Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

DoJ Says Ex-Twitter Employees Acted as Agents for Saudi Arabia, Violated Twitter Users' Privacy

SEC0719-Privacy-Feat-slide1_900px
November 8, 2019

Ali Alzabarah, Ahmad Abouammo, and Ahmed Almutairi, aka Ahmed Aljbreen, were charged for their respective roles in accessing private information in the accounts of certain Twitter users and providing that information to officials of the Kingdom of Saudi Arabia.

All three defendants are charged with acting as illegal agents of a foreign government; and Abouammo also is charged with destroying, altering, or falsifying records in a federal investigation.

According to the DoJ, Alzabarah, 35, of Saudi Arabia, and Abouammo, 41, of Seattle, Washington, were Twitter employees. According to the complaint, between November of 2014 and May of 2015, Almutairi, 30, of Saudi Arabia, and foreign officials of the Kingdom of Saudi Arabia convinced Abouammo and Alzabarah to use their employee credentials to gain access without authorization to certain nonpublic information about the individuals behind certain Twitter accounts. "Specifically, representatives of the Kingdom of Saudi Arabia and the Saudi Royal Family sought the private information of Twitter users who had been critical of the regime. Such private user information included their email addresses, phone numbers, IP addresses and dates of birth. This information could have been used to identify and locate the Twitter users who published these posts," says the DoJ.

 The complaint alleges that Abouammo was compensated for his illicit conduct, including through the provision of a luxury watch and cash. Almutairi is alleged to have arranged meetings, acted as a go-between and facilitated communications between the Saudi government and the other defendants,

The complaint also contains allegations regarding the reaction of Alzabarah upon being confronted by Twitter about his violations of Twitter policy.  According to the complaint, when Alzabarah was confronted by Twitter’s management about accessing users’ information, he sought assistance from Almutairi and others to flee the United States. Alzabarah left the country the next day and submitted his resignation from Twitter by email while en route. Shortly after his return to Saudi Arabia, Alzabarah obtained employment through which he continued to work on behalf the Kingdom. With respect to Abouammo, the complaint alleges FBI agents confronted him in October 2018 about his activities on behalf of officials of the Kingdom of Saudi Arabia. In response, Abouammo allegedly lied to the agents and provided them with a falsified invoice in an effort to obstruct the investigation.

“Acting in the United States under the direction and control of Saudi officials, the defendants are alleged to have obtained private, identifying information about users of Twitter who were critical of the Saudi government,” said Assistant Attorney General for National Security John C. Demers. “Two of the defendants – Alzabarah and Abouammo – are former Twitter employees who violated their terms of employment to access this information in exchange for money and other benefits. Aside from being criminal, their conduct was contrary to the free speech principles on which this country was founded.”  

“These charges make clear that the FBI will diligently pursue those who show a blatant disregard for the laws and democratic principles that define us as a country," said Executive Assistant Director Jay Tabb of the FBI’s National Security Branch. “We will continue to use all of the tools at our disposal to carry out our mission. I would like to thank the men and women of the FBI's San Francisco and Seattle Field Offices as well as the Counterintelligence Division for their tireless commitment to bring these individuals to justice.”

“The FBI will not stand by and allow foreign governments to illegally exploit private user information from U.S. companies. These individuals are charged with targeting and obtaining private data from dissidents and known critics, under the direction and control of the government of Saudi Arabia,” said FBI Special Agent in Charge John F. Bennett. “Insider threats pose a critical threat to American businesses and our national security.”

Abouammo was arrested in Seattle, Washington, on Nov. 5, 2019, and made his initial federal court appearance in Seattle at 2:00 p.m.on Nov. 6, 2019.  Alzabarah and Almutairi are believed to be in Saudi Arabia.  Federal warrants have been issued for their arrest.  

According to the DoJ, if convicted, all three defendants face maximum statutory sentence of 10 years in prison and a $250,000 fine for acting as an agent of a foreign government without notification to the Attorney General. In addition, Abouammo faces an additional 20 years in prison and a $250,000 fine for destroying, altering, or falsifying records  Further, the court may order restitution, if appropriate, and additional periods of supervised release. 

The case is being prosecuted by the Special Prosecutions and National Security Unit of the United States Attorney’s Office for the Northern District of California and the Counterintelligence and Export Control Section of the National Security Division. The prosecution is the result of an investigation by the Federal Bureau of Investigation.

KEYWORDS: cyber security cybersecurity privacy concerns Twitter Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • twitter-freepik1170x658v5.jpg

    Twitter lacks cybersecurity & data privacy best practices, says ex-security chief

    See More
  • Mike Convertino

    Ex-Twitter CISO, Mike Convertino, Joins Arceo as CSO

    See More
  • socialmedia1-900px.jpg

    During Disasters, Active Twitter Users Likely to Spread Falsehoods

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • surveillance.jpg

    Surveillance, Privacy and Public Space

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing