international travel safety - Office of Research Compliance

advertisement
INTERNATIONAL
TRAVEL
SAFETY/SECURITY
UNM INTERNATIONAL TRAVEL
“REQUIREMENTS”
It Is A UNM REQUIREMENT To Meet With
The Manager Of Industrial Security (FSO) If You
Meet At Least One Or More Of The Following
Criteria:
POSSESS A SECURITY CLEARANCE
WORK ON A CLASSIFIED CONTRACT
WORK ON EXPORT CONTROLLED CONTRACT
TRAVEL TO AN EMBARGOED COUNTRY
Burma, Cuba, Iran, Libya, North Korea, Sudan, Syria
UNM INTERNATIONAL TRAVEL
“RECOMMENDATIONS”
It Is RECOMMENDED You Meet With The
Manager Of Industrial Security (FSO) For:
•Country-specific threat information
•Export Control Precautions
•Updated travel warnings
•Laptop/cell phone security recommendations
•Personal Safety
•Protect research and identity theft
UNM Policy 2710

Policy applies to all UNM-sponsored study-abroad trips sponsored and organized by any
dept. at UNM, i.e., trips outside the U.S. that are led by one or more UNM faculty

All Trips must be approved in advance, in writing by the applicable dean.

Register your Trip on the GEO website and STEP

UNM will not offer or support trips whose dates & destinations are or become subject
to a U.S. Dept. of State Travel Warning or a CDCP Travel Health Warning, unless special
circumstances justify an exemption or a trip is already in progress

Trip Leaders and participants are required to purchase health and accident insurance at
least at UNM-recommended coverage levels, including medical evacuation and
repatriation of remains.

All Trip Leaders must attend UNM training coordinated and approved by the StudyAbroad Advisory Committee.

The Provost or designee will decide whether or not to grant an exemption in
consultation with the Study-Abroad Advisory Committee
Important Travel Websites


Consular Information Sheets www.travel.state.gov
World Wide Caution






U.S. Embassy Website http://usembassy.gov
Centers for Disease Control www.cdc.gov
World Health Organization http://www.who.int/en/
U.S. Department of State http://www.state.gov/
CIA World Factbook https://www.cia.gov/
Global Incident Map http://quakes.globalincidentmap.com/
http://travel.state.gov/travel/cis_pa_tw/pa/pa_4787.html
TRAVEL PREPARATION I
• If staying in foreign country for 7+ days,
notify in-country US embassy (STEP)
• Ensure passport will not expire during travel
• Beware of ATM Skimmers
- Use ATM’s located inside banks or businesses
- Pull on card slot for indications of
false faceplate
- Advise bank and cc companies of travel
- Routinely check your bank account
• Photocopy documents to carry on person
• If hotel asks you to surrender your passport during
your stay, request a receipt
TRAVEL PREPARATION II
•- Leave copy of itinerary with family and/or co-workers
- DO NOT post on Facebook while you are traveling.
If home is burglarized while you are away and
your insurance company determines you posted that you were
traveling they may not file your claim.
• Do not take expensive jewelry
•
Prepare Last Will and Testament
•
Home security
- Stop mail and newspaper delivery
•
Remove unneeded items from wallet and purse
MEDICATIONS/IMMUNIZATIONS
Medications/Eyeglass prescription
- Keep stored in prescription bottles
- Take more than required in case trip is extended
- Written prescriptions
- Some medications cannot be taken to
other countries – Contact consulate for information
* Example: ADHD meds to Japan
Ensure immunizations are current
Ensure medical insurance has adequate international coverage
Evacuation/repatriation
Unexpected emergencies (lost passport or wallet)
- HTH Insurance available through UNM Student Health
- Safety and Risk Services
UNM SHAC
International Travel Clinic




Call 277-3136 for scheduling appointments
Appointments last 30-60 minutes
For scheduling travel orientations for student groups call
Kristen Hughes 277-1074
Immunization records and all travel forms must be available
at the time of the appointment.
OTHER OPTIONS:
◦ PRIMARY CARE PROVIDER
◦ OTHER TRAVEL CLINICS IN THE COMMUNITY
Plan early - 6-8 weeks prior to departure
AIRPORT SECURITY
• Avoid wireless computer networks 400% increase in virus’ fromWiFi connections
KOB News: Dangers of Public Wi-Fi:
http://www.kob.com/article/stories/S3099746.shtml?cat=504
•
•
•
•
- Never use passwords on unsecured Wi-Fi
- Common ploy to introduce malware onto your PC
Customs
- double check bags for missing or new contents
Sensitive Conversations
- innocent conversations can wander into sensitive areas
Stay awake, secure items, don’t trust stranger to watch
your luggage
Beware of “shoulder surfers”
LOCAL AREA CONSIDERATIONS I
Safe Havens - US Embassies/Consulates;
police station; businesses with lobbies
 If you are being followed do not approach or confront
 Carry wallet/passport in front pocket
• Avoid tap water, ice cubes, street vendor food
 Never leave food or drink unattended

LOCAL AREA
CONSIDERATIONS II





Photography
- Unless granted permission, don’t photograph government buildings,
holy sites, police, military bases or personnel
Clothing
- Mimic the locals clothing, no risqué clothing, no T-shirts
with slogans
- Some countries forbid camouflage
Religion
Stay away from protests/demonstrations
Do not accept packages from strangers
VEHICLE SECURITY
• Leading Cause of Death overseas--car accidents
• Check your destinations road safety on travel.state.gov
• Rent vehicles from reputable businesses
• Keep doors locked while driving or parked
• Leave no items in plain view inside car interior
• Don’t allow gas tank to drop below half full
• Familiarize yourself with local area driving laws
• Have detailed street maps to and from hotel
PUBLIC TRANSPORTATION
SECURITY

•
Ask hotel front desk to call you a taxi
- American citizens have been robbed or
kidnapped by independent taxi drivers
- Cheat you in fares leaving you no recourse
Pick pockets love tourists
- Be observant on public transportation and in
crowded public areas
HOTEL SECURITY
DO’S
 Request a room between
2nd and 5th floor
- Harder for thieves
- Easier for fire rescue
 When leaving room,
leave:
◦
◦
◦
◦
◦
TV/radio on
Do not disturb sign
Light on
Drawers/closet closed
Utilize safe if secure
DON’TS
Open door for unordered
food/requests
Leave valuables unsecured
Enter room if it appears
room was disturbed during
your absence
THE NEW GLOBAL MOBILE THREAT
USE SAME PRECAUTIONS ON A MOBILE DEVICE AS YOU WOULD USE
ON A COMPUTER
CELL PHONES CONTAIN:
• Personal data, bank and credit card account information
• Intellectual property
• Calendar information
• GPS –Geotagging – photos can give away your location
•
Use password to unlock phone
•
Download anti-virus app
•
Do not allow strangers to use your cell phone
•
Do not hand someone your phone to take your picture
•
Consider purchasing disposable cell
LAPTOP SECURITY I
TIPS TO KEEP LAPTOP AND YOUR PRIVATE INFORMATION SAFE









Leave laptop at home, unless critical to your trip
Limit data to only what is needed for trip
Encrypt and/or password-protect data
Back up all data before leaving home
Ensure antivirus software is current and working properly
Do not install any software updates requested by any public Wi-Fi
you connect to
Refrain from taking free thumb drives at conferences
If you put your thumb drive in someone else’s PC, throw it away
Use a computer lock/cable and secure
laptop to an immovable item in room
LAPTOP SECURITY II
IF LAPTOP IS STOLEN
•
Report the theft to local Police and UNM ISD and your Dean if
laptop contained sensitive/proprietary information
IF THERE IS A NOTICEABLE DIFFERENCE IN
OPERATION
 Change your network password to help secure access to
university servers
 Run virus scan and clean install on machine
ASK I.T. TO EXAMINE LAPTOP BEFORE
RECONNECTING TO UNIVERSITY NETWORK !!
BORDER SEARCHES OF LAPTOPS
& ELECTRONIC DEVICES
•
•
•
The U.S. Government’s interest in preventing the entry of unwanted
persons and effects is at its zenith at the int’l border. Thus, routine
searches and seizures at the border do not require probable cause
or a warrant. U.S. v. Flores Montano, 541 U.S. 149, 152-53 (2004)
Searches of int’l passengers at U.S. airports are considered border
searches, and thus generally are reasonable, because they occur at
the functional equivalent of a border. U.S. v. Arnold, 533 F.3d 1003,
1006 (9th Cir. 2008).
Reasonable suspicion is not needed for customs officials to search a
laptop computer or other personal electronic storage devices at the
border. Arnold, 533 F.3d at 1008.
EXPORT CONTROL ISSUES
If you are unsure if research/technology/equipment or
chemical/biological agents you are taking overseas are
Export-Controlled, contact Adelicia Gunn at 505-277-2968
or mtaotero@unm.edu
 Certification Letter
 Do not leave technology behind without a license (Tools of
Trade)

Export Control
Non-compliance consequences for YOU and
UNM:


Civil penalties up to $500,000 for each violation
Criminal penalties up to $1,000,000 for each violation
and/or



Imprisonment for up to 20 years for
each violation
Loss of export privileges
Debarment from obtaining any government contract
over $25K
US Customs Form 4457
Ensures you do not have to pay an import fee for personal property you took
overseas
BEST PRACTICES FOR
ACADEMICS
DO NOT
Travel with current research on laptop
 Continue to use a laptop that begins to run slowly or acts strangely after taking it
overseas
 Speak about or comment on the status of research and development being conducted
by others at UNM

Information about failures in research can be as valuable as successes
ADDITIONAL TIPS FOR CLEARED
PERSONNEL
Use your gut instincts

Rule of 3 – If you see someone 3 times you are possibly being followed.

Hotel Room Surveillance – if you think your hotel room is under
surveillance, do not let the hotel know that you suspect something. Make
up an excuse and ask for a different room.

Prior to travel, FBI can check if your hotel is known for surveillance or
segregates certain visitors to the same floor, etc.

Business Card – If someone approaches you to collaborate on research or to
speak at a future conference, ask for a business card and give it to your FSO
at your travel de-brief.
If it sounds too good to be true….

Recruitment is active

Espionage

Human trafficking

Drug trafficking

Throw money at young, poor, eager, open minded visitors immersed in
their culture

Starts out innocently: Under the table English class
Glenn Shriver: http://www.washingtonian.com/articles/people/chinas-mole-in-training/
http://vimeo.com/58565199
OTHER TRAINING OFFERED
Cyber Security – Phishing: How Not To
Become a Victim of Email Fraud
 Social Networking Security
 Laptop and Cell phone Security
 International Travel Security
 Workplace Violence

DEB KUIDIS
MANAGER OF INDUSTRIAL
SECURITY/FSO
1717 ROMA NE, RM. 204
505-277-0732
dkuidis@unm.edu
http://research.unm.edu/industrialsecurity/
Download