Are the leaked files of federal ice employs avalable

Checked on January 17, 2026
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

The personal data reportedly siphoned from Department of Homeland Security files and handed to the ICE List website appears to exist and has been described by multiple outlets as a cache covering roughly 4,500 ICE and Border Patrol employees, including about 2,000 frontline agents [1] [2]. The dataset’s public availability, however, has been inconsistent: ICE List’s founder says he received and intended to publish the material, the site has been intermittently live and under cyberattack, and U.S. officials condemn the leak and say the perpetrator would face prosecution [3] [4].

1. The claim: a whistleblower gave ICE List thousands of personnel records

Multiple reporters cite the founder of ICE List saying a Department of Homeland Security employee handed over personal information on approximately 4,500 DHS, ICE and Border Patrol staff, a mix of frontline agents and support personnel, which the site planned to add to its existing catalog of names [1] [5] [6]. Coverage repeatedly frames the disclosure as a “whistleblower” action motivated by outrage after the fatal shooting of Renee Nicole Good, with founder Dominick Skinner telling outlets the shooting was “the last straw” for some insiders [1] [5].

2. What the material reportedly contains and how large the leak is said to be

Reports quoting ICE List describe the dataset as including names, work emails, phone numbers, job titles and some biographical or résumé details, and place the newly acquired tranche at roughly 4,500 records added to an existing pool that the project had previously amassed (raising total holdings described in some accounts toward 6,500) [1] [7] [3]. Independent reportage also places the number at “about 4,500” and emphasizes that roughly 2,000 of those were frontline enforcement agents [2] [8].

3. Public availability: intermittent, contested and disrupted

While ICE List’s founder publicly stated an intention to publish the names and claimed possession of the records, the site was reportedly overwhelmed by malicious web traffic and subjected to denial-of-service attacks that temporarily prevented access; the database is hosted outside U.S. jurisdiction, in the Netherlands, according to reporting [3] [4]. Some outlets describe the site as having been taken down for periods after the revelation, meaning that even if the dataset exists, it has not been continuously accessible to the public [3] [4].

4. Official reaction, legal stakes and safety concerns

DHS officials condemned the disclosure and warned the leaker could be prosecuted, with assistant secretary Tricia McLaughlin calling the action criminal in nature and asserting legal consequences; lawmakers and law-enforcement advocates have raised concerns that publishing personal information threatens officer safety and families [4] [6]. At the same time, proponents of ICE List frame the project as an “accountability initiative,” arguing internal dissent and public interest motivated the leak [5] [1].

5. What can and cannot be established from available reporting

The aggregate reporting establishes that a significant cache was claimed, that ICE List’s operator says he received it from a DHS employee, and that the site’s operational status has been unstable due to cyberattacks and jurisdictional hosting choices [1] [5] [3]. What the reporting does not permit this account to verify independently is the full content, completeness, or authenticity of every record in the alleged 4,500-person tranche—reporters relay the founder’s claims and government statements, but no public, verifiable inventory of every record has been reproduced in the sources provided here [1] [2].

6. Bottom line

Yes—the leak has been publicly claimed and at least partially posted or poised for posting by ICE List, and multiple outlets report that roughly 4,500 DHS/ICE/Border Patrol employees’ details were part of the cache [1] [2]. However, public access to the files has been uneven (the site was hit by cyberattacks and hosted offshore), and journalists have relied primarily on ICE List’s founder and government reactions rather than an independently authenticated, stable public database that can be fully examined [3] [4]. Where available reporting stops, so does confirmed provenance and completeness.

Want to dive deeper?
How have previous government personnel data leaks been verified and prosecuted?
What evidence has been published from the January 2026 ICE document leaks about enforcement operations?
What laws exist to protect federal employees’ personal data and what penalties apply for leaks?