FRONTLINEPRIVACY
Doxxing

Oklahoma man arrested in 2025 for doxxing a former Cleveland County sheriff's deputy

2025-09-01·Cleveland County, Oklahoma

A retired Oklahoma City officer turned sheriff's-office watchdog was arrested in January 2025 and charged under Oklahoma's Computer Crimes Act for posting what prosecutors called identifying information of a former Cleveland County deputy, including her home address. The case is contested. Critics argue the charge is being used to silence a public-records-driven critic of the agency.

What happened

In January 2025, Michael Reynolds, a retired Oklahoma City officer who runs a public-records-driven social-media account critical of the Cleveland County Sheriff's Office, was arrested and charged with violating the Oklahoma Computer Crimes Act. Prosecutors alleged he posted private or identifying information of a former Cleveland County deputy, including her home address and details about minor traffic incidents. Reynolds maintains the records he posted were already public. The defense's free-speech and public-records arguments are an open question that the case will likely test.

What happened

In January 2025, Michael Reynolds, a retired Oklahoma City police officer, was arrested and charged with violating the Oklahoma Computer Crimes Act. The charges centered on social-media posts targeting a former Cleveland County Sheriff's deputy. KESQ and News9 Oklahoma reported the arrest the same week.

Prosecutors said Reynolds posted private or identifying information about the deputy, including her home address and details about minor traffic incidents she had been involved in. Reynolds operates a long-running social-media account critical of the Cleveland County Sheriff's Office, sourced from public records he obtains by request. He has maintained that the records at issue were already public, which is the central dispute in the case.

How it started

The Computer Crimes Act, enacted in part to deter doxxing of public officials, gives prosecutors a charging tool when someone publishes a peace officer's personal information with intent to threaten or harass. The Cleveland County case sits in a contested space: the line between accountability journalism, which routinely uses public records to scrutinize government employees, and harassment that puts an officer's family at risk.

The act of doxxing depends on the target's address being findable. Where it gets found is rarely surprising: broker pages, people-search aggregators, and old data dumps cross-referenced against social media. In this case, Reynolds reportedly relied on public records he had obtained through proper requests rather than broker scraping. The contested case will turn on what the law actually criminalizes when the information at issue is already public.

What this means for you

If you're an Oklahoma deputy, officer, judge, or court employee, you have two real levers. The Address Confidentiality Program (22 O.S. § 60.14) is one of the few in the country explicitly open to officers. Oklahoma's anti-doxxing and computer-crimes statutes give prosecutors a charging tool when someone publishes your information with intent to harm.

What neither does is pull your address off Whitepages or Spokeo. That has to happen separately. The Reynolds case is also a reminder that statutes like this can be contested at the edges, particularly when the underlying records are already public. The cleanest mitigation is upstream: keep the dossier that anyone, accountability watchdog or actual bad actor, would need to build, off the broker pages where it usually starts. We handle that layer continuously.


Editorial rules: Only public, already-reported incidents. Never name a non-public victim. Always end with the prevention takeaway tied to our service. Cite at minimum one public source per claim.

What would have prevented this

Oklahoma's anti-doxxing law (21 O.S. § 1176) is one of the more direct criminal statutes aimed at protecting officers. It punishes publication after the fact. The publication itself happens only because the address is findable, and brokers are where most doxxers find addresses. Oklahoma also has an Address Confidentiality Program that explicitly covers officers (22 O.S. § 60.14). Both layers are real. Broker removal is the layer that runs every day, not just after charges are filed.

Public sources