If this is a MiTM attack from the owner or someone on the WiFi network then the browser will not give a warning to the user as suggested by some of the comments. Your browser has no knowledge that a site should be using Transport Layers Security (TLS/SSL) so how would it know to warn you. If the attacker is trying to inject their own certificate then yes you will get a warning but if you're having the TLS stripped out and being redirected to http:// then you would not. However, due to the implementation of HSTS I don't believe someone could maliciously redirect you away from a secure redirect to Google this way. It's also worth noting that if you manually navigate to https://google.com and don't just type google.com (where the browser would default to http://) then it's not possible for someone to MiTM the secure connection.
There is a program called SSLstrip that would allow you to carry out these forms of MiTM attack on a redirect to a https:// site which you can find here. There is a slightly more detailed explanation of how SSLstrip handles the MiTM attack.
google.com. For example a redirect to your countries local google version. Perhaps one of those redirects is acting stupidly in your case. – CodesInChaos Sep 28 '13 at 11:26https://into the URL-bar, as OP says he did. – Anders Dec 01 '16 at 12:03nosslsearch.google.comwhat a blunder. It looks like that domain is no longer active. – rook Dec 04 '16 at 16:14