{"id":60692,"date":"2026-05-20T08:30:00","date_gmt":"2026-05-20T08:30:00","guid":{"rendered":"https:\/\/www.theregister.com\/a\/5242590"},"modified":"2026-05-20T08:30:00","modified_gmt":"2026-05-20T08:30:00","slug":"londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/","title":{"rendered":"London&#8217;s police asked Big Tech for comms data over 700,000 times last year"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/image.theregister.com\/230518.jpg?imageId=230518&amp;x=0&amp;y=0&amp;cropw=100&amp;croph=100&amp;panox=0&amp;panoy=0&amp;panow=100&amp;panoh=100&amp;width=1200&amp;height=683\" class=\"ff-og-image-inserted\"><\/div>\n<p>London\u2019s Metropolitan Police \u2013 the UK\u2019s largest police force \u2013 asked tech companies to give officers access to private communications data over 700,000 times in 2025 alone, according to figures obtained by <span data-lab-italic=\"italic\" class=\"italic m-italic\">The Register<\/span>&nbsp;under the Freedom of Information Act.<\/p>\n<p>These statistics expose the monitoring of everyday platforms like takeaway delivery services, and also show a massive surge in the force&#8217;s surveillance of the users of low cost MVNO&nbsp;LycaMobile. Additionally, our FoI exposed the acquisition of data from encrypted messaging services designed to offer privacy.<\/p>\n<p>Since 2024, the Met says that it has obtained communications data (CD) from Proton\u2019s privacy-focused mail service users 139 times. CD is not messaging content, but metadata. In Proton\u2019s case, this could include account payment details and, in some instances, IP addresses.<\/p>\n<p>Although Proton did not dispute these figures, a spokesperson told us: &#8220;Proton does not transmit data directly to any foreign law enforcement agencies,&#8221; adding that it operates under a \u201cstrict legal framework\u201d so all requests must go through the Swiss authorities.<\/p>\n<p>Requests for data that don\u2019t meet Proton\u2019s legal and human rights requirements are refused, which it has an &#8220;established practice&#8221; of doing, according to the spokesperson.<\/p>\n<p>The Met also claims that it has acquired data results from ProtonVPN, although the non-profit says this is &#8220;highly dubious and inconsistent with our technical reality [&#8230;] because Proton VPN does not log user activity, there is no data to provide,&#8221; referring <span data-lab-italic=\"italic\" class=\"italic m-italic\">El Reg <\/span>to its <a href=\"https:\/\/proton.me\/legal\/transparency\">transparency report<\/a>.<\/p>\n<p>\u201cWe engage with every request in good faith, but we simply cannot hand over what we do not collect,\u201d Proton said.<\/p>\n<p>The Met\u2019s data also suggests encrypted messenger Signal has provided data once since 2024. But this is also, apparently, contrary to records that the non-profit holds.<\/p>\n<p>A spokesperson told us: \u201cSignal collects very little data about its users to begin with and publishes the requests we respond to at<a href=\"http:\/\/signal.org\/bigbrother\"> signal.org\/bigbrother<\/a>. We have not shared any user data in response to a legal request originating from the United Kingdom.\u201d<\/p>\n<p>If data was shared by Signal it could only include phone numbers, when the account was created, and when the user last accessed the platform.<\/p>\n<p>When queried about the denials by both Proton and Signal, the police force said it couldn\u2019t comment on the specifics of how it acquired the data.<\/p>\n<p>The Met Police says that all companies \u201chave a legal obligation\u201d to cooperate with officials thanks to the powers of the Office for Communications Data Authorizations (OCDA). The OCDA is now a part of the <a href=\"https:\/\/www.theregister.com\/2025\/12\/18\/snoopers_charter_loopholes\/\">Investigatory Powers<\/a> Commissioner\u2019s Office (IPCO), which monitors the select public authorities, law enforcement agencies, and government departments with the power to acquire comms data.<\/p>\n<p>But there\u2019s some fog around authorizations for the police, according to Dr Bernard Keenan, a law lecturer and surveillance researcher at University College London: \u201cWhen it comes to communications data and metadata, it\u2019s seen as a less severe intrusion than intercepting or accessing the content of a message, and so while the police need an authorization to get it, the decision is delegated to designated senior officers. So it\u2019s something that the police can do operationally, more-or-less autonomously.\u201d<\/p>\n<h3>Sources compromised<\/h3>\n<p>In 2024, the year of the most recent IPCO <a href=\"https:\/\/www.ipco.org.uk\/publications\/annual-reports\/\">annual report<\/a>, it was found that these authorizations to all law enforcement agencies affected lawyers 219 times and journalists on 157 occasions. This came with a caveat: \u201cMost [CD] applications relating to sensitive professionals were submitted because the individual had been a victim of a crime.\u201d<\/p>\n<p>While CD does not contain message content itself, there remains a risk that contacts such as a journalist\u2019s sources could be disclosed.<\/p>\n<p>Also in the report is the revelation that in 2024, 106 warrant applications were issued to specifically identify journalists\u2019 sources, and under these separate powers, the request could also include the communications content itself.<\/p>\n<p>There\u2019s no requirement to inform sensitive professionals they have been targeted in this way, and while ordinary law enforcement agencies need to seek a judge\u2019s approval, intelligence and security spies are exempt from this.<\/p>\n<p>Tim Dawson, freelance organizer at the National Union of Journalists &#8211; who also convenes the International Federation of Journalists\u2019 working group on surveillance &#8211; said: \u201cUK legislation lays down clear guardrails for law enforcement agencies obtaining communications data, and includes protections specifically for journalists.\u201d<\/p>\n<p>But he continued: \u201cThe NUJ does not consider these are sufficiently robust. More disturbingly, however, it is clear that they are sometimes ignored \u2013 just look at the cases around the attempted prosecution of Barry McCaffrey and Trevor Birney.\u201d<\/p>\n<p>These two journalists were unlawfully spied on by the Met and Police Service Northern Ireland to identify the source of allegedly stolen police documents used in a documentary about paramilitary killings during the Troubles.&nbsp;<\/p>\n<p>The police had claimed that information revealed in the film had breached the Official Secrets Act.&nbsp;<\/p>\n<p>McCaffrey and Birney used <a href=\"https:\/\/www.judiciary.uk\/wp-content\/uploads\/2024\/12\/OPEN-judgment-McCaffrey-and-Birney-Investigatory-Powers-Tribunal-17-December-2024.pdf\">judicial review<\/a>&nbsp;[PDF] to challenge the police action and the court ruled that the searches were unlawful.<\/p>\n<h3>&#8216;The digital border is expanding through policing&#8217;<\/h3>\n<p>In 2025, the number of requests sent by the Met to MVNO LycaMobile increased by almost 500 percent year-on-year, rising from 15,702 to 93,527. This drastic spike was totally absent for other British network providers such as Vodafone, O2, Three, and Lebara.<\/p>\n<p>Considering LycaMobile\u2019s focus on cheap overseas calling, and the likelihood of foreign nationals using its service, concerns have been raised that this data could be used for a crackdown on immigration.<\/p>\n<p>Fizza Qureshi, chief executive of Migrants\u2019 Rights Network, a charity that researches the digital hostile environment, said: \u201cA 500 percent surge in data requests from the Metropolitan Police to a network used largely by migrants and racialized people makes clear that the digital border is expanding through policing.\u201d<\/p>\n<p>This checks out, considering the Home Office recently <a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/cm240jvnen0o\">said<\/a> immigration enforcement officers can now, under the&nbsp;Border Security, Asylum, and Immigration Act 2025, rifle through the mouths of undocumented migrants to search for hidden SIM-cards \u2014 as part of new powers <a href=\"https:\/\/www.bbc.com\/news\/articles\/cm240jvnen0o\">granted<\/a> to seize phones and gather digital intelligence.<\/p>\n<p>The new powers came into force last year in December, despite legal reviews finding procedural unfairness of such searches. In 2022, a <a href=\"https:\/\/dpglaw.contentfiles.net\/media\/documents\/MA-KH-judgment.pdf\">High Court ruling<\/a>&nbsp;found the Home Office\u2019s controversial seizure and retention of over 2,000 migrants\u2019 mobile phones was unlawful.<\/p>\n<p>\u201cMigrants and racialized people are singled out for surveillance that would never be tolerated elsewhere,\u201d according to Qureshi. \u201cThey are treated as acceptable subjects for intrusive monitoring, from phone records to delivery routes. This marks part of a wider trend of pre-emptive criminalization of migrants and racialized people and is an enormous infringement of our right to privacy.\u201d<\/p>\n<p>While a Met spokesperson denied any indication that the increase was specifically related to immigration crime, they offered a pretty milquetoast example that an increase in requests to a specific mobile operator could have been due to its increased popularity.&nbsp;<\/p>\n<p>If this were the case, Lycamobile would have needed to have grown its users from an estimated 2 million to 10 million for the surge to be consistent.<\/p>\n<p>LycaMobile did not respond to <span data-lab-italic=\"italic\" class=\"italic m-italic\">The Register\u2019s<\/span> queries.<\/p>\n<div data-element-guid=\"afe083ca-6701-48e9-9bd8-f8827dd7fb42\" class=\"lab4 column articleList layout_vertical imageLayout_left small-12 large-12 small-abs-12 large-abs-12 abs_grid_12 grid-vas-start mobile-grid-vas-start\">\n<div class=\"content border_width_0 border_width_mobile_0 border-radius-48 border-radius-mobile_48\">\n<h2 class=\"article-list-title t19 font-RobotoCondensed\">MORE CONTEXT<\/h2>\n<\/p><\/div>\n<\/div>\n<p>Additionally, Counter Terrorism Policing (CTP) \u2013 a part of the Met \u2013 started a procurement process for software for a <a href=\"https:\/\/www.contractsfinder.service.gov.uk\/notice\/b25a86ab-66ef-4898-a7ad-d1939366e5f8?origin=SearchResults&amp;p=1\">Communication Exploitation Data Tool<\/a> last year. Some of the requirements listed on the procurement notice were to process data from Uber rides and deliveries to be used for \u201cintelligence analysis.\u201d<\/p>\n<p>At the time of publication, it read:<\/p>\n<div data-element-guid=\"ad454f16-de30-4c75-8c7f-2d44adcd7333\" id=\"markup_5242684\" class=\"markupbox column desktop-floatCenter mobile-floatCenter small-12 large-8 small-abs-12 large-abs-8\" readability=\"15\">\n<p> <strong>The solution must support importing and process data from multiple file formats, including but not limited to; CSV, ANPR data, Drone Data, Zipcar records, Uber Ride Data, Uber Eats delivery Data.The supplier&#8217;s solution should be zero deployment and accessible via a browser to be suitable.<\/strong> <\/p>\n<\/div>\n<p>It\u2019s understood the requirements for the project have now changed. When asked for further details, including if a supplier has been found, a CTP spokesperson told <span data-lab-italic=\"italic\" class=\"italic m-italic\">The Register<\/span>: \u201cWe previously confirmed a routine tender process to procure software, however further details on systems and their use will not be made publicly available.\u201d<\/p>\n<p>This is not surprising given the operational secrecy around national security tech; or, in this case, takeaway delivery surveillance.<\/p>\n<p>Dr Keenan explained: \u201cIt\u2019s what the government wants the police to be doing: bringing in these capacities to synthesize multiple different data points to use them effectively and to have these powerful surveillance technologies.\u201d<\/p>\n<p>The Met Police requested data from ride and food delivery services Uber, Bolt, JustEat, Deliveroo, and Dominos Pizza a sum total of 768 times in 2025.<\/p>\n<p>Hundreds of delivery drivers were <a href=\"https:\/\/www.gov.uk\/government\/news\/illegal-delivery-riders-face-removal-following-enforcement-blitz\">arrested<\/a> last year in a spate of immigration enforcement operations, not long after gig economy firms <a href=\"https:\/\/www.gov.uk\/government\/news\/delivery-firms-to-bolster-rider-security-checks-to-stop-illegal-working\">pledged<\/a> to use facial recognition checks and fraud detection tech to clamp down on illegal working.<\/p>\n<p>In response to all of the findings and questions posed by <span data-lab-italic=\"italic\" class=\"italic m-italic\">El Reg<\/span>, a Met spokesperson said: \u201cEvery year the Met makes thousands of requests for communications data from a wide range of companies and telephone providers. The information provided helps our officers gather intelligence, solve crimes and find missing people.\u201d \u00ae<\/p>\n<p> <img decoding=\"async\" src=\"https:\/\/image.theregister.com\/?imageId=230518&#038;width=800\">READ MORE <a href=\"https:\/\/www.theregister.com\/databases\/2026\/05\/20\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/5242590\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A Freedom of Information Act request shows the extent of the surveillance READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":60693,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[7514],"class_list":["post-60692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register","tag-databases"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>London&#039;s police asked Big Tech for comms data over 700,000 times last year 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"London&#039;s police asked Big Tech for comms data over 700,000 times last year 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-20T08:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/image.theregister.com\/230518.jpg?imageId=230518&amp;x=0&amp;y=0&amp;cropw=100&amp;croph=100&amp;panox=0&amp;panoy=0&amp;panow=100&amp;panoh=100&amp;width=1200&amp;height=683\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"London&#8217;s police asked Big Tech for comms data over 700,000 times last year\",\"datePublished\":\"2026-05-20T08:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/\"},\"wordCount\":1516,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year.jpg\",\"keywords\":[\"databases\"],\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/\",\"name\":\"London's police asked Big Tech for comms data over 700,000 times last year 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year.jpg\",\"datePublished\":\"2026-05-20T08:30:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year.jpg\",\"width\":100,\"height\":66},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"databases\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/databases\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"London&#8217;s police asked Big Tech for comms data over 700,000 times last year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"London's police asked Big Tech for comms data over 700,000 times last year 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/","og_locale":"en_US","og_type":"article","og_title":"London's police asked Big Tech for comms data over 700,000 times last year 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2026-05-20T08:30:00+00:00","og_image":[{"url":"https:\/\/image.theregister.com\/230518.jpg?imageId=230518&amp;x=0&amp;y=0&amp;cropw=100&amp;croph=100&amp;panox=0&amp;panoy=0&amp;panow=100&amp;panoh=100&amp;width=1200&amp;height=683","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"London&#8217;s police asked Big Tech for comms data over 700,000 times last year","datePublished":"2026-05-20T08:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/"},"wordCount":1516,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2026\/05\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year.jpg","keywords":["databases"],"articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/","url":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/","name":"London's police asked Big Tech for comms data over 700,000 times last year 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2026\/05\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year.jpg","datePublished":"2026-05-20T08:30:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2026\/05\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2026\/05\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year.jpg","width":100,"height":66},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"databases","item":"https:\/\/www.threatshub.org\/blog\/tag\/databases\/"},{"@type":"ListItem","position":3,"name":"London&#8217;s police asked Big Tech for comms data over 700,000 times last year"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=60692"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60692\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/60693"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=60692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=60692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=60692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}