News US

The powerful tools in ICE’s arsenal to track suspects — and protesters

Technology

Biometric trackers, cellphone location databases and drones are among the surveillance technologies that federal agents are tapping in their deportation campaign.

January 29, 2026 at 5:00 a.m. ESTToday at 5:00 a.m. EST

Federal immigration officers fanning out across Minnesota and other parts of the country are newly equipped with an array of state-of-the-art surveillance technologies, thanks to a bill passed last summer that transformed Immigration and Customs Enforcement into the country’s most highly funded law enforcement agency. ICE has wasted no time spending its war chest, buying new tools ranging from biometric trackers to mobile phone location databases, spyware and drones, while loosening restrictions on how it uses some of these technologies.

These new surveillance powers come at a time when ICE is also pushing the bounds of its traditional role of immigration enforcement. In recent months, ICE leaders, backed by top Trump administration officials, have asserted the authority to use all available tools to monitor and investigate anti-ICE protester networks, including U.S. citizens. Democratic lawmakers and civil rights groups say the agency’s expanding use of its surveillance tools infringes on privacy and free speech rights of immigrants and U.S. citizens alike.

On Thursday, the Department of Homeland Security, of which ICE is a part, disclosed in an annual report that the agency has significantly expanded the operational scope for its use of facial recognition, AI and other advanced technologies. Here’s a look at some of the technologies in ICE’s tool kit.

Facial recognition

NEC and Clearview AI

ICE started using facial recognition technology on the streets over the past year. A new app made by NEC, Mobile Fortify, enables ICE officers to immediately compare phone scans of faces and fingerprints they encounter in the field against databases containing individuals’ immigration status and other biographical information. In the fall, ICE purchased an iris-scanning mobile app that its manufacturer, BI2 Technologies, says can get an identifying read on a person’s eye within seconds from a distance of 15 inches.

Some U.S. citizens have reported having their faces checked in real time by ICE or Customs and Border Protection. “He used facial recognition with another system and it confirmed I was a citizen. They then let me go,” Bloomington, Minnesota, resident Julio Garcia said in a court declaration, describing how immigration agents detained him on Jan. 9.

ICE, CBP, NEC and BI2 Technologies did not respond to requests for comment.

Facial recognition

An ICE agent’s camera records an image of a face.

Software finds the face in the image.

Key facial features are converted into a digital profile.

The profile is checked against a database of faces.

The system reports a possible match.

An ICE agent’s camera records an image of a face.

Software finds the face in the image.

The profile is checked against a database of faces.

Key facial features are converted into a digital profile.

The system reports a possible match.

An ICE agent’s camera records an image of a face.

Software finds the face in the image.

Key facial features are converted into a digital profile.

The profile is checked against a database of faces.

The system reports a possible match.

An ICE agent’s camera records an image of a face.

Software finds the face in the image.

Key facial features are converted into a digital profile.

The profile is checked against a database of faces.

The system reports a possible match.

ICE and other federal agencies have been cautious about sweeping deployment of facial recognition systems because of concerns over privacy violations and inaccuracies in identifying individuals of color. A January 2025 DHS report said ICE restricted its use of the Clearview AI facial recognition system to investigations of child sexual exploitation and abuse. But when ICE signed a new $3.75 million contract with Clearview AI in September, the agency indicated in the procurement record that it also would be used to investigate “assaults against law enforcement officers.”

A Border Patrol agent scans the face of a driver stopped and questioned during an ICE operation in Minneapolis this month. (Mostafa Bassim/Anadolu/Getty Images)

Clearview AI said in a statement that its technology is “an after-the-fact research tool that uses publicly available images” to assist law enforcement investigations.

License plate readers

Motorola Solutions and Thomson Reuters

License plate readers use high-speed cameras to photograph cars and store that data in commercial or government databases. ICE officers can pull up a vehicle’s movement history or search for all vehicles in an area over a period of time, narrowing it down by the car’s color, make or state of registration.

License plate

Cameras mounted on poles along the street capture pictures of cars passing by.

The captured images are processed to isolate the license plate and extract the alphanumeric characters.

Optical Character Recognition (OCR) software converts the letters and numbers on the license plate into machine-readable text.

The recognized license plate number is compared to a database of known plates.

Cameras mounted on poles along the street capture pictures of cars passing by.

The captured images are processed to isolate the license plate and extract the alphanumeric characters.

Optical Character Recognition (OCR) software converts the letters and numbers on the license plate into machine-readable text.

The recognized license plate number is compared to a database of known plates.

The captured images are processed to isolate the license plate and extract the alphanumeric characters.

Cameras mounted on poles along the street capture pictures of cars passing by.

Optical Character Recognition (OCR) software converts the letters and numbers on the license plate into machine-readable text.

The recognized license plate number is compared to a database of known plates.

The captured images are processed to isolate the license plate and extract the alphanumeric characters.

Cameras mounted on poles along the street capture pictures of cars passing by.

Optical Character Recognition (OCR) software converts the letters and numbers on the license plate into machine-readable text.

The recognized license plate number is compared to a database of known plates.

ICE ordered mobile license plate readers from Motorola Solutions in the fall and renewed a contract for Thomson Reuters’s database, which boasts more than 20 billion plate scans, including from private surveillance video feeds. Thomson Reuters has said this data can show, for instance, when an individual registered at one address regularly parks his or her car at another location.

Motorola Solutions and Thomson Reuters did not respond to requests for comment.

A Flock Safety license plate reader on a public road in Houston. (David Goldman/AP)

ICE uses other systems indirectly. After its access to Flock Safety license plate readers owned by local police departments sparked controversy last year, Flock said in August that it had “paused” a “limited pilot” with ICE’s Homeland Security Investigations unit. But ICE has been able to access Flock Safety data by asking friendly local police departments to help it run searches, according to local records obtained by several news outlets.

“Only our customers can control their data and decide with whom they share their data,” a Flock spokesman said, adding that ICE is not a customer.

Cellphone location

L3Harris

Cell-site simulators, also called Stingrays, masquerade as cell towers and trick nearby cellphones to connect, allowing ICE officers to track a phone’s location in real time. The devices, often mounted atop vehicles, are used in two ways. If officers already know the identifying number of the target phone, they can use the cell-site simulator to look for it. They also can scan for all cellphones in the area.

Phone location

Legitimate cell towers relay calls, texts, and data between mobile phones and the wider cellular network.

A mobile phone continuously searches for nearby cell towers and automatically connects to the strongest available signal.

A Stingray mimics a real cell tower, causing nearby phones to connect to it instead of a legitimate tower.

Legitimate cell towers relay calls, texts, and data between mobile phones and the wider cellular network.

A mobile phone continuously searches for nearby cell towers and automatically connects to the strongest available signal.

A Stingray mimics a real cell tower, causing nearby phones to connect to it instead of a legitimate tower.

Legitimate cell towers relay calls, texts, and data between mobile phones and the wider cellular network.

A mobile phone continuously searches for nearby cell towers and automatically connects to the strongest available signal.

A Stingray mimics a real cell tower, causing nearby phones to connect to it instead of a legitimate tower.

Legitimate cell towers relay calls, texts, and data between mobile phones and the wider cellular network.

A mobile phone continuously searches for nearby cell towers and automatically connects to the strongest available signal.

A Stingray mimics a real cell tower, causing nearby phones to connect to it instead of a legitimate tower.

While cell-site simulators show the general location of a cellphone, they do not pinpoint its exact GPS coordinates, nor do they capture the content of communications on a device.

ICE agents must obtain a search warrant from a judge before deploying a Stingray from suppliers like L3Harris, though ICE guidelines name several emergency exceptions, such as “the need to protect human life or avert serious injury,” being in “hot pursuit of a fleeing felon” or “to prevent the escape of a suspect or convicted felon from justice.” In 2023, DHS’s inspector general released a report finding that ICE agents had repeatedly disregarded the law requiring a warrant.

L3Harris did not respond to a request for comment.

Phone location databases

Penlink

In 2018, the Supreme Court ruled in Carpenter v. United States that mobile phone location data revealed so much about people’s lives that authorities need a warrant to access it from phone companies. “When the Government tracks the location of a cellphone it achieves near perfect surveillance,” Chief Justice John G. Roberts Jr. wrote in the court opinion. Federal agencies found a work-around: They buy the information from commercial brokers.

These brokers obtain data from weather or mobile game apps whose users consent to tracking. The first Trump administration used such services for immigration enforcement, as reported by the Wall Street Journal in 2020, but ICE said in January 2024 it had stopped.

The agency has begun using commercial location data again. In September, ICE purchased a subscription to one such database, Penlink’s Webloc, which allows agents to “geofence” a specific area and track all the phones within it. ICE this month expressed interest in expanding its tool kit, issuing a “request for information” to prospective contractors on how ad tech and location data companies can assist the agency.

Penlink declined to comment.

Digital forensics

Paragon Solutions, Cellebrite and Finaldata

ICE has a deep trove of digital forensics tools that allow it to hack into locked phones and computers, recover deleted files and read information in encrypted chats. These powerful tools traditionally were limited to the agency’s investigations into terrorism, child smuggling and other serious transnational crimes, but during the second Trump administration, leadership has ordered the shift of investigative resources across the agency toward the deportation drive.

Phone hacking

The seized phone is plugged into specialized hardware.

The hardware hacks into the phone, bypassing protections to give law enforcement access to:

The seized phone is plugged into specialized hardware.

The hardware hacks into the phone, bypassing protections to give law enforcement access to:

The seized phone is plugged into specialized hardware.

The hardware hacks into the phone, bypassing protections to give law enforcement access to:

As part of its buying spree last year, ICE signed contracts with the Israeli companies Paragon Solutions, which makes spyware that can hack into phones remotely, and Cellebrite, which allows agents to access the contents of locked phones it has seized and automatically sort the data. It also bought Finaldata’s FINALMobile Forensics and other, similar software that can recover deleted data from devices.

Cellebrite said in a statement that its contract with DHS is for national security investigations. “Cellebrite’s technology is forensic, requiring physical possession of a device and appropriate legal authority,” the company said.

Finaldata did not respond to a request for comment. Paragon does not publish contact information.

Leeor Ben-Peretz, chief strategy officer of the Israeli firm Cellebrite, demonstrates its phone-hacking technology in 2016. (Jack Guez/AFP/Getty Images)

ICE had been trying to purchase the Paragon software for some time, but the Biden administration froze the order in 2024 to review whether it complied with an executive order against federal agents using spyware with foreign ties that could be a threat to the U.S. government. The freeze was reversed last year.

Drones

Skydio and General Atomics

Drones are an increasingly ubiquitous part of federal law enforcement agencies’ field operations, providing real-time aerial video back to a base. One compact model purchased by ICE, the Skydio X10D, is advertised as being able to detect individuals from 7.5 miles away and identify them from 0.8 miles. Many models are equipped with night vision and thermal cameras.

Skydio did not respond to a request for comment.

Drones

Drones used by law enforcement include the

31-inch Skydio X10D

And the MQ-9 Predator with a 65-foot wingspan.

Drones used by law enforcement include the

31-inch Skydio X10D

And the MQ-9 Predator with a 65-foot wingspan.

Drones used by law enforcement include the

31-inch Skydio X10D

And the MQ-9 Predator with a 65-foot wingspan.

ICE has been using small drones to monitor some protests over the past year. Its sister agency, U.S. Customs and Border Protection, also flew a much larger, military-grade MQ-9 Predator over anti-ICE protests in Los Angeles over the summer. While it is unclear what technologies were aboard that drone, the U.S. Air Force has previously disclosed that it equipped some MQ-9 Predators produced by General Atomics with a “Gorgon Stare” system of hundreds of cameras that can track everything that moves across 40 square miles in high definition.

General Atomics spokesman C. Mark Brinkley said the baseline MQ-9A drones include a high-definition camera system with infrared sensing and radar that can see through clouds, rain or fog. He said he could not speak to whether CBP made other upgrades. CBP said in 2020 that cameras aboard its MQ-9 drones could discern clothing color or whether someone carried a backpack but could not identify a face.

A U.S. Customs and Border Protection MQ-9 Predator B drone operating along the Mexican border in 2007. (Gerald L Nino/Planet Pix/ZUMA Wire)

ICE signed a $514,000 contract to purchase new drones in the fall, indicating that they could play a larger role going forward. On Jan. 16, the Federal Aviation Administration instituted a ban on third parties flying drones within 3,000 feet of ICE operations, giving ICE sole authority to monitor raids aerially.

About this story

Edited by James Graff and Maureen Linke. Photo editing by Monique Woo. Copy editing by Jeff Cavallin.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button