Twitter says U.S Government Want More User Account Information

twitter-transparency-report.jpeg

Twitter complied with 58 per cent of requests made by governments worldwide.

In its latest transparency report, Twitter has revealed that requests for account information from governments has jumped 52 percent, with the United States leading the way by making 56 percent of all global requests, Turkey in second place and with the UK remaining a top requester. Most of the requests are in conjunction with criminal investigations.

Twitter says in the Report, ‘We’ve received 52% more requests for account information affecting 78% more account holders during the first half of 2015 than in the previous reporting period. This is the largest increase in requests and affected accounts between reporting periods since we began publishing the Transparency Report in 2012’.
‘The United States continues to make the majority of requests for account information, comprising 56%s of all requests received. Japan, ever present in the list of top requesters, surpassed Turkey as our second largest requester by just two percent. While Japan maintained the same overall percentage of total requests as last report (10%), the total number of requests from Turkey decreased slightly (9%). The United Kingdom also remains a top requester, comprising 7% of total requests’.

Twitter’s Jan- June Report of 2012 showed that the US requested 679 and the UK 11 times whereas in 2015 the US requested 2,436 and the UK 299 times. The total number of requests moved from 849 worldwide requests to 4,363 from Jan to June 2015.

The United States made the highest number of requests, with 2,436 requests impacting 6,324 accounts and an 80 percent success rate, followed by Japan, with 425 requests on 529 accounts and information coughed up 42 percent of the time. Japan overtook previous second-highest requester Turkey, which is now the third highest, having made 412 requests impacting 670 accounts, all of which were unsuccessful.
Turkey was far and away the country that made the highest number of content removal requests, making 92 percent of the 442 requests Twitter received globally from courts, and 55 percent of all content takedown requests made by government bodies such as police forces. In Turkey from January to June, Twitter withheld 1,667 tweets from 125 accounts.
"We filed legal objections with Turkish courts in response to 60 percent of Turkish orders received," Twitter said. "Our objections prevailed 5 percent of the time."
Behind Turkey in asking for content to be removed were Russia, with a 63 percent success rate on 68 requests; South Korea, whose 40 requests all failed; and France, which had a 7 percent strike rate from 32 requests.
Across its network, including Twitter, Vine, and the newly launched Periscope, the company saw an 11 percent increase in copyright takedown notices. Twitter withheld 47,882 tweets from 22,880 accounts as a result of handling 14,694 copyright notices, and in the three months since its acquisition and launch, Periscope was handed 1,391 copyright notices, which had a 71 percent success rate.
Twitter has extended its six-monthly transparency report to include trademark notices and email privacy ratings.
In the six months to June 30, Twitter handled 12,911 trademark notices, which had a 7 percent strike rate.
For email privacy, Twitter rated email providers on the level transport encryption and verification used. Large email providers Gmail.com, Hotmail.com, and Live.com received full marks, with Yahoo.com found wanting when it came to verification, as many Japanese providers including Yahoo.co.uk failed to support encryption at all.
In its second quarter, Twitter posted a net loss of $137 million on revenue of $502 million, and reported 316 million monthly active users worldwide, up 15 percent year over year.
Transparency:http://http://bit.ly/1L4RGWx
ZDNet: http://bit.ly/1HKOnPx

 

« France & UK on the Edge of Kafkaesque Surveillance
The NSA Playset: 5 Better Tools To Defend Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Sixteenth Air Force (Air Forces Cyber)

Sixteenth Air Force (Air Forces Cyber)

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.