menu_open Columnists
We use cookies to provide some features and experiences in QOSHE

More information  .  Close

How to Keep ICE Agents Out of Your Devices at Airports

34 0
25.03.2026

Special Investigations

Press Freedom Defense Fund

How to Keep ICE Agents Out of Your Devices at Airports

If you’re traveling, follow these digital security practices to keep federal authorities from getting into your phone.

With Immigration and Customs Enforcement agents deployed to more than a dozen airports across the U.S. and border device searches growing increasingly common, it’s more important than ever to consider your digital security before you travel.

The risks are real. Customs and Border Protection agents have the authority to examine travelers’ devices. In June, for instance, federal agents denied a Norwegian tourist entry to the U.S. after looking through his phone. (Authorities claim they turned him away for admitted drug use; he says it was over a meme depicting Vice President JD Vance as a bald baby.)

Immigration and Customs Enforcement have already started targeting travelers, with agents in plain clothes forcefully detaining a mother in front of her young daughter at San Francisco International Airport on Sunday after a tip from the Transportation Security Administration.

If you’re flying, take these steps to reduce the likelihood that your sensitive information is compromised at the airport.

Don’t Bring Your Usual Devices

The only surefire way to keep your devices from being searched and seized is to simply not bring them with you on your trip. If you can’t leave them at home, consider mailing them to and from your destination.

Marine Detained in Minneapolis Says Feds Copied His Phone Without a Warrant

Another option is to leave devices that contain sensitive information at home and instead bring throwaway travel devices you’re willing to have searched or confiscated. This doesn’t need to be an expensive proposition. You can reformat and repurpose an old phone or tablet, or purchase refurbished older models that are comparatively cheap. Then buy a temporary SIM card or eSIM so that you’re not using your usual number. Remember to let contacts know that for the duration of your trip you’ll be reachable at a different number.

Create a travel account for these devices. You can do so by starting a fresh account in the App Store or Google Play. This should ensure that if you’re forced to log into your device by authorities at the airport, the only information they’ll find is data you’ve put on this specific piece of hardware. CBP agents are supposed to only be able to look at data that’s local on the phone.

If you have anything sensitive in your accounts (say, emails from confidential sources) or anything you believe federal agents could consider damning (such as party pics or memes), be sure not to sync your apps, files, and settings onto your travel devices.

Disable Biometrics and Power Off

Regardless of whether you opt to bring your usual devices or specialized travel burners, take these steps to lock down your devices.

Washington Post Raid Is a Frightening Reminder: Turn Off Your Phone’s Biometrics Now

First and foremost, disable any biometrics, like using your face or fingerprint, to unlock your phone. Instead, set up a unique and random alphanumeric passcode; eight characters consisting of random digits and numbers is a good start. Be cautious of entering your passcode in open view of surveillance cameras. Use one hand to shield your screen, and the thumb of your other hand to put in your passcode. Consider using privacy screens on your devices to further diminish the chance of wandering eyes noticing things that are none of their business.

Be cautious of entering your passcode in open view of surveillance cameras.

Be cautious of entering your passcode in open view of surveillance cameras.

When going through security checkpoints, turn your devices completely off. Don’t just put them to sleep — fully shut them down. Though having a locked device is better than having it be unlocked, turning it off is best, as this makes it much harder for data to be forensically recovered from your devices.

That means you’ll need to print out paper copies of boarding passes, rather than rely on digital versions stored in a device wallet or via your airline’s app.

If you’re asked to unlock your devices, you can say “no.” But doing say may result in being delayed and hassled, and your device could be confiscated. You should receive paperwork attesting to the confiscation and establishing chain of custody (this is called CBP Form 6051D, or a custody receipt for detained property). As the Electronic Frontier Foundation points out, it may be months before your devices are returned — or even for an indefinite period of time if agents believe there is evidence of a crime.

We’re independent of corporate interests — and powered by members. Join us.

Join Our Newsletter Thank You For Joining!

Original reporting. Fearless journalism. Delivered to you. Will you take the next step to support our independent journalism by becoming a member of The Intercept?

By signing up, I agree to receive emails from The Intercept and to the Privacy Policy and Terms of Use.

Original reporting. Fearless journalism. Delivered to you.

Delete Files and Log Out

To practice what’s known in security circles as “defense in depth,” it’s best to think of your digital security as an onion: If an outer layer is peeled off, you want there to be a good second layer to minimize the damage to the core. To that end, assume that even if you have a strong passphrase and have powered off your device, someone may still be able to find a way in. Your travel devices should, therefore, minimize the amount of sensitive information they store. In that case, even if someone manages to break through the outer layer, the information exposed would be trivial.

If you use a password manager — a specialized app that securely stores your passwords — put it into a “travel mode,” limiting the passwords it will reveal for the duration of your trip. Remove access to sensitive accounts that you very likely won’t have a reason to need to access during your travels; for example, removing your work email if you’re going on vacation, or leaving and deleting and sensitive Signal chats, like local ICE watch groups.

Log out of or delete apps you won’t need while traveling. You can reinstall and log back in when you are safely away from the airport. Remember to remove them once again when you’re on your way back — and keep in mind that this may lead to some apps deleting your history.

Finally, be sure to prune your contacts to remove any that are sensitive, such as sources, if you’re a journalist. If you have sensitive materials on your devices that you’ll need to access during your travels, use a tool like Cryptomator to encrypt them and upload them to a cloud drive, then delete the files from your devices. You can download them when you reach your destination.

These extra steps are undoubtedly a bit of a pain, but any inconvenience would pale in comparison to the potential damage if sensitive information is disclosed during your time in the airport.

IT’S EVEN WORSE THAN WE THOUGHT.

What we’re seeing right now from Donald Trump is a full-on authoritarian takeover of the U.S. government. 

This is not hyperbole.

Court orders are being ignored. MAGA loyalists have been put in charge of the military and federal law enforcement agencies. The Department of Government Efficiency has stripped Congress of its power of the purse. News outlets that challenge Trump have been banished or put under investigation.

Yet far too many are still covering Trump’s assault on democracy like politics as usual, with flattering headlines describing Trump as “unconventional,” “testing the boundaries,” and “aggressively flexing power.” 

The Intercept has long covered authoritarian governments, billionaire oligarchs, and backsliding democracies around the world. We understand the challenge we face in Trump and the vital importance of press freedom in defending democracy.

We’re independent of corporate interests. Will you help us?

IT’S BEEN A DEVASTATING year for journalism — the worst in modern U.S. history.

We have a president with utter contempt for truth aggressively using the government’s full powers to dismantle the free press. Corporate news outlets have cowered, becoming accessories in Trump’s project to create a post-truth America. Right-wing billionaires have pounced, buying up media organizations and rebuilding the information environment to their liking.

In this most perilous moment for democracy, The Intercept is fighting back. But to do so effectively, we need to grow.

That’s where you come in. Will you help us expand our reporting capacity in time to hit the ground running in 2026?

We’re independent of corporate interests. Will you help us?

I’M BEN MUESSIG, The Intercept’s editor-in-chief. It’s been a devastating year for journalism — the worst in modern U.S. history.

We have a president with utter contempt for truth aggressively using the government’s full powers to dismantle the free press. Corporate news outlets have cowered, becoming accessories in Trump’s project to create a post-truth America. Right-wing billionaires have pounced, buying up media organizations and rebuilding the information environment to their liking.

In this most perilous moment for democracy, The Intercept is fighting back. But to do so effectively, we need to grow.

That’s where you come in. Will you help us expand our reporting capacity in time to hit the ground running in 2026?

We’re independent of corporate interests. Will you help us?

Crossing the U.S. Border? Here’s How to Protect Yourself

Digital Security Tips to Prevent the Cops From Ruining Your Trip Abroad

Feds Are Tapping Protesters’ Phones. Here’s How To Stop Them.

I’m a Journalist but I Didn’t Fully Realize the Terrible Power of U.S. Border Officials Until They Violated My Rights and Privacy

U.S. Oil Blockade Could Condemn Cubans to Die Without a Deal

The American oil blockade of Cuba has made conditions on the island dire, and reaching a deal has become a matter of life and death.

Leaders of Elite Paratrooper Unit Ordered to Middle East as Trump Weighs Iran Ground War

Government sources tell The Intercept that leadership of the storied 82nd Airborne Division have been ordered to the Middle East.

Palantir Will No Longer Profit Off of New Yorkers’ Health Data

After The Intercept exposed Palantir’s deal with NYC public hospitals, the health care system didn’t renew the contract.

© The Intercept. All rights reserved

Enter your email to keep reading for free.

This is not a paywall.

By signing up, I agree to receive emails from The Intercept and to the Privacy Policy and Terms of Use.

No ads. No corporate BS. Skip the propaganda and donate to keep The Intercept going strong:

No ads. No corporate BS. Skip the propaganda and donate to keep The Intercept going strong:

We’re independent of corporate interests. Will you join us?


© The Intercept