Infraguard stalking cases

Checked on December 17, 2025
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

This fact-check may be outdated. Consider refreshing it to get the most current information.

Executive summary

Allegations linking InfraGard to “gang stalking” circulate in activist blogs and petition sites but mainstream reporting and technical investigations focus on a separate, documented risk: a 2022–23 breach that exposed contact data for roughly 80,000 InfraGard members, which security analysts warned could enable harassment or targeted intrusion [1] [2] [3]. Available reporting documents individual claims of organized stalking tied to InfraGard [4] [5] but does not substantiate a coordinated, institutionally sanctioned stalking program inside InfraGard; FBI and journalist accounts treat the group-stalking allegations as complaints or FOIA search terms rather than proven operations [6] [1].

1. InfraGard’s mission and membership — a public‑private information-sharing forum

InfraGard is an FBI-affiliated public-private partnership intended to connect owners and operators of U.S. critical infrastructure with the Bureau for information sharing, education and threat awareness [7] [8]. The network runs member webinars and orientation events restricted to vetted participants, underlining its role as a vetted intelligence-sharing portal rather than a law-enforcement strike force [9] [10].

2. The documented breach that changed the risk profile

Multiple cybersecurity outlets reported that in late 2022 a user calling themselves “USDoD” obtained access to InfraGard, harvested contact records and offered a dataset of more than 80,000 members for sale on cybercrime forums [1] [2] [3]. Reporting says the exposed data was largely contact information and that attackers used a phony application to gain access, highlighting weaknesses in vetting and an exploitable API or portal automation [1] [2].

3. Why the breach matters to stalking and harassment concerns

Security experts warned publicly that harvested contact lists could be used for phishing, doxxing, targeted harassment or intimidation of members and their families — activities that can resemble or enable stalking campaigns [11] [12]. Coverage noted the potential for cyber gangs to buy the data specifically to launch online stalking or intimidation campaigns against victims [11] [12].

4. The “gang stalking” claims: community reporting versus hard evidence

Victim accounts and activist blogs assert that InfraGard chapters — for example posts tied to an InfraGard Denver chapter — are implicated in organized or “gang” stalking, including allegations of harassment and misuse of chapter resources [4]. Petition sites also collect personal claims that name InfraGard among alleged perpetrators [5]. These sources present individual narratives and grievances but are not the same as independent investigative confirmation in mainstream reporting [4] [5].

5. What government records and FOIA litigation show

FOIA-related court documents and searches of FBI records show the Bureau has encountered requests and searches for terms like “gang stalking” and “group stalking,” indicating the phenomenon is the subject of inquiries and that the FBI has been asked about ties between community groups and stalking allegations [6]. Those records demonstrate the topic’s presence in public records requests, not a judicial finding that InfraGard orchestrates stalking.

6. Competing perspectives and the burden of proof

Cybersecurity reporting frames InfraGard’s primary problem as a security breach and vetting failure with quantifiable exposure of member contact data [1] [2]. In contrast, victim blogs frame InfraGard chapters as active perpetrators of organized harassment [4]. Journalistic and technical sources caution that while the breach creates opportunity for harassment, allegations of organized, institutionally directed stalking require corroboration beyond anecdote — current mainstream sources do not establish that level of proof [1] [2] [4].

7. Practical implications for alleged victims and observers

If you believe you are a target of coordinated harassment naming InfraGard actors, reporting routes include FBI tip channels and IC3 for cyber incidents, consistent with FBI guidance to members about complaint submission [10]. Meanwhile, the breach reporting suggests individuals should assume their contact details could have been exposed and take standard remediation: phishing vigilance, privacy hardening and, where harassment occurs, documentation and law-enforcement reporting [11] [12].

8. Limitations of available reporting and next steps for researchers

Available sources document the 80,000-member data exposure and individual allegations of “gang stalking,” but they do not supply independent, verifiable evidence that InfraGard as an organization runs or sanctions a coordinated stalking program [1] [2] [4]. Researchers seeking confirmation should pursue FOIA disclosures, court records cited in past litigation searches, and followup reporting from mainstream outlets that can corroborate patterns across multiple, independently verifiable incidents [6] [1].

If you want, I can pull the specific breach coverage (KrebsOnSecurity/PCMag/DarkReading summaries) and the FOIA court file excerpts so you can review the underlying language and timestamps cited above [1] [2] [6].

Want to dive deeper?
What is InfraGard and how does it work with law enforcement?
How common are stalking cases involving InfraGard members or affiliates?
What legal protections exist for targets of stalking by critical infrastructure employees?
How can organizations detect and prevent insider stalking within InfraGard networks?
Have there been notable prosecutions or convictions in InfraGard-related stalking cases?