(UNITED STATES) A hacker group calling itself The Com has released what it claims is a massive trove of personal information on federal law enforcement officials, exposing hundreds of names and contact details tied to immigration enforcement at the Department of Homeland Security and the Department of Justice. The leak, confirmed as authentic by 404 Media, includes data on 680 DHS employees, more than 190 DOJ officials, and email addresses of 170 FBI employees.
The doxing, posted to Telegram over recent days, arrives during a period of intense federal operations that has seen masked ICE and DHS teams deployed in several U.S. cities under the Trump administration. The leaked files list names, office locations, and in some cases home addresses, raising sharp questions about safety, privacy, and accountability for agents tasked with carrying out immigration enforcement.

The Com paired the release with threats of more disclosures and repeated unverified claims about Mexican cartels placing bounties on federal agents. As of October 17, 2025, there has been no public comment from President Trump’s team on the breach.
Advocates and critics alike agree the doxing could increase the risk of harassment and real-world harm. Unmasking government workers connected to arrests, raids, and detention decisions has long been a flashpoint in the immigration debate. According to analysis by VisaVerge.com, past naming efforts have triggered both internal security reviews and calls in Congress for tougher penalties against people who publish identifying details of federal agents.
Scope of the leak and immediate fallout
404 Media reported it verified the leaked dataset’s authenticity. The Com framed the release as a response to stepped-up federal enforcement, including the continued use of masks by ICE and DHS personnel.
The Trump administration has defended masked deployments, citing a reported 1,000% rise in assaults on ICE agents since January, based on DHS data. While that figure remains contested by outside researchers, it has become part of the government’s public safety rationale.
The group also hinted at future releases, mentioning the Internal Revenue Service as a possible next target. The messages referenced cartels and bounties without evidence, a tactic that security experts say can heighten fear and draw attention to otherwise routine data leaks.
Federal agencies have not confirmed whether any agents have faced threats linked to this incident.
The practice of doxing—publicly sharing private information without consent—has grown more common in politically charged areas of immigration policy. In recent years, independent researchers and activists have built databases of ICE personnel using court filings, LinkedIn, and public videos. Some projects say they avoid home addresses and direct contact details. Others have pushed further, arguing that public interest in government power outweighs individual privacy claims.
Key immediate facts
- What’s in the leaked data:
- Names and office locations of hundreds of DHS and DOJ employees
- Home addresses in some records
- Emails for 170 FBI employees
- Telegram posts from The Com touting further leaks
- What’s not yet clear:
- Whether all posted addresses are current or complete
- Whether any agents have been targeted following the leak
- What steps, if any, the administration has taken to mitigate risks
The Com’s release arrives as some activist projects report using artificial intelligence to match masked agents’ faces from public footage to social media accounts. Those efforts claim to focus on public-interest disclosure while avoiding personal addresses. Still, the line between exposure and risk can blur fast once data spreads across forums and mirrors.
A growing clash: anonymity vs. public accountability
The new disclosures widen a long-running fight over whether federal agents engaged in arrests, removals, and detention should be shielded from public view.
Supporters of disclosure argue the public has a right to know who enforces policies that can separate families or send asylum seekers back to danger. They say transparency is essential for oversight and democratic accountability.
Opponents counter that exposing identities can invite harassment, stalking, or worse, especially when home addresses circulate online. They stress the safety of officers and their families, and the risk that exposures could impede law enforcement operations.
Lawmakers have floated new limits on publishing personal data. The proposed Protecting Law Enforcement from Doxxing Act would make it a crime to post the name of a federal officer with the intent to obstruct operations. Civil liberties groups warn that broad bans on naming officials could chill reporting and whistleblowing, especially when the information comes from public records.
“Any move to criminalize sharing of names will face First Amendment tests,” legal analysts note, because courts often weigh the intent behind a disclosure and whether it was made to harass or to inform the public.
Policy context and security considerations
Homeland Security agencies typically cite the Privacy Act and internal policies that restrict disclosure of personally identifiable information. DHS also maintains official guidance on handling sensitive data and reducing risks tied to unauthorized releases.
- Official privacy resource:
- Department of Homeland Security Privacy Office: https://www.dhs.gov/privacy
Inside the federal workforce, the fallout from leaks often plays out quietly. Employees may:
- Seek address confidentiality protections with state motor vehicle offices
- Adjust social media settings
- Request agency help with threat assessments
Unions representing ICE officers have, in past incidents, pressed management to fund relocations or security upgrades for agents and families when real threats arise.
The Trump administration’s expanded use of masked teams dates back to clashes over federal deployments in cities and rising tensions around removals. Supporters argue masks reduce the chance that officers will be tracked home. Critics say masking normalizes secret policing and makes it harder to report misconduct.
The latest leak gives both sides new ammunition: proof that identity exposure is real, and fresh evidence that public interest in who wields federal power remains strong.
Community impact and contractor response
For immigrants and their families, the direct operational impact is limited but not abstract. Raids and arrests continue regardless of whether a particular officer’s identity is public. Yet leaks can change how communities view enforcement, sometimes increasing fear and distrust.
- Reported effects on communities:
- Legal aid groups say clients already hesitate to approach officials and may be further discouraged from cooperating in court or seeking relief.
- Community trust in enforcement agencies can decline, affecting access to services and legal processes.
Employers who work with federal agencies also face choices. Some prime contractors have:
- Pulled staff names from public directories
- Tightened badge controls
- Adopted new training on social engineering
Others warn that too much secrecy frustrates oversight when contractors play key roles in detention, transport, and data systems used by immigration authorities.
Legislative and legal outlook
Congress is likely to revisit the doxing bill and related data privacy measures. Any statutory attempt to criminalize sharing of names will face constitutional challenges, particularly under the First Amendment.
Courts often consider:
- Whether the information was drawn from public records
- The intent behind the disclosure (harassment vs. public interest)
- Whether the disclosure led to real-world harm
As with past breaches, the longer-term question is resilience. Agencies can limit the damage by:
- Reducing the amount of personal data they collect and store
- Hardening access controls
- Giving employees clear steps and support when a breach occurs
Transparency advocates will keep pressing for the ability to report on immigration enforcement personnel without sweeping bans. The Com has promised more releases; whether those materialize or not, the fight over anonymity in immigration work is set to continue.
This Article in a Nutshell
A hacker group called The Com released a verified trove of personal data exposing hundreds of federal law enforcement employees involved in immigration enforcement, including 680 DHS staff, more than 190 DOJ officials and email addresses for 170 FBI employees. Posted on Telegram with threats of additional releases and unverified claims about cartel bounties, the leak includes office locations and some home addresses, prompting concerns about safety and privacy. 404 Media verified the dataset; federal agencies have not confirmed threats or mitigation steps. The incident intensifies debates over transparency versus officer safety and could spur legislative efforts like the Protecting Law Enforcement from Doxxing Act, which faces First Amendment scrutiny.