Additional points that come mostly from the NBTV video:
Beware of the possibility of border agents installing a keylogger or some other malware if a device is seized.
Beware that some logos on devices, luggage, personal items, etc. (cryptocurrency stickers for example) might trigger border agents to be more zealous.
The most common device seizure points at airports are going through security and boarding the aircraft. If you want to use your devices, use them before arriving at the departure airport, while in the air, or after leaving the arrival airport.
Fully power off all devices to make the device’s encryption effective.
Strong passwords offer more protection than PINs, patterns and biometrics.
Data self destruct in the event of multiple failed authentication attempts might be a good idea.
Assume any form of lying to border agents risks jail time.
If asked by a border agent to do something, it might help to ask for clarification whether they are just asking for your consent or they are giving you an order.
Before travel across borders, mentally prepare how best to deal with border agents’ harassment: know of what your rights are in each jurisdiction, evaluate what level of harassment you can tolerate, decide whether or not you will cooperate with border agents and how you will cooperate or not cooperate, etc.
One small thing that I noted. It is probably bad idea to take a usb date blocker with you to a hostile country as a journalist, you probably come on a higher risk list. If you really want a data blocker. I think a data blocker cable without the “Data block” logo is probably a better idea.
Yes, all the media reports that I have read, which quoted legal experts say this is true in Canada and the US. If you’re a non-citizen and fail to obey orders such as giving the passcodes, you will be denied entry. For citizens, your devices will likely be seized and forensically analyzed such as having data downloaded. Failure to follow orders may also lead to prosecution at the Canadian and US borders.
You’re just arousing suspicions because in this day and age, who travels like that? Also, as a non-citizen, you don’t have the legal right to enter. So if the border agent doesn’t trust what you’re saying, you’re basically guaranteed to be deported. I don’t know what the law is in other countries, but in the US, non-citizens who are denied entry are banned from re-entering for a minimum of 5 years. All details pertaining to your denied entry and subsequent deportation will be recorded for life. So every time you arrive in the US, border agents will know about your past.
Unless you are a citizen of that country AND are guaranteed protection from unwarranted searches or seizure, you should almost always comply if you need to enter.
If anything on your phone is sensitive, don’t bring it. Get a burner phone instead.
My bad, that was meant to the other replies to your post.
Just from my brief research, I don’t think there has been specific reports but please correct if I’m wrong.
Personally? I think the issue comes from being a targeted individual in the first place. If you unlock your Pixel and just show them your photo roll, you are most likely safe. Otherwise, the border guards may already think you are up to something before you arrive on your flight. If you believe that your phone will be sent for forensic analysis, you have more things to worry about besides appearing suspicious.
Nobody knows what the criteria are for a secondary inspection as this is what it’s called. US border agents have powers that American police officers don’t have. I know you think this is unreasonable, but the US Supreme Court has backed the legality of this. The bottom line is that if you’re not an American citizen, I would advise you to comply with what they ask you to do. If you’re not comfortable with this, then don’t go to the US.
Do they also typically take laptops for inspection? If so, I wonder if just having it boot into a unencrypted dummy Windows install by default would be sufficient to pass the checks.
I’ve never seen reports about blank devices, but it’s worth considering what border agents who find a blank device may do. Some will think nothing of it. Others will assume the owner is trying to hide something and deserves scrutiny. I have no idea which case is more likely. As I write below, how it will play out depends.
For the latter case, I imagine negative effects for the person could be, like for any case of border abuse, time loss, missed flight, psychological harm from being abused, refusal of entry/exit, stolen/bugged device, etc.
That said, presenting a blank device and risking its theft/compromise may be possibly better than having all data copied into government databases and risking theft/compromise of a real device. Letting the blank device age and loading plausible dummy data/apps would make it more convincing.
As this statement suggests, not knowing what we’re up against is a key point. Additionally, whether or not someone is subjected to scrutiny depends on that person’s characteristics (nationality, appearance, history, reasons for travel, etc.) and the border agent (and their mood) that happens to encounter them. In light of this, given sweeping powers border agents are given, there is no silver bullet to passing through any border crossing without being abused. I believe it is best to implement countermeasures based on threat modeling and risk analysis based on one’s own situation and goals.
Drawing from previous posts in this thread and other sources, there are some digital security principles that are good in most cases. I think everyone who crosses a border should practise some level of digital security; not just for the sake of protecting one’s own devices and data, but for protecting their contacts, communities and other affiliations.
The goal is pretty simple and that is to enter. Why else would you fly all the way there? I don’t know how anyone’s threat modelling could be different unless you’re a citizen. I haven’t seen any logical explanation as to why having a blank device is a good idea. Sure, this would prevent any government from obtaining your data, but you also risk further questioning and deportation. So if you’re not willing to cooperate, then why fly there? I think the trick is to at least have some data on it and make it appear it’s your main device.
Sure, people who travel generally want to enter/exit without being abused. But it’s not as simple as that. Some people may want to avoid all hassle while others are willing to risk jail time. Some people may want to protect their data more than they want to enter/exit. Some people are more privileged than others, for instance by possessing citizenship.
The problem is that you don’t get to decide whether it’s abuse or not. You’re free to Google up the topic if you don’t believe me. Lots of news media have quoted lawyers on the matter and they all said travelers, including American citizens, for context, I’m assuming that’s what we’re talking about since this is frequently on the news, have very few rights at the border. So if you’re not prepared for the process then why fly all the way there? I think common sense would say you have to be prepared for the worst. So if you don’t want to deal with the hassle, go somewhere else.