Millions of Anonymous Student and Crime Tips Exposed in Major Data Breach

What was meant to stay hidden may no longer be.
A massive trove of sensitive data tied to anonymous crime and student safety tips was reportedly exposed, raising new concerns about whether such systems can truly protect the people who rely on them.
A hacker group calling itself “Internet Yiff Machine” says it breached systems linked to P3 Global Intel, a platform widely used by law enforcement, schools, and government agencies to collect confidential tips. The group claims it stole more than 8 million submissions, amounting to roughly 93 gigabytes of data. The material allegedly includes tip reports, user account details, and internal support requests.
According to records obtained by Straight Arrow News (SAN) and the nonprofit leak archive DDoSecrets, the stolen data includes tipster conversations, personal details about people accused in those tips, and even internal company pages that show how administrators can track users without their knowledge.
The data spans from February 1987 to November 2025.
Who is affected
The leak casts a wide net. Clients of P3 include the US Air Force, Army Criminal Investigation Division, Homeland Security Investigations, the Secret Service, and the IRS Criminal Investigation Division. Federal spending records show four departments, Defense, Homeland Security, Justice, and Interior, paid P3’s parent company nearly $1.3 million between 2020 and 2025.
But it’s the schools that stand out. More than 30,000 schools use the P3 tip software, according to the company’s website. Many of the messages in the leaked data involve students in crisis: self-harm, suicide threats, bullying, and potential violence.
In one report from 2022, a parent told Pennsylvania’s Safe2SayPA program about a seventh-grader who classmates were calling “the school shooter.” The student had been fixated on firearms and grenades, the parent wrote. A wellness check later sent the child to a hospital for a mental evaluation. The student’s full name appears throughout the leaked report, according to SAN.
What the hackers found
The group behind the breach left a note explaining their motivation. They had strong words for anyone thinking of reporting crimes to the police.
“Remember folks, don’t do the dirty work for the pigs,” the hackers wrote. “Investigating crime is their job, not yours. They don’t care about you, they want convictions and prisoners to fuel the for-profit prisons.”
The hackers said they exploited several security flaws they found in P3’s system, including a lack of encryption despite the company’s claims to the contrary. They also pointed to an internal page, marked confidential, that showed how P3’s clients can request tipsters’ IP addresses.
That feature is described in company materials as “Session Information Disclosure.” By default, it’s turned off. But when enabled, P3 captures tracking information for up to 90 days and can hand it over to clients upon request. The company says this is meant to address misuse or abuse of the system, such as threats against life or property.
Still, the feature raises questions about whether tipsters are truly anonymous.
The stolen records include names, email addresses, phone numbers, home addresses, license plate numbers, Social Security numbers, and criminal histories of people accused in tips. Tipsters’ own personal information also appears throughout the leak.
The hackers also exposed chat logs between tipsters and the agencies receiving the tips. Some messages detail reward payments to tipsters whose information led to arrests, including instructions on picking up cash envelopes from local police departments and banks.
The company’s response
Navigate360, the parent company of P3, is currently in damage control mode. While they have hired a third-party forensics firm to investigate, they aren’t ready to admit the full scale of the disaster just yet.
CEO JP Guilbault said in a statement to SAN: “To this point, we have not confirmed that any sensitive information has been accessed or misused.” However, for the millions of people whose private warnings are now in the hands of hackers, those words may offer very little comfort.
Also read: Recent breaches, AI rollouts, and wider tech shakeups are colliding in ways that keep raising the stakes for companies and users alike.
