Identify devices at risk of search

Searches and seizure is not limited to personal computers or laptops. Any device that stores data is fair game for Customs and Border Protection or Immigration and Customs Enforcement (ICE) Agents. This includes all computers, laptops, tablets, mp3 and mobile media players, digital cameras, hard-drives, and any other mobile device you can imagine. If it stores data, Customs can search it. To be fair, the government only conducts these types of searches 300 or so times a month. So the likelihood of being searched is still small.

Searches and seizure is not limited to personal computers or laptops. Any device that stores data is fair game for Customs and Border Protection or Immigration and Customs Enforcement (ICE) Agents. This includes all computers, laptops, tablets, mp3 and mobile media players, digital cameras, hard-drives, and any other mobile device you can imagine. If it stores data, Customs can search it. To be fair, the government only conducts these types of searches 300 or so times a month. So the likelihood of being searched is still small.

(Images via bertconcept, grahamstanley and mwichary‘s Flickr photostreams)

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.