Digital Security — Know Your Exposure
They Have Stingrays.
Clearview AI. Drones.Know what they’re watching.
ICE, CBP, and local law enforcement are deploying surveillance tools most people have never heard of. This hub covers what each tool does, who deploys it, what your phone reveals, and what you can do before, during, and after an encounter. Not paranoia — documented capability sourced to contracts, court filings, and federal records.
55,000+
Border device searches in 2023 — no warrant required
40B+
Photos in Clearview AI database — scraped without consent
95,000+
Location pings CBP purchased from ad data brokers (documented)
100 mi
CBP “constitution-free” border zone — covers 2/3 of Americans
Sources: DHS OIG reports, CBP border search statistics, Clearview AI court filings, 404 Media FOIA releases, ACLU FOIA releases, PCLOB reports, EFF Surveillance Atlas, and federal contracting records at USASpending.gov. Updated March 2026. Not legal advice.
Physical Encounter Guide — Print This
What to Do If ICE Shows Up —
Three Cards, Three Situations
One card for your wallet. One for your front door. One for your car’s glove box. Plain English. No legal jargon.Exactly what to say and what not to say — whether you’re stopped on the street, whether they’re knocking at your door, or whether you’re pulled over. Applies to everyone regardless of immigration status. Sourced to ACLU guidance updated 2026.
Wallet Card
If stopped on the street
Car Card
If pulled over or at a checkpoint
Guides — Digital Security
Six Guides. One Complete Picture.
Guide 01 · Most Read
Digital Security for Protests & Direct Action
Before, during, and after a protest. What your phone broadcasts, what Stingrays capture, what face recognition can match, and the step-by-step checklist to protect yourself. Interactive. Printable. Now includes ad tech location threat.
StingraysFace recognitionAd tech locationProtest rightsPre-event checklistIf arrested
$7.99
PDF · Guide
Read Guide →
Guide 02
Border Crossing & Device Searches
What CBP can search without a warrant, how to lock your phone before crossing, what to do if your device is seized.
Guide 03
Device Lockdown
Encrypt your phone, harden your apps, and set up a clean travel device. Step-by-step for Android and iPhone.
Guide 04
Social Media & Online Identity
What investigators pull from your posts, how metadata works against you, and how to reduce your exposure.
Guide 05
Legal Access & Your Rights
Warrants, subpoenas, national security letters, and the FISA court. What each tool can compel and what requires judicial sign-off.
Guide 06 — NEW
Ad Tech Surveillance
CBP confirmed it purchased your location data from the online advertising ecosystem. No warrant. Here's exactly how it works and what to do.
Guide 07 — NEW
AI & Quantum Computing vs. Your Data
Harvest now, decrypt later. AI de-anonymization. Government data purchases. What these technologies mean for data you thought was private — and what to do about it.
What’s Inside
Six Areas of Surveillance Covered
📡Stingray / IMSI Catchers
How cell-site simulators track and intercept your phone — and where ICE has deployed them.
👁️Clearview AI & Facial Recognition
The database with 40+ billion scraped photos. Who has a contract. What a match can trigger.
🚁Drone Surveillance
DHS drone programs, CBP Predators, and local police drones. What they can see and when they're deployed.
📱Your Phone at the Border
Device search numbers year by year. What CBP extracts in 90 seconds. How to prepare before you travel.
🔍Social Media Monitoring
DHS social media screening programs, what keywords trigger flags, and what immigrants need to know.
📍Ad Tech Location Surveillance
CBP and ICE are buying your location history from data brokers — the same pipeline that targets you with ads. No warrant required.
Complete Digital Security Bundle — All Six Guides
Every Guide. Printable. Sourced to Current Law.
All six guides in a single bundle — protest checklist, border crossing protocols, device lockdown steps, social media hygiene, ad tech surveillance explainer, and the complete breakdown of what government surveillance tools can and cannot access. Formatted to print and keep in your bag.
New · April 2026 · Power & Strategy
The Government Built a Pre-Crime Center.
NSPM-7 classifies use of Signal, Discord, and encrypted apps as a domestic terrorism marker. Sourced to the FBI budget document.
Read the documented record →All surveillance capabilities described are sourced to publicly available government contracts, court filings, FOIA releases, or official agency reports. Individual guide accuracy dates noted per guide. Not legal advice — consult an attorney for your specific situation.