
The scope of government surveillance in the United States extends far beyond what most citizens realize. With nearly 4,000 federal, state, and local organizations working on domestic counterterrorism — as documented by the Washington Post’s investigation into America’s intelligence apparatus — the infrastructure for tracking ordinary people has grown into an enormous and largely invisible system. From biometric databases holding millions of records to warrantless cellphone tracking, here are thirteen documented methods that U.S. government agencies use to monitor the population.
NSA Mass Electronic Surveillance Programs
The National Security Agency collects hundreds of millions of emails, text messages, and phone calls every day, with the technical capacity to intercept and sift through billions more. In 2012, WIRED magazine reported that the NSA was constructing a massive new data center designed to intercept, analyze, and store even greater volumes of electronic communications captured from satellites and undersea cables spanning the globe. Although the NSA is legally prohibited from targeting U.S. citizens for surveillance, reporting has consistently shown that domestic communications are regularly swept up in the agency’s collection programs.
FBI National Security Branch Data Collection
The FBI’s National Security Branch Analysis Center (NSAC) maintains more than 1.5 billion records on U.S. citizens, aggregated from commercial databases, government information systems, and criminal investigations. This vast repository gives federal investigators access to a detailed mosaic of personal information drawn from both public and private sector sources, enabling agents to build comprehensive profiles on individuals of interest.
Warrantless Cellphone Location Tracking
Investigations by the American Civil Liberties Union and the New York Times revealed that state and local law enforcement agencies across the country routinely track the cellphones of private individuals without obtaining warrants. With more than 300 million active cellphones connected to over 200,000 cell towers across the United States, location tracking software can pinpoint a phone’s position in real time and construct detailed movement histories documenting everywhere a person travels over days, weeks, or months.
Integrated Automated Fingerprint Identification System
The FBI’s Integrated Automated Fingerprint Identification System (IAFIS) holds fingerprint records for more than 62 million people, sharing data with 43 states and five federal agencies. The system processes more than 168,000 fingerprint checks each day, making it one of the largest biometric databases in the world and a central tool for both criminal investigations and background screening.
DHS Automated Biometric Identification System
The Department of Homeland Security operates its own biometric system called IDENT, containing fingerprints, photographs, and biographical information on over 126 million people. Processing approximately 250,000 biometric transactions daily, IDENT supports functions across national security, law enforcement, immigration enforcement, and intelligence operations. The system serves as a critical node connecting multiple government databases.
State Department Consular Database and Facial Recognition
The U.S. Department of State’s Consular Consolidated Database (CCD) contains visa records for more than 110 million people and photographs of over 90 million individuals, growing by approximately 35,000 new entries per day. The CCD serves as a gateway to the State Department’s facial recognition system and connects directly to both IDENT and the FBI’s IAFIS, creating an interconnected web of biometric identification capabilities spanning multiple agencies.
FBI Combined DNA Index System
The FBI-coordinated Combined DNA Index System (CODIS) maintains genetic profiles on more than 10 million people through its National DNA Index. Originally designed to help solve violent crimes by matching DNA evidence from crime scenes to known offenders, the database has expanded steadily as more states pass laws requiring DNA collection from individuals arrested for — not just convicted of — certain offenses.
Intelligence Community Security Clearance Repository
The Intelligence Community Security Clearance Repository, known internally as “Scattered Castles,” holds records on more than two million people, primarily employees and contractors of the Department of Defense and other intelligence agencies. The database tracks security clearance levels, investigation results, and access authorizations, creating a comprehensive personnel security infrastructure across the intelligence community.
Military Biometric Identification Database
The Department of Defense operates its own Automated Biometric Identification System (ABIS) to support military operations overseas. This database incorporates fingerprint, palm print, facial, and iris recognition data on six million people and adds approximately 20,000 new records each day. Originally developed for identifying threats in combat zones, the system represents the military’s growing reliance on biometric technology for both security and intelligence purposes.
Terrorist Identities Datamart Environment
The National Counterterrorism Center maintains the Terrorist Identities Datamart Environment (TIDE), the U.S. government’s central repository of information on known and suspected international terrorists. The database contains records on over 740,000 individuals, with the government claiming that fewer than two percent are U.S. citizens or legal permanent residents. Notably, authorization was granted to retain non-terrorism-related information on American citizens for up to five years, a significant expansion from the previous 180-day retention limit.
Facial Recognition Technology Partnerships
The FBI has been collaborating with state agencies on facial recognition capabilities through a project called “Face Mask.” Working with the North Carolina Department of Motor Vehicles and other state and local law enforcement bodies, the FBI provides photographs and names that are then run against state driver’s license photo databases. The scale of biometric data collection at the local level is substantial — the Maricopa County Sheriff’s Office in Arizona alone records 9,000 biometric mugshots every month.
Nationwide Suspicious Activity Reporting Initiative
The FBI operates the Nationwide Suspicious Activity Reporting Initiative (SAR), which collects and analyzes observations and reports of suspicious behavior submitted by local law enforcement officers. With over 160,000 suspicious activity files on record, SAR maintains profiles on tens of thousands of Americans and legal residents who have never been accused of any crime but were flagged for allegedly suspicious conduct. The program has drawn criticism for its potential to target constitutionally protected activities and minority communities.
Warrantless GPS Vehicle Tracking
As of 2012, the FBI acknowledged that it had approximately 3,000 GPS tracking devices actively monitoring vehicles of unsuspecting individuals across the United States. This admission came even after the U.S. Supreme Court ruled that law enforcement agencies must obtain warrants based on probable cause before deploying GPS trackers. The gap between the Court’s ruling and the FBI’s ongoing practices highlighted the challenges of enforcing judicial limits on surveillance technology.
Expanding Surveillance Technology on the Horizon
The technology available for tracking and identifying individuals continues to advance rapidly, and government demand for these capabilities shows no sign of slowing. Law enforcement agencies are increasingly deploying handheld devices capable of collecting fingerprints, facial images, iris scans, and even DNA samples in the field, with results transmitted instantly to national databases for comparison and permanent storage.
Bloomberg News reported that the newest generation of surveillance products can secretly activate laptop webcams and mobile device microphones, alter the contents of emails during transmission, and deploy voice recognition systems to scan entire phone networks. The convergence of counterterrorism technology, compliant legislative bodies, and deferential courts has created an environment where both the right to privacy and the right to be free from government monitoring face unprecedented challenges.
