ICE Expands Stingray Use As AI Policing Stumbles And Global Surveillance Grows

ICE continues to deploy Stingray cell-site simulators, backed by new contracts and mobile platforms, using one in Utah to precisely locate an escaped Venezuelan prisoner. Meanwhile, San Mateo County’s $12 million C3 AI policing system has reportedly struggled to deliver, even as agencies like ICE invest further in tools such as Clearview AI. Signal rolled out encrypted backups, and Amnesty flagged Pakistan’s expansive surveillance, highlighting a widening gap between surveillance power and privacy protections.
Key Points
- ICE is actively using and expanding cell-site simulator (Stingray) deployments, supported by new contracts and mobile platforms, to pinpoint targets beyond standard phone location data.
- A recent, unsealed warrant reveals ICE sought a Stingray in Utah to locate an escaped Venezuelan prisoner ordered removed from the U.S., highlighting ongoing civil liberties concerns for bystanders.
- San Mateo County’s $12 million C3 AI ‘Sherlock’ platform has so far underperformed according to officers, raising questions about the efficacy of costly AI policing systems.
- ICE signed a nearly $10 million contract with Clearview AI, signaling continued reliance on facial recognition to investigate assaults on ICE officers.
- Signal launched encrypted chat backups requiring a 64-character recovery key, while Amnesty alleges Pakistan runs expansive domestic surveillance using both Chinese and Western technologies.
Sentiment
The Hacker News community is strongly critical of ICE's Stingray use, viewing cell-site simulators as fundamentally unconstitutional dragnet surveillance tools. While a few commenters note the specific case involved a warranted search for an escaped fugitive, the dominant sentiment holds that the technology's inherent bystander data collection makes it incompatible with Fourth Amendment protections. Significant frustration exists that surveillance expansion continues across administrations regardless of party.
In Agreement
- Stingrays are invasive Fourth Amendment searches, not passive observation, because they actively interact with devices and sweep up data from all nearby bystanders in violation of the Particularity Clause
- The EFF's open-source Rayhunter tool provides an accessible way for citizens to detect cell-site simulators, and the community should adopt defensive countermeasures
- Surveillance expansion is bipartisan — the Biden administration purchased Stingray equipment and maintained multi-million dollar contracts, while the current administration deploys them for immigration enforcement
- The $12 million AI policing system in San Mateo County being described as barely functional validates skepticism about technology-driven law enforcement
- The technology inherently surveils all nearby people regardless of the specific warrant target, making civil liberties concerns unavoidable
Opposed
- In the specific case described, ICE obtained a court warrant targeting an escaped prisoner ordered removed from the US, making this a more defensible use than indiscriminate surveillance
- Broadcasting radio signals in public spaces means there is no reasonable expectation of privacy, analogous to police observing public behavior
- Open-source tools hosted on GitHub should not be automatically distrusted just because Microsoft has government contracts, since the code is publicly auditable