A Kafkaesque saga in which the government has failed to produce critical video footage has reached new levels of absurdity.#ICE
Government Loses Hard Drives It Was Supposed to Put ICE Detention Center Footage On
The legal saga over surveillance footage from within an Immigration and Customs Enforcement detention center in suburban Chicago has reached new levels of Kafkaesque absurdity, with the federal government losing three hard drives it was supposed to put footage on, refusing to provide footage from five critical surveillance cameras, and delivering soundless video of a highly contested visit from Department of Homeland Security Secretary Kristi Noem.We have repeatedly covered an abuse lawsuit about living conditions within the Broadview detention facility. The federal government has claimed that 10 days of footage from within the facility, taken during a critical and highly contested period, was “irretrievably destroyed” and could not be produced as part of the lawsuit, which was brought by people being held at Broadview in what were allegedly horrendous conditions. It later said that due to a system crash, the footage was never recorded in the first place. The latest update in this case, however, deals with surveillance camera footage that was recorded and that a judge has ordered the federal government to turn over.
For this footage, the federal government first claimed that it could not afford the storage space necessary to take the footage that it did have and produce it for discovery to the plaintiffs’ lawyers in the case. The plaintiffs’ lawyers, representing Broadview’s detainees, then purchased 78 terabytes of empty hard drives and gave them to the federal government, according to court records. This included three 8-terabyte SSDs and three 18-terabyte hard drives.
Court records note that “plaintiffs provided defendants with five large hard drives to facilitate Defendants’ production, yet Defendants inexplicably lost three of them.” Emails submitted as evidence suggest that the U.S. government and the plaintiffs’ attorneys had a call to discuss the lost hard drives.
One of the emails sent by plaintiffs’ attorneys to the Department of Justice in late January notes that the government had been exceedingly slow in producing footage, taking weeks to produce just a small amount of footage.
“There should be plenty of hard drive space at Broadview’s disposal,” the email reads. “The team there should currently have in its possession 5 hard drives with 72 terabytes of space, provided by plaintiffs’ counsel at the last 2 site visits. We have received only one hard drive back from Broadview to date. Copying of November/December footage should have taken place over the past week so that it could be delivered to plaintiffs’ counsel today when they visit Broadview this afternoon. At the very least, that footage should be being copied now.”
The two sides then arranged a phone call, a summary of which was emailed by plaintiffs’ attorneys to the Department of Justice:“Thanks for the productive call this morning. For the benefit of everyone:We discussed the production of video footage. You relayed that, at present, your agency contact knows where 2 of the 5 hard drives are and that you have relayed that copying of footage from November to present for all 10 feeds and footage from September to November for the 5 additional cameras should be underway. You will investigate further where the remaining hard drives are and will also work on a plan to exchange footage on a more regular basis than plaintiffs' counsel's weekly visits.
We discussed providing an accounting of the hard drives to facilitate your conversations with personnel at Broadview:
• On January 8, plaintiffs' counsel delivered four hard drives to Broadview during an attorney visit. One was a 20 TB hard drive; three were 8 TB SSD drives.
• On January 16, plaintiffs' counsel received from Broadview one of the 8 TB SSD drives containing 150 GB of footage from 5 cameras for one week in January.
• Also on January 16, plaintiffs' counsel provided personnel at Broadview (SDDO Taylor, in particular) with two 18 TB hard drives.
• The sum total of storage capacity Broadview should have is: 5 drives, with a total of 72 TB of space. Using the productions we have received to date, we anticipate that the Government owes us at least 15 TB of footage.”
Days later, the Department of Justice told the plaintiffs’ attorneys that “they are still searching for those hard drives at Broadview.” The plaintiffs’ attorneys responded: “Losing multiple drives provided to facilitate speedy production is not acceptable,” and “the missing hard drives and lack of production of any footage predating January remains a significant, prejudicial issue.”A filing by the plaintiffs with the court highlights some of the ongoing issues they have had with the government complying with court-ordered discovery requirements, which includes the lost hard drives, missing footage, footage from only five of the 10 cameras that were supposed to be delivered. A separate filing notes that footage produced by the government from a high-profile visit by Noem is missing audio “despite visible professional microphones and cell phones with audio capabilities in the footage.”
“Plaintiffs have gone above and beyond their obligations under federal law to streamline rolling production of such footage, purchasing expensive hard drives and agreeing to transport and pick up those drives from Broadview during weekly attorney visits. Defendants agreed to this arrangement,” they wrote in the filing. “Yet, Defendants have fallen unacceptably short of their production obligations. Defendants have provided no footage from five of the ten camera feeds […] Defendants have also failed to provide footage for a near-two-month span for the remaining five camera feeds. What’s more, Defendants have purportedly lost multiple hard drives provided by Plaintiffs’ counsel […] There is no excuse for Defendants’ discovery failures.”
The filing notes that the five missing cameras are specifically from detainee isolation cells, “despite those cells being a key part of Plaintiffs’ complaint. The produced feeds show egregious conditions but were insufficient to provide Plaintiffs the discovery necessary to fully investigate their claims.” These cells were designed to hold one person at a time, but were allegedly being used to hold multiple detainees at a time during a critical period that the lawsuit covers; “such cells are also where ICE holds detainees with acute medical or mental health conditions, including those who have suffered medical emergencies while in detention, and where it holds detainees who have been subjected to use of force by ICE officers while inside the facility,” they add.
The filing says that the plaintiffs learned that the government lost the hard drives in late January, when the government claimed that it had returned all of the hard drives to the plaintiffs’ attorneys, and that it had run out of storage space with which to provide them court-ordered footage.
“On January 28, Defendants’ counsel relayed that Broadview personnel had advised that they were out of storage space on drives provided by Plaintiffs, reporting that all hard drives provided by Plaintiffs had been returned to them.This was the first indication that some or all of 70 terabytes’ worth of hard drives were unaccounted for,” they wrote. “In the days since, the Government has admitted that it cannot find three of the five hard drives that should be in its possession.”
“Plaintiffs are waiting on months of footage. Every day that passes without this evidence compounds the prejudice to Plaintiffs’ ability to prepare for the upcoming hearing. Defendants’ foot dragging and poor organizational practices—and their instinct to rely on Plaintiffs to take the laboring oar for the purchase, delivery, pickup, and return of storage devices to facilitate Defendants’ discovery obligations—cannot be permitted.”
Inspector General Investigating Whether ICE's Surveillance Tech Breaks the Law
DHSx27;s inspector general is probing ICEx27;s biometric and surveillance programs.#ICE #Impact
Inspector General Investigating Whether ICE's Surveillance Tech Breaks the Law
The Department of Homeland Security’s Inspector General is investigating potential privacy abuses associated with Immigrations and Customs Enforcement’s surveillance and biometric data programs, according to a letter sent to two senators.Last week, we reported that Senators Mark Warner and Tim Kaine demanded that DHS inspector general Joseph Cuffari investigate immigration-related surveillance programs across DHS, Customs and Border Protection, and ICE. Thursday, Cuffari said his office had launched an audit called “DHS’ Security of Biometric Data and Personally Identifiable Information.”
“The objective of the audit is to determine how DHS and its components collect or obtain PII and biometric data related to immigration enforcement efforts and the extent to which that data is managed, shared, and secured in accordance with law, regulation, and Departmental policy,” Cuffari’s letter reads. He adds that one of the purposes of the investigation will be to “determine whether they have led to violations of federal law and other regulations that maintain privacy and defend against unlawful searches.”
Kaine and Warner’s initial letter specifically focused on many of the technologies and programs 404 Media has been reporting on, including DHS’s contracts with Palantir, facial recognition company Clearview AI, its side-door access to Flock’s license plate scanning technology, its social media monitoring through a company called Penlink, its phone hacking contract through a company called Paragon, its face-scanning mobile app, as well as its use of various government biometric databases in immigration enforcement.
“DHS’ reported disregard for adhering to the law and its proven ambivalence toward observing and upholding constitutionally-guaranteed freedoms of Americans and noncitizens, including freedom of speech and equal protection under the law, leaves us with little confidence that these new and powerful tools are being used responsibly,” the senators wrote. “Coupled with DHS’ propensity to detain people regardless of their circumstances, it is reasonable to question whether DHS can be trusted with powerful surveillance tools and if in doing so, DHS is subjecting Americans to surveillance under the pretext of immigration enforcement.”
ICE Taps into Nationwide AI-Enabled Camera Network, Data Shows
Flock's automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE.Jason Koebler (404 Media)
Hackers have targeted a spread of apps or sites that aim to track ICE activity, in one case even sending push notifications to users in an attempt to intimidate them.#ICE #News
Hackers and Trolls Target Wave of ICE Spotting Apps
Over the last few days hackers and trolls have targeted a slew of ICE spotting apps and their users in an apparent attempt to intimidate and stop them from reporting sightings of ICE. These hackers sent threatening text messages to users of StopICE, claiming their personal data has been sent to the authorities; attempted to wipe uploads on Eyes Up, which aims to document ICE abuses; and even sent push notifications to DEICER app users claiming their data has also been sent to various government agencies.There is little evidence that hackers have actually provided data to the government. But it shows that apps like these, many of which Apple and Google have already kicked from their respective app stores, in some cases after direct government pressure, can be targeted by hackers or those looking to harass their users.
“Yes there is a targeted spike in attacks targeting similar [sites],” Sherman Austin, the developer of StopICE, told 404 Media in an email.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
404 Media is publishing a version of the user guide for ELITE, which lets ICE bring up dossiers on individual people and provides a “confidence score” of their address.#ICE #palantir
Here is the User Guide for ELITE, the Tool Palantir Made for ICE
Earlier this month we revealed Immigration and Customs Enforcement (ICE) is using a Palantir tool called ELITE to decide which neighborhoods to raid.The tool lets ICE populate a map with potential deportation targets, bring up dossiers on each person, and view an address “confidence score” based on data sourced from the Department of Health and Human Services (HHS) and other government agencies. This is according to a user guide for ELITE 404 Media obtained.
404 Media is now publishing a version of that user guide so people can read it for themselves.
💡
Do you know anything else about ELITE? Do you work at Palantir, ICE, or CBP? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.This post is for subscribers only
Become a member to get access to all content
Subscribe now
DHS Says Critical ICE Surveillance Footage From Abuse Case Was Actually Never Recorded, Doesn't Matter#ICE
DHS Says Critical ICE Surveillance Footage From Abuse Case Was Actually Never Recorded, Doesn't Matter
The Department of Homeland Security now says that two weeks of critical surveillance footage from within Immigrations and Customs Enforcement’s Broadview detention center wasn’t actually lost in a “system crash,” but rather, was never recorded in the first place. It is also arguing that, had the footage been recorded, it would be irrelevant because prisoner living conditions have improved since the time it was supposed to be recorded.The filings, made by U.S. attorneys on behalf of Greg Bovino, Kristi Noem, and other DHS officials, are the latest in an ongoing class action lawsuit against the U.S. government filed by detainees at the Chicago-area ICE detention center. The people suing the government in this case argue that they were held in subhuman, illegal conditions at Broadview: “They are denied sufficient food and water […] the temperatures are extreme and uncomfortable […] the physical conditions are filthy, with poor sanitation, clogged toilets, and blood, human fluids, and insects in the sinks and the floor […] federal officers who patrol Broadview under Defendants’ authority are abusive and cruel,” their complaint reads in part.
As we have reported, the plaintiffs’ lawyers have been trying to get the government to produce nearly two weeks worth of surveillance footage from inside the detention center from between October 20 and October 31, 2025, which was a critical period where ICE was detaining people en masse in Chicago. The government first said that the footage had been “irretrievably destroyed,” but that it was working with its vendor, a one-person company called Five by Five, to try to recover it. In a later filing, it said that the footage was lost due to a nonspecific “system crash.”
In its most recent filing, however, the government claims that the footage was never recorded in the first place and, furthermore, it would appreciate if the plaintiffs would stop asking for it because it would be of “marginal relevance” anyway:
“The Broadview video surveillance footage for October 20 to October 31, 2025, is not missing. Rather, due to a technical issue, the Video System failed to record video or audio footage during that period. Contractors manage the system for the defendants. An employee of the contractor with personal knowledge of events explained during a meeting with counsel of record how he discovered that the System did not record footage from October 20 to October 31, 2025,” the government’s attorneys wrote. “His explanation of events eviscerates any vestigial relevance of plaintiffs’ Third Set of discovery requests which assumes that spoliation occurred in this case.”
“As plaintiffs are aware, their allegations of negligence or spoliation of the video footage at Broadview are unfounded,” they added. “The video system did not record any footage from October 20th to 31st (in the morning) due to equipment malfunction or failure. So, plaintiffs’ suggestion that information about the video system is necessary because the ‘circumstances under which this footage was lost or not recorded remain unclear’ is simply false … It is beyond the scope of discovery for plaintiffs to assume the role of ‘quality service inspectors’ for the video system at Broadview. Defendants should not be compelled to produce information calculated to show whether the failure to record was due to poor maintenance practices”
The Department of Justice’s lawyers wrote that the court needs to “rein in plaintiffs’ attempt to seek discovery beyond what is is necessary,” and that its efforts to obtain various information such as “document retention policies, failure of the video system at Broadview to record footage, and efforts to respond to discovery are inappropriate. The requests plaintiffs seek to enforce in their motion are highly objectionable.”
In a separate filing from earlier this month, DOJ lawyers argued that the court should limit the scope of information that it is required to produce for the case and that the court should not focus on what the conditions at Broadview were in the past, but it should focus on what they are in the present because a temporary restraining order from the court required the government to improve detainee conditions: “Discovery on past—rather than current—conditions at Broadview are unproductive. During weekly visits to Broadview, plaintiffs’ counsel must have observed current conditions of confinement at the facility and interviewed individuals who were there to be processed. The conditions of confinement at Broadview, which, as the court is aware, are vastly changed since the [temporary restraining order] was entered and do not now present the issues that existed earlier,” they wrote. “Plaintiffs continue to insist on discovery about past conditions that is not necessary.”
“As some plaintiffs’ counsel will have observed during their in-person visits, the conditions at Broadview are no longer what they were when this complaint was filed,” they added. “Things have changed at Broadview drastically, with it returning to be a very short-term processing center without overnight stays. The scope and urgency of plaintiffs’ multiple discovery requests are no longer proportional to the needs of the case as it exists, if they ever were […] this historical information is unhelpful to the court as it decides whether current conditions at Broadview violate the U.S. Constitution.”
Meanwhile, a filing by attorneys for the plaintiff, from the MacArthur Justice Center, the American Civil Liberties Union of Illinois, and the Eimer Stahl law firm, provides more details about how janky Broadview’s surveillance system allegedly was and highlights why the lost footage is critically important. The attorneys note that there is an “enormous gap in footage from October 20 to 31 (in the morning), when Plaintiffs were at Broadview and unconstitutional conditions were at their apex. The circumstances under which this footage was lost or not recorded remain unclear, and Plaintiffs are investigating the possibility of spoliation warranting an adverse inference against Defendants regarding conditions at Broadview during this time.”
According to court records, the system was managed by a company called Five by Five Management, LLC, which is a “one-person firm,” as well as another contractor who is not named in the filing. Apparently there was a server that crashed on October 20, which led to footage not being recorded, but information about how or why this happened is “in the government’s hands,” the plaintiffs attorneys wrote.
Other important information is on something the court is calling the “old server,” which is a server that is owned by Five by Five Management and was disconnected on November 24; the plaintiffs’ attorneys say that they are having trouble getting information from that server, and that Five by Five Management wants to be paid for it.
The filing states that the government and attorneys for the plaintiffs asked Five by Five for a written plan to recover as much data from the old server as possible, but that it was “short on technical detail, and it requested a substantial monetary payment for the project plus indemnification from all parties. These are non starters”
“The Old Server is Government property and Defendants are responsible for producing the discoverable data that exists on it,” the plaintiffs’ attorneys wrote. “Defendants cannot punt to their contractor and require Plaintiffs to make a deal with Five by Five in order to obtain information that Defendants own and control. Thus, even as to responsive information that may actually be stored on the Old Server, Plaintiffs are nowhere near getting access.”
The owner of Five by Five Management is set to be deposed in the case on Thursday. The judge in the case rejected much of the government’s argument and said that it needs to respond in detail about what happened to the video. The court records used to report this story can be found here.
The FAA has altered a no fly zone designation that was originally created for US military bases to apply to DHS units.#DHS #ICE
Feds Create Drone No Fly Zone That Would Stop People Filming ICE
The Federal Aviation Administration put a drone no fly zone within 3,000 feet of “Department of Homeland Security facilities and mobile assets,” according to a notice to airmen posted by the government. The no fly zone is the same type that the U.S. uses to restrict consumer drones over military bases and Department of Energy (DOE) research centers and facilities. The order appears to attempt to criminalize the use of drones to film Immigration and Customs Enforcement and DHS employees who are detaining people all over the country.The order is particularly notable because it does not apply just to static locations like DHS offices, but also to “vessels and ground vehicle convoys and their associated escorts.” The notice classifies areas within 3,000 feet horizontally and up to 1,000 feet of altitude as no fly zones and as “national defense airspace,” meaning the skies up to a half mile from ICE vehicles in Minneapolis, for example, could fall under this new jurisdiction. The notice states that people who violate the restrictions can be charged criminally, could face civil penalties, and may lose their authority to fly drones in the future.
“In addition, [drone] operators who are deemed to pose a credible safety or security threat to protected personnel, fac [facilities], or assets may be mitigated,” it adds, noting that “mitigation may result in the interference interception, seizure, damaging, or destruction of unmanned aircraft deemed to pose a credible safety or security threat to protected personnel, facilities, or assets.”
The order replaces a previous no fly zone that applied only to military bases and DOE sites. Military bases and DOE sites are static locations that don’t move. The new no fly zone, called a temporary flight restriction (TFR), applies to DHS employees and vehicles wherever they may be. ICE is notoriously performing raids all over the country with no notice.
With the rise of cheap consumer drones, some activists and protesters have used them to film law enforcement and to document police abuse. This no fly zone criminalizes that activity, further cracking down on the tactics protesters can use to keep people safe or film ICE brutality. It is unclear whether any specific incident led DHS to push for the no fly zone. DHS and the FAA did not immediately respond to a request for comment.
DHS itself has used its own drones to surveil protesters, including in Minneapolis. In 2020, a Customs and Border Patrol Predator drone surveilled people protesting the police killing of George Floyd, and last year DHS flew Predator drones over anti-ICE protests in Los Angeles. Those aircraft were detected using open source flight records and air traffic control audio. On Monday, videos of aircraft circling over Minneapolis were widely shared on social media, with many people saying the aircraft appeared to be drones. 404 Media has not yet been able to confirm what the aircraft are.
DHS Flew Predator Drones Over LA Protests, Audio Shows
Air traffic control (ATC) audio unearthed by an aviation tracking enthusiast then reviewed by 404 Media shows two Predator drones leaving, and heading towards, Los Angeles.Joseph Cox (404 Media)
In testimony from a CBP official obtained by 404 Media, the official described how Mobile Fortify returned two different names after scanning a woman's face during an immigration raid. ICE has said the app's results are a “definitive” determination of someone's immigration status.#ICE
ICE’s Facial Recognition App Misidentified a Woman. Twice
When authorities used Immigration and Customs Enforcement’s (ICE) facial recognition app on a detained woman in an attempt to learn her identity and immigration status, it returned two different and incorrect names, raising serious questions about the accuracy of the app ICE is using to determine who should be removed from the United States, according to testimony from a Customs and Border Protection (CBP) official obtained by 404 Media.ICE has told lawmakers the app, called Mobile Fortify, provides a “definitive” determination of someone’s immigration status, and should be trusted over a birth certificate. The incident, which happened last year in Oregon, casts doubt on that claim.
💡
Do you know anything else about this app? Do you work at ICE or CBP? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.This post is for subscribers only
Become a member to get access to all content
Subscribe nowICE’s Facial Recognition App Misidentified a Woman. Twice
In testimony from a CBP official obtained by 404 Media, the official described how Mobile Fortify returned two different names after scanning a woman's face during an immigration raid.Joseph Cox (404 Media)
Internal ICE material and testimony from an official obtained by 404 Media provides the clearest link yet between the technological infrastructure Palantir is building for ICE and the agency’s activities on the ground.#ICE
‘ELITE’: The Palantir App ICE Uses to Find Neighborhoods to Raid
Palantir is working on a tool for Immigration and Customs Enforcement (ICE) that populates a map with potential deportation targets, brings up a dossier on each person, and provides a “confidence score” on the person’s current address, 404 Media has learned. ICE is using it to find locations where lots of people it might detain could be based.The findings, based on internal ICE material obtained by 404 Media, public procurement records, and recent sworn testimony from an ICE official, show the clearest link yet between the technological infrastructure Palantir is building for ICE and the agency’s activities on the ground. The tool receives peoples’ addresses from the Department of Health and Human Services (HHS) among a range of other sources, according to the material.
The news comes after Department of Homeland Security (DHS) head Kristi Noem said the agency is sending hundreds more federal agents to Minneapolis amid widespread protests against the agency. Last week ICE officer Jonathan Ross shot and killed 37 year old U.S. citizen Renee Nicole Good. During Operation Metro Surge, which DHS calls the “largest immigration operation ever,” immigration agents have surrounded rideshare drivers and used pepper spray on high school students.
“Enhanced Leads Identification & Targeting for Enforcement (ELITE) is a targeting tool designed to improve capabilities for identifying and prioritizing high-value targets through advanced analytics,” a user guide for ELITE obtained by 404 Media says. The tool aims to be nearly all encompassing when it comes to finding ICE targets, from identifying subjects in the first place, to building a list of people, to supervisors approving selections for officers to ultimately go into the field and apprehend.
💡
Do you know anything else about this tool? Do you work at ICE, CBP, or Palantir? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.One feature of ELITE is the “Geospatial Lead Sourcing Tab,” according to the user guide. This lets ICE see people it may potentially want to detain on a map interface, based on various criteria such as “Bios & IDs,” “Location,” “Operations,” and “Criminality.” An ICE officer can then select people one by one, or draw a shape on the map to see people in that selected area.
ELITE has already been used by ICE to target specific areas, according to sworn testimony from an ICE official in Oregon. In October, immigration officers waited in three unmarked SUVs outside an apartment complex in Woodburn. They went on to bust a driver’s window and pull a 45-year-old woman from a van, used ICE’s facial recognition app Mobile Fortify on her, and agents had the goal of making eight arrests per team per day, Oregon Live reported. Lawyers representing the woman say authorities arrested her and more than 30 other people in a “dragnet.”
“One of our apps, it’s called ELITE. And so it tells you how many people are living in this area and what’s the likelihood of them actually being there,” a deportation officer with ICE’s Fugitive Operations Unit, identified in court records as JB, testified about the raid in early December. 404 Media purchased a transcript of JB’s testimony from the court. “It’s basically a map of the United States. It’s kind of like Google Maps.”
“It pulls from all kinds of sources,” JB continued. “It’s a newer app that was actually given to us in ICE.” JB said ELITE is what ICE sometimes uses to track the apparent density of people at a particular location to target. “You’re going to go to a more dense population rather than [...] like, if there’s one pin at a house and the likelihood of them actually living there is like 10 percent [...] you’re not going to go there.” For that raid in Woodburn, JB suggested the immigration officers used ELITE to generate leads. Additionally, in a text thread of immigration officers, someone described the area as “target rich,” which JB explained meant the officials had run multiple license plates in that area and found vehicles registered to people “who had either a criminal or immigration nexus.”
Screenshots of the ICE official's testimony. Image: 404 Media.
JB and other officials were testifying in the case of MJMA, the woman pulled from the van during the Woodburn raid. She is being represented by attorneys from Innovation Law Lab.
Once a person is selected on the map interface, ELITE then shows a dossier on that particular person, according to the user guide. That includes their name, a photo, their Alien Number (the unique code given by the U.S. government to each immigrant), their date of birth, and their full address. ELITE notes the source of the address (such as the government agency that supplied it), and gives an “address confidence score.” One address confidence score example in the guide is 98.95 out of 100; another is 77.25 out of 100. This score is based on both the source of the address and how recent the data is, the user guide says. (ICE is paying skip tracers, private investigators, and bounty hunters to help verify peoples’ addresses.)
Those sources can include HHS, U.S. Citizenship and Immigration Services (USCIS), and “CLEAR.” The guide does not provide any more specifics on what CLEAR might be, but ICE has repeatedly contracted with Thomson Reuters which sells a data product called CLEAR. Thomson Reuters did not respond to a request for comment. HHS did not respond to a request for comment.
The documents don’t say if those are the only entities providing data for ELITE. The user guide says ELITE is “integrating new data sources” to reduce officer workload.
ICE can also use ELITE to look up people based on an unique identifier, such as their Alien Number, name, or date of birth. ELITE also lets ICE do this in bulk, selecting up to 50 people at once, according to the guide.
playlist.megaphone.fm?p=TBIEA2…
ICE can filter the map by what the guide calls Special Operations. These are “groups of pre-defined aliens specifically targeted by Leadership for action.” ICE officers are told to consult ICE leadership or “broadcasts” on when to use these operation filters. DHS’s surge in Minneapolis is focused at least in part on the city’s Somali community after renewed focus on a COVID-19 fraud case. The overwhelming majority of Somalis who live in the Minneapolis and St. Paul area are U.S. citizens, PBS reported.“These records give us behind-the-scenes insight into the kind of mass surveillance machine ICE is building with help from powerful tech companies like Palantir,” Laura Rivera, senior staff attorney at Just Futures Law, told 404 Media. “When combined with what we know from ICE testimony and other public information, it gives us a blueprint into how ICE is going into communities and identifying people for arrest in real-time.”
Senator Ron Wyden, who represents Oregon where ELITE was discussed, told 404 Media in a statement, “The fact ICE is using this app proves the completely indiscriminate nature of the agency's aggressive and violent incursions into our communities. This app allows ICE to find the closest person to arrest and disappear, using government and commercial data, with the help of Palantir and Trump's Big Brother databases. It makes a mockery of the idea that ICE is trying to make our country safer. Rather, agents are reportedly picking people to deport from our country the same way you'd choose a nearby coffee shop.”
Screenshot of the Palantir contract, via highergov.com.
The ELITE user guide does not say who developed the system. But the tool’s distinctive title—Enhanced Leads Identification & Targeting for Enforcement—exactly matches one included in an addendum to a Palantir contract from last year. It says Palantir should “continue configuration and engineering services” for ELITE and some other ICE tools. That supplemental agreement for $29.9 million started in September and is planned to go on for at least a year.Palantir has worked with ICE for years and was focused on criminal investigations, supporting Homeland Security Investigations’ (HSI) Investigative Case Management (ICM) system. That changed in the second Trump administration, with Palantir now working on ICE’s deportation efforts.
After participating in a three-week coding sprint, ICE updated an ongoing Palantir contract related to “Enforcement Prioritization and Targeting,” to “support the development of an accurate picture of actionable leads based on existing law enforcement datasets to allow law enforcement to prioritize enforcement actions,” according to an internal Palantir wiki previously obtained by 404 Media. The goal was to find the physical location of people marked for deportation, and Palantir said it believes its work with ICE is “intended to promote government efficiency, transparency, and accountability.”
The leaked material described Palantir’s deportation-focused work as “concentrated on delivering prototype capabilities” and lasting around six months. It left open the room for more work with ICE, and said “Palantir has developed into a more mature partner for ICE.” Documents ICE published described Palantir’s work as building a tool called ImmigrationOS.
More than eight months have passed since Palantir discussed the issue internally. Neither Palantir nor DHS responded to multiple requests for comment.
In their testimony, JB said, “it’s a tool that we use that gives you a probability. But there’s never [...] there’s no such thing as 100 percent.” The user guide adds, “As always, make sure you do your due diligence on each target to confirm removability prior to action.”
How ICE raids in Minnesota connect to a years-old fraud scandal
The Trump administration is using a years-old scandal first prosecuted under the Biden administration to justify its immigration crackdown in Minnesota.David Ingram (NBC News)
The proposed law would force DHS only use the app, called Mobile Fortify, at ports of entry; delete all photos of U.S. citizens taken by the app; and effectively kill the local law enforcement of the app.#Impact #ICE
New Legislation Would Rein In ICE’s Facial Recognition App
A group of six Democratic lawmakers is proposing legislation that would dramatically rein in Immigration and Customs Enforcement’s (ICE) facial recognition app, according to a copy of the draft bill shared with 404 Media. ICE and Customs and Border Protection (CBP) have been scanning peoples’ faces with the app, called Mobile Fortify, across the country, using it to verify their citizenship and claiming that a result in the app should be trusted over a birth certificate.The move signals the first potential legislative move against the app after 404 Media first revealed Mobile Fortify’s existence in June based on leaked ICE emails. Since then, 404 Media has covered its continued use against U.S. citizens, the 200 million images it uses, and the Department of Homeland Security’s (DHS) plan to roll out a version of the app to local law enforcement.
💡
Do you know anything else about this app? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.“When ICE claims that an image it snaps and runs through an unproven app can be enough evidence to detain people for possible deportation, no one is safe,” Rep. Bennie G. Thompson (D-MS), ranking member of the Committee on Homeland Security, and who authored the legislation, said. “ICE’s use of Mobile Fortify to determine a person’s legal status is an outrageous affront to the civil rights and civil liberties of U.S. citizens and immigrants alike. DHS should not be conducting surveillance by experimenting with Americans’ faces and fingerprints in the field—especially with unproven and biased technology. It is time to put an end to its widespread use. We can secure the Homeland and respect the rights and privacy of Americans at the same time.”
The bill is being cosponsored by by Rep. Lou Correa (D-CA), Ranking Member of the Subcommittee on Border Security & Enforcement; Rep. Shri Thanedar (D-MI), Ranking Member of the Subcommittee on Oversight, Investigations & Accountability; Rep. Yvette D. Clarke (D-NY), Chair of the Congressional Black Caucus; Rep. Grace Meng (D-NY), Chair of the Congressional Asian Pacific American Caucus; and Rep. Adriano Espaillat (D-NY), Chair of the Congressional Hispanic Caucus. It follows some of the lawmakers demanding answers from DHS about the app in September.
The proposed law, called the Realigning Mobile Phone Biometrics for American Privacy Protection Act, aims to curtail both Mobile Fortify and Mobile Identify, the local law enforcement version, in a few ways. First, it would ban use of the apps except for identification at ports of entry. As 404 Media showed, Mobile Fortify uses CBP systems that are usually reserved for identifying and taking photos of people as they enter the U.S. Mobile Fortify turned that capability inwards to American streets.
The law would also require all photos and fingerprints of U.S. citizens captured before the practices introduced by the bill be deleted, and require that all photographs or fingerprints of U.S. citizens be destroyed within 12 hours of being taken. The law would also prohibit DHS from sharing the apps with non-DHS law enforcement agencies, effectively killing the local law enforcement version. (404 Media reported the app became unavailable on the Google Play Store in early-December.)
When an immigration officer scans someone’s face with Mobile Fortify, the app runs their face against a bank of 200 million images held by DHS, according to the app’s user manual previously obtained by 404 Media. If the app finds what it believes is a matching face, it returns a name, their nationality, age and date of birth, unique identifiers such as their “alien registration,” and a field titled “Immig. Judge Decision,” the manual says. This appears to refer to whether an immigration judge has ruled on this person’s case, and may include a result that says “remove.”
404 Media previously obtained an internal DHS document through the Freedom of Information Act (FOIA) which showed ICE does not let people decline to be scanned by the app. 404 Media has found likely cases of the app being used in Chicago. In a partnership with Reveal, 404 Media reported the app has been used on U.S. citizens.
One video posted to social media this week showed an officer using the app to take a photo of an identification document in what the video said was Minnesota. 404 Media compared the app shown in the video to the user interface in the leaked Mobile Fortify user manual and they matched.
“The Trump Administration has weaponized federal agencies against the American people. This latest effort to use facial recognition to further target immigrant families is reckless and dangerous,” said Rep. Espaillat in a statement. “I’m proud to stand with Ranking Member Thompson to introduce legislation to combat ICE and DHS, prohibiting the use of facial recognition as yet another ruthless tactic to further this administration’s mass deportation agenda.”
“The abuse of this type of technology by DHS agents is not only invasive, it is likely unconstitutional and certainly un-American,” Rep. Meng added. “Immigration enforcement should not be conducted by an app and DHS should not conduct dragnet operations that terrorize communities and violate people's constitutional rights. I am proud to have worked with Ranking Member Thompson and my colleagues to introduce this commonsense legislation.”
A DHS spokesperson told 404 Media in a statement, “Claims that Mobile Fortify violates the Fourth Amendment or compromises privacy are false. The application does not access open-source material, scrape social media, or rely on publicly available data. Its use is governed by established legal authorities and formal privacy oversight, which set strict limits on data access, use, and retention.”
“Mobile Fortify is a lawful law-enforcement tool developed under the Trump Administration to support accurate identity and immigration-status verification during enforcement operations. It operates with a deliberately high matching threshold and queries only limited CBP immigration datasets. Mobile Fortify has not been blocked, restricted, or curtailed by the courts or by legal guidance. It is lawfully used nationwide in accordance with all applicable legal authorities,” the statement continued.
Update: this piece has been updated to include a statement from DHS.
Inside ICE’s Supercharged Facial Recognition App of 200 Million Images
404 Media has seen user manuals for Mobile Fortify, ICE’s new facial recognition app which allows officers to instantly look up DHS, State Department, and state law enforcement databases by just pointing a phone at someone’s face.Joseph Cox (404 Media)
404 Media has obtained material that explains how Tangles and Webloc, two surveillance systems ICE recently purchased, work. Webloc can track phones without a warrant and follow their owners home or to their employer.#ICE
Inside ICE’s Tool to Monitor Phones in Entire Neighborhoods
A social media and phone surveillance system ICE bought access to is designed to monitor a city neighborhood or block for mobile phones, track the movements of those devices and their owners over time, and follow them from their places of work to home or other locations, according to material that describes how the system works obtained by 404 Media.Commercial location data, in this case acquired from hundreds of millions of phones via a company called Penlink, can be queried without a warrant, according to an internal ICE legal analysis shared with 404 Media. The purchase comes squarely during ICE’s mass deportation effort and continued crackdown on protected speech, alarming civil liberties experts and raising questions on what exactly ICE will use the surveillance system for.
💡
Do you know anything else about this tool? Do you work for ICE, CBP, or another agency? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.“This is a very dangerous tool in the hands of an out-of-control agency. This granular location information paints a detailed picture of who we are, where we go, and who we spend time with,” Nathan Freed Wessler, deputy project director of the American Civil Liberties Union’s (ACLU) Speech, Privacy, and Technology Project, told 404 Media.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
At least four videos show what really happened when ICE shot a woman in Minneapolis on Wednesday. DHS has established itself as an agency that cannot be trusted to live in or present reality.#ICE
DHS Is Lying To You
A maroon Honda Pilot SUV sits perpendicular across a residential road in Minneapolis. At the time, federal authorities were in the neighborhood as part of the Department of Homeland Security’s (DHS) recently announced surge of thousands of officials. A silver Nissan Titan drives up the road and stops because the Honda is blocking its path. Two officers dressed in body armor, pouches, and badges saying “police” exit the Nissan.The two people walk towards the Honda. Someone can be heard saying “get out of the fucking car.” One of them tries to open the driver’s door and reach through the open window. The driver of the Honda reverses and turns, getting straighter with the road. The driver then slowly accelerates and starts to turn to the right, leveling the car out with its front pointing away from the two officers.
A third officer, who has been standing on the other side of the road, pulls out a firearm while the car is turning away from him and fires into the car three times. The officer fires two of the shots when the vehicle is already well past him. He is not in front of the car, but to the side. The officer calmly holsters his weapon.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
On Tuesday, ICE was allowed to continue using Medicaid data in deportation cases.#ICE #FOIA
Here is the Agreement Giving ICE Medicaid Patients' Data
A data sharing agreement between the Department of Homeland Security (DHS) and the Centers for Medicare & Medicaid Services (CMS), which was designed for ICE to receive the personal data of nearly 80 million Medicaid patients, was published as part of a lawsuit last year, with the public now able to see the exact text of that unprecedented agreement.Last year, Freedom of the Press Foundation and 404 Media sued DHS for a copy of the agreement after the agency failed to turn it over in response to Freedom of Information Act (FOIA) requests. A U.S. attorney working on that case then flagged to our counsel that the document had been released in a separate lawsuit various states brought against the Department of Health and Human Services and DHS.
The full text of the agreement also shows the data promised to ICE included more granular data than previously reported, such as patients’ banking “routing number, account type, account number.”
“Access to this information will allow ICE to receive information concerning the identity and location of aliens in the United States, such as address, telephone number, banking information (routing number, account type, account number), email address, internet protocol (IP) addresses, or other information relevant to identifying and locating aliens in the United States,” the agreement reads.
💡
Do you know anything else about this data sharing? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.The existence of the data sharing agreement was reported at the time by the Associated Press and later WIRED. 404 Media has uploaded a copy here. At the end of December, a judge ruled that the Trump administration could resume sharing much of the data after it had been blocked from doing so, Politico reported. That means ICE can use Medicaid data in deportation cases starting Tuesday, Politico added.
Under a section called “description of the data that may be disclosed,” the agreement says that data includes “Medicaid recipients: Name, address, assigned Medicaid identification number, social security number (SSN), date of birth, sex, phone number, locality, ethnicity and race.” The data allowed to be given to ICE under the new ruling is slightly narrower than that, and includes citizenship, immigration status, address, phone number, date of birth, and Medicaid ID, and is limited to people living unlawfully in the U.S., Politico reported.
In June the Associated Press reported Medicaid officials unsuccessfully fought to block the transfer of data related to millions of Medicaid enrollees from California, Illinois, Washington state, and Washington D.C. Emails showed two top advisers to Health Secretary Robert F. Kennedy Jr. ordered the data transfer and CMS officials had 54 minutes to comply, the Associated Press added. At the time, the exact purpose of the data sharing was not known. Then the Associated Press reported on the agreement itself that said the sharing was for ICE to locate aliens in the country.
playlist.megaphone.fm?p=TBIEA2…
CMS did not respond to 404 Media’s request for comment.DHS Assistant Secretary Tricia McLaughlin told 404 Media in a statement, “President Trump consistently promised to protect Medicaid for eligible beneficiaries. To keep that promise after Joe Biden flooded our country with tens of millions of illegal aliens CMS and DHS are exploring an initiative to ensure that illegal aliens are not receiving Medicaid benefits that are meant for law-abiding Americans.” Undocumented immigrants do not have access to federally funded healthcare coverage, including Medicaid, according to the non-partisan, non-profit organization American Immigration Council. Federal law mandates that hospitals provide emergency care regardless of the person’s immigration status, the organization says.
The agreement is part of a much wider practice of data sharing across the second Trump administration and its mass deportation effort. The IRS has funneled data to ICE; in November a court blocked that data sharing. This month the New York Times revealed the TSA was sharing multiple lists of people a week with ICE so immigration authorities could then detain them at airports.
Correction: due to an editing error, this article previously said we sued DHS earlier this year. It was last year. The copy has been updated to reflect this.
Court blocks IRS from sharing taxpayer addresses with ICE
A federal judge sided with plaintiffs who argued that the data-sharing pact violated privacy laws, putting immigrants at risk of their information being “impermissibly used” by ICE.Matt Bracken (FedScoop)
AI Solutions 87 says on its website its AI agents “deliver rapid acceleration in finding persons of interest and mapping their entire network.”#ICE #AI
ICE Contracts Company Making Bounty Hunter AI Agents
Immigration and Customs Enforcement (ICE) has paid hundreds of thousands of dollars to a company that makes “AI agents” to rapidly track down targets. The company claims the “skip tracing” AI agents help agencies find people of interest and map out their family and other associates more quickly. According to the procurement records, the company’s services were specifically for Enforcement and Removal Operations (ERO), the part of ICE that identifies, arrests, and deports people.The contract comes as ICE is spending millions of dollars, and plans to spend tens of millions more, on skip tracing services more broadly. The practice involves ICE paying bounty hunters to use digital tools and physically stalk immigrants to verify their addresses, then report that information to ICE so the agency can act.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
Jesus Gutiérrez told immigration agents he was a U.S. citizen. Only after they scanned his face, did the agents let him go.#ICE #Privacy
How a US Citizen Was Scanned With ICE's Facial Recognition Tech
This article is a partnership between Reveal and 404 Media.Jesus Gutiérrez, 23, was walking home one morning from a Chicago gym when he noticed a gray Cadillac SUV with no license plates. He kept walking, shrugging it off. Then the car pulled over and two men got out.
The federal immigration officials told him not to run. They then peppered Gutiérrez with questions: Where are you going? Where are you coming from? Do you have your ID on you?
Gutiérrez is a U.S. citizen. He told the officials this. He didn’t have any identification on him, but, panicking, he tried to find a copy on his phone. The agents put him into the car, where another two agents were waiting, and handcuffed him. Just sit there and be quiet, they said.
💡
Has this happened to you or someone you know? Do you have any videos of ICE or CBP scanning people's faces? Do you work for either agency? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.Without Gutiérrez’s ID, the agents resorted to another approach. They took a photo of his face. A short while later, the agents got their answer: “Oh yeah, he’s right. He’s saying the right thing. He does got papers,” Gutiérrez recalled the agents saying.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
New videos and photos shared with 404 Media show a Border Patrol agent wearing Meta Ray-Bans glasses with the recording light clearly on. This is despite a DHS ban on officers recording with personal devices.#CBP #ICE #Meta
Border Patrol Agent Recorded Raid with Meta’s Ray-Ban Smart Glasses
On a recent immigration raid, a Border Patrol agent wore a pair of Meta’s Ray-Ban smart glasses, with the privacy light clearly on signaling he was recording the encounter, which agents are not permitted to do, according to photos and videos of the incident shared with 404 Media.Previously when 404 Media covered Customs and Border Protection (CBP) officials’ use of Meta’s Ray-Bans, it wasn’t clear if the officials were using them to record raids because the recording lights were not on in any of the photos seen by 404 Media. In the new material from Charlotte, North Carolina, during the recent wave of immigration enforcement, the recording light is visibly illuminated.
That is significant because CBP says it does not allow employees to use personal recording devices. CBP told 404 Media it does not have an arrangement with Meta, indicating this official was wearing personally-sourced glasses.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
G. Gibson reshared this.
The Department of Justice demanded Apple remove ICEBlock, which reports sightings of ICE officials, from its App Store. Now the creator is suing, saying the demand violated his First Amendment rights.#ICE #iceblock
ICEBlock Creator Sues U.S. Government Over App’s Removal
The creator of ICEBlock, a popular ICE-spotting app that Apple removed after direct pressure from the Department of Justice, is suing Attorney General Pam Bondi and other top officials, arguing that the demand violated his First Amendment rights.The move is the latest in the ongoing crackdown on ICE-spotting apps and other information about the Trump administration’s mass deportation effort. Both Apple and Google have removed other similar apps from their app stores, with Apple also removing one called Eyes Up that simply archived videos of ICE abuses.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
The app, called Mobile Identify, was launched in November, and lets local cops use facial recognition to hunt immigrants on behalf of ICE. It is unclear if the removal is temporary or not.#ICE #CBP #Privacy #News
DHS’s Immigrant-Hunting App Removed from Google Play Store
A Customs and Border Protection (CBP) app that lets local cops use facial recognition to hunt immigrants on behalf of the federal government has been removed from the Google Play Store, 404 Media has learned.It is unclear if the removal is temporary or not, or what the exact reason is for the removal. Google told 404 Media it did not remove the app, and directed inquiries to its developer. CBP did not immediately respond to a request for comment.
Its removal comes after 404 Media documented multiple instances of CBP and ICE officials using their own facial recognition app to identify people and verify their immigration status, including people who said they were U.S. citizens.
💡
Do you know anything else about this removal or this app? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.The removal also comes after “hundreds” of Google employees took issue with the app, according to a source with knowledge of the situation.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
The government also said "we don't have resources" to retain all footage and that plaintiffs could supply "endless hard drives that we could save things to."
The government also said "we donx27;t have resources" to retain all footage and that plaintiffs could supply "endless hard drives that we could save things to."#ICE
ICE Says Critical Evidence In Abuse Case Was Lost In 'System Crash' a Day After It Was Sued
The federal government claims that the day after it was sued for allegedly abusing detainees at an ICE detention center, a “system crash” deleted nearly two weeks of surveillance footage from inside the facility.People detained at ICE’s Broadview Detention Center in suburban Chicago sued the government on October 30; according to their lawyers and the government, nearly two weeks of footage that could show how they were treated was lost in a “system crash” that happened on October 31.
“The government has said that the data for that period was lost in a system crash apparently on the day after the lawsuit was filed,” Alec Solotorovsky, one of the lawyers representing people detained at the facility, said in a hearing about the footage on Thursday that 404 Media attended via phone. “That period we think is going to be critical […] because that’s the period right before the lawsuit was filed.”
Earlier this week, we reported on the fact that the footage, from October 20 to October 30, had been “irretrievably destroyed.” At a hearing Thursday, we learned more about what was lost and the apparent circumstances of the deletion. According to lawyers representing people detained at the facility, it is unclear whether the government is even trying to recover the footage; government lawyers, meanwhile, said “we don’t have the resources” to continue preserving surveillance footage from the facility and suggested that immigrants detained at the facility (or their lawyers) could provide “endless hard drives where we could save the information, that might be one solution.”
It should be noted that ICE and Border Patrol agents continued to be paid during the government shutdown, that Trump’s “Big Beautiful Bill” provided $170 billion in funding for immigration enforcement and border protection, which included tens of billions of dollars in funding for detention centers.
People detained at the facility are suing the government over alleged horrific treatment and living conditions at the detention center, which has become a site of mass protest against the Trump administration’s mass deportation campaign.
Solotorovsky said that the footage the government has offered is from between September 28 and October 19, and from between October 31 and November 7. Government lawyers have said they are prepared to provide footage from five cameras from those time periods; Solotorovsky said the plaintiffs’ attorneys believe there are 63 surveillance cameras total at the facility. He added that over the last few weeks the plaintiffs’ legal team has been trying to work with the government to figure out if the footage can be recovered but that it is unclear who is doing this work on the government’s side. He said they were referred to a company called Five by Five Management, “that appears to be based out of a house,” has supposedly been retained by the government.
“We tried to engage with the government through our IT specialist, and we hired a video forensic specialist,” Solotorovsky said. He added that the government specialist they spoke to “didn’t really know anything beyond the basic specifications of the system. He wasn’t able to answer any questions about preservation or attempts to recover the data.” He said that the government eventually put him in touch with “a person who ostensibly was involved in those events [attempting to recover the data], and it was kind of a no-name LLC called Five by Five Management that appears to be based out of a house in Carol Stream. We were told they were on site and involved with the system when the October 20 to 30 data was lost, but nobody has told us that Five By Five Management or anyone else has been trying to recover the data, and also very importantly things like system logs, administrator logs, event logs, data in the system that may show changes to settings or configurations or deletion events or people accessing the system at important times.”
Five by Five Management could not be reached for comment.
Solotorovsky said those logs are going to be critical for “determining whether the loss was intentional. We’re deeply concerned that nobody is trying to recover the data, and nobody is trying to preserve the data that we’re going to need for this case going forward.”
Jana Brady, an assistant US attorney representing the Department of Homeland Security in the case, did not have much information about what had happened to the footage, and said she was trying to get in touch with contractors the government had hired. She also said the government should not be forced to retain surveillance footage from every camera at the facility and that the “we [the federal government] don’t have the resources to save all of the video footage.”
“We need to keep in mind proportionality. It took a huge effort to download and save and produce the video footage that we are producing and to say that we have to produce and preserve video footage indefinitely for 24 hours a day, seven days a week, indefinitely, which is what they’re asking, we don’t have the resources to do that,” Brady said. “we don't have the resources to save all of the video footage 24/7 for 65 cameras for basically the end of time.”
She added that the government would be amenable to saving all footage if the plaintiffs “have endless hard drives that we could save things to, because again we don’t have the resources to do what the court is ordering us to do. But if they have endless hard drives where we could save the information, that might be one solution.”
Magistrate Judge Laura McNally said they aren’t being “preserved from now until the end of time, they’re being preserved for now,” and said “I’m guessing the federal government has more resources than the plaintiffs here and, I’ll just leave it at that.”
When McNally asked if the footage was gone and not recoverable, Brady said “that’s what I’ve been told.”
“I’ve asked for the name and phone number for the person that is most knowledgeable from the vendor [attempting to recover] the footage, and if I need to depose them to confirm this, I can do this,” she said. “But I have been told that it’s not recoverable, that the system crashed.”
Plaintiffs in the case say they are being held in “inhumane” conditions. The complaint describes a facility where detainees are “confined at Broadview inside overcrowded holding cells containing dozens of people at a time. People are forced to attempt to sleep for days or sometimes weeks on plastic chairs or on the filthy concrete floor. They are denied sufficient food and water […] the temperatures are extreme and uncomfortable […] the physical conditions are filthy, with poor sanitation, clogged toilets, and blood, human fluids, and insects in the sinks and the floor […] federal officers who patrol Broadview under Defendants’ authority are abusive and cruel. Putative class members are routinely degraded, mistreated, and humiliated by these officers.”
“The more I listened to it, the more I’m like, something doesn’t sound right,” a person who was briefed on the pilot plans told 404 Media.#ICE #bountyhunters
Contractor Paying Random People $300 to Physically Track Immigrants for ICE
A current pilot project aims to pay former law enforcement and military officers to physically track immigrants and verify their addresses to give to ICE for $300 each. There is no indication that the pilot involves licensed private investigators, and appears to be open to people who are now essentially members of the general public, 404 Media has learned.The pilot is a dramatic, and potentially dangerous, escalation in the Trump administration’s mass deportation campaign. People without any official role in government would be tasked with tracking down targets for ICE. It appears to be part of ICE’s broader plan to use bounty hunters or skip tracers to confirm immigrant’s addresses through data and physical surveillance. Some potential candidates for the pilot were recruited on LinkedIn and were told they would be given vehicles to monitor the targets.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
"Defendants have indicated that some video between October 19, 2025 and October 31, 2025 has been irretrievably destroyed and therefore cannot be produced on an expedited basis or at all."#ICE
Two Weeks of Surveillance Footage From ICE Detention Center ‘Irretrievably Destroyed’
The Department of Homeland Security claimed in court proceedings that nearly two weeks worth of surveillance footage from ICE’s Broadview Detention Center in suburban Chicago has been “irretrievably destroyed” and may not be able to be recovered, according to court records reviewed by 404 Media.The filing was made as part of a class action lawsuit against the Department of Homeland Security by people being held at Broadview, which has become the site of widespread protests against ICE. The lawsuit says that people detained at the facility are being held in abhorrent, “inhumane” conditions. The complaint describes a facility where detainees are “confined at Broadview inside overcrowded holding cells containing dozens of people at a time. People are forced to attempt to sleep for days or sometimes weeks on plastic chairs or on the filthy concrete floor. They are denied sufficient food and water […] the temperatures are extreme and uncomfortable […] the physical conditions are filthy, with poor sanitation, clogged toilets, and blood, human fluids, and insects in the sinks and the floor […] federal officers who patrol Broadview under Defendants’ authority are abusive and cruel. Putative class members are routinely degraded, mistreated, and humiliated by these officers.”
As part of discovery in the case, the plaintiffs’ lawyers requested surveillance footage from the facility starting from mid September, which is when ICE stepped up its mass deportation campaign in Chicago. In a status report submitted by lawyers from both the plaintiffs and the Department of Homeland Security, lawyers said that nearly two weeks of footage has been “irretrievably destroyed.”
“Defendants have agreed to produce. Video from September 28, 2025 to October 19, 2025, and also from October 31, 2025 to November, 7 2025,” the filing states. “Defendants have indicated that some video between October 19, 2025 and October 31, 2025 has been irretrievably destroyed and therefore cannot be produced on an expedited basis or at all.” Law & Crime first reported on the filing.
A screenshot from the court filing
The filing adds that the plaintiffs, who are being represented by lawyers from the American Civil Liberties Union of Illinois, the MacArthur Justice Center, and the Eimer Stahl law firm, hired an IT contractor to work with the government “to attempt to work through issues concerning the missing video, including whether any content is able to be retrieved.”Surveillance footage from inside the detention center would presumably be critical in a case about the alleged abusive treatment of detainees and inhumane living conditions. The filing states that the plaintiffs' attorneys have “communicated to Defendants that they are most concerned with obtaining the available surveillance videos as quickly as possible.”
ICE did not respond to a request for comment from 404 Media. A spokesperson for the ACLU of Illinois told 404 Media “we don’t have any insight on this. Hoping DHS can explain.”
Trump admin says video footage inside ICE facility at center of lawsuit 'cannot be produced'
"Plaintiffs intend to explore the issue of missing footage," a recent filing reads.Law & Crime
Material viewed by 404 Media shows data giant Thomson Reuters enriches license plate data with marriage, voter, and ownership records. The tool can predict where a car may be in the future.#ICE #Privacy
This App Lets ICE Track Vehicles and Owners Across the Country
Immigration and Customs Enforcement (ICE) recently invited staff to demos of an app that lets officers instantly scan a license plate, adding it to a database of billions of records that shows where else that vehicle has been spotted around the country, according to internal agency material viewed by 404 Media. That data can then be combined with other information such as driver license data, credit header data, marriage records, vehicle ownership, and voter registrations, the material shows.The capability is powered by both Motorola Solutions and Thomson Reuters, the massive data broker and media conglomerate, which besides running the Reuters news service, also sells masses of personal data to private industry and government agencies. The material notes that the capabilities allow for predicting where a car may travel in the future, and also can collect face scans for facial recognition.
The material shows that ICE continues to buy or source a wealth of personal and sensitive information as part of its mass deportation effort, from medical insurance claims data, to smartphone location data, to housing and labor data. The app, called Mobile Companion, is a tool designed to be used in real time by ICE officials in the field, similar to its facial recognition app but for finding more information about vehicles.
💡
Do you work at ICE or CBP? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.This post is for subscribers only
Become a member to get access to all content
Subscribe now
Google is hosting a CBP app that uses facial recognition to identify immigrants, while simultaneously removing apps that report the location of ICE officials because Google sees ICE as a vulnerable group. “It is time to choose sides; fascism or morality? Big tech has made their choice.”#Google #ICE #News
Google Has Chosen a Side in Trump's Mass Deportation Effort
Google is hosting a Customs and Border Protection (CBP) app that uses facial recognition to identify immigrants, and tell local cops whether to contact ICE about the person, while simultaneously removing apps designed to warn local communities about the presence of ICE officials. ICE-spotting app developers tell 404 Media the decision to host CBP’s new app, and Google’s description of ICE officials as a vulnerable group in need of protection, shows that Google has made a choice on which side to support during the Trump administration’s violent mass deportation effort.Google removed certain apps used to report sightings of ICE officials, and “then they immediately turned around and approved an app that helps the government unconstitutionally target an actual vulnerable group. That's inexcusable,” Mark, the creator of Eyes Up, an app that aims to preserve and map evidence of ICE abuses, said. 404 Media only used the creator’s first name to protect them from retaliation. Their app is currently available on the Google Play Store, but Apple removed it from the App Store.
“Google wanted to ‘not be evil’ back in the day. Well, they're evil now,” Mark added.
💡
Do you know anything else about Google's decision? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.The CBP app, called Mobile Identify and launched last week, is for local and state law enforcement agencies that are part of an ICE program that grants them certain immigration-related powers. The 287(g) Task Force Model (TFM) program allows those local officers to make immigration arrests during routine police enforcement, and “essentially turns police officers into ICE agents,” according to the New York Civil Liberties Union (NYCLU). At the time of writing, ICE has TFM agreements with 596 agencies in 34 states, according to ICE’s website.
This post is for subscribers only
Become a member to get access to all content
Subscribe nowApple takes down ICE tracking apps after pressure from Bondi DOJ
Apple dropped an ICE tracking app from its online store Thursday in response to the Department of Justice raising concerns that the app put law enforcement officers’ safety at risk.Ashley Oliver (Fox Business)
Newly released documents provide more details about ICE's plan to use bounty hunters and private investigators to find the location of undocumented immigrants.
Newly released documents provide more details about ICEx27;s plan to use bounty hunters and private investigators to find the location of undocumented immigrants.#ICE #bountyhunters
ICE Plans to Spend $180 Million on Bounty Hunters to Stalk Immigrants
Immigration and Customs Enforcement (ICE) is allocating as much as $180 million to pay bounty hunters and private investigators who verify the address and location of undocumented people ICE wishes to detain, including with physical surveillance, according to procurement records reviewed by 404 Media.The documents provide more details about ICE’s plan to enlist the private sector to find deportation targets. In October The Intercept reported on ICE’s intention to use bounty hunters or skip tracers—an industry that often works on insurance fraud or tries to find people who skipped bail. The new documents now put a clear dollar amount on the scheme to essentially use private investigators to find the locations of undocumented immigrants.
💡
Do you know anything else about this plan? Are you a private investigator or skip tracer who plans to do this work? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.This post is for subscribers only
Become a member to get access to all content
Subscribe nowICE Plans to Spend $180 Million on Bounty Hunters to Stalk Immigrants
Newly released documents provide more details about ICE's plan to use bounty hunters and private investigators to find the location of undocumented immigrants.Joseph Cox (404 Media)
Chicagoans are making, sharing, and printing designs for whistles that can warn people when ICE is in the area. The goal is to “prevent as many people from being kidnapped as possible.”#ICE #News
The Latest Defense Against ICE: 3D-Printed Whistles
Chicagoans have turned to a novel piece of tech that marries the old-school with the new to warn their communities about the presence of ICE officials: 3D-printed whistles.The goal is to “prevent as many people from being kidnapped as possible,” Aaron Tsui, an activist with Chicago-based organization Cycling Solidarity, and who has been printing whistles, told 404 Media. “Whistles are an easy way to bring awareness for when ICE is in the area, printing out the whistles is something simple that I can do in order to help bring awareness.”
Over the last couple months ICE has especially focused on Chicago as part of Operation Midway Blitz. During that time, Department of Homeland Security (DHS) personnel have shot a religious leader in the head, repeatedly violated court orders limiting the use of force, and even entered a daycare facility to detain someone.
💡
Do you know anything else about this? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.3D printers have been around for years, with hobbyists using them for everything from car parts to kids’ toys. In media articles they are probably most commonly associated with 3D-printed firearms.
One of the main attractions of 3D printers is that they squarely put the means of production into the hands of essentially anyone who is able to buy or access a printer. There’s no need to set up a complex supply chain of material providers or manufacturers. No worry about a store refusing to sell you an item for whatever reason. Instead, users just print at home, and can do so very quickly, sometimes in a matter of minutes. The price of printers has decreased dramatically over the last 10 years, with some costing a few hundred dollars.
0:00
/0:04
1×A video of the process from Aaron Tsui.
People who are printing whistles in Chicago either create their own design or are given or download a design someone else made. Resident Justin Schuh made his own. That design includes instructions on how to best use the whistle—three short blasts to signal ICE is nearby, and three long ones for a “code red.” The whistle also includes the phone number for the Illinois Coalition for Immigrant & Refugee Rights (ICIRR) hotline, which people can call to connect with an immigration attorney or receive other assistance. Schuh said he didn’t know if anyone else had printed his design specifically, but he said he has “designed and printed some different variations, when someone local has asked for something specific to their group.” The Printables page for Schuh’s design says it has been downloaded nearly two dozen times.
This post is for subscribers only
Become a member to get access to all content
Subscribe now3D Printing Patterns Might Make Ghost Guns More Traceable Than We Thought
Early studies show that 3D printers may leave behind similar toolmarks on repeated prints.Matthew Gault (404 Media)
The app, called Mobile Identify and available on the Google Play Store, is specifically for local and regional law enforcement agencies working with ICE on immigration enforcement.#CBP #ICE #FacialRecognition #News
DHS Gives Local Cops a Facial Recognition App To Find Immigrants
Customs and Border Protection (CBP) has publicly released an app that Sheriff Offices, police departments, and other local or regional law enforcement can use to scan someone’s face as part of immigration enforcement, 404 Media has learned.The news follows Immigration and Customs Enforcement’s (ICE) use of another internal Department of Homeland Security (DHS) app called Mobile Fortify that uses facial recognition to nearly instantly bring up someone’s name, date of birth, alien number, and whether they’ve been given an order of deportation. The new local law enforcement-focused app, called Mobile Identify, crystallizes one of the exact criticisms of DHS’s facial recognition app from privacy and surveillance experts: that this sort of powerful technology would trickle down to local enforcement, some of which have a history of making anti-immigrant comments or supporting inhumane treatment of detainees.
Handing “this powerful tech to police is like asking a 16-year old who just failed their drivers exams to pick a dozen classmates to hand car keys to,” Jake Laperruque, deputy director of the Center for Democracy & Technology's Security and Surveillance Project, told 404 Media. “These careless and cavalier uses of facial recognition are going to lead to U.S. citizens and lawful residents being grabbed off the street and placed in ICE detention.”
💡
Do you know anything else about this app or others that CBP and ICE are using? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.This post is for subscribers only
Become a member to get access to all content
Subscribe now
Photos captured by Mobile Fortify will be stored for 15 years, regardless of immigration or citizenship status, the document says.#FOIA #ICE #CBP
You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says
📄
This article was primarily reported using public records requests. We are making it free to read as a public service. FOIA reporting can be expensive, please consider subscribing to 404 Media to support this work. Or send us a one time donation via our tip jar here.Immigration and Customs Enforcement (ICE) does not let people decline to be scanned by its new facial recognition app, which the agency uses to verify a person’s identity and their immigration status, according to an internal Department of Homeland Security (DHS) document obtained by 404 Media. The document also says any face photos taken by the app, called Mobile Fortify, will be stored for 15 years, including those of U.S. citizens.
The document provides new details about the technology behind Mobile Fortify, how the data it collects is processed and stored, and DHS’s rationale for using it. On Wednesday 404 Media reported that both ICE and Customs and Border Protection (CBP) are scanning peoples’ faces in the streets to verify citizenship.
This post is for subscribers only
Become a member to get access to all content
Subscribe now
Videos on social media show officers from ICE and CBP using facial recognition technology on people in the field. One expert described the practice as “pure dystopian creep.”#ICE #CBP #News #Privacy
ICE and CBP Agents Are Scanning Peoples’ Faces on the Street To Verify Citizenship
“You don’t got no ID?” a Border Patrol agent in a baseball cap, sunglasses, and neck gaiter asks a kid on a bike. The officer and three others had just stopped the two young men on their bikes during the day in what a video documenting the incident says is Chicago. One of the boys is filming the encounter on his phone. He says in the video he was born here, meaning he would be an American citizen.When the boy says he doesn’t have ID on him, the Border Patrol officer has an alternative. He calls over to one of the other officers, “can you do facial?” The second officer then approaches the boy, gets him to turn around to face the sun, and points his own phone camera directly at him, hovering it over the boy’s face for a couple seconds. The officer then looks at his phone’s screen and asks for the boy to verify his name. The video stops.
💡
Do you have any more videos of ICE or CBP using facial recognition? Do you work at those agencies or know more about Mobile Fortify? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.This post is for subscribers only
Become a member to get access to all content
Subscribe now
Court records show Homeland Security Investigations (HSI), a part of ICE, and the FBI obtained Con Edison user data. The utility provider refuses to say whether law enforcement needs a warrant to access its data.#ICE #News
Con Edison Refuses to Say How ICE Gets Its Customers’ Data
Con Edison, the energy company that serves New York City, refuses to say whether ICE or other federal agencies require a search warrant or court order to access its customers’ sensitive data. Con Edison’s refusal to answer questions comes after 404 Media reviewed court records showing Homeland Security Investigations (HSI), a division of ICE, has previously obtained such data, and the FBI performing what the records call ‘searches’ of Con Edison data.The records and Con Edison’s stonewalling raise questions about how exactly law enforcement agencies are able to access the utility provider’s user data, whether that access is limited in any way, and whether ICE still has access during its ongoing mass deportation effort.
“We don’t comment to either confirm or deny compliance with law enforcement investigations,” Anne Marie, media relations manager for Con Edison, told 404 Media after being shown a section of the court records.
In September, 404 Media emailed Con Edison’s press department to ask if law enforcement officers have to submit a search warrant or court order to search Con Edison data. A few days later, Marie provided the comment neither confirming nor denying any details of the company’s data sharing practice.
💡
Do you know anything else about how ICE is accessing or using data? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.404 Media then sent several follow-up inquiries, including whether ICE requires a warrant or other legal mechanism to obtain user data. Con Edison did not respond to any of those follow-ups.
Con Edison’s user data is especially sensitive, and likely valuable to authorities, because in many cases it will directly link a specific person to a particular address. If someone is paying for electricity for a home they own or rent, they most likely do it under their real name.
Federal agencies have repeatedly turned to Con Edison data as part of criminal investigations, according to court records. In one case, the FBI previously said it believed a specific person occupied an apartment after performing a “search” of Con Edison records and finding a Con Edison account in that person’s name. Another case shows the FBI obtaining a Con Edison user’s email address after finding it linked to a utilities account. A third case says “a search of records maintained by Con Edison, a public utilities provider to the greater New York City area” revealed that a specific person was receiving utilities at a target address. Several other cases contain similar language.
playlist.megaphone.fm?p=TBIEA2…
Court records also show HSI has accessed Con Edison data as part of criminal investigations. One shows HSI getting data from Con Edison that reveals the name associated with a particular Con Edison account and address. Another says “there was no indication in the records from Con Edison that the SUBJECT PREMISES is divided into multiple units.” A third shows that HSI “confirmed with Con Edison” who was a customer at an address at a particular point in time.Ordinarily HSI is focused on criminal investigations into child abuse, money laundering, cybercrime, and other types of criminal networks. But in the second Trump administration’s mass deportation effort, the distinction between HSI and ICE is largely meaningless. HSI has reassigned at least 6,198 agents, or nearly 90 percent, and 12,353 personnel overall to assist the deportation arm of ICE, according to data published by the Cato Institute in September. HSI also performs worksite enforcement.
The court records don’t describe how the investigators obtained the Con Edison data exactly, whether they obtained a search warrant or court order, or elaborate on how some officials were able to “search” Con Edison records.
Usually companies and organizations readily acknowledge how and when law enforcement can access customer data. This is for the benefit of users, who can then better understand what legal mechanisms protect their data, but also for law enforcement officials themselves, so they know what information they need to provide during an investigation. Broadly, companies might require a law enforcement official to obtain a search warrant or send a subpoena before they provide the requested user data, based on its sensitivity.
There is no evidence the Instagram and Facebook account, called Montcowatch, sells anything. Lawyers from the ACLU say the move is "wild outside the scope" of DHS' authority.
There is no evidence the Instagram and Facebook account, called Montcowatch, sells anything. Lawyers from the ACLU say the move is "wild outside the scope" of DHSx27; authority.#ICE #DHS
DHS Tries To Unmask Ice Spotting Instagram Account by Claiming It Imports Merchandise
The Department of Homeland Security (DHS) is trying to force Meta to unmask the identity of the people behind Facebook and Instagram accounts that post about Immigration and Customs Enforcement (ICE) activity, arrests, and sightings by claiming the owners of the account are in violation of a law about the “importation of merchandise.” Lawyers fighting the case say the move is “wildly outside the scope of statutory authority,” and say that DHS has not even indicated what merchandise the accounts, called Montcowatch, are supposedly importing.“There is no conceivable connection between the ‘MontCo Community Watch’ Facebook or Instagram accounts and the importation of any merchandise, nor is there any indicated on the face of the Summonses. DHS has no authority to issue these summonses,” lawyers with the American Civil Liberties Union (ACLU) wrote in a court filing this month. There is no indication on either the Instagram or Facebook account that the accounts are selling any type of merchandise, according to 404 Media’s review of the accounts. “The Summonses include no substantiating allegations nor any mention of a specific crime or potential customs violation that might trigger an inquiry under the cited statute,” the lawyers add.
💡
Do you know anything else about this case or others like it? We would love to hear from you. Using a non-work device, you can message Joseph securely on Signal at joseph.404 or Jason at jason.404A judge temporarily blocked DHS from unmasking the owners last week.
“The court now orders Meta [...] not to produce any documents or information in response to the summonses at issue here without further order of the Court,” the judge wrote in a filing. The move to demand data from Meta about the identities of the accounts while citing a customs statute shows the lengths to which DHS is willing to go to attempt to shut down and identify people who are posting about ICE’s activities.
Montcowatch is, as the name implies, focused on ICE activity in Montgomery County, Pennsylvania. Its Instagram posts are usually titled “Montco ICE alert” and include details such as where suspected ICE agents and vehicles were spotted, where suspected agents made arrests, or information about people who were detained. “10/20/25 Eagleville,” one post starts. “Suspected dentention [sic] near Ollies on Ridge Pike sometime before 7:50 am. 3 Agents and 3 Vehicles were observed.”
The Instagram account has been posting since June, and also posts information about peoples’ legal rights to film law enforcement. It also tells people to not intervene or block ICE. None of the posts currently available on the Instagram account could reasonably be described as doxing or harassing ICE officials.
On September 11, DHS demanded Meta provide identifying details on the owners of the Montcowatch accounts, according to court records. That includes IP addresses used to access the account, phone numbers on file, and email addresses, the court records add. DHS cited a law “focused on customs investigations relating to merchandise,” according to a filing from the ACLU that pushed to have the demands thrown out.
playlist.megaphone.fm?p=TBIEA2…
“The statute at issue here, 19 U.S.C. § 1509, confers limited authority to DHS in customs investigations to seek records related to the importation of merchandise, including the assessment of customs duties,” the ACLU wrote. “Identifying anonymous social media users critical of DHS is not a legitimate purpose, and it is not relevant to customs enforcement.” As the ACLU notes, a cursory look at the accounts shows they are “not engaged in commerce.” The court record points to an 2017 Office of the Inspector General report which says Customs and Border Protection (CBP) “regularly” tried much the same thing with its own legal demands, and specifically around the identity of an anonymous Twitter user.“Movant now files this urgent motion to protect their identity from being exposed to a government agency that is apparently targeting their ‘community watch’ Facebook and Instagram accounts for doing nothing more than exercising their rights to free speech and association,” those lawyers and others wrote last week.
“Movant’s social media pages lawfully criticize and publicize DHS and the government agents who Movant views as wreaking havoc in the Montgomery County community by shining a light on that conduct to raise community members’ awareness,” they added.
The judge has not yet ruled on the ACLU’s motion to quash the demands altogether. This is a temporary blockage while that case continues.
The Montocowatch case follows other instances in which DHS has tried to compel Meta to identify the owners of similar accounts. Last month a judge temporarily blocked a subpoena that was aiming to unmask Instagram accounts that named a Border Patrol agent, The Intercept reported.
Earlier this month Meta took down a Facebook page that published ICE sightings in Chicago. The move came in direct response to pressure from the Department of Justice.
Both Apple and Google have removed apps that people use to warn others about ICE sightings. Those removals also included an app called Eyes Up that was focused more on preserving videos of ICE abuses. Apple’s moves also came after direct pressure from the Department of Justice.
Montcowatch directed a request for comment to the ACLU of Pennsylvania, which did not immediately respond.
Courts Block Meta From Sharing Anti-ICE Activists’ Instagram Account Info With Feds
For now, Meta cannot disclose to federal investigators the identities of Instagram users who named and shamed a Border Patrol agent.Shawn Musgrave (The Intercept)
The same hackers who doxed hundreds of DHS, ICE, and FBI officials now say they have the personal data of tens of thousands of officials from the NSA, Air Force, Defense Intelligence Agency, and many other agencies.#News #ICE
Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
A hacking group that recently doxed hundreds of government officials, including from the Department of Homeland Security (DHS) and Immigration and Customs Enforcement (ICE), has now built dossiers on tens of thousands of U.S. government officials, including NSA employees, a member of the group told 404 Media. The member said the group did this by digging through its caches of stolen Salesforce customer data. The person provided 404 Media with samples of this information, which 404 Media was able to corroborate.As well as NSA officials, the person sent 404 Media personal data on officials from the Defense Intelligence Agency (DIA), the Federal Trade Commission (FTC), Federal Aviation Administration (FAA), Centers for Disease Control and Prevention (CDC), the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), members of the Air Force, and several other agencies.
The news comes after the Telegram channel belonging to the group, called Scattered LAPSUS$ Hunters, went down following the mass doxing of DHS officials and the apparent doxing of a specific NSA official. It also provides more clarity on what sort of data may have been stolen from Salesforce’s customers in a series of breaches earlier this year, and which Scattered LAPSUS$ Hunters has attempted to extort Salesforce over.
💡
Do you know anything else about this breach? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.“That’s how we’re pulling thousands of gov [government] employee records,” the member told 404 Media. “There were 2000+ more records,” they said, referring to the personal data of NSA officials. In total, they said the group has private data on more than 22,000 government officials.
Scattered LAPSUS$ Hunters’ name is an amalgamation of other infamous hacking groups—Scattered Spider, LAPSUS$, and ShinyHunters. They all come from the overarching online phenomenon known as the Com. On Discord servers and Telegram channels, thousands of scammers, hackers, fraudsters, gamers, or just people hanging out congregate, hack targets big and small, and beef with one another. The Com has given birth to a number of loose-knit but prolific hacking groups, including those behind massive breaches like MGM Resorts, and normalized extreme physical violence between cybercriminals and their victims.
On Thursday, 404 Media reported Scattered LAPSUS$ Hunters had posted the names and personal information of hundreds of government officials from DHS, ICE, the FBI, and Department of Justice. 404 Media verified portions of that data and found the dox sometimes included peoples’ residential addresses. The group posted the dox along with messages such as “I want my MONEY MEXICO,” a reference to DHS’s unsubstantiated claim that Mexican cartels are offering thousands of dollars for dox on agents.
Hackers Dox Hundreds of DHS, ICE, FBI, and DOJ Officials
Scattered LAPSUS$ Hunters—one of the latest amalgamations of typically young, reckless, and English-speaking hackers—posted the apparent phone numbers and addresses of hundreds of government officials, including nearly 700 from DHS.404 MediaJoseph Cox
After publication of that article, a member of Scattered LAPSUS$ Hunters reached out to 404 Media. To prove their affiliation with the group, they sent a message signed with the ShinyHunters PGP key with the text “Verification for Joseph Cox” and the date. PGP keys can be used to encrypt or sign messages to prove they’re coming from a specific person, or at least someone who holds that key, which are typically kept private.They sent 404 Media personal data related to DIA, FTC, FAA, CDC, ATF and Air Force members. They also sent personal information on officials from the Food and Drug Administration (FDA), Health and Human Services (HHS), and the State Department. 404 Media verified parts of the data by comparing them to previously breached data collected by cybersecurity company District 4 Labs. It showed that many parts of the private information did relate to government officials with the same name, agency, and phone number.
Except the earlier DHS and DOJ data, the hackers don’t appear to have posted this more wide ranging data publicly. Most of those agencies did not immediately respond to a request for comment. The FTC and Air Force declined to comment. DHS has not replied to multiple requests for comment sent since Thursday. Neither has Salesforce.
The member said the personal data of government officials “originates from Salesforce breaches.” This summer Scattered LAPSUS$ Hunters stole a wealth of data from companies that were using Salesforce tech, with the group claiming it obtained more than a billion records. Customers included Disney/Hulu, FedEx, Toyota, UPS, and many more. The hackers did this by social engineering victims and tricking them to connect to a fraudulent version of a Salesforce app. The hackers tried to extort Salesforce, threatening to release the data on a public website, and Salesforce told clients it won’t pay the ransom, Bloomberg reported.
On Friday the member said the group was done with extorting Salesforce. But they continued to build dossiers on government officials. Before the dump of DHS, ICE, and FBI dox, the group posted the alleged dox of an NSA official to their Telegram group.
Over the weekend that channel went down and the member claimed the group’s server was taken “offline, presumably seized.”
The doxing of the officials “must’ve really triggered it, I think it’s because of the NSA dox,” the member told 404 Media.
Matthew Gault contributed reporting.
How Google, Adidas, and more were breached in a Salesforce scam | Malwarebytes
Hackers tricked workers over the phone at Google, Adidas, and more to grant access to Salesforce data.David Ruiz (Malwarebytes)
Flock's automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE.
Flockx27;s automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE.#News #ICE #Surveillance #Flock
ICE Taps into Nationwide AI-Enabled Camera Network, Data Shows
Flock's automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE.Jason Koebler (404 Media)