Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters
None
<p><span style="font-weight: 400;">That United States Immigration and Customs Enforcement (ICE) agents continue to pitch fits over protesters filming and tracking their moves in the communities they’re swarming is tinged with irony, since ICE itself appears to be aggressively doing the same using a social media and phone surveillance system to track citizens’ devices and monitor neighborhoods.</span></p><p><span style="font-weight: 400;">The system developed by PenLink, </span><span style="font-weight: 400;">a subsidiary of Cobwebs Technologies,</span><span style="font-weight: 400;"> gathers data through data brokers on “hundreds of millions” of devices, tracks their movement and that of their owners, among other actions, according to a r</span><a href="https://www.404media.co/inside-ices-tool-to-monitor-phones-in-entire-neighborhoods/" target="_blank" rel="noopener"><span style="font-weight: 400;">eport by 404 Media</span></a><span style="font-weight: 400;">, which viewed internal ICE documents explaining how the system works.</span></p><p><span style="font-weight: 400;">Those actions, to say the least likely tread and trample U.S. privacy laws and run afoul of Fourth Amendment protection, since ICE can apparently tap the data in the system without a warrant.</span></p><p><span style="font-weight: 400;">“As technology and communications companies have grown, they’ve accumulated tons of data knowing that people won’t read the terms of service,” says John Bambenek, president of Bambenek Consulting. </span></p><p><span style="font-weight: 400;">Mobile devices, in particular, he says, “are a gateway into deep details into our everyday lives, which is why stalker ware is prolific on mobile devices.” </span></p><p><span style="font-weight: 400;">That sure is underscored by ICE’s tracking activities using readily available tech. In an </span><a href="https://www.mprnews.org/episode/2026/01/12/how-ice-uses-phone-and-internet-data-to-identify-and-track-people" target="_blank" rel="noopener"><span style="font-weight: 400;">interview</span></a><span style="font-weight: 400;"> with MPR News, 404 Media journalist Joseph Cox explained that ICE has recently acquired social media monitoring tool Tangles, which scrapes social media sites and makes the information accessible. That’s not uncommon.</span></p><p><b>“</b><span style="font-weight: 400;">What’s different here is that Tangles is in combination with the tool called Webloc,” another tool that ICE has invested in, “gives an all-in-one solution for following people online,” Cox told MPRNews. “When it comes to their social media activity, ICE officials can add them to a watch list so they will be alerted whenever this person posts.”</span></p><p><span style="font-weight: 400;">And then they can use AI “to build some sort of sentiment analysis about what they’re posting as well,” he explained. “The idea is that whenever somebody posts something online that ICE is interested in, the officials are going to see it.”</span></p><p><span style="font-weight: 400;">Coupled with Webloc, which also gathers location data and then provides it via a map interface for phones, the system offers a more complete picture of who protesters are and what they are doing, their habits and perhaps even their associations. </span></p><p><span style="font-weight: 400;">“You log into the interface, you draw a circle or rectangle around a place of interest, maybe an ICE facility, maybe somewhere where a protest is happening,” Cox said. “It then shows all of the location data and phones it has for that location, and the user is able to then track the phones to other places.” </span></p><p><span style="font-weight: 400;">That so much data is available for these tools to gather is concerning. “What’s probably shocking to folks is the volume of useful data that data brokers have collected on them,” says Trey Ford, chief strategy and trust officer at Bugcrowd.</span></p><p><span style="font-weight: 400;">“The data they’ve (willfully, or unknowingly) entrusted their applications and software service providers with is considerably harder to get for law enforcement through intelligence channels – is commercially available for anyone to purchase,” he says.</span></p><p><span style="font-weight: 400;">And, says Bambenek, </span><span style="font-weight: 400;">“the problem is that we can’t imagine all the bad ways some data can be used, and until it actually happens, there’s never any protest.”</span></p><p><span style="font-weight: 400;">Although concern about government and law enforcement access is understandable, Ford says, “I’m not sure why we’d be comfortable with anyone else collecting and selling this information.”</span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/whos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters/" data-a2a-title="Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters%2F&linkname=Who%E2%80%99s%20Stalking%20Whom%3F%20ICE%20Uses%20Social%20Media%20and%20Phone%20Surveillance%20System%20to%20Track%20Protesters" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters%2F&linkname=Who%E2%80%99s%20Stalking%20Whom%3F%20ICE%20Uses%20Social%20Media%20and%20Phone%20Surveillance%20System%20to%20Track%20Protesters" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters%2F&linkname=Who%E2%80%99s%20Stalking%20Whom%3F%20ICE%20Uses%20Social%20Media%20and%20Phone%20Surveillance%20System%20to%20Track%20Protesters" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters%2F&linkname=Who%E2%80%99s%20Stalking%20Whom%3F%20ICE%20Uses%20Social%20Media%20and%20Phone%20Surveillance%20System%20to%20Track%20Protesters" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters%2F&linkname=Who%E2%80%99s%20Stalking%20Whom%3F%20ICE%20Uses%20Social%20Media%20and%20Phone%20Surveillance%20System%20to%20Track%20Protesters" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>