ICE wants to build a 24/7 social media surveillance team

Together, these commands will act as reconnaissance weapons of the department for ensuring compliance and removal of ICE. They will receive tips and incoming cases, explore people on the Internet and pack the results in dossiers, which can be used by field offices to plan arrests.

It is expected that the volume of information of the contractors will be collected. Design instructions indicate open source intelligence: public messages, photos and posts on Facebook platforms to Reddit to Tiktok. Analysts may also be entrusted with more unclear or foreign sites, such as Russian Vkontakte.

They will also be armed with powerful commercial databases, such as Lexisnexis Tackint And Thomson Reuters Clear, which combines real estate recordings, telephone accounts, utilities, registration of vehicles and other personal data to files available for search.

The plan requires strict execution time. Urgent cases, such as suspected threats of national security or people in the first ten of the best sought persons, should be investigated within 30 minutes. High cases receive one hour; Lids with a lower priority should be completed during the working day. ICE expects that at least three quarters of all cases will correspond to these terms, and the leading contractors will reach more than 95 percent.

The plan goes beyond the staff. ICE also needs algorithms, asking the contractors to state how they can thin artificial intelligence In hunting – a proposal that reflects other recent proposals. The agency also puts off more than a million dollars a year to arm analysts with the latest observation tools.

Ice did not immediately respond to a request about the comment.

Earlier this year, interception showed that ice System plans This can automatically scan social networks for the presence of “negative moods” in relation to the agency, and users mark that they show “tendency to violence”. Purchase records previously considered 404 identified Media software used by the agency for Build dossier on flagsCompilation of personal data, family links and even the use of faces for connecting images on the Internet. Observers warned that it was unclear how such a technology could distinguish genuine threats from political speech.

Leave a Comment