FBI data requests to Google outlined in report

The numbers look at national security investigations into some users

Some thousand-plus Google users have been subject to FBI security information requests since 2009, the company said Tuesday. The data build on Google's already existing tally of government data requests.

The new figures look at the number of National Security Letters (NSLs) -- information requests from the FBI or other executive branch agencies for conducting national security investigations -- that Google has received since 2009.

Google is presenting the data in the form of ranges, so it is not clear to what extent the number of NSLs issued to the company has been increasing or decreasing over the past several years.

Still, there were between 1,000 and 1,999 user accounts in question in 2009, 2011 and 2012, and NSL requests were made for between 2,000 and 2,999 accounts in 2010, Google said Tuesday in a blog post. For every year since 2009 there have been between zero and 999 NSLs covering those accounts, Google said.

The company is reporting numerical ranges rather than exact numbers given the government's concern that releasing exact numbers would reveal information about the investigations, the company said.

Still, the numbers are being released to address people's questions about "the increase in their use since 9/11," Google did say.

"Our users trust Google with a lot of very important data, whether it's emails, photos, documents, posts or videos," said Richard Salgado, Google's law enforcement and information security legal director, in the post.

But, "people don't always use our services for good, and it's important that law enforcement be able to investigate illegal activity," he said.

With an NSL, Google may be compelled to disclose "the name, address, length of service, and local and long distance toll billing records" of a subscriber to a wire or electronic communications service, under the Electronic Communications Privacy Act.

NSLs cannot be used to obtain other data from Google such as email content, search queries, YouTube videos or user IP addresses, Google said.

Google aims to scrutinize all government data requests carefully to ensure they satisfy the law and their policies, the company said.

Google's biannual "transparency report" documents a range of government requests for users' data, mostly as it pertains to criminal investigations.

The company's last such report was published in January, which showed that from July through December 2012, Google had seen a modest rise in information requests for some 33,634 users.

The NSL figures, which Google plans to update annually, will be included in the company's transparency reports going forward. The ranges are not included in the total sum of user data requests that Google has reported previously, the company said.

Zach Miners covers social networking, search and general technology news for IDG News Service. Follow Zach on Twitter at @zachminers. Zach's e-mail address is zach_miners@idg.com

Join the CSO newsletter!

Error: Please check your email address.

Tags Internet-based applications and servicesGooglesecurityinternetdata protectionsearch engines

More about FBIGoogleIDG

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Zach Miners

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts