top of page
Search

DOJ Faces Uphill Battle in Prosecuting ICE Agent Doxxing as Even Musk’s Tech Prowess Falls Short

  • Writer: 17GEN4
    17GEN4
  • Jul 12, 2025
  • 4 min read

Updated: Jul 18, 2025

July 12, 2025 – The Department of Justice (DOJ) is vowing to crack down on groups doxxing Immigration and Customs Enforcement (ICE) agents, but experts warn that identifying and prosecuting those responsible may prove elusive, even as tech mogul Elon Musk has failed to unmask similar perpetrators targeting Tesla owners. The challenges highlight the complexities of combating anonymous online actors, even with significant resources at hand.


On July 11, 2025, Department of Homeland Security (DHS) Secretary Kristi Noem publicly condemned two Portland-based groups, “Rose City Counter Info” and “The Crustian Daily,” for publishing the names, photos, and addresses of ICE officers on their websites and social media platforms. The groups, described as having Antifa ties, are accused of endangering law enforcement by exposing their personal information, potentially enabling criminal organizations like Tren de Aragua and MS-13 to target agents and their families. “We will prosecute those who dox ICE agents to the fullest extent of the law,” Noem declared, labeling the groups’ actions as siding with “vicious cartels and human traffickers.


”The doxxing campaign, which includes posting flyers around Portland and dumping trash on an ICE officer’s lawn, has drawn comparisons to the “Dogequest” website that surfaced earlier this year. Dogequest published personal details of Tesla owners, DOGE employees, and Tesla facility locations, inciting vandalism and harassment amid protests against Elon Musk’s role in the Department of Government Efficiency (DOGE). Despite Musk’s access to top cybersecurity talent and the DOGE team’s expertise, the site’s operators remain unidentified, raising doubts about the DOJ’s ability to track down those targeting ICE agents.


Musk’s Failure to Crack Dogequest


Musk, known for his technological acumen and leadership of companies like Tesla, SpaceX, and xAI, condemned Dogequest as “extreme domestic terrorism” on X, yet his teams have been unable to trace its operators. The site, which used a Molotov cocktail cursor and encouraged “creative expressions of protest” like spray-painting Tesla vehicles, went offline intermittently in March 2025, possibly due to Cloudflare’s intervention, before resurfacing on the dark web as “DOGEQUEST Unleashed.” The FBI is investigating, but no charges have been filed against those responsible for the doxxing, despite the site’s role in escalating anti-Musk violence, including arson and vandalism at Tesla properties.


Cybersecurity experts point to several reasons for Musk’s inability to resolve the issue.


Dogequest likely operates on anonymized infrastructure, such as Tor or dark web servers, which obscure operators’ identities. The data—some accurate, some outdated—may have been scraped from public sources or purchased on the dark web, complicating efforts to trace its origin. Moreover, Musk’s teams, including DOGE’s efficiency experts, lack the legal authority to subpoena server records or conduct invasive investigations, powers reserved for federal agencies like the FBI. “Even with the best tech talent, private entities can’t match the FBI’s access to classified tools or global intelligence,” said Dr. Emily Chen, a cybersecurity analyst at Stanford University.


Parallels with ICE Doxxing


The ICE doxxing case presents similar hurdles. Rose City Counter Info and The Crustian Daily, identified by DHS, operate openly, with the former maintaining a website that boldly declares “No Peace For ICE Agents” and calls for solidarity with anti-ICE protests in Los Angeles. The Crustian Daily’s inactive website is supplemented by an Instagram account offering guides on identifying ICE officers, including requests for their LinkedIn profiles and unmasked photos. Yet, pinpointing individuals behind these platforms is far from straightforward.


“These groups often use pseudonyms, encrypted communications, and decentralized networks,” said Mark Reynolds, a former FBI cybercrime investigator. “Even when you know the group’s name, tying specific individuals to criminal acts requires digital forensics, subpoenas, and sometimes international cooperation—none of which are quick or guaranteed.” The groups’ public-facing nature may also shield them, as doxxing with publicly sourced data often skirts legal boundaries unless it explicitly incites violence or involves hacked information.


The DOJ’s challenges are compounded by jurisdictional issues. If servers or operators are based outside the U.S., extradition becomes a diplomatic quagmire. Portland’s status as a sanctuary city, which limits local police cooperation with federal immigration enforcement, further complicates on-the-ground investigations. Noem has criticized these policies, arguing they create an “unsafe environment” for federal agents.


Legal and Political ObstaclesProsecuting doxxing is legally complex. Federal statutes like 18 U.S.C. § 2261A (cyberstalking) or state anti-harassment laws require proof of intent to harass or incite harm, a high bar if data is publicly available. The ICE doxxing, like Dogequest, may exploit this gray area. “If the information is scraped from voter records or social media, it’s not inherently illegal to publish,” said Sarah Logan, a privacy law expert at Georgetown University. “The DOJ would need evidence of direct incitement or illegal data acquisition, which takes time to build.”


Political sensitivities also loom large. The ICE protests, fueled by opposition to President Trump’s immigration crackdown, have galvanized activist communities. Aggressive prosecutions risk escalating tensions, especially in liberal strongholds like Portland. Similarly, Musk’s high-profile role in DOGE and alignment with the Trump administration make his involvement in Dogequest politically charged, likely prompting restraint to avoid accusations of overreach.


DOJ’s Limited Track Record


The DOJ’s history with doxxing prosecutions offers little optimism. While Attorney General Pam Bondi has charged individuals for physical attacks on Tesla properties—such as Cooper Frederick and Lucy Grace Nelson for arson—doxxing cases remain unaddressed. A May 2025 raid on a Southern California home linked to doxxing ICE agents has not led to public charges, suggesting investigative delays. The DOJ’s focus on high-profile gang cases, like those targeting Tren de Aragua and MS-13, may divert resources from cybercrimes like doxxing.


Musk’s inability to resolve Dogequest underscores the DOJ’s predicament. “If a tech titan with near-unlimited resources can’t track down anonymous doxxers, the DOJ, with its bureaucratic constraints, faces an even steeper climb,” Reynolds noted. The FBI’s task force on Tesla attacks and ICE doxxing is active, but results are slow. As Noem’s pledge to prosecute echoes Bondi’s earlier warnings about Tesla vandals, the lack of progress on Dogequest suggests that identifying and convicting ICE doxxers will be a protracted, uncertain battle.



17GEN4 news



 
 
 

Comments


bottom of page