Daily Debrief: Secure your data while traveling
[ music]
^M00:00:04
>> Welcome to the Daily Debrief. I'm CNET's Kara Suboy, here with CNET News senior writer Eleanor Mills, who covers security for our site. And Eleanor, we're talking about a couple of really interesting recent developments going on. One, Kevin Mitnick [assumed spelling], and his recent flight from Bogota to Atlanta, and how he was stopped in the airport. And this may just sound incidental, but it actually brings up a lot of interesting points about the rest of us when we travel internationally. Why don't you explain what happened.
>> Well he got red flagged, and pulled aside, and they searched through his baggage, and he has a lot of laptops and computer equipment. But simultaneously, he had just gotten a phone call from a friend in Bogota saying oh the policy want to open up a box you sent you sent back to yourself for cocaine. So he was thinking that maybe you know, he's set up with some you know, drug related thing, and it turned out that the incidents were totally separately you know -
>> Not related.
>> - just coincidental, not related.
>> Right.
>> There was no you know, drugs found on the you know, in the box or anything, and he was cleared on both sides. But in the Atlanta airport, he was held for four hours, often his cell phone was taken from him, and his laptop was searched. They didn't, they let him go eventually, and was cleared of any wrong doing, but he was, and he also is very, takes extraordinary measures to protect his security and his privacy on his laptops for himself and for his customers that he consults with. He encrypts his hard drive. When he's outside of the country he sends through encrypted transmissions, he sends his confidential data to servers in the U.S. And so this is, because at the border they can take your laptop and search it for any reason whatsoever.
>> Right.
>> So he knows this, he knows that this is a policy. So he protects himself. So he was fine, but he was you know, just because of his background you know, for serving time for breaking into computer networks, he thought you know, well maybe they'll do something else.
>> Right.
>> So he did you know, much more than most of us do when we travel.
>> Oh absolutely.
>> But it's a good sort of cautionary tale that this can happen to anyone. They can pull you aside for any reason -
>> Mm-hmm.
>> - search and seize your equipment. Which leads us to the point of you know, should we even use encryption.
>> How many of us do?
>> Very few.
>> Very few.
>> Very few. A lot of you know, well we do actually every day when we use our browsers to search sensitive websites.
>> It's nothing that we're proactively doing though.
>> It's something that's going on behind the scenes -
>> Absolutely.
>> - with you know, the technology. And it's providing us some measure of security when we're visiting some websites. But as far as our own personal data, you know, very few people I know are actually using it to encrypt their email or encrypt their hard drive. But with so many laptops getting stolen and lost -
>> Mm-hmm.
>> There have been stories about government laptops, the data there getting breached and exposed.
>> Sure.
>> People are becoming more aware of it.
>> Absolutely, and just wireless security breaches as well, which I know you've been a part of earlier this year.
>> Yeah.
>> Yeah. So you tried out a few of these encryption email services.
>> Yes, I did.
>> And you weren't totally pleased.
>> You know, it's easier than it used to be.
>> Okay.
>> They're really you know, boosting up the ease of use, but it's not really friendly for my mother or your neighbor, you know, like a lot of us would have trouble using it. I mean I even had you know, customer support helping me, but that's because I was also on a deadline for this story. You have to, and the biggest problem actually is that if I want to communicate with you -
>> Mm-hmm.
>> - securely, you then have to use the same software.
>> Right.
>> So there are so many people that, for me to contact everyone, let them know what my keys are, my you know, information to securely communicate back with me, then they've got to install the software, it's a more complex process than we want to do now. We're used to just going to a website, logging into our email, and then it's done.
>> Type in the message, send it, back and forth. Yeah, not to mention some of the software is a hundred and fifty dollars or upwards, and it sounds like it was kind of slow too.
>> It's okay, yes, it did, there was a performance degradation as it was looking for the keys to oh is this person she's communicating with, you know, do they have a key. So for me, I decided that I'm not gonna be using it right now. You know, corporations are using it, and it's, there is no, you know, they've solved all the key management issues, and a lot of the performance issues. So there are software packages that companies can use that sort of make it you know, a brainless process for the workers, which is good.
>> So after your test and trials, and after Kevin Mitnick who did spend five years in prison for hacking -
>> Yeah.
>> - eight years ago, a long time ago, but his recent experience, what can we conclude? Or what can we recommend that people do to try to protect and secure their data?
>> If you have sensitive data, if you're doing you know, government work, if you have things that are really, really confidential that you don't want to, you know, the government to seize, or anyone else to get, consider, look at these products. Full disc encryption, your hard drive is probably more important to protect right now -
>> Sure.
>> - than the data that's sent over you know, email.
>> And that's easier to do -
>> It is easier to do.
>> - by just creating a backup at home -
>> Absolutely.
>> - and leaving it in a secure place.
>> Yeah.
>> Great, thank you very much.
>> Thank you.
>> Eleanor Mills, I'm Kara Suboy. We'll see you on the next Daily Debrief.
Up Next
What is the Fediverse?
Up Next
What is the Fediverse?
The Missing Piece to Apple's Eco-Friendly Mission
The Missing Piece to Apple's Eco-Friendly Mission
Boston Dynamics Retires Its HD Atlas Robot
Boston Dynamics Retires Its HD Atlas Robot
Apple and Disney's Unique Bond: Why Vision Pro Needs the Mouse
Apple and Disney's Unique Bond: Why Vision Pro Needs the Mouse
The Ocean Cleanup's System 03 Collects Plastic Pollution at Record Levels
The Ocean Cleanup's System 03 Collects Plastic Pollution at Record Levels
Latest iOS 18 Rumor Roundup: New Designs, AI Tricks
Latest iOS 18 Rumor Roundup: New Designs, AI Tricks
Apple to Talk AI in June: This WWDC Is a Big Deal
Apple to Talk AI in June: This WWDC Is a Big Deal
What Google Gemini AI on the iPhone Could Look Like
What Google Gemini AI on the iPhone Could Look Like
Microsoft Surface Pro 10, Surface Laptop 6 Are Here
Microsoft Surface Pro 10, Surface Laptop 6 Are Here
Everything Just Announced at Google's AI Health Event
Everything Just Announced at Google's AI Health Event
Tech Shows
Latest News All latest news
Apple May Give FineWoven Accessories 1 More Season
Apple May Give FineWoven Accessories 1 More Season
US vs. TikTok: What Happens Next
US vs. TikTok: What Happens Next
Battle of the Humanoid Robots: MenteeBot Is Ready
Battle of the Humanoid Robots: MenteeBot Is Ready
What to Expect at Apple's May 7 iPad Event
What to Expect at Apple's May 7 iPad Event
Did a Week With the Apple Watch Make Me Use My iPhone Less?
Did a Week With the Apple Watch Make Me Use My iPhone Less?
How Google Tests the Cameras in Its Pixel Phones
How Google Tests the Cameras in Its Pixel Phones
Most Popular All most popular
First Look at TSA's Self-Screening Tech (in VR!)
First Look at TSA's Self-Screening Tech (in VR!)
Samsung Galaxy S24 Ultra Review: More AI at a Higher Cost
Samsung Galaxy S24 Ultra Review: More AI at a Higher Cost
'Circle to Search' Lets Users Google From Any Screen
'Circle to Search' Lets Users Google From Any Screen
Asus Put Two 14-inch OLEDs in a Laptop, Unleashes First OLED ROG Gaming Laptop
Asus Put Two 14-inch OLEDs in a Laptop, Unleashes First OLED ROG Gaming Laptop
Samsung Galaxy Ring: First Impressions
Samsung Galaxy Ring: First Impressions
Best of Show: The Coolest Gadgets of CES 2024
Best of Show: The Coolest Gadgets of CES 2024
Latest Products All latest products
Battle of the Humanoid Robots: MenteeBot Is Ready
Battle of the Humanoid Robots: MenteeBot Is Ready
2025 Audi Q6, SQ6 E-Tron: Audi's Newest EV Is Its Most Compelling
2025 Audi Q6, SQ6 E-Tron: Audi's Newest EV Is Its Most Compelling
Hands-On with Ford's Free Tesla Charging Adapter
Hands-On with Ford's Free Tesla Charging Adapter
Nuro R3 is an Adorable Self-Driving Snack Bar
Nuro R3 is an Adorable Self-Driving Snack Bar
First Look: The $349 Nothing Phone 2A Aims to Brighten Your Day
First Look: The $349 Nothing Phone 2A Aims to Brighten Your Day
Best of MWC 2024: Bendable Screens, AI Wearables and More
Best of MWC 2024: Bendable Screens, AI Wearables and More
Latest How To All how to videos
Tips and Tricks for the AirPods Pro 2
Tips and Tricks for the AirPods Pro 2
How to Watch the Solar Eclipse Safely From Your Phone
How to Watch the Solar Eclipse Safely From Your Phone
Windows 11 Tips and Hidden Features
Windows 11 Tips and Hidden Features
Vision Pro App Walkthrough -- VisionOS 1.0.3
Vision Pro App Walkthrough -- VisionOS 1.0.3
Tips and Tricks for the Galaxy S24 Ultra
Tips and Tricks for the Galaxy S24 Ultra
TikTok Is Now on the Apple Vision Pro