Verizon Gave Phone Data to Armed Stalker Who Posed as Cop Over Email

The data transfer is a massive failure by Verizon, which fell for a low quality scam that may have put someone’s physical safety in danger.
Verizon store.
Image: Unsplash/José Matute.

This article was produced in collaboration with Court Watch, an independent outlet that unearths overlooked court records.

The FBI investigated a man who allegedly posed as a police officer in emails and phone calls to trick Verizon to hand over phone data belonging to a specific person that the suspect met on the dating section of porn site xHamster, according to a newly unsealed court record. Despite the relatively unconvincing cover story concocted by the suspect, including the use of a clearly non-government ProtonMail email address, Verizon handed over the victim’s data to the alleged stalker, including their address and phone logs. The stalker then went on to threaten the victim and ended up driving to where he believed the victim lived while armed with a knife, according to the record.

The news is a massive failure by Verizon who did not verify that the data request was fraudulent, and the company potentially put someone’s safety at risk. The news also highlights the now common use of fraudulent emergency data requests (EDRs) or search warrants in the digital underworld, where criminals pretend to be law enforcement officers, fabricate an urgent scenario such as a kidnapping, and then convince telecoms or tech companies to hand over data that should only be accessible through legitimate law enforcement requests. As 404 Media previously reported, some hackers are using compromised government email accounts for this purpose.

“This case does demonstrate the importance of every request being documented and auditable,” Matt Donahue, the founder of Kodex, a company that acts as a buffer between law enforcement and tech giants to verify requests for customer data, told 404 Media in an email.