
And so as long as it looks right, they’ll comply.” But there’s no real mechanism defined by most Internet service providers or tech companies to test the validity of a search warrant or subpoena. “Providers have a streamlined process where they publish the fax or contact information for police to get emergency access to data. “And then we have this emergency process, almost like you see on Law & Order, where they say they need certain information immediately,” Rasch continued. “We have a legal process to compel production of documents, and we have a streamlined legal process for police to get information from ISPs and other providers,” said Mark Rasch, a former prosecutor with the U.S.

In this scenario, the receiving company finds itself caught between two unsavory outcomes: Failing to immediately comply with an EDR - and potentially having someone’s blood on their hands - or possibly leaking a customer record to the wrong person. Using their illicit access to police email systems, the hackers will send a fake EDR along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately. It is now clear that some hackers have figured out there is no quick and easy way for a company that receives one of these EDRs to know whether it is legitimate. Virtually all major technology companies serving large numbers of users online have departments that routinely review and process such requests, which are typically granted as long as the proper documents are provided and the request appears to come from an email address connected to an actual police department domain name.īut in certain circumstances - such as a case involving imminent harm or death - an investigating authority may make what’s known as an Emergency Data Request (EDR), which largely bypasses any official review and does not require the requestor to supply any court-approved documents.

In the United States, when federal, state or local law enforcement agencies wish to obtain information about who owns an account at a social media firm, or what Internet addresses a specific cell phone account has used in the past, they must submit an official court-ordered warrant or subpoena. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death. “The ladder of success is best climbed by stepping on the rungs of opportunity.There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms.

