How to Safely Cross Borders with Computing Devices

  • Wednesday, February 27, 2013 | 1:00 PM – 1:20 PM | Room: Room 301

View all Sessions

Business travelers may cross international borders many times per year. Several countries overtly or covertly apply digital forensics to the devices of visitors, either extracting data or compromising integrity. Yet, a traveler often needs some computing capability, and can't leave everything at home. We describe hardware, software and services to mitigate these threats.


This document was retrieved from on Tue, 16 Jul 2019 12:25:23 -0400.