Government data requests to Google continue to rise
Requests of all kinds have increased by more than 70 percent since 2009, the company says
IDG News Service - Governments continue to ask Google for more data about its users, with more than two-thirds of requests in the U.S. made through a subpoena, which usually doesn't require asking a judge for a search warrant.
User data requests of all kinds have increased by more than 70 percent since 2009, Google said in its biannual "transparency report" that tallies government requests for users' data. For the six months from July through December 2012, the company said it has received about 21,389 information requests for some 33,634 users -- up slightly from 20,938 requests for 34,615 users during the first half of the year.
For the first time, Google disclosed the types of legal process that government entities used to acquire the data. Sixty-eight percent of the 8,438 data requests in the U.S. were done through subpoenas. These types of requests were for user-identifying information issued under the Electronic Communications Privacy Act, and subpoena requests are the easiest to get because they typically don't require a judge's review, Google said.
"It's admirable that Google is now breaking the data down in a more specific way," said Trevor Timm, a blogger and activist with the Electronic Frontier Foundation, a digital civil liberties group. But he added that he was still troubled by the trend.
"This confirms that the United States is ever increasingly conducting types of Internet surveillance without warrants," he said.
John Simpson, a consumer advocate with Consumer Watchdog, agreed. "I am alarmed by the number of government requests and concerned that so many are done with merely a subpoena," he said. "A warrant should be required."
Sixty-six percent of the total data requests over the past six months led to the release of some data, according to the report.
Meanwhile, 22 percent of the data requests in the U.S. were through ECPA search warrants, which are issued by judges based on a demonstration of probable cause that information related to a crime could be found in the data, Google said.
The remaining 10 percent of requests were performed via court orders by judges or through other processes that are difficult to categorize, Google said. Most of the requests, Google said, pertain to criminal investigations, and the requests can come from multiple government agencies, including local and national police forces.
EFF's Timm said the U.S. subpoena requests are probably for metadata such as email headers, timestamps and contact lists, rather than email content.
"But that information can be just as intrusive and violate someone's reasonable expectation of privacy," he said.
For the second half of 2012, the United States maintained its strong lead as the country responsible for the most government data requests to Google with 8,438 -- up 6 percent from 7,969 requests during the first six months of the year. Trailing behind in second place, by a significant amount, was India, with 2,431 requests. The smallest number of requests during the past six months came from Denmark, with 34.
Google has been disclosing government data request figures since 2010.
Though the report primarily covers criminal matters, Google said it cannot be sure that a request relates to a criminal investigation. For example, the report would also include, say, an emergency request from a government public safety agency seeking information to save the life of a person in peril even though there may not be a criminal investigation involved.
Google noted that it may refuse to produce information or try to narrow the request in some cases. "Whenever we receive a request we make sure it meets both the letter and spirit of the law before complying," the company said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts