Al Mayadeen English

  • Ar
  • Es
  • x
Al Mayadeen English

Slogan

  • News
    • Politics
    • Economy
    • Sports
    • Arts&Culture
    • Health
    • Miscellaneous
    • Technology
    • Environment
  • Articles
    • Opinion
    • Analysis
    • Blog
    • Features
  • Videos
    • NewsFeed
    • Video Features
    • Explainers
    • TV
    • Digital Series
  • Infographs
  • In Pictures
  • • LIVE
News
  • Politics
  • Economy
  • Sports
  • Arts&Culture
  • Health
  • Miscellaneous
  • Technology
  • Environment
Articles
  • Opinion
  • Analysis
  • Blog
  • Features
Videos
  • NewsFeed
  • Video Features
  • Explainers
  • TV
  • Digital Series
Infographs
In Pictures
  • Africa
  • Asia
  • Asia-Pacific
  • Europe
  • Latin America
  • MENA
  • Palestine
  • US & Canada
BREAKING
Al Mayadeen's correspondent: The Lebanese Army is continuing its investigations and will later announce any information that does not affect the confidentiality of the investigation
Al Mayadeen's correspondent: It has not yet been determined whether the detainees belong to ISIS or another organization
Al Mayadeen's correspondent: Around 10 people of different nationalities, including Lebanese nationals, were detained
Al Mayadeen's correspondent: The Lebanese army arrested a number of people in the Matn area of Mount Lebanon with possession it has not disclosed
Gaza Civil Defense spokesman: We have strong indications that there are martyrs, injuries, and trapped people in the Salah al-Din area
Gaza Civil Defense spokesman: Citizens should avoid Salah al-Din Street because anyone who approaches it is at risk of being directly targeted
Gaza Civil Defense spokesman: Reality is that there is a very limited retreat of the vehicles, with the occupation forces providing cover undeer fire up to Salah al-Din Street
Gaza Civil Defense spokesman: Claims that the Israeli occupation has withdrawn from areas in the neighborhoods of al-Zaytoun, al-Tuffah, and al-Shujaiya are false
Hamas: The two delegations stressed that any negotiations must lead to the achievement of our people's goals and aspirations, foremost among which is ending the war and the complete withdrawal of enemy forces
Hamas: A delegation from the Hamas leadership, led by the head of the leadership council, Mohammad Darwish, met with an Islamic Jihad delegation, headed by its Secretary-General, Ziyad al-Nakhalah

Docs expose how feds target online video viewers

  • Kit Klarenberg Kit Klarenberg
  • Source: Al Mayadeen English
  • 6 Apr 2024 14:04
  • 4 Shares
5 Min Read

Since Google’s inception, it has been a go-to resource for Western law enforcement, security, and intelligence agencies, particularly when a serious crime has been committed, but authorities have no suspects.

  • x
  •  The videos had  been watched thousands of times, meaning even just a weekly snapshot of viewers could’ve resulted in the information of hundreds being unilaterally handed over to investigators. (Al Mayadeen English; Illustrated by Zeinab el-Hajj)
    The videos had been watched thousands of times, meaning even just a weekly snapshot of viewers could’ve resulted in the information of hundreds being unilaterally handed over to investigators. (Al Mayadeen English; Illustrated by Zeinab el-Hajj)

Bombshell court documents have revealed how US authorities compel YouTube to cough up extensive identifying information on users viewing particular content, and/or anyone who has accessed certain video URLs during a certain time period. The contents show that major streaming platforms have surreptitiously been transformed into a vast dragnet, and innocent private citizens can become suspects in criminal investigations by simply viewing videos online. The potential for these powers to be grossly abused is obvious, and vast.

The documents are a pair of 2703(d) court orders. US authorities hit Google with a sweeping demand for user data, which an East Kentucky judge ruled was legitimate, as there were “reasonable grounds to believe that the records…sought are relevant and material to an ongoing criminal investigation.” The probe was launched due to an anonymous individual offering to convert cryptocurrency into US dollars via mail, in apparent breach of money laundering laws.

US undercover agents posing as bitcoin sellers conducted “multiple” transactions with the individual. In one instance, they claimed their bitcoin “originated from the proceeds of drug sales.” During these exchanges, the individual sent their customers links to YouTube videos, and agents did the same in response. As such, officials demanded Google turn over a wealth of information on anyone and everyone who viewed these clips January 1st - January 8th 2023. 

This included their names, home, business, email and IP addresses, phone records, device information, online payment records, user activity records, and much, much more. The videos in question were completely innocuous, and had in one case been watched tens of thousands of times, meaning even just a weekly snapshot of who viewed the clips could’ve resulted in hundreds of innocent citizens’ personal information being unilaterally handed over to investigators. 

Related News

Concentration camps and the road to exile: Gaza as a laboratory of privatized genocide

Understanding Yemen 2/2: Ansar Allah values

‘Geofence Warrants’

This was a textbook fishing expedition, theoretically prohibited under the US constitution’s fourth amendment, which protects citizens from “unreasonable searches and seizures by the government”. That the East Kentucky judge not only signed off on the demand for Google to hand over the information, but a corresponding gag order prohibiting the tech giant from disclosing the order’s existence to anyone publicly or privately for a year following its execution, strongly suggests US judicial sympathies lie with the government in such cases.

There were a variety of means by which US authorities could’ve easily avoided turning publicly accessible video content into a honeypot. For example, uploading a clip, setting it to private, and sharing the link with their target exclusively. This would in fact have been far more effective at identifying the individual than the approach adopted, which tends to suggest that unearthing mounds of information on unsuspecting YouTube users without their knowledge or consent, and without Google being able to resist the demand, was the explicit objective.

There’s no way this was an isolated incident, either. Since Google’s inception, it has been a go-to resource for Western law enforcement, security, and intelligence agencies, particularly when a serious crime has been committed, but authorities have no suspects. In the US, “geofence warrants” have become disturbingly common. Officials demand Google provides information on anyone who was present in a specific area during a certain timeframe, then start drilling down until they find a potential suspect.

Given geofence warrants are often applied to high-traffic areas, including businesses, apartment complexes, schools, or churches, the prospect of innocent people who live and work in, or for one reason or another frequent, a site that becomes a crime scene being wrongly tapped as suspects in criminal investigations is absolutely certain. This is precisely what happened in December 2018, when Phoenix, Arizona police jailed a man on the grounds his phone location data placed him at the site of a shooting nine months earlier.

Mercifully, he was released after just a week, after cops learned that his car was regularly used by his mother’s ex-boyfriend, the actual culprit. In a less heinous but barely less disturbing incident, judges in San Francisco signed off on a geofence warrant that, due to a typo in court submissions, covered a two-mile-long stretch of the city. Police resultantly accessed sensitive information about people present in a wide variety of state and public buildings, and the residents of private homes.

How many other mistakes have been made by Western authorities in the thousands of data requests they submit to Google annually is an open question. But it shouldn’t be. 

The views expressed in this article are solely those of the author and do not necessarily reflect Al Mayadeen’s editorial stance.
  • United States
  • YouTube
  • Kit Klarenberg
  • Google
  • espionage
Kit Klarenberg

Kit Klarenberg

Investigative journalist.

Most Read

All
How is it that the Western regimes, which claimed to support the fake revolutions of Lebanon, Libya, and Syria, waged constant war against the actual Ansar Allah-led revolution in Yemen? (Al Mayadeen English; Illustrated by Batoul Chamas)

Understanding Yemen 1/2: The Revolution

  • Opinion
  • 30 Jun 2025
Why Netanyahu is on the ropes

Why Netanyahu is on the ropes

  • Analysis
  • 4 Jul 2025
Ukraine’s Corporate Carve-Up Collapses?

Ukraine’s Corporate Carve-Up Collapses?

  • Analysis
  • 11 Jul 2025
Africa’s top university’s ‘Gaza Resolutions’ outrages pro-'Israel' lobby

Africa’s top university’s ‘Gaza Resolutions’ outrages pro-'Israel' lobby

  • Analysis
  • 4 Jul 2025

Coverage

All
War on Iran

More from this writer

All
Ukraine’s Corporate Carve-Up Collapses?

Ukraine’s Corporate Carve-Up Collapses?

USAID Leaks: Censorship As Regime Change

USAID Leaks: Censorship As Regime Change

Spying for enemies: Beware ‘intergovernmental’ organizations

Spying for enemies: Beware ‘intergovernmental’ organizations

At the time of Vanunu’s whistleblowing, Western governments and intelligence agencies had been aware of "Israel’s" development of nuclear weapons for almost three decades. (Al Mayadeen English; Illustrated by Mahdi Rtail)

Hidden history: How 'Israel' acquired nukes

Al Mayadeen English

Al Mayadeen is an Arab Independent Media Satellite Channel.

All Rights Reserved

  • x
  • Privacy Policy
  • About Us
  • Contact Us
  • Authors
Android
iOS