EFF's Guide to Protecting Electronic Devices and Data at the U.S. Border
Amid recent reports that security researchers have experienced difficulties at the United States border after traveling abroad, we realized that it's been awhile since we last discussed how to safeguard electronic devices and digital information during border searches. So just in time for holiday travel and the 27th Chaos Communication Congress in Berlin, here's EFF's guide for protecting your devices and sensitive data at the United States border.
The Government Has Broad Legal Authority to Search Laptops, Phones, Cameras, and Other Devices at the U.S. Border.
The Fourth Amendment to the United States Constitution prohibits unreasonable government searches and seizures. This generally means that the government has to get a warrant to search a location or item in which you have a reasonable expectation of privacy. Searches at places where people enter or leave the country are considered "reasonable" simply because they happen at the border or its functional equivalent, such as an international airport.
While the Supreme Court has not yet decided the issue, several courts have considered whether the government needs even a reasonable suspicion of criminal activity to search a traveler's laptop at the border, and have regrettably decided that the answer is no. E.g., United States v. Arnold, 533 F.3d 1003, 1008 (9th Cir. 2008); United States v. Romm, 455 F.3d 990, 997 (9th Cir. 2006); United States v. McAuley, 563 F. Supp. 2d 672, 979 (W.D. Tex. 2008).
The unfortunate upshot of these decisions is that a border agent has the legal authority to search your electronic devices at the border, even if he has no reason to think that you've done anything wrong. Several bills have been introduced in Congress over the past few years to protect travelers from these suspicionless border searches, but none of them has passed.
Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) have published their policies on searching electronic devices at the border, and the ACLU is challenging their constitutionality in court. According to CBP's policy, your computer or copies of your data can be kept for a "brief, reasonable" amount of time to be searched on- or off-site, ordinarily not more than five days. ICE's policy says that searches of devices and copies of data will typically be completed within 30 days. Anecdotal reports suggest that travelers' devices are sometimes detained for significantly longer periods of time.
Searches of devices that are conducted at a time and/or place removed from the initial border stop can become extended border searches that require reasonable suspicion of wrongdoing, or even regular searches that require a probable cause warrant. See, e.g., United States v. Cotterman, No. CR 07-1207-TUC-RCC, 2009 U.S. Dist. LEXIS 14300 (D. Az. Feb. 24, 2009) (reasonable suspicion required to search laptop detained for two days and moved 170 miles from the border), appeal docketed, No. 09-10139 (9th Cir. April 7, 2009); United States v. Hanson, No. CR 09-00946 JSW, 2010 U.S. Dist. LEXIS 61204 (N.D. Cal. June 2, 2010) (reasonable suspicion required to search laptop about two weeks after it was detained at the border and sent away for forensic analysis, and probable cause required to search laptop about four months after initial detention at border).
If you've had your devices detained by border agents for an extended period of time, please contact EFF.
There Are Several (Imperfect) Ways That You Can Make Your Data Less Vulnerable at the Border.
What can you do to keep the government from arbitrarily rummaging through your sensitive or confidential information during your international travels? There are several ways that you can protect your data at the border, though none is 100% gauranteed to keep the government's hands off your devices or your travels stress-free. Different approaches might be better for different travelers, devices, and data, but all of these precautions will help to keep your information significantly more secure during border crossings:
- Carry as little data as possible over the border.
- Keep a backup of your data elsewhere.
- Encrypt the data on your device.
- Store the information you need somewhere else, then download it when you reach your destination.
- Protect the data on your devices with passwords.
Carry as little data as possible over the border. Travel with a clean device that contains only the information you need for a particular trip, and then securely delete those files before returning to the United States.
Remember that merely deleting files from a device doesn't mean that they're unrecoverable. Deleted files can be trivially undeleted, in whole or in part, by forensic software. You must overwrite the file contents to securely delete them.
Consider taking an inexpensive "travel" laptop with you instead of a machine that you use every day. Or if your laptop allows you to remove the hard drive easily — for instance, by sliding it out a side bay — you might use a totally different hard drive for international travel and leaving your regular drive safely at home.
Keep a backup of your data elsewhere. Government agents could seize your laptop, phone, or other devices for no reason at all. You should be prepared for the possibility that you could be deprived of access your data for some time, and store copies somewhere else that you can easily access if your devices are detained at the border.
Encrypt the data on your device. Encrypt your hard drive with a strong crypto protocol. Choose a strong passphrase that can resist brute force attacks. Even if border agents seek assistance from other agencies to attempt to decrypt your data — as provided by CBP and ICE's policies — they are unlikely to be able to access your information without either getting your help or investing far more time and effort into reviewing your data than they may want to spend.
What if a border agent asks you to turn over your encryption keys? As a legal matter, border agents can't force you to decrypt your data, divulge passphrases, or answer questions — only a judge can, and only if the Fifth Amendment privilege against self-incrimination does not apply. This privilege protects people from being forced to make statements that could lead the government to prosecute them for a crime. The right does not shield the actual data on a laptop or phone from disclosure. But two federal courts have held that even a judge can't make a person divulge his passphrase to the government when the act of revealing the passphrase would show that he has control over potentially incriminating files. In re Boucher, No. 2:06-mj-91, 2007 U.S. Dist. LEXIS 87951, at *13 (D. Vt. Nov. 27, 2007), reversed on other grounds, 2009 U.S. Dist. LEXIS 13006 (D. Vt. Feb. 29, 2009); United States v. Kirschner, Misc No. 09-MC-50872, 2010 U.S. Dist. LEXIS 30603, at **10-11 (E.D. Mich. March 30, 2010). If you're facing a situation in which the government is trying to force you to reveal encryption keys, let us know.
Be aware that if you fail to provide a passphrase or decrypt information upon request, there are a number of possible consequences. A border agent may seize your device and allow you to continue on your trip. The agent may detain you at the border. Or the agent may just shrug and and let you pass. It's hard to predict what will happen, but you should be prepared for any of these possibilities, and consider how you would deal with each of them.
If you choose to answer government officials' questions, always be honest about the contents of your computers and whether you're carrying other data storage devices over the border. The consequences of lying to the government could be much more severe than the consequences of declining to answer questions or provide assistance.
Remember to shut down your device completely before going through customs so that the cold boot attack investigated by EFF, Princeton University and other researchers can't be used to retrieve your encryption keys.
Store the information you need somewhere else, then download it when you reach your destination. Store your confidential data on your employer's servers or with a third party. Then take a clean device on your trip, download the information you need when you've reached your destination, and securely delete the files from your device before you return home.
This approach doesn't offer absolute protection for the data you've stored elsewhere. The FISA Amendments Act of 2008 loosened the requirements for government surveillance of people reasonably believed to be located outside the United States, so international communications can now be monitored without a warrant. Furthermore, law enforcement officers can access communications stored by third-party providers through the Electronic Communications Privacy Act as long as they have appropriate legal process, which might not be more than a subpoena in certain circumstances.
If your goal is to keep border agents from perusing vacation photos on your camera, storing your files with a third-party service and then deleting them from your device might be fine. (Note, however, that deleted images on a camera, if not actively overwritten, can be easily undeleted, just like other kinds of computer files.) But if you're concerned about government access to confidential business email, encrypting your data is a more effective solution. Also use an encrypted VPN, and/or SSH or HTTPS, to send and receive communications and other data while abroad.
Protect the data on your devices with passwords. Many devices such as laptops and phones give you the option to set a password, numeric PIN, pattern or other authentication method to control access to your data. Take advantage of this security feature to give your data a little more protection.
As with encryption keys, border agents can't force you to turn over passwords. However, researchers have demonstrated flaws that make it easy to get around iPhone passcodes, and Android patterns are often not hard to identify. And, as we discuss below, user-account passwords, if not combined with encryption, can always be bypassed by simply removing the hard drive and putting it in another machine.
You might also consider creating separate password-protected user accounts on your laptop for your personal data and work data. Then you can allow a border agent to examine your own account, while storing client data or trade secrets in a separate account controlled by your employer. Your employer might disclose the password for this account to you only after you reach your destination.
Under certain circumstances, a border agent might be satisfied to take a look at your personal data. But simply storing confidential information in a separate password-protected account will not absolutely shield that data from government scrutiny. Many forensic search tools can access and search unencrypted data in every account on a machine, even if you yourself don't know the passwords to log in to those accounts or don't have administrative privileges on the machine. An agent can use these tools, for instance, by taking the hard drive out of your machine and putting it in their investigative machine. This allows reading the data right off the disk, regardless of the file and account permissions in your operating system. Don't rely on passwords to be your only form of security — encryption is still critically important to protect the information stored on a device.
For more thoughts on protecting data at the border, see Wired's wiki on how to protect data during border searches, Declan McCullagh's Security Guide to Customs-Proofing Your Laptop, and Chris Soghoian's Guide to Safe International Data Transport.
Recent DeepLinks Posts
Jan 18, 2017
Jan 18, 2017
Jan 18, 2017
Jan 17, 2017
Jan 17, 2017
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- UK Investigatory Powers Bill
- Know Your Rights
- Trade Agreements and Digital Rights
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anti-Counterfeiting Trade Agreement
- Artificial Intelligence & Machine Learning
- Bloggers' Rights
- Border Searches
- Broadcast Flag
- Broadcasting Treaty
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA Rulemaking
- Do Not Track
- E-Voting Rights
- EFF Europe
- Electronic Frontier Alliance
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- Genetic Information Privacy
- Government Hacking and Subversion of Digital Security
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- Mobile devices
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- Reclaim Invention
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Shadow Regulation
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- Trusted Computing
- Video Games