Overview
DHS agencies have constructed a multi-layered location surveillance infrastructure that bypasses traditional warrant requirements through commercial data purchases and tactical hardware deployment.
Carpenter v. United States (2018)
The Ruling
The Supreme Court held that the Fourth Amendment protects historical Cell-Site Location Information (CSLI).
Key Points
- Cell phones continuously log detailed location records
- Individuals maintain reasonable expectation of privacy
- Carrying a phone is "indispensable to participation in modern society"
- Warrant required to compel carriers to produce CSLI
The Loophole
Carpenter addressed data obtained via compulsory legal process (subpoenas to carriers).
DHS exploits this by acting as a commercial buyer in the data broker market—no warrant required.
Commercial Location Data
How It Works
- Smartphone apps collect location data (weather, gaming, e-commerce)
- Apps share data with parent companies (e.g., Gravy Analytics)
- Data brokers aggregate and sell access
- DHS agencies purchase subscriptions
- Agents query location history without judicial oversight
Key Vendors
| Vendor | Product | DHS Contracts |
|---|---|---|
| Venntel | Location data | $2M+ (CBP 2019-2020) |
| Babel Street | Locate X | ~$3M (DHS agencies) |
Documented Capabilities
FOIA disclosures reveal ICE uses commercial data to:
- Trace devices traveling between U.S. and Mexico
- Monitor general "travel patterns"
- Execute geofence queries (all devices in area at specific time)
The "Anonymization" Myth
DHS Justification
Agencies claim data is tied to Mobile Advertising IDs (AdIDs), not names, making it "anonymized."
Reality
DHS Privacy Officer explicitly warned:
Human movement patterns are highly unique... AdIDs inherently become linked to PII during the analytical process.
Because devices travel between specific homes and workplaces, de-anonymization is trivial.
Oversight Failures
DHS OIG audit found:
- CBP initiated tracking without Privacy Threshold Analyses
- No audit logs requested from vendors
- No monitoring of how agents used Locate X
Cell-Site Simulators (Stingrays)
How They Work
Cell-site simulators (IMSI catchers) are military-grade devices that:
- Masquerade as legitimate cell towers
- Broadcast powerful signals
- Force nearby devices to connect
- Extract identifying information (IMSI numbers)
- Capture real-time location data
- Indiscriminately collect data from all nearby devices
ICE Deployment
Scale
- ICE spent $10+ million on cell-site simulators
- Agency maintains fleet of at least 59 devices
Documented Use
Detroit News (2017) reported ICE used Stingray to locate an undocumented immigrant whose only offense was unlawful reentry.
Legal Status
| Context | Warrant Required? |
|---|---|
| DOJ criminal investigations (2015+) | Yes (policy) |
| ICE civil immigration enforcement | Unclear/contested |
Constitutional Concerns
Because Stingrays emit signals that penetrate home walls to locate devices, legal scholars argue warrantless use violates Fourth Amendment per Kyllo v. United States.
License Plate Readers (ALPRs)
Vigilant Solutions Contract
ICE holds a $6.1 million contract with Vigilant Solutions (now Motorola Solutions).
Agent Access
Over 9,000 ICE agents can query the database.
Data Sources
| Source | Records |
|---|---|
| Commercial (repos, malls, parking) | 5+ billion data points |
| Law enforcement | 1.5+ billion records |
Capabilities
ICE can:
- Map daily vehicle movements
- Reconstruct historical travel patterns
- Track targeted vehicles over extended periods
Sanctuary Law Circumvention
California SB 34
Prohibits local law enforcement from sharing ALPR data with federal entities.
Reality
FOIA records show dozens of California police departments allow ICE access via Vigilant network, including:
- Los Angeles
- San Diego
- Orange County
Agents often log in under generic designations ("HSI", "CBP").
Legal Precedent
California Supreme Court (ACLU/EFF lawsuit) ruled:
- ALPR data collected indiscriminately cannot be broadly shielded
- Mass vehicular surveillance poses "profound privacy implications"
Geofencing
Definition
Geofence queries identify every device present within a specific geographic area during a specific time window.
Immigration Use
ICE uses geofencing through commercial data to:
- Identify devices at suspected safe houses
- Track gatherings and events
- Map community networks
Legal Challenges
Courts are increasingly scrutinizing geofencing warrants in criminal cases. Immigration enforcement use remains largely unregulated.
The Commercial Data Loophole
Why It Matters
By purchasing rather than subpoenaing location data, DHS achieves:
| Traditional Method | Commercial Purchase |
|---|---|
| Warrant required | No warrant |
| Judicial oversight | None |
| Probable cause needed | None |
| Individual suspicion | Mass surveillance |
Legislative Response
Fourth Amendment Is Not For Sale Act (S. 1265)
Bipartisan legislation would:
- Ban agencies from purchasing personal data from brokers
- Require court orders for data acquisition
- Close the commercial data loophole
Status: Pending congressional action.
Implications
For Individuals
Understanding location tracking helps:
- Assess privacy of smartphone apps
- Understand vehicle tracking exposure
- Recognize surveillance in sensitive locations
- Make informed decisions about device usage
For Advocates
Documentation supports:
- Challenging evidence obtained through commercial data
- Supporting Fourth Amendment Is Not For Sale Act
- FOIA requests for agency data purchases
- Policy advocacy against warrantless tracking
Related Resources
- Data Analytics - How location data feeds AI
- Data Access - Other data sources
- Legal Framework - Constitutional analysis
- Digital Security - Protection strategies