

SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.


Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.

US Immigration and Customs Enforcement (ICE) agents work in a control center in Central Islip, New York on March 29, 2018.
One senior DHS official said the program "is just the first step in breaching people’s privacy settings in ways that they are not even aware of.”
US Department of Homeland Security agents are increasingly infiltrating social media platforms to monitor users, collect intelligence, and target people, according to new reporting based on leaked documents.
Ken Klippenstein exposed the open source monitoring program, which DHS calls "masked engagement," with new reporting Thursday that details how agents "assume false identities and interact with users—friending them, joining closed groups, and gaining access to otherwise private postings, photographs, friend lists, and more."
"A senior [DHS] official tells me that over 6,500 field agents and intelligence operatives can use the new tool, a significant increase explicitly linked to more intense monitoring of American citizens," Klippenstein wrote.
The so-called "masked engagement" by DHS operatives online comes as actual masked federal agents are engaged in the Trump administration's deadly deployments in communities nationwide.
Important to note that "Authorized" here means that DHS/ICE have given *Themselves* permission to do this "masked engagement" bullshit, not that either congress or the courts say it's okay.Challenge this everywhere & every way possible, & in the meantime, keep ourselves & each other safe as we can
[image or embed]
— Dr. Damien P. Williams can't think of a fun display name right n (@wolvendamien.bsky.social) February 12, 2026 at 4:46 PM
Masked engagement adds a new level to DHS' open source intelligence (OSINT) collection regime, which previously consisted of overt engagement, overt research, overt monitoring, masked monitoring, and undercover engagement. Masked engagement, in which agents conceal their government affiliation without assuming a false identity while interacting with a target, is a step below undercover engagement, in which DHS operatives use false identities and cover stories.
According to Klippenstein:
Masked monitoring allows officers at agencies like [Immigration and Customs Enforcement] and Border Patrol to use alias accounts to passively observe public online activity. Crucially, this level of monitoring bars DHS representatives from interacting with other users directly. Under masked monitoring, officers are not allowed to ask an admin for entry into a private group or to “friend” a target to see non-public posts.
But with masked engagement (separate from masked monitoring), that firewall has now been dismantled. The only restriction imposed on masked engagement is that DHS officers [note] the threshold of “substantive engagement”—a term the rules leave conveniently ill-defined.
"By labeling this a 'middle ground' between monitoring and full-blown undercover work, the DHS allows agents to infiltrate private digital spaces without the rigorous internal approvals and legal checks required for a formal undercover 'sting,'" Klippenstein explained.
Sources told Klippenstein that DHS has been using masked engagement tactics to infiltrate pro-Palestine groups in the United States and to compile databases of suspected Mexican and Mexican American transnational criminals.
“Open source monitoring has become so ubiquitous that we even have databases of identities used by the department to track our own online engagements,” the senior DHS official said.
“Yes, we have safeguards against violating people’s privacy, but masked engagement is just the first step in breaching people’s privacy settings in ways that they are not even aware of," they added.
Rachel Levinson-Waldman, director of the Brennan Center for Justice's Liberty and National Security Program, told Klippenstein that “CBP’s expansion into what they’re calling ‘masked engagement’ is cause for real concern."
“This new capability is being shoehorned in one step below undercover engagement (which already allows for a lot of overreach), it appears CBP believes that friending someone, following them, or joining a group is not as invasive as directly engaging or interacting with individuals," she continued.
“In addition, doing so through an alias account—an account that doesn’t reveal the user’s CBP affiliation, and pretends to be someone else—will weaken trust in government and weaken the trust that is critical to building community both online and off,” Levinson-Waldman added.
A DHS spokesperson told Klippenstein that the agency "has utilized its congressionally directed undercover authorities to root out child molesters and predators for years."
“We will continue using every tool at our disposal to protect the American people as our agents and officers Make America Safe Again," they added.
Those tools include an error-plagued mobile facial recognition application, mass phone surveillance technology, data broker platforms that allow operatives to circumvent warrant requirements, forensic extraction to bypass phone locks, artificial intelligence and predictive analytics, and more.
Civil liberties groups, digital rights advocates, and some Democratic lawmakers are pushing back.
Last week, Sens. Ed Markey (D-Mass.), Jeff Merkley (D-Ore.), Ron Wyden (D-Ore.), and Rep. Pramila Jayapal (D-Wash.) introduced the ICE Out of Our Faces Act, legislation that would ban ICE and Customs and Border Protection "from acquiring and using facial recognition technology and other biometric identification systems."
The bill would "also require the deletion of all data collected for use in or by biometric identification systems and allow individuals and state attorneys general to seek civil penalties for violations."
Dear Common Dreams reader, The U.S. is on a fast track to authoritarianism like nothing I've ever seen. Meanwhile, corporate news outlets are utterly capitulating to Trump, twisting their coverage to avoid drawing his ire while lining up to stuff cash in his pockets. That's why I believe that Common Dreams is doing the best and most consequential reporting that we've ever done. Our small but mighty team is a progressive reporting powerhouse, covering the news every day that the corporate media never will. Our mission has always been simple: To inform. To inspire. And to ignite change for the common good. Now here's the key piece that I want all our readers to understand: None of this would be possible without your financial support. That's not just some fundraising cliche. It's the absolute and literal truth. We don't accept corporate advertising and never will. We don't have a paywall because we don't think people should be blocked from critical news based on their ability to pay. Everything we do is funded by the donations of readers like you. Will you donate now to help power the nonprofit, independent reporting of Common Dreams? Thank you for being a vital member of our community. Together, we can keep independent journalism alive when it’s needed most. - Craig Brown, Co-founder |
US Department of Homeland Security agents are increasingly infiltrating social media platforms to monitor users, collect intelligence, and target people, according to new reporting based on leaked documents.
Ken Klippenstein exposed the open source monitoring program, which DHS calls "masked engagement," with new reporting Thursday that details how agents "assume false identities and interact with users—friending them, joining closed groups, and gaining access to otherwise private postings, photographs, friend lists, and more."
"A senior [DHS] official tells me that over 6,500 field agents and intelligence operatives can use the new tool, a significant increase explicitly linked to more intense monitoring of American citizens," Klippenstein wrote.
The so-called "masked engagement" by DHS operatives online comes as actual masked federal agents are engaged in the Trump administration's deadly deployments in communities nationwide.
Important to note that "Authorized" here means that DHS/ICE have given *Themselves* permission to do this "masked engagement" bullshit, not that either congress or the courts say it's okay.Challenge this everywhere & every way possible, & in the meantime, keep ourselves & each other safe as we can
[image or embed]
— Dr. Damien P. Williams can't think of a fun display name right n (@wolvendamien.bsky.social) February 12, 2026 at 4:46 PM
Masked engagement adds a new level to DHS' open source intelligence (OSINT) collection regime, which previously consisted of overt engagement, overt research, overt monitoring, masked monitoring, and undercover engagement. Masked engagement, in which agents conceal their government affiliation without assuming a false identity while interacting with a target, is a step below undercover engagement, in which DHS operatives use false identities and cover stories.
According to Klippenstein:
Masked monitoring allows officers at agencies like [Immigration and Customs Enforcement] and Border Patrol to use alias accounts to passively observe public online activity. Crucially, this level of monitoring bars DHS representatives from interacting with other users directly. Under masked monitoring, officers are not allowed to ask an admin for entry into a private group or to “friend” a target to see non-public posts.
But with masked engagement (separate from masked monitoring), that firewall has now been dismantled. The only restriction imposed on masked engagement is that DHS officers [note] the threshold of “substantive engagement”—a term the rules leave conveniently ill-defined.
"By labeling this a 'middle ground' between monitoring and full-blown undercover work, the DHS allows agents to infiltrate private digital spaces without the rigorous internal approvals and legal checks required for a formal undercover 'sting,'" Klippenstein explained.
Sources told Klippenstein that DHS has been using masked engagement tactics to infiltrate pro-Palestine groups in the United States and to compile databases of suspected Mexican and Mexican American transnational criminals.
“Open source monitoring has become so ubiquitous that we even have databases of identities used by the department to track our own online engagements,” the senior DHS official said.
“Yes, we have safeguards against violating people’s privacy, but masked engagement is just the first step in breaching people’s privacy settings in ways that they are not even aware of," they added.
Rachel Levinson-Waldman, director of the Brennan Center for Justice's Liberty and National Security Program, told Klippenstein that “CBP’s expansion into what they’re calling ‘masked engagement’ is cause for real concern."
“This new capability is being shoehorned in one step below undercover engagement (which already allows for a lot of overreach), it appears CBP believes that friending someone, following them, or joining a group is not as invasive as directly engaging or interacting with individuals," she continued.
“In addition, doing so through an alias account—an account that doesn’t reveal the user’s CBP affiliation, and pretends to be someone else—will weaken trust in government and weaken the trust that is critical to building community both online and off,” Levinson-Waldman added.
A DHS spokesperson told Klippenstein that the agency "has utilized its congressionally directed undercover authorities to root out child molesters and predators for years."
“We will continue using every tool at our disposal to protect the American people as our agents and officers Make America Safe Again," they added.
Those tools include an error-plagued mobile facial recognition application, mass phone surveillance technology, data broker platforms that allow operatives to circumvent warrant requirements, forensic extraction to bypass phone locks, artificial intelligence and predictive analytics, and more.
Civil liberties groups, digital rights advocates, and some Democratic lawmakers are pushing back.
Last week, Sens. Ed Markey (D-Mass.), Jeff Merkley (D-Ore.), Ron Wyden (D-Ore.), and Rep. Pramila Jayapal (D-Wash.) introduced the ICE Out of Our Faces Act, legislation that would ban ICE and Customs and Border Protection "from acquiring and using facial recognition technology and other biometric identification systems."
The bill would "also require the deletion of all data collected for use in or by biometric identification systems and allow individuals and state attorneys general to seek civil penalties for violations."
US Department of Homeland Security agents are increasingly infiltrating social media platforms to monitor users, collect intelligence, and target people, according to new reporting based on leaked documents.
Ken Klippenstein exposed the open source monitoring program, which DHS calls "masked engagement," with new reporting Thursday that details how agents "assume false identities and interact with users—friending them, joining closed groups, and gaining access to otherwise private postings, photographs, friend lists, and more."
"A senior [DHS] official tells me that over 6,500 field agents and intelligence operatives can use the new tool, a significant increase explicitly linked to more intense monitoring of American citizens," Klippenstein wrote.
The so-called "masked engagement" by DHS operatives online comes as actual masked federal agents are engaged in the Trump administration's deadly deployments in communities nationwide.
Important to note that "Authorized" here means that DHS/ICE have given *Themselves* permission to do this "masked engagement" bullshit, not that either congress or the courts say it's okay.Challenge this everywhere & every way possible, & in the meantime, keep ourselves & each other safe as we can
[image or embed]
— Dr. Damien P. Williams can't think of a fun display name right n (@wolvendamien.bsky.social) February 12, 2026 at 4:46 PM
Masked engagement adds a new level to DHS' open source intelligence (OSINT) collection regime, which previously consisted of overt engagement, overt research, overt monitoring, masked monitoring, and undercover engagement. Masked engagement, in which agents conceal their government affiliation without assuming a false identity while interacting with a target, is a step below undercover engagement, in which DHS operatives use false identities and cover stories.
According to Klippenstein:
Masked monitoring allows officers at agencies like [Immigration and Customs Enforcement] and Border Patrol to use alias accounts to passively observe public online activity. Crucially, this level of monitoring bars DHS representatives from interacting with other users directly. Under masked monitoring, officers are not allowed to ask an admin for entry into a private group or to “friend” a target to see non-public posts.
But with masked engagement (separate from masked monitoring), that firewall has now been dismantled. The only restriction imposed on masked engagement is that DHS officers [note] the threshold of “substantive engagement”—a term the rules leave conveniently ill-defined.
"By labeling this a 'middle ground' between monitoring and full-blown undercover work, the DHS allows agents to infiltrate private digital spaces without the rigorous internal approvals and legal checks required for a formal undercover 'sting,'" Klippenstein explained.
Sources told Klippenstein that DHS has been using masked engagement tactics to infiltrate pro-Palestine groups in the United States and to compile databases of suspected Mexican and Mexican American transnational criminals.
“Open source monitoring has become so ubiquitous that we even have databases of identities used by the department to track our own online engagements,” the senior DHS official said.
“Yes, we have safeguards against violating people’s privacy, but masked engagement is just the first step in breaching people’s privacy settings in ways that they are not even aware of," they added.
Rachel Levinson-Waldman, director of the Brennan Center for Justice's Liberty and National Security Program, told Klippenstein that “CBP’s expansion into what they’re calling ‘masked engagement’ is cause for real concern."
“This new capability is being shoehorned in one step below undercover engagement (which already allows for a lot of overreach), it appears CBP believes that friending someone, following them, or joining a group is not as invasive as directly engaging or interacting with individuals," she continued.
“In addition, doing so through an alias account—an account that doesn’t reveal the user’s CBP affiliation, and pretends to be someone else—will weaken trust in government and weaken the trust that is critical to building community both online and off,” Levinson-Waldman added.
A DHS spokesperson told Klippenstein that the agency "has utilized its congressionally directed undercover authorities to root out child molesters and predators for years."
“We will continue using every tool at our disposal to protect the American people as our agents and officers Make America Safe Again," they added.
Those tools include an error-plagued mobile facial recognition application, mass phone surveillance technology, data broker platforms that allow operatives to circumvent warrant requirements, forensic extraction to bypass phone locks, artificial intelligence and predictive analytics, and more.
Civil liberties groups, digital rights advocates, and some Democratic lawmakers are pushing back.
Last week, Sens. Ed Markey (D-Mass.), Jeff Merkley (D-Ore.), Ron Wyden (D-Ore.), and Rep. Pramila Jayapal (D-Wash.) introduced the ICE Out of Our Faces Act, legislation that would ban ICE and Customs and Border Protection "from acquiring and using facial recognition technology and other biometric identification systems."
The bill would "also require the deletion of all data collected for use in or by biometric identification systems and allow individuals and state attorneys general to seek civil penalties for violations."