Does ICE recive training in Irseal
Yes — multiple investigative reports and activist investigations conclude that officials have participated in training and exchange programs with i security forces or in Israel-focused seminars; organ...
Your fact-checks will appear here
Israeli digital intelligence company
Yes — multiple investigative reports and activist investigations conclude that officials have participated in training and exchange programs with i security forces or in Israel-focused seminars; organ...
Multiple independent investigations, advocacy groups and news outlets report that officers and other U.S. law‑enforcement personnel have participated in longstanding exchanges, conferences and joint t...
The 2025 budget surge funneled tens of billions of dollars into ICE’s enforcement and detention missions, and the early spending went overwhelmingly to large private detention firms and a cluster of s...
GrapheneOS began as an open-source, security-focused Android project founded by Daniel Micay in late 2014; it evolved from the CopperheadOS codebase and was announced under the GrapheneOS name in 2019...
Available reporting shows no credible evidence in the provided sources that GrapheneOS or a group named “MetropleX” (or “Metroplex”) has formal ties to Israeli government agencies, Jewish communal org...
to monitor or share sightings of agents sits in a legal gray zone: public observation and sharing of lawfully obtained information can be protected speech, but coordinated efforts that facilitate evas...
Federal law gives ICE broad authority to arrest and detain noncitizens, including warrantless arrests in many circumstances, but courts have repeatedly limited that authority by requiring during searc...
at least two forensic and surveillance technologies: under a roughly $2 million agreement and long-standing tied to multi-million-dollar contracts; procurement notices, Federal Procurement Data System...
Transparency around DHS and ICE procurement of surveillance tools is real but highly uneven: procurement notices, inspector‑general reports, and civil society FOIA wins have revealed major purchases a...
Available sources show no documented evidence in this collection linking GrapheneOS founders or core contributors to Israel or to organized Jewish groups; GrapheneOS was founded by Daniel Micay and is...
NCMEC collects reports of child sexual exploitation via its CyberTipline and forwards those reports and supporting material to designated law enforcement bodies — including FBI, federal task forces, a...
ICE’s biggest active contracts for phone‑forensics and related surveillance tools as of early 2026 are concentrated among a handful of specialized firms: Cellebrite (major universal forensic extractio...
Law enforcement prioritizes CSAM cases based on risk to live victims and investigatory triage: NCMEC analysts flag and escalate roughly 63,892 of millions of reports as “urgent or involving a child in...
Commercial mobile-forensics vendors such as and using a mix of logical file‑system collections, exploit‑based techniques that bypass or brute‑force passcodes, and—according to reporting—installation o...
Oversight of ICE’s recent wave of high‑risk surveillance contracts — including deals with Palantir, Clearview AI, Cellebrite and Paragon — exists in theory across federal procurement rules and calls f...
Courts treat chat logs and messaging exports as powerful but technically fraught evidence: admissibility turns on chain-of-custody, forensic soundness, and whether providers or tools acted as governme...
Apple says it responds to valid legal process and publishes semi‑annual Transparency Reports and legal‑process guidelines that enumerate the types and volume of government requests it receives and ans...
Reports, watchdog filings and local coverage identify a series of high-profile awards in 2024–2026 that were issued without full competitive procurements — notably a roughly $29.9 million no‑bid task ...
GrapheneOS’s security posture relies heavily on hardening work such as its hardened memory allocator and active discovery/reporting of Android and Pixel-specific vulnerabilities; those efforts have le...
The assembled reporting shows , including social-media monitoring, phone-cracking tools, facial recognition, and data collection practices that involve U.S. persons, raising interconnected privacy, fr...