Immigration enforcement agents across the US are increasingly relying on a new smartphone app with facial recognition technology.

The app is named #Mobile #Fortify.
Simply pointing a phone’s camera at their intended target and scanning the person’s face
allows Mobile Fortify to pull data on an individual from multiple federal and state databases,
some of which federal courts have deemed too inaccurate for arrest warrants.

The US Department of Homeland Security has used Mobile Fortify to scan faces and fingerprints in the field more than 100,000 times,
according to a lawsuit brought by Illinois and Chicago against the federal agency, earlier this month.
That’s a drastic shift from immigration enforcement’s earlier use of facial recognition technology,
which was otherwise limited largely to investigations and ports of entry and exit, legal experts say.

The app’s existence was first uncovered last summer by 404 Media, through leaked emails.
404 Media also reported, in October, about internal DHS documents that say people cannot refuse to be scanned by Mobile Fortify.

“Here we have ICE using this technology in exactly the confluence of conditions that lead to the highest false match rates,”
says Nathan Freed Wessler,
deputy director of the ACLU’s speech, privacy and technology project.
“A false result from this technology can turn somebody’s life totally upside down.”
The larger implications for democracy are chilling, too, he notes:
“ICE is effectively trying to create a biometric checkpoint society.”

Use of the app has inspired backlash on the streets, in courts, and on Capitol Hill.

According to 404 Media, the app’s database consists of some 200m images. “

Mobile Fortify has not been blocked, restricted, or curtailed by the courts or by legal guidance.

It is lawfully used nationwide in accordance with all applicable legal authorities.”

Observers, experts, and at least one congressman have said
federal immigration agents frequently do not ask for consent to scan a person’s face
– and may dismiss other documentation that contradicts this data.

ICE has been documented using biometrics as a definitive determination of someone’s citizenship in the absence of identification.
https://www.theguardian.com/technology/2026/jan/27/ice-facial-recognition-minnesota?CMP=Share_iOSApp_Other

How ICE is using facial recognition in Minnesota

Mobile Fortify tech being used to scan faces of citizens and immigrants – but its use has prompted a severe backlash

The Guardian

In practical terms, smartphones generate at least three kinds of digital exposure.

The first is identification risk,
including through facial recognition technology.

When you post footage, you may be sharing identifiable faces, tattoos, voices, license plates, school logos or even a distinctive jacket.

That can enable law enforcement to identify people in your recordings through investigative tools,
and online crowds to identify people and dox or harass them, or both.

That risk grows when agencies deploy facial recognition in the field.

For example, ICE is using a facial recognition app called #Mobile #Fortify.

Facial recognition accuracy also isn’t neutral.

National Institute of Standards and Technology testing has documented that the technology does not perform equally across different demographic groups,
meaning the risk of misidentification is not evenly distributed across groups.

For example, studies have shown lower recognition accuracy for people with darker skin color.

Second is the risk of revealing your location.

Footage isn’t just images. Photos and video files often contain #metadata such as timestamps and locations,
and platforms also maintain additional logs.

Even if you never post, your phone still emits a steady stream of location signals.

This matters because agencies can obtain location through multiple channels, often with different levels of oversight.

Agencies can request location or other data from companies through warrants or court orders,
including geofence warrants that sweep up data about every device in a place during a set time window.

Agencies can also buy location data from brokers.

The Federal Trade Commission has penalized firms for unlawfully selling sensitive location information.

There are more pathways for tracking than most people realize,
and not all are constrained by the courtroom rules people picture when they think “warrant.”

The third type of potential exposure is the risk of having your phone seized.

If police seize your phone, temporarily or for evidence,
your exposure isn’t just the video you shot.

It can include your contacts and message history,
your photo roll,
location history
and cloud accounts synced to the device.

Civil liberties groups that publish protest safety guidance consistently recommend
disabling the face and fingerprint unlocking features
and using a strong passcode.

Law enforcement officials can compel you to use biometrics more easily in some contexts than reveal memorized secrets.

#fortify : to strengthen and secure by forts or batteries, or by surrounding with a wall or ditch or other military works

- French: fortifier

- German: befestigt

- Italian: fortificare

- Portuguese: fortificar

- Spanish: fortalece

------------

Try our new word guessing game @ https://24hippos.com

24 Hippos : Word Guessing Game

24 Hippos is an hourly word guessing game that is powered by Word of The Hour (WoTH).

#fortify : to strengthen and secure by forts or batteries, or by surrounding with a wall or ditch or other military works

- French: fortifier

- German: befestigt

- Italian: fortificare

- Portuguese: fortificar

- Spanish: fortalece

------------

Word of The Hour's Annual Survey @ https://wordofthehour.org/r/form

Word of The Hour - Annual Survey (2025)

Your responses to the questions below will directly impact the future of Word of The Hour. Your support and kindness has really meant a lot over the past three years. Thank you so much! Michael Wehar https://wordofthehour.org [email protected]

Google Docs

As organizations race to fortify their digital infrastructures, many are turning to extreme surveillance technologies to monitor employees and prevent cyber threats. But beneath this trend lies a deeper, psychological conflict: Does increased cybersecurity monitoring create safer...

https://medium.com/readers-club/surveillance-vs-psychological-safety-is-cybersecurity-compromising-mental-health-fc9c41d21832

#readersclub #organizations #fortify #digital #turning #extreme

Surveillance vs. Psychological Safety: Is Cybersecurity Compromising Mental Health?

As organizations race to fortify their digital infrastructures, many are turning to extreme surveillance technologies to monitor employees and prevent cyber threats. But beneath this trend lies a…

Readers Club
#4 👥 Leverage built-in authentication with #Breeze, #Fortify or #Jetstream
🗝️ Store passwords securely using #Bcrypt or #Argon2 hashing algorithms
🔑 Secure environment variables and force #HTTPS in production environments

#fortify : to strengthen and secure by forts or batteries, or by surrounding with a wall or ditch or other military works

- French: fortifier

- German: befestigt

- Italian: fortificare

- Portuguese: fortificar

- Spanish: fortalece

------------

Word of The Hour's Annual Survey @ https://wordofthehour.org/r/form

Word of The Hour - Annual Survey (2025)

Your responses to the questions below will directly impact the future of Word of The Hour. Your support and kindness has really meant a lot over the past three years. Thank you so much! Michael Wehar https://wordofthehour.org [email protected]

Google Docs

As organizations race to fortify their digital infrastructures, many are turning to extreme surveillance technologies to monitor employees and prevent cyber threats. But beneath this trend lies a deeper, psychological conflict: Does increased cybersecurity monitoring create safer...

https://medium.com/readers-club/surveillance-vs-psychological-safety-is-cybersecurity-compromising-mental-health-fc9c41d21832

#readersclub #organizations #fortify #digital #turning #extreme

Surveillance vs. Psychological Safety: Is Cybersecurity Compromising Mental Health?

As organizations race to fortify their digital infrastructures, many are turning to extreme surveillance technologies to monitor employees and prevent cyber threats. But beneath this trend lies a…

Readers Club

#Lithuania is set to upgrade and #fortify a second route through the #Suwałki Gap — a crucial choke point along the border with #Poland that's seen as one of likeliest areas for any future #russian #attack on the #EU and #NATO.

https://www.politico.eu/article/lithuania-aims-to-deter-russia-by-upgrading-critical-road-and-anti-border-defenses/

Lithuania aims to deter Russia by upgrading ‘critical’ road and anti-border defenses

The project aims to make it easier to move troops and equipment between Poland and the Baltic countries.

POLITICO

@linuxuserspace

Pretty late, but comment to the #Snap and #Flatpak episodes:

My Flatpaks take up 30GB of space, after deduplication. A ton of outdated runtimes (badly maintained packages) and random stuff like #mpv or #ffmpeg shipped with apps instead of as a runtime extension are issues.

And no, you dont need to have an entire #distribution for #sandboxing. You can use #bubblejail and other new tools like #crabjail or #fortify.

For Flatpak and Snap, cross compatibility is 1st priority

1/2