1 of 84

U.S. J-School Digital Security Sample Slides

�Questions? Suggestions? �Reach out:�https://freedom.press/contact/

training@freedom.press

Freedom of the Press Foundation (CC BY 4.0)

2 of 84

README: How might these slides be used?

  • We hope these slides will provide some inspiration. To that end, these slides are intended to provide examples of digital security topics that might be covered, and how visual aids might help.
  • We expect instructors to use these slides based on their needs for their courses and expectations of students. Ultimately, we hope instructors will modify these slides or find inspiration when creating learning materials independently.
  • Make a copy of slides or the deck (“File” > “Make a copy”). Make it your own! You don’t need to use our branding.
  • Check back in occasionally! Like all digital security training materials from Freedom of the Press Foundation, we intend to keep it up-to-date.

https://freedom.press

3 of 84

This session includes a worksheet!

  • Download and print the worksheet/activity guide here.
  • Ahead of class, make sure everyone has a copy.
  • At the top of each slide that says WS (e.g., “WS: Question 1”) you can prompt students to fill out the worksheet with the information covered in the slide.
  • The questions will create a "persona" that the student will use for the "Hello, officer!" role play. Activity directions are included with the worksheet.

https://freedom.press

4 of 84

README: Use or modify as needed

  • Unless otherwise noted, our U.S. J-school security curriculum is Creative Commons-friendly (CC-BY 4.0), meaning that you can use or modify it as needed. When using the slides, we only ask that you give us attribution somewhere in your deck:

Freedom of the Press Foundation (CC BY 4.0)

  • You don’t need to use our branding, if you don’t want to! Within any slide, click “Layout” and change the template to “Absolute zero branding” for a blank background.

https://freedom.press

5 of 84

Photo credit: Zoë Meyers/inewsource

Digital Security 101:�Crossing the US-Mexico Border

Training developed by

Dave Maass, Electronic Frontier Foundation & Martin Shelton, Freedom of the Press Foundation

in collaboration with

University of Texas at El Paso Multimedia Journalism Program and Borderzine

https://freedom.press

6 of 84

The U.S.-Mexico border is unique

Photos: Electronic Frontier Foundation (CC BY 3.0)

  • A wide array of active surveillance infrastructure and patrols
  • Diminished constitutional rights at the border
  • Potential device search and copying, detainment, or long-term seizure at ports of entry
  • … If you live nearby, much of this is hard to avoid!

https://freedom.press

7 of 84

Before we get started…

  • This presentation is specifically about crossing legally through land Ports of Entry (LPOEs) — not by air, sea, or by extralegal crossings.
  • This presentation looks at journalist digital security by centering the U.S. LPOE as the primary threat location. Some of the tips will be useful in other situations, some won't.
  • This is constantly evolving!

https://freedom.press

8 of 84

New unknowns

  • The new administration has prompted more involved inspections, both when entering and leaving Mexico.
  • Expect rapidly changing and chaotic new practices.
  • March 2025: People entering Mexico have been asked to exit vehicles for a search, leading to delays.

https://freedom.press

9 of 84

Digital security vs. Personal safety

This guide focuses on digital security, however we are not recommending you prioritize this over your personal safety or that of your family.

In other words, don't risk your life over your phone.

You can take steps to avoid being in that position.

https://freedom.press

10 of 84

How often do you cross the Southern border?

Image Source: U.S. Customs and Border Protection Office of Public Affairs

https://freedom.press

11 of 84

What concerns do you have about the privacy and security of your data when crossing?

Image Source: U.S. Customs and Border Protection Office of Public Affairs

https://freedom.press

12 of 84

Olivia Rodrigo's experience

https://freedom.press

13 of 84

What factors caused Olivia to be pulled into secondary

inspection?

https://freedom.press

14 of 84

What pressures to comply did Olivia face?

https://freedom.press

15 of 84

From Jan 2017 - May 2025:

  • 56 port of entry incidents (inc. land and air)
  • Mostly experienced by US journalists
  • 1/3 at a US-Mexico land port of entry
  • Almost always asked about work
  • 30% of cases a device search was requested

Data derived from self-reported or publicly reported incidents

https://freedom.press

16 of 84

Get your worksheet handy!

https://freedom.press

17 of 84

Threat modeling:

Thinking through what you want to protect, and what actions you can take to secure it.

https://freedom.press

18 of 84

Basics | Risk assessment

What am I protecting? → your assets

Who am I protecting it from? → your adversary

What might they be capable of? → the adversary’s resources

What can I do to protect myself? your resources

How big of a risk is this to me now? → the likelihood

Who am I? → Your personal and professional identity

Where/when am I going? → The place and time you need to think about.

General Security Questions

Digital Security Questions

WS: Question 1

https://freedom.press

19 of 84

Basics | Risk assessment

What am I protecting? → your assets

Who am I protecting it from? → your adversary

What might they be capable of? → the adversary’s resources

What can I do to protect myself? your resources

How big of a risk is this to me now? → the likelihood

Who am I? → Your personal and professional identity

Where/when am I going? → The place and time you need to think about.

General Security Questions

Digital Security Questions

https://freedom.press

20 of 84

Professional considerations

What kind of work you are doing will affect the measures you take.

  • Are you reporting on politically controversial issues?
  • Are you working for a news outlet with a hostile relationship with the government?
  • Are you doing reporting on sensitive/vulnerable people or people who wish to keep their identity confidential? (e.g. asylum seekers, whistleblowers)

WS: Question 2

https://freedom.press

21 of 84

Personal vs. Professional

This distinction begins to break down when you're crossing the border.

  • CBP will be looking at both personal and professional aspects.
  • Your personal and professional information may be mingled on your devices.

https://freedom.press

22 of 84

Identity considerations

Status

  • U.S. Citizen
  • U.S. Legal �Permanent Resident
  • Mexican Citizen
  • Dreamer/DACA
  • Foreign press
  • Other

Things about you that may affect your experience and how you are perceived at the border.

WS: Question 3

https://freedom.press

23 of 84

Identity considerations

Residence/Work

  • United States
  • Mexico
  • Both
  • Other

Status

  • U.S. Citizen
  • U.S. Legal �Permanent Resident
  • Mexican Citizen
  • Dreamer/DACA
  • Foreign press
  • Other

Things about you that may affect your experience and how you are perceived at the border.

WS: Question 4, 5

https://freedom.press

24 of 84

Identity considerations

Status

  • U.S. Citizen
  • U.S. Legal �Permanent Resident
  • Mexican Citizen
  • Dreamer/DACA
  • Foreign press
  • Other

Residence/Work

  • United States
  • Mexico
  • Both
  • Other

Characteristics

  • Name
  • Accent/Language
  • Race
  • Age
  • Gender presentation
  • Clothing
  • Gear you bring
  • Tattoos

Things about you that may affect your experience and how you are perceived at the border.

https://freedom.press

25 of 84

Identity considerations

Characteristics

  • Name
  • Accent/Language
  • Race
  • Age
  • Gender presentation
  • Clothing
  • Gear you bring
  • Tattoos

Status

  • U.S. Citizen
  • U.S. Legal �Permanent Resident
  • Mexican Citizen
  • Dreamer/DACA
  • Foreign press
  • Other

Residence/Work

  • United States
  • Mexico
  • Both
  • Other

Relationships

  • Relatives or associates that are of interest to border authorities
  • Work affiliation and colleagues' work

Things about you that may affect your experience and how you are perceived at the border.

https://freedom.press

26 of 84

Identity considerations

Characteristics

  • Name
  • Accent/Language
  • Race
  • Age
  • Gender presentation
  • Clothing
  • Gear you bring
  • Tattoos

Residence/Work

  • United States
  • Mexico
  • Both
  • Other

Status

  • U.S. Citizen
  • U.S. Legal �Permanent Resident
  • Mexican Citizen
  • Dreamer/DACA
  • Foreign press
  • Other

Relationships

  • Relatives or associates that are of interest to border authorities
  • Work affiliation and colleague’s work

Things about you that may affect your experience and how you are perceived at the border.

History

  • Travel history
  • Criminal history
  • Social media

https://freedom.press

27 of 84

Time for a threat modeling activity!�

Persona: U.S.-based multimedia, general assignment journalist for a local website, who crosses into Mexico at least once weekly.

Let's think about threat modeling those weekly trips.

Photo credit: Zoë Meyers/inewsource

Photo credit: Zoë Meyers/inewsource

Photo credit: Zoë Meyers/inewsource

Sofía Mejías-Pascoe, Border and Immigration Reporter, inewsource (San Diego)

https://freedom.press

28 of 84

Assets: What physical objects do I have to protect?

https://freedom.press

29 of 84

What types of information might you be carrying?

https://freedom.press

30 of 84

Adversary: Who may try to get your data and why?

U.S. Government

  • Customs & Border Protection/Border Patrol
  • Immigration and Customs Enforcement
  • Drug Enforcement Administration
  • State/Local Law Enforcement

Mexican officials

  • Law enforcement
  • Military

Organized Crime

Private militias/extremist groups

For this unit, we will be focusing on U.S. government officials.

https://freedom.press

31 of 84

Adversary: Who may try to get your data?

What am I protecting? → your assets

Who am I protecting it from? → your adversary

What might they be capable of? → the adversary’s resources

How big of a risk is this to me now? → the likelihood

What can I do to protect myself? → your resources

Who am I? → Your personal and professional identity

Where/when am I going? → The place and time you need to think about.

General Security Questions

Digital Security Questions

https://freedom.press

32 of 84

Adversary: Who may try to get your data?

Adversaries

Adversary’s resources

Threats

Likelihood

Your resources

U.S. Government

  • Search and Seizure
  • Delay/�detention
  • Rejection of entry (non-US people)
  • Leverage with threat of above
  • Situational/

emotional pressure

  • Passcode demanded
  • Device search
  • Device seizure
  • Sources, notes compromised
  • Delay, unable to file story
  • Detention/�arrest in uncomfortable conditions
  • Anecdotally: More likely from U.S. than Mexico

Current situation unclear

  • Prepare your devices for potential search/seizure
  • Make backups of your information
  • Prepare yourself psychologically

https://freedom.press

33 of 84

34 of 84

The big questions

Think about in advance:

  1. How will I respond if I'm delayed or detained?
  2. How will I respond if officials ask/demand I allow them to search my devices?
  3. What will happen if I have to leave my devices behind?

https://freedom.press

35 of 84

Prep work (from home or the office)

https://freedom.press

36 of 84

Specialized IDs

Sometimes signing up for enhanced ID can make crossing more efficient.

However, they sometimes require privacy trade-offs (like submitting biometrics).

Examples:

  • U.S. Passport card*
  • "Trusted Traveler" - FastPass, Global Entry, SENTRI (Secure Electronic Network for Travelers Rapid Inspection)
  • Press credentials/badges

* This is a good alternative to taking your passport with you when crossing U.S. land borders.

https://freedom.press

37 of 84

Before you go

  • Preparing with your editor(s)
    • Make sure they know your plan and whereabouts
    • Expectations for how long it will take before you get back in contact when crossing
    • Devices you may need to bring/leave

  • Check on the status of the border crossing online

  • Make sure your paperwork is in order

https://freedom.press

38 of 84

Time and place as variables

Is there something going on right now? Examples:

  • Caravan approaching the border
  • New change in asylum process
  • Cartel violence erupting across multiple districts

Draw from experience:

  • Are some border crossings easier to maneuver than others?
  • Do you have better luck with pedestrian or vehicle lanes?

https://freedom.press

39 of 84

Reporting deadlines

Border crossings are unpredictable, especially if you face secondary inspection (more on that in a bit). You could be delayed for hours, affecting your deadline.

Options:

  • Create a contingency plan with your editor in advance.
  • File your story before you cross the border.
  • Take the risk and don't do anything differently, until it happens the first time. Then take precautions in the future, because it may be more likely to happen again.

WS: Question 6

https://freedom.press

40 of 84

Personal considerations

It can be helpful to plan in advance if you have external obligations. For example:

  • Do you have a child that needs to be picked up from daycare?
  • Is there medicine you need to take?
  • A dog that needs to be fed?

https://freedom.press

41 of 84

Information to have outside your phone

Have emergency contact information memorized or written down in case you can't access your phone. For example:

  • Your editor
  • Your news organization's attorney/immigration attorney
  • Family member

https://freedom.press

42 of 84

Laptop encryption

Laptops

  1. Full disk encryption

Encodes files on your device so they’re much more difficult to access without your consent.

  • Super easy!
  • Only need to do it once!
  • Mac -> FileVault
  • Windows -> BitLocker
  • Copy or print your “recovery key” (but don’t bring it with you when crossing)

Image: Electronic Frontier Foundation (CC BY 2.0)

WS: Question 7 (1/3)

https://freedom.press

43 of 84

Remember: Disk encryption works best if you turn off the device. It doesn't work if you sign in. �The safest choice is to shut your devices down before crossing!

https://freedom.press

44 of 84

Strong Passcodes

WS: Question 7 (2/3)

  • A long, random alphanumeric passcode is the strongest protection.
    • iPhone/Android: you can switch the numeric passcode to alphanumeric in your phone's settings.
  • Make it hard to predict! It shouldn’t be “password” or “000000” or someone's birthday.
  • If you normally prefer using your face/fingerprint to unlock your phone, it's safer to switch to a passcode when crossing the border.

https://freedom.press

45 of 84

Communication encryption with Signal app

WS: Question 7 (3/3)

  • End-to-end encrypted texts, voice, video.
  • The service retains nearly no metadata (who called who, when, how long, etc.).
  • Built by the nonprofit Signal Foundation.
  • Not as widely used as WhatsApp — your sources may not have it installed already.
  • At least use WhatsApp (not SMS)!
  • Enable Signal and WhatsApp’s disappearing messages to minimize records of texts!

Screenshot: Video calls within Signal app

https://freedom.press

46 of 84

Location services

WS: Question 8 (1/2)

  • It is reasonable to leave location services on for safety reasons/provide “Find My” access to trusted contacts while traveling.
  • If you do not want your apps to document your location while traveling, you may disable location services entirely.
  • Generally, you shouldn't authorize apps to access your location data if they don't need the data to provide you the service (e.g. Google Maps needs it, a crossword app may not). Some apps sell that data to the government!
  • The government may find other ways to get your location.

Image: Electronic Frontier Foundation (CC BY 2.0)

https://freedom.press

47 of 84

Backups

WS: Question 9

Make a (cloud) backup of your devices before crossing!

    • Better yet, enable automatic backups in your devices’ settings!

There's a chance that your device may be seized, especially if you refuse a request to unlock your device.

Walking away from your phone should not mean walking away from your files for good.

https://freedom.press

48 of 84

Should I bring a different phone? No phone at all?

WS: Question 10

Should you bring a dedicated travel phone with less data on it?

  • This may be a good solution for many people; you can set up this phone so it's always ready for crossing the border.
  • A "Work phone" may draw less suspicion for not having personal photos/apps/etc.
  • Trade-off: This can be inconvenient or expensive for under-resourced reporters.
  • Obvious "burner phones" may raise suspicion.

Should you cross the border with no phone at all?

  • Trade-off: This might prove more dangerous. You may need it to communicate your whereabouts. Not having a phone may also raise CBP suspicion.

https://freedom.press

49 of 84

Before crossing, should I sign out or uninstall apps?

WS: Question 11

Per CBP guidelines, agents are only supposed to search what's on your device and not on the cloud.

Even something as simple as your podcasting subscriptions or Netflix watch history could attract scrutiny.

So should you sign out of all your apps? Should you delete your apps?

  • This depends on your needs! Let’s be honest: If you cross often, this will be fatiguing and perhaps unsustainable.

https://freedom.press

50 of 84

Before crossing, should I sign out or uninstall apps?

  • Signing out of apps will add some protection. CBP won't be able to open the apps when manually browsing through your phone, but they will know you use that app.
  • Deleting apps will provide somewhat more protection. An agent may not know you use those apps just by flipping through your home screens.
  • A wiped phone may also raise suspicion. Prioritize apps that contain sensitive information you would not want CBP to access.

All bets are off if CBP deploys an advanced search using a mobile forensic device (more on this later). They may be able to recover data you didn't know was there.

https://freedom.press

51 of 84

Deleting photos, videos, files, etc.

Avoid bringing files you wouldn’t want CBP to see. For example, intimate selfies, a group text mocking border patrol, etc.

  • When deleting photos, videos, delete them a second time from “Recently deleted” photos/“Trash” bin!
  • Same with documents deleted in your “Files” app.
  • Texts may also be in "recently deleted."

https://freedom.press

52 of 84

Protecting your media (photos, videos, recordings)

WS: Question 12

Your SD cards probably aren't encrypted. Some options…

  1. Do nothing and hope for the best. 🤞
    • Trade-off: The odds are in your favor, but you could lose everything.

2. Transfer files from the SD card to an encrypted device (e.g. laptop/phone) prior to crossing border. Then delete from card.

    • Trade-off: If your encrypted device is also seized, you will lose your files.

3. Transfer media to cloud prior to crossing border. Then delete from card.

    • Trade-off: Large files can take a long time to upload, so you need to plan for a stable/fast connection

https://freedom.press

53 of 84

What about handwritten notes?

WS: Question 13

Paper has fewer security assurances (however limited) than data stored on your encrypted devices.

Options:

  1. Scan/photograph, transfer, and destroy the notes prior to re-crossing the border.
  2. Don't take handwritten notes.
  3. Only take handwritten notes on non-sensitive issues.

https://freedom.press

54 of 84

Land Ports of Entry (LPOEs)

https://freedom.press

55 of 84

Exiting the U.S. to Mexico

Usually this is pretty simple and fast.

The situation is evolving rapidly.

On foot, it may require running bags through X-rays.

Your vehicle and its plates may be electronically documented by both U.S. and Mexican authorities.

It could involve a search of vehicles or bags.

https://freedom.press

56 of 84

Entering the U.S. from Mexico: Common elements

Pedestrian Lanes:

  1. Initial ID check
  2. Line
  3. X-ray check
  4. Primary inspection/biometric check
  5. Secondary inspection/search

Vehicle Lanes:

  • Line
  • License plate scanning
    • Coming soon: Face recognition
  • Primary inspection
  • Secondary inspection/search
  • X-ray inspection

For more details, check out the Smart Border Coalition's Guide.

https://freedom.press

57 of 84

Your citizenship status affects your risk assessment

  • U.S. citizen entering the United States?
    • You can’t be denied entry, but you can be temporarily detained or have your devices temporarily or even indefinitely confiscated.
  • Lawful Permanent Residents (Green Card holders) re-entering the U.S.?
    • You have rights similar to U.S. citizens, but could be threatened with potential complications with your continued status.
  • Non-U.S. citizen entering the U.S.?
    • Fewer options. Detainment, denial of entry, indefinite device seizures are all possible.

https://freedom.press

58 of 84

LPOEs: Approaching the border

WS: Question 14

Computers/smartphones/tablets, etc.

Best option: Turn off the device or restart the device (and don’t type in the password)*

Other options that aren't as good:

  • Airplane mode
  • Just disable biometric locks

Image: Electronic Frontier Foundation (CC BY 2.0)

* Bring a book to avoid temptation!

https://freedom.press

59 of 84

LPOEs: Communicating carefully

It's helpful to think of four zones of a port of entry where you'll need to be careful about what you say.

  1. IN LINE: While waiting in line to cross the border
  2. PRIMARY INSPECTION: While interacting with CBP during primary inspection
  3. SECONDARY INSPECTION: Interacting with CBP if pulled into secondary inspection
  4. AWAY: The times before and after you've crossed the border

https://freedom.press

60 of 84

LPOEs: Communicating carefully

General rules:

  1. Be polite. (Or at least, don't be rude)
  2. Don't lie.
  3. Don't conceal.
  4. Don't offer more information than required.
  5. Don't panic.

https://freedom.press

61 of 84

Waiting in line: Communicating carefully

"Centralized Area Video Surveillance System" (CAVSS)

A series of cameras and microphones placed around CBP/Border Patrol facilities. What you say or how you act while waiting in line might trigger additional scrutiny. Be mindful!

Calexico Port of Entry. �Credit: Josh Denmark, via CBP

https://freedom.press

62 of 84

Primary inspection: Communicating carefully

When you reach the front of the line, you will pass through "Primary Inspection," where a CBP officer will ask you a series of routine questions.

These interactions are recorded via CAVSS. The audio/video footage may be stored from 30-180 days.

Hidalgo Port of Entry. �Source: Customs and Border Protection

https://freedom.press

63 of 84

Primary inspection: Communicating carefully

  • It can help to prepare in advance what you plan to say in the primary inspection interview.
  • The questions are generally predictable, however there are some variations.
  • The questions will often depend on whether you are returning to the U.S. or visiting it.

https://freedom.press

64 of 84

Primary inspection: Should I opt out of face recognition? WS: Question 15

Every pedestrian LPOE now has face recognition for confirming your identity.

U.S. citizens can decline face recognition. Trade-offs may include (short) additional processing time, questions, and a note may be added to your record.

CBP does not retain the images of U.S. citizens for more than 12 hours. Non-citizen images are held for 75 years. (Source)

Image: Electronic Frontier Foundation (CC BY 2.0)

https://freedom.press

65 of 84

Exercise: Hello, officer!

Split into pairs!

  • Person 1 is CBP officer
  • Person 2 is a journalist
    • Fill out questions 16, 17, 18

https://freedom.press

66 of 84

Activity: Border interview

For the reporter:

  • Was it easy or challenging to limit what you gave away?

For CBP agent:

  • Did this person seem suspicious?
  • Did they give away a lot or too little?

Everyone:

  • Anything surprising about the exchange?

https://freedom.press

67 of 84

Communicating carefully: Secondary inspection

Officers at primary inspection have "broad discretion" to refer travelers for deeper scrutiny, also known as secondary inspection. This could be based on available evidence or it can be random or based on an officer's gut feeling.

You can't predict what you will be asked, but you can practice being in a calm mindset and thinking carefully about what you say.

More info: CBP

Secondary vehicle inspection, via CAVSS camera. Source: Office of Inspector General, DHS

https://freedom.press

68 of 84

Communicating carefully: Secondary inspection

  • Secondary inspection often occurs in another location, such as an interrogation room.
  • They may search your vehicle or possessions. They may ask you to unlock your phone.
  • Questions may be more probing. It may be unclear why they are asking these questions and what the "right" answer is.
  • The questions may be designed to create stress or confuse you. They may pry into your family life or ask you about your politics.
  • A long waiting period may also be part of the method.

Secondary vehicle inspection, via CAVSS camera. Source: Office of Inspector General, DHS

https://freedom.press

69 of 84

If they want to search your devices

  • Inform them that you are a journalist.
  • Inform them your devices contain journalistic work product.
  • If the devices belongs to your employer, say so.

"This device contains journalist work product and I do not consent to a search. [This device belongs to my employer, [News Org.]"

https://freedom.press

70 of 84

Withholding consent for a search

  • Avoid implicit "consent." If the agent's language is vague, ask whether it is a request or an order (e.g. to unlock your device).
  • If you elect to unlock your phone, you can inform the agent you are complying under protest and that you do not consent.

https://freedom.press

71 of 84

CBP claims vs. reality

CBP's border search directive claims: “Travelers are obligated to present electronic devices and the information contained therein in a condition that allows inspection of the device and its contents.”

The Electronic Frontier Foundation says:

  • This is not true. You can say no.
  • Travelers have a right to refuse to unlock, decrypt, or provide passwords to border agents. However, there may be consequences, such as travel delay, device confiscation, or even denial of entry for non-U.S. persons.

https://freedom.press

72 of 84

What happens if they take your device for a search

  1. You will be handed a tear sheet explaining the process.
  2. A CBP officer will explain the process.
  3. According to CBP's policy, the search should be conducted in your presence, with many exceptions (including national security, law enforcement, or other "operational considerations"). But being present does not necessarily mean you will be able to observe the search.
  4. CBP is not allowed to make changes to the content of the device.
  5. CBP is supposed to return your device, unless they find something that warrants holding it further.

https://freedom.press

73 of 84

If CBP is going to search your device

Officers are generally supposed to have the traveler disable connectivity (i.e. turn on airplane mode).

If they take the device without asking you to do it, remind them [politely] to put it in airplane mode.

https://freedom.press

74 of 84

Basic search vs. Advanced search

  • Basic search: An officer, with or without suspicion, may examine the device. This often involves just flipping through the photos or apps.
  • Advanced search: An officer connects external forensics equipment to the device to review, copy and or analyze its contents. This may require reasonable suspicion of criminal activity or a national security concern.

Image: Electronic Frontier Foundation (CC BY 2.0)

https://freedom.press

75 of 84

76 of 84

What to do if they search your phone

  • Try to document or politely ask for the names, badge numbers, and agencies of the government officers you interact with.
  • Politely ask to be present while the phone is searched.
  • Notice if CBP plugged anything into the phone to search or make a copy of it.

https://freedom.press

77 of 84

What to do after you get your phone back

  • If they plugged anything into your unlocked phone, you can assume the data on this device has been copied.
  • Change your phone’s password.
  • Review the contents of your phone to know what they might have access to, and take appropriate steps with this knowledge.

https://freedom.press

78 of 84

What to do if they don't give you your phone back

  • Make sure you get the custody receipt (Form 6051D) and the name of the supervisor.
  • They may try to unlock your device. This is where a strong passcode will offer more protection.
  • See EFF's guide for more information: https://www.eff.org/wp/digital-privacy-us-border-2017

https://freedom.press

79 of 84

After the search

  • "Memorialize it." Write down everything you remember from the search soon after it happens while it is fresh in your mind.
  • Think through whose data other than your own may have been compromised and who needs to be contacted (such as sources, family members, etc).

https://freedom.press

80 of 84

Communicating carefully: �When you're away from the border

Remember: Text messages you send, social media you post publicly, photos you take with your phone may end up scrutinized by CBP.

Source: Joseph Cox, Vice Motherboard

https://freedom.press

81 of 84

Be confident:

You've done nothing wrong. Reporting is not a crime.

https://freedom.press

82 of 84

Additional Resources

https://freedom.press

83 of 84

Note for instructors: If you want to get into general guidance, refer back to our other modules!

  • Chat safety (Fight surveillance! Use end-to-end encryption, preferably with Signal!):

https://freedom.press/digisec/blog/chat-safety-module/

  • End-to-end encryption for files (make backups before you go!):

https://freedom.press/digisec/blog/e2ee-files-module/

https://freedom.press

84 of 84

More resources for continued learning:

https://freedom.press