Web performance and security company CloudFlare has released a report detailing the number of requests it received from government agencies in the first half of 2015.
CloudFlare said it received 12 subpoenas between January 1, 2015 and June 30, 2015, the same number as in the second half of 2014. These subpoenas, ten of which have been answered, affect a total of 12 accounts and 139 domains.
While the number of subpoenas has remained the same, the number of court orders increased considerably. In the first half of 2015, the company was hit with 50 court orders, more than it received in the entire last year. The content delivery network responded to 49 of the court orders, which affect a total of 2,120 domains and 96 accounts.
The transparency report, which is published on a semiannual basis, shows that CloudFlare received three search warrants and one pen register/trap and trace order, and answered all of them. Records show that the company has not received any wiretap orders.
As for National Security Letters (NSLs) and Foreign Intelligence Surveillance Act (FISA) orders, companies are not allowed to disclose the exact number. CloudFlare says it has received between 0 and 249 such national security orders. The firm has pointed out that even if the actual number is 249, only less than 0.005 percent of customer accounts would be impacted.
The CDN has pointed out that one of the requests received in the first half of 2015 came from a foreign law enforcement agency. The request was issued via a United States court through a mutual legal assistance treaty (MLAT). CloudFlare has noted that it is not subject to foreign jurisdictions and it only accepts requests that come through the U.S. court system.
It’s worth noting that the requests detailed in the transparency report are for both CloudFlare and StopTheHacker, the anti-malware firm acquired in February 2014.
The company says it has never handed over SSL keys to anyone, it has never installed law enforcement software or hardware on its network, it has never bowed to political pressure, and it has never provided law enforcement agencies a feed of customer content.
“If CloudFlare were asked to do any of the above, we would exhaust all legal remedies, in order to protect its customers from what we believe are illegal or unconstitutional requests,” the company said.
Related: Amazon Details Government Data Requests in First Transparency Report

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
Latest News
- Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App
- LeapXpert Banks $22M Funding to Secure Corporate Messaging With Consumer Apps
- Blockchain Security Firm True I/O Raises $9 Million
- Spera Banks $10 Million to Tackle Identity and Access Sprawl
- OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- New Wi-Fi Attack Allows Traffic Interception, Security Bypass
- Casino Giant Crown Resorts Investigating Ransomware Group’s Data Theft Claims
