23 June 2020 04:40
The cache of files was dubbed BlueLeaks by Distributed Denial of Secrets, a WikiLeaks-style organization that posted the data online, saying it "provides unique insights into law enforcement." The group claims the cache includes data from police departments, fusion centers that coordinate between law enforcement organizations, and other police groups. An internal alert from the National Fusion Center Association quoted by Krebs claims that the data does include "personally identifiable information (PII) and images of suspects" as well as "highly sensitive information such as ACH routing numbers, international bank account numbers (IBANs), and other financial data." An index page posted by DDoSecrets highlights IBANs, which are a standardized form of bank account number often used for international funds transfers, included in the data trove. It's not totally clear where the data originated: Krebs reports that the fusion center group claims the leak came from a Houston web development company, but Wired reported that Best declined to confirm that. The hack comes amid ongoing anti-racism and anti-police violence protests sparked by the May 25 killing of a subdued African American by a white Minneapolis police officer. A 'hacktivist' collective going by the name DDoSecrets has released a 269-gigabyte trove of police and FBI data including law enforcement databases, emails, audio and video files, and intelligence documents going back over 20 years.
According to Wired, the million+ file collection of data, dubbed 'BlueLeaks', was mined by Anonymous, and includes information from over 200 local, state and federal agencies. Ten years of data from over 200 police departments, fusion centers and other law enforcement training and support resources. Among the hundreds of thousands of documents are police and FBI reports, bulletins, guides and more. — Distributed Denial of Secrets (@DDoSecrets) June 19, 2020 Along with a database which can be searched by officer badge number, the leak is sure to provide new details on the law enforcement tactics in response to the ongoing George Floyd protests, with users already finding out that the FBI allegedly monitors all tweets related to the demonstrations, and delivers relevant information to local police departments. According to Brian Krebs of KrebsonSecurity.com, the data was siphoned from Netsential, a Houston-based web services company paid to maintain multiple law enforcement data centers, and contains sensitive data including bank routing numbers and other personal identifiers, such as images of criminal suspects.