FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Hacktivists Leak Alleged DHS ICE Contract Data

Gregory Zuckerman
Last updated: March 2, 2026 5:06 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

A self-styled hacktivist collective says it breached the Department of Homeland Security and released a trove of internal records tied to Immigration and Customs Enforcement contracting, thrusting fresh scrutiny on the government’s technology supply chain and the private vendors that power it.

The group, calling itself Department of Peace, claims the cache originated from DHS’s Office of Industry Partnership, which liaises with the private sector. The nonprofit transparency collective DDoSecrets says it has published the dataset, and an independent security researcher organized it into a searchable index. DHS and ICE did not immediately respond to requests for comment, and the authenticity of the entire collection has not been independently verified.

Table of Contents
  • What the leaked files contain about DHS and ICE contracts
  • Who is behind the release and how the leak surfaced
  • Why this dataset matters for DHS and ICE procurement
  • Security and legal questions raised by the alleged breach
  • Context and next steps as officials assess the incident
Alleged DHS ICE contract data leak by hacktivists, cybersecurity breach concept

What the leaked files contain about DHS and ICE contracts

The dataset appears to catalog thousands of ICE and DHS-related contract records, listing vendor names, award amounts, project descriptions, and points of contact, including full names, email addresses, and phone numbers. According to DDoSecrets’ description, more than 6,000 contractors are referenced, ranging from defense primes to cloud and analytics firms.

Early highlights circulating among researchers point to multimillion-dollar obligations. One contractor, Cyber Apex Solutions, is shown as having roughly $70 million in awards tied to critical infrastructure security work. Science Applications International Corporation appears associated with about $59 million in awards, including AI-enabled services for government agencies. Underwriters Laboratories is listed at around $29 million for testing and certification engagements.

Also named are well-known federal vendors and integrators, including Anduril, L3Harris, Raytheon, Palantir, Microsoft, and Oracle. While many contract basics are already discoverable via public procurement trackers, the consolidated exposure of internal contacts and project metadata could increase operational and privacy risks for both agencies and suppliers.

Who is behind the release and how the leak surfaced

Department of Peace framed the leak as a transparency action, citing recent incidents they attribute to federal agents and arguing the public has a right to know which companies support DHS and ICE programs. DDoSecrets, which previously hosted large-scale disclosures such as the 2020 BlueLeaks collection of law-enforcement fusion center documents, says it obtained and published the new dataset consistent with its public-interest mission.

Security researcher Micah Lee organized the material into a browsable portal to aid review by journalists, watchdogs, and researchers. That step mirrors modern leak handling, where curation and structured search can rapidly surface patterns in sprawling, technical records.

Why this dataset matters for DHS and ICE procurement

ICE’s operations rely on a broad tech stack spanning case management, data enrichment, biometrics, surveillance, detention logistics, and transportation. Palantir, for example, has long provided analytics platforms, including tools used by Homeland Security Investigations. Cloud providers like Microsoft and Oracle host and integrate systems that process sensitive identity and enforcement data.

Alleged DHS ICE contract data leak by hacktivists, digital lock and binary code graphic

Public procurement portals already disclose award values and vendors, but they often lack the fine-grained context to map program dependencies, subcontractor webs, and agency points of contact. A centralized trove that aggregates internal references can accelerate external oversight and academic research into how public safety technologies are bought and scaled.

Oversight bodies have repeatedly flagged transparency gaps in DHS acquisitions. Government Accountability Office audits and DHS’s own inspector general have cited weaknesses in requirements development, vendor vetting, and lifecycle management for complex IT programs. If authentic, the new dataset could offer a rare, ground-level view of how procurement decisions intersect with controversial enforcement priorities.

Security and legal questions raised by the alleged breach

The claimed breach raises classic incident-response challenges: confirming the intrusion vector, scoping affected systems, and notifying impacted personnel and contractors. The inclusion of direct contact details may elevate doxing and social-engineering risks for procurement officials and vendor staff, potentially prompting access resets and targeted phishing defenses across government and industry networks.

Any unauthorized access to federal systems could implicate the Computer Fraud and Abuse Act and other statutes. At the same time, the publication underscores a persistent public-interest dilemma: disclosures that expose sensitive personal information can also reveal how powerful surveillance and immigration tools are funded and deployed—information that watchdogs argue is essential for democratic accountability.

Context and next steps as officials assess the incident

DHS is one of the federal government’s largest buyers of technology and services, with annual obligations running into the tens of billions across component agencies. ICE’s recent contracting has emphasized data analytics, detention and transportation logistics, and cloud modernization—areas that draw steady involvement from major defense and enterprise IT firms.

Key signals to watch now include official confirmation of the breach scope; guidance to affected vendors; and whether DHS or ICE seek to limit redistribution of the files. Lawmakers on homeland security and appropriations committees may also press for briefings, particularly if the material reveals undisclosed program details or novel vendor relationships.

For companies named in the records, the near-term focus will be supplier risk, employee safety, and reputational exposure. For advocates and researchers, the dataset—if verified—could become a reference point for understanding how immigration enforcement technology is funded, who builds it, and which programs set its boundaries.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Magicminer MO01 Desktop Miner Packs Speaker And Charger
Rivian Postpones $45,000 R2 Base Model to Prioritize Margins
Channel Surfer Reimagines YouTube As Cable TV
Google Brings Chrome To ARM Linux Laptops
Yaber T2 Outdoor Projector Gets 30% Price Cut
Tinder Unveils AI Matchmaker Astrology Mode And Events
Gemini Adds Tools Button For Faster Access
Reviewers flag notable MacBook Neo drawbacks and caveats
Developer Unveils Game Boy Camera Phone Adapter
Alexa Plus Debuts Sassy Personality With Censored Swears
Substack Launches Recording Studio For Creators
Facebook Marketplace Lets Meta AI Reply To Buyers
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.