In 2018, an adjunct professor at New York University tried to release the names of 1,500 ICE agents that he pulled from LinkedIn. The platform where he planned to release the information shut him down.
During the mayhem that occurred in Portland, Oregon, during the George Floyd riots and protests, 38 officers were doxxed in Portland. The targets included Portland Police officers who had been authorized to cover their names with tape. Federal officers who were working in Portland at the time were already hiding their identities to deter doxxing, but they were criticized for doing so by none other than their future boss: then Democratic presidential nominee Joe Biden.
Today, officers are still facing cyber threats from hacktivists and other anti-police individuals. Earlier this year, DHS reported that Immigration and Customs Enforcement agents were being doxxed in, you guessed it, Portland.
Even when officers take steps to avoid being identified in public because they work under cover or in sensitive enforcement areas, their agencies sometimes expose them. In April 2023, 321 LAPD officers who work undercover were exposed by their own agency when it received a request from a local progressive news outlet called Knock LA, according to a lawsuit filed against the city by the officers. The agency sent photos, names, ethnicity, rank, date of hire, badge numbers, and division assignment to the outlet. Then an activist group posted all that information on more than 9,300 officers in a searchable database. A city attorney had determined that California law required the release of the information, however, ABC7 reported that the undercover officers could have been legally omitted.
Hardening the Target
As you can see from the case studies, it’s hard for a public official like a law enforcement officer to prevent their name and likeness from being accessed by people who might want to dox them, so the best thing to do is to make it harder for them to get additional information that they can release online.