Feeds

Twitter exposes Gov't requests for user data

USA dominates league table

Website security in corporate America

The US government demands more data from Twitter than any other nation, the micro-blogging website has revealed.

The company said it was "inspired" to reveal the stats, after its "peers" at Google started publishing so-called transparency reports in 2010 on what and how much data is demanded from countries across the globe.

Twitter said it had a "long-standing policy to proactively notify users of requests for their account information unless we’re prohibited by law; another example is transmitting DMCA takedown notices and requests to withhold content to Chilling Effects."

The privately-held Web2.0 outfit added: "These policies help inform people, increase awareness and hold all involved parties - including ourselves - more accountable; the release of our first Transparency Report aims to further these ambitions."

Of 849 requests submitted to Twitter from the start of 2012, the US government demanded access to user data 679 times of which 75 per cent were successful. Japanese authorities followed up with 98 such requests, while UK.gov asked for data on 11 separate occasions.

The same report also revealed that a total of 3,378 copyright takedown notices were demanded of Twitter in the first half of this year.

Material was removed in only 38 per cent of those cases, with around 6,000 Twitter accounts affected, more than 5,000 tweets removed and 599 instances where the media was deleted by the micro-blogging site.

Authorities from around the world requested more information from Twitter in the first six months of 2012 then it did for the full year of 2011. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.