Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

Overview

The rapid expansion of immigration surveillance has outpaced statutory regulations and constitutional jurisprudence, creating systematic erosion of civil liberties through technical loopholes and commercial data acquisitions.


Fourth Amendment Framework

The Fourth Amendment

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated..."

Traditional Doctrine

Government generally needs:

  • Probable cause for arrests
  • Warrants for searches
  • Judicial oversight of surveillance

Carpenter v. United States (2018)

The Ruling

The Supreme Court held that historical Cell-Site Location Information (CSLI) is protected by the Fourth Amendment.

Key Reasoning

Carrying a cell phone is "indispensable to participation in modern society."

  • Individuals maintain reasonable expectation of privacy in location data
  • Cell phones continuously log detailed movement records
  • Warrant required to compel carriers to produce CSLI

Limitation

Carpenter specifically addressed data obtained via compulsory legal process (subpoenas to telecommunications carriers).


The Third-Party Doctrine Loophole

Traditional Third-Party Doctrine

Information voluntarily shared with third parties (banks, phone companies) receives reduced Fourth Amendment protection because individuals have "assumed the risk" of disclosure.

DHS Exploitation

Agencies argue:

  1. Consumers "voluntarily" share location data with apps
  2. Apps share with data brokers
  3. Government purchases from brokers as commercial buyer
  4. No warrant required because it's a commercial transaction

Legal Scholars' Response

This constitutes an illegal end-run around the Fourth Amendment, essentially laundering unconstitutional searches through the private sector.


Pending Legislation

Fourth Amendment Is Not For Sale Act (S. 1265)

Bipartisan legislation would:

Provision Effect
Ban data purchases Agencies cannot buy personal data from brokers
Require court orders Judicial oversight for data acquisition
Close the loophole End commercial data workaround

Status: Pending congressional action.


Privacy Impact Assessment Failures

E-Government Act of 2002

Mandates Privacy Impact Assessments (PIAs) before deploying systems that collect PII.

Documented Failures

System Failure
HART PIAs lacked data population identification
HART Sharing partners not comprehensively listed
Mobile Fortify Deployed without dedicated PIA
Commercial Data (Venntel) Procured without Privacy Threshold Analysis
Commercial Data No audit logs maintained

Pattern

DHS routinely deploys invasive technologies before assessing privacy implications, rendering PIAs a bureaucratic formality rather than substantive safeguard.


OMB Privacy Requirements

GAO Finding

DHS fully implemented only 5 of 12 mandated Office of Management and Budget privacy requirements for HART.

Missing Protections

  • Partner agency retention assurances
  • Data disposal verification
  • Comprehensive sharing documentation

Privacy Act of 1974

Requirements

  • Agencies must maintain accurate records
  • Individuals can access and correct their records
  • Limits on data collection and retention

Immigration Exception

Many immigration databases operate under exceptions limiting individual access rights.

HART Classification

DHS OIG determined HART operates under Privacy Act (not 28 CFR Part 23 criminal intelligence rules), but found:

  • 2 of 22 feeder systems lacked current PIAs
  • Outdated Information Sharing and Access Agreements
  • Missing conditions on authorized use and disposal

State Privacy Laws

California Consumer Privacy Act (CCPA)

Provides California residents data access and deletion rights, but:

  • Limited application to law enforcement
  • Commercial data already collected before requests
  • No real-time prevention mechanism

State Sanctuary Laws

Attempt to limit local-federal data sharing, but:

  • Commercial data workarounds available
  • Federal database access unaffected
  • Technical enforcement mechanisms lacking

Civil Liberties Chilling Effects

Documented Impacts

Healthcare

Population-level data shows:

  • Fear of enforcement deters healthcare seeking
  • Dangerous delays in medical treatment
  • Affects both undocumented and citizen family members

Education

  • Increased school absenteeism following enforcement actions
  • Children kept home due to parental fear
  • Long-term educational impacts

Tax Compliance

  • IRS-ICE MOU deterred ITIN filing
  • Reduced economic contribution
  • Undermined voluntary tax compliance system

Political Participation

ICE has targeted:

  • Immigrants' rights activists
  • New Sanctuary Coalition leaders
  • Humanitarian border workers

Palantir ICM used to map social networks and affiliations of critics, effectively criminalizing political dissent.


Constitutional Rights Regardless of Status

Protections Apply

Right Application
Fourth Amendment Applies to all persons in U.S.
Fifth Amendment Due process applies to all
First Amendment Speech/association protected

Key Point

Constitutional protections against unreasonable searches apply to all persons, not just citizens.


Legal Remedies

Available Challenges

Remedy Purpose
Suppression motions Exclude illegally obtained evidence
Habeas corpus Challenge unlawful detention
Civil rights lawsuits Seek damages for violations
FOIA litigation Force disclosure of practices

Challenges

  • Agencies often conceal surveillance methods
  • Parallel construction hides original data source
  • Qualified immunity protects officers
  • Immigration proceedings have limited discovery

Parallel Construction

Definition

Practice where agencies:

  1. Use sensitive/questionable surveillance to locate target
  2. Artificially engineer separate conventional evidence basis
  3. Use "clean" evidence to justify arrest/prosecution
  4. Conceal original surveillance method from court

Impact

  • Deprives defendants of ability to challenge original search
  • Insulates surveillance from judicial review
  • Undermines due process principles
  • Prevents development of protective case law

Congressional Oversight

Challenges

  • Agencies resist disclosure of surveillance capabilities
  • Classified/sensitive designations limit public accountability
  • Partisan divisions affect oversight intensity
  • Rapid technology deployment outpaces congressional response

GAO Role

Government Accountability Office provides critical independent audits, but:

  • Recommendations are advisory
  • Agencies not required to implement
  • Follow-up on compliance limited

Implications

For Individuals

Understanding legal framework helps:

  1. Recognize when rights may be violated
  2. Understand limitations of current protections
  3. Make informed decisions about data exposure
  4. Support legislative reforms

For Advocates

Documentation supports:

  1. Litigation challenging surveillance practices
  2. Legislative advocacy (Fourth Amendment Is Not For Sale Act)
  3. FOIA requests for system documentation
  4. Congressional oversight engagement

For Attorneys

In immigration cases:

  1. Challenge evidence obtained through commercial data
  2. Request disclosure of surveillance methods
  3. Raise parallel construction concerns
  4. Pursue suppression of illegally obtained evidence

Related Resources