Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

Overview

DHS agencies have constructed a multi-layered location surveillance infrastructure that bypasses traditional warrant requirements through commercial data purchases and tactical hardware deployment.


Carpenter v. United States (2018)

The Ruling

The Supreme Court held that the Fourth Amendment protects historical Cell-Site Location Information (CSLI).

Key Points

  • Cell phones continuously log detailed location records
  • Individuals maintain reasonable expectation of privacy
  • Carrying a phone is "indispensable to participation in modern society"
  • Warrant required to compel carriers to produce CSLI

The Loophole

Carpenter addressed data obtained via compulsory legal process (subpoenas to carriers).

DHS exploits this by acting as a commercial buyer in the data broker market—no warrant required.


Commercial Location Data

How It Works

  1. Smartphone apps collect location data (weather, gaming, e-commerce)
  2. Apps share data with parent companies (e.g., Gravy Analytics)
  3. Data brokers aggregate and sell access
  4. DHS agencies purchase subscriptions
  5. Agents query location history without judicial oversight

Key Vendors

Vendor Product DHS Contracts
Venntel Location data $2M+ (CBP 2019-2020)
Babel Street Locate X ~$3M (DHS agencies)

Documented Capabilities

FOIA disclosures reveal ICE uses commercial data to:

  • Trace devices traveling between U.S. and Mexico
  • Monitor general "travel patterns"
  • Execute geofence queries (all devices in area at specific time)

The "Anonymization" Myth

DHS Justification

Agencies claim data is tied to Mobile Advertising IDs (AdIDs), not names, making it "anonymized."

Reality

DHS Privacy Officer explicitly warned:

Human movement patterns are highly unique... AdIDs inherently become linked to PII during the analytical process.

Because devices travel between specific homes and workplaces, de-anonymization is trivial.

Oversight Failures

DHS OIG audit found:

  • CBP initiated tracking without Privacy Threshold Analyses
  • No audit logs requested from vendors
  • No monitoring of how agents used Locate X

Cell-Site Simulators (Stingrays)

How They Work

Cell-site simulators (IMSI catchers) are military-grade devices that:

  1. Masquerade as legitimate cell towers
  2. Broadcast powerful signals
  3. Force nearby devices to connect
  4. Extract identifying information (IMSI numbers)
  5. Capture real-time location data
  6. Indiscriminately collect data from all nearby devices

ICE Deployment

Scale

  • ICE spent $10+ million on cell-site simulators
  • Agency maintains fleet of at least 59 devices

Documented Use

Detroit News (2017) reported ICE used Stingray to locate an undocumented immigrant whose only offense was unlawful reentry.

Legal Status

Context Warrant Required?
DOJ criminal investigations (2015+) Yes (policy)
ICE civil immigration enforcement Unclear/contested

Constitutional Concerns

Because Stingrays emit signals that penetrate home walls to locate devices, legal scholars argue warrantless use violates Fourth Amendment per Kyllo v. United States.


License Plate Readers (ALPRs)

Vigilant Solutions Contract

ICE holds a $6.1 million contract with Vigilant Solutions (now Motorola Solutions).

Agent Access

Over 9,000 ICE agents can query the database.

Data Sources

Source Records
Commercial (repos, malls, parking) 5+ billion data points
Law enforcement 1.5+ billion records

Capabilities

ICE can:

  • Map daily vehicle movements
  • Reconstruct historical travel patterns
  • Track targeted vehicles over extended periods

Sanctuary Law Circumvention

California SB 34

Prohibits local law enforcement from sharing ALPR data with federal entities.

Reality

FOIA records show dozens of California police departments allow ICE access via Vigilant network, including:

  • Los Angeles
  • San Diego
  • Orange County

Agents often log in under generic designations ("HSI", "CBP").

Legal Precedent

California Supreme Court (ACLU/EFF lawsuit) ruled:

  • ALPR data collected indiscriminately cannot be broadly shielded
  • Mass vehicular surveillance poses "profound privacy implications"

Geofencing

Definition

Geofence queries identify every device present within a specific geographic area during a specific time window.

Immigration Use

ICE uses geofencing through commercial data to:

  • Identify devices at suspected safe houses
  • Track gatherings and events
  • Map community networks

Legal Challenges

Courts are increasingly scrutinizing geofencing warrants in criminal cases. Immigration enforcement use remains largely unregulated.


The Commercial Data Loophole

Why It Matters

By purchasing rather than subpoenaing location data, DHS achieves:

Traditional Method Commercial Purchase
Warrant required No warrant
Judicial oversight None
Probable cause needed None
Individual suspicion Mass surveillance

Legislative Response

Fourth Amendment Is Not For Sale Act (S. 1265)

Bipartisan legislation would:

  • Ban agencies from purchasing personal data from brokers
  • Require court orders for data acquisition
  • Close the commercial data loophole

Status: Pending congressional action.


Implications

For Individuals

Understanding location tracking helps:

  1. Assess privacy of smartphone apps
  2. Understand vehicle tracking exposure
  3. Recognize surveillance in sensitive locations
  4. Make informed decisions about device usage

For Advocates

Documentation supports:

  1. Challenging evidence obtained through commercial data
  2. Supporting Fourth Amendment Is Not For Sale Act
  3. FOIA requests for agency data purchases
  4. Policy advocacy against warrantless tracking

Related Resources