Light bulb Limited Spots Available: Secure Your Lifetime Subscription on Gumroad!

Mar 28, 2026 · 6 min read

8 Million "Anonymous" Crime Tips Just Got Exposed

A hack of P3 Global Intel reveals that Crime Stoppers tips were never truly anonymous. Names, SSNs, and addresses of tipsters spanning decades are now in the open.

Sealed envelope being torn open revealing redacted documents on a desk under lamp light

The Promise Was Anonymity

For nearly four decades, Crime Stoppers programs across the United States have relied on one pitch: submit a tip and your identity stays secret. Over 8.3 million people took that promise seriously. They reported crimes, flagged suspicious behavior at schools, and helped law enforcement build cases. The platform handling many of those tips was P3 Global Intel, a Texas based company whose clients include Crime Stoppers programs, over 30,000 schools, and federal agencies including the Secret Service, ICE, and the IRS.

That promise just shattered. A hacker group calling itself the Internet Yiff Machine breached P3's systems and extracted 93 gigabytes of data spanning from February 1987 to November 2025. The stolen records include the very information tipsters were told would never be stored: names, email addresses, phone numbers, home addresses, dates of birth, Social Security numbers, and criminal histories.

What Was Actually Exposed

The breach goes far beyond basic contact information. The stolen data includes:

  • Tipster identities: names, emails, phone numbers, home addresses, and SSNs of people who submitted "anonymous" tips
  • Tip content: the full text of reports, including accusations about specific individuals
  • Chat logs: conversations between tipsters and law enforcement receivers
  • Reward information: payment instructions revealing who received reward money
  • License plate numbers and criminal history records of people named in tips

The nonprofit leak archiver Distributed Denial of Secrets obtained the data and dubbed it "BlueLeaks 2.0," referencing a 2020 law enforcement data leak. Researchers and journalists are now analyzing the records.

Passwords Stored in Plain Text

The hackers said they exploited multiple security flaws in P3's systems. The most damning: unique ID numbers and passwords were stored in plain text, not encrypted. This is a basic security failure that would be unacceptable for a consumer application, let alone a platform handling sensitive law enforcement data.

P3 had previously claimed its tools "have never been breached or compromised in any manner over the past 20 years." The hackers directly contradicted this, describing the company's security practices as "substantially subpar" given the sensitivity of the information it handles.

P3 also admitted to capturing tracking information about tipsters for up to 90 days and sharing it with clients on request, a practice that contradicts the fundamental premise of anonymous reporting.

30,000 Schools and the US Military

The breach extends well beyond Crime Stoppers programs. P3's client list includes more than 30,000 schools, including platforms run through Sandy Hook Promise. Students, parents, and teachers who reported bullying, threats, or suspicious activity believed they were doing so anonymously. That data is now compromised.

Federal agencies are also affected. The Departments of Defense, Homeland Security, Justice, and Interior collectively spent nearly $1.3 million on P3 services between 2020 and 2025. The US Air Force, Army Criminal Investigation Division, and Homeland Security Investigations all maintained accounts. Military personnel who reported sexual assault or misconduct through these channels face particularly severe consequences if their identities are exposed.

The Real Danger Is Retaliation

Anonymous tip systems exist because reporting crime carries risks. Witnesses to gang violence, domestic abuse survivors, employees who report fraud, and students who flag threats all depend on anonymity for their physical safety. When that anonymity disappears retroactively, every person who ever submitted a tip through P3 faces potential retaliation from the people they reported.

This is not a theoretical concern. The data includes chat logs showing ongoing conversations between tipsters and law enforcement, reward payment records that identify informants, and enough personal information to locate and identify anyone in the database. For tips related to violent crime or organized criminal activity, the exposure could be life threatening.

A Pattern of Broken Promises

The P3 breach is part of a larger pattern where organizations that promise anonymity or privacy fail to deliver. Health benefits administrator Navia exposed 2.7 million people's SSNs through a basic API flaw. Data brokers have been caught selling lists of people with medical conditions, including their email addresses. The companies that handle the most sensitive data consistently demonstrate the weakest security practices.

The lesson is not that people should stop reporting crimes. It is that any system that collects personal data, regardless of its stated purpose, can be breached. And when it is, the people who trusted it the most suffer the greatest consequences.

What You Should Do Now

If you have ever submitted a tip through a Crime Stoppers program, a school reporting platform, or any P3 powered service:

  • Assume your information is compromised. There is no way to confirm whether your specific tip was in the breach without exposing yourself further
  • Monitor your credit and identity. With SSNs exposed, identity theft is a real risk
  • Be cautious with unsolicited contact. If someone references information from a tip you submitted, do not confirm or deny your involvement
  • Report concerns to law enforcement if you believe your safety is at risk due to the exposure