Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Privacy

Law Enforcement Requested over 1.3 Million Cell Records in 2011

Paul Anderson by Paul Anderson
July 9, 2012 - Updated on July 11, 2012
in Privacy
0
censorship3
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

censorship3

You might also like

GIFs in messaging apps are tracking you

Google Chrome exposes user extensions to fingerprinting

Chrome Browser Extension Vytal Prevents Privacy Leaks

Representative Edward J. Markey has exposed that U.S. law enforcement authorities made a astonishing 1.3 million requests for mobile service companies to supply cell phone records of consumers.

“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information,”

said Markey, a senior member of the Energy and Commerce Committee and co-Chair of the Congressional Bi-Partisan Privacy Caucus.   Markey sent out letters to U.S. Cellular, Sprint Nextel, T-Mobile USA Inc., Leap Wireless Inc./ Cricket Communications, Inc., MetroPCS, Verizon Communications Inc., AT&T, C Spire Wireless, and TracFone Wireless, requesting they supply information on their policies and prosedures concerning the request for records.

The mobile carriers in general replied that all requests for information were “pursuant to a legal warrant or granted due to an emergency situation.”

Link to the responses from the carriers Markey contacted can be found HERE.

Other findings from the responses to Rep. Markey include:

  • There were approximately 1.3 million federal, state, and local law enforcement requests for cell phone records to wireless carriers in 2011 (This number does not include T-Mobile because the company did not provide this information in its response.). As a point of comparison in 2010, there were approximately 3,000 wiretaps issued nationwide.
  • Verizon reported that there has been an annual increase of law enforcement requests of 15 percent, and T-Mobile reported and increase of 12-16 percent.
  • Information shared with law enforcement includes data such as geolocation information, content of text messages, wiretaps, among others.
  • Requests also include “cell tower dumps” in which carriers provide all the phones numbers of cell users that connect with a tower during a discreet period of time. In many cases, this includes information on innocent people, as cell phone tower dumps include all the calls made from a tower during a period of time.
  • There is no comprehensive reporting of these information requests anywhere – this is the first ever accounting of this.

“We cannot allow privacy protections to be swept aside with the sweeping nature of these information requests, especially for innocent consumers,”

 Markey alleged.

Source:  http://markey.house.gov/press-release/markey-law-enforcement-collecting-information-millions-americans-mobile-phone-carriers

Tags: callscensorshipdocumentsgovernmentlisteningphone
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

GIFs in messaging apps are tracking you

by Christi Rogalski
July 19, 2022
0
GIFs in messaging apps are tracking you

Today, the dynamic moving image, GIF sent to a friend or colleague, perfectly expresses our emotions and lightens the mood of the receiver(s). However, several concerns have been...

Read more

Google Chrome exposes user extensions to fingerprinting

by Kyle
July 1, 2022
0
Google Chrome Extension fingerprinting source

Security researcher, z0ccc, has released a new tool that proves that Google Chrome extensions can be fingerprinted which allows tracking of its users online. Tracking users online is...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more

Are Bluetooth signals being used to track smartphones?

by Christi Rogalski
June 17, 2022
0
Bluetooth research leads to tracking

Can Bluetooth signals be used to track smartphones? Many people would say "No" to this question. However, a team of engineers at the University of California San Diego...

Read more

How Apple Stopped $1.5 billion Worth of Fraudulent Transactions in 2021

by Christi Rogalski
June 8, 2022
0
Apple app store security fraud

Apple has recently released statistics on the number of fraudulent and untrustworthy transactions that have passed through the Apple App Store in 2021. In combination, they have stopped...

Read more
Next Post
How Botnets monetize and gain profit

How Botnets monetize and gain profit

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.