Hackers used information obtained through last week's breach of the Arizona Department of Public Safety to break into officers' personal e-mail and Facebook accounts, posting on Wednesday more than 800 new pages of personal data.

A group using the mantel "AntiSec" said it had obtained personal information on at least a dozen officers at the DPS, including a department spokesman who criticized hackers for last week's activities.

A look at some of the infamous hacking incidents

DPS officials downplay attack's effect on operations

LulzSec hacking started with officers' e-mails

Capt. Steve Harrison, whose Hotmail, Facebook and other accounts were breached, said the department does not believe the hackers compromised the agency's computers, servers or any of the state's networks. "We suspect they used information from the first intrusion, did Google searches and tried to use the same e-mail names and passwords," Harrison said.

"We have no indication that they again accessed any DPS systems or that there is any link between the DPS systems and the personal accounts."

Last Thursday, a hacker group known as LulzSec posted reams of case files, e-mails and intelligence documents in a targeted breach it said was in retaliation for Senate Bill 1070, Arizona's tough immigration law.

The DPS said the hackers broke into its system by targeting the e-mail accounts of officers in remote areas of the state who were not required to frequently change their passwords or use complex log-ins.

LulzSec said it was disbanding and rejoining a larger hacker organization known as Anonymous.

But the hackers involved in Wednesday's incident suggested some of the same people were responsible in its online statement.

"Just when you thought it was over, we're hitting the Arizona police state with our second round of attacks," the hackers said.

Wednesday's data dump included 818 pages of private e-mails and text messages from 13 people - some of whom have not worked for the DPS - and scores of pictures and documents. Most involve musing about their struggles to find work, cope with layoffs or recover from an on-duty back injury.

But there were significant breaches, too. In one case, hackers posted the rosters of a professional police organization that included names and home numbers. Also disclosed were some names of officers at other local, state and federal agencies who had worked on narcotics- and human-smuggling squads.

At least one officer received a telephone bomb threat at his home Wednesday. DPS officials found no evidence of an explosive, Harrison said. "It was probably a crank call," he said. "They think its funny, but it's not funny. It causes officers a lot of anxiety and concern for themselves and family."

The DPS is encouraging officers to scrub their computers for spyware and malware, change their passwords, and not use the same log-ins for different accounts. The agency also is telling officers to monitor their credit reports and other accounts.