U.S. J-School Digital Security Sample Slides
�Questions? Suggestions? �Reach out:�https://freedom.press/contact/
Freedom of the Press Foundation (CC BY 4.0)
README: How might these slides be used?
https://freedom.press
This session includes a worksheet!
https://freedom.press
README: Use or modify as needed
Freedom of the Press Foundation (CC BY 4.0)
https://freedom.press
Photo credit: Zoë Meyers/inewsource
Digital Security 101:�Crossing the US-Mexico Border
Training developed by
Dave Maass, Electronic Frontier Foundation & Martin Shelton, Freedom of the Press Foundation
�in collaboration with
University of Texas at El Paso Multimedia Journalism Program and Borderzine
�
https://freedom.press
The U.S.-Mexico border is unique
Photos: Electronic Frontier Foundation (CC BY 3.0)
https://freedom.press
Before we get started…
https://freedom.press
New unknowns
https://freedom.press
Digital security vs. Personal safety
This guide focuses on digital security, however we are not recommending you prioritize this over your personal safety or that of your family.
In other words, don't risk your life over your phone.
You can take steps to avoid being in that position.
https://freedom.press
How often do you cross the Southern border?
Image Source: U.S. Customs and Border Protection Office of Public Affairs
https://freedom.press
What concerns do you have about the privacy and security of your data when crossing?
Image Source: U.S. Customs and Border Protection Office of Public Affairs
https://freedom.press
Olivia Rodrigo's experience
https://freedom.press
What factors caused Olivia to be pulled into secondary
inspection?
https://freedom.press
What pressures to comply did Olivia face?
https://freedom.press
From Jan 2017 - May 2025:
Data derived from self-reported or publicly reported incidents
https://freedom.press
Get your worksheet handy!
https://freedom.press
Threat modeling:
Thinking through what you want to protect, and what actions you can take to secure it.
https://freedom.press
Basics | Risk assessment
What am I protecting? → your assets
Who am I protecting it from? → your adversary
What might they be capable of? → the adversary’s resources
What can I do to protect myself? → your resources
How big of a risk is this to me now? → the likelihood
Who am I? → Your personal and professional identity
Where/when am I going? → The place and time you need to think about.
General Security Questions
Digital Security Questions
WS: Question 1
https://freedom.press
Basics | Risk assessment
What am I protecting? → your assets
Who am I protecting it from? → your adversary
What might they be capable of? → the adversary’s resources
What can I do to protect myself? → your resources
How big of a risk is this to me now? → the likelihood
Who am I? → Your personal and professional identity
Where/when am I going? → The place and time you need to think about.
General Security Questions
Digital Security Questions
https://freedom.press
Professional considerations
What kind of work you are doing will affect the measures you take.
WS: Question 2
https://freedom.press
Personal vs. Professional
This distinction begins to break down when you're crossing the border.
https://freedom.press
Identity considerations
Status
Things about you that may affect your experience and how you are perceived at the border.
WS: Question 3
https://freedom.press
Identity considerations
Residence/Work
Status
Things about you that may affect your experience and how you are perceived at the border.
WS: Question 4, 5
https://freedom.press
Identity considerations
Status
Residence/Work
Characteristics
Things about you that may affect your experience and how you are perceived at the border.
https://freedom.press
Identity considerations
Characteristics
Status
Residence/Work
Relationships
Things about you that may affect your experience and how you are perceived at the border.
https://freedom.press
Identity considerations
Characteristics
Residence/Work
Status
Relationships
Things about you that may affect your experience and how you are perceived at the border.
History
https://freedom.press
Time for a threat modeling activity!�
Persona: U.S.-based multimedia, general assignment journalist for a local website, who crosses into Mexico at least once weekly.
Let's think about threat modeling those weekly trips.
Photo credit: Zoë Meyers/inewsource
Photo credit: Zoë Meyers/inewsource
Photo credit: Zoë Meyers/inewsource
Sofía Mejías-Pascoe, Border and Immigration Reporter, inewsource (San Diego)
https://freedom.press
Assets: What physical objects do I have to protect?
https://freedom.press
What types of information might you be carrying?
https://freedom.press
Adversary: Who may try to get your data and why?
U.S. Government
Mexican officials
Organized Crime
Private militias/extremist groups
For this unit, we will be focusing on U.S. government officials.
https://freedom.press
Adversary: Who may try to get your data?
What am I protecting? → your assets
Who am I protecting it from? → your adversary
What might they be capable of? → the adversary’s resources
How big of a risk is this to me now? → the likelihood
What can I do to protect myself? → your resources
Who am I? → Your personal and professional identity
Where/when am I going? → The place and time you need to think about.
General Security Questions
Digital Security Questions
https://freedom.press
Adversary: Who may try to get your data?
Adversaries | Adversary’s resources | Threats | Likelihood | Your resources |
U.S. Government |
emotional pressure |
|
Current situation unclear |
|
https://freedom.press
Credit: U.S. Customs and Border Protection
The big questions
Think about in advance:
https://freedom.press
Prep work (from home or the office)
https://freedom.press
Specialized IDs
Sometimes signing up for enhanced ID can make crossing more efficient.
However, they sometimes require privacy trade-offs (like submitting biometrics).
Examples:
* This is a good alternative to taking your passport with you when crossing U.S. land borders.
https://freedom.press
Before you go
https://freedom.press
Time and place as variables
Is there something going on right now? Examples:
Draw from experience:
https://freedom.press
Reporting deadlines
Border crossings are unpredictable, especially if you face secondary inspection (more on that in a bit). You could be delayed for hours, affecting your deadline.
Options:
WS: Question 6
https://freedom.press
Personal considerations
It can be helpful to plan in advance if you have external obligations. For example:
https://freedom.press
Information to have outside your phone
Have emergency contact information memorized or written down in case you can't access your phone. For example:
https://freedom.press
Laptop encryption
Laptops
Encodes files on your device so they’re much more difficult to access without your consent.
Image: Electronic Frontier Foundation (CC BY 2.0)
WS: Question 7 (1/3)
https://freedom.press
Remember: Disk encryption works best if you turn off the device. It doesn't work if you sign in. ��The safest choice is to shut your devices down before crossing!
https://freedom.press
Strong Passcodes
WS: Question 7 (2/3)
https://freedom.press
Communication encryption with Signal app
WS: Question 7 (3/3)
Screenshot: Video calls within Signal app
https://freedom.press
Location services
WS: Question 8 (1/2)
Image: Electronic Frontier Foundation (CC BY 2.0)
https://freedom.press
Backups
WS: Question 9
Make a (cloud) backup of your devices before crossing!
There's a chance that your device may be seized, especially if you refuse a request to unlock your device.
Walking away from your phone should not mean walking away from your files for good.
https://freedom.press
Should I bring a different phone? No phone at all?
WS: Question 10
Should you bring a dedicated travel phone with less data on it?
Should you cross the border with no phone at all?
https://freedom.press
Before crossing, should I sign out or uninstall apps?
WS: Question 11
Per CBP guidelines, agents are only supposed to search what's on your device and not on the cloud.
Even something as simple as your podcasting subscriptions or Netflix watch history could attract scrutiny.
So should you sign out of all your apps? Should you delete your apps?
https://freedom.press
Before crossing, should I sign out or uninstall apps?
All bets are off if CBP deploys an advanced search using a mobile forensic device (more on this later). They may be able to recover data you didn't know was there.
https://freedom.press
Deleting photos, videos, files, etc.
Avoid bringing files you wouldn’t want CBP to see. For example, intimate selfies, a group text mocking border patrol, etc.
https://freedom.press
Protecting your media (photos, videos, recordings)
WS: Question 12
Your SD cards probably aren't encrypted. Some options…
2. Transfer files from the SD card to an encrypted device (e.g. laptop/phone) prior to crossing border. Then delete from card.
3. Transfer media to cloud prior to crossing border. Then delete from card.
https://freedom.press
What about handwritten notes?
WS: Question 13
Paper has fewer security assurances (however limited) than data stored on your encrypted devices.
Options:
https://freedom.press
Land Ports of Entry (LPOEs)
https://freedom.press
Exiting the U.S. to Mexico
Usually this is pretty simple and fast.
The situation is evolving rapidly.
On foot, it may require running bags through X-rays.
Your vehicle and its plates may be electronically documented by both U.S. and Mexican authorities.
It could involve a search of vehicles or bags.
https://freedom.press
Entering the U.S. from Mexico: Common elements
Pedestrian Lanes:
Vehicle Lanes:
For more details, check out the Smart Border Coalition's Guide.
https://freedom.press
Your citizenship status affects your risk assessment
https://freedom.press
LPOEs: Approaching the border
WS: Question 14
Computers/smartphones/tablets, etc.
Best option: Turn off the device or restart the device (and don’t type in the password)*
Other options that aren't as good:
Image: Electronic Frontier Foundation (CC BY 2.0)
* Bring a book to avoid temptation!
https://freedom.press
LPOEs: Communicating carefully
It's helpful to think of four zones of a port of entry where you'll need to be careful about what you say.
https://freedom.press
LPOEs: Communicating carefully
General rules:
https://freedom.press
Waiting in line: Communicating carefully
"Centralized Area Video Surveillance System" (CAVSS)
A series of cameras and microphones placed around CBP/Border Patrol facilities. What you say or how you act while waiting in line might trigger additional scrutiny. Be mindful!
Calexico Port of Entry. �Credit: Josh Denmark, via CBP
https://freedom.press
Primary inspection: Communicating carefully
When you reach the front of the line, you will pass through "Primary Inspection," where a CBP officer will ask you a series of routine questions.
These interactions are recorded via CAVSS. The audio/video footage may be stored from 30-180 days.
Hidalgo Port of Entry. �Source: Customs and Border Protection
https://freedom.press
Primary inspection: Communicating carefully
https://freedom.press
Primary inspection: Should I opt out of face recognition? �WS: Question 15
Every pedestrian LPOE now has face recognition for confirming your identity.
U.S. citizens can decline face recognition. Trade-offs may include (short) additional processing time, questions, and a note may be added to your record.
CBP does not retain the images of U.S. citizens for more than 12 hours. Non-citizen images are held for 75 years. (Source)
Image: Electronic Frontier Foundation (CC BY 2.0)
https://freedom.press
Exercise: Hello, officer!
Split into pairs!
https://freedom.press
Activity: Border interview
For the reporter:
For CBP agent:
Everyone:
https://freedom.press
Communicating carefully: Secondary inspection
Officers at primary inspection have "broad discretion" to refer travelers for deeper scrutiny, also known as secondary inspection. This could be based on available evidence or it can be random or based on an officer's gut feeling.
You can't predict what you will be asked, but you can practice being in a calm mindset and thinking carefully about what you say.
More info: CBP
Secondary vehicle inspection, via CAVSS camera. Source: Office of Inspector General, DHS
https://freedom.press
Communicating carefully: Secondary inspection
Secondary vehicle inspection, via CAVSS camera. Source: Office of Inspector General, DHS
https://freedom.press
If they want to search your devices
"This device contains journalist work product and I do not consent to a search. [This device belongs to my employer, [News Org.]"
https://freedom.press
Withholding consent for a search
https://freedom.press
CBP claims vs. reality
CBP's border search directive claims: “Travelers are obligated to present electronic devices and the information contained therein in a condition that allows inspection of the device and its contents.”
The Electronic Frontier Foundation says:
https://freedom.press
What happens if they take your device for a search
https://freedom.press
If CBP is going to search your device
Officers are generally supposed to have the traveler disable connectivity (i.e. turn on airplane mode).
If they take the device without asking you to do it, remind them [politely] to put it in airplane mode.
https://freedom.press
Basic search vs. Advanced search
Image: Electronic Frontier Foundation (CC BY 2.0)
https://freedom.press
Credit: U.S. Customs and Border Protection
What to do if they search your phone
https://freedom.press
What to do after you get your phone back
https://freedom.press
What to do if they don't give you your phone back
https://freedom.press
After the search
https://freedom.press
Communicating carefully: �When you're away from the border
Remember: Text messages you send, social media you post publicly, photos you take with your phone may end up scrutinized by CBP.
Source: Joseph Cox, Vice Motherboard
https://freedom.press
Be confident:
You've done nothing wrong. Reporting is not a crime.
https://freedom.press
Additional Resources
https://freedom.press
Note for instructors: If you want to get into general guidance, refer back to our other modules!
https://freedom.press/digisec/blog/chat-safety-module/
https://freedom.press/digisec/blog/e2ee-files-module/
https://freedom.press
More resources for continued learning:
https://freedom.press