The Hilarious Truth About Border Security: Your Devices Are the Real MVPs!

Brace yourself for border crossings where your phone might get more attention than you! CBP can search your devices with no reason, but don’t worry, our checklist is here to help journalists stay secure. The Fourth Amendment is on vacation at the border, so plan ahead and keep your data safe from prying eyes.

Pro Dashboard

Hot Take:

Crossing the U.S. border? It’s like playing a high-stakes game of “Don’t Touch My Stuff” with Customs and Border Protection (CBP). This guide isn’t just for journalists, but anyone who despises the idea of their digital devices being treated like a teenager’s diary. Just because you’re crossing a border doesn’t mean you should give up your secrets. Keep your encryption tight, your passwords long, and your poker face ready. CBP may think they’re playing Sherlock, but you’ve got the Watson of all checklists.

Key Points:

  • CBP has broad authority to search devices at U.S. borders.
  • Journalists are advised to prepare in advance to protect sensitive information.
  • U.S. citizens have some leverage to refuse device searches, but face possible harassment.
  • Device encryption and strong passwords can mitigate risks.
  • Consider alternative devices or cloud storage to safeguard important data.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?