The upside-down part:<p>----<p>Before your trip:<p>• <i>Reduce the data you carry.</i> Consider using temporary devices, deleting data from your regular devices, or shifting data to the cloud.<p>• <i>Encrypt.</i> Use strong full-disk encryption, not just weak screen-lock passwords.<p>• <i>Passwords.</i> Use software to make them long, unpredictable, and memorable.<p>• <i>Backup.</i> In case agents seize your devices, backup your data.<p>• <i>Power down.</i> Do it before arriving at the border, to block high-tech attacks.<p>• <i>Fingerprint locks.</i> They are weaker than passwords, so don’t rely on them.<p>• <i>Apps and browsers.</i> Agents use them to get from devices to cloud content. Consider logging out, removing saved login credentials, and uninstalling.<p>• <i>But be aware:</i> Unusual precautions may make border agents suspicious.<p>At the border:<p>What if border agents instruct you to unlock your devices, provide your passwords, or disclose your social media information? There is no “right” answer.<p>• <i>Be safe.</i> Stay calm and respectful. Do not lie to agents, which can be a crime.<p>• <i>If you comply,</i> agents may scrutinize and copy your sensitive data.<p>• <i>If you refuse,</i> agents may seize your devices. They also may escalate the encoun-ter, for example, by detaining you for more time.<p>• <i>If you are a U.S. citizen,</i> agents must let you enter the country.<p>• <i>If you are a lawful permanent resident,</i> agents might raise complicated questions about your continued status as a resident.<p>• <i>If you are a foreign visitor,</i> agents might deny you entry