6 Comments
User's avatar
Anthony Christian's avatar

Great Job man

Expand full comment
Robert J. Rei's avatar

Thank you.

Expand full comment
EuphmanKB's avatar

Congratulations!

This is one of the best, if not the finest, articles you have written, Robert.

This thesis needs to be expanded to show details and graphics about how it works and who is operating the various elements of the system. Videos would be helpful.

Expand full comment
Robert J. Rei's avatar

That information is already contained within the next essay to be published either late tonight or sometime during the afternoon tomorrow.

For now here is a preview for you my friend.

In the age of digital government, a person’s life is translated into a mosaic of data points. Modern enforcement does not begin with suspicion on a street; it begins with a search query in a federal database.

How the “Disappeared” Are Being Selected

The current deportation and detention network operates through a fusion of federal and contractor-run data systems. Palantir Technologies, long embedded within ICE and DHS, provides the digital backbone for identifying and tracking non-citizens.

Integrated systems: Palantir’s Investigative Case Management (ICM) and FALCON programs combine records from DMVs, court systems, social-service registries, and open-source intelligence. These systems link individuals through relational inference—addresses, family ties, employment history, school enrollment, even social-media metadata.

Targeting: ICE’s Targeting Operations Division uses these integrated datasets to generate priority lists scored by criteria such as visa expiration, prior contact with law enforcement, and proximity to known ICE operations.

Private-sector feeIId: Contractors such as LexisNexis Risk Solutions supply address and phone data in real time. When migrants use CBP Home or related portals, their self-reported data are ingested into this ecosystem, confirming location and family composition.

Result: The “failure” of the app to follow through may not be failure at all; it may serve as a collection mechanism—a digital census of the undocumented population that can be weaponized by enforcement teams. When agents arrive at a door, they already know who lives there because the residents told them.

The system is triaging by data confidence, not moral criteria. Those who volunteer information become the lowest-risk enforcement targets: confirmed, trackable, and legally vulnerable.

Expand full comment
Robot Bender's avatar

Powerful.

Expand full comment
Jstn Green's avatar

Jst started reading your stuff. Seems like this is a series.

Perhaps you should be adding links to previous posts on the topic, so people can read them in order? Jst a thought. Thanks.

Expand full comment