ICE Agents Are Revealing Their Own Information Online

Personal Data Leak Compromises Nearly 4,500 DHS Employees

A website known as ICE List gained significant attention last week after its founders claimed to have leaked personal information on approximately 4,500 employees of the Department of Homeland Security (DHS). However, a detailed analysis by WIRED has raised concerns about the validity of this claim, revealing that much of the data appears to originate from information that individuals identified as DHS employees have publicly shared online.

This situation arises during a period when the DHS has condemned the public exposure of ICE personnel’s identities as “doxing.” The agency has already indicated its intent to pursue legal action against those deemed responsible for such acts. The conflicting narratives highlight the ongoing tension between transparency efforts and the privacy concerns of federal employees, particularly in agencies like ICE.

ICE List functions similarly to a crowdsourced wiki, where volunteer contributors can add individuals and verify their affiliations at their discretion. Unlike Wikipedia, ICE List maintains a distinct focus on individuals connected to federal agencies, although not every entrant aligns with its intended scope. A notable example is Enrique Tarrio, a former leader of the Proud Boys, who is incorrectly categorized as an ICE agent despite DHS clarifications stating he does not work for the agency.

Dominick Skinner, the administrator of ICE List, contends that the platform does not engage in doxing since it refrains from publishing sensitive information such as home addresses. On the website, it explicitly outlines policies against false submissions and harassment. Skinner argues that if the act of exposing publicly available information constituted doxing, then merely existing in online spaces would also fall under that label, a notion he finds absurd.

An examination of the individuals listed under ICE List’s “Agents” category as of January 22 indicated that nearly 90 percent of profiles linked to LinkedIn as a credible source. However, many of those links were either inactive or did not substantiate the claims made within the wiki. This inconsistency raises questions about the reliability of the information being perpetuated on the site.

Profiles identified as belonging to ICE officers largely consist of standard professional posts, with many users sharing commonplace updates that do not necessarily imply illegal or unethical conduct. The lack of robust verification mechanisms begs further scrutiny regarding how effectively the platform filters misinformation.

As of now, the DHS has not responded to inquiries about the matter, leaving the implications of this apparent data breach open to interpretation. Some pages listed on ICE List refer to sources like OpenPayrolls and SignalHire, sites that offer public employee data, although these entities maintain no connection to ICE List itself. OpenPayrolls has stated its compliance with transparency laws, while SignalHire, whose information also appears on the site, did not provide a comment regarding its association with the ongoing developments.

This incident exhibits potential tactics associated with the MITRE ATT&CK framework, suggesting that initial access methods may have involved scraping publicly available data across social media platforms and professional networks. Meanwhile, the proliferation of unconfirmed information on the ICE List site illustrates challenges tied to persistence and misinformation in digital environments. Failures in verifying data accuracy can further exacerbate the risks of privacy violations within governmental agencies, prompting necessary conversations about employee protections and cybersecurity protocols in the digital age.

Source