Skip to Content
Silicon Valley

Two former Twitter employees have been charged with spying for Saudi Arabia

November 7, 2019
Twitter logo
Twitter logo
Twitter logoAP

The news: The US Justice Department has charged two men who used to work at Twitter with accessing personal information on critics of the Saudi Arabian regime, which they collected and passed on to Saudi officials, the Washington Post reports.

Who were they? Ali Alzabarah was a site reliability engineer who joined Twitter in August 2013. Over time, he gained more responsibility until he was able to access personal data—including phone numbers and IP addresses—as part of his job. He is accused of collecting information on more than 6,000 Twitter users, including dissidents and political activists, over the course of a few months in 2015. The other man, Ahmad Abouammo, was a media partnerships manager. He is accused of taking information from three user accounts, at least one of which belonged to an outspoken critic of the Saudi royal family. Abouammo received at least $300,000 from the Saudi government in return for his services, according to the indictment.

A third individual: The court documents refer to a third person charged with spying: Saudi citizen Ahmed Almutairi. They allege he acted as an intermediary between Saudi officials and the Twitter employees. Both Alzabarah and Almutairi are Saudi citizens (believed to be in Saudi Arabia now), while Abouammo is a United States citizen. He was arrested in Seattle on Tuesday.

The political angle: This is the first time federal prosecutors have publicly accused Saudi Arabia of running agents inside the US. The court documents say that one of the men implicated is an associate of Saudi Crown Prince Mohammed bin Salman, who the CIA concluded probably ordered the assassination of Washington Post columnist (and outspoken critic of the regime) Jamal Khashoggi last year.

The insider threat: Given the vast amount of sensitive data tech companies hold about individuals and their everyday habits, it is obvious that their employees will be targets for espionage. This case is a reminder of how powerful these companies are, and how unaccountable: we know very little about their vetting and security procedures. It’s unlikely that this is an isolated case, but given Silicon Valley’s secretive culture, it’s hard to say for sure. Either way, the ease with which these three men operated is a reminder that hacking isn't the only way to access data illicitly: a well-placed insider with nefarious motives can wreak a lot of damage too.   

Sign up here for our daily newsletter The Download to get your dose of the latest must-read news from the world of emerging tech.

Keep Reading

Most Popular

images created by Google Imagen
images created by Google Imagen

The dark secret behind those cute AI-generated animal images

Google Brain has revealed its own image-making AI, called Imagen. But don't expect to see anything that isn't wholesome.

AGI is just chatter for now concept
AGI is just chatter for now concept

The hype around DeepMind’s new AI model misses what’s actually cool about it

Some worry that the chatter about these tools is doing the whole field a disservice.

Hoan Ton-That, CEO of Clearview AI
Hoan Ton-That, CEO of Clearview AI

The walls are closing in on Clearview AI

The controversial face recognition company was just fined $10 million for scraping UK faces from the web. That might not be the end of it.

spaceman on a horse generated by DALL-E
spaceman on a horse generated by DALL-E

This horse-riding astronaut is a milestone in AI’s journey to make sense of the world

OpenAI’s latest picture-making AI is amazing—but raises questions about what we mean by intelligence.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.