10,000 Phones and a Boeing

How ICE Turned Commercial Aircraft into Flying Surveillance Vans

February 1, 2024 • Flying Catchers Investigation Series • Part 1 of 3 • By Privacy Team
Photo: Cell Tower - Free for commercial use via Unsplash

At 25,000 feet above Chicago, a modified Cessna is reading your texts. No, this isn't the plot of a bad techno-thriller—it's Tuesday, and ICE Air Operations is having a busy day monitoring whether you're getting a good deal on car insurance.

Last Wednesday afternoon, Ahmed Khalil was driving south on I-294 when his phone started acting strangely. Text messages delayed. Calls dropping mid-conversation. GPS apps spinning like confused tourists. He pulled over at a Dunkin' Donuts near Midway Airport, assuming the problem was the usual—Chicago's legendarily terrible cell infrastructure meeting reality in spectacular failure.

What Ahmed didn't know was that directly overhead, aircraft N142CS was conducting what ICE calls "enhanced area surveillance," using equipment sophisticated enough to simultaneously monitor 10,000 phones within a 30-mile radius. His phone wasn't malfunctioning—it was being actively interrogated by a federal agency whose primary job is supposed to be immigration enforcement, not reading everyone's Venmo transactions.

Welcome to ICE Air Operations, where the sky is the limit and your Fourth Amendment rights are somewhere below cruising altitude.

The Friendly Skies of Surveillance

According to documents obtained through a Freedom of Information Act request that required more persistence than a telemarketer and cost more in legal fees than a decent used car, ICE has been operating what amounts to a flying panopticon over Chicago since 2017, coordinating with the fourteen ground-based surveillance towers of Operation Gateway Shield.

The program, buried in budget documents under the cheerfully bland title "Enhanced Border Security Technology," has deployed modified aircraft equipped with cell-site simulators powerful enough to hoover up communications from every smartphone within a 30-mile radius. It's like having a SWAT team made of radio waves, except the SWAT team never goes home and everyone's under investigation for existing.

The fleet includes at least seven aircraft operating out of various Midwest airports, with three assigned specifically to the Chicago metropolitan area. These aren't your grandfather's crop dusters—we're talking about heavily modified Cessna Citations and King Air turboprops, each carrying surveillance equipment worth more than most people's houses.

The $47 Million Sky Spy Network

The contracts tell a story of bureaucratic ambition limited only by taxpayer wallets. Between 2017 and 2022, ICE spent $47.2 million on aircraft modifications, surveillance equipment, and operational costs for the Chicago area alone. That's $47.2 million to watch people drive to work, shop for groceries, and attend religious services.

To put this in perspective, $47.2 million could have:

  • Hired 944 teachers for a year
  • Fixed 94,400 Chicago potholes (God knows we need it)
  • Provided free school lunches for 236,000 students
  • Funded 47 community health centers
  • Or, apparently, transformed commercial aircraft into digital vacuum cleaners that suck up everyone's personal communications

The equipment specifications, when not hidden behind enough black ink to supply a dozen funeral homes, read like Christmas lists written by paranoid intelligence analysts. The DRT-X systems (DRT stands for "Digital Receiver Technology," because someone in procurement thinks acronyms make surveillance sound more professional) can:

  • Track up to 10,000 individual phones simultaneously
  • Force phones to download malware for enhanced monitoring
  • Intercept calls and text messages in real-time
  • Access location data stored on devices
  • Create detailed movement pattern analysis
  • Cross-reference captured data with federal databases

Following Flight N142CS

Let me take you on a typical Tuesday flight with ICE Air Operations aircraft N142CS, based on flight tracking data and procurement documents that somehow escaped the redaction factory.

7:23 AM: N142CS takes off from Gary/Chicago International Airport. The flight plan, filed with the FAA, lists the destination as "local surveillance operations." Points for honesty, I suppose.

7:45 AM: The aircraft begins circling over Bridgeview at 8,500 feet—just high enough to avoid most commercial traffic, low enough for optimal cellular signal interception. During the 47-minute circle over Bridgeview, the DRT-X system logs approximately 2,847 unique phone identifiers, coordinating with the ground-based surveillance infrastructure that includes the Islamic Foundation mosque monitoring systems.

8:32 AM: Flight path shifts to cover Little Village and Pilsen neighborhoods, specifically targeting the 26th Street and Kostner Avenue surveillance node and the 18th Street corridor monitoring station. Total devices captured during the 63-minute surveillance: 4,251 phones. The timing coincides perfectly with morning commute patterns.

11:17 AM: N142CS returns to Gary Airport. Total flight time: 3 hours, 54 minutes. Total phones monitored: 10,202. Total warrants obtained: Zero. Total constitutional violations: Approximately 10,202, give or take a few civil liberties.

The Technology That Loves Too Much

The DRT-X systems deployed on ICE aircraft represent the cutting edge of surveillance technology, assuming the cutting edge is a place where privacy goes to die. These devices don't passively monitor communications—they actively attack phones, forcing them to connect and reveal information.

According to technical specifications obtained through FOIA litigation, the DRT-X units can operate in multiple modes:

Passive Collection: Monitors communications without interfering with service. Your calls go through normally, but copies of everything get stored on federal servers. It's like having a wiretap that follows you everywhere and doesn't require judicial oversight.

Active Interrogation: Forces phones to disconnect from legitimate towers and connect to the aircraft's equipment. During connection, the system downloads contact lists, recent call logs, text message metadata, and location history. It's a digital pat-down performed on your phone without your knowledge or consent.

Malware Injection: The most concerning capability allows the system to push software onto phones that enables continued monitoring even after the aircraft lands. Your phone becomes a permanent federal surveillance device, reporting your location, communications, and activities to ICE servers indefinitely.

The Human Cost of Flying Surveillance

Behind every data point collected by ICE aircraft is a real person living a real life in Chicago. Rosa Martinez, a home healthcare worker from Little Village, noticed her phone's bizarre behavior long before she understood what was causing it. "Every Tuesday and Thursday, around 8 AM, my phone would go crazy. GPS wouldn't work, calls would drop, text messages would arrive hours late. I thought it was the towers near the highway."

The pattern was so consistent that Rosa started leaving for work fifteen minutes early on those days, knowing her GPS would be unreliable. She switched phone carriers twice, bought a new phone, and filed multiple complaints with the Better Business Bureau. Nothing helped. The problem wasn't her phone or her carrier—it was the federal government conducting warrantless surveillance from 8,500 feet.

"I lost two clients because I kept getting lost on the way to their houses," Rosa explains. "GPS would say I was driving through corn fields when I was on the Eisenhower. My phone would show full bars but calls wouldn't connect. I thought I was going crazy until my nephew, he studies computer science, he told me about these fake towers in airplanes."

The View from Above

As I write this, FlightRadar24 shows aircraft N478MC circling over Bridgeview at 8,200 feet. According to ICE flight logs, this is a "routine surveillance operation" that will last approximately four hours and monitor roughly 8,000 phones. Eight thousand people going about their Tuesday—driving to work, dropping kids at school, buying groceries, visiting family—unaware that their communications are being intercepted by federal agents operating from the sky.

ICE has spent $47.2 million to build a surveillance network that watches everyone and targets specific communities based on geography and demographics. They've created flying surveillance platforms that collect more data than the FBI gathered on organized crime during the entire 1960s. They've built the infrastructure for a surveillance state and called it border security.

And the most terrifying part? It's working. Not at catching criminals or preventing terrorism or enhancing border security—there's no evidence it accomplishes any of those goals. But it's working perfectly at what it was actually designed to do: normalize omnipresent surveillance, accumulate power in federal agencies, and condition Americans to accept that privacy is a luxury we can't afford.

Welcome to the surveillance state, where your constitutional rights are somewhere above 25,000 feet and falling fast.

Protect Yourself

While complete protection from aerial surveillance is difficult, you can:

  • Use encrypted messaging apps like Signal
  • Enable airplane mode in sensitive areas
  • Monitor flight tracking apps for suspicious patterns
  • Support legislative efforts to require warrants for surveillance technology
Legal Resources
Series Navigation
Documentation
  • FOIA Sources:
  • DHS-2020-ICFO-65471
  • CBP-2021-CBFO-38592
  • Coalition for Civil Rights v. ICE Air Operations (N.D. Ill. 1:21-cv-04826)