The Creepy Spy Program That Lets the Drug Enforcement Administration Look at Your Phone Records

The New York Times revealed Monday that the Drug Enforcement Administration has access to the entirety of telecom giant AT&T’s phone records.


The phone company, in return for payment by the government, has employees sit with government drug units and sift through company (not government) stored data reaching as far back as 1987.

According to a set of slides, which were categorized as “law enforcement sensitive” but not classified, the DEA’s “Hemisphere” program gives the agency access to a database that stores metadata on every one of the 4 billion daily phone calls that pass through AT&T’s network.

Unlike controversial NSA programs like PRISM, Hemisphere does not see the DEA itself hoarding communications data; AT&T stores the data. Nonetheless, with only an administrative subpoena (not a warrant) drug agents can home in on an individual’s communications data within an hour. As such Hemisphere is yet another example of how government agencies and corporations work in tandem to create and uphold the surveillance dragnets from which almost no communications within or going out of the U.S. escape.

A DoJ spokesperson told the times that the Hemisphere program enables swifter and more reliable tracking of drug dealers. The program “simply streamlines the process of serving the subpoena to the phone company so law enforcement can quickly keep up with drug dealers when they switch phone numbers to try to avoid detection,” he said. Civil libertarians, however, reject that granting a government agency access to the phone company’s entire database is therefore legally justified.

“I’d speculate that one reason for the secrecy of the program is that it would be very hard to justify it to the public or the courts,” said the ACLU’s Jamil Jaffer.

As noted here last month, the DoJ announced that it would investigate a special, covert DEA unit that uses dragnet spying techniques, including wiretapping vast phone databases and using information from controversial NSA programs, to launch criminal — not national security — investigations. The unit presents as a clear example of mission creep, as national security spycraft is taken up for criminal and local law enforcement purposes.

Enjoy this piece?

… then let us make a small request. AlterNet’s journalists work tirelessly to counter the traditional corporate media narrative. We’re here seven days a week, 365 days a year. And we’re proud to say that we’ve been bringing you the real, unfiltered news for 20 years—longer than any other progressive news site on the Internet.

It’s through the generosity of our supporters that we’re able to share with you all the underreported news you need to know. Independent journalism is increasingly imperiled; ads alone can’t pay our bills. AlterNet counts on readers like you to support our coverage. Did you enjoy content from David Cay Johnston, Common Dreams, Raw Story and Robert Reich? Opinion from Salon and Jim Hightower? Analysis by The Conversation? Then join the hundreds of readers who have supported AlterNet this year.

Every reader contribution, whatever the amount, makes a tremendous difference. Help ensure AlterNet remains independent long into the future. Support progressive journalism with a one-time contribution to AlterNet, or click here to become a subscriber. Thank you. Click here to donate by check.

Close
alternet logo

Tough Times

Demand honest news. Help support AlterNet and our mission to keep you informed during this crisis.