DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Two former Twitter employees and a Saudi national charged in plot to spy on users for Saudi government

Posted on November 6, 2019 by Dissent

From the U.S. Department of Justice, Northern District of California:

SAN FRANCISCO –Ali Alzabarah, Ahmad Abouammo, and Ahmed Almutairi, a/k/a Ahmed Aljbreen, were charged for their respective roles in fraudulently accessing private information in the accounts of certain Twitter users and providing that information to officials of the Kingdom of Saudi Arabia, announced United States Attorney David L. Anderson and Federal Bureau of Investigation Special Agent in Charge John F. Bennett.  All three defendants are charged with acting as illegal agents of a foreign government; and Abouammo also is charged with destroying, altering, or falsifying records in a federal investigation.

            “The criminal complaint unsealed today alleges that Saudi agents mined Twitter’s internal systems for personal information about known Saudi critics and thousands of other Twitter users,” said U.S. Attorney Anderson.  “U.S. law protects U.S. companies from such an unlawful foreign intrusion.  We will not allow U.S. companies or U.S. technology to become tools of foreign repression in violation of U.S. law.”

            “The FBI will not stand by and allow foreign governments to illegally exploit private user information from U.S. companies.  These individuals are charged with targeting and obtaining private data from dissidents and known critics, under the direction and control of the government of Saudi Arabia,” said FBI Special Agent in Charge John F. Bennett.  “Insider threats pose a critical threat to American businesses and our national security.”

            Alzabarah, 35, of Saudi Arabia, and Abouammo, 41, of Seattle, Washington, were Twitter employees.  According to the complaint, between November of 2014 and May of 2015, Almutairi, 30, of Saudi Arabia, and foreign officials of the Kingdom of Saudi Arabia convinced Abouammo and Alzabarah to use their employee credentials to gain access without authorization to certain nonpublic information about the individuals behind certain Twitter accounts.  Specifically, representatives of the Kingdom of Saudi Arabia and the Saudi Royal Family sought the private information of Twitter users, including their email addresses, IP addresses, and dates of birth, of persons some of whom published posts deemed by the Saudi Royal Family to be critical of the regime.  This information could have been used to identify and locate the Twitter users who published these posts.  The complaint alleges that Alzabarah and Abouammo were compensated for their illicit conduct, including the provision of a luxury watch, cash, and other benefits in exchange for their agreement to violate Twitter policies by accessing and providing the information.  Almutairi is alleged to have arranged meetings, acted as a go-between, and facilitated communications between the Saudi government and the other defendants.

The complaint also contains allegations regarding the reaction of Alzabarah upon being confronted by Twitter about his violations of Twitter policy.  According to the complaint, when Alzabarah was confronted by Twitter’s management about accessing users’ information, he sought assistance from Almutairi and others to flee the United States.  Alzabarah left the country the next day and submitted his resignation from Twitter by email while en route.  With respect to Abouammo, the complaint alleges FBI agents confronted him in October 2018 about his activities on behalf of officials of the Kingdom of Saudi Arabia.  In response, Abouammo allegedly lied to the agents and provided them with a falsified invoice in an effort to obstruct the investigation.

            Abouammo was arrested in Seattle, Washington, on November 5, 2019, and is making his initial federal court appearance in Seattle at 2:00 p.m., this afternoon.  Alzabarah and Almutairi are believed to be in Saudi Arabia.  Federal warrants have been issued for their arrest.

            A complaint merely alleges that crimes have been committed, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt. If convicted, all three defendants face maximum statutory sentence of 10 years in prison and a $250,000 fine for acting as an agent of a foreign government without notification to the Attorney General, in violation of 18 U.S.C. § 951.  In addition, Abouammo faces an additional 20 years in prison and a $250,000 fine for obstruction of justice, in violation of 18 U.S.C. § 1519.  Further, the court may order restitution, if appropriate, and additional periods of supervised release.  However, any sentence following conviction would be imposed by the court only after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.

            The case is being prosecuted by the Special Prosecutions and National Security Unit of the United States Attorney’s Office for the Northern District of California and the Counterintelligence and Export Control Section of the National Security Division.  The prosecution is the result of an investigation by the Federal Bureau of Investigation.

Further Information:

            Case #: 19-mj-71824 TSH


Related: Law.com has the complaint and related files.


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
Category: Business SectorInsiderOf NoteU.S.

Post navigation

← Schools in Connecticut and Mississippi report ransomware attacks
NZ: FMA privacy breach extends to six cases, KPMG to investigate regulator →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.