Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Verizon Transparency Report: Govt Requests Increasing

samzenpus posted about 7 months ago | from the watching-you dept.

Verizon 42

Gunkerty Jeb writes "After months of public calls from privacy advocates and security experts, Verizon on Wednesday released its first transparency report, revealing that it received more than 164,000 subpoenas and between 1,000 - 2,000 National Security Letters in 2013. The report, which covers Verizon's landline, Internet and wireless services, shows that the company also received 36,000 warrants, most of which requested location or stored content data."

cancel ×

42 comments

Sorry! There are no comments related to the filter you selected.

Anal butts (-1)

Anonymous Coward | about 7 months ago | (#46041433)

Stick your finger in my Anal Butt. What say you?

Re:Anal butts (-1)

Anonymous Coward | about 7 months ago | (#46041677)

I say it's lunch time, come upstairs little snowflake

Love, Mom

Hint (2, Insightful)

dsginter (104154) | about 7 months ago | (#46041513)

Now that the "terrorists" know that this stuff is monitored, the real bright ones no longer use these forms of communication. The NSA just need to keep doing this to remain employed.

Re:Hint (2)

TrollstonButterbeans (2914995) | about 7 months ago | (#46041679)

What forms of communication could they be using that isn't telecom or internet?

Curious minds want to know.

Re:Hint (4, Insightful)

Kell Bengal (711123) | about 7 months ago | (#46041699)

Couriers.

Re:Hint (1)

Em Adespoton (792954) | about 7 months ago | (#46041907)

and Numbers Stations....

Re:Hint (1)

Anonymous Coward | about 7 months ago | (#46042103)

In NYC rats make great couriers.

Re:Hint (3, Insightful)

BlueStrat (756137) | about 7 months ago | (#46044247)

In NYC rats make great couriers.

Possible I suppose, but I think the bigger question here is; "Why do they keep electing them to office?"

Strat

Re:Hint (0)

Anonymous Coward | about 7 months ago | (#46042155)

Pretty much what I said about "message mules" - couriers is another term. :-)

Re:Hint (1)

DerekLyons (302214) | about 7 months ago | (#46043321)

And how do the couriers coordinate without using the telecomm network or the internet?

Re:Hint (0)

Anonymous Coward | about 7 months ago | (#46043943)

Same way they always have when doing this. Pre-planned drop locations. It's really not that hard to do.

Re:Hint (1)

Anonymous Coward | about 7 months ago | (#46042147)

Message mules? Send a person who has had no connection to the terrorist organization with a micro sd card that they swallowed. Pretty much undetectable. Heck, you could put it inside a large capsule (non-digestible) so it can easily be retrieved from their stool after they got to their destination. You can send gigabytes of data that way, with very little chance of it being found. Also, the data could be strongly encrypted, so even if they were stopped and the card was found, chances of it being read are small.

Re:Hint (2, Funny)

rmdingler (1955220) | about 7 months ago | (#46042463)

You know what my father went through to get me that watch?

Butch Coolidge, Pulp Fiction

Re:Hint (1)

Charliemopps (1157495) | about 7 months ago | (#46042533)

I think it would take us all of 5min to come up with a way to communicate on line and it would be impossible for the NSA to have any clue what we were up to. An analog cypher that is based on personal knowledge and only shared between a few people is virtually impossible to crack unless one of them is a mole.

Re:Hint (1)

davester666 (731373) | about 7 months ago | (#46043117)

Wasn't there a tv game show about that? maybe we should gift the series to them in iTunes...

Re:Hint (1)

cavreader (1903280) | about 7 months ago | (#46043105)

They can and do communicate using human couriers.

Re:Hint (2)

davester666 (731373) | about 7 months ago | (#46043109)

The Post Office. Personal Ads. Hand signals. Meeting in person in coffee shops.

Or I could be whooshed.

Given the inability of the NSA to actually point to ANYTHING at all significant in the past 10+ years that they stopped/prevented with this bulk data collection, its pretty clear that the real 'terrorists' haven't been using these communication channels in a way that the NSA can determine if and/or what they are communicating.

Re:Hint (1)

lister king of smeg (2481612) | about 7 months ago | (#46043203)

They can use the Internet just have to be more crafty, use stenography on images then post to 4chan, i2p, use freenet, use retroshare. There are four non intercept-able ways i pulled of of the top of my head. I could come up with more if I bothered to. If i can they can.

Things under DUH (0)

Anonymous Coward | about 7 months ago | (#46044013)

They've always known, this is the arrogance of the American Public, they actually believe this terrorist propaganda.

They always knew they were being watched whether your from the mid east, or in the US. This monitoring goes back to "political citizens" aka the Civil Rights Movement, The Black Panthers, Black Muslim Movement.
And even they knew they were being monitored at all times, despite the public being unaware of government agencies spying on there own citizens. Insiders, lawyers, others with political connections knew of it.

And why would they be doing this when we live in a "all men are free" country?
This is about control, now people could careless when a group wants a mass protest against government, and don't even think of trying to overthrow the government, despite what the constitution says.

Those Sci-Fi movies like 1984 aren't to far off in this country or the rest of the world. Everyone is a criminal, despite the fact your not....

Math (1)

jklovanc (1603149) | about 7 months ago | (#46041545)

Verizon has over 1.7 million subscribers in Q4 of 2013. The total number of subpoenas, National Security Letters and warrants is 202k. If every request was for a different subscriber then 12% of the subscribers would be subjects of the requests. That is generally not the case as different types of data and different time periods, different devices, etc could require multiple requests. The numbers don't seem that high to me.

Re:Math Needs Improvement Then (4, Informative)

TrollstonButterbeans (2914995) | about 7 months ago | (#46041651)

Maybe Verizon signed up 1.7 million new subscribers in the USA in the 4th quarter of 2013, but certainly Verizon has more than 1.7 million wireless customers. The market of wireless customers is in excess of 100 million in the USA and there are a very small pool of wireless providers (AT&T, Verizon, Sprint, T-Mobile).

Oops (1)

jklovanc (1603149) | about 7 months ago | (#46041953)

I was at work so I pulled the first number I found. according to this [wikipedia.org] Verizon had 119.4 million subscribers as of Q3 2013. Therefore 119.4M/202K = 0.17%. Taking into account the number of requests for the same subscriber the numbers are even better.

Re:Oops (1)

mwehle (2491950) | about 7 months ago | (#46042115)

Verizon had 119.4 million subscribers as of Q3 2013. Therefore 119.4M/202K = 0.17%. Taking into account the number of requests for the same subscriber the numbers are even better.

What is it about these numbers that you find "better"? Which numbers are "good" in the first place, let alone better? Is the NSA requesting the data of less than one fifth of one percent of Verizon's customers good? What percent would be bad? One percent? Ten percent? I am curious what your tolerance of government spying is.

What is interesting to me is not the percentage of customers on whom data was requested, but the number of requests which were reported. I am curious what prompted interest in around 200,000 customers. Are these generally people who exchanged e-mail with someone in the Middle East? Generally registered Democrats? Republicans? Foreign students? People who sent an e-mail containing the word "bomb"? What were the grounds for the majority of the requests?

Re:Oops (1)

pupsocket (2853647) | about 7 months ago | (#46042515)

And assuming one phone number per demand.

From the article: "In addition, we received about 3,200 warrants or court orders for “cell tower dumps” last year. In such instances, the warrant or court order compelled us to identify the phone numbers of all phones that connected to a specific cell tower during a given period of time."

Re:Oops (1)

jklovanc (1603149) | about 7 months ago | (#46042809)

A possible reason for such a dump would be a suspect's statement that he was not at a certain location at a certain time. Dump the local tower and if his phone shows up he was probably there. Any other people who happened to be connected during that time are ignored by the police. It may not be allowable for the police to ask if a specific phone was connected to a specific tower so they dump the whole tower.

Re:Oops (1)

davester666 (731373) | about 7 months ago | (#46043129)

Except, at least for some police departments, the data is NOT ignored. Some departments keep ALL the data they receive, regardless of whether it is at all relevant to the reason they acquired the data.

And at least 4 of the warrants involved every single subscriber of Verizon [the bulk metadata FISA warrants, renewed every 90 days].

Re:Oops (1)

pupsocket (2853647) | about 7 months ago | (#46043387)

Or it might be used to discover every cell phone number in the vicinity of a political assembly or protest.

Re:Oops (1)

jklovanc (1603149) | about 7 months ago | (#46044219)

Every tool can be used for bad but that does not mean it is never used for good. Should we take guns away from police because they have been used to kill innocent people? If the request was used for that reason then the person requesting it should be prosecuted.

Re:Oops (3, Informative)

jklovanc (1603149) | about 7 months ago | (#46042795)

You are assuming that the requests are all coming from the NSA. The only mention of the NSA in the article is in relation to Snowden. There are many other government agencies other than the NSA, including local police, who make these requests. There are many different crimes that might prompt such requests; organized crime, drug dealing, murder, extortion, etc. For example, the first thing done in most murder investigations where a phone is missing is to dump the phone. Even when the phone is available, the history may have been deleted as drug dealers often do.

If all the requests did come from the NSA it might be bad but they didn't. In the end we have no idea how many requests came from the NSA and blaming them for all the requests is invalid. This knee jerk "if it is surveillance it must be the NSA" is getting out of hand.

Re:Oops (0)

Anonymous Coward | about 7 months ago | (#46044655)

Came here to make this point as well. Especially considering these are "law enforcement" requests, and the NSA is not a member of the law enforcement community.

Re:Oops (0)

Anonymous Coward | about 7 months ago | (#46043155)

All of these requests were not for the NSA. These numbers include all requests from local, state, and federal law enforcement agencies.

FISA (2, Informative)

game kid (805301) | about 7 months ago | (#46041681)

From the report:

Does this Transparency Report include information on the number of national security orders you receive?

We report only information about National Security Letters. Like all other companies to issue transparency reports, we are not permitted at this time to report information on national security orders (like FISA orders).

So (before you ask) it does not account for the April 2013 secret FISA Hoover-order or any other such.

I would be really interested to know... (1)

hackus (159037) | about 7 months ago | (#46042035)

how many of those information lists or requests ended up with Verizon losing a customer.
(i.e. They went missing or are now deceased.)

VERY interested in such a study.

-Hack

Re:I would be really interested to know... (1)

rmdingler (1955220) | about 7 months ago | (#46042491)

Ah, a fellow Investigative Discovery fan...

Great catch. The reported missing and suspiciously dead people possibly make up a significant number of requests.

Unmentionable security orders are a horse of another color. No reporting means no oversight means abuses.

Straight Talk prepaid (1)

Anonymous Coward | about 7 months ago | (#46042513)

Straight Talk wireless prepaid phone from Walmart.
Pay cash for it.
Pay cash for refill cards.
DO NOT port your existing number to it.
They will eventually identify who the phone belongs to by your "social map" of people you call and who calls you, so.....
Lather, rinse, repeat frequently.

Not all of it is Terrorist related... (3, Informative)

ThermalRunaway (1766412) | about 7 months ago | (#46042875)

My sister is a defense attorney. She is responsible for a few of those subpoena items in 2013. None of them for anything remotely related to national security or terrorists. The last one was some dispute about a winning state lottery ticket... she had to get the txt msg records for her client and the other person.

why "terrorists" and not terrorists? (0)

aslashdotaccount (539214) | about 7 months ago | (#46042923)

I am a believer in one of the religions renowned for its hardliners/fundamentalists, and trust me when I tell you that if your governments didn't do what they're doing you'll be sorry. I say so because even the moderates in my community have a smile of satisfaction when the slightest mishap happens to the "infidels" (and you can imagine the wide grins at Snowden's exposes). Still, whilst doing what they do, it is important to ensure responsibility and keep citizens assured of it.

game friv (0)

Anonymous Coward | about 7 months ago | (#46044353)

thanks for sharing friv action game [frivhot.com]

With no terrorist arrests to show for it...hmmmm (0)

Anonymous Coward | about 7 months ago | (#46046651)

I wonder who they are looking for?

Government Desperate To Justify It's Errors... (1)

littlewink (996298) | about 7 months ago | (#46046841)

will stop at nothing to find "domestic terrorists". Indeed, watch as they now _create_ domestic terrorism out of thin air.

Own a firearm? Belong to the Tea Party? Got food rations for six months? Have more than a box of ammo? Your own water well? Got gold hidden somewhere? Support Israel against Iran?

If the answer is "Yes" then you must be a "domestic terrorist".

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>