- DHS has been using administrative subpoenas to seek information about critics of the Trump administration.
- Subpoenas target anonymous Instagram accounts documenting ICE raids and criticizing government policies.
- Administrative subpoenas do not require judicial oversight, allowing agencies to request user data directly from tech companies.
- Subpoenas can reveal login times, locations, devices, and email addresses but not email contents or location data.
- DHS sought the identity of @montocowatch, an account supporting immigrant rights, but withdrew the subpoena after ACLU intervention.
- Multiple cases exist where DHS used subpoenas to unmask critical Instagram accounts, later withdrawing them after legal challenges.
- Tech companies' transparency reports often do not distinguish between judicial and administrative subpoenas.
- A retiree critical of Trump was subpoenaed by DHS after emailing a Homeland Security attorney, leading to a home visit by federal agents.
- Google resisted the subpoena, highlighting concerns about overreach.
- DHS defends its subpoena authority under specific U.S. codes but does not explain withdrawals.
- End-to-end encrypted apps like Signal collect minimal user data, limiting compliance with subpoenas.
- European consumers and governments are reducing reliance on U.S. tech giants due to privacy concerns and political ties.