{"id":1029,"date":"2022-05-10T09:08:15","date_gmt":"2022-05-10T13:08:15","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/american-dragnet-data-driven-deportation-in-the-21st-century\/"},"modified":"2025-05-14T23:02:32","modified_gmt":"2025-05-15T03:02:32","slug":"american-dragnet-data-driven-deportation-in-the-21st-century","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/american-dragnet-data-driven-deportation-in-the-21st-century\/","title":{"rendered":"American Dragnet: Data-Driven Deportation in the 21st Century"},"content":{"rendered":"<p><span style=\"font-weight: 400\">In 2022, we published <\/span><a href=\"https:\/\/americandragnet.org\/\"><i><span style=\"font-weight: 400\">American Dragnet: Data-Driven Deportation in the 21st Century<\/span><\/i><\/a><span style=\"font-weight: 400\">, our investigation into the sweeping surveillance powers of the U.S. Immigration Customs Enforcement (ICE). Just three years later, as authoritarianism takes hold in the U.S., the Trump administration is using the digital surveillance apparatus the report describes to target immigrants, activists and anyone else who challenges his agenda. In May 2025, we re-released the report with a new foreword reflecting on the meaning of our original findings in the current political context.\u00a0<\/span><\/p>\n<p><b>Download full report with May 2025 foreword (PDF):<\/b> <a href=\"https:\/\/drive.google.com\/file\/d\/1FMNGgSFkAShZ5kTTom9PkQ41lObNdw3H\/view?usp=drive_link\"><span style=\"font-weight: 400\">American Dragnet: Data-Driven Deportation in the 21st Century\u00a0<\/span><\/a><\/p>\n<p><b>Descargue el informe completo con el pr\u00f3logo de mayo 2025 (PDF): <\/b><a href=\"https:\/\/drive.google.com\/file\/d\/1NSFWFle0bpqW0pZE2HGSrUPxEcodhjYP\/view?usp=drive_link\"><span style=\"font-weight: 400\">Redes de Arrastre Americanas: Deportaciones Accionadas por Datos en el Siglo XXI<\/span><\/a><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">After two years of filing hundreds of public records requests and reviewing 13 years of procurement contracts, we found that ICE surveillance is much broader than most people realize.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u25a0 ICE has scanned the driver\u2019s license photos of 1 in 3 adults.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">\u25a0 ICE has access to the driver\u2019s license data of 3 in 4 adults.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">\u25a0 ICE tracks the movements of drivers in cities home to 3 in 4 adults.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">\u25a0 ICE could locate 3 in 4 adults through their utility records.<\/span><\/p>\n<p><span style=\"font-weight: 400\">We also learned how ICE has built its digital surveillance arsenal: by accessing datasets containing detailed personal records on the vast majority of people in the United States, often without any judicial, legislative, or public oversight. Anyone\u2019s information can end up in the hands of immigration enforcement simply by applying for a driver\u2019s license; driving on the roads; or signing up with their local utilities to get access to heat, water and electricity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In addition to quantifying the reach and expansion of ICE surveillance, the report calls upon Congress to investigate and conduct oversight into ICE surveillance, and it offers state and local communities a set of concrete suggestions for dismantling this surveillance dragnet.<\/span><\/p>\n<p><b>Public Records Documents<\/b><\/p>\n<p><span style=\"font-weight: 400\">The public records responses we received and other primary source material we referenced during our research are available <\/span><a href=\"https:\/\/drive.google.com\/drive\/folders\/1B8rXUE_SnbKUCgQZlV8zMejPugctKNTm?usp=sharing\"><span style=\"font-weight: 400\">here<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2022, we published American Dragnet: Data-Driven Deportation in the 21st Century, our investigation into the sweeping surveillance powers of the U.S. Immigration Customs Enforcement (ICE). Just three years later, [&hellip;]<\/p>\n","protected":false},"author":11480,"featured_media":0,"parent":62,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-1029","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/1029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/users\/11480"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/comments?post=1029"}],"version-history":[{"count":62,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/1029\/revisions"}],"predecessor-version":[{"id":3694,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/1029\/revisions\/3694"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/62"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/media?parent=1029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}