back

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of Surveillance

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:58:01
Language
English
Abstract
Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Digital searches at national borders can reach our personal correspondence, health information, and financial records, allowing an affront to privacy and dignity which is inconsistent with the values of a free society. While privacy and security is important for any traveler, this has become a critical issue for international conferences and their attendees, who shouldn’t need to trade off an invasive search for participating in important conversations. This talk will discuss the both the legal and policy issues with border searches, as well as technological measures people can use in an effort to protect their data.

This talk will begin with an overview of the legal and policy issues surrounding border crossings, where many countries will conduct more invasive searches than their constitutions would otherwise allow. The discussion will include examples of countries that can require you to enter passwords to decrypt data on your laptop and will examine your social media and cloud data, and provide advice on which countries may require more extensive precautions. This includes the challenges of entering the United States in the time of Trump, discussing the recent changes to policy for visitors entering the country, what your rights are as a visa holder, and details about EFF’s lawsuit to challenge the policy.

Turning to the practical, the talk will discuss techniques to help protect your data, from basic precautions like backups and externally stored data, to more advanced advice about encryption and password strategies, secure boot processes, as well as data hygiene - how to travel clean, and still have access to important information on the other side. This will cover what border agents are theoretically capable of doing to compromise devices, and what precautions you can take to secure your data before this interaction occurs. The discussion will include advice about laptops, mobile phones, flash drives, digital cameras, and other common digital data devices. While critical, technological protections are not enough, so we will also discuss the practicalities of interacting with border agents.

Finally, we will discuss what people can do to keep themselves informed, and stay active in the fight for a better future.

Talk ID
9086
Event:
34c3
Day
3
Room
Saal Adams
Start
6:30 p.m.
Duration
01:00:00
Track
Ethics, Society & Politics
Type of
lecture
Speaker
Kurt Opsahl
William Budington
Talk Slug & media link
34c3-9086-protecting_your_privacy_at_the_border
English
0.0% Checking done0.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
100.0% Nothing done yet100.0%
  

Work on this video on Amara!

English: Transcribed until

Last revision: 2 years, 11 months ago