Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

The Enforcement Ecosystem

Immigration enforcement operates as a deeply integrated, complex ecological system - not isolated agency actions. Understanding this network architecture reveals intervention opportunities.

System Layers

┌─────────────────────────────────────────────────┐
│              FEDERAL ENFORCEMENT                │
│     ICE  ←→  CBP  ←→  DOJ  ←→  DHS             │
└───────────────────────┬─────────────────────────┘
                        │
          ┌─────────────┼─────────────┐
          │             │             │
          ▼             ▼             ▼
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│  287(g)     │ │   Joint     │ │   Data      │
│  Agreements │ │ Task Forces │ │  Sharing    │
└──────┬──────┘ └──────┬──────┘ └──────┬──────┘
       │               │               │
       ▼               ▼               ▼
┌─────────────────────────────────────────────────┐
│            STATE & LOCAL ENFORCEMENT            │
│   Sheriffs  ←→  Police  ←→  Jails  ←→  Courts  │
└───────────────────────┬─────────────────────────┘
                        │
          ┌─────────────┼─────────────┐
          │             │             │
          ▼             ▼             ▼
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│  Detention  │ │ Surveillance│ │  Logistics  │
│ Contractors │ │   Tech      │ │ Contractors │
└─────────────┘ └─────────────┘ └─────────────┘

Federal Enforcement Network

Core Agencies

Agency Function Key Network Connections
ICE Interior enforcement, detention, deportation CBP, local jails, detention contractors
CBP Border enforcement, ports of entry ICE, local law enforcement, airlines
USCIS Immigration benefits adjudication ICE (enforcement referrals), DOS
DOJ/EOIR Immigration courts ICE (prosecutors), detention facilities

Inter-Agency Data Sharing

Database/System Agencies Connected Data Shared
IDENT/HART DHS-wide Biometrics, encounter records
NCIC FBI, all law enforcement Warrants, detainers
TECS CBP, ICE Border crossing records
ICM ICE Case management, detention

Mapping Approach

  1. FOIA requests for inter-agency MOUs and data sharing agreements
  2. Budget analysis tracking funding flows between agencies
  3. Task force mapping identifying joint operations
  4. Personnel tracking noting agency cross-appointments

State & Local Enforcement

287(g) Network Architecture

The 287(g) program transforms local law enforcement into integrated federal enforcement nodes.

Agreement Type Authority Granted Network Impact
Jail Enforcement Model Screen inmates for immigration status Connects jails to ICE detainer system
Task Force Model Field officers perform ICE functions Creates mobile enforcement capacity
Hybrid Both jail and field authority Maximum integration

Network Transformation

Before 287(g):

Local Police ──── State Government
                       │
                    (separation)
                       │
                  Federal ICE

After 287(g):

Local Police ◄══════► ICE
      │                 │
      │    (integrated) │
      │                 │
  Database ◄════════► Database

Geographic Coverage

At peak expansion, 287(g) agreements covered approximately 32% of the U.S. population, creating dense surveillance webs across:

  • Southern border states
  • Major metropolitan areas
  • Rural communities with high immigrant populations

Sanctuary as Network Intervention

Sanctuary policies represent deliberate structural interventions to sever enforcement edges:

Sanctuary Provision Network Effect
Detainer non-compliance Severs jail-ICE connection
No immigration inquiries Removes data flow edge
No facility access Disconnects ICE from local resources
No joint operations Eliminates task force nodes

Corporate Enforcement Network

Private Detention Operations

Company Network Position Annual Revenue
GEO Group Operates 50%+ of ICE detention beds $2.4B+
CoreCivic Second largest detention operator $1.9B+
Management & Training Corp Operates multiple ICE facilities $500M+

Network Dependencies:

  • Federal contracts (revenue source)
  • Commercial bank financing (capital)
  • Public pension fund investments (equity)
  • Municipal zoning permits (facility expansion)

Surveillance & Data Brokering

Company Product/Service Network Function
Palantir ImmigrationOS platform Aggregates data across agencies
Clearview AI Facial recognition Identifies targets from images
LexisNexis Data brokering Sells personal data to ICE
Thomson Reuters CLEAR database Criminal/civil records access

Network Dependencies:

  • Tech talent (recruitment vulnerability)
  • University contracts (research partnerships)
  • State privacy legislation (regulatory vulnerability)
  • Cybersecurity audits (compliance pressure)

Logistics & Transportation

Company Service Network Function
CSI Aviation Deportation flights Air transport of detainees
Acquisition Logistics Ground transportation Transfer between facilities
Various airlines Commercial deportations Final leg of deportation

Network Dependencies:

  • Airport access (public infrastructure)
  • FAA regulations (compliance)
  • Public visibility (reputational risk)
  • Worker organizing (labor pressure)

Political Networks

Legislative Mapping

Network Element Data Source Analysis Purpose
Committee membership Congress.gov Identify gatekeepers
Bill co-sponsorship Congress.gov Map policy alliances
Campaign contributions FEC, OpenSecrets Track financial influence
Lobbying records Senate LDA filings Corporate-legislator connections

Key Committees

Committee Jurisdiction Network Importance
House Judiciary Immigration law Primary legislative authority
Senate Judiciary Immigration law Confirmation of judges
Appropriations (both) Agency funding Budget leverage
Homeland Security (both) DHS oversight Operational oversight

Contribution Network Analysis

Track campaign contributions from:

  • Private prison companies (GEO Group, CoreCivic PACs)
  • Border security contractors
  • Tech companies with ICE contracts
  • Anti-immigrant advocacy groups

Intervention Strategies

Targeting Corporate Dependencies

Target Vulnerability Intervention
Commercial banks Reputational risk Pressure to stop financing detention
Pension funds Fiduciary concerns Divestment campaigns
Tech workers Values conflict Employee organizing
Universities Research ethics Contract cancellation

Severing Political Connections

Target Vulnerability Intervention
Moderate legislators Electoral pressure Constituent mobilization
Committee chairs Procedural leverage Appropriations amendments
Local officials Direct accountability 287(g) termination campaigns

Case Study: Divestment Campaigns

Successful campaigns have targeted:

  1. JPMorgan Chase - Stopped financing private prisons
  2. Bank of America - Reduced detention facility financing
  3. California pension funds - Divested from GEO/CoreCivic
  4. University tech contracts - Palantir partnership cancellations

Data Sources for Mapping

Federal Contracting

Source Data Available
USAspending.gov All federal contract awards
FPDS Detailed contract information
SAM.gov Contractor registrations
GovWin Contract intelligence

Corporate Relationships

Source Data Available
SEC filings Ownership, subsidiaries, contracts
Annual reports Revenue by segment
Lobbying disclosures Political connections
OpenSecrets Campaign contributions

Local Agreements

Source Data Available
ICE 287(g) list Active agreements
FOIA requests MOUs, data sharing agreements
Local ordinances Sanctuary/cooperation policies
Sheriff campaign records Political positions

Visualization Strategies

Multi-Layer Network Maps

Show different relationship types in separate layers:

Layer Nodes Edges
Federal Agencies Data sharing, joint operations
Local Sheriffs, police 287(g), task forces
Corporate Contractors Contracts, subcontracts
Political Legislators Co-sponsorship, contributions

Geographic Overlay

Map network density against:

  • Immigrant population distribution
  • Enforcement action locations
  • Sanctuary jurisdiction boundaries
  • 287(g) coverage areas

Temporal Analysis

Track changes over time:

  • 287(g) agreement proliferation/termination
  • Contract awards/cancellations
  • Political alliance shifts
  • Policy change impacts

Ethical Considerations

Protecting Sources

Risk Mitigation
Retaliation against FOIA requesters Use organizational, not personal, requests
Identification of insiders Aggregate information from multiple sources
Chilling effects Focus on public records and statements

Responsible Disclosure

Information Type Disclosure Approach
Contractor relationships Public after verification
Political connections Cite public records only
Operational details Consult legal counsel
Individual employees Generally avoid identification

Implementation Checklist

Data Collection

  • [ ] Compile federal contract data from USAspending.gov
  • [ ] Map 287(g) agreements in target region
  • [ ] Gather corporate SEC filings for major contractors
  • [ ] Pull campaign contribution data for relevant legislators
  • [ ] Submit FOIA requests for inter-agency agreements

Analysis

  • [ ] Build network graph of enforcement relationships
  • [ ] Calculate centrality metrics for key nodes
  • [ ] Identify structural vulnerabilities
  • [ ] Map funding dependencies
  • [ ] Assess political network positions

Strategic Application

  • [ ] Prioritize intervention targets based on vulnerability
  • [ ] Develop campaign strategy for each target
  • [ ] Coordinate with coalition partners
  • [ ] Monitor network changes over time

Next Steps

  1. Map advocacy networks to strengthen coalition
  2. Plan network interventions based on analysis
  3. Review ethical considerations for research with vulnerable communities
Legal Disclaimer

This website does not provide legal advice. The information provided on this site is for general informational and educational purposes only. It does not create an attorney-client relationship.

Information on this website may not be current or accurate. Immigration law is complex and varies by jurisdiction and individual circumstances. Always consult with a qualified immigration attorney for advice specific to your situation.

Neither ICE Encounter, its developers, partners, nor any contributors shall be liable for any actions taken or not taken based on information from this site. Use of this site is subject to our Terms of Use and Privacy Policy.