“We are releasing hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement,” states the latest press release by LulzSec. “We are targeting AZDPS specifically because we are against SB1070 and the racial profiling anti-immigrant police state that is Arizona.”
This is the first data drop since the group banded with Anonymous and other “affiliated battleships” and launched Operation Antisec – a call-to-arms to all individuals that share their view of the world to steal and leak any classified government information they can get their hands on.
According to Rob Beschizza, among the leaked documents – many of which are classified as “law enforcement sensitive”, “not for public distribution”, and “for official use only” – are emails discussing the Mexican governments, reports about unusual law enforcement encounters and incidents trends, vulnerable targets for terrorists to attack, and more.
The Arizona police spokesman has said that the documents seam to be authentic and that the hackers have probably used compromised email accounts of a number of officers to get them.
In the meantime, the hunt for LulzSec members continues. Topping off the effort put by the authorities, there are hackers who have chosen not to affiliate themselves with LulzSec and have been actively working to disclose the real names of the group’s members.
An ex-US military hacker that goes by the handle of Th3J35t3r (The Jester) claims that he has DDoSed www.lulzsecurity.com and discovered details about a LulzSec member that goes by the handle “Sabu”. As you might remember, “The Jester” has also previously proved his contempt of WikiLeaks.
Another LulzSec member has, in the meantime, talked to Adrian Chen and expressed his unconcern when it comes to the possibility of being hunted down. He also repeated that the recently arrested Ryan Cleary is not a member of LulzSec, that he only ran a chat server on which a public LulzSec chat room was hosted.