Google reports on non-court ordered FBI data requests
Posted on 06 March 2013.
Bookmark and Share
With every new Transparency Report that Google releases biannually since 2009, new information about data requests from government agencies are included.

This last report, which spans July to December 2012, contains vague data about National Security Letters. NSLs are a form of request for information that the FBI can make when they or other U.S. agencies are conducting national security investigations.

NSLs are an alternative to court ordered warrant and subpoena, and require only that the FBI director or another senior designee provides a written certification that proves that that the information requested is “relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities.”

Via NSLs, the FBI can request information such as the name, address, length of service, and local and long distance toll billing records of a subscriber, but cannot ask for things like Gmail content, search queries, YouTube videos or user IP addresses, as explained in Google's User Data Requests FAQ.

Also, the thing about NSLs is that their existence can be hidden from the investigated person. The FBI only has to write that the disclosure of the NSL may result in “a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person,” and Google (or any other provider) is forbidden to talk about the request.

This is why, in this latest Transparency Report, Google may only share the numerical range within which the actual number of NSLs they have received and the users/accounts they referred to rests.

In 2012 - and all years since 2009 except for 2010 - NSLs received by Google were between 0 and 999, and the users/accounts they applied to were between 1000 and 1999.









Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //