• About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
Sunday, April 12, 2026
mGrowTech
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
No Result
View All Result
mGrowTech
No Result
View All Result
Home Technology And Software

Here’s What a Google Subpoena Response Looks Like, Courtesy of the Epstein Files

Josh by Josh
February 25, 2026
in Technology And Software
0
Here’s What a Google Subpoena Response Looks Like, Courtesy of the Epstein Files


Last month, the Department of Justice released over 3 million documents related to convicted sex offender Jeffrey Epstein. While the dumps shed light on Epstein’s own social circle and activities, they also provide a rare window into the inner workings of a federal investigation, including how tech companies like Google respond to government requests for information.

WIRED found several grand jury subpoenas addressed to Google in the DOJ’s most recent release, along with files that appear to be Google data produced about specific users and letters on Google letterhead responding to specific subpoena requests.

READ ALSO

Intuit compressed months of tax code implementation into hours — and built a workflow any regulated-industry team can adapt

Rockstar Games has confirmed it was hit by third-party data breach

Google declined to comment on the specific documents included in the dumps, but spokesperson Katelin Jabbari said in a written statement that the company’s “processes for handling law enforcement requests are designed to protect users’ privacy while meeting our legal obligations. We review all legal demands for legal validity, and we push back against those that are overbroad, including objecting to some entirely.”

The documents show how much the government will sometimes attempt to obtain without a judge’s sign-off, how Google pushes back against requests that it says are beyond what’s required by law, and what types of information the company has turned over about its users.

Secret by Design

Subpoenas are normally shrouded in secrecy. A 2019 letter signed by the then US attorney for the Southern District of New York and addressed to Google’s legal department prohibited the company by law from revealing the letter’s existence to Epstein coconspirator Ghislaine Maxwell, the subject of the subpoena, for 180 days from the date of the order. The letter also instructed Google to alert prosecutors if it planned to tell Maxwell about the existence of the order after the 180 days were up, “in case the investigation remains ongoing and the order needs to be renewed.”

Even when not required by law, prosecutors requested Google’s silence. A 2018 letter instructing Google to preserve all emails (including those in draft and trash folders) and Google Drive content associated with four gmail accounts also requested that Google not disclose the existence of the letter to anyone, including the people who owned the accounts. The letter also requested that Google notify federal prosecutors if the company intended to make a disclosure, so the prosecutors could “obtain a non-disclosure order if necessary.”

It’s unclear whether Google informed the account holders of the redacted emails after the 180-day period described in the 2019 letter were up. Google’s privacy and terms says that when it receives a request from a government agency, it will email the subject of that request before it discloses that information, unless it is prohibited by law.

Back to Basics

Many of the files included in the Epstein dumps were titled “GOOGLE SUBSCRIBER INFORMATION,” and contained the account name, recovery email address and phone numbers, what Google services the account can access, when the account was created, the “Terms of Service IP” address, and a log of IP address activity.

Mario Trujillo, a senior staff attorney at the Electronic Frontier Foundation, says that subscriber information requires the lowest legal bar for the government to access under the Stored Communications Act, a 1980s law that lays out a lot of the rules for what kind of information the government can access from electronic service providers like Google.

While some types of information, like email contents, require a search warrant under the law, “on the opposite end of that is basic subscriber information,” Trujillo says. The act explicitly permits the government to obtain that information with just a subpoena, which does not necessarily require judicial approval.



Source_link

Related Posts

Intuit compressed months of tax code implementation into hours — and built a workflow any regulated-industry team can adapt
Technology And Software

Intuit compressed months of tax code implementation into hours — and built a workflow any regulated-industry team can adapt

April 12, 2026
Rockstar Games has confirmed it was hit by third-party data breach
Technology And Software

Rockstar Games has confirmed it was hit by third-party data breach

April 12, 2026
Zuvi ColorBox Review: A Hair Dye Printer That Struggles
Technology And Software

Zuvi ColorBox Review: A Hair Dye Printer That Struggles

April 12, 2026
Kalshi wins temporary pause in Arizona criminal case
Technology And Software

Kalshi wins temporary pause in Arizona criminal case

April 11, 2026
AI agent credentials live in the same box as untrusted code. Two new architectures show where the blast radius actually stops.
Technology And Software

AI agent credentials live in the same box as untrusted code. Two new architectures show where the blast radius actually stops.

April 11, 2026
The Artemis II astronauts are back after a 10-day journey around the moon
Technology And Software

The Artemis II astronauts are back after a 10-day journey around the moon

April 11, 2026
Next Post
Smiley Face Door Code in Poppy Playtime Chapter 5

Smiley Face Door Code in Poppy Playtime Chapter 5

POPULAR NEWS

Trump ends trade talks with Canada over a digital services tax

Trump ends trade talks with Canada over a digital services tax

June 28, 2025
Communication Effectiveness Skills For Business Leaders

Communication Effectiveness Skills For Business Leaders

June 10, 2025
15 Trending Songs on TikTok in 2025 (+ How to Use Them)

15 Trending Songs on TikTok in 2025 (+ How to Use Them)

June 18, 2025
App Development Cost in Singapore: Pricing Breakdown & Insights

App Development Cost in Singapore: Pricing Breakdown & Insights

June 22, 2025
Comparing the Top 7 Large Language Models LLMs/Systems for Coding in 2025

Comparing the Top 7 Large Language Models LLMs/Systems for Coding in 2025

November 4, 2025

EDITOR'S PICK

Website Maintenance Services

Guiding Your Customer’s Journey

July 12, 2025
Website Maintenance Services

The Design Stage Is About Business Design

July 11, 2025
How To Protect Your Keratin Treatment During A Sweaty Gym Session

How To Protect Your Keratin Treatment During A Sweaty Gym Session

February 12, 2026

Government introduces new rules for public university admission

April 24, 2025

About

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow us

Categories

  • Account Based Marketing
  • Ad Management
  • Al, Analytics and Automation
  • Brand Management
  • Channel Marketing
  • Digital Marketing
  • Direct Marketing
  • Event Management
  • Google Marketing
  • Marketing Attribution and Consulting
  • Marketing Automation
  • Mobile Marketing
  • PR Solutions
  • Social Media Management
  • Technology And Software
  • Uncategorized

Recent Posts

  • Use Breakdowns for Troubleshooting – Jon Loomer Digital
  • MiniMax Just Open Sourced MiniMax M2.7: A Self-Evolving Agent Model that Scores 56.22% on SWE-Pro and 57.0% on Terminal Bench 2
  • The AI code wars are heating up
  • Want to earn trust? The strategy is simple.
  • About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions