Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

Overview

Understanding the necessity of security protocols requires analyzing historical and ongoing mechanisms of state-sponsored surveillance directed at civil society. Contemporary tactics are deeply rooted in historical precedents, evolving from physical infiltration to sophisticated digital surveillance.


COINTELPRO (1956-1971)

Program Overview

The Federal Bureau of Investigation's Counter Intelligence Program (COINTELPRO) operated from 1956 until its exposure in 1971. Initially focused on communist organizations, it rapidly expanded to target:

  • Civil rights organizations
  • Black nationalist groups
  • American Indian Movement
  • Anti-war protesters
  • Labor unions
  • Prominent figures including Dr. Martin Luther King, Jr.

Documented Tactics

Operations went far beyond passive data collection, employing aggressive, extra-legal methods:

Tactic Description
Infiltration Agents and informants who actively provoked illicit activity
Psychological warfare Operations designed to create internal splintering and paranoia
Legal harassment Continuous abuse of the legal system
Conspiracy with police Illegal break-ins, assaults, and burglaries

Scale of Operations

A 1986 federal court determination documented COINTELPRO was responsible for:

  • 204 burglaries by FBI agents
  • 1,300 informants deployed
  • 12,600 documents stolen

Church Committee Findings (1975-1976)

Investigation Scope

The Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (Church Committee) conducted the most comprehensive congressional investigation of intelligence community abuses:

  • Reviewed over 110,000 documents
  • Conducted hundreds of interviews
  • Published 14 volumes of reports

Key Conclusions

The Committee concluded that intelligence agencies had fundamentally undermined constitutional rights:

The domestic intelligence apparatus had routinely invaded individual privacy and violated the rights of lawful assembly and political expression, primarily due to a failure in the application of constitutional checks and balances.

Documented Abuses

Category Findings
First Amendment Targeting based on political beliefs, not criminal activity
Fourth Amendment Warrantless searches, surveillance, and break-ins
Due Process Extra-judicial actions against citizens
Separation of Powers Executive agencies operating without Congressional oversight

Legal Reforms

Post-Church Committee Reforms

The revelations catalyzed significant legislative and regulatory changes:

Reform Purpose
Executive Orders Banned political assassinations
Senate Select Committee on Intelligence Established permanent legislative oversight
Attorney General Guidelines Limited FBI investigative authority
FISA (1978) Required judicial warrants for electronic surveillance

Foreign Intelligence Surveillance Act

FISA was designed to:

  • Require judicial warrants for surveillance
  • Establish the Foreign Intelligence Surveillance Court (FISC)
  • Ensure intelligence gathering was tethered to probable cause
  • Prohibit targeted surveillance of domestic political dissent

Post-9/11 Rollbacks

The USA PATRIOT Act dramatically expanded surveillance capabilities:

  • Removed requirements to prove subjects were foreign agents
  • Expanded "roving wiretap" authority
  • Permitted broader access to business records
  • Effectively rolled back many Church Committee safeguards

Contemporary Surveillance Documentation

CBP Migrant Caravan Operations (2018-2019)

DHS Office of Inspector General confirmed systematic targeting of advocates:

Finding Detail
Lookout lists CBP placed lookouts on American journalists, attorneys, and supporters
Dossiers 59 individuals documented including legal aid attorneys
Entry denials CBP requested Mexico deny entry to 14 U.S. citizens
OIG conclusion "No genuine basis" for entry denial requests

Internal CBP Documentation

A leaked presentation titled "San Diego Sector Foreign Operations Branch: Migrant Caravan FY-2019, Suspected Organizers, Coordinators, Instigators and Media" revealed the scope of targeting.

Commercial Data Exploitation

Law enforcement agencies have increasingly bypassed warrant requirements through commercial data brokers:

Broker Data Type Legal Loophole
Venntel Cell phone location Users "agree" via app permissions
Babel Street Location history Third-party doctrine

This allows near-perfect surveillance without Fourth Amendment protections established in Carpenter v. United States.

Social Media Monitoring

DHS and ICE have invested heavily in social media surveillance:

Platform Contractor
Voyager Labs Sustained individual tracking
ShadowDragon Network analysis
Logically Inc. Content monitoring

Operation Road Flare

Federal agents have specifically targeted activists documenting ICE enforcement:

  • Facial scanning of community observers with smartphones
  • License plate recording of civilian vehicles
  • Database labeling of observers as "domestic terrorists"
  • Explicit intimidation informing observers of surveillance

Surveillance Era Comparison

Era Primary Targets Methods Oversight Response
COINTELPRO Civil rights, anti-war, labor Physical infiltration, wiretaps, psychological warfare Church Committee, FISA, Senate oversight
Contemporary Immigrant rights, journalists, legal observers Bulk commercial data, social media monitoring, lookout lists FOIA litigation, OIG investigations, civil rights lawsuits

Documented Organizational Impacts

Chilling Effects

Surveillance profoundly impacts advocacy operations:

  • Trust erosion - Community members fear engagement exposes them to enforcement
  • Participation decline - Resistance to providing personal information
  • Resource diversion - Funds redirected from mission to legal defense
  • Self-censorship - Public messaging recalibrated to avoid retaliation

Operational Paradox

Organizations face a severe paradox:

  • Simultaneously starved of data (community reluctance)
  • Pressured to demonstrate programmatic efficacy (funder requirements)

Legislative Threats

Recent proposals like H.R. 9495 attempt to grant executive authority to:

  • Designate domestic nonprofits as "terrorist-supporting organizations"
  • Strip 501(c)(3) tax-exempt status unilaterally
  • Minimal oversight or due process protections

Key Legal Precedents

Carpenter v. United States (2018)

Supreme Court held that accessing historical cell-site location information (CSLI) constitutes a Fourth Amendment search requiring a warrant.

However, government agencies exploit loopholes by:

  • Purchasing commercially available location data
  • Arguing users "consented" to data collection
  • Invoking third-party doctrine for non-CSLI data

Relevant FOIA Cases

Organization Target Outcome
ACLU CBP lookout lists Disclosed targeting of attorneys
Brennan Center Social media monitoring Exposed surveillance programs
EFF Commercial data purchases Revealed extent of broker relationships

Documentation Resources

Official Reports

  • Church Committee Final Reports (1975-1976)
  • DHS OIG Report on CBP Operations
  • GAO Reports on Surveillance Programs

Advocacy Documentation

  • ACLU Freedom of Information Act Project
  • Brennan Center for Justice reports
  • Electronic Frontier Foundation research

Related Resources