{"id":41016,"date":"2025-11-07T07:15:00","date_gmt":"2025-11-07T15:15:00","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=41016"},"modified":"2025-11-07T07:50:27","modified_gmt":"2025-11-07T15:50:27","slug":"always-watching-how-ices-plan-to-monitor-social-media-24-7-threatens-privacy-and-civic-participation","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/always-watching-how-ices-plan-to-monitor-social-media-24-7-threatens-privacy-and-civic-participation\/","title":{"rendered":"Always watching: How ICE\u2019s plan to monitor social media 24\/7 threatens privacy and civic&nbsp;participation"},"content":{"rendered":"\n<p><a href=\"https:\/\/theconversation.com\/profiles\/nicole-m-bennett-2366336\">Nicole M. Bennett<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/indiana-university-1368\">Indiana University<\/a><\/em><\/p>\n\n\n\n<p>When most people think about immigration enforcement, they picture border crossings and airport checkpoints. But the new front line may be your social media feed.<\/p>\n\n\n\n<p>U.S. Immigration and Customs Enforcement has published a <a href=\"https:\/\/sam.gov\/workspace\/contract\/opp\/37b379dbed484281a12530cc01835e04\/view\">request for information<\/a> for private-sector contractors to launch a <a href=\"https:\/\/www.wired.com\/story\/ice-social-media-surveillance-24-7-contract\">round-the-clock social media monitoring program<\/a>. The request states that private contractors will be <a href=\"https:\/\/sam.gov\/workspace\/contract\/opp\/37b379dbed484281a12530cc01835e04\/view\">paid to comb through<\/a> \u201cFacebook, Google+, LinkedIn, Pinterest, Tumblr, Instagram, VK, Flickr, Myspace, X (formerly Twitter), TikTok, Reddit, WhatsApp, YouTube, etc.,\u201d turning public posts into enforcement leads that feed directly into ICE\u2019s databases.<\/p>\n\n\n\n<p>The request for information reads like something out of a cyber thriller: dozens of analysts working in shifts, strict deadlines measured in minutes, a tiered system of prioritizing high-risk individuals, and the latest software keeping constant watch.<\/p>\n\n\n\n<p>I am <a href=\"https:\/\/scholar.google.com\/citations?user=JnTFiOQAAAAJ&amp;hl=en\">a researcher<\/a> who studies the intersection of data governance, digital technologies and the U.S. federal government. I believe that the ICE request for information also signals a concerning if logical next step in a longer trend, one that moves the U.S. border from the physical world into the digital.<\/p>\n\n\n\n<h2>A new structure of surveillance<\/h2>\n\n\n\n<p>ICE already <a href=\"https:\/\/www.wired.com\/video\/watch\/incognito-mode-how-ices-explosive-growth-threatens-every-american\">searches social media<\/a> using a service called <a href=\"https:\/\/shadowdragon.io\/socialnet\/\">SocialNet<\/a> that monitors most major online platforms. The agency has also <a href=\"https:\/\/www.levernews.com\/ice-just-bought-a-social-media-surveillance-botice-just-bought-a-social-media-surveillance-bot\/\">contracted with Zignal Labs<\/a> for its AI-powered social media monitoring system.<\/p>\n\n\n\n<p>The Customs and Border Protection agency <a href=\"https:\/\/www.brennancenter.org\/our-work\/research-reports\/governments-growing-trove-social-media-data\">also searches social media<\/a> posts on the devices of some travelers at ports of entry, and the U.S. State Department reviews social media posts when foreigners seek visas to enter the United States. <\/p>\n\n\n\n<p>What would change isn\u2019t only the scale of monitoring but its structure. Instead of government agents gathering evidence case by case, ICE is building a public-private surveillance loop that transforms everyday online activity into potential evidence.<\/p>\n\n\n\n<p>Private contractors would be tasked with scraping publicly available data to collecting messages, including <a href=\"https:\/\/sam.gov\/workspace\/contract\/opp\/37b379dbed484281a12530cc01835e04\/view\">posts and other media and data<\/a>. The contractors would be able to correlate those findings with data in commercial datasets from brokers such as <a href=\"https:\/\/risk.lexisnexis.com\/products\/accurint-for-government\">LexisNexis Accurint<\/a> and <a href=\"https:\/\/legal.thomsonreuters.com\/en\/products\/clear\">Thomson Reuters CLEAR<\/a> along with government-owned databases. Analysts would be required to produce dossiers for ICE field offices within tight deadlines \u2013 sometimes just 30 minutes for a high-priority case.<\/p>\n\n\n\n<p>Those files don\u2019t exist in isolation. They feed directly into <a href=\"https:\/\/www.theguardian.com\/us-news\/ng-interactive\/2025\/sep\/22\/ice-palantir-data\">Palantir Technologies\u2019 Investigative Case Management system<\/a>, the digital backbone of modern immigration enforcement. There, this social media data would join a growing web of license plate scans, utility records, property data and biometrics, creating what is effectively a <a href=\"https:\/\/theconversation.com\/when-the-government-can-see-everything-how-one-company-palantir-is-mapping-the-nations-data-263178\">searchable portrait of a person\u2019s life<\/a>.<\/p>\n\n\n\n<h2>Who gets caught in the net?<\/h2>\n\n\n\n<p>Officially, ICE says its data collection would focus on people who are <a href=\"https:\/\/www.dhs.gov\/sites\/default\/files\/2024-11\/24_1126_priv_pia_ice064_socialmedia.pdf\">already linked to ongoing cases or potential threats<\/a>. In practice, the net is far wider.<\/p>\n\n\n\n<p>The danger here is that when one person is flagged, their friends, relatives, fellow organizers or any of their acquaintances can also become <a href=\"https:\/\/www.nytimes.com\/2019\/08\/27\/us\/harvard-student-ismail-ajjawi.html\">subjects of scrutiny<\/a>. Previous contracts for <a href=\"https:\/\/www.nytimes.com\/2020\/01\/18\/technology\/clearview-privacy-facial-recognition.html\">facial recognition tools<\/a> and <a href=\"https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/privacy-pia-ice-lpr-january2018.pdf\">location tracking<\/a> have shown how easily these systems <a href=\"https:\/\/wwnorton.com\/books\/9780393352177\">expand beyond their original scope<\/a>. What starts as enforcement can <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/08\/31\/google-dragnets-on-phone-data-across-13-kenosha-protest-arsons\/\">turn into surveillance<\/a> of entire communities.<\/p>\n\n\n\n<h2>What ICE says and what history shows<\/h2>\n\n\n\n<p>ICE frames the project <a href=\"https:\/\/sam.gov\/workspace\/contract\/opp\/37b379dbed484281a12530cc01835e04\/view\">as modernization<\/a>: a way to identify a target\u2019s location by identifying aliases and detecting patterns that traditional methods might miss. <a href=\"https:\/\/sam.gov\/workspace\/contract\/opp\/37b379dbed484281a12530cc01835e04\/view\">Planning documents<\/a> say contractors cannot create fake profiles and must store all analysis on ICE servers.<\/p>\n\n\n\n<p>But history suggests these kinds of guardrails often fail. Investigations have revealed how <a href=\"https:\/\/www.404media.co\/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows\/\">informal data-sharing<\/a> between local police and federal agents allowed ICE to access systems it wasn\u2019t authorized to use. The agency has repeatedly <a href=\"https:\/\/www.wsj.com\/articles\/federal-agencies-use-cellphone-location-data-for-immigration-enforcement-11581078600\">purchased massive datasets<\/a> from brokers <a href=\"https:\/\/www.theguardian.com\/us-news\/2022\/apr\/19\/us-immigration-agency-data-loophole-information-deportation-targets\">to sidestep warrant requirements<\/a>. And despite a <a href=\"https:\/\/www.presidency.ucsb.edu\/documents\/executive-order-14093-prohibition-use-the-united-states-government-commercial-spyware-that\">White House freeze<\/a> <a href=\"https:\/\/jackpoulson.substack.com\/p\/exclusive-ice-has-reactivated-its\">on spyware procurement<\/a>, ICE quietly <a href=\"https:\/\/www.wired.com\/story\/ice-paragon-solutions-contract\">revived a contract<\/a> with Paragon\u2019s Graphite tool, software reportedly capable of <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/07\/29\/paragon-is-an-nso-competitor-and-an-american-funded-israeli-surveillance-startup-that-hacks-encrypted-apps-like-whatsapp-and-signal\">infiltrating encrypted apps<\/a> such as WhatsApp and Signal.<\/p>\n\n\n\n<p>Meanwhile, ICE\u2019s vendor ecosystem keeps expanding: <a href=\"https:\/\/immpolicytracking.org\/policies\/reported-ice-contracts-with-clearview-ai-for-facial-recognition-technology\/\">Clearview AI<\/a> for face matching, ShadowDragon\u2019s <a href=\"https:\/\/shadowdragon.io\/socialnet\/\">SocialNet<\/a> for <a href=\"https:\/\/theintercept.com\/2021\/09\/21\/surveillance-social-media-police-microsoft-shadowdragon-kaseware\/\">mapping networks<\/a>, <a href=\"https:\/\/www.babelstreet.com\/\">Babel Street\u2019s<\/a> location history service <a href=\"https:\/\/epic.org\/documents\/epic-v-ice-location-and-social-media-surveillance\/\">Locate X<\/a>, and <a href=\"https:\/\/www.usaspending.gov\/award\/CONT_AWD_70CMSD21C00000001_7012_-NONE-_-NONE-\">LexisNexis<\/a> for <a href=\"https:\/\/risk.lexisnexis.com\/government\">looking up people<\/a>. ICE is also purchasing tools from surveillance firm PenLink that <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2025\/09\/18\/ice-spends-millions-on-social-media-spy-tech-banned-by-meta-facebook\/\">combine location data with social media data<\/a>. Together, these platforms make continuous, automated monitoring not only possible but routine. <\/p>\n\n\n\n<h2>Lessons from abroad<\/h2>\n\n\n\n<p>The United States <a href=\"https:\/\/www.accessnow.org\/surveillance\/\">isn\u2019t alone<\/a> in government monitoring of social media. In the United Kingdom, a new police unit tasked <a href=\"https:\/\/www.theguardian.com\/uk-news\/2025\/jul\/27\/police-unit-in-england-to-monitor-online-signs-of-anti-migrant-disorder\">with scanning online discussions<\/a> about immigration and civil unrest has drawn criticism for blurring the line between public safety and political policing.<\/p>\n\n\n\n<p>Across the globe, <a href=\"https:\/\/www.ftm.eu\/articles\/spyware-industry-eu-subsidies-surveillance-concers\">spyware scandals<\/a> have shown how <a href=\"https:\/\/www.theguardian.com\/technology\/2025\/feb\/06\/owner-of-spyware-used-in-alleged-whatsapp-breach-ends-contract-with-italy\">lawful access tools<\/a> that were initially justified for counterterrorism were later used <a href=\"https:\/\/www.accessnow.org\/publication\/between-a-hack-and-a-hard-place-how-pegasus-spyware-crushes-civic-space-in-jordan\/\">against journalists and activists<\/a>. Once these systems exist, mission creep, also known as <a href=\"https:\/\/doi.org\/10.1080\/17579961.2021.1898299\">function creep<\/a>, becomes the rule rather than the exception.<\/p>\n\n\n\n<h2>The social cost of being watched<\/h2>\n\n\n\n<p>Around-the-clock surveillance doesn\u2019t just gather information \u2013 it also changes behavior.<\/p>\n\n\n\n<p>Research found that visits to Wikipedia articles on terrorism <a href=\"https:\/\/doi.org\/10.15779\/Z38SS13\">dropped sharply<\/a> immediately after revelations about the National Security Agency\u2019s global surveillance in June 2013.<\/p>\n\n\n\n<p>For immigrants and activists, the stakes are higher. A post about a protest or a joke can be reinterpreted as \u201cintelligence.\u201d Knowing that federal contractors may be watching in real time <a href=\"https:\/\/www.techpolicy.press\/trumps-social-media-surveillance-social-scoring-by-another-name\/\">encourages self-censorship and discourages civic participation<\/a>. In this environment, the digital self, an identity composed of biometric markers, algorithmic classifications, risk scores and digital traces, becomes a risk that follows you across platforms and databases.<\/p>\n\n\n\n<h2>What\u2019s new and why it matters now<\/h2>\n\n\n\n<p>What is genuinely new is the privatization of interpretation. ICE isn\u2019t just collecting more data, it is outsourcing judgment to private contractors. Private analysts, aided by artificial intelligence, are likely to decide what online behavior signals danger and what doesn\u2019t. That decision-making happens rapidly and across large numbers of people, for the most part beyond public oversight.<\/p>\n\n\n\n<p>At the same time, the consolidation of data means social media content can now sit beside <a href=\"https:\/\/www.theguardian.com\/us-news\/ng-interactive\/2025\/sep\/22\/ice-palantir-data\">location and biometric information<\/a> inside <a href=\"https:\/\/www.wired.com\/story\/ice-palantir-immigrationos\/\">Palantir\u2019s hub<\/a>. Enforcement increasingly happens through data correlations, <a href=\"https:\/\/doi.org\/10.1007\/978-3-030-50559-2\">raising questions about due process<\/a>.<\/p>\n\n\n\n<p>ICE\u2019s request for information is likely to evolve into a full procurement contract within months, and <a href=\"https:\/\/epic.org\/press-release-epic-files-suit-challenging-federal-governments-national-data-banks-of-sensitive-personal-information\/\">recent litigation<\/a> from the League of Women Voters and the Electronic Privacy Information Center against the Department of Homeland Security suggests that the oversight is likely to lag far behind the technology. ICE\u2019s plan to maintain permanent watch floors, open indoor spaces equipped with video and computer monitors, that are staffed <a href=\"https:\/\/sam.gov\/workspace\/contract\/opp\/37b379dbed484281a12530cc01835e04\/view\">24 hours a day, 365 days a year<\/a> signals that this likely isn\u2019t a temporary experiment and instead is a new operational norm.<\/p>\n\n\n\n<h2>What accountability looks like<\/h2>\n\n\n\n<p>Transparency starts with public disclosure of the algorithms and scoring systems ICE uses. Advocacy groups such as the American Civil Liberties Union argue that law enforcement agencies <a href=\"https:\/\/www.aclu.org\/cases\/digital-age-warrants\">should meet the same warrant standards online<\/a> that they do in physical spaces. The Brennan Center for Justice and the ACLU argue that there should be <a href=\"https:\/\/www.brennancenter.org\/our-work\/analysis-opinion\/oversight-model-ai-national-security-privacy-and-civil-liberties\">independent oversight<\/a> of surveillance systems for accuracy and bias. And several U.S. senators have introduced legislation to <a href=\"https:\/\/www.warren.senate.gov\/newsroom\/press-releases\/warren-sanders-wyden-whitehouse-renew-push-to-protect-americans-sensitive-data-from-greedy-brokers\">limit bulk purchases<\/a> from data brokers.<\/p>\n\n\n\n<p>Without checks like these, I believe that the boundary between border control and everyday life is likely to keep dissolving. As the digital border expands, it risks ensnaring anyone whose online presence becomes <a href=\"https:\/\/www.wired.com\/story\/the-wired-guide-to-protecting-yourself-from-government-surveillance\/\">legible to the system<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/theconversation.com\/profiles\/nicole-m-bennett-2366336\">Nicole M. Bennett<\/a>, Ph.D. Candidate in Geography and Assistant Director at the Center for Refugee Studies, <em><a href=\"https:\/\/theconversation.com\/institutions\/indiana-university-1368\">Indiana University<\/a><\/em><\/p>\n\n\n\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/always-watching-how-ices-plan-to-monitor-social-media-24-7-threatens-privacy-and-civic-participation-268175\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nicole M. Bennett, Indiana University When most people think about immigration enforcement, they picture border crossings and airport checkpoints. But the new front line may be your social media feed. U.S. Immigration and Customs Enforcement has published a request for information for private-sector contractors to launch a round-the-clock social media monitoring program. The request states [&hellip;]<\/p>\n","protected":false},"author":56,"featured_media":41017,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8025,46,295,10,296,36,28,4,38,8],"tags":[527,16423,16307,885,891,886,860,702,3394,255],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/41016"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=41016"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/41016\/revisions"}],"predecessor-version":[{"id":41018,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/41016\/revisions\/41018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/41017"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=41016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=41016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=41016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}