This is the first data drop since the group banded with Anonymous and other "affiliated battleships" and launched Operation Antisec - a call-to-arms to all individuals that share their view of the world to steal and leak any classified government information they can get their hands on.
According to Rob Beschizza, among the leaked documents - many of which are classified as "law enforcement sensitive", "not for public distribution", and "for official use only" - are emails discussing the Mexican governments, reports about unusual law enforcement encounters and incidents trends, vulnerable targets for terrorists to attack, and more.
The Arizona police spokesman has said that the documents seam to be authentic and that the hackers have probably used compromised email accounts of a number of officers to get them.
In the meantime, the hunt for LulzSec members continues. Topping off the effort put by the authorities, there are hackers who have chosen not to affiliate themselves with LulzSec and have been actively working to disclose the real names of the group's members.
An ex-US military hacker that goes by the handle of Th3J35t3r (The Jester) claims that he has DDoSed www.lulzsecurity.com and discovered details about a LulzSec member that goes by the handle "Sabu". As you might remember, "The Jester" has also previously proved his contempt of WikiLeaks.
Another LulzSec member has, in the meantime, talked to Adrian Chen and expressed his unconcern when it comes to the possibility of being hunted down. He also repeated that the recently arrested Ryan Cleary is not a member of LulzSec, that he only ran a chat server on which a public LulzSec chat room was hosted.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.