this post was submitted on 10 Dec 2025
353 points (98.4% liked)

Technology

77096 readers
2787 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

https://www.404media.co/man-charged-for-wiping-phone-before-cbp-could-search-it/

A man in Atlanta has been arrested and charged for allegedly deleting data from a Google Pixel phone before a member of a secretive Customs and Border Protection (CBP) unit was able to search it, according to court records and social media posts reviewed by 404 Media. The man, Samuel Tunick, is described as a local Atlanta activist in Instagram and other posts discussing the case. The exact circumstances around the search—such as why CBP wanted to search the phone in the first place—are not known. But it is uncommon to see someone charged specifically for wiping a phone, a feature that is easily accessible in some privacy and security-focused devices. 💡 Do you know anything else about this case? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co. The indictment says on January 24, Tunick “did knowingly destroy, damage, waste, dispose of, and otherwise take any action to delete the digital contents of a Google Pixel cellular phone, for the purpose of preventing and impairing the Government’s lawful authority to take said property into its custody and control.” The indictment itself was filed in mid-November. Tunick was arrested earlier this month, according to a post on a crowd-funding site and court records. “Samuel Tunick, an Atlanta-based activist, Oberlin graduate, and beloved musician, was arrested by the DHS and FBI yesterday around 6pm EST. Tunick's friends describe him as an approachable, empathetic person who is always finding ways to improve the lives of the people around him,” the site says. Various activists have since shared news of Tunick’s arrest on social media.

The indictment says the phone search was supposed to be performed by a supervisory officer from a CBP Tactical Terrorism Response Team. The American Civil Liberties Union (ACLU) wrote in 2023 these are “highly secretive units deployed at U.S. ports of entry, which target, detain, search, and interrogate innocent travelers.” “These units, which may target travelers on the basis of officer ‘instincts.’ raise the risk that CBP is engaging in unlawful profiling or interfering with the First Amendment-protected activity of travelers,” the ACLU added. The Intercept previously covered the case of a sculptor and installation artist who was detained at San Francisco International Airport and had his phone searched. The report said Gach did not know why, even years later. Court records show authorities have since released Tunick, and that he is restricted from leaving the Northern District of Georgia as the case continues. The prosecutor listed on the docket did not respond to a request for comment. The docket did not list a lawyer representing Tunick.

top 50 comments
sorted by: hot top controversial new old
[–] 1984@lemmy.today 62 points 1 day ago* (last edited 1 day ago) (2 children)

I heard on the news today that the US is planning to force people visiting their ~~slave pen~~ country to show their social media history and 5 years of recent phone numbers. :)

They really dont want anyone coming there do they... :)

https://www.dw.com/en/us-demands-access-to-tourists-social-media-histories/a-75096949

[–] kokesh@lemmy.world 15 points 1 day ago (1 children)

Yes! What if they would find something in my history? That would be horrible! Something like Fuck you tRump, you orange clown. Pedophile president. Does he also paint his dick orange? Does he fuck bag of cheetos every morning? Charlie kirk was fucking racist. Something like this could popup in my social media history! Oh no!

[–] 1984@lemmy.today 14 points 1 day ago (1 children)

I think they are not even interested in any of that. Its just a method of control. Continuing to apply pressure to people, reminding them to bow down to authority.

They can already get the social media history from any big tech company. :)

[–] itisileclerk@lemmy.world 5 points 1 day ago (1 children)

They are getting everything since always. That is why tech companies are getting so much money from government. Social media is a dream come true for US government.

[–] 1984@lemmy.today 5 points 1 day ago* (last edited 1 day ago) (1 children)

I think they are all going further and further into madness. Us government and big tech together.

They dont seem to understand that themselves. The consciousness of wanting to control by force, in combination with big tech dystopian dreams of raising humans with Ai, and watching everybody in real time... Its a very strong difference in that kind of consciousness compared to a good person on this planet.

Ive lost interest in building technology solutions myself. Because its just about ads and control now. Its just the wrong kind of consciousness in charge of humanity. Tech isnt helping us, its making us more and more helpless and depressed.

[–] IcyToes@sh.itjust.works 2 points 1 day ago (1 children)

All the more reason to build open source alternatives.

Folk were plowing contributions into Linux for decades and it's pretty mature now :).

[–] 1984@lemmy.today 3 points 1 day ago

Yeah im doing open source, that still feels good. :)

[–] Spaniard@lemmy.world 3 points 1 day ago* (last edited 1 day ago)

to show their social media history

For visa I think they already do, well not exactly show their social media history but the background check includes social media because people from the Philippines trying to get a visa remove pictures with Americans when they apply for visa.

Since most of the popular social networks are Americans I don't think there is a limitation, probably even if you remove things...

[–] alpha1beta@piefed.social 74 points 1 day ago

it should be my fucking right to to delete my data on my device at any time. Your lack of planning on your warrant doesn't constitute an emergency or wrong doing on my part.

[–] tabular@lemmy.world 6 points 23 hours ago

Ya'll have phones?

Maybe I should not, if it can be taken with no articulable reason given.

[–] favoredponcho@lemmy.zip 150 points 1 day ago (13 children)

If it’s GrapheneOS, he may have given them the wipe code. You enter a passcode and it deletes everything. So, CBP may have done this. In any case, fuck em.

[–] crash_thepose@lemmy.ml 1 points 4 hours ago
[–] MalMen@masto.pt 10 points 22 hours ago

@favoredponcho @InternetCitizen2 I knew a guy that leaved the wipecode "hidden" in the phone case hoping that it would be entered without asking if someome took his phone

[–] mybuttnolie@sopuli.xyz 36 points 1 day ago (1 children)

instead of a destructive code, GOS should allow a code that will automatically open a secondary profile. wouldn't get the user in trouble

[–] Zaktor@sopuli.xyz 55 points 1 day ago

Another story said he wiped it "using a code", so it sounds like that.

https://atlpresscollective.com/2025/12/05/samuel-tunick-atlanta-activist-arrest/

load more comments (9 replies)
[–] toiletobserver@lemmy.world 152 points 1 day ago (3 children)

We should all have a digital self detonation button in case of overreaching small dicked incel fascists.

[–] FanciestPants@lemmy.world 2 points 11 hours ago* (last edited 11 hours ago)

I accidentally put in the hardware code to reset my phone to factory settings once by jamming it into my car console. It sucked at the time, but made me appreciate that I could use this code in the future if needed.

You may have this option on your device as well.

[–] Tangent5280@lemmy.world 75 points 1 day ago (1 children)

I object to your use of penis size as a derogative. I have the smallest dick on the planet but I haven't become a fascist yet.

[–] shittydwarf@piefed.social 30 points 1 day ago (2 children)
[–] Tangent5280@lemmy.world 23 points 1 day ago

I can give you a probability density mapping in accordance to the Pauli Exclusion Principle

[–] BeatTakeshi@lemmy.world 40 points 1 day ago

Duh not with naked eye

load more comments (1 replies)
[–] Pika@sh.itjust.works 37 points 1 day ago (10 children)

The exact circumstances around the search—such as why CBP wanted to search the phone in the first place—are not known

until this isn't an unknown it's impossible to voice opinion on the legality of this action. If they had evidence that there was something incriminating or against the law on the device and can prove the user intentionally destroyed the info to impede the investigation(honestly this last part is fairly easy as long as the first part can happen) then yea what he did would defo break the law, but until those aspects can be determined this seems like a massive abuse of that persons 1st(due to activism), 4th (due to the seizure of private property without a lawful search), and 5th(again private property) amendment rights.

[–] fodor@lemmy.zip 6 points 1 day ago (2 children)

I think your speculation is probably going to be fairly close to reality, but that makes their case very difficult to prove. If the FBI comes to my house and tells me that they're investigating a crime and then I delete data, then probably I have broken the law. And I would have known it. So I would get convicted. But Border Patrol loves to go on fishing expeditions and search digital devices when there is no evidence that a crime has been committed. And if that's the case, then I don't have any obligation to preserve the data. And it doesn't even matter what Border Patrol claims later because the legal standard is going to be what I believed at the time that they tried to go on their fishing expedition.

I think we can safely conclude that there was no warrant because no one has reported there was a warrant and that is the kind of thing that they would have reported. And if they had one they would have seized the phone itself. So we can reasonably conclude that this is a situation where they told the guy, unlock your phone or we're going to keep you locked up or we're going to take your phone.

load more comments (2 replies)
load more comments (8 replies)
[–] LodeMike@lemmy.today 42 points 1 day ago (1 children)

The indictment does not say anything more than what is quoted. I am wondering if this is because he deleted the contents after being told it would be searched or something

[–] Chulk@lemmy.ml 61 points 1 day ago (3 children)

Given that it says the phone was a Google Pixel, I'm guessing it was GrapheneOS and the activist entered their duress PIN before handing over the phone.

[–] atrielienz@lemmy.world 41 points 1 day ago* (last edited 1 day ago) (1 children)

Then they should have to explain under what law or suspected crime he was detained and his phone was taken as evidence.

Because otherwise they can't prove he deleted evidence of a suspected crime. So what is the suspected crime?

load more comments (1 replies)
[–] potatopotato@sh.itjust.works 10 points 1 day ago

It should be noted for the record, if you ever have to use your duress code, do it before you hand the device over, don't offer it up to them, and SHUT THE FUCK UP.

If you have time, turn the phone back on and you'll get a "recovery" screen asking to do a factory reset. Select this and let it boot back to the setup screen then turn it off again. It's now in a state where, if you remembered to shut the fuck up, they'll have a much harder time proving that you destroyed evidence and didn't just hand over a device you hadn't setup yet, as is a somewhat common (good) practice with border crossings.

As with all things you may have to depend on, ideally you should test this flow. Carefully make a backup, verify the backup integrity, then use the duress pin ensuring that everything works the way you expected.

https://m.youtube.com/watch?v=Q7oM0IB-IiM

[–] mkwt@lemmy.world 35 points 1 day ago (4 children)

If he's a US citizen, he's better off refusing to enter any PIN. That's protected by the 5th amendment.

If not a citizen and this was in a port of entry context, then he would still have the 5th amendment protection. But customs can simply choose to refuse entry on discretion. So that's a potentially serious consequence.

[–] RunningInRVA@lemmy.world 32 points 1 day ago (8 children)

At least on an iPhone, if the device has been unlocked since powering on, then forensic tools such as Cellebrite’s can extract information from the phone. The absolute safest bet is to perform a wipe. If this person is an activist then he’s an easy target and likely knew to be prepared for such an interrogation with our current fascist administration.

[–] bearboiblake@pawb.social 5 points 1 day ago* (last edited 1 day ago)

GrapheneOS has a feature which automatically restarts the phone if it hasn't been interacted with after some user-configurable delay. For example, you could configure the phone to automatically reboot if it hasn't been used for an hour. This way, even if the phone is seized, that reboot timer is ticking. Once it reboots, the encryption on the phone is basically unbreakable.

load more comments (7 replies)
load more comments (3 replies)
[–] PushButton@lemmy.world 23 points 1 day ago (8 children)

Does the Rights against self-incrimination and the Right to remain silent help here?

I don't see something they can really do against it? I am not in the USa so, someone?

load more comments (8 replies)
load more comments
view more: next ›