Verizon, AT&T, Others Make Big Bucks Sharing Customer Data

A creepy issue is bubbling up in Congress involving the dramatic uptick in the number of requests to cellular carriers from law enforcement for peoples cell phone records.

The number, announced earlier this month by Rep. Ed Markey (D-Massachusetts), is incredible: In the last year federal, state, and local law enforcement agencies have made 1.3 million demands for user cell phone data such as text messages, caller locations, and wiretaps; and that estimate is certainly low, albeit a huge increase compared with previous years.

This week Markey and three other Democrats sent a letter to several House Republicans asking for a hearing to look at whether consumer privacy is being sufficiently protected by law enforcement and wireless carriers.

Privacy advocacy groups such as the Electronic Frontier Foundation say it isnt, considering that much of this cell phone surveillance is done without a warrant.

But even more troubling is the fact that cellular carriers actually make a lot of money handing over their users private information.

In the July 16 letter the authors wrote, The carriers responses also show that they are being compensated for providing this information to law enforcement agencies. Verizon charges to law enforcement ranged from $50 to retrieve up to five days of stored text message content to $1825 for multiple wiretap switches. AT&T received more than $8.2 million in 2011 for collecting and submitting customer phone usage information to law enforcement.

In case you think you dont have anything to hide, keep in mind the kinds of things your cell phone data can bring to light.

According to the EFF, cell phone location information -- which it says is protected by the Fourth Amendment prohibition against search and seizure -- can reveal the most intimate details of ones life, including things like if a person regularly attends church, drinks heavily, exercises frequently, or cheats on a spouse.

The EFF also notes that Markey and other members of Congress are working on legislation that would draw a clearer line on how the police can get access to such data, although the advocacy group points out the Obama administration has previously argued that its burdensome to require law enforcement to get a warrant for personal information such as cell phone data.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Christina DesMarais

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place