-
U.S. travelers are believed to be priority targets for cyber-attack and monitoring/surveillance,
particularly if they are known to be engaged in classified or proprietary research
in a STEM (science, technology, engineering and mathematics) discipline. Institutional
leaders, those who are politically or religiously active, fluent speakers of the local
language and individual tourists may also be actively targeted; however, all Americans
should assume that they are potentially at risk if traveling to China and other countries
of concern.
-
The FBI advises to avoid using free charging stations in airports, hotels or shopping centers. Bad actors have figured out ways to use public
USB ports to introduce malware and monitoring software onto devices. Carry your own
charger and USB cord and use an electrical outlet instead. Do not use USB-based public
battery charging stations; the USB interface to your device may allow the charging
station to do more than just supply power.
-
If you find yourself without your own charging cable and must charge your device,
use a "data blocker" https://a.co/d/fDVhETJ that gets put in line with the USB cable in the event you have to use a charger that
it is not yours or was purchased internationally.
-
Export-controlled data or technology cannot be accessed while traveling without an
export license or other government authorization.
-
Information that is not published nor publicly available should never be shared with
any individuals who are not part of the project team.
-
DO NOT travel with encrypted devices to China unless you have advance approval from
China. China severely restricts the import of unapproved encryption. If you attempt to cross the border with an encrypted device, you may be asked for
the decryption key, your device may be confiscated, and your risk the possibility
of being prosecuted or falsely imprisoned. A permit issued by the Beijing Office of
State Encryption Administrative Bureau is required*.
-
Because encryption products can be used for illegal purposes, including terrorist
activity, the United States and many of the countries that you may visit may ban or
severely regulate the import, export and use of encryption products. So, taking your
laptop with encryption software to certain countries without proper authorization
could violate U.S. export law or the import regulations of the country to which you
are traveling, and could result in your laptop to be confiscated, in fines or in other
penalties*.
-
A group of nations negotiated a set of rules attempting to facilitate traveling with
encryption software known as the "Wassenaar Arrangement." One of its provisions allows a traveler to freely enter a participating country with
an encrypted device under a "personal use exemption" as long as the traveler does
not create, enhance, share, sell or otherwise distribute the encryption technology
while visiting. Click here to view the countries that support the personal use exemption.
-
Set Up an Email Forward Before You Leave - You may wish to set up an automatic forward
so all of your OSU emails are sent to a second email address that you can more easily
access in China (currently, it appears that most email services except Gmail are accessible,
such as Yahoo and Hotmail). Make sure to regularly check the spam folder on your second
email account as some email providers route forwarded messages there.
-
Turn off Wi-Fi and Bluetooth when not in use.
-
Only connect to trusted networks and turn off “connect automatically.”
-
Use the VPN when connecting to Wi-Fi or wired network.
-
Do not use public charging stations.
-
Do not put your computing devices in a checked bag or leave it unattended.
-
Hotel safes are not safe.
-
Be aware of your surroundings.
-
Make sure several people have your travel itinerary and know how to get in touch with
you.
-
Enroll in the US State Department Smart Travel Enrollment Program (STEP)which notifies the nearest U.S. Embassy or Consulate of your travel plans. This allows
you to receive vital information from the U.S. Embassy in China and connects you with
the embassy in case of an emergency. It also allows you to report any suspicious incidents
you experience to them. Nationals of other countries should investigate if their home
countries provide similar services.
-
While abroad, register with the nearest U.S. Embassy or Consulate and please report any suspicious incidents you experience to them.
-
When presenting at a conference, only publicly available information or published
information can be shared. If the presentation includes any data, technical data,
or information that is confidential in nature or not for public dissemination, a license
from the Federal Government may be required.
-
When taking your own technology to China, please be aware of the security risks to
you and the networks you may access while traveling. Additionally, returning home
with technology such as a laptop, tablet, cell/smartphone, smartwatch, PDA or any
other computing device and reconnecting to your home or work networks opens a broader
community to risks (such as computer viruses) that can be avoided. Be aware that standard
antivirus software may not detect when a device has been compromised.
-
If you absolutely cannot travel without personal technology, consider buying a low-tech
laptop and/or cell phone you can use and dispose of before leaving China or immediately
upon your return to the United States. Never connect that device to your home or work
networks.
-
If you are travelling without your own laptop, you may be tempted to use a computer
in a cyber cafe or hotel business center; however, those systems have a very high
probability of being infected with malware (which may capture anything you type, including
your username, password, credit card information, etc.), or of being routinely and
actively monitored by national authorities. Therefore, never use shared computers
in cyber cafes or hotel business centers, or systems belonging to other travelers,
colleagues, or friends.
-
If you are absolutely unable to be offline for the duration of your travel, do not
take your normal day-to-day devices with you. Use a new temporary device, such as
an inexpensive new laptop or a throw-away prepaid cell phone purchased just for that
trip, instead. Be sure that any such new system is fully patched, and has strong security
software installed, but otherwise minimize what it contains, and while abroad, minimize
your use of that system. Ensure it requires a long/complex password for access, and
keep it completely off (not just sleeping or hibernating) when you’re not actively
using it, and keep it in your physical possession at all times. Assume anything you
do on that system, particularly over the Internet, will be intercepted (in some cases,
encrypted network traffic may be decrypted).
-
Tape-over, block, or obscure integrated cameras on the device.
-
Physically disconnect or disable integrated microphones on the device.
-
Install a privacy screen on the device to discourage so-called “shoulder surfing”
where someone can easily read an unprotected screen “over your shoulder.”
-
Disable all file sharing.
-
Disable all unnecessary network protocols (such as Wi-Fi, Bluetooth or infrared).
-
Do not travel with unneeded door keys, smart cards, USB format PKI hard tokens, one
time password crypto fobs, and similar access control devices.
-
If traveling with RFID cards (including U.S. Government Nexus “trusted traveler” cards),
they should be carried inside an RF-shielded cover.
-
If you need to send or receive email while traveling, consider creating a temporary
“throw away” account on Yahoo or a similar service before you travel.
-
Do not send any sensitive messages via email.
-
Avoid making or receiving voice calls, using voice mail, using IM or SMS, or sending
or receiving faxes while traveling
-
If you don’t want to be geographically tracked, or you’re trying to have a confidential,
in-person conversation, batteries must be removed from cell phones. Even powered-off
cell phones may be able to be turned into surreptitious monitoring and geolocation
devices.
-
Any/all CDs, DVDs, thumb drives, attachments, links and “QR” cell phone bar codes
obtained while traveling should be considered potentially hostile and infected with
malware.
-
Do not buy new hardware while traveling that you intend to use upon return.
-
Do not buy or download any new software while traveling.
-
Do not have any of your electronic devices “repaired” or “worked-on” while traveling.
-
Any discarded items (such as notes, documents, diskettes/CDs/DVDs) may be retrieved,
analyzed and potentially exploited.
-
So-called censorship circumvention tools (including Tor) may be blocked or supply
imperfect anonymity; the use of such tools may attract official attention and result
in you being investigated and punished or expelled.
-
Guides, drivers, and interpreters may report on your activities.
-
Beware of attempts to put you in embarrassing or compromising positions while traveling.
You may be targeted for eventual extortion.
-
If arrested, taken into custody, or interrogated, do not make any statements or sign
any documents, particularly if they are written in a language you don’t know. If you
are a U.S. citizen, ask to have the U.S. Embassy or Consulate notified of your detention
at once and to speak to a U.S. consular officer.
-
We recommend you follow all federal laws and regulations and encourage filing any
required documentation and ensure an export control license is requested if applicable
for any personal device. More information for personal travel recommendations may
be found at the U.S. Department of Commerce Census Bureau and Export Administration
Regulations.