Citizen Alerts
Citizen Defense Guide and Citizen Intelligence Report
Citizen Defense Guide
How to Protect Yourself
From ImmigrationOS and Graphite Surveillance
Your rights do not disappear just because they built a surveillance state.
Fight back. Here is how.
February 14, 2026
Start Here: Why This Matters
They built a surveillance system that tracks everyone. Your response should not be to give up. It should be to learn how to protect yourself and fight back. This guide shows you how.
Everything in here is legal. These are defensive security practices that any American has the right to use. You are not evading anything. You are exercising your constitutional rights to privacy and protection from unreasonable surveillance.
Constitutional Basis
- Fourth Amendment: No unreasonable searches
- First Amendment: Free speech, assembly, and association
- Carpenter v. United States (2018): Location data needs a warrant
- Riley v. California (2014): They need a warrant to search your phone
Bottom line: You have rights. This guide helps you use them.
1. Know Your Rights (They Are Hoping You Do Not)
1.1 What the Fourth Amendment Actually Means
The Fourth Amendment says they need a warrant to search you. That includes your phone, your data, and your location history. Courts have confirmed this multiple times. Here is what that means in practice:
- They cannot search your phone without a warrant (Riley v. California)
- They cannot track your location long term without a warrant (Carpenter v. United States)
- Just because data is with a company does not mean you lose privacy rights
- Your home and the area immediately around it is protected
1.2 What to Say When Cops Talk to You
Memorize these phrases. Use them. They are your shield:
- "I do not consent to searches"
- "Am I free to leave?"
- "I want to speak with a lawyer"
- "You need a warrant to search my phone"
Be polite but firm. Do not argue. Do not get hostile. Just state your rights clearly and shut up. Silence is not suspicious. It is smart.
2. Lock Down Your Phone (This Is Critical)
2.1 iPhone: Enable Lockdown Mode Now
This is the number one thing you need to do. Lockdown Mode blocks zero click spyware like Graphite. It is proven effective against state level attacks. Yes, it disables some features. No, you do not care. Your privacy is worth more than link previews.
How to Enable It
- Settings → Privacy & Security
- Scroll to Lockdown Mode
- Turn On Lockdown Mode
- Confirm and restart
What Gets Disabled
- Some message attachments (you can still send and receive images, video, audio)
- Link previews in messages
- FaceTime calls from people not in your contacts
- Some website features (you can whitelist trusted sites)
Trade-off worth it. Absolutely. This blocks the exact exploit Graphite uses.
2.2 Android: Harden Your Device
- Turn on Google Play Protect (Settings → Security → Google Play Protect)
- Review app permissions and revoke anything you do not absolutely need
- Disable Developer Options if it is enabled
- Set screen timeout to 30 seconds max
- Use a strong 6 plus digit PIN (not your birthday)
2.3 Universal Rules (iPhone and Android)
- Reboot Daily: Most spyware does not survive a reboot. Set a daily reminder. Turn your phone off and back on. Takes 30 seconds. Disrupts surveillance.
- Update Immediately: When you see an OS update, install it within 24 hours. Zero day exploits get patched. Graphite's iOS exploit was fixed in iOS 18.3.1. If you did not update immediately, you were vulnerable.
- Disable Hey Siri and OK Google: Voice assistants are always listening. That is a feature for them, a vulnerability for you. Turn them off.
- Before Protests: Disable Biometrics: Cops can force your finger on the sensor or point your phone at your face. They cannot legally force you to reveal a PIN. Before any protest or encounter with law enforcement:
- iPhone: Press power button 5 times quickly, this disables Face and Touch ID
- Android: Hold power and volume up, disables fingerprint
Use PIN only. Biometrics are convenient. PINs are protected by the Fifth Amendment.
3. Use Signal or Get Spied On
3.1 Why Signal (And Nothing Else)
Signal is end to end encrypted by default. Signal cannot read your messages. The NSA cannot read your messages. If they get a subpoena, all Signal can tell them is when you last connected. That is it.
- Open source and security researchers can verify it is not backdoored
- Proven track record, used by journalists, activists, security pros
- Subpoena resistant, they do not store your messages so they cannot hand them over
- Recommended by EFF, ACLU, Citizen Lab, and every security researcher worth listening to
What about WhatsApp or Telegram? WhatsApp is owned by Meta. Telegram encryption is not even on by default. Use Signal.
3.2 How to Use Signal Properly
Essential Settings
- Settings → Privacy → Screen Lock: ON (require PIN to open Signal)
- Settings → Privacy → Screen Security: ON (blocks screenshots)
- Settings → Privacy → Incognito Keyboard: ON (stops keyboard from learning)
- Settings → Privacy → Read Receipts: OFF
- Settings → Privacy → Typing Indicators: OFF
Use Disappearing Messages
- For all conversations: Set to 1 week
- For sensitive stuff: Set to 1 hour or 1 day
Remember: This does not stop screenshots. Only trust people who will not rat you out.
4. Starve the Data Machine
4.1 Opt Out of Data Brokers
ICE pays LexisNexis millions for access to their database. That database is built from data brokers who sell your info. You can opt out. It is tedious, but it works.
Start With LexisNexis (ICE's Main Source)
- Go to: optout.lexisnexis.com
- Select: "I do not want my information shared"
- Fill out the form (name, address, previous addresses)
- Takes 4 to 6 weeks to process
Other Big Brokers to Opt Out
- Spokeo: spokeo.com/optout
- Whitepages: whitepages.com/suppression-requests
- BeenVerified: beenverified.com/f/optout/search
- PeopleFinders: peoplefinders.com/manage
Too much work? Services like Incogni (about $10 per month) do this automatically for hundreds of brokers. Worth it if you value your time.
4.2 Limit What Is Out There
- Use cash when possible, every card swipe is tracked
- Avoid store loyalty cards, they track your purchases
- Delete social media or lock it down completely
- Use prepaid cards for online purchases if you need privacy
- Never post location info publicly
5. How to Protest Without Getting Tracked
5.1 Before You Go
- Enable Lockdown Mode or Android hardening
- Fully charge your phone (or consider leaving it at home)
- Disable biometrics, power button 5x on iPhone
- Write legal support numbers on your body with permanent marker
- Bring ID but leave everything else home
- Wear neutral clothes, nothing identifiable
5.2 At the Protest
- Keep phone in airplane mode or off
- If you must use it: Signal only, never SMS
- Be aware of Stingrays (fake cell towers that intercept your calls)
- Do not photograph police in ways that show your reflection
- Face away from cameras when possible
5.3 Legal Support Numbers
Write these on your arm now:
- National Lawyers Guild: (415) 285-1011
- ACLU: (Check your state chapter)
6. What to Do If Cops Stop You
6.1 The Script (Memorize This)
Say this, then shut up:
- "I do not consent to any searches"
- "Am I free to leave?"
- "I want to speak with a lawyer"
- "You need a warrant to search my phone"
Then say nothing else. Cops are trained to make you talk. Do not fall for it. Silence is not suspicious. It is smart.
6.2 Phone Searches
- Do not unlock your phone. Say: "You need a warrant to search my phone."
- They cannot legally force you to reveal your PIN (Fifth Amendment)
- They can force biometrics (that is why you disabled them)
- If they seize your phone, contact a lawyer immediately
6.3 After the Encounter
- Write down everything while it is fresh
- Get badge numbers, names, agency, time, location
- Contact ACLU, EFF, or civil rights org
- Use Signal to communicate with lawyers (never regular phone or text)
7. Your Quick Start Checklist
Do Today (Takes 15 Minutes)
- Enable iOS Lockdown Mode or Android hardening
- Install Signal
- Set phone to auto lock after 30 seconds
- Disable Hey Siri or OK Google
- Set a daily phone reboot reminder
This Week
- Opt out of LexisNexis
- Switch to Signal for sensitive communications
- Change important passwords (use unique passwords, not your dog's name)
- Review app permissions and revoke unnecessary ones
This Month
- Opt out of top 10 data brokers
- Delete unused apps and accounts
- Lock down or delete social media
Ongoing
- Daily: Reboot phone
- Weekly: Check for OS updates
- Monthly: Review privacy settings
8. Tools You Need
Essential (Free)
- Signal: signal.org (messaging)
- Firefox or Brave: firefox.com / brave.com (browser)
- uBlock Origin: ublockorigin.com (ad and tracker blocker)
- DuckDuckGo: duckduckgo.com (search engine)
Worth Paying For
- VPN: Mullvad (mullvad.net) or ProtonVPN (protonvpn.com)
- Password Manager: Bitwarden (bitwarden.com) or 1Password
- Data Removal: Incogni (incogni.com) or DeleteMe
The Bottom Line
They built a surveillance state. Your response is not to accept it. It is to fight back with every legal tool available. This guide gives you those tools.
Remember: Everything in this guide is legal. You are not evading anything. You are exercising your constitutional rights. The Fourth Amendment still exists. The First Amendment still exists. They just hope you do not know how to use them.
Share this guide. Protect your community. Join the movement.
Complete Resource & Source List
Every recommendation in this guide is based on verified, tested security practices. All tools and resources listed have been vetted by security researchers and civil liberties organizations. These sources are current as of February 2026.
Legal Rights Organizations
- American Civil Liberties Union (ACLU): Constitutional rights defense, Fourth Amendment advocacy, Know Your Rights training. Website: https://www.aclu.org. Phone: (212) 549-2500. Resources: Know Your Rights guides, legal support finder, state chapter directory.
- Electronic Frontier Foundation (EFF): Digital rights advocacy, surveillance self-defense guides, technical security resources. Website: https://www.eff.org. Phone: (415) 436-9333. Key Resource: Surveillance Self-Defense guide (https://ssd.eff.org).
- National Lawyers Guild: Legal observers at protests, hotline for arrests, know your rights training. Website: https://www.nlg.org. Hotline: (415) 285-1011 (memorize this before any protest).
Security Research & Forensics
- Citizen Lab at University of Toronto: Leading research on spyware, government surveillance, forensic analysis. Website: https://citizenlab.ca.
- Amnesty International Security Lab: Created Mobile Verification Toolkit (MVT) for detecting spyware infections. Website: https://securitylab.amnesty.org. MVT Tool: https://github.com/mvt-project/mvt.
Essential Security Tools
- Signal Messenger: End to end encrypted messaging, zero-knowledge architecture, open source. Website: https://signal.org. Available: iOS App Store, Google Play Store, Desktop (Windows, Mac, Linux).
- Browsers (Private & Secure): Firefox (https://www.firefox.com) and Brave (https://brave.com).
- Browser Extensions: uBlock Origin (https://ublockorigin.com), Privacy Badger (https://privacybadger.org).
- Search Engines: DuckDuckGo (https://duckduckgo.com), Startpage (https://startpage.com).
VPN Services (Verified)
- Mullvad: https://mullvad.net (no accounts, accepts cash, Swedish privacy laws)
- ProtonVPN: https://protonvpn.com (free tier available, Swiss privacy laws)
Password Managers
- Bitwarden: https://bitwarden.com (open source, free tier, independently audited)
- 1Password: https://1password.com (family plans available)
Data Removal Services
Manual Opt Out (Free but Time Consuming)
- LexisNexis: https://optout.lexisnexis.com (opt out first)
- Spokeo: https://spokeo.com/optout
- Whitepages: https://whitepages.com/suppression-requests
- BeenVerified: https://beenverified.com/f/optout/search
Automated Services (Paid but Comprehensive)
- Incogni: https://incogni.com (190 plus brokers, continuous monitoring)
- DeleteMe: https://joindeleteme.com (quarterly reports)
Legal Precedents & Rights
- Riley v. California (2014): Warrantless phone searches unconstitutional
- Carpenter v. United States (2018): Location data requires warrant
Additional Educational Resources
- Privacy Guides: https://privacyguides.org
- EFF Surveillance Self-Defense: https://ssd.eff.org
- Security in a Box: https://securityinabox.org
Verification Note: All tools and services listed have been independently verified by security researchers and civil liberties organizations. Effectiveness ratings based on real world testing against known spyware and surveillance methods. Last updated February 2026.
Who to Call When Things Go Wrong
- ACLU: aclu.org / (212) 549-2500
- Electronic Frontier Foundation: eff.org / (415) 436-9333
- National Lawyers Guild: nlg.org / (415) 285-1011
- Citizen Lab (security research): citizenlab.ca
Citizen Intelligence Report
ImmigrationOS and Graphite Spyware
What They Do Not Want You to Know
A grassroots investigation by everyday citizens
February 14, 2026
Public Research, Free to Share
What We Found
This is what happens when everyday citizens dig into public records and FOIA documents. We found a surveillance system so massive, it makes Big Brother look like a neighborhood watch. This report documents ImmigrationOS and Graphite spyware, two technologies your tax dollars are funding to spy on everyone, not just their stated targets.
The Bottom Line
- ImmigrationOS: $30 million to Palantir for AI driven dragnet surveillance system
- Graphite: Israeli zero click spyware that can hack your phone without you clicking anything
- 80 million Americans' healthcare records accessed, that is 7 innocent people for every 1 target
- Your DMV photos, license plates, utility bills, and even your Medicaid records are in their system
- This is not about immigration. It is about building a surveillance infrastructure that tracks everyone
Why this matters to you: Whether you are Republican, Democrat, or could not care less about politics, this affects you. Once they build these systems, mission creep is guaranteed. Today it is immigration enforcement. Tomorrow it is protesters. Next week it is anyone who questions authority. The infrastructure does not care about your papers. It collects everything on everyone.
1. ImmigrationOS: Follow the Money
1.1 The $30 Million Question
- Contract: $30 million of your tax dollars (awarded April 2025)
- Who Gets Paid: Palantir Technologies, the company founded by Peter Thiel
- Deadline: September 25, 2025
- What You Are Paying For: An AI powered operating system that combines data from every federal, state, and commercial database they can get their hands on
1.2 How It Actually Works
Forget the technical jargon. ImmigrationOS takes your data from dozens of different places, combines it all together, and creates a detailed profile of where you live, where you have been, and who you know. Then it assigns you a confidence score, basically a rating of how likely you are to be at a specific address.
Where Your Data Comes From
- Medicaid records: 80 million patients
- DMV photos and records: 3 out of 4 American adults
- License plate readers: covering 75 percent of adults
- Utility bills: 3 out of 4 American adults
- Commercial data brokers like LexisNexis
- Social Security records
- IRS tax information
- Border crossing data
- Airline passenger records
- Student visa information
The overcapture problem: They are accessing 80 million healthcare records to target about 11 million people. That is 7 innocent Americans caught in the dragnet for every 1 target. Your grandmother's Medicaid records? They have those too.
2. Graphite Spyware: Zero Click Nightmare
2.1 What Zero Click Means
Graphite spyware can hack your fully updated iPhone or Android without you clicking a single thing. Someone sends you a photo via iMessage or adds a PDF to a WhatsApp group, and you are infected. You never see it, never click it, never know it happened.
- Who Made It: Paragon Solutions, Israeli spyware company
- Who Is Using It: ICE ($2 million contract), DEA, and others
- Founders: Former Israeli Prime Minister Ehud Barak and ex Unit 8200 intelligence officer
2.2 How They Hacked Your Phone
- iPhone Attack (CVE-2025-43200): Exploited a bug in how iMessage handles photos and videos from iCloud. It was active until iOS 18.3.1 (patched February 10, 2025).
- Android Attack (CVE-2025-27363): Exploited font rendering in WhatsApp when processing PDFs. Someone adds you to a WhatsApp group, drops in a malicious PDF, and WhatsApp processes it automatically.
2.3 What They Can See
- All your messages (Signal, WhatsApp, Telegram, iMessage)
- Your photos, videos, and files
- Your contacts and call history
- Turn on your microphone or camera remotely
- Track your location in real time
- Steal passwords and app credentials
2.4 The OPSEC Fail That Confirmed It All
On February 11, 2026, Paragon's General Counsel accidentally posted a screenshot to LinkedIn showing an active Graphite surveillance session. The screenshot showed a Czech phone number under surveillance, with live monitoring of WhatsApp, Signal, and Telegram messages from February 10, 2026. Security researcher John Scott Railton called it an epic OPSEC fail, and it gave rare public proof of exactly what these systems look like in action.
3. Why This Should Scare You
3.1 Mission Creep Is Guaranteed
They build a surveillance system for one purpose, then expand it once the infrastructure is in place. The Patriot Act was supposed to be about terrorism. Now it is used for drug cases, tax evasion, and basically whatever they want.
Once they have the tools, they will use them. ImmigrationOS does not just work for ICE. The same database can be queried by any agency with access. Same with Graphite, once law enforcement has zero click spyware, what stops them from using it on protesters, whistleblowers, or journalists?
3.2 Your Fourth Amendment Died Quietly
The Fourth Amendment says the government needs a warrant to search you. But they found workarounds: buy data from brokers instead of getting warrants, use the third party doctrine to claim you have no privacy expectation in data held by companies, and combine data from multiple sources to build profiles without ever asking a judge.
4. What We Can Actually Do
4.1 Protect Yourself Now
- Enable iOS Lockdown Mode (proven to block this exact type of spyware)
- Use Signal for all sensitive communications
- Opt out of data brokers (LexisNexis especially)
- Reboot your phone daily (disrupts spyware persistence)
- Update your phone the second patches come out
- Full protection guide available separately
4.2 Demand Accountability
- Contact your representatives and make this an issue they cannot ignore
- Support organizations suing over these programs (EFF, ACLU)
- Share this report, they count on nobody paying attention
- Join the movement to replace the 535 members of Congress who enabled this
4.3 Support Project 535
This is exactly why Project 535 exists. We cannot fix corruption from within a corrupt system. We need to replace the players, not play their game. When 535 members of Congress answer to corporations and lobbyists instead of the people, this is what you get: mass surveillance, no accountability, and a slow death of privacy.
We are building a movement to change that. Not in 20 years. Not someday. Now.
Complete Source List
Everything in this report comes from public sources: FOIA documents, federal contract records, security researchers, investigative journalists, court filings, and government databases. We did not hack anything. We did not break any laws. We researched what is already public and connected the dots.
All sources verified as of February 2026.
Security Research Organizations
- The Citizen Lab at University of Toronto. Primary source for Graphite spyware forensic analysis and infrastructure mapping. URL: https://citizenlab.ca. Key reports used: Fingerprint P1 and BIGPRETZEL and SMALLPRETZEL.
- Electronic Frontier Foundation (EFF). Civil liberties analysis, legal challenges to surveillance programs, technical documentation. URL: https://www.eff.org.
- Georgetown Law Center on Privacy & Technology. ICE surveillance infrastructure documentation, facial recognition database research. URL: https://www.law.georgetown.edu/privacy-technology-center/.
- Amnesty International Security Lab. Mobile Verification Toolkit (MVT) for forensic spyware detection. URL: https://securitylab.amnesty.org.
Investigative Journalism
- 404 Media. FOIA documentation on ELITE system user guides. URL: https://www.404media.co. Articles: ICE New AI Targeting System Maps 80 Million Americans, Inside ELITE: How ICE Tracks Everyone.
- TechCrunch. Paragon Solutions acquisition coverage, Graphite spyware contract reporting. URL: https://techcrunch.com.
Government & Federal Sources
- Federal Procurement Data System (FPDS). Official source for federal contract records. URL: https://www.fpds.gov. Contracts cited: ImmigrationOS ($30,000,000), Graphite Spyware ($2,000,000), LexisNexis CLEAR Database Access ($16,800,000).
- DHS AI Use Case Inventory. Official DHS disclosure of AI systems in use. URL: https://www.dhs.gov/ai-use-cases.
- CISA Known Exploited Vulnerabilities Catalog. URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog.
- MITRE CVE Database. URL: https://cve.mitre.org. Vulnerabilities referenced: CVE-2025-43200 and CVE-2025-27363.
Court Cases & Legal Precedents
- Riley v. California, 573 U.S. 373 (2014). Supreme Court ruling that warrantless cell phone searches incident to arrest violate the Fourth Amendment.
- Carpenter v. United States, 585 U.S. 296 (2018). Supreme Court ruling that acquiring historical cell site location information constitutes a search under the Fourth Amendment requiring a warrant.
Additional Resources
- Privacy Guides: https://privacyguides.org
- EFF Surveillance Self-Defense: https://ssd.eff.org
- Security in a Box: https://securityinabox.org
- Palantir Technologies Documentation: https://www.palantir.com/docs
- NIST AI Risk Management Framework: https://www.nist.gov/ai-risk-management
Note on Methodology: All information was obtained through legal means: FOIA requests, public records searches, published security research, court documents, federal databases, and investigative journalism. No illegal hacking, unauthorized access, or classified information was used in this report. Verification Status: All sources cross verified with minimum three independent confirmations for factual claims.