As air travelers continue to rely heavily on their mobile devices, the Transportation Security Administration (TSA) has issued a renewed warning against the use of public USB charging ports at airports—a practice that could leave devices vulnerable to hackers.
According to the TSA, cybercriminals may load malware into USB charging stations in public places, particularly in airports. When a device is plugged into an infected port, malicious software can be transferred, potentially allowing access to personal data, passwords, and other sensitive information. This growing threat is known as “juice jacking” or “port jacking.”
At Seattle-Tacoma International Airport (SEA), travelers like Emma Wong are already wary of the risks. She shared that she avoids public USB ports specifically because she’s heard that “people can hack your phone or steal your information” just through a simple charge.
Despite the concern, SEA Airport officials are reassuring passengers about the safety of their charging stations. Perry Cooper, a representative from SEA, emphasized that the airport has invested millions into infrastructure upgrades to maintain security, stating that it wouldn’t make sense to spend that kind of money on systems that could endanger customer safety. He further noted that “no one has had any problems with that” and “no incidents have been reported” at SEA in relation to juice jacking.
Still, TSA advises all travelers to take precautions, including carrying a TSA-compliant power brick or portable battery pack to avoid relying on public charging stations. The agency also warns against using free public Wi-Fi, especially when planning to make online purchases, as unsecured networks can pose additional cyber threats.
As travel picks up across the country, digital safety remains a priority—both in the skies and on the ground.