
Palantir Technologies, backed by CIA venture fund In-Q-Tel, built surveillance platforms used by ICE since 2013 (FALCON, ICM) for workplace raids, tracking asylum seekers, and large-scale immigration enforcement. In 2025, ICE awarded Palantir $30M to build 'ImmigrationOS,' a platform using data from passports, Social Security, IRS, and even Medicaid records to identify and track deportation targets. Palantir's ELITE tool uses Medicaid data to locate individuals, generating 'confidence scores' for current addresses.
“A CIA-backed tech company is building a surveillance dragnet that pulls data from every government database to track and deport immigrants. This technology could easily target any American.”
From “crazy” to confirmed
The Claim Is Made
This is the moment they called it crazy.
For years, privacy advocates and immigrant rights groups made a specific accusation: a CIA-funded surveillance company was building tools to track and deport immigrants using their most sensitive personal data. For years, it was treated as speculation. In 2025, documents obtained by 404 Media confirmed every detail.
Palantir Technologies, founded in 2003 by Peter Thiel and backed by the CIA's venture capital arm In-Q-Tel, has been working with U.S. Immigration and Customs Enforcement since at least 2013. The company built and maintains FALCON and ICM—immigration enforcement platforms that ICE has used to plan workplace raids, track asylum seekers, and execute large-scale deportations.
The arrangement seemed straightforward enough on the surface. ICE needed better data tools. Palantir provided them. But the 2025 disclosures revealed something far more expansive. ICE awarded Palantir a $30 million contract to build "ImmigrationOS," a centralized surveillance system designed to integrate data from passport records, Social Security Administration files, IRS tax records, and Medicaid databases—the last one particularly troubling since Medicaid serves vulnerable populations including immigrants.
When immigration advocates first raised concerns about Palantir's involvement with ICE, the company's public response was characteristically vague. Executives acknowledged the contract but framed it as routine data management work. Critics were told they were overstating the scope and capability of the systems. The Washington Post's coverage of Palantir noted the company's role but didn't highlight the specific mechanisms—until the 404 Media investigation detailed how Palantir's ELITE tool actually uses Medicaid information to generate location data and assigns "confidence scores" to identify where deportation targets likely live.
What makes this case significant isn't just that the surveillance occurred. It's that the full apparatus was hidden in plain sight. Palantir operates largely outside public view, with classified government contracts that shield details from scrutiny. ICE's use of these tools wasn't secret, exactly, but it wasn't prominently disclosed either. The company itself has cultivated an image as a data analytics firm solving technical problems—not as the nervous system of an enforcement apparatus targeting a vulnerable population.
Get the 5 biggest receipts every week, straight to your inbox — plus an exclusive PDF: The Top 10 Conspiracy Theories Proven True in 2025-2026. No spam. No agenda. Just the papers they couldn't hide.
You just read "CIA-funded Palantir built mass surveillance systems for ICE,…". We send ones like this every week.
No one's said anything yet. Be the first to drop your take.
Confirmed: They Were Right
The truth comes out. Officially documented.
Confirmed: They Were Right
The truth comes out. Officially documented.
The Medicaid angle deserves particular attention. People who access Medicaid are often those most likely to be targeted by immigration enforcement: those without private insurance, those with lower incomes, those who needed medical care badly enough to risk enrolling in visible government programs. That their health information could be weaponized this way represents a fundamental breach of the trust required for public health systems to function.
This case illustrates a consistent pattern: when private companies receive government contracts involving sensitive data, especially through classified procurement processes, public accountability becomes nearly impossible until someone with access leaks the details. By that time, the systems are already operational, integrated into enforcement infrastructure, and generating real consequences for real people.
The broader lesson concerns how surveillance capabilities develop in democratic societies. They rarely arrive announced. They arrive incrementally, justified by reasonable-sounding problems, built by private companies insulated from public process, and revealed only when someone decides the public has a right to know. By then, the only question left is what takes to shut them down.
Beat the odds
This had a 0.5% chance of leaking — someone talked anyway.
Conspirators
~150Network
Secret kept
8.1 years
Time to 95% exposure
500+ years