Vue lecture

Behind the Blog: High Stakes Data Dumps

Behind the Blog: High Stakes Data Dumps

This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss data dumps, high stakes, and lizard brain screen time.

JOSEPH: Flight Manifests Reveal Dozens of Previously Unknown People on Three Deportation Flights to El Salvador is the hardest hacking related article we’ve ever worked on. 

I’ve obtained some very sensitive data breaches over the last decade: metadata of specific individuals from the massive AT&T breach; photos of peoples’ genitalia pre- and post-plastic surgery. Honestly it’s hard to remember them all.

The data here wasn’t even necessarily as sensitive or personal as those. It was flight manifests, which contain peoples’ names, the flight they were on, and their gender. That’s basically it. But it was how to handle publication of the data that was exceptionally complicated and why it took us a while from when we first obtained the data a few months ago to publishing this week.

Inside ICE’s Supercharged Facial Recognition App of 200 Million Images

Inside ICE’s Supercharged Facial Recognition App of 200 Million Images

ICE officers are able to point their smartphone’s camera at a person and near instantaneously run their face against a bank of 200 million images, then pull up their name, date of birth, nationality, unique identifiers such as their “alien” number, and whether an immigration judge has determined they should be deported from the country, according to ICE material viewed by 404 Media.

The new material, which includes user manuals for ICE’s recently launched internal app called Mobile Fortify, provides granular insight into exactly how ICE’s new facial recognition app works, what data it can return on a subject, and where ICE is sourcing that data. The app represents an unprecedented linking of government databases into a single tool, including from the State Department, Customs and Border Protection (CBP), the FBI, and state records. It also includes the potential for ICE to later add commercially available databases that contain even more personal data on people inside the United States.

💡
Do you know anything else about this app? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

“This app shows that biometric technology has moved well beyond just confirming someone's identity. In the hands of ICE officers, it's becoming a way to retrieve vast amounts of data about a person on demand just by pointing a camera in their face,” Dave Maass, director of investigations at the Electronic Frontier Foundation (EFF), told 404 Media. “The more they streamline its use, the more they streamline its abuse. When an officer says, ‘papers please,’ you could choose to say nothing and face the consequences; with face recognition, your options are diminished.”

Podcast: The AI Exodus Begins

Podcast: The AI Exodus Begins

We start this week with a series of articles from Emanuel about a crackdown in the AI industry. After the break, Sam tells us about the ‘Save Our Signs’ campaign which hopes to preserve the history of national parks. In the subscribers-only section, Jason rants about how AI will not save the media industry. 

Listen to the weekly podcast on Apple Podcasts, Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.

Immigration Raid Tracking App ‘ICE Block’ Keeps Your Data Private, Researcher Finds

Immigration Raid Tracking App ‘ICE Block’ Keeps Your Data Private, Researcher Finds

ICE Block, an app that lets users warn others about the location of ICE officers, and which for a short while was the top of the social media App Store chart, does protect users’ privacy and doesn’t share your location with third parties, according to a recent analysis from a security researcher. ICE Block already claimed that it did not collect any data from the app; the analysis now corroborates that.

“It’s not uploading your location at all, when you make a report that report isn’t associated with your device in any way, and there are no third party services that it talks to or sends data to,” Cooper Quintin, senior public interest technologist at the Electronic Frontier Foundation (EFF), who analyzed the ICE Block app, told 404 Media.

Behind the Blog: In Our Lane

Behind the Blog: In Our Lane

This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss choosing what to cover, fishing expeditions, and the library.

JOSEPH: There’s an interesting cybersecurity story going on: a politically-motivated, right wing extremist hacker broke into Columbia University, stole swathes of applicant and other data, and then leaked parts of it. That’s how you got this New York Times article about New York mayoral hopeful Zohran Mamdani applying to the university as Asian and African American. Predictably, some people are reading that in bad faith, when in reality it shows how stupid and regimented application processes can be in a diverse society.

This week The Verge published a piece called The Columbia hack is a much bigger deal than Mamdani’s college application, which basically elaborates on that point. One section was this:

And yet, there has been precious little reporting on the Columbia hack. Wired hasn’t covered it, and, until this story, neither has The Verge. Nor have The Chronicle of Higher Education, CyberScoop, 404 Media, TechCrunch, or Krebs on Security. These—including The Verge—are small to medium-size entities, and there’s any number of possible reasons why they didn’t pick it up. (On our end, it was partly because we were short-staffed during a national holiday, and partly because we didn’t immediately piece together how extraordinary this particular hack is.) But coverage at the much bigger, well-resourced institutions is also scanty. The Wall Street Journal passed on the story. Reuters has a brief on the initial outage; AP has a short write-up as well, which The Washington Post ran as part of their syndication deal.

Trump Mobile Keeps Charging My Credit Card And I Have No Idea Why

Trump Mobile Keeps Charging My Credit Card And I Have No Idea Why

Last month I put down $100 to pre-order the Trump Organization’s forthcoming mobile phone, the T1. Or, I tried to. As I wrote at the time, the website went to an error page, charged my credit card the wrong amount of $64.70, and sent a confirmation email saying I would receive another confirmation email when my order had been shipped, but I hadn’t provided a shipping address.

I was surprised then to see another two charges on my card from Trump Mobile on Thursday, for $100 and $64.70 respectively. I did not expect or authorize these charges and will be trying to get my money back, if they go through (they’re currently pending). I don’t know when I will get my phone. I also don’t know how to make the charges to my credit card stop because other parts of the (since updated) website also return errors and the customer service number I called on the website couldn’t help either.

At first, the Trump Mobile phone pre-order process was bumbling. The company is now charging my card again and I have no idea why.

ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Agents from Immigration and Customs Enforcement (ICE) have gained access to a massive database of health and car insurance claims and are using it to track down people they want to deport, according to internal ICE material viewed by 404 Media. The database, which contains details on more than 1.8 billion insurance claims and 58 million medical bills and growing, includes peoples’ names, addresses, telephone and tax identification numbers, license plates, and other sensitive personal information.

The news shows how ICE continues to try to leverage whatever data it is able to access or purchase as part of its deportation mission. The news also highlights the existence of the database, called ISO ClaimSearch, that many members of the public have likely never heard of, nor understand they may be included in. Traditionally ISO ClaimSearch is used by insurers to identify people committing fraud or police to recover stolen vehicles. Now, that database is being repurposed as a deportation tool.

💡
Do you know anything else about ICE's access to datasets like this? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

“ICE ERO use of this data reaffirms that ICE will stop at nothing to build a mass surveillance dragnet to track, surveil and criminalize all community members. Time and time again, ICE has shown us that it intends to build a mass surveillance system that nets all Americans. It is not about combatting crime, this is about the federal government having surveillance power and control over all Americans,” Julie Mao, co-founder and deputy director of Just Futures Law, told 404 Media in an email.

Podcast: How to Fight Back Against AI Bot Scrapers

Podcast: How to Fight Back Against AI Bot Scrapers

We’re back! We start this week with Emanuel’s article about Anubis, an open source piece of software that is saving the internet from AI bot scrapers. After the break, Joseph tells us about the new facial recognition app ICE is using and which he revealed. In the subscribers-only section, we do a lightning round runthrough of a bunch of our recent stories about LLMs and how to trick them, or what they don’t understand.

Listen to the weekly podcast on Apple Podcasts, Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.

Behind the Blog: Chatbot 'Addiction' and a Reading List

Behind the Blog: Chatbot 'Addiction' and a Reading List

This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss wrestling over a good headline, what to read this summer, and Super 8 film.

EMANUEL: I would really love it if the people who accuse us of using “clickbait” headlines saw how long, pedantic, and annoying our internal debates are about headlines for some stories. Case in point is Jason’s story this week, which had the headline “Judge Rules Training AI on Authors' Books Is Legal But Pirating Them Is Not.” 

This is an important decision so it got covered everywhere. I don’t think any of the other headlines I saw from other big publications are wrong, but they do reflect why it was hard to summarize this story in a headline, and different headlines reflect what different publications’ thought was most important and notable about it. If you want a full breakdown you should read Jason’s story, but the gist is that a judge ruled that it’s okay for companies to use copyrighted books for their training data, but it’s not okay for them to get these books by pirating them, which many of them did. That’s the simplest way I can think of to sum it up and that’s what our headline says, but there are still many levels of complexity to the story that no headline could fully capture. 

ICE Is Using a New Facial Recognition App to Identify People, Leaked Emails Show

ICE Is Using a New Facial Recognition App to Identify People, Leaked Emails Show

Immigration and Customs Enforcement (ICE) is using a new mobile phone app that can identify someone based on their fingerprints or face by simply pointing a smartphone camera at them, according to internal ICE emails viewed by 404 Media. The underlying system used for the facial recognition component of the app is ordinarily used when people enter or exit the U.S. Now, that system is being used inside the U.S. by ICE to identify people in the field. 

The news highlights the Trump administration’s growing use of sophisticated technology for its mass deportation efforts and ICE’s enforcement of its arrest quotas. The document also shows how biometric systems built for one reason can be repurposed for another, a constant fear and critique from civil liberties proponents of facial recognition tools.

“Face recognition technology is notoriously unreliable, frequently generating false matches and resulting in a number of known wrongful arrests across the country. Immigration agents relying on this technology to try to identify people on the street is a recipe for disaster. Congress has never authorized DHS to use face recognition technology in this way, and the agency should shut this dangerous experiment down,” Nathan Freed Wessler, deputy director of the American Civil Liberties Union’s Speech, Privacy, and Technology Project, told 404 Media in an email.

💡
Do you know anything else about this app? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

“The Mobile Fortify App empowers users with real-time biometric identity verification capabilities utilizing contactless fingerprints and facial images captured by the camera on an ICE issued cell phone without a secondary collection device,” one of the emails, which was sent to all Enforcement and Removal Operations (ERO) personnel and seen by 404 Media, reads. ERO is the section of ICE specifically focused on deporting people.

Airline-Owned Data Broker Selling Your Flight Info to DHS Finally Registers as a Data Broker

Airline-Owned Data Broker Selling Your Flight Info to DHS Finally Registers as a Data Broker

The Airlines Reporting Corporation (ARC), a data broker owned by the country’s major airlines which sells travellers’ detailed flight records in bulk to the government, only just registered as a data broker with the state of California, which is a legal requirement, despite selling such data for years, according to records maintained by the California Privacy Protection Agency (CPPA).

The news comes after 404 Media recently reported that ARC included a clause in its contract barring Customs and Border Protection (CBP), one of its many government customers, from revealing where the data came from. ARC is owned by airlines including Delta, American Airlines, and United. 

“It sure looks like ARC has been in violation of California’s data broker law—it’s been selling airline customers’ data for years without registering,” Senator Ron Wyden told 404 Media in a statement. “I don’t have much faith the Trump administration is going to step up and protect Americans’ privacy from the airlines’ greedy decision to sell flight information to anyone with a credit card, so states like California and Oregon are our last line of defense.” 

Flock Removes States From National Lookup Tool After ICE and Abortion Searches Revealed

Flock Removes States From National Lookup Tool After ICE and Abortion Searches Revealed

Flock, the automatic license plate reader (ALPR) company with a presence in thousands of communities across the U.S., has stopped agencies across the country from searching cameras inside Illinois, California, and Virginia, 404 Media has learned. The dramatic moves come after 404 Media revealed local police departments were repeatedly performing lookups around the country on behalf of ICE, a Texas officer searched cameras nationwide for a woman who self-administered an abortion, and lawmakers recently signed a new law in Virginia. Ordinarily Flock allows agencies to opt into a national lookup database, where agencies in one state can access data collected in another, as long as they also share their own data. This practice violates multiple state laws which bar the sharing of ALPR data out of state or it being accessed for immigration or healthcare purposes.

The changes also come after a wave of similar coverage in local and state-focused media outlets, with many replicating our reporting to learn more about what agencies are accessing Flock cameras in their communities and for what purpose. The Illinois Secretary of State is investigating whether Illinois police departments broke the law by sharing data with outside agencies for immigration or abortion related reasons. Some police departments have also shut down the data access after learning it was being used for immigration purposes.

Podcast: This Site Unmasks Cops With Facial Recognition

Podcast: This Site Unmasks Cops With Facial Recognition

We start this week with Emanuel and Joseph’s coverage of ‘⁠FuckLAPD.com⁠’, a website that uses facial recognition to instantly reveal a LAPD officer’s name and salary. The creator has relaunched their similar tool for identifying ICE employees too. After the break, Jason tells us about a massive AI ruling that opens the way for AI companies to scrape everyone’s art. In the subscribers-only section, our regular contributor Matthew describes all the AI slop in the Iran and Israel conflict, and why it matters.

Listen to the weekly podcast on Apple Podcasts, Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.

Behind the Blog: The Omnipresence Is the Point

Behind the Blog: The Omnipresence Is the Point

This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss Deadheads and doxxing sites.

SAM: Anyone reading the site closely this week likely noticed a new name entering the chat. We’re thrilled to welcome Rosie Thomas to the gang for the summer as an editorial intern! 

Rosie was previously a software engineer in the personal finance space. Currently halfway through her master’s degree in journalism, Rosie is interested in social movements, how people change their behaviors in the face of new technologies, and “the infinite factors that influence sentiment and opinions,” in her words. In her program, she’s expanding her skills in investigations, audio production, and field recording. She published her first blog with us on day two, a really interesting (and in 404 style, informatively disturbing) breakdown of a new report that found tens of thousands of camera feeds exposed to the dark web. We’re so excited to see what she does with us this summer! 

Podcast: Airlines Sold Your Flight Data to DHS—And Covered It Up

Podcast: Airlines Sold Your Flight Data to DHS—And Covered It Up

This week we start with Joseph’s article about the U.S’s major airlines selling customers’ flight information to Customs and Border Protection and then telling the agency to not reveal where the data came from. After the break, Emanuel tells us how AI scraping bots are breaking open libraries, archives, and museums. In the subscribers-only section, Jason explains the casual surveillance relationship between ICE and local cops, according to emails he got.

Listen to the weekly podcast on Apple Podcasts, Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.

California Cops Investigate ‘Immigration Protest’ With AI-Camera System

📄
This article was primarily reported using public records requests. We are making it available to all readers as a public service. FOIA reporting can be expensive, please consider subscribing to 404 Media to support this work. Or send us a one time donation via our tip jar here.
California Cops Investigate ‘Immigration Protest’ With AI-Camera System

A California police department searched AI-enabled, automatic license plate reader (ALPR) cameras in relation to an “immigration protest,” according to internal police data obtained by 404 Media. The data also shows that police departments and sheriff offices around the country have repeatedly tapped into the cameras inside California, made by a company called Flock, on behalf of Immigration and Customs Enforcement (ICE), digitally reaching into the sanctuary state in a data sharing practice that experts say is illegal. 

Flock allows participating agencies to search not only cameras in their jurisdiction or state, but nationwide, meaning that local police that may work directly with ICE on immigration enforcement are able to search cameras inside California or other states. But this data sharing is only possible because California agencies have opted-in to sharing it with agencies in other states, making them legally responsible for the data sharing. 

The news raises questions about whether California agencies are enforcing the law on their own data sharing practices, threatens to undermine the state’s perception as a sanctuary state, and highlights the sort of surveillance or investigative tools law enforcement may deploy at immigration related protests. Over the weekend, millions of people attended No Kings protests across the U.S. 404 Media’s findings come after we revealed police were searching cameras in Illinois on behalf of ICE, and then Cal Matters found local law enforcement agencies in California were searching cameras for ICE too.

The People Search Sites in the Suspected Minnesota Killer's Notebook Are a Failure of Congress

The People Search Sites in the Suspected Minnesota Killer's Notebook Are a Failure of Congress

On Monday, federal and state authorities charged Vance Boelter with the murders of Minnesota Rep. Melissa Hortman and her husband. An affidavit written by an FBI Special Agent, published here by MSNBC, includes photos of a notepad found in Boelter’s SUV which included a long list of people search sites, some of which make it very easy for essentially anyone to find the address and other personal information of someone else in the U.S. The SUV contained other notebooks and some pages included the names of more than 45 Minnesota state and federal public officials, including Hortman, the affidavit says. Hortman’s home address was listed next to her name, it adds.

People search sites can present a risk to citizen’s privacy, and, depending on the context, physical safety. They aggregate data from property records, social media, marriage licenses, and other places and make it accessible to even those with no tech savvy. Some are free, some are paid, and some require a user to tick a box confirming they’re only using the data for certain permitted use cases. 

Congress has known about the risk of data for decades. In 1994 lawmakers created the Driver’s Privacy Protection Act (DPPA) after a stalker hired a private investigator who then obtained the address of actress Rebecca Schaeffer from a DMV. The stalker then murdered Schaeffer. With people search sites, though, lawmakers have been largely motionless, despite them existing for years, on the open web, accessible by a Google search and sometimes even promoted with Google advertisements.

Senator Ron Wyden said in a statement “The accused Minneapolis assassin allegedly used data brokers as a key part of his plot to track down and murder Democratic lawmakers. Congress doesn't need any more proof that people are being killed based on data for sale to anyone with a credit card. Every single American's safety is at risk until Congress cracks down on this sleazy industry.”

This notepad does not necessarily mean that Boelter used these specific sites to find Hortman’s or other officials’ addresses. As the New York Times noted, Hortman’s address was on her campaign website, and Minnesota State Senator John Hoffman, who Boelter allegedly shot along with Hoffman’s wife, listed his address on his official legislative webpage.

The sites’ inclusion shows they are of high interest to a person who allegedly murdered and targeted multiple officials and their families in an act of political violence. Next to some of the people search site names, Boelter appears to have put a star or tick.

Those people search sites are:

A spokesperson for Atlas, a company that is suing a variety of people search sites, said “Tragedies like this might be prevented if data brokers simply complied with state and federal privacy laws. Our company has been in court for more than 15 months litigating against each of the eleven data brokers identified in the alleged shooter’s writings, seeking to hold them accountable for refusing to comply with New Jersey’s Daniel’s Law which seeks to protect the home addresses of judges, prosecutors, law enforcement and their families. This industry’s purposeful refusal to comply with privacy laws has and continues to endanger thousands of public servants and their families.” 

404 Media has repeatedly reported on how data can be weaponized against people. We found violent criminals and hackers were able to dox nearly anyone in the U.S. for $15, using bots that were based on data people had given as part of opening credit cards. In 2023 Verizon gave sensitive information, including an address on file, of one of its customers to her stalker, who then drove to the address armed with a knife.

404 Media was able to contact most of the people search sites for comment. None responded.

Update: this piece has been updated to include a statement from Atlas. An earlier version of this piece accidentally published a version with a different structure; this correct version includes more information about the DPPA.

I Tried Pre-Ordering the Trump Phone. The Page Failed and It Charged My Credit Card the Wrong Amount

I Tried Pre-Ordering the Trump Phone. The Page Failed and It Charged My Credit Card the Wrong Amount

On Monday the Trump Organization announced its own mobile service plan and the “​​T1 Phone,” a customized all-gold mobile phone that its creators say will be made in America. 

I tried to pre-order the phone and pay the $100 downpayment, hoping to test the phone to see what apps come pre-installed, how secure it really is, and what components it includes when it comes out. The website failed, went to an error page, and then charged my credit card the wrong amount of $64.70. I received a confirmation email saying I’ll receive a confirmation when my order has been shipped, but I haven’t provided a shipping address or paid the full $499 price tag. It is the worst experience I’ve ever faced buying a consumer electronic product and I have no idea whether or how I’ll receive the phone.

“Trump Mobile is going to change the game, we’re building on the movement to put America first, and we will deliver the highest levels of quality and service. Our company is based right here in the United States because we know it’s what our customers want and deserve,” Donald Trump Jr., EVP of the Trump Organization, and obviously one of President Trump’s sons, said in a press release announcing Trump Mobile

Behind the Blog: Advertising and Aircraft

Behind the Blog: Advertising and Aircraft

This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss advertising, protests, and aircraft.

EMANUEL: On Thursday Meta announced that it has filed a lawsuit in Hong Kong against Joy Timeline HK Limited, the company that operates a popular nudify app called Crush that we have covered previously

Meta’s position is that it hasn’t been able to prevent Crush from advertising its nudify app on its platform despite it violating its policies because Crush is “highly adversarial” and “constantly evolving their tactics to avoid enforcement.” We’ve seen Crush and other nudify apps create hundreds of Meta advertising accounts and different domain names that all link back to the same service in order to avoid detection. If Meta bans an advertising account or URL, Crush simply creates another. In theory, Meta always has ways of detecting if an ad contains nudity, but nudify apps can easily circumvent those measures as well. As I say in my post about the lawsuit, Meta still hasn’t explained why it appears to have different standards for content in ads versus regular posts on its platform, but there’s no doubt that it does take action against nudify ads when it’s easy for it do so, and that these nudify ads are actively trying to avoid Meta’s moderation when it does attempt to get rid of them. 

❌