The Enforcement Ecosystem
Immigration enforcement operates as a deeply integrated, complex ecological system - not isolated agency actions. Understanding this network architecture reveals intervention opportunities.
System Layers
┌─────────────────────────────────────────────────┐
│ FEDERAL ENFORCEMENT │
│ ICE ←→ CBP ←→ DOJ ←→ DHS │
└───────────────────────┬─────────────────────────┘
│
┌─────────────┼─────────────┐
│ │ │
▼ ▼ ▼
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ 287(g) │ │ Joint │ │ Data │
│ Agreements │ │ Task Forces │ │ Sharing │
└──────┬──────┘ └──────┬──────┘ └──────┬──────┘
│ │ │
▼ ▼ ▼
┌─────────────────────────────────────────────────┐
│ STATE & LOCAL ENFORCEMENT │
│ Sheriffs ←→ Police ←→ Jails ←→ Courts │
└───────────────────────┬─────────────────────────┘
│
┌─────────────┼─────────────┐
│ │ │
▼ ▼ ▼
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ Detention │ │ Surveillance│ │ Logistics │
│ Contractors │ │ Tech │ │ Contractors │
└─────────────┘ └─────────────┘ └─────────────┘
Federal Enforcement Network
Core Agencies
| Agency | Function | Key Network Connections |
|---|---|---|
| ICE | Interior enforcement, detention, deportation | CBP, local jails, detention contractors |
| CBP | Border enforcement, ports of entry | ICE, local law enforcement, airlines |
| USCIS | Immigration benefits adjudication | ICE (enforcement referrals), DOS |
| DOJ/EOIR | Immigration courts | ICE (prosecutors), detention facilities |
Inter-Agency Data Sharing
| Database/System | Agencies Connected | Data Shared |
|---|---|---|
| IDENT/HART | DHS-wide | Biometrics, encounter records |
| NCIC | FBI, all law enforcement | Warrants, detainers |
| TECS | CBP, ICE | Border crossing records |
| ICM | ICE | Case management, detention |
Mapping Approach
- FOIA requests for inter-agency MOUs and data sharing agreements
- Budget analysis tracking funding flows between agencies
- Task force mapping identifying joint operations
- Personnel tracking noting agency cross-appointments
State & Local Enforcement
287(g) Network Architecture
The 287(g) program transforms local law enforcement into integrated federal enforcement nodes.
| Agreement Type | Authority Granted | Network Impact |
|---|---|---|
| Jail Enforcement Model | Screen inmates for immigration status | Connects jails to ICE detainer system |
| Task Force Model | Field officers perform ICE functions | Creates mobile enforcement capacity |
| Hybrid | Both jail and field authority | Maximum integration |
Network Transformation
Before 287(g):
Local Police ──── State Government
│
(separation)
│
Federal ICE
After 287(g):
Local Police ◄══════► ICE
│ │
│ (integrated) │
│ │
Database ◄════════► Database
Geographic Coverage
At peak expansion, 287(g) agreements covered approximately 32% of the U.S. population, creating dense surveillance webs across:
- Southern border states
- Major metropolitan areas
- Rural communities with high immigrant populations
Sanctuary as Network Intervention
Sanctuary policies represent deliberate structural interventions to sever enforcement edges:
| Sanctuary Provision | Network Effect |
|---|---|
| Detainer non-compliance | Severs jail-ICE connection |
| No immigration inquiries | Removes data flow edge |
| No facility access | Disconnects ICE from local resources |
| No joint operations | Eliminates task force nodes |
Corporate Enforcement Network
Private Detention Operations
| Company | Network Position | Annual Revenue |
|---|---|---|
| GEO Group | Operates 50%+ of ICE detention beds | $2.4B+ |
| CoreCivic | Second largest detention operator | $1.9B+ |
| Management & Training Corp | Operates multiple ICE facilities | $500M+ |
Network Dependencies:
- Federal contracts (revenue source)
- Commercial bank financing (capital)
- Public pension fund investments (equity)
- Municipal zoning permits (facility expansion)
Surveillance & Data Brokering
| Company | Product/Service | Network Function |
|---|---|---|
| Palantir | ImmigrationOS platform | Aggregates data across agencies |
| Clearview AI | Facial recognition | Identifies targets from images |
| LexisNexis | Data brokering | Sells personal data to ICE |
| Thomson Reuters | CLEAR database | Criminal/civil records access |
Network Dependencies:
- Tech talent (recruitment vulnerability)
- University contracts (research partnerships)
- State privacy legislation (regulatory vulnerability)
- Cybersecurity audits (compliance pressure)
Logistics & Transportation
| Company | Service | Network Function |
|---|---|---|
| CSI Aviation | Deportation flights | Air transport of detainees |
| Acquisition Logistics | Ground transportation | Transfer between facilities |
| Various airlines | Commercial deportations | Final leg of deportation |
Network Dependencies:
- Airport access (public infrastructure)
- FAA regulations (compliance)
- Public visibility (reputational risk)
- Worker organizing (labor pressure)
Political Networks
Legislative Mapping
| Network Element | Data Source | Analysis Purpose |
|---|---|---|
| Committee membership | Congress.gov | Identify gatekeepers |
| Bill co-sponsorship | Congress.gov | Map policy alliances |
| Campaign contributions | FEC, OpenSecrets | Track financial influence |
| Lobbying records | Senate LDA filings | Corporate-legislator connections |
Key Committees
| Committee | Jurisdiction | Network Importance |
|---|---|---|
| House Judiciary | Immigration law | Primary legislative authority |
| Senate Judiciary | Immigration law | Confirmation of judges |
| Appropriations (both) | Agency funding | Budget leverage |
| Homeland Security (both) | DHS oversight | Operational oversight |
Contribution Network Analysis
Track campaign contributions from:
- Private prison companies (GEO Group, CoreCivic PACs)
- Border security contractors
- Tech companies with ICE contracts
- Anti-immigrant advocacy groups
Intervention Strategies
Targeting Corporate Dependencies
| Target | Vulnerability | Intervention |
|---|---|---|
| Commercial banks | Reputational risk | Pressure to stop financing detention |
| Pension funds | Fiduciary concerns | Divestment campaigns |
| Tech workers | Values conflict | Employee organizing |
| Universities | Research ethics | Contract cancellation |
Severing Political Connections
| Target | Vulnerability | Intervention |
|---|---|---|
| Moderate legislators | Electoral pressure | Constituent mobilization |
| Committee chairs | Procedural leverage | Appropriations amendments |
| Local officials | Direct accountability | 287(g) termination campaigns |
Case Study: Divestment Campaigns
Successful campaigns have targeted:
- JPMorgan Chase - Stopped financing private prisons
- Bank of America - Reduced detention facility financing
- California pension funds - Divested from GEO/CoreCivic
- University tech contracts - Palantir partnership cancellations
Data Sources for Mapping
Federal Contracting
| Source | Data Available |
|---|---|
| USAspending.gov | All federal contract awards |
| FPDS | Detailed contract information |
| SAM.gov | Contractor registrations |
| GovWin | Contract intelligence |
Corporate Relationships
| Source | Data Available |
|---|---|
| SEC filings | Ownership, subsidiaries, contracts |
| Annual reports | Revenue by segment |
| Lobbying disclosures | Political connections |
| OpenSecrets | Campaign contributions |
Local Agreements
| Source | Data Available |
|---|---|
| ICE 287(g) list | Active agreements |
| FOIA requests | MOUs, data sharing agreements |
| Local ordinances | Sanctuary/cooperation policies |
| Sheriff campaign records | Political positions |
Visualization Strategies
Multi-Layer Network Maps
Show different relationship types in separate layers:
| Layer | Nodes | Edges |
|---|---|---|
| Federal | Agencies | Data sharing, joint operations |
| Local | Sheriffs, police | 287(g), task forces |
| Corporate | Contractors | Contracts, subcontracts |
| Political | Legislators | Co-sponsorship, contributions |
Geographic Overlay
Map network density against:
- Immigrant population distribution
- Enforcement action locations
- Sanctuary jurisdiction boundaries
- 287(g) coverage areas
Temporal Analysis
Track changes over time:
- 287(g) agreement proliferation/termination
- Contract awards/cancellations
- Political alliance shifts
- Policy change impacts
Ethical Considerations
Protecting Sources
| Risk | Mitigation |
|---|---|
| Retaliation against FOIA requesters | Use organizational, not personal, requests |
| Identification of insiders | Aggregate information from multiple sources |
| Chilling effects | Focus on public records and statements |
Responsible Disclosure
| Information Type | Disclosure Approach |
|---|---|
| Contractor relationships | Public after verification |
| Political connections | Cite public records only |
| Operational details | Consult legal counsel |
| Individual employees | Generally avoid identification |
Implementation Checklist
Data Collection
- [ ] Compile federal contract data from USAspending.gov
- [ ] Map 287(g) agreements in target region
- [ ] Gather corporate SEC filings for major contractors
- [ ] Pull campaign contribution data for relevant legislators
- [ ] Submit FOIA requests for inter-agency agreements
Analysis
- [ ] Build network graph of enforcement relationships
- [ ] Calculate centrality metrics for key nodes
- [ ] Identify structural vulnerabilities
- [ ] Map funding dependencies
- [ ] Assess political network positions
Strategic Application
- [ ] Prioritize intervention targets based on vulnerability
- [ ] Develop campaign strategy for each target
- [ ] Coordinate with coalition partners
- [ ] Monitor network changes over time
Next Steps
- Map advocacy networks to strengthen coalition
- Plan network interventions based on analysis
- Review ethical considerations for research with vulnerable communities