A person identifying themselves as "Internet Yiff Machine" has posted a statement online alleging they gained unauthorized access to P3 Global Intel - the tip-intelligence division of safety services company Navigate360 - and removed a large cache of data containing more than 8 million confidential tips, totaling about 93 gigabytes.
According to the online statement, the intruder first took control of one of P3's customer accounts through social engineering and then exploited a security flaw to extract the files. The hacker's message included a profane anti-police slogan and an explicit warning aimed at the public: "Don’t do the dirty work for the pigs."
Representatives for P3 did not reply to repeated requests for comment, and authorities did not provide an immediate response to inquiries about the allegations. Navigate360's website describes the company as the "leading provider of innovative tips and leads solutions" for law enforcement, federal agencies, the military, and school safety initiatives.
Outside parties have reported receiving portions of the data. The site Straight Arrow News said it had corroborated some items in the material by contacting tipsters whose details appeared in the files. The transparency group Distributed Denial of Secrets reported that it had been given a copy of the data and plans to make it available to "established journalists and researchers." Emma Best, who founded that site, said the collection offers "excruciating detail" about a tip collection system she characterized as one that "seeks to make everyone an informant."
The claims about the intrusion and the contents of the files could not be immediately verified. Those involved in reviewing or holding the material have not provided independent confirmation of the full scope of the dataset or of the method of compromise beyond the account takeover and exploitation described by the intruder.
The alleged breach, if confirmed, touches multiple stakeholders: law enforcement agencies and other public bodies that submit or rely on tips; private vendors that provide tip collection and analysis platforms; and the individuals who supplied confidential information through those hotlines.
Context and implications
- The incident centers on claimed unauthorized access to a third-party platform used to gather and analyze hotline tips for law enforcement and other agencies.
- Reporters and transparency groups say they have obtained parts of the material; broader verification remains pending.
- The situation highlights potential vulnerabilities in vendor-hosted systems that aggregate sensitive citizen reports for public-sector entities.