Understanding Blueleaks

  • Home
  • /
  • Understanding Blueleaks

Share

blueleak-thehack

  With 2020 bringing in many changes that go as quickly as they come, none expected a hack on the American Government system.

Largest Published Hack Of American Law Enforcement Agencies

BlueLeaks refers to 269 gigabytes of internal U.S. law enforcement data obtained by the hacker collective Anonymous and was released on 19th of June, 2020, by the activist group Distributed Denial of Secrets(DDoSecrets), which called it -“the largest published hack of American law enforcement agencies”.

what_was-the-hack_“The BlueLeaks archive indexes, ten years of data from over 200 police departments, fusion centers, and other law enforcement training and support resources and that among the hundreds of thousands of documents are police and FBI reports, bulletins, guides and more”, says DDoSecrets, in a recent tweet.

 According to the report by KrebsOnSecurity, the data was taken from Nesential, which is a web developer that works with fusion centers and law enforcement agencies. Fusion centers are state-owned information gathering and analyzing centers that often coordinate between different regional, local, and federal law enforcement divisions. Specifically, the groups and fusion centers affected include the Missouri Information Analysis Center, the Northern California Regional Intelligence Center, the Joint Regional Intelligence Center, the Delaware Information and Analysis Center, the Austin Regional Intelligence Center, and Infragard.

The BlueLeaks collection includes internal memos, financial records, and more from over 200 state, local, and federal agencies. Moreblack_lives_matter_revolution_ than one million documents were leaked from law enforcement fusion centers. In those leaked documents, officers track individuals, groups, and event pages with protests or any anti-law enforcement rhetorics. Some of the documents contain materials related to the attitudes of law enforcement and their response to the BLACK LIVES MATTER MOVEMENT, George Floyd protests, and the COVID-19 pandemic.

Read More: How to Stay Updated with Latest Cybersecurity News

The BlueLeaks data set was released on June 19, also known as “Juneteenth,” the oldest nationally celebrated commemoration of the ending of slavery in the United States. This year’s compliance with the date has been renewed in public interest in the wake of widespread protests against police brutality and the filmed killing of George Floyd at the hands of Minneapolis police.

During the George Floyd protests, law enforcement agencies monitored the protester’s statements and messages over social media. The leaked reports found that the police were aware of the potential for their surveillance to violate the Constitution. They distributed documents to police filled with rumors and warnings that the protests would become violent, sparking fear among police officers.

Read More: Why BlueLeaks Shatters Internal Security

The leaks were released at hunter.ddosecrets.com and announced on the @DDoSecrets Twitter account. The account was banned shortly after for “dissemination of hacked materials” and for the “information that could have put individuals at risk of real-world harm”. The Wired magazine reported that Distributed Denial of Secrets attempted to remove sensitive information from the data before its publication.

National Fusion Center Association (NFCA) officials confirmed the authenticity of the data, according to documents obtained by security journalist Brian Krebs; the organization warned its members that hackers may use this leaked information to target them. German authorities seized a server used by DDoSecrets at the request of U.S. authorities. The server had hosted the BlueLeaks files, but the documents remained available for downloading through BitTorrent and other websites.

Interested and want to know more about similar hacks on government websites? Follow the blog to get the latest trends in the field of cybersecurity.

Picture of Anjali K

Anjali K

Anjali is a cybersecurity researcher with expertise in simplifying complex topics, from penetration testing to cloud security frameworks. Her work focuses on making essential security practices accessible, helping businesses and individuals adopt proactive measures to strengthen their digital defenses.

Share

Join a secure newsletter.

Secure, disturbance free and spam-free

Leave a Reply

Top 15 Cybersecurity Frameworks in 2024

Top 15 Cybersecurity Frameworks in 2024

As businesses are more interconnected globally, the threat of cyber attacks looms over every organization. Cybersecurity frameworks are introduced by many organizations to address this

Read More »

Protecting Small Businesses from COVID-19

Our committment towards small businesses is now affordable.

Starting From

$349

Enquire Now

Ask our experts.

Quick Contact

Talk to our team

Protecting your Business

Book a free consultation with us .

Enquire Now

Ask our experts.

Quick Contact

Talk to our team