The Georgetown Center for Privacy and Technology report has released a comprehensive report on the startling amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE).
Our two-year investigation, including hundreds of Freedom of Information Act requests and a comprehensive review of ICE’s contracting and procurement records, reveals that ICE is now operating as a national monitoring. Since its founding in 2003, ICE has not only strengthened its own ability to use surveillance to effect deportations, but has also played a key role in the federal government’s broader efforts to gather as much information as possible about all our lives. By accessing the digital archives of state and local governments and purchasing databases containing billions of data points from private companies, ICE has created a surveillance infrastructure that allows it to extract detailed records on almost anyone. , seemingly at any time. In its arrest and deportation efforts, ICE has, without any judicial, legislative or public oversight, accessed data sets containing personal information about the vast majority of people living in the United States, including records may end up in the hands of immigration simply because they apply for driver’s licenses; drive on the roads; or register with their local utilities for access to heat, water and electricity.
ICE has built its surveillance system by crossing legal and ethical lines, leveraging the trust people place in government agencies and essential service providers, and exploiting the vulnerability of people who voluntarily give up their information to track their family. Despite the incredible reach and obvious civil rights implications of ICE’s surveillance practices, the agency has managed to shroud these practices in near-total secrecy, avoiding enforcement of even a handful of laws and policies. that could be invoked to impose limitations. Federal and state lawmakers, for the most part, have yet to come to terms with this reality.
*** This is a syndicated security blog from Schneier’s Security Bloggers Network written by Bruce Schneier. Read the original post at: https://www.schneier.com/blog/archives/2022/07/ubiquitous-surveillance-by-ice.html