Keep snapping selfies, says Snapchat: Cops NEVER ask us for 'em

Self-destructing pic app reports pittance of gov't requests


Images sent via self-destructing selfie service Snapchat may not disappear as reliably as it once advertised, but it turns out that if you want to post incriminating messages without them getting snooped by authorities, Snapchat is still a pretty good place to do it.

That's based on the firm's first-ever transparency report, which it published on Thursday, following in the footsteps of such big tech outfits as Apple, Facebook, Google, and Twitter.

According to the report, Snapchat received just 375 information requests from US law enforcement agencies in the period from November 1, 2014 through February 28, 2015. By way of comparison, Facebook said it received more than 14,000 requests from US authorities between July and December 2014.

US law enforcement requested information from an ominous total of 666 Snapchat accounts during the reporting period, and Snapchat handed over some data for 92 per cent of the requests.

The number of requests for Snapchat data made by governments outside the US, meanwhile, was almost laughably small. International governments approached Snapchat for information just 28 times – France being the leading snoop with nine requests, followed by the UK with seven – and Snapchat produced user data for foreigners just 21 per cent of the time.

As for other types of government requests – including DMCA notices, government requests to remove content, and National Security Letters and other security-related requests – Snapchat had nothing to report.

You may wonder just what kind of data the service has available to turn over to governments, given that it's marketed as a way to send pics and other messages that disappear a short time after the recipient views them.

But in October 2013, the firm outlined a number of ways that authorities can obtain customers' Snapchat data, adding that it would obey any legal requests. It has since toned down some of its rhetoric about how quickly and thoroughly pictures and other Snapchat data are destroyed, too.

Those moves bothered the Electronic Frontier Foundation, though. It gave Snapchat just one star in last year's "Who Has Your Back?" report, a survey that ranks internet companies based on how well they balance government data requests with users' privacy.

Among the EFF's gripes was that Snapchat had yet to publish a transparency report – an omission it has now rectified. The firm says that from now on it will publish a new report every six months, beginning in July 2015.

It's worth noting, however, that law enforcement hasn't always needed to request data directly from Snapchat to catch criminals who use it. In one recent case, police arrested a teenager after he used Snapchat to send a photo of himself posing with the body of a boy whom he had shot dead.

In another, a fugitive repeatedly send Snapchat messages giving his location at his home, leading police right to him. No back-room requests were involved; in both cases, it was the recipients of the messages who tipped off police by phone. ®

Similar topics


Other stories you might like

  • Minimal, systemd-free Alpine Linux releases version 3.16
    A widespread distro that many of its users don't even know they have

    Version 3.16.0 of Alpine Linux is out – one of the most significant of the many lightweight distros.

    Version 3.16.0 is worth a look, especially if you want to broaden your skills.

    Alpine is interesting because it's not just another me-too distro. It bucks a lot of the trends in modern Linux, and while it's not the easiest to set up, it's a great deal easier to get it working than it was a few releases ago.

    Continue reading
  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Slack-for-engineers Mattermost on open source and data sovereignty
    Control and access are becoming a hot button for orgs

    Interview "It's our data, it's our intellectual property. Being able to migrate it out those systems is near impossible... It was a real frustration for us."

    These were the words of communication and collaboration platform Mattermost's founder and CTO, Corey Hulen, speaking to The Register about open source, sovereignty and audio bridges.

    "Some of the history of Mattermost is exactly that problem," says Hulen of the issue of closed source software. "We were using proprietary tools – we were not a collaboration platform before, we were a games company before – [and] we were extremely frustrated because we couldn't get our intellectual property out of those systems..."

    Continue reading

Biting the hand that feeds IT © 1998–2022