How to Keep ICE Agents Out of Your Devices at Airports

https://theintercept.com/2026/03/25/ice-airports-phone-security-privacy-safety/

How to Keep ICE Agents Out of Your Phone at the Airport

If you’re traveling through an airport, follow these digital security practices to keep CBP or ICE from getting into your phone.

The Intercept

The usual fare: log out, disable biometrics, use long pins and passwords, power off. Prefer a burner device, or clean your device and restore when you arrive.

I remember how Google's internal guidelines for travel circa 2011 required to remove any material under NDA from your laptop when traveling to China or Russia; you had to restore it over the VPN after a safe arrival. Funny that now the same precautions apply to the US :((

>you had to restore it over the VPN after a safe arrival

How do you restore it via VPN? Don't you first need a workable OS to connect to VPN first?

You have a working OS! But you're logged out, all sensitive data is removed (safely overwritten with random data first), and you don't have the means to connect to the VPN or anything corporate (it was before zero-trust architecture), even at gunpoint. You can check your flight status, or look up a cafe nearby to eat, etc. But you have to go to a Google office in the destination city, identity yourself, and get the trusted bits restored on your corp machine. This, together with an OTP device, finally allowed you to reconnect to the internal network (and go check fresh memegen).
I do understand why all these steps are required. And they are good. But how should zero-trust architecture solve that? You‘re still authenticated what the core problem is.
Zero-trust architecture just can work without a VPN, unless the network is blocked. Otherwise everything should be similar.