Is it safe to travel to the United States with your phone?
Top-Down Policy vs. “Overzealous Guards”
- Many argue there’s no clear evidence of an explicit top-down order; instead, border agents feel politically emboldened (“obeying in advance”) by rhetoric about “tough” enforcement.
- Others think confirmation bias and sensationalist headlines may be exaggerating rare incidents, but concede that if similar cases keep appearing, it signals a pattern.
- Several note that abusive enforcement usually isn’t formally ordered from above; leadership simply looks away, creating a permissive environment.
Free Speech, Non‑Citizens, and “Safety”
- Strong concern that criticism of political leaders is being treated as “potential terrorism,” especially in cases like the French scientist and foreign musicians denied entry.
- Debate over whether constitutional protections (especially the First Amendment) apply to non‑citizens at the border:
- Some insist the Bill of Rights constrains the government regardless of citizenship.
- Others cite case law suggesting people seeking initial entry have fewer enforceable rights.
- Disagreement on whether denial of entry is “unsafe”: some say deportation alone isn’t a safety threat; others point to harsh detention conditions and threats of incarceration as making travel unsafe.
Border Search Powers and the 100‑Mile Zone
- Commenters emphasize that US border search issues predate the current administration, and that CBP claims expansive warrantless search authority within 100 miles of borders and coasts, affecting most residents.
- Reports of inland CBP/ICE activity (e.g., along highways, in Michigan) contribute to a sense of creeping interior enforcement, often seen as disproportionately targeting non‑white people.
Phone & Laptop Risk: What People Actually Do
- Consensus: it’s risky to cross any border with a normal, fully loaded device.
- Common strategies:
- Bring a cheap “burner” smartphone or laptop, factory‑reset, with minimal or staged data and no primary accounts.
- Delete sensitive apps (social media, messaging, work tools), rely on web access or remote desktop/VPN after entry.
- Power devices off before landing to increase cryptographic protection (BFU vs AFU).
- Some discuss advanced tactics: multiple encrypted profiles with plausible deniability, hidden volumes, or even NFC implants; others note these can themselves arouse suspicion.
Forensics Capabilities and OS Choices
- Several mention tools like Cellebrite/GrayKey that can often extract data even from locked, encrypted phones, especially if they’ve been unlocked since last boot.
- GrapheneOS is cited as significantly harder to extract from, though only if fully updated and used correctly.
- There’s concern that cloud backups and ubiquitous syncing make device searches less central, since authorities may obtain data directly from providers.
Global Context and Travel Decisions
- Commenters stress that the US is not unique: the UK, France, and others also use terrorism or border laws to compel device access and punish refusal.
- Some now refuse to travel to the US or UK, or work for employers that forbid bringing real work devices, issuing travel burners instead.
- Others argue most tourists are unaware and unaffected, but acknowledge these practices are likely to chill tourism and academic/scientific exchange over time.