A critical security lapse has emerged from an unlikely source: a public study set on the flashcard platform Quizlet. Confidential security procedures and access codes for U.S. Customs and Border Protection (CBP) facilities near Kingsville, Texas, were left exposed to the open web for weeks, illustrating a persistent gap between government security protocols and the personal habits of the personnel tasked with upholding them.
The “USBP Review” Leak
The breach centered on a public Quizlet set titled “USBP Review,” created in February. The set contained specific, sensitive details regarding security operations at CBP facilities. Although the platform is designed for students and professionals to memorize information, the public nature of the set meant that anyone with a search engine or a Quizlet account could access operational intelligence that should have remained classified or restricted.

The information remained accessible until March 20, when the user transitioned the set to private. This change occurred shortly after WIRED contacted a phone number linked to the account. While the user’s name correlates with an address located less than a mile from a Kingsville CBP facility, official confirmation of the user’s status as an active agent or contractor remains pending.
Security Context: Operational Security (OPSEC)
Operational Security is a process that identifies critical information to determine what adversaries need to know about operations. In government and military contexts, “leaking” isn’t always a malicious act of espionage; it is often “passive leakage,” where employees use unauthorized third-party SaaS tools (like Quizlet, Notion, or Trello) to organize work notes, inadvertently moving sensitive data from secure government servers to public clouds.
The Risk of Shadow IT in Federal Operations
This incident is a textbook example of “Shadow IT”—the use of software, devices, or applications within an organization without explicit organizational approval. For a CBP agent or contractor, using a consumer-grade learning tool to study for a professional review is a convenience that creates a massive security vulnerability.
When sensitive facility codes or procedures are uploaded to a public cloud, they are no longer protected by federal encryption or access controls. They develop into indexable by search engines and accessible to foreign intelligence services or awful actors looking for vulnerabilities in border security infrastructure.
The stakes here extend beyond a single facility in Texas. If an employee is using these tools for study, it is likely others are doing the same across different sectors of the Department of Homeland Security (DHS), potentially exposing a pattern of systemic OPSEC failures.
CBP Response and Accountability
The CBP’s Office of Professional Responsibility is currently reviewing the incident. In a statement to WIRED, a CBP spokesperson emphasized that the review is internal and should not be interpreted as a confirmation of wrongdoing. However, the speed with which the flashcards were privatized after media contact suggests a sudden realization of the risk.

The fallout for the individual involved could be severe, ranging from administrative reprimand to the loss of security clearances, depending on the classification level of the leaked data. For the agency, the focus will likely shift toward stricter auditing of how personnel interact with external learning and productivity platforms.
Analytical Q&A
Why does this matter if the set was eventually made private?
Once data is public on the web, it is often archived by third-party crawlers or cached by search engines. The “delete” button does not guarantee that the information has been removed from the internet entirely.
Quizlet is a general-purpose tool; the responsibility for data classification lies with the user. However, this highlights the danger of “default-to-public” settings in consumer apps when used for professional government work.
As federal agencies continue to modernize, how can they balance the need for flexible learning tools with the rigid requirements of national security?
