK, Canada, and many others with even weaker privacy protections (Israel, Turkey, etc.) allow similar searches. But what if you don't want to lose your right to privacy and data security just because you travel?

In this way, ProtonMail decided to address different ways in which citizens can protect their rights and continue with as much privacy as possible while searching digital devices - “including what border police can and cannot do and the steps you can take. to minimize their risks. ”

Be aware right away that if you don't allow searching on smartphones and notebooks when entering a country, you will probably be denied entry. It is also worth noting that there is no very clear guideline on who will have their belongings investigated: Border agents simply define factors ranging from documentation issues to random choice.

In addition, there are two types of searches:

  • Basics: Inspection of data, apps, photos and files on the device.
  • Advanced: Inspection of data, apps, photos and files on the device; Appropriate equipment for deleted data recovery, analysis and data copying.

Detention (valid for both cases) : Everything that is investigated is also held by the agents while the work is going on.

agent

Agent

Protecting my data

It is worth noting that when entering a country, being true and cordial is always the best way. By the way, this is the most important thing when we talk about a police who can arrest him, accuse him of a crime and even physically subdue him.

“The Electronic Frontier Foundation (EFF) also recommends that you do not attempt any technical tricks (such as using a second password that unlocks a mock user account, disguising data, etc.) that might be seen as a lie. Be calm and polite but assertive, ”adds ProtonMail.

The safest, most straightforward way to protect your app data is by erasing virtually all of your app data from your smartphone, tablet or notebook. There is software on the market that simply completely erases data.

It's interesting to delete applications and programs because they cache information

“But data is important to me, ” you think. There are also solutions in the cloud storage market that address this issue. An external hard drive, which does not leave your home, is an extra point of secure storage.

When we talk about entering the United States, border agents can't dig their data into the cloud, just what's present inside an electronic device. Therefore, if necessary, abuse this point.

ProtonMail makes another detail clear: don't leave your smartphone or notebook empty. A “blank” device can raise suspicions, and you may also be marked by it. What does that mean? You do not need to delete Tinder when crossing the border.

Making it hard for excavators or Risky Movement

Many smartphones today use encryption technologies to lock the hard disk and memory of notebooks and smartphones while they are turned off. Let's use Samsung as an example: the Galaxy S line offers Knox, which locks the device until user release. For this reason, ProtonMail recommends that leaving the smartphone off at the time of landing is interesting to make it difficult to access data that you decide not to hand in the unlock password.

You can try a 'carte blanche' if you are a lawyer, doctor or journalist

As noted earlier, not facilitating the investigation can cause you future problems. In the US, the guideline makes it clear that travelers are required to "help" border agents.

It is worth noting that you can try a "carte blanche" if you are a lawyer, doctor or journalist: the privilege of conversation between lawyer and client, doctor and patient, journalist and source. The privacy of this kind of interaction is inviolable - or should be. So it's a valid claim for agents not to conduct investigations on the devices.

crypto

Cryptography

Encryption and records

“Typically, the password you enter to unlock the device restricts only access to your unencrypted data. This will not prevent border agents from accessing your data using forensic tools. However, using full disk encryption can block access as long as they do not learn your decryption password, ”says ProtonMail.

We believe your right to privacy should not be infringed just because you are crossing a border.

The company also makes it clear that you can and should note the steps of your experience if you are chosen for a search. Jotting down agent names, badge numbers, and agencies can all be important if you decide to file a complaint or a lawsuit.

“Dealing with border agents is always stressful. Confronting them with their right to privacy can make the experience even more distressing, not to mention inconvenient. At ProtonMail, we believe that your right to privacy should not be infringed just because you are crossing a border, ”the company concludes.

To stay up-to-date with the latest cybersecurity news and tips, follow our dedicated page. If you have reports of failures, vulnerabilities, and leaks, please contact our reporting channels: or

How to protect your privacy when crossing borders of other countries via TecMundo