Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsICE Agents Are ‘Doxing’ Themselves
ICE Agents Are ‘Doxing’ Themselves
Cybersecurity

ICE Agents Are ‘Doxing’ Themselves

•January 22, 2026
0
WIRED (Security)
WIRED (Security)•Jan 22, 2026

Companies Mentioned

LinkedIn

LinkedIn

Why It Matters

The episode underscores how readily available public data can expose law‑enforcement personnel, challenging DHS’s doxing narrative and prompting policy debates on privacy, security and transparency.

Key Takeaways

  • •ICE List compiles data from public LinkedIn profiles.
  • •DHS labels such disclosures as illegal doxing.
  • •Wired found 90% of entries cite LinkedIn sources.
  • •Data brokers OpenPayrolls and SignalHire feed the wiki.
  • •Debate intensifies over agent privacy versus public transparency.

Pulse Analysis

The ICE List wiki illustrates a growing phenomenon: open‑source intelligence (OSINT) can be weaponized without hacking or leaks. By aggregating LinkedIn bios, payroll disclosures from OpenPayrolls and profiles harvested by SignalHire, volunteers have built a searchable directory that mirrors official agency rosters. While the site omits home addresses, the sheer volume of self‑reported details—career histories, certifications, and even personal aspirations—makes it possible to identify agents with a few clicks, blurring the line between public record and doxing.

DHS’s response frames the issue as a security threat, warning that exposing ICE officers jeopardizes their families and justifies measures such as mandatory mask‑wearing. The department’s rhetoric has escalated to threats of prosecution for perceived doxxers, despite evidence that most information is voluntarily posted online. This stance raises legal questions about the definition of doxing, the limits of First Amendment protections, and the practical enforceability of blanket bans on publishing publicly sourced data.

The broader implication for both the public and private sectors is a reassessment of employee digital footprints. Companies and federal agencies are now urging staff to adopt stricter social‑media guidelines, while data‑broker platforms face scrutiny over how their services facilitate large‑scale profiling. As OSINT tools become more sophisticated, organizations must balance transparency with operational security, crafting policies that protect personnel without stifling legitimate public information access.

ICE Agents Are ‘Doxing’ Themselves

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...