Exclusive: Government secretly orders Google to identify anyone who has searched a name, address and telephone number

The U.S. govern­ment is secretly orde­ring Google to provide data on anyone typing in certain search terms, an acci­den­tally unse­a­led court docu­ment shows. There are fears such “keyword warrants” thre­a­ten to impli­cate inno­cent Web users in seri­ous crimes and are more common than previ­ously thought.

 

In 2019, fede­ral inves­ti­ga­tors in Wiscon­sin were hunting men they beli­e­ved had parti­ci­pa­ted in the traf­fic­king and sexual abuse of a minor. She had gone missing that year but had emer­ged clai­ming to have been kidnap­ped and sexu­ally assaul­ted, accor­ding to a search warrant revi­e­wed by Forbes. In an attempt to chase down the perpe­tra­tors, inves­ti­ga­tors turned to Google, asking the tech giant to provide infor­ma­tion on anyone who had sear­ched for the victim’s name, two spellings of her mother’s name and her address over 16 days across the year. After being asked to provide all rele­vant Google accounts and IP addres­ses of those who made the sear­ches, Google respon­ded with data in mid-2020, though the court docu­ments do not reveal how many users had their data sent to the govern­ment.

It’s a rare exam­ple of a so-called keyword warrant and, with the number of search terms inclu­ded, the broa­dest on record. Before this latest case, only two keyword warrants had been made public. One reve­a­led in 2020 asked for anyone who had sear­ched for the address of an arson victim who was a witness in the govern­ment’s racke­te­e­ring case against singer R Kelly. Anot­her, detai­led in 2017, reve­a­led that a Minne­sota judge signed off on a warrant asking Google to provide infor­ma­tion on anyone who sear­ched a fraud victim’s name from within the city of Edina, where the crime took place.

 

While Google deals with thou­sands of such orders every year, the keyword warrant is one of the more conten­ti­ous. In many cases, the govern­ment will alre­ady have a speci­fic Google account that they want infor­ma­tion on and have proof it’s linked to a crime. But search term orders are effec­ti­vely fishing expe­di­ti­ons, hoping to ensnare possi­ble suspects whose iden­ti­ties the govern­ment does not know. It’s not dissi­mi­lar to so-called geofence warrants, where inves­ti­ga­tors ask Google to provide infor­ma­tion on anyone within the loca­tion of a crime scene at a given time.

“As with all law enfor­ce­ment requests, we have a rigo­rous process that is desig­ned to protect the privacy of our users while suppor­ting the impor­tant work of law enfor­ce­ment, ” a Google spokes­per­son said.

The latest case shows Google is conti­nuing to comply with such contro­ver­sial requests, despite concerns over their lega­lity and the poten­tial to impli­cate inno­cent people who happe­ned to search for the rele­vant terms. From the govern­ment’s pers­pec­tive in Wiscon­sin, the scope of the warrant should have been limi­ted enough to avoid the latter: the number of people sear­ching for the speci­fic names, address and phone number in the given time frame was likely to be low. But privacy experts are concer­ned about the prece­dent set by such warrants and the poten­tial for any such order to be a breach of Fourth Amend­ment protec­ti­ons from unre­a­so­na­ble sear­ches. There are also concerns about First Amend­ment free­dom of speech issues, given the poten­tial to cause anxi­ety amongst Google users that their iden­ti­ties could be handed to the govern­ment because of what they sear­ched for.

“Traw­ling through Google’s search history data­base enables police to iden­tify people merely based on what they might have been thin­king about, for whate­ver reason, at some point in the past. This is a virtual drag­net through the public’s inter­ests, beli­efs, opini­ons, values and friends­hips, akin to mind reading powe­red by the Google time machine, ” said Jenni­fer Granick, survei­llance and cyber­se­cu­rity coun­sel at the Ameri­can Civil Liber­ties Union (ACLU). “This never-before-possi­ble tech­ni­que thre­a­tens First Amend­ment inter­ests and will inevi­tably sweep up inno­cent people, espe­ci­ally if the keyword terms are not unique and the time frame not precise. To make matters worse, police are currently doing this in secret, which insu­la­tes the prac­tice from public debate and regu­la­tion.”

The Wiscon­sin case was suppo­sed to have remai­ned secret, too. The warrant only came to light because it was acci­den­tally unse­a­led by the Justice Depart­ment in Septem­ber. Forbes revi­e­wed the docu­ment before it was sealed again and is neit­her publis­hing it nor provi­ding full details of the case to protect the iden­ti­ties of the victim and her family. The inves­ti­ga­tion is ongoing, two years after the crimes occur­red, and the DOJ didn’t comment on whet­her or not any char­ges had been filed.

Forbes was able to iden­tify one other, previ­ously unre­por­ted keyword warrant in the Northern District of Cali­for­nia in Decem­ber 2020, though its exis­tence was only noted in a court docket. It also has the poten­tial to be broad. The order, currently under seal, is titled “Appli­ca­tion by the United States for a Search Warrant for Google Accounts Asso­ci­a­ted with Six Search Terms and Four Search Dates.”

There’s more that the govern­ment can get with such requests than simple Google account iden­ti­ties and IP addres­ses. In Wiscon­sin, the govern­ment was hope­ful Google could also provide “Cooki­eIDs” belon­ging to any users who made the sear­ches. These Cooki­eIDs “are iden­ti­fi­ers that are used to group toget­her all sear­ches conduc­ted from a given machine, for a certain time period. Such infor­ma­tion allows inves­ti­ga­tors to ascer­tain, even when the user is not logged into a Google account, whet­her the same indi­vi­dual may have conduc­ted multi­ple perti­nent sear­ches, ” the govern­ment wrote.

There was anot­her distur­bing aspect to the search warrant: the govern­ment had publis­hed the kidnap­ping victim’s name, her Face­book profile (now no longer acces­si­ble), her phone number and address, a poten­tial breach of a minor’s privacy. The govern­ment has now sealed the docu­ment, though was only aler­ted to the leak after Forbes emai­led the Justice Depart­ment for comment. That mista­ke—of reve­a­ling the iden­tity of minor victims of sexual abuse in court docu­ments—­has become a common one in recent years. As in the latest case, the FBI and DHS have been seen choo­sing pseu­donyms and acronyms for victims, but then publis­hing their full Face­book profile link, which contains the name of the minor.