How NCRIC Keeps Tabs on Black Lives Matter Protesters - 2020-08-17

From UmbraXenu
Jump to: navigation, search
F0.png How NCRIC Keeps Tabs on Black Lives Matter Protesters August 17, 2020, Micah Lee, The Intercept

Almost two weeks after a Minneapolis police officer killed George Floyd while he was handcuffed face down in the street, a hacker began exfiltrating 19 gigabytes of documents from the poorly secured Northern California Regional Intelligence Center website. The NCRIC (pronounced "nick-rick") fusion center shares information between federal agencies, local police departments across northern California, and private industry partners, including Silicon Valley companies. It also provides local cops with analytical and technical support services such as monitoring social media or helping break into locked smartphones, and it hosts events and law enforcement-related courses.

The hacked data from NCRIC, provided to transparency collective DDoSecrets by a source identifying with the hacktivist collective Anonymous, was part of a larger breach of 251 police websites across the country known as BlueLeaks. German authorities, acting on behalf of the U.S. government, seized the server DDoSecrets was using to distribute the BlueLeaks data, though the data itself is still publicly available on the internet using the peer-to-peer file sharing technology BitTorrent. (Note: I'm a member of the DDoSecrets advisory board.)

The NCRIC documents, from a 13-day period between George Floyd's killing on May 25 and the evening of June 6, when the latest information was exfiltrated (judging from time stamps found in the leaked material), provide an unprecedented window into the internal workings and priorities of Northern California's police intelligence agency during the recent waves of anti-police brutality protests.

Wikipedia cite:
{{cite news | first = Micah | last = Lee | title = How NCRIC Keeps Tabs on Black Lives Matter Protesters | url = | work = The Intercept | date = August 17, 2020 | accessdate = August 19, 2020 }}