Millions of anonymous crime tips exposed in massive Crime Stoppers hack

pUnbiased Straight Factspp
Federal immigration crackdowns and the fear that results from them have farmers worried they might not have enough workers this year pp
A new national study is pointing to education level as a growing divide in colorectal cancer deaths among younger Americans pp
Several victims were taken to area hospitals for treatment Authorities have not released information on their conditions pp
Eight children were killed in a shooting early Sunday in Shreveport Ten people were shot in total and the suspect is dead ppA California resident had an urgent message for the police A family tied to Mexicos notorious Sinaloa drug cartel was trafficking hundreds of pounds of marijuana at a time and the tipster knew how the police could apprehend these highly violent people who always carry weaponsppEqually urgent to the tipster secrecyppPlease this must remain anonymous the tipster wrote so if captured do not say it was from a tip cause they would know where it came frompp
Download the SAN app today to stay uptodate with Unbiased Straight Facts pp
Point phone camera here ppThat tip however is one of millions exposed by hackers who stole data from the cloudbased tip and intelligence management company P3 Global Intel The Texasbased company enables the public to share crime tips anonymously it says with thousands of clients including Crime Stoppers programs local and federal law enforcement agencies public schools and the US military P3 says its name stands for public police and private sectorppThe leak contains extensive personal data on people accused by tipsters names email addresses dates of birth phone numbers home addresses license plate numbers Social Security numbers and criminal histories ppAlthough P3 says in sales material for clients that each tipsters identity will remain anonymous at all times personal information from those who shared it is also present throughout the leakppExposure of P3s data would pose serious risks in the hands of anyone with malicious intent said Mailyn Fidler an assistant professor at the University of New Hampshire Franklin School of Law who studies cybersecurity and cybercrime lawppThose risks include severe harm and even death to police informants Fidler told Straight Arrow News Given P3s clients it also includes risks to national security If what the hackers report about P3s security practices are true they engaged in substantially subpar security practices especially given the sensitivity of the information they handleppFor now theres no indication that the hackers plan to make the data accessible to the public In a statement to SAN Navigate360 CEO JP Guilbault whose company owns P3 said they have hired a thirdparty forensics firm to determine whether a breach took place P3s systems Guilbault said remain operationalppTo this point we have not confirmed that any sensitive information has been accessed or misused Guilbault saidppStraight Arrow News and the nonprofit leak archiver DDoSecrets obtained more than 83 million highly sensitive records of P3s from a hacker group that calls itself THE INTERNET YIFF MACHINE The records span from February 1987 to November 2025 In addition to the tips the breach of P3s servers also revealed user account details and customer support requestsppIn a note included alongside the data cache the hacker group repeatedly cited animus toward law enforcement as motivation for exposing the crime tipsppRemember folks dont do the dirty work for the pigs the hackers wrote Investigating crime is their job not yours They dont care about you they want convictions and prisoners to fuel the forprofit prisons ppThe note goes on to outline numerous vulnerabilities that the hackers say contradict P3s assurances about its security The note specifically mentions a statement from P3s parent company saying its tools have never been breached or compromised in any manner over the past 20 yearsppThey claim to have never had a breach the hacking group wrote Lets change thatppThe hackers also exposed an internal page for P3s customers marked confidential that reveals how the companys clients can track tipsters without their knowledgeppThe page details an optin feature titled Session Information Disclosure that allows P3 customers to request their tipsters IP addresses The hackers showed a screenshot of the page to SANppThe page says the feature is designed to address potential misuse or abuse of its system by tipsters P3 is capable of capturing session information from web mobile top submissions By default this is disabled on all accounts When tracking is enabled the values are stored for a period of up to 90 days and can be made available to you upon formal request in the event of serious misuse or abuse of our system such as first person threats against life or propertyppIts unclear however what guardrails are in place to keep P3s customers from abusing the feature to uncover the identities of anonymous tipsters For instance a police officer accused of misconduct by a tipster might obtain the persons IP address and other identifying informationeven though tipsters are told that their anonymity is protected at all timesppBlueLeaks 20ppWhen one of P3s clients receives a tip whether over the phone online or through its smartphone app users are sent a unique ID number and password that can be used to check the status of their submission Given that those messages do not appear to have been stored in an encrypted format which would protect them in the event of a data breach SAN was able to locate IDs and passwords in plain textppThe hackers also exposed chat logs between those sending and receiving tips Some messages detail rewards given out to those whose tips resulted in arrests Those tipsters are given instructions on how to collect their reward which can come in the form of cash in an envelope from local police departments and banksppDDoSecrets has dubbed the data cache BlueLeaks 20 The name is derived from the leak archivers publication in 2020 of 269 gigabytes worth of law enforcement data The documents in the original BlueLeaks files which included intelligence bulletins and emails were provided to DDoSecrets after the hacker collective Anonymous breached a company that worked with Fusion Centers and law enforcement Fusion Centers many of which now have contracts with P3 are stateowned and operated collaborative hubs that collect analyze and distribute information among federal state and local law enforcement agenciesppFor years weve warned about the problems with Fusion Centers and with privatizing these systems the endless retention even of submissions that are disregarded the largely unregulated information sharing and the failures to actually protect the identities of both alleged victims and perpetrators DDoSecrets cofounder Emma Best told SANppGiven the breadth and significance of the data DDoSecrets says it will grant select researchers and media outlets access to conduct additional reportingppAnonymity not guaranteedppThe leak reveals the scope of P3s work for thousands of local law enforcement agencies as well as the federal governmentppFour federal departments Defense Homeland Security Justice and the Interior paid P3s parent company almost 13 million between 2020 and 2025 according to the government contracting website USASpendinggovppAlthough subagencies like Immigration and Customs Enforcement and the Secret Service do not appear to rely on P3s tip software the data shows that representatives of both agencies have accounts Other government entities with user accounts include the Internal Revenue Service and the Department of AgricultureppThe leaked data includes a 2023 Situational Awareness Bulletin that details an investigation by the Secret Service into an Arizona man described as experiencing mental health delusions The man whose name description license plate number home address and phone number are listed in the bulletin is reported to have sent letters to churches in Arizona and California detailing his desire to kill President Donald TrumpppWhile under courtordered treatment the bulletin states the man was interviewed by the Secret Service Following the interview the man is said to have increased his writing campaign by flooding several police agencies throughout the state with letters indicating additional threats to Trump who was then out of officeppThe police in Arizona who say they maintained contact with the mans parents in an attempt to mitigate his activity ended the bulletin by calling on any other departments receiving threatening letters to forward copies to their detectives as well as the Secret Service It remains unclear if the case against the man ever resulted in criminal chargesppThe military appears to be the largest federal user of P3s servicesppIn a tip from 2020 a woman enlisting in the Army used P3 to report to the military branchs Criminal Investigation Division that shed been sexually assaulted by a recruiter The woman who asked for anonymity over fears that shed be labeled by the military as someone who complains named the man before accusing him of touching her breast and offering her a prominent job in exchange for oral sexppI yelled at him and told him NO thank you and do not touch me and he smacked me on my ass and said he could take me by force and that there was nothing I could do she wrote I at that point pulled out some pepper spray I had in my purse and he backed off and said he was just joking and that if I wanted to make it in the army I needed to be cool like one of the guysppThe woman went on to disclose the embarrassment and worry she felt over reporting the incident She ultimately decided to come forward because she feared the recruiter would assault more people ppYet despite her belief that an anonymous tip would be enough to spur an investigation the woman was told that shed have to provide details about herself to move forwardppI understand your desire to remain anonymous however without additional identifying information it will be nearly impossible for us to investigate the allegations a military official responded If you would like to provide additional information please advise how you would like to coordinate with my officeppSAN reached out to multiple people in the data who submitted tips and spoke with a man who filed a report in 2023 with police in California The man an Open Source Intelligence OSINT analyst and instructor who uses the handle OSINT Tactical on social media confirmed to SAN that hed submitted a tip about a man whod been viewing child sexual abuse material onlineppIn the tip OSINT Tactical says he came across the mans activity in an infostealer log a collection of sensitive data extracted from devices compromised by malware OSINT Tactical who provides OSINT training to military law enforcement and the private sector listed websites the man reportedly visited as well as what he believed to be his name email addresses phone number home address and IP addressppI have sent quite a few tips in the recent years probably over 100 the tipster told SANppThe software has also been adopted by more than 30000 schools and US nonprofits such as Sandy Hook Promise an organization focusing on gun violence prevention programs Many schoolrelated messages viewed by SAN involved highly sensitive matters such as selfharm suicide and threats of violence and the leak exposed personal data that P3 collectedppIn a message sent in 2022 to Safe2SayPAorg a P3powered website that allows students and educators in Pennsylvania to submit anonymous tips a parent reported that their seventhgrade student had expressed fears about a classmate who had been fixating on firearms grenades and selfharmppAn internal note in the report states that local police completed a wellness check on the student sometime later which resulted in a trip to the hospital for a mental evaluation The student the note adds had been the victim of ongoing bullying that included taunts that referred to him as the school shooterppThe note continues by stating the students foster parents kept firearms in the home but they were locked away by the dad The student was ultimately pulled from his middle school but not publicly identifiedppIn the leaked P3 data his full name appears throughout the reportppEditors note This story has been updated to include a statement from Navigate360s CEOpp
According to media bias experts at AllSides
ppAwarded a perfect reliability rating from NewsGuardpp
A data breach exposed millions of anonymous crime tips revealing personal details of both tipsters and accused individuals undermining promised confidentiality and creating documented security risks for informants and national securityppPersonal information from millions accused in anonymous crime tips including names addresses and Social Security numbers was stolen by hackersppP3 can capture IP addresses and session data from anonymous tipsters and provide it to clients upon request with unclear limits on misusepp
According to media bias experts at AllSides
ppAwarded a perfect reliability rating from NewsGuardppAccording to media bias experts at AllSidesppPerfect reliability rating according to experts at NewsGuardppFinally unbiased news that lets you see both sides Its refreshing to have facts without the spinppThis app gives me the news without pushing a political agenda which is rare to findppStraight Arrow is committed to unbiased factbased journalism in an environment where media mistrust is at an alltime high With todays divisive political and media environments our goal of serving you not any partys agenda is even more criticalppUnbiased Straight FactsppGet the SAN appppStart your day with factbased newsppLearn more about our emails Unsubscribe anytimepp
Terms and Conditionspppp
Privacy Policypppp
Copyright PolicyppppYour Privacy ChoicesppppSitemappp 2026 Straight Arrow NewsppDaily NewsletterppLearn more about our emails Unsubscribe anytimep