Privacy on the smart phone: a Suspect, who has nothing




Datenschutz auf dem Smartphone: Verdächtig ist, wer nichts dabei hat

(c) EFF

Traveling with a Laptop and Smartphone can bring a lot of Trouble. The Electronic Frontier Foundation know on particular hazards and gives tips on the safe handling of data at the point of entry into other countries.

Traveling with digital devices, sometimes has its pitfalls. Although a Laptop is prohibited in aircraft cabins could be prevented in the past year, but especially in the case of border controls, the possibility that the authorities want to take a look at the Smartphone or the computer. As travelers the best way to protect your data from unwanted access by the border guards, explained Kurt Opsahl and William Budington of the Electronic Frontier Foundation (EFF) at the recent Congress of the Chaos Computer club (CCC) in Leipzig. Advice that you may heed users in General, for the safe handling of your data and of the EFF specifically for entry into the United States have already been published.

Spectacular cases such as the hour-long Review of David Miranda, was detained after a Meeting with the US film-maker Laura Poitras in connection with the Snowden revelations in the London airport, are rather the exception. “Maximum caution” recommend Opsahl and Budington, when Traveling in authoritarian countries such as Russia, China, Turkey or the countries of the Middle East. The use of the encryption App Bylock was in Turkey as a kind of coup attempt. However, the EU States, as well as the United States and Canada allow within the existing laws to the searching of devices on their borders.

Not required to leave home

Probably the most banal and at the same time the most important recommendation of the two network activists is: “Take nothing! If you don’t have it, you can’t take it away at the border.” Therefore, you should consider to leave their devices at home, if you would not necessarily need on-the-go, said Budington. If this is not possible, can be replaced the normal computer through a device that will only be used temporarily for the trip. Instead of its own Smartphones, a so-called Burner Phone could be taken.

However, such an Option is not always. Finally, the application programs, and data on personal devices, which are also needed on a business trip. In principle, travellers should leave, according to Opsahl, however, only those data on the devices, which would really be needed. Also, the required data could be uploaded before the trip to a Server to download them after crossing the border again.

Forensic access is also at the limit of the possible

But such practices have their tricks, as Budington explained. Because the investigating authorities had a number of ways to supposedly deleted data or secure access devices. Budington referred to the Software of the Israeli security company Cellebrite, which can unlock the information iPhones.

With the help of the JTAG interface, the Software can also create Images of Android devices and extract data. The so-called Universal Forensic Extraction Device (UFED) of the company will not only be used by the investigating authorities, but also by border guards, and said Budington, citing company information.

Leave a Reply