Upstream feed stability remains CrimeRadar's top operational risk [developing]
Key Questions
How many arrests did ICE make using TSA data?
ICE made more than 800 arrests using TSA-provided travel data on 31,000 travelers, according to newly reviewed federal records. This reveals a significant program shift in TSA-ICE data sharing.
What controversy surrounds TSA sharing passenger data with ICE?
The data sharing has triggered opposition due to privacy concerns, exemplified by the deportation of a Guatemalan mother and daughter detained before boarding a flight. It raises questions about the scope and intent of cooperation between the agencies.
Which other government agencies are sharing data in related cases?
Data sharing involves DOJ with DHS on voter data, WA DOL with CBP in an apparent violation, and HHS with ICE. ICE also uses warrantless tools, escalating oversight issues.
How are municipalities responding to surveillance technologies like Flock and CBP towers?
Many municipalities, including Dunwoody, Las Cruces, Illinois, South Pasadena, Seattle, Kentwood, Dutchtown, San Jose, Modesto, Denver, and Oro Valley, have paused implementations. Others like Stockton, SFPD, and LVMPD continue, amid pushes like RI H8077 and WA Act for oversight.
What operational risks does this pose to CrimeRadar?
Upstream feed stability is the top risk due to heightened gaps and terms of service (TOS) risks from these data sharing escalations. Mitigations include improving data provenance and user experience (UX).
ICE arrest surge via TSA data-sharing (800+ arrests/31k travelers 1AGjOa7j/1AGjv0qz; IRS/CMS) escalates TSA-ICE (ex-4b993540/SFO 1ABVQVUR/CA 1A5HSmsZ); DOJ voter data w/DHS (1A9vt5RI); WA DOL-CBP violation (1A9Skzix); HHS-ICE (1A8rYiY6); ICE warrantless tools (ex-58c84007); oversight poll (1A40ye8m); WA Act (1A3WiZtf); CBP towers (1ABccw0T); RI H8077 Flock (1ADm9dJW); municipal pauses (Dunwoody/Las Cruces/Illinois/South Pasadena/Seattle/Kentwood/Dutchtown/San Jose/Modesto/Denver/Oro Valley) vs counters (Stockton/SFPD/LVMPD). Heightens gaps/TOS risks. Mitigations: provenance, UX.