Newsclip — Social News Discovery

Business

Surveillance Unleashed: How ICE Can Monitor Your Phone

January 10, 2026
  • #PrivacyRights
  • #Surveillance
  • #GlobalNews
  • #CyberSecurity
  • #IranProtests
  • #Extradition
11 views0 comments
Surveillance Unleashed: How ICE Can Monitor Your Phone

Understanding ICE's Expanding Surveillance Powers

In an unsettling development, the U.S. Immigration and Customs Enforcement (ICE) has acquired new tools capable of monitoring mobile devices across neighborhoods. Documents obtained by 404 Media reveal that these systems, known as Tangles and Webloc, allow agents to track phones in real-time, collecting vast amounts of location data that could paint an intimate portrait of an individual's daily life.

“This is a very dangerous tool in the hands of an out-of-control agency,” cautioned Nathan Freed Wessler from the ACLU. “This granular location information paints a detailed picture of who we are, where we go, and who we spend time with.”

Such capabilities, while aimed at enhancing law enforcement efficiency, raise ethical eyebrows. The implications for privacy rights are severe, especially in a nation increasingly leaning on technology for social control. What protections are in place, if any, against such invasive monitoring?

Iran's Internet Shutdown: A Suppression Strategy

Meanwhile, across the globe, the Iranian regime has again wielded its control over the internet in response to mass protests. These demonstrations, sparked initially by economic grievances, have faced an iron-fisted crackdown that includes shutting off internet access. According to reports, as of January 9, Iranians have been without connectivity for over 24 hours.

The impact of these internet shutdowns extends far beyond mere connectivity issues, severely disrupting daily life. Reports highlight that citizens struggle to use ATMs and bank cards, isolating them from essential services and communication with the outside world.

Background on Iran's Methodology

This is not an isolated incident; Iran has a history of using internet blackouts as a strategy to silence dissent. Previous shutdowns in 2019 and 2022 sought to contain protests and prevent the spread of footage exposing state violence.

A Major Extradition: Chen Zhi's Alleged Financial Crimes

In another notable story, Chen Zhi, accused of operating a $15 billion scam from Cambodia, has been extradited to China. This operation involved forced labor and numerous fraudulent schemes, drawing international scrutiny and intervention from U.S. and UK officials.

Seen being escorted onto a plane in Beijing, Chen's extradition highlights the ongoing global battle against fraud and organized crime. However, questions remain regarding the effectiveness of international cooperation in handling such high-profile cases, especially when scams like these are often transnational in nature.

Emerging Cyber Threats: The Case of Salt Typhoon

While ICE and other state agencies enhance surveillance capabilities, external threats continue to loom. Recent reports indicate that China's state-sponsored hackers, known as Salt Typhoon, compromised the email accounts of several U.S. congressional committee staffers. This intrusion forms part of a broader strategy to glean sensitive information from U.S. communication infrastructures.

This trend underscores the dual nature of security challenges we face today. As we fortify internal defenses, external threats remain persistent and evolving, further complicating the dynamics of global security.

Staying Informed: A Guide to Protecting Yourself

For ordinary users, especially those relying on platforms such as WhatsApp, a series of security tips can bolster privacy further. With pervasive surveillance and hacking incidents on the rise, citizens should not only be aware of their rights but also actively engage in securing their digital presence.

As we navigate this tumultuous landscape, remaining informed is paramount. With so many layers of privacy concerns impacting our everyday lives, we must advocate for robust protections while understanding the means to defend ourselves in this digital age.

Conclusion: A Time for Vigilance

In an era where technology serves both as a tool for empowerment and a mechanism for control, I urge heightened vigilance. The convergence of domestic surveillance measures and foreign cyber threats creates an unsettling landscape. Understanding our rights, the tools at play, and holding power accountable will be our collective responsibility.

As developments unfold globally, from ICE's new capabilities to the Iranian backlash against protestors, I invite readers to stay engaged, informed, and proactive. Let's not lose sight of the implications these challenges present to civil liberties and personal freedoms.

Key Facts

  • Agency Monitoring: U.S. Immigration and Customs Enforcement (ICE) has acquired tools to monitor mobile devices, tracking phones in real-time.
  • Surveillance Tools: The systems used by ICE are called Tangles and Webloc, capable of collecting extensive location data.
  • Privacy Concerns: Nathan Freed Wessler from the ACLU describes ICE's capabilities as dangerous, compromising individuals' privacy.
  • Internet Shutdown in Iran: Iran has implemented an internet blackout lasting over 24 hours in response to protests.
  • Protest Background: Previous internet shutdowns in Iran were used to suppress dissent and control information during protests.
  • Extradition Case: Chen Zhi, accused of running a $15 billion scam, has been extradited to China from Cambodia.
  • Cyber Threats: Chinese hackers known as Salt Typhoon have breached email accounts of U.S. congressional staffers.

Background

The article discusses surveillance capabilities of ICE, the implications for privacy, internet shutdowns in Iran during protests, and significant international crime developments, including allegations against Chen Zhi and cyber threats from state-sponsored hackers.

Quick Answers

What surveillance tools has ICE acquired?
ICE has acquired Tangles and Webloc to monitor mobile devices and track phones in real-time.
What are the privacy concerns regarding ICE's surveillance?
The ACLU's Nathan Freed Wessler warns that ICE's tools can compromise individual privacy by revealing detailed location data.
How long has Iran's internet been shut down amid protests?
Iran's internet shutdown has lasted over 24 hours due to ongoing mass protests.
Who is Chen Zhi and what is he accused of?
Chen Zhi is accused of operating a $15 billion scam involving forced labor and fraudulent schemes.
What cyber threats have been reported related to Chinese hackers?
Chinese hackers known as Salt Typhoon have compromised email accounts of several U.S. congressional staffers.
What historical events have led to internet shutdowns in Iran?
Iran has previously shut down the internet during protests in 2019 and 2022 to suppress dissent and control information.

Frequently Asked Questions

What impact do internet shutdowns have on Iranian citizens?

Internet shutdowns prevent access to social media, ATMs, and communication, isolating citizens from essential services.

Source reference: https://www.wired.com/story/security-news-this-week-ice-can-now-spy-on-every-phone-in-your-neighborhood/

Comments

Sign in to leave a comment

Sign In

Loading comments...

More from Business