如何在机场防止ICE特工访问你的设备
How to Keep ICE Agents Out of Your Devices at Airports

原始链接: https://theintercept.com/2026/03/25/ice-airports-phone-security-privacy-safety/

## 旅行小贴士:保护您的数字隐私 由于美国移民及海关执法局(ICE)和海关与边境保护局(CBP)的审查力度加大,旅客面临电子设备被搜查的风险日益增加。执法人员有权检查手机和笔记本电脑,甚至可以根据发现的内容拒绝入境——最近就有一位游客因为一个表情包而被拒入境。 为了降低风险,专家建议尽量减少携带物品。可以考虑使用旧的、已恢复出厂设置的“备用”设备,并使用临时SIM卡和单独的应用商店帐户,避免同步敏感数据。如果使用您的主要设备,请禁用生物识别技术,创建一个强大的字母数字密码(并谨慎输入),并在安全检查期间*完全*关闭设备电源——不要仅仅锁定屏幕。 其他预防措施包括删除不必要的文件并退出敏感帐户,在密码管理器中使用“旅行模式”,以及加密重要的文件以便在目的地通过云端访问。虽然您有权拒绝解锁您的设备,但这样做可能会导致延误或没收(CBP会记录在表格上)。这些步骤可能不方便,但对于在旅行期间保护您的个人信息至关重要。

## 机场设备安全与ICE问题 (Hacker News 摘要) 一篇最近的Intercept文章引发了Hacker News上关于ICE(移民和海关执法局)在机场加强对旅客设备检查的讨论。用户们分享了保护数据的建议,包括注销账户、禁用生物识别、使用强密码,以及理想情况下,使用“一次性”设备或在旅行前后彻底清理设备。 对话强调了对ICE根据TSA(交通安全管理局)的提示拘留旅客的报告的担忧,甚至共享乘客名单。虽然一些人争论TSA的参与程度(私有化筛选与更广泛的数据角色),但证据表明存在一个TSA根据移民身份将个人标记给ICE的项目。 许多评论者对需要采取以前仅为前往中国或俄罗斯等国家旅行时才保留的预防措施表示沮丧,一些人甚至提倡完全避免前往美国旅行。另一些人建议在旅行时尽量减少对技术的依赖,同时承认在“移动优先”世界中这样做越来越困难。一个反复出现的主题是对政府过度干预的不信任,以及呼吁解散像ICE和TSA这样的机构。
相关文章

原文

With Immigration and Customs Enforcement agents deployed to more than a dozen airports across the U.S. and border device searches growing increasingly common, it’s more important than ever to consider your digital security before you travel.

The risks are real. Customs and Border Protection agents have the authority to examine travelers’ devices. In June, for instance, federal agents denied a Norwegian tourist entry to the U.S. after looking through his phone. (Authorities claim they turned him away for admitted drug use; he says it was over a meme depicting Vice President JD Vance as a bald baby.)

Immigration and Customs Enforcement have already started targeting travelers, with agents in plain clothes forcefully detaining a mother in front of her young daughter at San Francisco International Airport on Sunday after a tip from the Transportation Security Administration.

If you’re flying, take these steps to reduce the likelihood that your sensitive information is compromised at the airport.

Don’t Bring Your Usual Devices

The only surefire way to keep your devices from being searched and seized is to simply not bring them with you on your trip. If you can’t leave them at home, consider mailing them to and from your destination.

Another option is to leave devices that contain sensitive information at home and instead bring throwaway travel devices you’re willing to have searched or confiscated. This doesn’t need to be an expensive proposition. You can reformat and repurpose an old phone or tablet, or purchase refurbished older models that are comparatively cheap. Then buy a temporary SIM card or eSIM so that you’re not using your usual number. Remember to let contacts know that for the duration of your trip you’ll be reachable at a different number.

Create a travel account for these devices. You can do so by starting a fresh account in the App Store or Google Play. This should ensure that if you’re forced to log into your device by authorities at the airport, the only information they’ll find is data you’ve put on this specific piece of hardware. CBP agents are supposed to only be able to look at data that’s local on the phone.

If you have anything sensitive in your accounts (say, emails from confidential sources) or anything you believe federal agents could consider damning (such as party pics or memes), be sure not to sync your apps, files, and settings onto your travel devices.

Disable Biometrics and Power Off

Regardless of whether you opt to bring your usual devices or specialized travel burners, take these steps to lock down your devices.

First and foremost, disable any biometrics, like using your face or fingerprint, to unlock your phone. Instead, set up a unique and random alphanumeric passcode; eight characters consisting of random digits and numbers is a good start. Be cautious of entering your passcode in open view of surveillance cameras. Use one hand to shield your screen, and the thumb of your other hand to put in your passcode. Consider using privacy screens on your devices to further diminish the chance of wandering eyes noticing things that are none of their business.

Be cautious of entering your passcode in open view of surveillance cameras.

When going through security checkpoints, turn your devices completely off. Don’t just put them to sleep — fully shut them down. Though having a locked device is better than having it be unlocked, turning it off is best, as this makes it much harder for data to be forensically recovered from your devices.

That means you’ll need to print out paper copies of boarding passes, rather than rely on digital versions stored in a device wallet or via your airline’s app.

If you’re asked to unlock your devices, you can say “no.” But doing say may result in being delayed and hassled, and your device could be confiscated. You should receive paperwork attesting to the confiscation and establishing chain of custody (this is called CBP Form 6051D, or a custody receipt for detained property). As the Electronic Frontier Foundation points out, it may be months before your devices are returned — or even for an indefinite period of time if agents believe there is evidence of a crime.

Delete Files and Log Out

To practice what’s known in security circles as “defense in depth,” it’s best to think of your digital security as an onion: If an outer layer is peeled off, you want there to be a good second layer to minimize the damage to the core. To that end, assume that even if you have a strong passphrase and have powered off your device, someone may still be able to find a way in. Your travel devices should, therefore, minimize the amount of sensitive information they store. In that case, even if someone manages to break through the outer layer, the information exposed would be trivial.

If you use a password manager — a specialized app that securely stores your passwords — put it into a “travel mode,” limiting the passwords it will reveal for the duration of your trip. Remove access to sensitive accounts that you very likely won’t have a reason to need to access during your travels; for example, removing your work email if you’re going on vacation, or leaving and deleting and sensitive Signal chats, like local ICE watch groups.

Log out of or delete apps you won’t need while traveling. You can reinstall and log back in when you are safely away from the airport. Remember to remove them once again when you’re on your way back — and keep in mind that this may lead to some apps deleting your history.

Finally, be sure to prune your contacts to remove any that are sensitive, such as sources, if you’re a journalist. If you have sensitive materials on your devices that you’ll need to access during your travels, use a tool like Cryptomator to encrypt them and upload them to a cloud drive, then delete the files from your devices. You can download them when you reach your destination.

These extra steps are undoubtedly a bit of a pain, but any inconvenience would pale in comparison to the potential damage if sensitive information is disclosed during your time in the airport.

联系我们 contact @ memedata.com