How to Keep ICE Agents Out of Your Devices at Airports

theintercept.com·Nikita Mazurov
View original article
0out of 100
Noticeable — persuasion techniques worth noting

This article warns travelers about the increasing risk of digital device searches by ICE and CBP agents at U.S. airports, highlighting that these agencies have broad authority to examine phones and other devices. It argues that this surveillance poses a significant threat to personal digital privacy and advises travelers on extreme measures like using 'burner' devices, creating separate accounts, and disabling biometrics to protect their sensitive information.

FATE Analysis

Four dimensions of psychological manipulation: how content captures Focus, exploits Authority, triggers Tribal identity, and engineers Emotion.

Focus4/10Authority3/10Tribe4/10Emotion5/10
FFocus
0/10
AAuthority
0/10
TTribe
0/10
EEmotion
0/10

Focus signals

attention capture
"With Immigration and Customs Enforcement agents deployed to more than a dozen airports across the U.S. and border device searches growing increasingly common, it’s more important than ever to consider your digital security before you travel."

This opening statement aims to immediately capture attention by highlighting a widespread and increasing phenomenon, framing it as a critical and urgent issue for travelers.

novelty spike
"In June, for instance, federal agents denied a Norwegian tourist entry to the U.S. after looking through his phone. (Authorities claim they turned him away for admitted drug use; he says it was over a meme depicting Vice President JD Vance as a bald baby.)"

This anecdote serves as a 'novelty spike,' presenting a specific and somewhat unusual or amusing incident to illustrate the risk and keep the reader engaged.

novelty spike
"Immigration and Customs Enforcement have already started targeting travelers, with agents in plain clothes forcefully detaining a mother in front of her young daughter at San Francisco International Airport on Sunday after a tip from the Transportation Security Administration."

This specific, recent incident, presented as happening 'on Sunday,' creates a sense of immediacy and underscores the 'breaking' nature of the threat by providing a concrete, disturbing example.

Authority signals

institutional authority
"Customs and Border Protection agents have the authority to examine travelers’ devices."

The article states this as a factual power held by CBP, which uses institutional authority to establish the premise of the problem travelers face.

institutional authority
"As the Electronic Frontier Foundation points out, it may be months before your devices are returned — or even for an indefinite period of time if agents believe there is evidence of a crime."

The article cites the Electronic Frontier Foundation (EFF), a well-known civil liberties organization, to lend credibility to its claims about potential device confiscation durations. This is reporting on institutional findings, but it leverages that authority to emphasize the severity and legitimacy of the problem without explicitly shutting down debate.

Tribe signals

us vs them
"With Immigration and Customs Enforcement agents deployed to more than a dozen airports across the U.S. and border device searches growing increasingly common, it’s more important than ever to consider your digital security before you travel."

This opening establishes an 'us vs. them' dynamic, positioning the traveler ('you') against government agents (ICE) and their expanding powers. The article implicitly groups readers as potential targets of state power.

us vs them
"If you have anything sensitive in your accounts (say, emails from confidential sources) or anything you believe federal agents could consider damning (such as party pics or memes), be sure not to sync your apps, files, and settings onto your travel devices."

This statement further solidifies the 'us vs. them' dynamic by framing 'federal agents' as potential adversaries who might find 'damning' content, even innocuous things like 'party pics or memes.' It suggests a need for the reader to actively hide or protect information from these authorities.

us vs them
"Be cautious of entering your passcode in open view of surveillance cameras. Use one hand to shield your screen, and the thumb of your other hand to put in your passcode. Consider using privacy screens on your devices to further diminish the chance of wandering eyes noticing things that are none of their business."

This advises readers to actively conceal their actions from surveillance and 'wandering eyes,' creating an adversarial environment where privacy is under constant threat and individuals must take measures against a perceived intrusive 'them.'

Emotion signals

fear engineering
"With Immigration and Customs Enforcement agents deployed to more than a dozen airports across the U.S. and border device searches growing increasingly common, it’s more important than ever to consider your digital security before you travel. The risks are real."

The initial framing uses phrases like 'more important than ever' and 'risks are real' to instill a sense of apprehension and fear regarding personal digital security, emphasizing a perceived threat to privacy and personal data.

outrage manufacturing
"In June, for instance, federal agents denied a Norwegian tourist entry to the U.S. after looking through his phone. (Authorities claim they turned him away for admitted drug use; he says it was over a meme depicting Vice President JD Vance as a bald baby.)"

The inclusion of the tourist being denied entry over a 'meme depicting Vice President JD Vance as a bald baby' is designed to provoke a sense of outrage or injustice. Regardless of the truth, the framing of a seemingly trivial reason for such a serious consequence is disproportionate and aims to elicit an emotional reaction against authorities' actions.

outrage manufacturing
"Immigration and Customs Enforcement have already started targeting travelers, with agents in plain clothes forcefully detaining a mother in front of her young daughter at San Francisco International Airport on Sunday after a tip from the Transportation Security Administration."

This detailed description of a 'forcefully detaining a mother in front of her young daughter' is highly emotive. It's meant to generate outrage and sympathy, highlighting a distressing family scenario to underscore the perceived harshness and intrusiveness of the authorities.

fear engineering
"If you have anything sensitive in your accounts (say, emails from confidential sources) or anything you believe federal agents could consider damning (such as party pics or memes), be sure not to sync your apps, files, and settings onto your travel devices."

This statement plays on fear by suggesting that even innocuous content like 'party pics or memes' could be 'damning' in the eyes of federal agents, creating anxiety about potential misinterpretation and consequences for personal data.

Narrative Analysis (PCP)

How the article reshapes thinking: Perception (what beliefs are targeted), Context (what information is shifted or omitted), and Permission (what behavior is being encouraged).

What it wants you to believe

The article aims to install the belief that government surveillance at airports, particularly by ICE and CBP, poses a significant and immediate threat to personal digital privacy for all travelers. It emphasizes that these agencies have broad powers and are actively using them, leading to potentially severe consequences like denial of entry or confiscation of devices. The underlying belief it seeks to foster is that individual digital security at the border is precarious and under direct threat.

Context being shifted

The article shifts the context from lawful border security measures, which are generally understood to involve some level of scrutiny, to a landscape where any traveler, regardless of their background or intent, is a potential target for intrusive digital searches. This shift redefines the interaction with border agents from a procedural encounter to an adversarial one requiring pre-emptive digital counter-measures.

What it omits

The article omits detailed statistics on the frequency of device searches. While it provides anecdotes (Norwegian tourist, mother at SFO), it doesn't offer broader data on the proportion of travelers whose devices are searched, how often searches lead to confiscation, or the demographic profiles of those targeted (e.g., whether these actions are disproportionately applied to certain groups or based on specific intelligence). The absence of this broader context makes the specific instances feel more universal and immediately threatening to all readers.

Desired behavior

The article implicitly grants permission for readers to adopt a highly defensive and potentially inconvenient posture regarding their digital devices when traveling. It encourages behaviors such as purchasing 'burner' devices, creating 'travel accounts,' disabling biometrics, performing extensive data deletion, using encryption, and even proactively lying about device ownership (by using a temporary SIM) to protect their privacy from government scrutiny. It also encourages a sense of vigilance and suspicion towards border authorities.

SMRP Pattern

Four manipulation maintenance tactics: Socializing the idea as normal, Minimizing concerns, Rationalizing with logic, and Projecting blame.

-
Socializing
-
Minimizing
-
Rationalizing
-
Projecting

Red Flags

High-severity indicators: silencing dissent, coordinated messaging, or weaponizing identity to shut down debate.

-
Silencing indicator
-
Controlled release (spokesperson test)
-
Identity weaponization

Techniques Found(6)

Specific propaganda techniques identified using the SemEval-2023 academic taxonomy of 23 techniques across 6 categories.

Appeal to Fear/PrejudiceJustification
"With Immigration and Customs Enforcement agents deployed to more than a dozen airports across the U.S. and border device searches growing increasingly common, it’s more important than ever to consider your digital security before you travel. The risks are real."

This opening statement uses language that instills a sense of fear and urgency about potential government overreach and surveillance, setting a tone of imminent threat to personal privacy. The phrase 'The risks are real' is a direct appeal to fear.

Exaggeration/MinimisationManipulative Wording
"Authorities claim they turned him away for admitted drug use; he says it was over a meme depicting Vice President JD Vance as a bald baby."

The article juxtaposes a serious accusation (admitted drug use) with a comparatively trivial reason (a meme depicting a politician as a bald baby) to imply that authorities are fabricating reasons or misrepresenting intentions for denying entry. This minimizes the stated legal reason for denial while exaggerating the significance of the alternative claim.

Loaded LanguageManipulative Wording
"Immigration and Customs Enforcement have already started targeting travelers, with agents in plain clothes forcefully detaining a mother in front of her young daughter at San Francisco International Airport on Sunday after a tip from the Transportation Security Administration."

The word 'targeting' implies malicious intent and systematic pursuit of travelers beyond standard enforcement. Describing agents as 'in plain clothes' can suggest a deceptive or clandestine operation. The phrase 'forcefully detaining a mother in front of her young daughter' uses emotionally charged language to evoke sympathy and outrage against the authorities, framing the event in a highly negative light without further context on the nature or necessity of the force used.

Appeal to Fear/PrejudiceJustification
"If you have anything sensitive in your accounts (say, emails from confidential sources) or anything you believe federal agents could consider damning (such as party pics or memes), be sure not to sync your apps, files, and settings onto your travel devices."

This quote uses language designed to induce fear that federal agents might interpret innocent or private information ('party pics or memes') as 'damning,' thus creating an atmosphere of suspicion and potential unwarranted scrutiny by authorities.

Loaded LanguageManipulative Wording
"Consider using privacy screens on your devices to further diminish the chance of wandering eyes noticing things that are none of their business."

The phrase 'wandering eyes noticing things that are none of their business' is loaded language that portrays potential observation by authorities or others as intrusive and illegitimate, reinforcing a sense of being unfairly watched.

Appeal to Fear/PrejudiceJustification
"If you’re asked to unlock your devices, you can say “no.” But doing say may result in being delayed and hassled, and your device could be confiscated. You should receive paperwork attesting to the confiscation and establishing chain of custody (this is called CBP Form 6051D, or a custody receipt for detained property). As the Electronic Frontier Foundation points out, it may be months before your devices are returned — or even for an indefinite period of time if agents believe there is evidence of a crime."

This section uses an appeal to fear by highlighting the negative consequences of asserting one's rights ('delayed and hassled,' device 'confiscated,' 'months' or 'indefinite period of time' without return) rather than focusing on the legal aspects or potential justification for such actions. It frames the consequences as a deterrent to exercising one's rights, rather than as potential outcomes of a legal process.

Share this analysis