Keep Factually independent

Whether you agree or disagree with our analysis, these conversations matter for democracy. We don't take money from political groups - even a $5 donation helps us keep it that way.

Loading...Time left: ...
Loading...Goal: $500

Fact check: Do people steal government emails to preform Emergency Data Requests for obtaining others information?

Checked on August 26, 2025

1. Summary of the results

Yes, people do steal government emails to perform Emergency Data Requests (EDRs) for obtaining others' information. The evidence confirms this practice exists and is actively occurring in cybercriminal circles.

Key findings include:

  • Hackers are stealing government emails specifically for EDRs: Multiple sources confirm that cybercriminals compromise law enforcement and government email accounts to perform emergency data requests, which can be used to obtain others' information [1] [2]
  • Commercial market exists: Hacked law enforcement and government email accounts are being sold on the dark web for as little as $40, indicating a thriving marketplace for these compromised credentials [1]
  • Sophisticated verification methods: Hackers don't just steal the emails - they also verify their identity on social media platforms to make their fraudulent emergency data requests appear legitimate [2]
  • Government awareness and response: The Justice Department has implemented a Data Security Program specifically to protect Americans' sensitive data from foreign adversaries, suggesting official recognition of these threats [3]

2. Missing context/alternative viewpoints

The original question lacks several important contextual elements:

  • Scale and frequency: The analyses don't provide specific numbers on how often these attacks occur or their success rates
  • Legitimate EDR processes: There's no discussion of how legitimate Emergency Data Requests are supposed to work, which would help distinguish between proper and fraudulent use
  • Government vulnerabilities: The sources reveal that government officials sometimes use personal Gmail accounts for sensitive government business, creating additional security risks beyond just email theft [4]. Federal agencies also face ongoing security and privacy concerns with their email systems, including allegations of illegal and insecure systems [5] [6]
  • Broader cybersecurity landscape: While the sources mention general email hacking incidents and massive data breaches affecting billions of credentials [7] [8], they don't specifically connect these to the EDR abuse problem
  • Tech companies' role: The analyses don't discuss how technology companies that receive these fraudulent EDRs are responding or what verification measures they have in place

3. Potential misinformation/bias in the original statement

The original question appears to be factually accurate and unbiased. It poses a legitimate inquiry about a real cybersecurity threat without making unfounded claims or presenting a particular agenda.

However, the question could benefit from more specificity:

  • Terminology precision: The question uses "preform" instead of "perform," which is a minor spelling error but doesn't affect the substance
  • Scope clarification: The question doesn't specify whether it's asking about domestic or international actors, though the evidence suggests both may be involved
  • No false balance: Unlike many cybersecurity topics that might be sensationalized, this question appears to address a genuine, documented threat without exaggeration

The evidence strongly supports that this is a real and ongoing problem rather than a theoretical concern or conspiracy theory.

Want to dive deeper?
What are the consequences of stealing government emails for personal gain?
How do hackers use Emergency Data Requests to obtain sensitive information?
What measures do government agencies take to prevent email theft and protect citizen data?
Can individuals report suspected email theft to the authorities for investigation?
What laws protect against the unauthorized use of government emails for data requests?