We don’t rely on rumors. We verify everything. When it comes to identifying ICE agents, we treat every single piece of information like it could be used in court. Because one day, it might be, and if we have our way, it will.

Everything starts with an email, message, or mention. Sometimes it’s a message from someone on the ground. Sometimes it’s a short video posted online. Tips come in through our public submission form. We collect footage. License plates. Faces. Names. Unit patches. Every detail helps, but no detail is published without cross-checking.

No single clue ever stands alone. We begin by logging every tip into our internal system, tagging location, time, and content type. Then, we move to verification.

We aren’t doing this alone. Some of our best information has come from individuals acting on their own. Lone wolves, concerned citizens, people who have nothing to do with us but still send in crucial footage or photos. We don’t ask who they are, we don’t need to, we just need to verify what they send our way.

Then there are the leakers, brave individuals within the system who risk everything to expose it. We protect their identities at all costs, and we cross-check their leads like we would any other source. We thank them for the risks they are willing to take for the project we’ve taken on, and without them, we wouldn’t be making the progress we have made so far.

We also collaborate with several partner organizations, StopICE.net, ICE Spy, and other who would rather us not reveal the cooperation at this point. Their work and data are invaluable.

An AI research team works with us, too. They’ve developed tools that identify agents who haven’t covered their faces or changed gear. They help spot patterns in behavior, movement, and appearance that humans might miss. Their work is technical, but the results speak for themselves.

We verify agents using a layered system of confirmation: visual identification, behavioral matching, database records, and independent corroboration. Nothing makes it to the public without at least two solid confirmations. Three is preferred. It’s not just about accuracy. It’s about protection. For us, and for the truth.

Sometimes it starts with a video. An agent stepping out of an unmarked vehicle. We analyze the footage frame by frame. We look for identifiers: uniforms, badges, weapons, body language. We compare with previously known agents. If there’s a partial name badge visible, we use it. If a license plate shows up, we track it using publicly accessible databases and open-source tools.

Facial recognition helps, but it’s only one piece of the puzzle. Our volunteers are trained to spot recurring traits. We use side-by-side comparisons with verified past footage. We analyze background noise, street signs, timestamps, anything that helps establish context.

Each confirmed ID goes through a second process. We document everything: date, time, location, appearance, clothing, gear, vehicle, any interaction with the public, and any verbal identification made. Then we check again. Double confirmation is our standard. Triple confirmation is our preference.

We create individual agent profiles. These include all confirmed appearances, timestamps, and geographic movement. We track where agents have been deployed and what events they’ve been linked to. If a raid happened in Texas and that same agent appears at a courthouse in New York a month later, we note it.

We work with volunteers who specialize in facial recognition. We maintain a private archive of footage. We use satellite imagery and street view tools to confirm raid locations. We log field offices, staging areas, known facilities, and temporary hubs. We document repeat appearances and trace patterns of movement. Our goal isn’t just to identify one agent. It’s to identify networks. Patterns. Roles.

We have trackers for license plates, uniform details, equipment loadouts, and agency cross-over. We tag which agents are operating alongside contractors or local police. The more data we gather, the clearer the operational structure becomes.

We also track uncertainty. Our database includes categories for unconfirmed agents, unknown footage, and unidentified officers. Just because we don’t know who someone is yet doesn’t mean we won’t. Those profiles are tagged, revisited, and matched when new data comes in. Nothing is ever deleted. We revisit footage months later with new eyes, new tools, and sometimes new testimonies.

This part of the work is slow. But it’s vital. It stops innocent people from being falsely accused, and it protects the integrity of everything else we publish.

Sometimes we get lucky. A name tag, a leaked document, an internal memo. But we never publish unconfirmed names. If someone is listed on the ICE List, we are confident they were there. Not just probably. Confirmed. Seen. Recorded. Documented.

We include photographs, context, and a breakdown of how the ID was confirmed. We also timestamp the moment of release and any changes made later if further evidence strengthens the identification. Every profile is reviewed by at least two people before going live.

We’re not in the business of accusations. We’re in the business of evidence. This isn’t a witch hunt. It’s accountability. And everything we post reflects that.

If you’re wondering how we can be so sure, it’s because we’ve done the work. The real work. The quiet, slow, careful work of documenting a system that has relied for too long on anonymity. That time is over.

And we’re just getting started.