Search
Find
Library
Shortcuts
Start page
Data protection and information security
Travel guide This text has been machine translated
Foreign intelligence services are interested in you, your knowledge and your research - especially when you are travelling abroad. The travel guide gives you an overview of what to consider before travelling to a conference abroad or participating in international cooperation.
How foreign intelligence services spy on you
-
Foreign intelligence services include intelligence officers, often working under the guise of diplomats, journalists or researchers, who are trained to select and build contacts with people who can typically give them access to classified and sensitive information.
-
Foreign intelligence services also make extensive use of cyber attacks to try to gain access to information from Danish authorities, educational institutions, companies and private individuals. In many ways, cyber espionage is an attractive approach as it is a low-risk form of espionage that can often be carried out from the home country and without leaving particularly visible traces.
-
Foreign intelligence services are continuously developing their capabilities to intercept telecoms and data traffic. These capabilities include monitoring electronic communications ranging from mobile phone calls, text messages and emails to radio communications.
-
On social media, an intelligence officer can often find information about a person's work, family situation, hobbies, etc. The intelligence officer can use this knowledge to make the first contact with a person who may be interesting to recruit as a source.
Consequences of espionage
Funding
Future funding is made more difficult if it is rumoured that your research has been stolen by a foreign state. You may also suffer financial loss if someone gains access to data or information owned by your funders.
Freedom
Financial dependence creates the risk of financial extortion. Direct or indirect threats to withdraw funding for a project can put pressure to compromise academic freedom or freedom of dissemination and expression.
Possibilities
The possibility to be credited for your work or to publish research is limited if there is a loss of research results.
Trust and reputation
Trust in your research risks being destroyed if data worthy of protection is stolen or misused.
Advice on travelling safety
-
PET notes that foreign states' intelligence activities continuously focus on high-tech and defence policy areas. This applies in particular to energy technology, biotechnology, quantum technology, space technology, robotics, defence industry products and products subject to export controls.
As the world evolves, there is a constant change in which research areas are particularly vulnerable, and a number of research areas and products can be used both civilly and militarily, so-called dual-use, which makes the issue more complex.
Consider your research area, data, equipment and results that are strategically important to SDU and thus exposed. If your research area is particularly vulnerable, assess whether these areas, equipment, data and results are adequately protected and pay extra attention to which collaborative relationships are entered into in the area.
Also, continuously consider what relevant conditions are included in the collaboration agreement and whether additional measures are needed. -
Be critical of unknown partners, do a background check on your business partners and make sure to report suspicions to SDU's Head of Information Security.
Do the publications, universities and workplaces they are associated with exist? Can their work be verified by others? Carefully consider that the likelihood of added value is greatest when collaborating with the partner in question and whether there are equal and compatible interests in the collaboration.
Include positive and negative lists that provide an overview of the specific technologies, data, equipment, results, etc. that are shared and to which they have access.
-
Assess the risk. The risk depends on your knowledge, your contacts and your destination, among other things. Generally speaking, there is always a risk as soon as you leave the workplace, but there is a difference between travelling to Moscow or Randers. Contact the Service Desk eller Governance, Risk & Compliance if in doubt.
-
Travelling abroad comes with additional risks. Check the Ministry of Foreign Affairs website for more information for your destination.
Se Udenrigsministeriets rejsevejledning -
Take only what you need with you. Information and equipment that you leave at home cannot be accessed by foreign intelligence services.
-
- Test all your electronic devices for technical issues before you leave.
- Learn the latest IT security principles, including how to avoid phishing, protect your data and use strong passwords.
-
If you are interested in getting a VPN on your devices so that your network activity only goes through SDU's network, please contact Servicedesk.
This may be relevant if you are travelling to a country where parts of the internet are blacked out and cannot be accessed - e.g. China or other URIS countries, or you may be afraid that someone is "listening in".Contact Service Desk -
The word "burner" refers to IT equipment that can be left behind or destroyed before or after travelling home.
When travelling to countries such as China, Russia and Iran, it is recommended that you only bring temporary computers and phones as there is a risk of your mobile devices being infected with spyware.
You can borrow both phone and PC from Service Desk. Talk to Service Desk about the right solution for you.Contact Service Desk -
Back up your important files and data, for example in OneDrive, so you don't lose them if your devices are stolen or damaged.
-
Keep an eye on your belongings. When travelling, it's easy to lose track of and lose control of the most important things. This is especially true at the airport, in the hotel, on the metro and in the conference room. For example, take protective material as hand luggage instead of checking it in with your suitcase.
-
Consider your behaviour. Avoid putting yourself in a situation where you could be blackmailed later. Travelling in groups is always better than travelling alone.
-
- Keep an eye on your electronic devices when using them in public and avoid leaving them unattended.
- Do not use publicly available USB chargers. Both the plug and cable can be compromised.
- Never plug unknown USB sticks etc. into your computer.
-
Avoid using personal devices to access SDU data when travelling.
-
Avoid having Bluetooth switched on while travelling. This applies to both phones and computers.
-
Avoid connecting to unsecure or unknown WiFi networks as they can be vulnerable to hacking and data interception. This is especially true for "open" networks in airports or similar.
-
Evaluate with your travelling companions:
- Did anything suspicious or risky happen?
- Have you been contacted unexpectedly after returning home?
- Then report it to SDU's information security manager.
Write to SDU's Head of Information Security -
If you have worked with documents, spreadsheets or anything else while travelling that only exists locally on the borrowed equipment, you should copy it. If necessary, ask the Service Desk for advice.
Contact Service Desk -
If you have brought your regular work PC with you to China, for example, and it has not been possible for you to keep an eye on it at all times, for example during security checks at the airport, it is recommended that your PC is discarded or at least reinstalled when you return home. You can get help from the Service Desk.
Contact Service Desk -
As a precautionary measure, when returning from countries where extra vigilance is required (Russia, China and Iraq), you should change passwords to your accounts to prevent unauthorised access.
Do you have any questions?
The GDPR and Information Security Coordinators are your local contact and advisor for day-to-day data protection and information security at SDU.