Hacker News new | past | comments | ask | show | jobs | submit

How to Keep ICE Agents Out of Your Devices at Airports

https://theintercept.com/2026/03/25/ice-airports-phone-security-privacy-safety/
The usual fare: log out, disable biometrics, use long pins and passwords, power off. Prefer a burner device, or clean your device and restore when you arrive.

I remember how Google's internal guidelines for travel circa 2011 required to remove any material under NDA from your laptop when traveling to China or Russia; you had to restore it over the VPN after a safe arrival. Funny that now the same precautions apply to the US :((

This has been the recommendation when traveling to the US since 2001, only that the worry was NSA rather than ICE.

The procedure that I got recommended in 2005 was to install a second fresh operative system (preferable windows) on the laptop on a separate partition/disk, make a copy of the old boot partition and disk encryption headers, encrypt the copy and store it online for later retrieval, and then overwrite the old boot with the new installation. Make sure to leave the old partitions alone.

The restore is then as simple as downloading the encrypted backup, decrypt and dd it back in place. Repeat the process before taking the trip back. It was advisable to test the processes before to familiarize yourself to it, and to use the fresh installation a bit so it wasn't completely blank.

> I remember how Google's internal guidelines for travel circa 2011 required to remove any material under NDA from your laptop when traveling to China or Russia; you had to restore it over the VPN after a safe arrival.

I made this suggestion when I served on the security team at a major cybersecurity player.

When we had our company-wide annual internal conference it was always in person. This meant that basically everyone, with basically cumulative access to everything, and all our code, would be traveling across a multitude of borders at once. Some of which were less friendly than the US (at that time).

This was rejected as impractical for developers and redundant for everyone else. So I suggested locking the accounts of everyone who was traveling between the time they left and the time they arrived. This would have the side effect of signing them out of our most sensitive systems and removing certain highly confidential data from laptops. This was also rejected as “unnecessary”.

That company now counts a healthy proportion of the Fortune 500 amongst their customer base. I hope things are not so cavalier anymore.

All solid advice.

I would like to add as a reminder to encrypt all devices as well. Leave as little plaintext data as possible.

Veracrypt has the ability to create hidden volumes, regardless of OS.

loading story #47526010
>you had to restore it over the VPN after a safe arrival

How do you restore it via VPN? Don't you first need a workable OS to connect to VPN first?

loading story #47518928
loading story #47518873
Do you need to disable biometrics if you simply reboot? my Pixel 10 Pro XL wont let me in without pin after reboot. Biometrics wont work until that first unlock.
The guidelines also say that if the border agents of China or Russia ask you point blank, to give them access. It is not worth risking your personal safety for your device. That includes your PIN and password, and in China and Russia's case, whether or not that's actually allowed by law.
loading story #47519384
loading story #47518466
loading story #47518349
loading story #47518573
loading story #47518842
loading story #47519085
loading story #47518361
loading story #47524903
loading story #47518821
loading story #47518672
loading story #47518370
loading story #47518598
loading story #47518969
loading story #47522418
loading story #47519059
loading story #47518418