Millions Of ‘Anonymous’ Crime Tips Exposed in Crime Stoppers Hack: 8.3 Million Records Leaked

Texas company P3 Global Intel exposed 8.3 million tipster records dating to 1987, including cartel intelligence and federal threat reports

Al Landes Avatar
Al Landes Avatar

By

Image: Robert Kuyken – Flickr

Key Takeaways

Key Takeaways

  • Hackers exposed 8.3 million anonymous crime tip records from P3 Global Intel
  • P3’s “anonymous” platform secretly allowed clients to request tipster IP addresses
  • Federal agencies paid Navigate360 $1.3 million despite weak security protecting informants

Dead drops and encrypted phones feel quaint compared to modern tip platforms—until hackers prove your digital anonymity was always an illusion. P3 Global Intel, the Texas company powering anonymous crime reporting for thousands of police departments and federal agencies, just leaked 8.3 million records spanning nearly four decades.

“THE INTERNET YIFF MACHINE” hacker collective dumped everything from 1987 tipster details to Secret Service bulletins about Trump threats, exposing the hollow promise of digital anonymity in law enforcement.

The breach reads like a national security nightmare. Sinaloa cartel trafficking intelligence from a California resident demanding strict anonymity sits alongside military sexual assault reports and school suicide risk assessments.

“Those risks include severe harm and even death to police informants… risks to national security,” warns Mailyn Fidler, cybersecurity professor at UNH Law. When your tip about drug dealers includes your real name and address in an unencrypted database, anonymity becomes a death sentence.

P3 markets itself as the gold standard for anonymous reporting, yet the leak reveals a “Session Information Disclosure” feature letting clients request tipster IP addresses for 90 days. Translation: anonymity comes with an asterisk and a corporate escape clause.

Passwords and user IDs sat unencrypted on their servers like digital evidence bags left unlocked. The gap between P3’s security theater and actual protection resembles the difference between a Ring doorbell and Fort Knox.

Federal agencies paid P3’s parent company Navigate360 over $1.3 million between 2020-2025, according to USASpending.gov records. The Department of Defense became their largest client, alongside DHS, DOJ, and more than 30,000 schools using platforms like Safe2SayPA.

DDoSecrets, the transparency group publishing the leak, calls it “BlueLeaks 2.0”—referencing their 2020 release of 269GB in police fusion center data.

Navigate360 claims no prior breaches while ignoring media requests for comment. The hackers weren’t subtle about their motivation, criticizing for-profit prison systems and what they called P3’s security contradictions in their breach manifesto.

The damage extends beyond embarrassment. Informants face exposure, ongoing investigations risk compromise, and the entire ecosystem of privatized police technology faces scrutiny. When companies promise anonymity but deliver surveillance theater, trust becomes the first casualty—followed potentially by the people who believed those promises.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →