Skip to main content

How to Keep Border Guards From Reading Your Laptop

How to secure your computer or laptop

Bring a clean computer to the border

If you have the cash to burn, you can buy a cheap laptop or tablet to bring with you across the border. Then, before you leave on your trip, put all the documents and accounts you'll need in a secure cloud storage system.

Google Docs works, but you can also consider more secure cloud storage options such as SpiderOak, as well as the cloud-encryption software BoxCryptor.

So long as you're careful not to store any documents from the cloud onto your computer, you're not technically bringing any data to the border.

MORE: 13 Security and Privacy Tips for the Truly Paranoid

There's another way to bring a clean computer to the border: Wipe your own. But before you do, purchase an external hard drive and use it to create an image backup of your computer.

After that, you'll need to securely wipe everything on your laptop. You can do this by going into your computer's control panel and doing a factory reset, or you can install a whole new operating system on your computer, which will overwrite all of your computer's contents.

Leave the external hard drive at home, and take your newly blank laptop with you to the border.  Once you get home, you can copy your hard drive's contents back onto your laptop and get back to work.

These methods are expensive, as they require spending at least a hundred dollars for a good external hard drive, or even more for a laptop that you'll rarely use.

The advantage is that if a border agent requests to view your device, you can comply without worrying about your privacy. This might also be the way to go if you're particularly eager to avoid a confrontation at the border.

The Fifth Amendment right against self-incrimination does protect you from having to hand over your password, even at the border. Yet many people feel uncomfortable saying "no" to a federal official. If the only devices you bring to the border are clean, even handing over your password won't compromise your data.

Encrypt your data

Another option is to encrypt the data on your devices. This will take more time than purchasing a whole new device, especially if you're new to encryption. But it's not too difficult once you've gotten the hang of it, and you can encrypt your data with the same secure algorithms used by the military without spending a dollar.

On your computer, programs such as the free open-source program TrueCrypt can encrypt a few of your documents, or even your entire hard drive. The only way to see your data is to enter a password.

MORE: 13 Free Software That Encrypt Your Data

TrueCrypt also has a feature that lets you create a decoy password, so that you cannot only lock your data up, but also hide it away in what's called a "hidden volume."

Think of it as a box within a box — the only difference is that anyone looking in the outer box won't be able to tell that the inner box is there.

If someone demands access to your encrypted files, you can give them the password to the outer box, or volume, and they'll be able to see any documents you chose to store in that area.

However, they won't even know that your truly sensitive data is stored in a second layer of encryption.

For your part, you can access the hidden volume by entering the hidden volume's password instead of the outer volume's. In this way, the outer volume, and the outer volume password, are merely dummies you can surrender to others so that it seems like you're complying.

Just remember to choose a secure password, preferably more than 10 random characters in length. You can also use a passphrase, such as a sentence or verse, so long as it's more than 50 characters in length.

You may be wondering: Does encryption make you look more suspicious to border agents and other security personnel?

The official answer is no. According to the Supreme Court case United States v. Cotterman, which ruled that border inspectors need to prove "reasonable suspicion" before conducting a forensic test on a seized device, encryption alone is not to be considered suspicious.

Unofficially, however, Fakhoury says that "the government takes the position that [encryption] is a sign of someone trying to hide something."

Some of the documents leaked by former National Security Agency contractor Edward Snowden, for example, suggest that intelligence agencies pay extra attention to encrypted communications, and that a legal loophole allows the agencies to store these encrypted communications for a longer period of time.  

So if you take a computer with encrypted documents across the border, you should prepare to spend some extra time in customs, as you might find yourself being detained.

You don't have to give up your password or passphrase, but if you'd like to avoid the stress and hassle entirely, extensive encryption might not be your best option.