Skip to content

Evidence Capture Guide

This guide goes beyond basic recording rights to provide a comprehensive toolkit for capturing, preserving, and protecting evidence during immigration enforcement encounters. Proper evidence documentation can support legal defenses, accountability efforts, and policy advocacy.


Because footage is only useful if it’s usable.

Don’t wait for the “right” moment. Livestream especially when encounters are tense, chaotic, or abusive. Live footage is harder to seize, edit, or dispute.

Landscape captures more of the scene — vehicles, agents, bystanders. Better for later review by attorneys, journalists, and investigators. Recording > perfect framing.

High resolution helps with: Badge numbers, vehicle markings, facial recognition. If storage is limited, prioritize short, clear clips over long blurry ones.

Focus on:

  • Agents’ behavior
  • Use of force
  • Vehicles
  • License plates
  • Agency markings

Footage of detained individuals can be used against them in court.

Say out loud: Date and time, location, what you are witnessing. Calm narration strengthens credibility.

Do not interfere physically. Do not cross police lines. Film from public spaces where you’re lawfully allowed to be. You have the right to record ICE in public.

Two hands if possible. Brace against a wall, car, or pole. Avoid rapid zooming or whipping the camera around. Clear footage beats dramatic footage.

Save the video to your device. Upload copies to more than one platform. Share with trusted community groups, journalists, and legal organizations.


When documenting an encounter, capture information in this order of priority:

1. Vehicle Identification (Highest Priority)

Section titled “1. Vehicle Identification (Highest Priority)”

Vehicles are often the most identifiable element, especially when agents wear masks or hide badges.

ElementWhat to CaptureWhy It Matters
License PlateFull plate number, state, any “EXEMPT” markingsPrimary identification; can be cross-referenced with databases
VIN17-character number visible on dashboardCannot be changed like plates; permanently identifies the vehicle
Make/Model/ColorYear, manufacturer, model, exact colorHelps pattern analysis across sightings
Distinguishing FeaturesDamage, stickers, aftermarket parts, missing roof racksUnique identifiers even if plates change
Number of VehiclesTotal count, formation, spacingIndicates operation size
ElementWhat to CaptureWhy It Matters
Badge NumbersRead aloud while filming if you can’t get clear videoPrimary individual accountability
Agency PatchesICE, CBP, ERO, HSI, local police with 287(g)Determines jurisdiction and rules that apply
Physical DescriptionsHeight, build, visible tattoos, voice characteristicsIdentification when badges hidden
Gear/UniformsTactical vests, masks, plain clothes, weapons visibleDocuments what level of force was deployed
Vehicle AssignmentWhich agent got into which vehicleLinks individuals to specific vehicles
ElementWhat to CaptureWhy It Matters
Use of ForceAny physical contact, weapons drawn, restraintsDocuments potential excessive force
Statements MadeWhat agents say to detained person, witnessesCan reveal rights violations, lies, or threats
WarrantsWhether shown, what type, who signedConstitutional rights depend on warrant type
Entry MethodHow they entered a location, consent given?Fourth Amendment issues
DurationHow long the encounter lastedProlonged detention may be unconstitutional
ElementWhat to CaptureWhy It Matters
LocationExact address, cross streets, landmarksEstablishes jurisdiction, proves location
Date and TimeState verbally at start of recordingCreates verifiable timeline
WitnessesNames and contact info (with consent)Corroborating testimony
Weather/LightingConditions that affect visibilityExplains video quality limitations

Reference: WITNESS Media Lab: Eyes on Courts - Documenting ICE arrests


ICE increasingly uses unmarked vehicles, switches license plates, and even uses vehicles with foreign plates to avoid identification. Here’s how to document vehicles effectively.

What to look for:

Plate TypeAppearanceMeaning
EXEMPT platesMay say “EXEMPT” or have unusual formatGovernment vehicle, often law enforcement
Plain platesNo county name, no decorative designOften government or fleet vehicles
State-specific formatsSome states have patterns (NC: “SHP-xxxx”)May indicate specific agency
Foreign platesMexican state plates spotted on ICE vehiclesDocumented tactic to avoid identification
Missing platesNo plate or plate coveredFederal law allows this if it interferes with “critical duties”

Recording plates effectively:

  • Get the full plate, including state/jurisdiction
  • Read it aloud while filming as backup
  • Note any unusual characteristics (exempt, plain, damaged)
  • Photograph from multiple angles if safe

Reference: NPR: Are ICE agents covering their license plates as well as their faces?

The VIN is a 17-character identifier that is permanently assigned to a vehicle and cannot be easily changed like license plates.

Where to find the VIN:

LocationHow to Access
DashboardVisible through windshield, driver’s side, where hood meets glass
Driver’s door jambSticker on the door frame when door is open
Engine blockStamped into metal (harder to access)

VIN structure:

  • Characters 1-3: Manufacturer and country
  • Characters 4-8: Vehicle attributes (model, body, engine)
  • Character 9: Check digit (validates the VIN)
  • Character 10: Model year
  • Character 11: Assembly plant
  • Characters 12-17: Unique serial number

Decoding VINs:

Reference: Geotab: How to Find a Vehicle Identification Number

Even without plates, vehicles can often be identified by their features.

Unmarked law enforcement vehicle indicators:

FeatureWhat to Look For
WheelsBlack steel wheels, chunky tires (civilian versions have alloys)
ChromeLack of chrome trim; matte black replacements
RoofMissing roof racks (removed on police SUVs)
AntennasExtra antennas, small black disk antennas
SpotlightsSpotlight near driver’s mirror
InteriorLaptop/MDT mounts, radio equipment, push bumpers
LightsLED strips near license plate, hidden lights in grille
ExhaustDual exhaust (performance package)
HeightLower ride height (2WD police package vs 4WD civilian)

Reference: Daily Dot: How To Spot Undercover Cop Cars

When multiple vehicles are involved:

  • Count total vehicles
  • Note formation (convoy, spread out, blocking)
  • Identify which appears to be “command” vehicle
  • Track which agents exit which vehicles
  • Note radio antenna patterns (command often has more)

Modern devices broadcast identifying information that can help track patterns even when visual identification fails.

When AirDrop is enabled on Apple devices (iPhones, iPads, Macs), they broadcast a discoverable name via Bluetooth Low Energy.

How it works:

  1. Your iPhone scans for nearby AirDrop-enabled devices
  2. Devices appear with their assigned names
  3. These names often reveal personal information (“John’s iPhone”)
  4. Government devices may show agency patterns (“DHS-iPhone-1234”)

To check for nearby AirDrop devices:

  1. Open any file (photo, note)
  2. Tap Share
  3. Look at the AirDrop section
  4. Note device names that appear

Limitations:

  • Only works if target has AirDrop enabled
  • Range is approximately 30 feet
  • Names can be changed easily
  • Privacy-conscious users disable AirDrop

Security note: Be aware that AirDrop has known security vulnerabilities that can reveal phone numbers and email addresses. Keep your own AirDrop set to “Contacts Only” or off.

Reference: Apple Support: AirDrop Security

Bluetooth-enabled devices (phones, tablets, earpieces, radios) broadcast discoverable names when pairing mode is enabled or Bluetooth is set to visible.

To scan for Bluetooth devices:

  • iPhone: Settings > Bluetooth (shows nearby devices)
  • Android: Settings > Connected devices > Bluetooth (scan for new devices)

What you might see:

  • Device names (“Samsung Galaxy S23”, “Motorola APX8000”)
  • Paired device histories
  • Government radio equipment may have identifiable naming patterns

Bluetooth trackers: If you suspect you’re being tracked, check for unknown Bluetooth trackers:

  • iPhone: Settings > Privacy > Tracking
  • Android: Use apps like “AirGuard” to detect AirTags/Tiles

Reference: EFF: How to Detect Bluetooth Trackers

Phones constantly broadcast “probe requests” looking for known WiFi networks. These can reveal:

  • Networks the device has connected to before
  • Potentially identifying network names (“FBI-Field-Office-WiFi”)
  • Device MAC addresses

This requires specialized equipment and is primarily useful for advanced researchers, but be aware that your phone also broadcasts this information.

Reference: Maltego: Integrating Wireless Data into Your OSINT Investigations

Location-based apps (Tinder, Grindr, Bumble, etc.) show users within a certain radius. In theory:

  • Agents with personal phones may appear on these apps
  • Profile photos or usernames could be identifying
  • Patterns of app usage near staging areas

This is NOT recommended as a primary identification method due to privacy concerns, unreliability, and ethical issues.


Before recording:

  • Clear storage space
  • Enable cloud backup (Signal, ProofMode, or secure service)
  • Know your quick-start method
  • Disable lock screen notifications

During recording:

DoDon’t
Film horizontally (landscape)Film vertically (limits usable frame)
State date, time, location verballyAssume metadata will capture it
Keep steady (brace against object if possible)Zoom excessively (causes shake, loses context)
Get wide establishing shots firstOnly capture close-ups
Record continuouslyStop and start repeatedly
Narrate quietly what you observeShout or confront agents
Capture badge numbers, plates, facesFocus only on the detained person
Stay 15-20 feet back minimumGet so close you interfere

Focus priority:

Focus the camera on the officer or agent, NOT the person being detained. Footage of the detained person can be used against them in court.

Reference: WITNESS: Eyes on Courts - Documenting ICE arrests

Audio can be as important as video:

  • Statements made by agents
  • Commands given
  • Rights violations (“You don’t have rights here”)
  • Threats or coercion

To improve audio:

  • Stay as close as safely possible
  • Avoid areas with loud background noise
  • If reading plates/badges aloud, speak clearly
  • Consider a lavalier mic if you document regularly

Photos complement video by providing:

  • High-resolution captures of plates, badges, VINs
  • Clear facial images when video is shaky
  • Documentation of evidence that might be removed

Photo technique:

  • Capture overall scene first (context)
  • Mid-range shots (relationship of elements)
  • Close-ups of specific details (plates, badges, documents)
  • Multiple angles when possible

Your recording is only valuable if it’s preserved properly and can be authenticated.

Metadata: Your Evidence’s Digital Fingerprint

Section titled “Metadata: Your Evidence’s Digital Fingerprint”

Photos and videos contain EXIF metadata including:

  • Date and time of capture
  • GPS coordinates
  • Device make/model
  • Camera settings

This metadata:

  • Proves when and where evidence was captured
  • Can authenticate your evidence in court
  • May be stripped by some apps (social media, some messengers)

Reference: CaseGuard: Digital Evidence, EXIF Data, and Law Enforcement Agencies

MethodMetadata Preserved?Notes
USB transferYesBest for forensic integrity
Email attachmentYesOriginal file attached
Signal (document mode)YesUse “Document” not “Photo”
Proton DriveYesEncrypted + metadata
Direct file copyYesOriginal file unchanged
MethodMetadata Preserved?Notes
Social media uploadNoFacebook, Instagram, Twitter strip EXIF
WhatsApp photo modeNoCompresses and strips
ScreenshotsNoCreates new file with new metadata
Editing then savingVariesDepends on software

Reference: Metadata Perspective: Camera Original Photos vs. Screenshots in Court

For critical evidence:

  • 3 copies of your data
  • 2 different storage types (phone + cloud, or phone + external drive)
  • 1 copy offsite (cloud or trusted person)
ServiceFeaturesBest For
Signal (send to self)E2E encrypted, preserves metadata as documentImmediate secure backup
ProofModeAdds verification metadata, designed for evidenceSerious documentation
Proton DriveE2E encrypted, Swiss privacy lawsSecure cloud storage
Ente PhotosE2E encrypted, open sourcePhoto backup with privacy
NordLockerAES-256 encryption, zero-knowledgeSecure file vault
iCloud (Advanced Data Protection)E2E encryption when enabledApple users who enable ADP

Reference: Guardify: How to Secure Safer Faster Access to Evidence with Cloud Storage

  1. Lock your phone immediately after recording
  2. Do NOT edit the original file
  3. Backup immediately to secure cloud
  4. Note the filename and timestamp
  5. Write down context while fresh (who, what, where, when)
  6. Get witness info with consent
  7. Secure your device (see Mobile Hardening)

AppFeaturesPlatform
ACLU Mobile JusticeAuto-upload, state-specific versions, alerts ACLUiOS, Android
ProofModeAdds verification metadata, designed for human rights evidenceAndroid
Native CameraReliable, familiar, fast to accessBoth
ToolPurposeLink
ExifToolView/edit metadata (advanced)exiftool.org
Pixel PeeperOnline EXIF viewerpixelpeeper.com
ForensicallyImage analysis29a.ch/photo-forensics
ToolPurposeLink
NHTSA VIN DecoderOfficial US government decodervpic.nhtsa.dot.gov
CARFAXVehicle historycarfax.com
VINDecoderzFree comprehensive decodervindecoderz.com

  • Maintain distance — 15-20 feet minimum
  • Have an exit route — Know how to leave quickly
  • Don’t interfere — Recording from a distance, not engaging
  • Travel with others — Safer and provides corroboration
  • Know when to stop — If directly threatened, your safety comes first
  • Use passcode, NOT biometrics — Passcodes have stronger Fifth Amendment protection
  • Enable quick-lock — Power button 5x on most phones
  • Disable 2G — Prevents Stingray surveillance
  • Consider burner device — Dedicated documentation phone
  • Encrypt everything — Full-device encryption enabled

See Mobile Hardening for complete guide.

If your phone is seized:

  • Do NOT unlock it
  • Do NOT provide passcode
  • State: “I do not consent to a search”
  • Request an attorney
  • Document who seized it and when

If ordered to delete:

  • You are NOT legally required to delete
  • Cloud backups may still exist
  • Document the demand for later complaint

Consider:

  • Does this identify the detained person? — This can harm them legally
  • Are witnesses identifiable? — They may face retaliation
  • Is there consent from community members shown?
  • Could this compromise an ongoing case?
  • Should a lawyer review first?

When sharing publicly, strip metadata to protect yourself:

  • Use ExifTool to remove all metadata
  • Many apps strip automatically (but verify)
  • Keep originals with metadata for legal purposes

When providing evidence for legal use:

  • Keep originals untouched
  • Provide chain of custody documentation
  • Share via secure, metadata-preserving methods
  • Be prepared to testify about authenticity

ResourceDescriptionLink
ICE License Plate DatabaseCommunity-compiled plate databaseThe Intercept coverage
ICE Detention LookupFind detained individualslocator.ice.gov
OrganizationWhat They AcceptContact
ACLU (local chapters)Rights violation documentationaclu.org
Immigrant Defense ProjectICE tactics documentationimmigrantdefenseproject.org
WITNESSHuman rights documentationwitness.org
National Immigration Law CenterLegal evidencenilc.org

  1. Date/Time/Location — State verbally
  2. Vehicle plates — Read aloud
  3. Vehicle VIN — Dashboard through windshield
  4. Vehicle description — Make, model, color, features
  5. Badge numbers — Read aloud if possible
  6. Agency patches — ICE, CBP, ERO, HSI
  7. Agent descriptions — Height, build, distinguishing features
  8. Actions — Use of force, statements, warrant shown?
  9. Witnesses — Names/contact with consent
  1. Lock phone immediately
  2. Backup to secure cloud
  3. Note filename and time
  4. Write down context
  5. Do NOT edit original
  6. Get witness contact info
  7. Contact attorney if needed
  • Don’t focus camera on detained person’s face
  • Don’t state anything about their immigration status
  • Don’t interfere with enforcement
  • Don’t delete footage if demanded
  • Don’t edit original files
  • Don’t share publicly without considering consequences

  • Statute of limitations on civil rights violations can be years
  • Pattern evidence requires multiple incidents documented over time
  • Policy changes may enable accountability that’s impossible today
  • Historical record matters regardless of legal outcomes
  • Eyewitness memory fades — contemporaneous documentation doesn’t

Eyewitness accounts alone are weak evidence. To create documentation that can survive legal scrutiny years later:

ElementWhy It MattersHow to Achieve
Chain of custodyProves evidence wasn’t tampered withDocument every transfer; use hash verification
Contemporaneous creationProves timingPreserve original metadata; don’t edit
CorroborationMultiple sources strengthen evidenceCoordinate with other witnesses; capture same event from multiple angles
AuthenticationProves you captured itUse ProofMode; photograph yourself at scene
Context documentationExplains what evidence showsWrite detailed notes immediately after

A cryptographic hash (like SHA-256) creates a unique “fingerprint” of a file. If even one pixel changes, the hash changes completely.

To verify file integrity:

Terminal window
# On Mac/Linux terminal:
shasum -a 256 filename.mp4
# On Windows PowerShell:
Get-FileHash filename.mp4 -Algorithm SHA256

Best practice:

  1. Immediately after capturing evidence, generate a hash
  2. Store the hash separately from the file
  3. Years later, regenerate the hash to prove the file is unchanged
StrategyProsConsBest For
Multiple cloud servicesRedundant, accessibleRequires ongoing payment; services may shut downActive documentation
Physical hard drives (multiple)No ongoing cost; no internet neededCan fail; fire/flood riskBackup copies
Archival organizationsProfessional preservation; legal expertiseMay have access restrictionsCritical evidence
Trusted individualsGeographic distributionDepends on relationshipsPersonal backup
Encrypted USB drivesPortable; offlineEasy to lose; limited capacityTransport

The 3-2-1-1-0 Backup Strategy for Critical Evidence

Section titled “The 3-2-1-1-0 Backup Strategy for Critical Evidence”

Upgrade from 3-2-1:

  • 3 copies of data
  • 2 different media types
  • 1 offsite copy
  • 1 copy air-gapped (offline, disconnected)
  • 0 errors (verify backups regularly)

Consider providing copies to organizations that maintain long-term archives:

OrganizationFocusContact
Internet ArchiveGeneral digital preservationarchive.org
Documenting Hate (ProPublica)Hate incidents and civil rightsprojects.propublica.org/hate
Human Rights Data Analysis GroupHuman rights documentationhrdag.org
WITNESS Media ArchiveHuman rights videowitness.org
University librariesAcademic preservationContact local university special collections

For each significant incident, create a complete dossier:

1. Raw Evidence

  • Original video/photo files (unedited)
  • Hash values of each file
  • Original metadata preserved

2. Written Documentation

  • Date, time, location (exact address)
  • Your name and contact information
  • Detailed narrative written immediately after
  • Weather conditions, lighting
  • How you came to witness the incident

3. Corroborating Information

  • Witness contact information (with consent)
  • Any news coverage
  • Social media posts (archived, not just screenshots)
  • Public records obtained later

4. Chain of Custody Log

  • When file was created
  • Every copy made and where stored
  • Every person who received a copy
  • Any transfers between devices

5. Context Documentation

  • Map showing your position relative to the incident
  • Photos of the location taken later
  • Research on the location (public records, satellite imagery)

Digital evidence can become unusable over time:

RiskPrevention
Format obsolescenceStore in common formats (MP4, JPEG); periodically migrate
Storage media failureMultiple copies; different media types; regular verification
Cloud service shutdownMultiple services; local backups
Password lossSecure password manager; recovery procedures documented
Organizational knowledge lossWritten procedures; multiple people know the system
ServiceFeaturesCostNotes
Backblaze B2Object Lock (WORM); immutable storageLow costPrevents deletion during retention period
Proton DriveE2E encrypted; Swiss jurisdictionFree tier availableStrong privacy protections
TarsnapEncrypted; pay-per-usePay per GBDesigned for archival

Single incidents are important, but pattern evidence is powerful. Consistently documenting over time can reveal:

  • Geographic patterns — Where enforcement concentrates
  • Tactical patterns — Methods, vehicles, timing
  • Civil rights violations — Systematic issues vs. isolated incidents
  • Policy violations — Whether stated policies are followed
  • Chain of command — Who is responsible

This requires:

  • Consistent documentation methods across time
  • Standardized reporting (use SALUTE format)
  • Database or organized storage
  • Cross-referencing with other documenters
Section titled “Preparing Evidence for Future Legal Proceedings”

If your evidence may be used in court years later:

Do:

  • Preserve originals untouched
  • Document your contemporaneous observations in writing
  • Keep records of your location and actions that day
  • Maintain contact information (yours and witnesses)
  • Be prepared to explain how you captured and stored the evidence

Don’t:

  • Edit original files (make copies to edit)
  • Rely on memory alone
  • Throw away “unimportant” footage (context matters)
  • Share originals that can’t be recovered
  • Assume someone else is documenting

Even with perfect evidence, you may need to testify. Prepare by:

  1. Keeping contemporaneous notes — Written records from the day of the incident
  2. Reviewing your documentation — Not to rehearse, but to refresh memory
  3. Understanding chain of custody — Be able to explain how evidence was preserved
  4. Documenting your own background — Why were you there? What’s your experience?
  5. Consulting with attorneys — Before any legal proceeding