DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Arizona police force exposed again in Chinga La Migra II

Posted on July 1, 2011 by Lee J

Anoymous has just release chinga La migra III in a roll of releases this week. Operation Anti Security they released a list of domains effected as well, azfop.com, azfop78.com, azfop5.com, tucsonfop.com, mesafop.com, azfop32.com, azfop50.com, and azfop58.com, stating that some may even bee knocked offline. In the press release statement by anonymous they state that there is master list of over 1200 officer’s user names, passwords, and email addresses. it goes on to sya that hundreds of emails spools that belong to the FOP presidents, vice presidents,secretaries, a police chief. So this see’s Arizona police force exposed again. With the statement saying they have been handing a password list around the blackhats for a while now and need the publish help to sort out the good from bad emails and expose these governments!!! scroll down for link’s to source. As from twitter:

A wild release appears: #AntiSec proudly presents: Chinga La Migra III – The Final Blow. Yes, Arizona, one more round. https://bit.ly/l4Jraj

Original Press release from Anonymous —————————————————————————— NOTE: Since thepiratebay.org was down at the time of this release, you are reading this on pastebin. You will find download links for the third Chinga La Migra installment as well as a torrent link at the bottom of this text. ——————————————————————————- _ _ __ .__ | || | _____ / |_|| ______ ____ ____ #anonymous __ / __ / __ |/ // __ / ___ #anarchists | || | / __ | | | | | / ___ #antisec / ~~ _ ( /| /| |/____ >__ >___ > #lulzsec |||| / / / / / #chingalamigra /******************************************************************************* **## CHINGA LA MIGRA COMMUNIQUE 3 ** 7/01/2011 ** FRATERNAL OWNAGE OF POLICE *** *******************************************************************************/ defaced domains: azfop.com, azfop78.com, azfop5.com, tucsonfop.com, mesafop.com, azfop32.com, azfop50.com, and azfop58.com — (some or all possibly pulled offline, lulz) For the third knockout blow against Arizona law enforcement, we decided to get destructive. We’re defacing eight AZ Fraternal Order of Police websites and releasing a master list of over 1200 officer’s usernames, passwords, and email addresses. Additionally we are leaking hundreds of private FOP documents and several more mail spools belonging to FOP presidents, vice presidents, secretaries, a police chief, and the FOP Labor Council executive directory and webmaster whose insecure web development skills was responsible for this whole mess. We’re doing this not only because we are opposed to SB1070 and the racist Arizona police state, but because we want a world free from police, prisons and politicians altogether. In this batch of emails we found more racist email chain emails, including Springerville’s police chief Mike Nuttal forwarding jokes about torturing "ragheads". FOP president Brandon L Musgrave was also forwarding anti-muslim emails while also purchasing large amounts of guns, so we’re dumping his paypal and credit card information as well. Other drama includes internal arguments over FOP positions, disputes over arrested FOP member Michelle Preiss, lots of crude anti-Obama jokes, and lots lots more. Amusingly we also were reading James Mann’s emails as they were discussing the AZDPS hacks and struggling to send out press releases explaining why they had a sex offender in their FOP ranks. Initially James changed all his passwords and pulled the AZFOP sites down out of fear of impending hacker attacks, but there is no stopping the kind of chaos we bring upon all those who cross our path. Truth be told we’ve been passing around this password list amongst our black hat comrades for a while now. Much to our amusement we’ve been reading everybody’s emails looking for dirt and personal info, while leaking bits and pieces to expose and instill fear into the crooked cops of Arizona. However the list proved to be too great, and now we are seeking community assistance in going through everybody’s inbox to retrieve and expose their secrets. Go forth and bring mayhem to the lives of these corrupt officers, and tell us what you find on irc.anonops.li #antisec. Let this third and crushing blow against Arizona police send a strong message to the ruling class around the world. You will no longer be able to operate your campaign of terror against immigrants and working people in secrecy: we will find you, expose you, and knock you off the internet. Many lulz have been had while we purposefully strung you along slowly and painfully for the past two weeks. We know exactly what we’re doing, so think twice before considering crossing us. Hackers of the world, join us as we resist against the governments and corporations of the world, for there is enough bounty for everybody aboard the good ship #antisec. —————————————————————————— Find the full release text including the Dox, Files and Emails/Passwords in the release which can be downloaded at the following locations: DIRECT DOWNLOAD LINKS: ———————- https://www.mediafire.com/?31d844rs959e1e0 https://remixshare.com/dl/7imgq/Chinga_La_Migra_Tres.rar TORRENT: ——– https://ca.isohunt.com/release/679889

No related posts.

Category: Breach Incidents

Post navigation

← Database of Pakistani web site users exposed by hackers
Arizona Police force websites defaced and leaked →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.