New reporting suggests the U.S. Department of Homeland Security (DHS) has been quietly pressuring technology companies to reveal information about people who criticize the Trump administration or document immigration enforcement activity online. Civil liberties groups say the tactics raise serious concerns about free speech and government overreach.
At the center of the controversy is DHS’s use of administrative subpoenas — a type of data demand issued directly by federal agencies, without prior approval from a judge. Unlike court-approved subpoenas, these requests do not require investigators to demonstrate probable cause. That distinction has made them controversial, especially when used against individuals engaged in political expression.
In recent months, DHS has reportedly used these subpoenas to try to identify the operators of anonymous social media accounts that share updates about ICE raids or criticize federal immigration policies. One such case involved an Instagram account focused on immigrant rights advocacy in Montgomery County, Pennsylvania. DHS demanded that the platform hand over identifying details about the account owner, citing an unverified claim that ICE agents were being monitored.
The subpoena was ultimately withdrawn after the account holder, represented by the American Civil Liberties Union, challenged the demand. The ACLU argued that recording law enforcement activity, sharing that information publicly, and doing so anonymously are all constitutionally protected actions. According to the group, the withdrawal came without explanation.
Similar attempts appear to have followed a pattern. Reports indicate at least four other instances where DHS sought to unmask anonymous critics online, only to retreat after legal pushback. Advocacy organizations say this suggests a broader effort to intimidate dissent rather than investigate criminal conduct.
Another case involved a retired American who sent a critical email to a senior DHS attorney. Within hours, he was notified by his email provider that DHS had subpoenaed his account data. The request sought extensive metadata, including login times, IP addresses, linked services, and other identifying information. Weeks later, federal agents reportedly visited his home, despite acknowledging that the email itself violated no laws.
Technology companies publish transparency reports detailing government data requests, but most do not clearly separate administrative subpoenas from court-ordered ones, making it difficult to assess how often these tools are used. Some companies have said they resist overly broad or improper demands, though the extent of that resistance varies.
Not all platforms can comply even if they wanted to. End-to-end encrypted services, for example, often lack access to meaningful user data. Others, however, can still provide metadata that may be enough to identify anonymous speakers.
Civil liberties advocates warn that these practices could chill free expression, particularly as major U.S. tech firms grow closer to political power. The cases have renewed calls for stronger safeguards, greater transparency, and limits on the government’s ability to seek personal data without judicial oversight.
