Protecting Phone Data from Border Agents

Additional points that come mostly from the NBTV video:

  • Beware of the possibility of border agents installing a keylogger or some other malware if a device is seized.
  • Beware that some logos on devices, luggage, personal items, etc. (cryptocurrency stickers for example) might trigger border agents to be more zealous.
  • The most common device seizure points at airports are going through security and boarding the aircraft. If you want to use your devices, use them before arriving at the departure airport, while in the air, or after leaving the arrival airport.
  • Fully power off all devices to make the device’s encryption effective.
  • Strong passwords offer more protection than PINs, patterns and biometrics.
  • Data self destruct in the event of multiple failed authentication attempts might be a good idea.
  • Assume any form of lying to border agents risks jail time.
  • If asked by a border agent to do something, it might help to ask for clarification whether they are just asking for your consent or they are giving you an order.
  • Before travel across borders, mentally prepare how best to deal with border agents’ harassment: know of what your rights are in each jurisdiction, evaluate what level of harassment you can tolerate, decide whether or not you will cooperate with border agents and how you will cooperate or not cooperate, etc.
1 Like

Very comprehensive article by Wired.

What is your take on India Then, Is It Becoming A Dragnet Surveillance State?