How We Identify Individuals

Contents

We do not publish names lightly. Every individual listed in the ICE List has been included based on a documented connection to immigration enforcement or detention infrastructure. Our process is careful, source-driven, and transparent.

Where the Names Come From

We use a wide range of public sources to confirm identities:

  • FOIA responses
  • Government employment databases
  • Court filings and case documents
  • News investigations
  • Agency directories and public rosters
  • LinkedIn profiles, press releases, and job postings
  • Photos, videos, and eyewitness accounts

We cross-reference these sources before listing someone. One source is rarely enough. We look for patterns, corroboration, and connection to specific actions.

What Counts as a Public Role

We publish information only on individuals acting in a public, contracted, or institutional capacity. This includes:

  • ICE agents and officers
  • Detention center guards and supervisors
  • Deportation officers and field directors
  • ICE-aligned attorneys
  • Private contractors hired to detain, surveil, or transport immigrants

We do not publish:

  • Home addresses
  • Personal phone numbers
  • Family members
  • Individuals whose connection to enforcement can’t be verified

How We Label Entries

  • Confirmed — Multiple trusted sources, clear role and action
  • Alleged — Limited sourcing or in-progress verification
  • Under Review — Awaiting confirmation but flagged for relevance

All entries are subject to dispute and correction. We welcome feedback from the public, especially if someone is misidentified or wrongly included.

Facial Recognition

In some cases, facial recognition is used to confirm identity — not to uncover it. We only use this tool when matching against publicly available photos of agents, court appearances, or media coverage. We never run recognition against photos of migrants or private citizens.

Why This Matters

This list is not about shame. It is about accountability. When someone chooses to enforce violent policy, their name becomes part of the public record. The system protects anonymity. We don’t.

If you want to challenge an entry, visit the Takedown & Correction page.