OUR
PROPERTY PAPERS PEOPLE POWER
FEDERAL LIMITS
FEDERAL LIMITS
Due process isn't optional

YOUR REPRESENTATIVES SHOULD HEAR FROM You

Mayors State Legislature Congress Vice/President
Learn More

Our Property

Homes, farms, businesses, vehicles, devices, and public facilities—plus the money that maintains them.

Fiscal Neutrality

Our property and budgets are not free federal capacity—any use is contracted, paid upfront, and consented to under state rules.

Key Asks

  • Full-cost advance reimbursement for any state/local labor, equipment, or space
  • Facility + equipment use bans without written state contract
  • Surety bond requirement for joint ops risking property damage
  • Contractor parity: vendors can't donate "backdoor" access
  • Penalties + fee shifting for unauthorized resource use

In Practice

A federal task force asks to stage out of a county building and use county vehicles—state law requires a paid contract + bond; absent that, access is denied and logged.

Data Sovereignty

Property-related telemetry—ALPR hits, utility records, device identifiers—can't be quietly repurposed into surveillance.

Key Asks

  • Ban sale/sharing of utility/location/telemetry data to brokers
  • Restrict ALPR retention + prohibit real-time feeds without warrants
  • No "voluntary" device handovers absent judicial process
  • Vendor restrictions on cameras/sensors on public property
  • Audit logs for any property-linked datasets

In Practice

A private ALPR vendor offers a "free" camera network to a town—state policy blocks it unless data stays local, retention is short, and access is warrant-gated.

Judicial Primacy

No entry, seizure, damage, or intimidation around property happens with state help unless a local judge authorizes it.

Key Asks

  • Warrant required for state/local participation in entries/searches/seizures
  • Ban honoring administrative warrants/detainers as substitutes
  • Mandatory bodycam + identification rules in joint ops
  • Written documentation of legal authority for any property action
  • Suppression/penalty provisions for violations

In Practice

A federal agent asks a local officer to "just knock and look around" a business—officer must decline absent a judge-signed warrant.

Protected Locations

Property that anchors civil life—schools, hospitals, worship, polling places—plus nearby perimeters are protected zones.

Key Asks

  • Protected locations + buffer zones with heightened standards
  • Ban civil enforcement staging on/near protected sites
  • Damage liability + rapid repair fund for protected institutions
  • Election facilities: perimeter protections + equipment custody
  • Notice + reporting requirements for any approved operation

In Practice

Civil enforcement wants to set up a checkpoint near a hospital entrance—state rules prohibit cooperation and facility access.

Personnel Protection

Property protections fail if employees can be bullied into unlocking doors, giving keys, or providing access.

Key Asks

  • Immunity + state-funded counsel for refusing improper access requests
  • Anti-retaliation protections (job/pension/credential)
  • "No keys, no codes" rule: no assistance without warrant + authorization
  • Mandatory incident reporting to AG/Inspector General
  • Training + written SOPs for frontline staff

In Practice

A school admin is pressured to provide camera access—state law protects refusal and requires reporting the pressure.

Citizen Enforcement

If property is damaged, seized, or accessed unlawfully, citizens and businesses can sue—quickly, cheaply, with real penalties.

Key Asks

  • Private right of action for unlawful entry/seizure/damage
  • Statutory damages (base + willful multipliers) + fee shifting
  • Whistleblower bounties for proof of improper access
  • Safe harbor for good-faith employee compliance
  • Public accountability registry for repeat violators

In Practice

A business owner's cameras are accessed without authority—owner sues under state statute and recovers damages + attorneys' fees.

Our Papers

Identity, records, communications, and digital life: personal, business, and state systems.

Fiscal Neutrality

Data extraction is labor and risk—no free processing, no free APIs, no free compliance work for outside requests.

Key Asks

  • Cost schedule for record production, compute, and staff time
  • Advance payment requirement for non-emergency requests
  • Deny "bulk" requests unless narrowly scoped and paid
  • No data-sharing contracts without appropriation
  • Vendor pass-through charges banned unless state-approved

In Practice

A federal office requests bulk DMV exports—state replies with scope limits + cost invoice + warrant requirement.

Data Sovereignty

Our records aren't a product line; no brokered dossiers, no vendor side channels, no stealth surveillance.

Key Asks

  • Data broker bans for state-origin data + procurement prohibitions
  • Vendor compliance: audit rights, deletion, encryption, breach penalties
  • Limits on biometrics, face recognition, ALPR, geofencing
  • Purpose limitation + minimization across agencies
  • Prohibit "shadow copies" and secondary uses by contractors

In Practice

A contractor retains "analytics copies" of state data—policy requires deletion, audit proof, and penalties.

Judicial Primacy

Records move only under a local judge's signature—administrative requests don't cross the threshold.

Key Asks

  • Warrant/subpoena standards requiring probable cause
  • Strict rejection of administrative warrants/detainers
  • Judicial warrant must specify dataset, time range, minimization
  • Logging + notice rules where legally permitted
  • Court-validated emergency exception with after-the-fact review

In Practice

An agency receives an "informal request" for phone subscriber info—policy requires warrant and logs the denial.

Protected Records

Certain records—education, health, elections, worship—are "civil society papers" with heightened protection.

Key Asks

  • Heightened standards for school/health/election data
  • Voter roll firewall: no use for civil enforcement targeting
  • Hospital/clinic data restrictions and strict access controls
  • Poll worker + election official privacy protections
  • Safe access for reporters/observers documenting public events

In Practice

A request targets a list of people who visited a clinic—state denies absent heightened judicial findings.

Personnel Protection

Clerks, IT staff, and custodians of records must be safe to say "no" and route everything through process.

Key Asks

  • Immunity + defense for good-faith refusal of improper requests
  • Ban employment retaliation for following disclosure SOP
  • Central legal hotline for record custodians
  • Tamper-evident logging and penalties for "off-book" queries
  • Training certification for handling sensitive requests

In Practice

A database admin is pressured to run an "off the record" search—law protects refusal and penalizes the request.

Citizen Enforcement

If your data is accessed, sold, or misused, you can enforce the rules directly.

Key Asks

  • Private right of action for unlawful access, retention, sale, sharing
  • Statutory damages per record/per day for willful violations
  • Fee shifting + injunctive relief
  • Whistleblower bounties for vendor/staff proof of misuse
  • Safe harbor for employees following disclosure SOP

In Practice

A company buys state-derived data from a broker—citizens sue under state statute and force deletion + penalties.

Our People

Residents, customers, workers, students, patients, and public servants.

Fiscal Neutrality

Local budgets exist to serve residents—not to bankroll actions that chill public life or harm local communities.

Key Asks

  • Ban unfunded cooperation that diverts staff from core services
  • Require reimbursement for time on outside enforcement requests
  • Prohibit using social services staff as enforcement auxiliaries
  • Budget transparency: itemize cooperation costs publicly
  • Service continuity mandates during high-demand periods

In Practice

A county is asked to hold people longer without compensation—policy requires paid agreement or refusal.

Data Sovereignty

People shouldn't be targeted through data exhaust—especially workers and customers just living normal life.

Key Asks

  • Ban purchase/use of brokered personal data for targeting
  • Limits on workplace surveillance integrations
  • Restrict real-time location tracking absent warrant
  • "Sensitive class" protections (students, patients, voters)
  • Anti-profiling technical rules (minimization, retention)

In Practice

A business is pressured to share customer lists—state rules prohibit coercion and brokered end-runs.

Judicial Primacy

People get due process locally; state cooperation only follows a judge's order that meets clear standards.

Key Asks

  • Warrant requirement for participation in civil enforcement arrests
  • Reject administrative warrants/detainers without judicial findings
  • Identity + badge-number disclosure for joint actions
  • Mandatory documentation of requests + legal basis
  • Court review for emergency exceptions

In Practice

A jail receives a detainer—policy requires judicial warrant; absent it, the person is released on schedule.

Protected Activities

People must be able to vote, learn, heal, worship, and access courts without fear.

Key Asks

  • Protected activities + locations + time windows
  • Non-interference rules for elections, schools, hospitals, worship
  • Witness/complainant protections for courthouse access
  • "Safe reporting" for crimes/emergencies without data traps
  • Public signage + staff protocols to reduce intimidation

In Practice

A victim avoids reporting a crime out of fear—safe reporting protocols keep service access separate from enforcement cooperation.

Personnel Protection

Public workers and private compliance staff must be protected when they refuse improper cooperation.

Key Asks

  • Legal defense + indemnification for public employees
  • Protections for regulated professionals (nurses, teachers)
  • Anti-retaliation + whistleblower protections
  • Subpoena challenge authority centralized in AG
  • Clear SOPs so staff don't improvise under pressure

In Practice

A hospital admin is threatened for refusing a data handover—AG intervenes and state covers defense.

Citizen Enforcement

People can directly enforce the rules when intimidation, retaliation, or unlawful cooperation happens.

Key Asks

  • Private right of action for retaliation, intimidation, unlawful cooperation
  • Statutory damages + multipliers for willful conduct
  • Fee shifting to enable ordinary people to sue
  • Whistleblower bounties for documenting pressure campaigns
  • Safe harbor for employees who followed lawful SOP

In Practice

A public employee is punished for refusing unlawful cooperation—employee sues, recovers damages, and gets reinstatement.

Your Power

Coordination, deterrence, and accountability that survives politics: state capacity + citizen capacity.

Budget Control

Power starts with budget control: we choose what we fund, what we bill for, and what we refuse to subsidize.

Key Asks

  • Uniform reimbursement laws across agencies
  • Advance payment + bond requirements for risky operations
  • Spending transparency dashboards on cooperation costs
  • Procurement bans for noncompliant vendors
  • Liability allocation clauses in any permitted agreements

In Practice

A federal agency wants ongoing support—state requires paid MOU and publishes the cost ledger.

Data Perimeter

Power in the 21st century is informational—so we harden the state's data perimeter and starve the broker market.

Key Asks

  • Statewide privacy baseline with strict enforcement
  • Broker ban + private enforcement + vendor audit regime
  • Data segmentation to prevent cross-agency fusion misuse
  • Security standards + breach penalties
  • Independent compliance audits with public summaries

In Practice

A broker ecosystem collapses in-state; other states adopt aligned rules, closing regional loopholes.

Local Courts

Power is constrained by law: the gavel stays local and process stays visible.

Key Asks

  • Clear statutory definitions: judicial vs administrative warrants
  • Mandatory reporting of all requests and outcomes
  • Court rules for warrants involving sensitive categories
  • Remedies: suppression, penalties, injunctive relief
  • Oversight bodies tasked with compliance audits

In Practice

A pattern of improper requests is documented; courts and AG obtain injunctions based on the reporting trail.

Civil Society

Power protects civil society by keeping "green zones" intact—so participation doesn't collapse under fear.

Key Asks

  • Protected-location statutes with enforceable boundaries
  • Election integrity protections (facilities, workers, data)
  • Healthcare access protections (non-interference rules)
  • School safety protocols (no cooperation pathways on campus)
  • Emergency exceptions narrowly defined and reviewable

In Practice

During an election window, heightened protections prevent intimidation near polling places and keep turnout stable.

State Defense

Power requires loyal execution: we protect the people who implement state policy from coercion and ruin.

Key Asks

  • State defense fund + mandatory representation for covered staff
  • Anti-retaliation enforcement + reinstatement remedies
  • Subpoena/compulsion response unit in AG office
  • Training + certification + hotline
  • Documentation requirements for all external pressure

In Practice

Coordinated pressure is attempted across agencies; documentation triggers AG action and coalition support.

Interstate Coalition

Power multiplies when states move together: shared standards, shared funds, shared litigation, shared timing.

Key Asks

  • Tiered alignment: MOU → model law → compact
  • Joint defense + rapid-response litigation fund
  • Coordinated "trigger event" playbooks
  • Unified vendor and broker standards
  • Coordinated congressional + public oversight

In Practice

15 states adopt aligned rules; pressure tactics fail because targets can't be isolated.

How Protected Is Your State?

Click any state to explore. 12 consensus checks. Primary sources required.

Section 287(g)
What You Don't Know
The Official Story
"Cooperation Between Local and Federal Law Enforcement"

That's what they call it.

287(g) agreements are described as "partnerships" that allow local law enforcement to "assist" with immigration enforcement.

The language is administrative. Bureaucratic. Boring by design.

It isn't.

The Fine Print
How the Agreements Work
Your officers become federal agents.
Not "assistants." Not "partners." They operate under federal command.
Your county absorbs the risk.
ICE reimburses some costs. But overtime gaps, legal liability, administrative burden, and jail upkeep? That's on taxpayers.
Your sheriff signs alone.
No county commission. No public hearing. No voter consent.
The Incentive
Some Sheriffs Profit.

"Guaranteed minimum" contracts pay for every bed — full or empty.

When detention becomes revenue,
who gets detained?

The Numbers
This Isn't Policy. It's Infrastructure.

135 counties had 287(g) agreements in January 2025.

By January 2026:

1,372
Counties under federal deputization
135
1,372

916% growth in twelve months.

Follow the Money
Ten Years of ICE Budgets
+190% in one year
'16 '18 '20 '22 '24 '25
$6B
2016
$29B
2025

Border crossings are down 56% from peak.

Meanwhile
The Arsenal is Already Here

$7.4 billion

in military equipment transferred to local police.

Free. Since 1997.

The 1033 Program.

287(g) added authority.

History
Why This Matters:
Posse Comitatus

In 1878, Congress passed the Posse Comitatus Act.

The law prohibits the use of the U.S. military for domestic law enforcement.

Why? Because a military force deployed against the domestic population,
answerable only to the Executive, is the definition of tyranny.

For 148 years, this law has been a firewall.

The Loophole
Hidden Identity. Federal Authority.
The Military Can't
Deploy domestically
Raid homes & workplaces
Arrest civilians
Answer only to the Executive
287(g) Officers Can
Deploy domestically
Raid homes & workplaces
Arrest civilians
Answer only to the Executive

1372 counties and growing.

Tens of thousands of officers.

Zero congressional appropriation.

Little judicial review.

Answerable to one person.

This system will outlast:
This president
This Congress
This Supreme Court
Your ability to predict who comes next
Your County
This Isn't About Immigration
Who signed for your county?
Did you vote on it? Were you consulted?
What happens when this targets someone else?
The mechanisms don't specify nationality. They specify federal priorities.
What is the limiting principle?
If local police can be federalized without your consent, what else can they do?
"He has kept among us, in Times of Peace, Standing Armies without the consent of our Legislatures." — Declaration of Independence, 1776
What Now?
One person screaming is noise. One thousand, coordinated, is pressure. One million, sustained, is power.
This is how we organize.
Your Move
2026 We organize.
2028 We flip seats.
2030 We pass protections.
2035 Federal Limits restored.
The next decade starts with you.
The Target

State law.

That's where the power is. That's where we push.

Your First Action

Step one: Tell them you're watching.

Your state legislators. Your members of Congress.

One message. That's all it takes to start.

The Numbers Game
One message: noted.
Ten messages: a concern.
A hundred messages: a problem they have to address.
We help you be part of the hundred.
Your Community

Politics is local.

Your state. Your district. Your community.

Find the people fighting alongside you.

Your Power

Politicians care about one thing: staying in office.

We make Federal Limits a voting issue.

Support the champions. Primary the blockers.

The Wins

Every win builds the next.

One state passes protections others follow.
One rep flips others take notice.

Momentum is real. We're building it.

Click or tap to continue
Federal Enforcement Timeline
ICE daily arrests, Jan 2025 – Jan 2026
73K Detention Pop.
+84% vs Jan 2025
Click any bar to see that month's events
Updated 01/31/26
DC

-

-

Make Your Voice Heard

"Your concerns. Your words. Their inbox."

2 min
To complete
YOUR
Email (no account)
ALL
Your representatives
Start Now

Stay Informed

History, current events, and deep dives

Featured

Why This Approach: Due Process Without Partisanship

Constitutional protections work best when they're framed as core American values, not political talking points.

Read More →
Recent

Anti-Commandeering: The Constitutional Doctrine Protecting States

From Printz to Murphy — how the Supreme Court established limits on federal power.

Read More →
Deep Dive

The Data Broker Loophole: How Surveillance Bypasses State Laws

When states protect their databases, agencies buy the same data from private vendors.

Read More →
Grade D

1 Select Issues

2 Recipients

3 Preview & Send

Helps us track message volume, geographic engagement, issue priorities, and detect spam abuse. We never see replies.
📬 Stay Updated