What they're not telling you: # 'Bluesky Goes Full Panic' After Fired Trump Official's Anti-ICE Website Doxxes Almost 18,000 Leftists Nearly 18,000 left-wing activists discovered their personal information exposed this weekend after an anti-ICE website launched by a former Trump administration official suffered a critical security breach, potentially forwarding user data to federal law enforcement agencies. The website in question, "GTFO ICE," was created by Miles Taylor, former DHS Chief of Staff and Google security executive, in partnership with Project Salt Box. According to reporting, Taylor publicly announced the platform last week on The Rachel Maddow Show as a "rapid response network to stop ICE prison camps before they start." The site's stated purpose was straightforward: allow citizens to sign up for alerts about proposed ICE facilities in their area.
What the Documents Show
What wasn't straightforward was what happened next. The platform contained an unprotected API—a vulnerable connection that exposed signup records containing personal details of nearly 18,000 users. The breach's discovery came when Hagerstown Rapid Response conducted a test signup using multiple email addresses and phone numbers across several locations, including Hagerstown and Williamsport, Maryland, and Salt Lake City. No confirmation emails or texts arrived, which should have raised immediate red flags. More critically, one of the test phone numbers received an unsolicited text message claiming that user data submitted to GTFOICE.org had been forwarded to federal authorities, specifically the FBI, Homeland Security Investigations, and ICE itself.
Follow the Money
The message included inflammatory claims about the project's organizers, though the source and authenticity of this communication remain unclear—it could represent an actual breach, a malicious spoof, or some other form of compromise. What followed suggests either incompetence or panic. Approximately six hours after the vulnerability appeared to be discovered, the website displayed a notice stating that signups were temporarily paused for a security review. Within twenty minutes, that acknowledgment vanished, replaced by a generic "under construction" page. The rapid deletion of any public acknowledgment prevented users from knowing whether their data had been compromised or what steps they should take to protect themselves. The mainstream narrative around this incident will likely focus on cybersecurity best practices or the irony of progressive activists falling victim to poor digital hygiene.
What Else We Know
What's being underplayed is the chilling effect this creates for political organizing. Activist networks now operate under heightened uncertainty about whether participation in legally protected speech activities will result in their personal information reaching federal law enforcement. Whether the alleged data forwarding to ICE, FBI, and HSI actually occurred or remains unconfirmed, the mere possibility creates a surveillance chilling effect that doesn't require any actual monitoring infrastructure—only the fear of it. For ordinary Americans seeking to participate in lawful protest and advocacy, the lesson is stark: platforms promising privacy can fail catastrophically, and the consequences of that failure may extend directly to federal agents already investigating your activities.
Primary Sources
- Source: ZeroHedge
- Category: Surveillance State
- Cross-reference independently — don't take our word for it.
Disclosure: NewsAnarchist aggregates from public records, API feeds (Federal Register, CourtListener, MuckRock, Hacker News), and independent media. AI-assisted synthesis. Always verify primary sources linked above.

