this post was submitted on 03 Feb 2026
19 points (95.2% liked)

A Boring Dystopia

15320 readers
1037 users here now

Pictures, Videos, Articles showing just how boring it is to live in a dystopic society, or with signs of a dystopic society.

Rules (Subject to Change)

--Be a Decent Human Being

--Posting news articles: include the source name and exact title from article in your post title

--If a picture is just a screenshot of an article, link the article

--If a video's content isn't clear from title, write a short summary so people know what it's about.

--Posts must have something to do with the topic

--Zero tolerance for Racism/Sexism/Ableism/etc.

--No NSFW content

--Abide by the rules of lemmy.world

founded 2 years ago
MODERATORS
 

cross-posted from: https://lemmy.4d2.org/post/2705362

Hi everyone,

Share what you know about how ICE identifies and tracks people - MIDM (Man in the middle attacks) to intercept cell traffic, scraping social media, etc.

Also other surveillance stuff they use.

It would be nice if everyone shares what they know with each other so we can build a larger knowledge base :)

top 5 comments
sorted by: hot top controversial new old
[–] False@lemmy.world 4 points 17 hours ago

Judging by their operations, they track them very poorly

[–] crimes_of_ICE@lemmy.4d2.org 9 points 1 day ago (1 children)

Ring doorbell cameras announced a partnership with Flock, which in turn has already been sharing information with ICE.

“Law enforcement agencies using Flock software can now issue Ring footage requests specifying location, timeframe, and case details, a move first reported by TechCrunch.”

https://hrnews1.substack.com/p/ring-cameras-join-flock-and-amazon

[–] jeffw@lemmy.world 3 points 1 day ago (1 children)

To clarify, your article specifies that Ring only shares footage with explicit consent. Don’t share your footage publicly online, people

[–] crimes_of_ICE@lemmy.4d2.org 2 points 15 hours ago* (last edited 15 hours ago)

According to Ring's policy, they state that they ask for user's permission to get the footage. However, as the article mentions (but fails to provide the source actually) the Ring cameras have provided footage to law enforcement without a warrant or user's consent 11 times in 2022. Therefore while on paper, they are supposed to ask the user, there were already times when this was completely ignored, and could mean that the same could happen in the future.

The Intercept article about it (source that this article failed to include):

https://theintercept.com/2022/07/13/amazon-ring-camera-footage-police-ed-markey/

'Although Ring publicizes its policy of handing over camera footage only if the owner agrees — or if judge signs a search warrant — the company says it also reserves the right to supply police with footage in “emergencies,” defined broadly as “cases involving imminent danger of death or serious physical injury to any person.” Markey had also asked Amazon to clarify what exactly constitutes such an “emergency situation,” and how many times audiovisual surveillance data has been provided under such circumstances. Amazon declined to elaborate on how it defines these emergencies beyond “imminent danger of death or serious physical injury,” stating only that “Ring makes a good-faith determination whether the request meets the well-known standard.” Huseman [Amazon’s vice president of public policy] noted that it has complied with 11 emergency requests this year alone but did not provide details as to what the cases or Ring’s “good-faith determination” entailed.'

Also there is a NY Times article about it:

https://www.nytimes.com/2024/01/28/business/amazon-ring-doorbell-camera-police.html

"In the letter, Amazon’s vice president of public policy, Brian Huseman, also said that Amazon had shared Ring footage with law enforcement 11 times in 2022 using a process that does not require the user’s consent."

[–] rowinxavier@lemmy.world 4 points 1 day ago

To expand on this a little, there are tonnes of options for spying on people but the key is tying your face to your identity. If you have a phone with you at a protest and they capture your IMSI (unique identifier for that handset) they can place you at the scene. They then only have to narrow down a little which face is tied to that phone and they know who you are. If they have a way of making a large database of faces and names, for example requiring ID and facial scans to access porn, then they can make this process much more rapid. It's almost like there is some sort of overarching plan here, some sort of seizing of power through multiple fronts which are all connected and share interests, like how people who are all rich share the interest of further concentrating power in their own hands, just as an unrelated example.