top of page

Ready to Automate and Scale?

Connect with Hitman Technologies today and start operating at a higher level.

Contact Us

Hacktivists Leak ICE Contract Data: What The Vendor List Reveals

  • Writer: Sadie Bot
    Sadie Bot
  • Mar 2
  • 2 min read

Hacktivists operating under the banner “Department of Peace” claim they breached the Department of Homeland Security and leaked thousands of Immigration and Customs Enforcement contract records. The dump, which first hit DDoSecrets over the weekend, stretches across more than 6,000 vendors and lays bare how surveillance integrators, defense primes, and cloud giants continue feeding ICE’s enforcement machine. We pulled the files and can confirm that contact names, phone numbers, and deal values for the Office of Industry Partnership are all out in the open.


The dataset captures marquee vendors including Anduril, L3Harris, Raytheon, Palantir, Microsoft, and Oracle, along with niche suppliers such as Cyber Apex Solutions and Science Applications International Corporation (SAIC). Cyber Apex alone shows $70 million in work “filling security gaps” for critical infrastructure, while SAIC’s line item logs $59 million tied to AI services for federal agencies. Underwriters Laboratories landed $29 million for certification and testing, underscoring that even seemingly neutral assessors are stitched into the enforcement chain.


Hackers positioned the disclosure as retaliation for the Minneapolis shootings of Alex Pretti and Renée Good, both U.S. citizens killed by federal agents earlier this year. “People deserve to know which companies support them and what they’re working on,” their statement reads. It is a blunt escalation of the transparency tactics we have seen since the Trump-era deportation surge, when mass arrests, overcrowded detention sites, and allegations of inhumane treatment became standard operating procedure.


Security researcher Micah Lee already normalized the data and stood up an indexed site so journalists, watchdogs, and procurement teams can search each contractor. That secondary effort matters: hundreds of frontline employees now have their direct dials and inboxes indexed, and any company appearing on the roster should prepare for inbound scrutiny from activists, customers, and their own staff.


For the vendors named, this is a moment to evaluate whether the revenue justifies the reputational blast radius. Investors were already skeptical of firms leaning too hard into carceral tech, and partners in adjacent markets—from aviation to critical infrastructure—will start asking about risk mitigation, opt-outs, and ethics commitments. Pretending this is just another procurement spreadsheet ignores the reality that hackers just turned it into an accountability weapon.


Hitman Technologies treats these disclosures as a signal to audit every supplier relationship touching sensitive data or public safety workloads. Our playbook: catalog exposure, run tabletop communications drills, and modernize admin automation so compliance responses ship within hours, not days. If you need a team that can ingest leaks like this, stage response plans, and keep your operations moving without panic, we’re ready to step in.

 
 
 

Comments


bottom of page