Sensitive security codes for a US Customs and Border Protection facility in Texas were reportedly publicly accessible for roughly six weeks on Quizlet, the popular study flashcard platform, before being taken down in March. The leak exposes a basic but persistent vulnerability in federal security: the humans tasked with protecting it.
A flashcard set apparently titled USBP Review, created by someone associated with the CBP station in Kingsville, Texas, contained facility entrance codes, gate access combinations, internal organizational details, and information about law enforcement database systems, according to reporting by Ars Technica and WIRED. The set was publicly visible from early February until March 20, when it was switched to private.

What Was Exposed
The flashcard set read like an onboarding guide for a new CBP agent. It included the specific entrance codes needed to get into the Kingsville facility, gate codes for perimeter access, and a breakdown of the station’s organizational grid and zone system. According to the cards, the Kingsville facility covers a 1,932-square-mile area of responsibility spanning six county lines, monitored by 11 CBP towers.
The cards also described an internal system called “E3 BEST,” which CBP officers use to query databases, create events for arrest referrals, and process secondary referrals at USBP checkpoints. That kind of operational detail about internal law enforcement systems has obvious value to anyone interested in understanding how border enforcement actually works at the ground level.
An individual matching the Quizlet user’s name was found listed at an address less than a mile from the Kingsville CBP facility, though reporters were unable to verify active employment with the agency.
CBP’s Response
According to CBP, the agency’s Office of Professional Responsibility is reviewing the incident. The agency emphasized that a review does not indicate wrongdoing.
Quizlet reportedly responded by stating the company acts promptly when content violates its policies.
Neither response addresses the more uncomfortable question: how a flashcard set containing physical security codes for a federal law enforcement facility stayed publicly indexed on the internet for six weeks without anyone at CBP noticing.
A Recurring Pattern
This is not the first time study apps have been the vector for classified or sensitive government information reaching the public internet. In previous incidents, nuclear weapons security details were exposed through similar flashcard platforms, with military personnel using online tools to memorize procedures and inadvertently publishing sensitive material for anyone to find. The pattern is consistent: people with access to restricted information use consumer software to study for tests and certifications, and the default sharing settings do the rest.
The Kingsville incident is a smaller-scale version of the same failure. A person apparently preparing for a CBP review or exam created study materials from operational documents, uploaded them to a platform designed for sharing, and left the privacy settings on “public.” No sophisticated hacking required. No insider threat in the traditional sense. Just someone trying to pass a test.
The Hiring Surge Context
The timing matters. CBP and its sister agency ICE are in the middle of an aggressive recruitment campaign. CBP is offering up to $60,000 in recruitment and retention incentives to some new agents. ICE has gone even further, announcing $50,000 signing bonuses and up to $60,000 in student loan repayment as part of what the agency described as its most successful recruitment campaign.
A Government Accountability Office report has documented the rapid hiring surge at CBP, and the Department of Homeland Security announced in January that ICE’s headcount of officers and agents had more than doubled to 22,000.
When you double the size of a workforce quickly, you inevitably bring in people at varying levels of operational maturity. Some will be career law enforcement professionals. Others will be new to federal service entirely. The security awareness training that might seem obvious to a 15-year veteran can be genuinely unfamiliar to someone six months into the job who grew up using Quizlet in college.
The Real Security Problem
Federal agencies spend enormous resources on cybersecurity. They invest in encrypted communications, classified networks, and physical security systems. But the weakest link is almost always behavioral. A person who knows the door codes writes them on a flashcard. A person studying for an internal review puts those flashcards on the internet. The security architecture is only as strong as the habits of the people inside it.
The Kingsville leak probably didn’t compromise national security in any dramatic way. Facility entrance codes can be changed. The organizational chart of a single border station is useful intelligence but not devastating. The real damage is reputational, and the real lesson is structural.
CBP is onboarding thousands of new agents with financial incentives that prioritize speed. The agency is offering substantial money to fill positions fast. That creates pressure to move people through training and into the field. When the emphasis is on quantity and pace, the quieter work of building a security-conscious culture gets squeezed.
It is worth asking whether the rapid expansion has been matched by a corresponding investment in operational security training. Not the kind that covers classified document handling, which presumably every agent receives, but the kind that addresses the gray area: study materials, personal devices, consumer apps, the hundreds of small decisions agents make every day about how they handle information that isn’t stamped SECRET but is still sensitive.
What Comes Next
CBP’s Office of Professional Responsibility will conduct its review. Codes at the Kingsville facility have likely already been changed. The Quizlet set is private now. The immediate exposure is contained.
But the underlying conditions that produced this leak have not changed. CBP is still hiring aggressively. The financial incentives are still substantial. The pressure to fill positions remains intense. And consumer technology still makes it trivially easy to accidentally publish information that should stay internal.
The next leak probably won’t come from Quizlet. It might come from a Google Doc with sharing set to “anyone with the link,” or a photo of a whiteboard posted to social media, or notes synced to a cloud service with weak access controls. The specific platform is almost beside the point. The pattern is what matters: people with sensitive information using everyday tools without thinking about who else can see the results.
For an agency that exists to control who and what crosses borders, the inability to control information crossing from internal systems to the public internet is an uncomfortable irony. Security, at every level, depends on the people who implement it. When the hiring pipeline prioritizes volume, the quality of that implementation becomes harder to guarantee.
The flashcard set was six weeks of publicly accessible operational data for a federal law enforcement facility. Someone studying for a test created a security vulnerability that no firewall could have prevented. That combination of human behavior and default software settings will keep producing incidents like this one until agencies treat security culture with the same urgency they bring to recruitment bonuses.
Photo by Valentin Ivantsov on Pexels


