Every Step You Take, ICE is Watching You

by Alexandria R

Immigration and Customs Enforcement (ICE) has become infamous, particularly in the past year, for brutal tactics, intimidation, and even murder. In 2025, 32 people lost their lives in ICE-related incidents. Some of the agency’s more lethal crimes have drawn major headlines – particularly the most recent killing of two US citizens in Minnesota. While ICE as an agency has gathered a popular reputation as a secret police force, the agency and its activities date back to March 2003, when it was formally created and mobilized as part of the Homeland Security Act of 2002. Its tactics, including infiltration and disruption activities akin to COINTELPRO, have not changed. ICE has acquired Israeli-manufactured spyware known as Graphite, developed by Paragon Solutions. The software is capable of hacking encrypted drives and phones, including live location data, photos, and encrypted messages. Additionally, the agency embeds itself within local law enforcement, often making use of Flock license plate readers and shot spotters to target migrant families and coordinate its operations. Officially, Flock denies that this cooperation exists. 

The agency’s effective infiltration and lethality is concerning, especially when their official mission is taken into account. DHS effectively functions as an organ of the state dedicated to mass internal surveillance and policing. ICE has a mandate to use children to draw out their parents, and detain people based on their outward characteristics. 2026 is a little over two months old, and in that time, ICE has murdered more than six people. Some of them are activists. Other American citizens have been threatened with detention or death for interfering with ICE business. Of particular concern are reports from activists in Minnesota, which echo strange occurrences reported by other activists since at least 2020. Judy and Noah Levy were stopped by ICE agents while observing agency operations in St. Paul. The couple noted that their license plates were photographed. Jarringly, the agents addressed Judy by her name when they came to speak with her. Recalling the incident, Judy said that she was shaken, but continued to follow the agents and their caravan. That’s when ICE vehicles turned onto Levy’s street. 

“Our street is off the beaten path,” said Noah, “You don’t go down our street to get to anywhere. I’d be lying if I said it wasn’t intimidating.” 

In September, ICE spent millions on technology to surveil social media and the dark web. The software, called “Tangles,” creates a daily life profile of the people it surveils by mining social media for their posts, contacts, locations and events they attended, combining it with any information leaked about them online. While the agency has been using AI to “crawl” social media apps and sites, ICE is also putting together a surveillance force for 24/7 social media monitoring. DHS wants your data, but surveillance of public information is not where ICE stops looking.

The Guardian first broke the story of DHS/ICE’s acquisition of Graphite. Stephanie Kirchgaessner’s report details the capabilities of the software, noting that Graphite can “hack into any phone. By essentially taking control of the mobile phone, the user – in this case, ICE – can not only track an individual’s whereabouts, read their messages, and look at their photographs, but also open and read information held on encrypted applications, like WhatsApp or Signal. Spyware like Graphite can also be used as a listening device, through the manipulation of the phone’s recorder.” The agency’s contract with Paragon Solutions dates to late 2024 under the Biden administration. ICE’s mandate to spy on members of the public originates with the founding of its parent organ, DHS. 

Infiltration via spyware is not the only point of entry into personal and private data. It has always been important to be aware of your safety when disclosing personal information online, such as location “check-ins” and specific information about shops or restaurants you frequent. Securing information that can be used to track you and your activities can be difficult when you don’t know what people are looking for. The many different ways that federal agents gain access to sensitive details about ICE observers and their affiliates certainly don’t make it easier. Agencies often infiltrate group events and Signal chats by posing as a concerned member of the public or as an activist. This can be mitigated by ensuring that people are who they say they are via connections to the community, but informants and state collaborators could be anyone. I do not encourage readers to start viewing their comrades with suspicion – only to be wary of sharing specific, personal information, even among friends or comrades, as much as possible.

Internal policing and surveillance have always been the mandate of DHS. Though the agency’s tactics have shifted recently to become more ruthless, the existence of ICE has been maintained and expanded upon by every administration since George W. Bush. The contradiction is glaring. Internal policing and anti-migrant policies such as forced deportation of asylum seekers have no place in a society that calls itself a nation of immigrants, and we as citizens have an obligation not only to inform the public of the tactics and goals of these entities, but also to actively work against them.