
Welcome to your weekly FOIAball.
We’ve got a massive story today about the ways the Department of Homeland Security surveils college football games.
And in FOIAball Food, down at the bottom, we’re talking baking.
This story is free to read for all subscribers.
But if you’ve been enjoying FOIAball, upgrade today. We have plenty of scoops coming you don’t want to miss.
Inside DHS’s college football surveillance network

This week, Charleston’s tiny private military academy, the Citadel, travels to Ole Miss.
This game doesn’t have quite the same cachet as the Rebels' Week 11 opponent this time last year, when a one-loss Georgia went to Oxford.
A showdown of ranked SEC opponents in early November 2024 had all eyes trained on Vaught-Hemingway Stadium
Including those of the surveillance state.
According to documents obtained by FOIAball, the Ole Miss-Georgia matchup was one of at least two games last year where the school used a Department of Homeland Security information-sharing platform to keep a watchful eye on attendees.
The platform, known as HSIN, is a centralized hub for the myriad law enforcement agencies involved with security at big events.

At a game like Ole Miss-Georgia, according to an Event Action Plan obtained by FOIAball, at least 11 different departments were on the ground, from Ole Miss campus police to a military rapid-response team.
HSINs are generally depicted as a secure channel to facilitate communication between various entities.
In a video celebrating its twentieth anniversary, a former HSIN employee hammered home that stance.
“When our communities are connected, our country is indeed safer," they said.
But that nebulous framing obscures what they can actually do.
In reality, they are an integral part of the vast surveillance arm of the U.S. government.
Left unchecked since 9/11, supercharged by technological innovation, they can subject any crowd to almost constant monitoring, looping in live footage from CCTV cameras, from drones flying overhead, and from police body cams and cell phones.
They’ve worked with private businesses to ensure access to cameras across cities; they collect, store, and mine vast amounts of personal data; and they have been used to facilitate facial recognition searches from companies like Clearview AI.
It’s one of the least-reported surveillance networks in the country.
And it's been building this platform on the back of college football.
The Homeland Information Sharing Network (the acronym is pronounced Hiz-Un) system launched in the post-Sept. 11 push for inter-department communication and information openness.
Under DHS, which was granted a broad mandate to coordinate communication and oversee security, HSINs have become a widely used tool.

A recent Inspector General report found over 55,000 active accounts using HSINs, ranging from federal employees to local police agencies to nebulous international stakeholders.

The platforms host what’s called SBU, sensitive but unclassified information, including threat assessments culled from media monitoring.
They’re also sucking up reams of data
According to a privacy impact study way back in 2006, HSINs were already maintaining a database of suspicious activities and mining those for patterns.
"The HSIN Database can be mined in a manner that identifies potential threats to the homeland or trends requiring further analysis,” it noted.
Feel free to guess how that ability has grown since the flip phone era.
In an updated memo from 2012 discussing whose personal information HSINs can collect and disseminate, the list includes the blanket, “individuals who may pose a threat to the United States.”
What could that database contain about you?


Behind the scenes, HSINs are everywhere.
A 2023 DHS “Year in Review” found that HSINs averaged over 150,000 logins per month.
Its Connect platform, which coordinates security and responses at major events, was utilized over 500 times a day.
HSINs operated at the Boston Marathon, Lollapalooza, the World Series, and the presidential primary debates.

It’s extremely tight with the NFL, boasting of supporting every Super Bowl in the past dozen years.
DHS is quick to tout the capabilities of HSINs in internal communications reviewed by FOIAball.
In doing so, it reveals the growth of its surveillance scope. In documents from 2018, DHS makes no mention of live video surveillance.
But a 2019 annual review said that HSINs used private firms to help wrangle cameras at commercial businesses around Minneapolis, which hosted the Final Four that year.
“Public safety partners use HSIN Connect to share live video streams from stationary cameras as well as from mobile phones,” it said. “[HSIN communities such as] the Minneapolis Downtown Security Executive Group works with private sector firms to share live video from commercial businesses’ security cameras, providing a more comprehensive operating picture and greater situational awareness in the downtown area.”
And the platform has made its way to college campuses.
In November 2023, students at Ohio State University held several protests against Israel’s war in Gaza. At one, over 100 protesters blocked the entrance to the school president’s office.
A report that year from DHS revealed the protesters were being watched in real-time from a central command center.
Under the heading "Supporting Operation Excellence," DHS said the school used HSINs to surveil protesters, integrating the school’s closed-circuit cameras to live stream footage to HSIN Connect.

“Ohio State University has elevated campus security by integrating its closed-circuit camera system with HSIN Connect,” it said. “This collaboration creates a real-time Common Operating Picture for swift information sharing, enhancing OSU’s ability to monitor campus events and prioritize community safety.”
“HSIN Connect proved especially effective during on-campus protests, expanding OSU’s security capabilities,” the school’s director of emergency management told DHS. “HSIN Connect has opened new avenues for us in on-campus security.”
While it opened new avenues, the platform already had a well-established relationship with the school.
According to an internal DHS newsletter from January 2016, HSINs were utilized at every single Buckeyes’ home game in 2015.
“HSIN was a go-to resource for game days throughout the 2015 season,” it said.
It highlighted that data was being passed along and analyzed by DHS officials.
The newsletter also revealed HSINs were at College Football Playoff games that year and have been in years since.
There was no mention of video surveillance at Ohio State back in 2015. But in 2019, that capability was tested at Georgia Tech.
There, police used “HSIN Connect to share live video streams with public safety partners.”
A 2019 internal newsletter quoted a Georgia Tech police officer about the use of real-time video surveillance on game days, both from stationary cameras and cell phones.
“The mobile app for HSIN Connect also allows officials to provide multiple, simultaneous live video streams back to our Operations Center across a secure platform,” the department said.
Ohio State told FOIAball that it no longer uses HSINs for events or incidents. However, it declined to answer questions about surveilling protesters or football games.
Ohio State’s records department said that it did not have any documents relating to the use of HSINs or sharing video feeds with DHS.
Georgia Tech’s records office told FOIAball that HSINs had not been used in years and claimed it was “only used as a tool to share screens internally."
Its communications team did not respond to a request to clarify that comment.
Years later, DHS had eyes both on the ground and in the sky at college football.
According to the 2023 annual review, HSIN Connect operated during University of Central Florida home games that season.
There, both security camera and drone detection system feeds were looped into the platform in real-time.

DHS said that the "success at UCF's football games hints at a broader application in emergency management.”
Like potentially using live feeds to run instant facial recognition searches.
A 2024 report from the U.S. Commission on Civil Rights found that the U.S. Marshals were granted access to HSINs, where they requested "indirect facial recognition searches through state and local entities" using Clearview AI.
Which brings us to the Egg Bowl.
FOIAball learned about the presence of HSINs in Oxford through a records request to the city’s police department. It shared Event Action Plans for the Rebels’ games on Nov. 9, 2024 against Georgia and Nov. 30, 2024 against Mississippi State.
It’s unclear how these partnerships are forged.
In videos discussing HSINs, DHS officials have highlighted their outreach to law enforcement, talking about how they want agencies onboarded and trained on the platform.
But it’s possible schools can reach out to request assistance. No schools answered questions about how their relationship with DHS started.
The Event Action Plan, which FOIAball is choosing not to disclose in its entirety, provides a fascinating level of detail that shows what goes into security planning for a college football game, from operations meetings that start on Tuesday to safety debriefs the following Monday.
Its timeline of events discusses when Vaught-Hemingway Stadium is locked down and when security sweeps are conducted.
Maps detail where students congregate beforehand and where security guards are posted during games.
The document includes contingency plans for extreme heat, lightning, active threats, and protesters. It also includes specific scripts for public service announcers to read in the event of any of those incidents.
It shows at least 11 different law enforcement agencies are on the ground on game days, from school cops to state police.

They even have the U.S. military on call. The 47th Civil Support Team, based out of Jackson Air National Guard Base, is ready to respond to a chemical, biological, or nuclear attack.
All those agencies are steered via the document to the HSIN platform.
Under a section on communications, it lists the HSIN Sitroom, which is “Available to all partners and stakeholders via computer & cell phone.”
The document includes a link to an HSIN Connect page.
It uses Eli Manning as an example of how to log in.
“Ole Miss Emergency Management - Log in as a Guest and use a conventional naming convention such as: ‘Eli Manning - Athletics.’”

On the document, it notes that the HSIN hosts sensitive Personally Identifiable Information (PII) and Threat Analysis Documents.
“Access is granted on a need-to-know basis, users will need to be approved prior to entry into the SitRoom.”
Sadly, you cannot join.
“The general public and general University Community is not permitted to enter the online SitRoom. All SitRooms contain operationally sensitive information and PII, therefore access must be granted by the ‘Host’.”
It details what can be accessed in the HSIN, such as a chat window for relaying information.
It includes a section on Threat Analysis, which DHS says is conducted through large-scale media monitoring.

The document does not detail whether the HSIN used at Ole Miss has access to surveillance cameras across campus.
But that may not be something explicitly stated in documents such as these.
Like Ohio State, UCF told FOIAball that it had no memoranda of understanding or documentation about providing access to video feeds to HSINs, despite DHS acknowledging those streams were shared.
Ole Miss’ records department also did not provide any documents on what campus cameras may have been shared with DHS.
While one might assume the feeds go dark after the game is over, there exists the very real possibility that by being tapped in once, DHS can easily access them again.
“I’m worried about mission creep,” Matthew Guariglia, a senior policy analyst at the Electronic Frontier Foundation, told FOIAball. “These arrangements are made for very specific purposes. But they could become the apparatus of much greater state surveillance.”
For Ole Miss, its game against Georgia went off without any major incidents.
Well, save for one.

During the second quarter, a squirrel jumped onto the field, and play had to be stopped.
In the EAP, there was no announcer script for handling a live animal interruption.
Enjoyed this scoop?
Become a paid FOIAball subscriber for $1
Baking isn’t about succeeding. It’s about avoiding failure.

I recently (randomly, as one does) followed a TikToker whose whole premise is proving baking is easy.
He’s right and he’s wrong. But really, he’s teaching a lesson I don’t think he realizes.
The premise is that baking is just following instructions. therefore, success is guaranteed.
Which, well… you only have to take one look at society to know that axiom is entirely bunk.
Some flour is randomly more absorbent, some yeast less exuberant. And unless you log the atmospheric conditions of your kitchen every night, no recommended rise time is right.
But in doing it repeatedly, by trying lots of different recipes and techniques, you’ll understand how to avoid complete catastrophes.
And then you can go on TikTok and claim you are God.

This guy…
This brings me to last Sunday and FOIAball’s annual New York City marathon party. We’re early on the route, so we kick off at 8:30 a.m. Every year, I make homemade donuts. They’ve become such a tradition, I can’t stop now.
This year, I was certain I was going to serve something entirely inedible.
I’ll admit, it was my own fault. I spent Saturday at a bar watching Georgia-Florida and returned home extremely unmotivated.
The recipe I use calls for first melting together milk and Crisco. Not wanting to dirty too many dishes before a party, I eyeballed the milk and used a spoon to excavate an approximate glob of shortening.
I skipped blooming the yeast, dumping it directly onto eggs I cracked right into the mixing bowl, neglecting to beat them together first.
I added some tap water and shook sugar on top of it all.
The recipe calls for weighing and adding flour in stages. And if pre-beating eggs was too much work, buddy, that certainly wasn’t happening.
It didn’t help that I lost track, very early on, of how many cups I dumped in. At some point, I said “oh, well” and fired the mixer up.
It looked terrible.
But here’s the real big secret. Millions of people baked prior to the advent of measuring cups and written directions and probably even the concept of numbers.
Bread didn’t appear as mathematical perfection. It was just goo hardened by heat.
You can bake entirely vibes. I felt the dough was too thin, so I added more flour. Not much, just like a half-cup. Then I added more sugar to balance it.
It still looked rough. But not wanting to beat it up more, I turned off the mixer and did some stretch and folds. Those will help make your dough develop better cohesion without making it too dense.
Most of the time. Here, I wanted to dump it in the trash. But tradition is tradition. So I socked it in the fridge and went to bed.
The next day, it had swelled up, but lacked any coherent structure, a vat of jiggly plasma. And people were already smashing our buzzer.
I dumped it on a heavily floured cutting board and did a few extra kneads, hoping it would hold together. I rolled it out as best I could, every spot sticking. I lifted, I dusted. It still stuck.
The dough was too wet to cut through cleanly.

The rings didn’t hold shape, sagging as I moved them to a baking sheet to proof. Which they promptly stuck to.
When I tossed them in the oil, they puffed up too fast. Cooked too quick. My glaze was way too thin.

Dejectedly, I served them.
And naturally, everyone loved them. They were light, airy, ethereal. The same dough I despised came through in the end.
This is not to brag (only a little).
It is to say that yes, baking is hard, but it’s never unsolvable. It just requires learning from your mistakes. All those times you think you’re screwing up, you’re banking knowledge about how to salvage any project. You’re realizing where instructions are lacking. You’re discovering that five minutes on high won’t get your dough to pass any windowpane test.
But the worst home-baked good is still better than anything store-bought.
So try something you know you’ll horribly botch. Before you do it, pledge to make it again. If you do that, I can’t promise it will be easy, but I can guarantee it will work out in the end.
The recipe is here (from Alton Brown). Use fresh nutmeg. That’s the actual secret.
