The Codex · Operational Security · Protocol OPSE-003
Travel removes you from a controlled environment and places you in a series of unfamiliar, high-traffic situations where your devices, documents, and conversations are all more exposed than at home or in the office. This protocol defines the preparation, behaviours, and post-travel procedures required to manage that expanded attack surface.
At home and in a controlled office environment, you have reasonable certainty about who can access your physical space, what network you are on, and who can observe your screen or conversations. Travel removes all of those certainties simultaneously. You are in unknown physical spaces, on networks you did not configure, surrounded by people you do not know, carrying devices that may pass through inspection at borders.
The additional risk is not hypothetical. Corporate espionage targeting business travellers in high-value sectors is documented and ongoing in several jurisdictions. Border agencies in a growing number of countries have legal authority to compel device access. Hotel networks have been used as access vectors in documented attacks. The security posture appropriate for your home office is insufficient for the environments you pass through when travelling.
The degree of device preparation required scales with the risk profile of the destination and the sensitivity of the work being conducted. At minimum, all devices should have full-disk encryption active and verified, and should be powered down rather than sleeping when transiting through border controls — some jurisdictions have both legal authority and technical capability to access a sleeping device that they do not have for a fully powered-down encrypted one.
For travel to high-risk destinations, the use of a dedicated travel device is the appropriate approach. This device is configured with no access to primary accounts, no stored credentials beyond what is needed for the trip, and no sensitive data. It is treated as potentially compromised for the duration of the trip. On return, it is wiped and reset before next use. The additional cost and inconvenience of a travel device is proportionate to the value of what it is protecting.
Hotel wifi is the most commonly used and most frequently compromised network in business travel. The risk is not only from the network operator — it is from other devices on the same network, from rogue access points with matching SSIDs, and from passive monitoring of unencrypted traffic. A VPN eliminates most of these risks for traffic that passes through it; it does not eliminate risk from malware already on the device or from DNS leaks outside the tunnel.
USB charging infrastructure in airports and hotels has been used to deliver malware to connected devices — a technique known as juice jacking. The risk is present wherever USB charging is available publicly. An AC charger and a USB data-blocker are inexpensive and reliable mitigations. The habit of never using public USB ports for charging is equally reliable and costs nothing.
The period immediately after returning from travel is operationally significant. Any device that may have been compromised during the trip represents a risk to every network and system it connects to. The post-travel procedure exists to contain that risk before it propagates.
Password rotation for accounts accessed during travel is straightforward and takes minutes. Device review for anomalies — unexpected running processes, new installed profiles, changed settings — takes longer but is a reasonable precaution after travel to any destination where the risk was meaningful. The threshold for this level of review is a judgement call; the requirement is that the judgement is made consciously, not avoided.