Leaked documents show how police used social media to track George Floyd protesters

Authored by businessinsider.com and submitted by hildebrand_rarity

Leaked documents show how law enforcement has kept tabs on demonstrators since anti-police-brutality protests first broke out after the death of George Floyd, a Black man who died in police custody.

Police exchanged protesters' Twitter handles, noted that protesters were sharing plans in private Slack and Telegram channels, and kept lists of people who responded to protest events on Facebook, the documents show.

Records also show law enforcement focusing heavily on perceived threats against officers' lives posted to social media, including planned attacks against police that never materialized.

The sensitive police documents were obtained by hackers and first leaked earlier this month in a data dump known as "BlueLeaks" by DDoSecrets, a Wikileaks-style publisher.

Visit Business Insider's homepage for more stories.

As nationwide protests against police brutality and racism stretch into their second month across the US, newly leaked documents show how law enforcement is using social media to keep tabs on protesters.

Police departments and federal law enforcement agencies including the FBI and the Department of Homeland Security exchanged information about protesters gleaned from social media, the documents show. Police monitored RSVP lists on Facebook events, shared information about Slack channels protesters were using, and cited protesters' posts in encrypted messaging apps like Telegram.

The police documents were obtained by hackers last month and leaked to the website DDoSecrets, which describes itself as a publisher that does not participate in hacking. DDoSecrets then published the hundreds of thousands of files in a data dump titled "BlueLeaks." Several police tactics revealed in the leaked files were later compiled and analyzed by The Intercept.

The files were leaked from fusion centers, or agencies that share intelligence reports, crime alerts, and information between state and local police departments. Most of the files were unclassified but had not been published previously.

After publishing the BlueLeaks files, DDoSecrets was permanently banned from Twitter. A Twitter spokesperson told Business Insider the site was banned for breaking Twitter's policy against posting hacked material, but did not clarify why other news outlets that covered BlueLeaks were not similarly banned.

How police used social media to track protesters

As protests against the death of George Floyd expanded globally at the beginning of June, police in the US turned to social media to predict upcoming actions and identify the people organizing them.

One document from a California fusion center lists dozens of protests that police anticipated beginning on June 2. The document notes that information about several protests was gleaned from Facebook pages, and lists the URL of one organizer's Facebook account (the account appears to have since been deleted).

In other instances, law enforcement agencies shared social media posts that they deemed threatening. On May 29, the FBI sent Los Angeles area police departments an alert about a tweet that read, "See a blue lives matter flag, destroy a blue lives matter flag challenge," arguing it could pose a risk to officers.

Law enforcement also said they were aware of private messaging channels used by protesters. In at least two alerts, first highlighted by The Intercept, the FBI cites messages sent in closed groups. One alert says protesters "used the Slack messaging app to pass intelligence to the Antifa portion of the group," and another cites messages sent in a private chat in the encrypted messaging app Telegram, citing a "sensitive source."

In another warning sent to police departments on June 6, the FBI says it's been tracking "individuals using Facebook, Snapchat, and Instagram" who post about organizing protests. The warning adds that "some protesters and possible 'ANTIFA' members" may be planning a "purge ... to kill law enforcement." While some protesters did vandalize police precincts at various points during the protests, no such purge materialized.

ItsColeOnReddit on June 30th, 2020 at 20:15 UTC »

Ok but did they use detective work and get themselves invited into these Slack channels or did Slack hand over messages cuz that is a huge difference.

ShadowPsi on June 30th, 2020 at 19:22 UTC »

And yet when my credit card info was stolen, they were "too busy" to do anything.

sir-Vegetable on June 30th, 2020 at 17:52 UTC »

There's a good chance that IMSI catchers are also used, the UK utilized them in the past (link). These imitate cell phone towers, which your phone regularly pings, and allow the police to track everyone present at a demonstration.

Edit: Based on the comments below I decided to provide some additional info. IMSI stands for international mobile subscriber identity, it is an unique ID to identify you on the telecommunication network, see the wiki for info. If you are concerned about your privacy, according to this answer, your phone will not send its IMSI when on airplane mode. However, when you film with your phone, a lot of metadata is saved, including your device model and -if enabled- your GPS location. GPS does not require a signal to be send, only to be received, so some phones (or most, I don't know the ratio) have GPS still enabled on airplane mode. Meaning that you can still be tracked if someone gets hold of the video with metadata.

Edit2: Here is a news article about the Chicago police department admitting to have bought IMSI catchers in 2008.