Recently, Finland’s public service broadcaster published an interview with the Finnish Security Intelligence Service (SUPO), which was met with some level of ridicule on social media.

The premise of the article: Mass surveillance and targeted espionage is a thing. So, everyone should leave their gadgets at home when they travel abroad.

Sadly, this advice is technically completely accurate. SUPO does its job, states the facts and that YLE, the state broadcaster repeats it. However, overall, the article is pretty low on practical, actionable advice for the average traveler. The idea of threat modeling, figuring out or who should be afraid of what is missing.

So, yes, SUPO is entirely right, technically speaking. Seriously, the internetworking between mobile phone carriers (SS7) is just broken beyond belief. But are you going to leave your smartphone home? Well, we thought not.

That’s why we’ve collected some basic useful security tips for travellers.

Old postcard of Hotel Viru in Tallinn, Estonia.

Sokos Hotel Viru in Tallinn, Estonia was built with Finnish capital during the Soviet occupation of Estonia. The uppermost floor housed a KGB intelligence operation, which spied on guests and staff in the hotel, through technical surveillance. Today, we all carry surveillance equipment voluntarily; smartphones.


14 quick security tips for travellers

Most of us probably ought to think more about IT security than we currently do, but the correct approach for security professionals is to give actionable and practical advice. So:

1. Your number one threat is probably losing your stuff. Always back up your data before you leave on a long trip. Online backup solutions make sure your new documents are safe, even when you’re on hotel Wi-Fi


2. Speaking of Wi-FI: every traveler should have VPNs service and use that to protect against at least snooping on the local network. Virtual Private Networks form a tunnel that the content of traffic, up to an endpoint server, after the traffic either stays on a corporate intranet or leaves for the public internet. It’s good but does not make you anonymous.


3. Use a credit card rather than a debit card. Seriously; why give anyone direct access to your bank account?


4. Do not make important phone calls. Phones are indeed location traceable and eaves-droppable.


5. Use tools like WhatsApp and Facetime to place encrypted phone calls.


6. Make sure no e-mail accounts on devices are set up without secure connections (SSL/TLS), so you don’t leak e-mail passwords and content if you a separate mail client.


7. Use unique, complex passwords managed with a password manager like LastPass or 1Password.


8. Activate multi-factor authentication everywhere you can. That way, knowing a password is no longer enough to steal your stuff!


9. If you use a laptop, make sure to use a software firewall. It’s still all too common to see computers with shared, open folders on public networks.


A surveillance appliance from an unnamed vendor

This machine looks like a regular server computer, but it’s a specially built appliance a company can install to monitor network connections. There us a security argument for the use if these on corporate networks, but in practice, these can be a little Stasi or Securitate spy in a box for anyone who has the will to pay a bit of cash to have automated monitoring and stats of all network traffic. Even business class-wifi hotspots have features like these now.


10. Install software security updates, preferably automatically. Updates often protect you against remotely exploitable things, such as things you may accidentally click on.


11. Avoid buying devices that don’t receive updates. The situation isn’t very good on this front among Android phones. Sometimes, vulnerable phones and computers can be taken over via the network.


12. Avoid shady parts of the internet. Don’t assume anti-virus can protect you from risky behavior. Don’t install stuff the browser asks you to open.


13. As fans of online journalism, it pains us to say this: use an ad blocker. Ad networks download code website owners have little control over.


14. Encrypt mobile phones and computers (iOS devices are famously encrypted by default now, Android… not so much). Likewise, Macs make it very easy to turn on FileVault. Even cheap Home editions of Windows computers now have “device protection”.

This is all relatively simple and doable stuff, and it really matters. It’s a shame it’s so hard for the professionals to make useful recommendations. For some in-depth explanation of this topic, sign up for our newsletter to receive further information on when and why the spooks really are right to recommend that you leave your phone at home.

Title image credit.

Thomas Nybergh

Thomas Nybergh

Thomas Nybergh is a writer with a passion for mobile technology and user-centred design. He has spent nearly a decade working at the crossroads of technology and marketing and now spends far too much time on the internet helping to make it tick.
Thomas Nybergh

Share Now

Share this post with your friends!


Newsletter Signup

Join our mailing list to receive the latest news and updates from Miradore.

Your request is now sent. Please check your mailbox for a confirmation email from Thank you!