Skip to content
by
  • Products
  • Free Tools
  • Search
  • Free Sophos Home
XG Firewall
Next-Gen Firewall
Intercept X
Next-Gen Endpoint
  • Sophos Cloud Optix
  • Sophos Central
  • Sophos Mobile
  • Intercept X for Server
  • Secure Wi-Fi
  • Phish Threat
  • SafeGuard Encryption
  • Secure Email
  • SG UTM
  • Secure Web Gateway
For Home Users

Sophos Home protects every Mac and PC in your home

Learn More
Free Security Tools
Free Trials
Product Demos
Have you listened to our podcast? Listen now

Verizon: US government requests for phone records on the up

24 Aug 2017 4 Law & order, Mobile, Privacy

Post navigation

Previous: Malware rains on Google’s Android Oreo parade
Next: Celebgate 3.0: Miley Cyrus among victims of photo thieves
by Lisa Vaas

According to Verizon’s latest transparency report for the US, government requests for phone records were up for both individuals and large groups in the first half of 2017.

But requests for data were way, way up for large groups, as in, when the government requests a mass “tower dump” of every caller who connected to an individual phone tower as they passed by.

From the report, which has comparison figures in six-month blocks going back to the second half of 2014:

In order to try to identify a suspect of a crime, the government may apply to a court for a warrant or order compelling us to provide a ‘dump’ of the phone numbers of all devices that connected to a specific cell tower or site during a given period of time.

For the first half of this year, Verizon says that it’s received approximately 8,870 warrants or court orders for cell tower dumps. The number has been surging: there were 3,200 warrants or orders for cell tower dumps in 2013. Three years later, in 2016, that number shot up to 14,630.

The total number of demands for customer data was 138,773 in the first half of this year.

Verizon went along with most of those demands from law enforcement: it rejected about 3% of the demands it received this year, which amounted to rejection of almost 2% of subpoenas and 6% of warrants and orders.

There are a number of reasons as to why Verizon rejects a given demand as being legally invalid. A different type of legal process might be needed for a particular type of information requested, for example. Verizon doesn’t report information on requests for information that it rejects on such grounds.

24/7 threat hunting, detection, and response delivered by an expert team as a fully-managed service.
Learn More

Out of the 97% of requests it went along with so far this year, there were 68,237 subpoenas, 722 wiretap demands, and 3,963 “trap and trace” orders that let law enforcement see the numbers of a target’s incoming calls in real time.

Verizon also says it got 27,478 emergency requests, or demands from police for information in matters of “the danger of death or serious physical injury.” The extremely vague number of national security letters Verizon can report was between one and 499.

While demands for tower dumps have spiked, the overall number of requests so far this year isn’t the highest Verizon has seen. That honor would go to the first half of 2015, when it handled 149,810 information requests from law enforcement.

Those numbers include both the data demands for which Verizon handed over information and those it didn’t. For example, it’s not uncommon for the carrier to receive a subpoena that seeks subscriber information, but it also improperly seeks other information, such as stored content, which Verizon says it can’t provide in response to a subpoena.

While we would provide the subscriber information (and thus would not consider this a rejected demand), we would not provide the other information.

In fact, Verizon says that it’s compelled to hand over contents of communications – as in, text messages or email content – to law enforcement “relatively infrequently”. Verizon only releases stored content to law enforcement when they come knocking with a probable cause warrant in hand. Law enforcement can’t get at it with a general order or subpoena. During the first half of 2017, Verizon says it received 4,436 warrants for stored content.

Verizon hands over its subscribers’ location information only in the case of a warrant or order, not in response to a subpoena. US laws differ on what law enforcement needs to get at people’s location data, depending on what area of the country you’re in. In some cases, law enforcement needs a court order, and in some cases they need a warrant – in either case, a judge has to sign off on the demand.

In the first half of this year, Verizon received approximately 20,442 demands for location data: about three-quarters of those were through orders and one-quarter through warrants.


  • Follow @NakedSecurity on Twitter for the latest computer security news.

  • Follow @NakedSecurity on Instagram for exclusive pics, gifs, vids and LOLs!

Free tools

Sophos Firewall Home Edition

Boost your home network security.

Sophos Scan & Clean

Free second-opinion scanner for PCs.

Sophos Cloud Optix

Monitor 25 cloud assets for free.

Post navigation

Previous: Malware rains on Google’s Android Oreo parade
Next: Celebgate 3.0: Miley Cyrus among victims of photo thieves

4 comments on “Verizon: US government requests for phone records on the up”

  1. Sideshow Bob says:
    August 24, 2017 at 7:26 pm

    So you’re saying, if I’m going to commit a crime to leave the cell phone at home. got it. Springfield here I come.

    Reply
  2. Laurence Marks says:
    August 24, 2017 at 10:46 pm

    “For the first half of this year, Verizon says that it’s received approximately 8,870 warrants or court orders for cell tower dumps. The number has been surging: there were 3,200 warrants or orders for cell tower dumps in 2013. Three years later, in 2016, that number shot up to 14,630.”

    The increase in requests suggests that they are actually catching criminals via the data. If they weren’t successful, they wouldn’t be requesting more of them. It would be interesting to see the numbers on how many arrests resulted from the 14,630 dump requests.

    Reply
    • Anonymous says:
      August 28, 2017 at 4:21 pm

      Causation vs. Correlation. There is absolutely no way to draw this causative conclusion from the data provided.

      Reply
  3. Mahhn says:
    August 25, 2017 at 4:47 pm

    What actually happens to the data (who sorts though it) and since this is being handed off to a these agencies and likely 3rd parties for processing, what happens if (I mean when) this data is leaked. How much PII will be in there?

    Reply

What do you think? Cancel reply

Recommended reads

Mar16
by Paul Ducklin
1

S3 Ep 126: The price of fast fashion (and feature creep) [Audio + Text]

Feb09
by Paul Ducklin
2

S3 Ep121: Can you get hacked and then prosecuted for it? [Audio + Text]

Jan26
by Paul Ducklin
2

S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text]

  • About Naked Security
  • About Sophos
  • Send us a tip
  • Cookies
  • Privacy
  • Legal
  • Intercept X
  • Intercept X for Server
  • Intercept X for Mobile
  • XG Firewall
  • Sophos Email
  • Sophos Wireless
  • Managed Threat Response
  • Cloud Optix
  • Phish Threat
© 1997 - 2023 Sophos Ltd. All rights reserved. Powered by WordPress VIP