TL;DR
Security researchers and community technologists have developed low-cost hardware, apps, and crowdsourced maps to identify and sometimes evade surveillance used by ICE and local police. Projects range from ESP-32-based detector kits and Wi‑Fi/Bluetooth mapping apps to reporting platforms and community trainings, though legal risks and efficacy vary and some tools have faced platform removals.
What happened
A loose network of technologists and activists has built several open projects intended to spot, document, and in some cases frustrate surveillance used by ICE and municipal police. Civic-minded developers created small, inexpensive devices—built on the ESP-32 microcontroller—that can identify license-plate camera vendors, overhead drones, and Bluetooth or Wi‑Fi signatures. Mobile and desktop tools such as a Wi‑Fi mapping app can alert users when specified device identifiers appear nearby. Researchers have also used low-cost tactics to confuse automated plate readers and discovered misconfigured camera feeds left exposed on the public internet. Crowdsourced maps and reporting services aggregate the location of automated-license-plate readers and ICE encounters, while community groups have distributed simple physical alarms and run digital-security trainings. The Electronic Frontier Foundation notes it is only affiliated with one project mentioned and warns users to consider legal risks.
Why it matters
- Surveillance infrastructure deployed by local agencies can be shared with federal immigration authorities, broadening its reach.
- Affordable, open tools lower the barrier for communities to map and monitor local surveillance systems.
- Misconfigurations and insecure deployments can expose continuous video feeds and historical records to the public.
- Community-based techniques and trainings offer nontechnical ways to provide early warnings and increase situational awareness.
- Platform removals and unresolved legal questions raise uncertainty about access to and distribution of counter-surveillance tools.
Key facts
- ICE and related enforcement have used surveillance to target a wide set of people, including immigrants, permit holders, and citizens.
- The source reports ICE has spent hundreds of millions of dollars on surveillance technology.
- Flock, a supplier of automated license-plate readers (ALPRs) and cameras, is widely deployed by municipalities and can be accessed by law enforcement including ICE.
- OUI-SPY is an open hardware project that runs on an ESP-32 chip and includes modes to detect Flock cameras, drones, and Bluetooth signals.
- Wigle, an open-source mapping app, can log Wi‑Fi and Bluetooth and be set to notify users when specific identifiers appear.
- A researcher demonstrated that modest visual alterations could prevent an ALPR from recognizing a license plate; some jurisdictions ban obscuring plates.
- Numerous Flock cameras were found exposed on the public internet without password protection, allowing access to live feeds and stored video.
- Crowdsourced efforts such as deflock.me and alpr.watch map ALPR camera locations; ICE reporting apps and archives have also been created.
- Some apps documenting ICE activity have been removed from app stores; EFF is suing over at least one delisting related to an ICE reporting app.
What to watch next
- Outcome of EFF's lawsuit over the removal of an ICE-reporting app from an app store.
- Whether operators of exposed or misconfigured camera feeds remediate those security gaps (not confirmed in the source).
- Further app removals or reinstatements related to ICE reporting and archiving (not confirmed in the source).
Quick glossary
- ALPR (Automated License Plate Reader): Camera systems that capture images of vehicle license plates and use software to extract and index plate numbers.
- ESP-32: A low-cost, widely used microcontroller with Wi‑Fi and Bluetooth capabilities, popular in hobbyist and DIY hardware projects.
- Open-source intelligence (OSINT): The collection and analysis of information available from publicly accessible sources for research or investigative purposes.
- Cell-site simulator: A device that mimics a mobile tower to intercept or track nearby cell phones; detection tools can help spot such devices.
- Bluetooth Low Energy (BLE): A wireless protocol for short-range communication used by many consumer devices, which can broadcast identifiable signals.
Reader FAQ
Does the EFF endorse these counter-surveillance projects?
The source states EFF is only affiliated with its Rayhunter project and does not endorse the other projects mentioned.
Are the detection and evasion techniques legal to use?
The source does not provide legal determinations and advises consulting an attorney; it explicitly says EFF does not make legal statements about these projects.
What is Rayhunter?
Rayhunter is an EFF project for detecting cell-site simulators that runs on an inexpensive mobile hotspot.
Have app stores removed ICE-reporting tools?
Yes; the source cites at least two ICE-related apps that were taken down from an app store and notes EFF is litigating over one removal.

ICE has been invading U.S. cities, targeting, surveilling, harassing, assaulting, detaining, and torturing people who are undocumented immigrants. They also have targeted people with work permits, asylum seekers, permanent residents…
Sources
- How Hackers Are Fighting Back Against ICE
- ICE Wants to Go After Dissenters as well as Immigrants
- ICE agents have new tools to track and ID people
- ICE Uses a Growing Web of AI Services to Power Its …
Related posts
- Investigation Traces Kimwolf and Aisuru Botnets to Proxy Sellers and Hosts
- Landline and internet services cut in parts of Iran amid nationwide protests
- Interactive Iran Protest Map tracks 82 visible incidents — Verified Incident Tracker