Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@mshelton" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mshelton</span></a></span> <span class="h-card" translate="no"><a href="https://social.freedom.press/@freedomofpress" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>freedomofpress</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@eff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>eff</span></a></span> I did prepare peoples' devices for that in the past.</p><p>My suggestions:</p><p><code>0.</code> Never assume you'll have any <a href="https://infosec.space/tags/HumanRights" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HumanRights</span></a> or <a href="https://infosec.space/tags/CivilRights" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CivilRights</span></a>. Always assume <a href="https://infosec.space/tags/TSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TSA</span></a> staff is looking for a reason to jail, deport, deny entry or shoot one on the spot.</p><p><code>1.</code> Do not have data on them! <a href="https://infosec.space/tags/CPB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPB</span></a> <em>will seize any storage media under threat of lethal violence</em>! Use a <a href="https://infosec.space/tags/ThinClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThinClient</span></a>-like device without any persistent storage. Keep anything important in your head or don't keep it at all.</p><p><code>2.</code> Have someone to setup a <a href="https://infosec.space/tags/RemoteDesktop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteDesktop</span></a> for you post-entry and enshure you've got a <em><a href="https://infosec.space/tags/SafeWord" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SafeWord</span></a></em> to indicate you're acting under duress, so they can redirect stuff to a inconspicuous system.</p><p><code>3.</code> Have a <a href="https://infosec.space/tags/decoy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decoy</span></a> system ready. CPB have full, unrestricted bulk access to all data from companies that are located, do business in or have an office within the <a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> as per <a href="https://infosec.space/tags/CloudAct" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudAct</span></a>. So much so that they consider it <em>"suspicious"</em> if one doesn't have an <a href="https://infosec.space/tags/NSABook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSABook</span></a> account.</p><p><code>4.</code> Make shure <em>all your devices</em> are <a href="https://infosec.space/tags/clean" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clean</span></a>. Get yourself new <em>throwaway</em> devices and don't trust them if you ever let them out of sight for a second!</p><p><code>5.</code> Test your setup <em>before</em> you travel to the <a href="https://infosec.space/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> <em>on a different system.</em> </p><p><code>6.</code> This applies to <em>every single device</em> from <a href="https://infosec.space/tags/SimCard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SimCard</span></a> to <a href="https://infosec.space/tags/Laptop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Laptop</span></a>. Assume that if authorities plug anything in them, they are <em>irredeemably compromised</em>!</p><p><code>7.</code> Practise proper <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a>, <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a> & <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a>. Have proper contingencies and emergency contacts in place.</p>