ICE Aims to Establish a Covert Deportation Network in Texas

US Immigration Agency Proposes Privately-Managed Statewide Transportation System for Detained Immigrants in Texas

The US Immigration and Customs Enforcement (ICE) is considering the establishment of a privately-operated statewide transportation network in Texas designed to facilitate the movement of immigrants detained across its 254 counties into various ICE facilities. This plan aims to create an uninterrupted transit system for quick and efficient transfers of detainees.

According to early planning documents reviewed, this proposed infrastructure is intended to streamline the transportation of immigrants, with ICE estimating each journey will average around 100 miles. Each Texas county would be assigned a small team of contractors who would operate around the clock, gathering detainees from local enforcement agencies that have been authorized by ICE. Such a system represents a transfer of physical custody from federal agencies to private security firms. These contractors would be legally permitted to carry weapons and execute transport duties at a variety of locations, including local, county, state, and ICE facilities.

The emergence of this plan coincides with a reinforced strategy by the Trump administration to expand immigration enforcement measures within the United States. Over the last year, the Department of Homeland Security, which oversees ICE, has invested billions into detention contracts, revived collaborative agreements with local law enforcement, and instructed ICE to escalate deportation efforts. The planned transportation grid is designed to enhance logistic capabilities, allowing for rapid movement of detainees while minimizing the presence of federal agents in public spaces.

Recently, ICE released a market inquiry titled “Transportation Support for Texas,” detailing its operational requirements. The document outlines necessary staffing levels, vehicle readiness, and mandated response times, while also soliciting vendor proposals concerning pricing structures and operational coverage.

The proposed model includes the establishment of 254 transport hubs throughout Texas, with each hub staffed by two armed contractor personnel. The vehicles involved are expected to respond to requests within 30 minutes and maintain an 80-percent readiness rate across three shifts each day. ICE’s model incorporates a 50-percent buffer in staffing to accommodate employee turnover and time off, effectively indicating that the agency will require significantly more personnel than the baseline needed for steady operations.

Estimates suggest that ICE may need over 2,000 full-time employees along with a fleet of hundreds of SUVs to support this initiative, ensuring that transportation logistics can be effectively managed at all hours of the day and night.

This initiative represents a logistical network that operates closely with local police departments under the 287(g) program, which allows for collaboration with local law enforcement agencies. Initially designed as symbolic cooperative efforts, these agreements have evolved into mechanisms for conducting real-time biometric evaluations and notifications about arrests. The transportation of detainees is now being viewed as the next logical phase in this process, promising to form a closed-loop system where local authorities apprehend immigrants while private contractors handle transportation to either local jails or privately-operated detention centers.

The implications of this strategy raise potential concerns about cybersecurity. The integration of local authorities with a newly formed transportation network creates risks for data breaches and privacy infringements, particularly around the handling of biometric data. Understanding potential threats through the MITRE ATT&CK framework reveals tactics such as initial access, privilege escalation, and lateral movement may be pertinent in evaluating the vulnerabilities associated with this plan. Business owners are encouraged to consider the cybersecurity implications of such developments within immigration enforcement frameworks, ensuring that data integrity and confidentiality remain at the forefront of operational strategies.

Source