We earn commissions from the links, which influence where and how listings are displayed. Some providers are co-owned by our parent company.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Coding Error Left DHS Data Exposed to Unauthorized Access

Coding Error Left DHS Data Exposed to Unauthorized Access
Author Image Hendrik Human
Hendrik Human Published on September 20, 2025 Cybersecurity Researcher

An internal memo revealed that the DHS uncovered a misconfiguration in one of its online platforms that left sensitive information exposed to “thousands” of unauthorized users. The platform operated by the DHS’s Office of Intelligence and Analysis (I&A) contained sensitive information shared among it and the FBI, National Counterterrorism Center, and other law enforcement and intelligence agencies.

WIRED issued a Freedom of Information Act (FOIA) request, which resulted in the memo coming to light. The information consists primarily of investigative leads, cybersecurity threats, domestic terrorism, protests, and election-related issues. Some of it also contained personally identifiable information (PII).

First, it was created in an effort to more effectively combat domestic terrorism in the wake of the 9/11 attacks. However, there have been many misgivings regarding its role to “spy” on the American public as part of its mandate. A recent example includes extending the DHS’s powers to screen potential immigrants for anti-US sentiment.

According to the memo, only authorized users of the Homeland Security Information Network’s intelligence crews, AKA HSIN-Intel, were supposed to have access to the data. However, the access rights were apparently set to “everyone” by mistake. Subsequently, investigators reviewed the logs and found the products were viewed 1,525 times in total during the exposure window (March 15–May 11).

The good news is that most of the users were federal employees (437) or state and local users (524). Only 518 users were from the private sector, and 46 were non-US citizens. Also, unauthorized users’ rights were limited to “visitor” only access, so they could not download or save the products.

About the Author

  • Author Image Hendrik Human
  • Hendrik Human Cybersecurity Researcher

Hendrik is a writer at The How To Guide, specializing in VPN comparisons and user guides. With 5+ years of experience as a tech and cybersecurity writer, plus a background in corporate IT, he brings a variety of perspectives to test VPN services and analyze how they address the needs of different users.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Special characters are not allowed in the Name field

Please enter a valid email address