Someone used a tool called FileScan.io to check if our website is dangerous. That tool guessed that our site *might* be “suspicious” — like a scam or a trick. But that’s just a guess, not proof.
So, we double-checked using a much bigger tool called VirusTotal . It uses 90+ security companies to test websites — like a giant team of digital watchdogs. All of them agreed: our site is safe. No malware. No scams. No trickery.
FileScan didn’t find anything bad — it just got confused. It flagged our site because:
These are all totally normal things for websites that help people share or take action. But FileScan's robot might not know that.
Here’s what we do to protect your privacy and safety:
Just like a smoke detector can go off from burnt toast, some website scanners give “false alarms.” That’s why it’s important to double-check using more than one tool.
Not every red flag means danger — sometimes, it just means “let’s look closer.” And that’s what we did.
If you still have questions or want to learn more, feel free to contact us.
Mitigation | Effectiveness |
---|---|
Use strong encryption (with user-held keys) to make seized data unreadable. | âś… |
Host outside the U.S. only if the provider has no U.S. legal presence. | ⚠️ |
Store only what you absolutely need — no data, no seizure. | ✅ |
Prefer local-first and open-source tools to avoid cloud exposure. | âś… |
Legal safeguards like SCCs and the DPF help with GDPR compliance but do not stop U.S. surveillance.
If it’s hosted in the U.S., assume it can be accessed. Encrypt or limit what you store.
ICE Tea Watch is a community tool built to protect, not to surveil. We believe in radical transparency — that means you deserve to know what data we collect, why, and how it’s used.
Media is never shown publicly. Only verified community partners can review reports. EXIF data is stripped.
Want to verify everything for yourself? Browse the source, open an issue, or contribute.
View on GitHub🛡️ Reports are anonymous. We don’t store your name, phone, or IP.
export type ReportFormData = { agency_type: string[]; agency_other: string; location: { lat: number; lng: number; } | null; media_url: File | null; officer_moving?: boolean; officer_direction?: | 'North' | 'NorthEast' | 'East' | 'SouthEast' | 'South' | 'SouthWest' | 'West' | 'NorthWest'; lights_on?: boolean; sirens_on?: boolean; };
This is what your device creates when you fill out the report form. No personal info is included.
export type Report = { id: string; agency_type: string[]; agency_other: string; location: { lat: number; lng: number; }; media_url: string | null; timestamp: string; // ISO officer_moving?: boolean; officer_direction?: | 'North' | 'NorthEast' | 'East' | 'SouthEast' | 'South' | 'SouthWest' | 'West' | 'NorthWest'; lights_on?: boolean; sirens_on?: boolean; };
This is the final format saved in our secure Supabase database.
We collect officer movement, direction, and emergency signal use to help contextualize agency behavior and build better patterns for community safety. These are optional, and no identifying info about users is stored.
On desktop, right-click → Inspect → Network tab → look for a POST to /api/report. This shows you exactly what’s being sent.
Want to verify on mobile? Try using HTTP Toolkit. HTTP Toolkit.