Recent revelations have exposed the personal details of thousands of Americans who applied for job positions on Capitol Hill due to a significant security failure involving the House Democrats’ Official Online Resume Bank, known as DomeWatch.us. This unprotected online database inadvertently left sensitive applicant information accessible to the public.
The breach was uncovered by the research firm Safety Detectives, following a report from an anonymous cybersecurity expert regarding an unsecured, unencrypted, and non-password-protected database containing over 7,000 applicant records.
Sensitive Information at Risk
On October 27, 2025, the breach came to light, revealing extensive personal information of individuals applying for roles within Democratic Members’ offices and committees. The exposed data comprises Personally Identifiable Information (PII), including names, phone numbers, email addresses, and even security clearance statuses. This lapse heightens the risk of both fraud and targeted cyberattacks. Additionally, the records revealed applicants’ political affiliations, home states, military backgrounds, and professional experience with Congress.
An alarming aspect of the database was the documentation of 469 individuals with “top secret” federal security clearances. Political affiliation analysis indicated that a significant majority of the applicants, approximately 6,300, identified as members of the Democratic Party, in stark contrast to the 17 listings for the Republican Party and 265 for Independents or Others.
The database also contained hyperlinks directing to Google Forms and various shared documents. Interestingly, many records bore timestamps from 2024–2025, which contradicts the stated policy of DomeWatch, where resumes are claimed to be archived after 90 days.
Swift Action and Future Concerns
According to a blog post by Safety Detectives, the issue was promptly communicated to the domain’s registration and technical contacts, leading to immediate restriction of public access to the database. The response from these contacts was succinct, simply acknowledging the situation.
This kind of exposure presents a significant threat, especially as many affected individuals have military or governmental backgrounds, making them potential targets for criminals leveraging the detailed information for various malicious activities, including impersonation and sophisticated phishing scams.
Furthermore, with the escalation of AI-driven tools capable of creating deepfake audio, the risk of social engineering attacks increases, enabling criminals to potentially manipulate those with access to sensitive government systems.
The investigation conducted by Safety Detectives did not attribute any misconduct to DomeWatch but aimed to highlight pressing concerns regarding data protection and the essential need for better security measures in handling personal information.

