[Infowarrior] - Judge ok's mass warrant for Google search
Richard Forno
rforno at infowarrior.org
Mon Mar 20 12:29:15 CDT 2017
Judge OKs warrant to reveal who searched a crime victim’s name on Google
Order seeks data for "any/all user or subscriber information" related to the searches.
David Kravets - 3/17/2017, 1:10 AM
https://arstechnica.com/tech-policy/2017/03/judge-oks-warrant-to-reveal-who-searched-a-fraud-victims-name-on-google/
Police in a small suburban town of 50,000 people just outside Minneapolis, Minnesota, have won a court order requiring Google to determine who has used its search engine to look up the name of a local financial fraud victim.
The court order demanding such a massive search is perhaps the most expansive one we've seen unconnected to the US national security apparatus and, if carried out, could set an Orwellian precedent in a bid by the Edina Police Department to solve a wire-fraud crime worth less than $30,000.
Investigators are focusing their probe on an online photo of someone with the same name of a local financial fraud victim. The image turned up on a fake passport used to trick a credit union to fraudulently transfer $28,500 out of an Edina man's account, police said. The bogus passport was faxed to the credit union using a spoofed phone number to mimic the victim's phone, according to the warrant application. (To protect the victim's privacy, Ars is not publishing his name that was listed throughout the warrant signed February 1 by Hennepin County Senior Judge Gary Larson.)
The warrant demands Google to help police determine who searched for variations of the victim's name between December 1 of last year through January 7, 2017. A Google search, the warrant application says, reveals the photo used on the bogus passport. The image was not rendered on Yahoo or Bing, according to the documents. The warrant commands Google to divulge "any/all user or subscriber information"—including e-mail addresses, payment information, MAC addresses, social security numbers, dates of birth, and IP addresses—of anybody who conducted a search for the victim's name.
The warrant was unearthed by Minneapolis journalist and public records activist Tony Webster. He took photographic images of the documents from a computer terminal at the county courthouse and converted them to the portable document format with the victim's name redacted. (Webster said in a telephone interview that language in the warrant that says "located in city or township of Edina, County of Hennepin, State of Minnesota" is standard, pro forma language that is often contained in the county's warrants. That language, he said, does not mean that the warrant is demanding that Google solely disclose who within the city's 15 square miles searched for the victim's name, as some have reported.)
The Edina Police Department declined to comment other than to tell Webster that the agency would be "reluctant to disclose active case information or specific strategies used during the investigation."
Meanwhile, the warrant notes that the Edina authorities originally sent Google an administrative subpoena "requesting subscriber information for anyone who had performed a Google search" for the victim's name. According to the documents, Google balked at complying with that administrative subpoena, which is similar to a search warrant but does not have a judge's signature.
"Though Google's rejection of the administrative subpoena is arguable, your affiant is applying for this warrant so that the investigation of this case does not stall," officer David Lindman wrote the judge in the warrant application.
Google declined to directly address the warrant, but suggested it was fighting it.
"We aren't able to comment on specific cases, but we will always push back when we receive excessively broad requests for data about our users," Google said in an e-mail to Ars.
After learning of the warrant, Andrew Crocker, a staff attorney with the Electronic Frontier Foundation, tweeted: "Holy shit. Case name should be In re Minnesota Unconstitutional General Warrant."
More information about the Infowarrior
mailing list