Welcome toOpt Out, a semi-regular column in which we help you navigate your online privacy and show you how to say no to surveillance. The last column coveredwhat to do with your 23andMe account after the company filed bankruptcy. If you’d like to skip to a section about a particular tip, click the “Jump to” menu at the top of this article.If you’re a visa or green card holder with plans to travel to the US, reports of people being turned away at airports over messages found on their devices might be prompting you to second-guess your travel plans. You might be asking whether Customs and Border Protection (CBP) can search your phone, whether you can opt out and what you should do to minimize your risks.The short answer is that yes, CBP can search your devices. Constitutional protections are generally weaker at US borders, including airports. You can try to opt out, but depending on your specific circumstances, you might not be willing to risk the potential ramifications of not complying, which can include the confiscation of your devices.Privacy experts say everyone should conduct a personal risk assessment – which should include your immigration status, travel history and what data you might have on your phone. There’s not a one-size-fits all solution because data that may seem sensitive to some may not be to others, depending on your circumstances. That assessment might affect your calculus of whether to push back if CBP attempts to search your phone, for instance, or how much you want to lock down your devices before heading to the airport.Opt out: how to stop tech companies spying on your phone as Trump promises mass deportationsRead moreWhile CBP said it only searched about 47,000 devices of the 420 million people who crossed the US border in 2024, experts the Guardian spoke to say border enforcement has been unpredictable under the Trump administration, so figuring out whether you’re at risk of a device search is not as straightforward as it once was. French officials said a French scientist wasrecently turned awayat an airport in Texas because immigration officers found texts that were critical of Trump on his phone.“The super-conservative perspective is to assume they are completely unhinged and that even the most benign reasons for travel are going to subject non-citizens to these device searches,” said Sophia Cope, a senior staff attorney at the Electronic Frontier Foundation (EFF), a non-profit digital rights group.If you’re a US citizen, you must be admitted into the country. That said, some jurisdictions allow CBP to work with the FBI or local police to advance domestic investigations, so there are still some risks of your devices being searched for domestic reasons.There are steps you can take to make it harder for CBP officers to access your device and the data on it. So what should you do to protect the data on your phone from being searched? The main thing is to prepare ahead of heading to the airport. Here is what you should be thinking about:Decide if you will comply with a phone searchBefore you travel, start to prepare for the possibility of being pulled into secondary screening. First, you should decide if you’re going to comply if an immigration officer asks if they can search your device. They may ask for your phone password or for you to unlock the device. Ideally, you would unlock the device yourself and not share your password. You can decide not to give your consent, but that does come with its own risks.From aguide to the borderfrom the EFF: “This presents a no-win dilemma. If a traveler complies, then the agents can scrutinize and copy their sensitive digital information. If a traveler declines, then the agents can seize their devices and subject the traveler to additional questioning and detention.”It’s possible that, if you refuse the search, the officer might decide that you are not worth the trouble because you do not present a high risk. They might let you go. On the flip side, though, declining could make the process longer or could result in border agents confiscating your device. If they do confiscate your device, make sure you ask for a property receipt so you can document that they have your device when you try to get it back. Even if you don’t give up your password, immigration officials can use various tools on your device to unlock it themselves. They can also try to guess your password, so make sure you have a strong and long password.There are a lot of reasons you might not want to risk being held back longer than you already have been or risk having your device confiscated – including that you don’t know how long border agents will keep your phone.If you plan to comply with a phone search to avoid any further complications, your phone might be searched either manually or with forensic tools. It is worthwhile to prepare for both types of searches.Turn your phone and Face ID off before entering the USThe EFF recommends turning your devices completely off before entering the US. This could return your phone or laptop to a heightened security state and, as a result, could make it harder for anyone to break the encryption on your device.Privacy advocates also recommend making sure your device requires a password to decrypt or unlock. If you use Face ID or a fingerprint to unlock your phone, for instance, it would be easier for an officer to use it to gain access to your device.Do not wipe your phoneYou might think the most protective options are to completely wipe your phone before traveling, use a burner or travel without a phone. But the EFF’s Cope said that could actually raise suspicions.“People are damned if they do and damned if they don’t,” Cope said. “If you cross the border with no data on your device, that itself can be seen as suspicious.”Instead, if you want to seem cooperative but do have data or texts stored on your phone that you wouldn’t want to be accessed, Cope suggests deleting that information selectively rather than wiping your whole device.skip past newsletter promotionSign up toTechScapeFree weekly newsletterA weekly dive in to how technology is shaping our livesEnter your email addressSign upPrivacy Notice:Newsletters may contain info about charities, online ads, and content funded by outside parties. For more information see ourPrivacy Policy. We use Google reCaptcha to protect our website and the GooglePrivacy PolicyandTerms of Serviceapply.after newsletter promotionEncrypt your data and use a strong passwordThe most important step to take before you travel is to encrypt the data on your device, which is different than using encrypted messaging services like Signal. Device encryption can make it harder for CBP officers to access files on your phone or laptop or recover deleted files, even if they confiscate the device and subject it to sophisticated forensic tools.Fortunately,all recent modelsof both iPhones and most Android phones come with full-device encryption automatically turned on. On an Android, double check that yours is on in the “advanced settings” tab of your “Security” menu. You will want to choose a strong password that is not easy to guess so CBP can’t walk in the front door to your device. Here’s agood primeron how to make a strong password.“This encryption is only as good as the encryption passphrase someone uses on their device, though,” said EFF senior staff technologist Bill Budington. “So the best advice is to choose a strong, nine- to 12-random-character (or four- to five-word) passphrase for the device, and make sure that biometric unlocks like Face ID or Touch ID are turnedoffwhen going through sensitive areas like checkpoints or somewhere your device could be confiscated.”Laptops, on the other hand, do not all come with full-device encryption. You can use the encryption tools some of them offer to encrypt your data. MacOS has a tool called FileVault, which you can access by searching for it in the top right corner of your screen, and some Windows computers come with a tool called Bitlocker, which can be used to encrypt your device. The EFF has a full list of tools you can use on various operating systemshere.For those of you traveling with a device owned by your employer or someone else, you will want to make sure to have a conversation with them before you travel to ensure your device is sufficiently protected.How to securely delete your dataIn addition to encrypting your devices, you should delete any specific texts, apps, photos, etc that you feel are sensitive or you wouldn’t want a government agent to see.Securely deleting this data requires a few steps and comes with limitations. If you are not wiping your phone entirely, as that may raise suspicions, you will probably opt to delete specific files. That more practical option may be effective for a manual or cursory search but may not be sufficient in the event of a more advanced search byUS immigrationpersonnel. Files may not be fully deleted, or there may be references to these files that remain on your device.On top of ensuring your device is encrypted, you will want to make sure that you’ve deleted your files from any trash folders as well. On iMessage, for instance, if you click on “filters” in the top left corner you’ll find a “recently deleted” folder. Make sure you’ve cleared texts from there as well. On iPhones, once a file isdeletedfrom both the main iMessage interface and the “recently deleted” file, it is permanently deleted, according to the company.Cope suggests pre-emptively deleting some apps you don’t want to be searched. This protective method is imperfect because an advanced search could reveal that an app was installed, but it would be a way to avoid having your WhatsApp messages searched, for instance, in the case of a manual search.Move things on to a cloud storage serverDuring law enforcement searches inside the boundaries of the US, a cloud storage server is not more protected than your devices. At the border, however, there are currently policies in place that prohibit CBP from searching online cloud services. In practice, that means that immigration officers will have to put your phone in airplane mode before searching it.“They do specifically say officers are only authorized to look at data that are ‘resident on the device’,” Cope said. “So that is data that is actually on the hard drive of your phone, laptop or camera. They’re supposed to disconnect it from the internet, if it’s an internet-connected device.”If you have data that you don’t want to or can’t delete permanently for any reason, you can delete it off your device and store it on your cloud storage like iCloud, Google Drive or Microsoft One Drive.This is a high-level guide that may not touch on the specifics of your situation. For a full comprehensive guide on how to protect your devices atUSborders, please visit theElectronic Frontier Foundation.
How to protect your phone and data privacy at the US border
TruthLens AI Suggested Headline:
"Guidelines for Protecting Phone and Data Privacy When Traveling to the US"
TruthLens AI Summary
Traveling to the United States as a visa or green card holder can raise concerns about privacy, particularly regarding the search of electronic devices by Customs and Border Protection (CBP). Constitutional protections are notably weaker at US borders, allowing CBP to search devices without a warrant. While CBP reported that only about 47,000 out of 420 million travelers' devices were searched in 2024, the unpredictability of border enforcement under the Trump administration has led to heightened anxiety among travelers. Privacy experts recommend conducting a personal risk assessment based on individual circumstances such as immigration status and the nature of data stored on devices. This assessment can inform decisions on whether to comply with a device search, as refusing could lead to device confiscation or prolonged questioning at the border.
To safeguard personal data, travelers should take proactive measures before arriving at the airport. Experts advise turning off devices completely to enhance security and make it more challenging for CBP officers to access data. It is also crucial to encrypt devices and use strong passwords to thwart unauthorized access. While some might consider wiping their phones entirely to prevent data exposure, this could raise suspicions and lead to further scrutiny. Instead, selectively deleting sensitive information is recommended. Furthermore, utilizing cloud storage can help keep sensitive data out of reach, as CBP is generally restricted from searching online cloud services. Ultimately, travelers should prepare thoroughly and consider their options carefully, balancing the risks of compliance with the need to protect their digital privacy at the border.
TruthLens AI Analysis
The article addresses the critical issue of privacy and data protection for travelers, particularly those with visa or green card status, at U.S. borders. It sheds light on the legal realities surrounding device searches by Customs and Border Protection (CBP), providing insights into how individuals can navigate these complex situations.
Purpose of the Article
The article aims to inform readers about their rights and the potential risks associated with device searches at the U.S. border. By discussing the implications of CBP's authority to search phones, it seeks to empower travelers to make informed decisions about their data privacy before embarking on their journeys.
Public Perception
The narrative can create a sense of anxiety and caution among travelers, especially those from marginalized communities or countries with strained relations with the U.S. It may lead to a perception that the U.S. is increasingly intrusive with data privacy, thus heightening distrust in government authorities, particularly in the context of immigration and border control.
Information Omission
While the article focuses on device searches, it may gloss over broader issues of systemic surveillance practices and the implications of such actions on civil liberties. The discussion is also limited to the U.S. context, which could potentially divert attention from global issues of privacy and data security.
Manipulative Nature
The article appears to have a moderate level of manipulative intent, primarily through its framing of the issue. By emphasizing the potential repercussions of device searches, it may invoke fear, which could lead to an overestimation of the risks involved in travel. The language used is cautionary, which may provoke a defensive response from the audience.
Truthfulness of the Content
The information presented seems credible, given that it aligns with widely reported practices of border enforcement in the U.S. However, the article could benefit from broader contextualization and more diverse perspectives on the implications of such policies.
Societal Implications
This article could contribute to a growing conversation around privacy rights, potentially influencing public opinion and policy discussions regarding border security and digital privacy. It could mobilize advocacy groups focused on civil liberties and impact the political landscape by raising awareness about these issues.
Target Audience
The content primarily appeals to individuals concerned about their privacy, particularly those who frequently travel to the U.S. It may resonate more with communities that have experienced heightened scrutiny or discrimination at borders.
Market Impact
While the article may not have a direct impact on stock markets, companies involved in privacy technology or cybersecurity could see increased interest and investment as public awareness of data privacy issues grows.
Global Power Balance
The article touches on significant themes relevant to global power dynamics, especially concerning how nations enforce data privacy and surveillance. In today’s context, where digital rights are increasingly under threat, the discussion is timely and relevant.
Use of AI
There is no clear indication that artificial intelligence was involved in the writing of this article. However, if AI tools were employed, they might have influenced the tone or structure of the content, focusing on providing actionable advice while maintaining an informative style.
Conclusion on Credibility
The article provides a valuable perspective on privacy at U.S. borders, though its framing may introduce an element of fear. Overall, it presents reliable information while inviting readers to reflect on their personal circumstances regarding privacy.