recommended reading

Feds Seek Verizon's Data Nearly 15 Times More Often Than Google's

Matt Rourke/AP File Photo

Verizon released its first-ever transparency report on Wednesday, disclosing that the telecom giant received about 320,000 requests for customer information from U.S. federal, state and local law enforcement agencies in 2013.

That dwarfs the number of U.S. government requests for user data received by Web companies such as Google and Facebook, which both reported receiving about 11,000 such requests in the first half of 2013. Google and Facebook have not yet released numbers for the second half of 2013.

Verizon received somewhere between 1,000 and 2,000 requests in the form of national security letters, which are issued to help the federal government investigate national security threats but cannot be used to build ordinary civil and criminal cases.

The report follows revelations from leaker Edward Snowden that the National Security Agency relied on vast amounts of Verizon user data in its investigations of terrorism and other foreign threats. The report does not include information Verizon turned over to the NSA in response to orders under the Foreign Intelligence Surveillance Act.

Shareholders and transparency groups have been pressuring Verizon to be more transparent about information it turns over to the government. Google and some other Internet companies have published similar transparency reports for several years. 

CORRECTION: An earlier version of this story briefly ran with an incorrect headline. The government requested data from Verizon about 15 times more often than it requested data from Google, according to the new report.

Get the Nextgov iPhone app to keep up with government technology news.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.