CONFERENCE On Demand: Cyber AI & Automation Summit - Watch Now
Connect with us

Hi, what are you looking for?



Twitter Suspends Account of Organization Behind Police Leaks

Twitter has permanently banned the account of Distributed Denial of Secrets (@DDoSecrets) after it posted links to stolen information belonging to hundreds of law enforcement organizations in the United States.

Twitter has permanently banned the account of Distributed Denial of Secrets (@DDoSecrets) after it posted links to stolen information belonging to hundreds of law enforcement organizations in the United States.

Distributed Denial of Secrets (DDOS), a WikiLeaks-style organization whose goal is the “free transmission of data in the public interest,” recently leaked roughly 270 GB of information on more than 200 police departments, fusion centers, the FBI and other law enforcement organizations.

The files, collectively named “BlueLeaks,” were allegedly provided to DDOS by hackers who are part of the Anonymous hacktivist movement. The files appear to originate from Netsential, a Texas-based web development company, which reportedly admitted being breached through a compromised customer account.

Journalist and activist Emma Best, one of the main people behind DDOS, reported on Tuesday that Twitter permanently suspended the organization’s account. Twitter said it suspended the account for violating rules “against distribution of hacked material.”

“We don’t permit the use of our services to directly distribute content obtained through hacking that contains private information, may put people in physical harm or danger, or contains trade secrets,” Twitter said in the email announcing its decision to suspend the account.

Best told Wired they have tried to remove certain types of information from the leaked files, including details on crime victims, children, private businesses, healthcare firms and veterans associations, but admitted that they may have missed some things.

Twitter is also preventing users from posting links to the DDOS website, telling them that the link has been identified as “potentially harmful.” When users try to access previously posted links, they are informed that the link could point to a website that phishes personal information, installs malware, or violates Twitter’s terms of service.

BlueLeaks tweet

The National Fusion Center Association (NFCA), which has confirmed the validity of the leaked files, raised concerns that threat actors could leverage the information to target law enforcement organizations and their employees.

Advertisement. Scroll to continue reading.

Ilia Kolochenko, founder and CEO of web security company ImmuniWeb, who also has a master’s in criminal justice and cybercrime investigations, pointed out that the leak could have serious consequences for many innocent people.

“First, it will likely inflict irreparable reputational, financial and even physical harm to suspects and people charged with crimes who later were acquitted in a court of law,” Kolochenko said. “Furthermore, it will jeopardize legally protected people, like witnesses, who helped investigators convict dangerous criminals. The disclosure will now literally cause the death of the witnesses if their identity is revealed to the criminals or their bloodthirsty accomplices. Finally, it will substantially hinder the performance of daily law enforcement operations across the entire country, bolstering street crimes and violent crime, exposing thousands of helpless people to the risk of serious bodily injuries and death.”

Some supporters of DDOS’s work have claimed that none of the leaked files are classified, while others pointed out that WikiLeaks and other similar entities have not had their accounts suspended by Twitter despite posting links to information obtained through hacking.


Related: Police Officers’ Personal Info Leaked Online

Related: Twitter Suspends Fake Accounts for Exploiting API Vulnerability

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.