Privacy Act; Office of Intelligence and Analysis Enterprise Records System, 28128-28135 [E8-10888]
Download as PDF
28128
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Notices
non-disclosure agreements signed.) The
Administrator of the Master Roster
maintains the information so as to track
clearance processing and investigation
information (date of investigation) and
to have the most current contact
information for the participants from
each sector.
Dated: May 9, 2008.
Matt Coose,
Acting Chief Information Officer, National
Protection and Programs Directorate,
Department of Homeland Security.
[FR Doc. E8–10892 Filed 5–14–08; 8:45 am]
BILLING CODE 4410–10–P
DEPARTMENT OF HOMELAND
SECURITY
Office of the Secretary
[Docket No. DHS–2007–0017]
Privacy Act; Office of Intelligence and
Analysis Enterprise Records System
Privacy Office, DHS.
Notice of Privacy Act system of
records notice.
AGENCY:
mstockstill on PROD1PC66 with NOTICES
ACTION:
SUMMARY: In accordance with the
Privacy Act of 1974, the Department of
Homeland Security gives notice that it
proposes to add a new system of records
to its inventory of record systems,
namely the Office of Intelligence &
Analysis Enterprise Records System
(ERS). Some of the records that were
previously maintained in the Homeland
Security Operations Center Database
(DHS/IAIP–001), the system of records
notice for which was last published in
full text on April 18, 2005 (70 FR
20156), will now be part of the ERS.
This notice does not rescind, revoke, or
supersede the HSOC system of records
notice insofar as other components of
DHS maintain records within that
system of records, under their respective
authorities.
DATES: The new system of records will
be effective June 16, 2008.
ADDRESSES: You may submit comments,
identified by docket number, by one of
the following methods:
• Federal eRulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments
via docket number DHS–2007–0017.
• Fax: 1–866–466–5370.
• Mail: Comments by mail may also
be submitted to Hugo Teufel III, Chief
Privacy Officer, Department of
Homeland Security, Washington, DC
20528.
• Instructions: All submissions
received must include the agency name
and docket number for this rulemaking.
VerDate Aug<31>2005
16:18 May 14, 2008
Jkt 214001
All comments received will be posted
without change to https://
www.regulations.gov, including any
personal information provided.
• Docket: For access to the docket to
read background documents or
comments received go to https://
www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: For
general questions, please contact the
Information Sharing and Knowledge
Management Division, Office of
Intelligence and Analysis, Department
of Homeland Security, Washington, DC
20528. For privacy issues, please
contact: Hugo Teufel III, Chief Privacy
Officer, Department of Homeland
Security, Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
I. Background
The mission of DHS under the
Homeland Security Act of 2002 is to
prevent terrorist attacks; reduce the
vulnerability of the United States to
terrorism; minimize the damage and
assist in the recovery from terrorist
attacks that may occur within the
United States; carry out the functions of
the legacy agencies and entities
transferred to the Department, including
by acting as a focal point regarding
natural and manmade crises and
emergency planning; ensure that the
functions of the agencies and
subdivisions within DHS not directly
related to securing the homeland are not
diminished or neglected; ensure that the
civil rights and civil liberties of persons
within, and the overall economic
security of, the United States are not
diminished by efforts, activities, and
programs aimed at securing the
homeland; and monitor the connections
between illegal drug trafficking and
terrorism, coordinate efforts to sever
such connections, and contribute to the
effort to interdict illegal drug trafficking.
Recognizing the need for intelligence
support in all of the critical mission
areas identified in the President’s
National Strategy for Homeland Security
and in direct support both of the DHS
mission and all elements of the
Department responsible for executing
the Secretary’s authorities in fulfilling
it, the Under Secretary for Intelligence
& Analysis, as head of the DHS Office
of Intelligence and Analysis (I&A), is
responsible for carrying out the
responsibilities of the Secretary relating
to intelligence and information analysis
across the Department and, as Chief
Intelligence Officer of the Department,
oversees the functional integration of
the Department’s intelligence activities,
including those occurring outside of
I&A. Through successive and specific
PO 00000
Frm 00031
Fmt 4703
Sfmt 4703
delegations issued in 2006, the Under
Secretary for I&A was assigned the
authority and responsibility: (1) To
perform the functions specified in Title
II of the Homeland Security Act that
relate to the Office of Information
Analysis (since renamed I&A); (2) to
exercise oversight and responsibility for
the functions and duties necessary to
lead and manage the integration of
Departmental intelligence activities; and
(3) to exercise the authority under
section 202 of the Homeland Security
Act to ensure the timely and efficient
access to all information necessary to
discharge the responsibilities under
section 201 of the Homeland Security
Act. Taken together, the Under
Secretary for I&A exercises, through
I&A, lead or, in some cases, shared
leadership responsibility under the
Homeland Security Act for the
following:
A. To access, receive, and analyze law
enforcement, intelligence, and other
information from federal, state, and
local government agencies (including
law enforcement agencies), and private
sector entities, and to integrate such
information, in support of the mission
responsibilities of the Department and
the functions of the National
Counterterrorism Center established
under section 119 of the National
Security Act of 1947 (50 U.S.C. 404o),
in order to: (A) Identify and assess the
nature and scope of terrorist threats to
the homeland; (B) detect and identify
threats of terrorism against the United
States; and (C) understand such threats
in light of actual and potential
vulnerabilities;
B. To request additional information
from other agencies of the federal
government, state and local government
agencies, and the private sector relating
to threats of terrorism in the United
States, or relating to other areas of
responsibility assigned by the Secretary;
C. To establish Department-wide
procedures for the review and analysis
of information provided by State, local,
and tribal governments and the private
sector, integrate such information into
the information gathered by the
Department and other departments and
agencies of the Federal Government, as
appropriate, and make available such
information, as appropriate, within the
Department and to other departments
and agencies of the Federal
Government;
D. To ensure the timely and efficient
access by the Secretary of Homeland
Security and the Department to all
information from other agencies of the
federal government, including reports,
assessments, analyses, and unevaluated
intelligence related to threats of
E:\FR\FM\15MYN1.SGM
15MYN1
mstockstill on PROD1PC66 with NOTICES
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Notices
terrorism against the United States and
other areas under the responsibility of
the Secretary, and to all information
concerning infrastructure or other
vulnerabilities of the United States to
terrorism, necessary for assessing,
analyzing, and integrating information
for terrorism, homeland security, and
related law enforcement and
intelligence purposes under the
Homeland Security Act;
E. To disseminate information
analyzed by the Department within the
Department, to other federal, state, and
local government agencies, and to
private sector entities with
responsibilities relating to homeland
security in order to assist in the
deterrence, prevention, preemption of,
or response to (including mitigation of)
terrorist attacks against the United
States;
F. To provide intelligence and
information analysis and support to
other elements of the Department;
G. To coordinate and enhance
integration among the intelligence
components of the Department,
including through strategic oversight of
the intelligence activities of such
components;
H. To establish the intelligence
collection, processing, analysis, and
dissemination priorities, policies,
processes, standards, guidelines, and
procedures for the intelligence
components of the Department,
consistent with any directions from the
President and, as applicable, the
Director of National Intelligence;
I. To establish a structure and process
to support the missions and goals of the
intelligence components of the
Department;
J. To integrate the information and
standardize the format of the products
of the intelligence components of the
Department containing homeland
security information, terrorism
information, weapons of mass
destruction information, or national
intelligence (as defined in section 3(5)
of the National Security Act of 1947 (50
U.S.C. 401a(5)));
K. To ensure that, whenever possible,
the Department produces and
disseminates unclassified reports and
analytic products based on open-source
information, and produces and
disseminates such reports and analytic
products contemporaneously with
reports or analytic products concerning
the same or similar information that the
Department produced and disseminated
in a classified format;
L. To ensure that intelligence
information is shared, retained, and
disseminated consistent with the
authority of the Director of National
VerDate Aug<31>2005
16:18 May 14, 2008
Jkt 214001
Intelligence to protect intelligence
sources and methods, and similar
authorities of the Attorney General
concerning sensitive law enforcement
information;
M. To consult with the Director of
National Intelligence and other
appropriate intelligence, law
enforcement, or other elements of the
federal government to establish
collection priorities and strategies for
information, including law
enforcement-related information, related
to threats of terrorism against the United
States through such means as the
representation of the Department in
discussions regarding requirements and
priorities in the collection of such
information;
N. To coordinate with elements of the
intelligence community and with
federal, state, and local law enforcement
agencies and the private sector, as
appropriate;
O. To assist in carrying out
comprehensive assessments of the
vulnerabilities of the key resources and
critical infrastructure of the United
States, including the performance of risk
assessments to determine the risks
posed by particular types of terrorist
attacks within the United States
(including an assessment of the
probability of success of such attacks
and the feasibility and potential efficacy
of various countermeasures to such
attacks);
P. To integrate relevant information,
analyses, and vulnerability assessments
in order to identify priorities for
protective and support measures by the
Department, other federal, state, and
local government agencies and
authorities, the private sector, and other
entities;
Q. In coordination with other agencies
of the federal government, to provide
specific warning information and advice
about appropriate protective measures
and counter-measures, to state and local
government agencies and authorities,
the private sector, other entities, and the
public;
R. To consult with state and local
governments and private sector entities
to ensure appropriate exchanges of
information, including law
enforcement-related information, related
to threats of terrorism against the United
States (e.g., through information sharing
networks set up under state and local
fusion centers, the National
Infrastructure Protection Program
framework, or through the release of
information to the general public
through the Homeland Security Alert
System);
S. To review, analyze, and make
recommendations for improvements to
PO 00000
Frm 00032
Fmt 4703
Sfmt 4703
28129
the policies and procedures governing
the sharing of information within the
scope of the information sharing
environment established under section
1016 of the Intelligence Reform and
Terrorism Prevention Act of 2004 (6
U.S.C. 485), including homeland
security information, terrorism
information, and weapons of mass
destruction information, and any
policies, guidelines, procedures,
instructions, or standards established
under that section;
T. To ensure that any material
received through authorized DHS
intelligence activities is protected from
unauthorized disclosure and handled
and used only for the performance of
official duties;
U. To establish and utilize a secure
communications and information
technology infrastructure, including
data-mining and other advanced
analytic tools, to access, receive, and
analyze data and information and to
disseminate information acquired and
analyzed by the Department, as
appropriate;
V. To establish, consistent with the
policies and procedures developed
under section 1016 of the Intelligence
Reform and Terrorism Prevention Act of
2004 (6 U.S.C. 485), and consistent with
the enterprise architecture of the
Department, a comprehensive
information technology network
architecture for the Office of Intelligence
and Analysis that connects the various
databases and related information
technology assets of the Office of
Intelligence and Analysis and the
intelligence components of the
Department in order to promote internal
information sharing among the
intelligence and other personnel of the
Department;
W. To ensure that any information
databases and analytical tools
developed or utilized by the Department
(A) are compatible with one another and
with relevant information databases of
other agencies of the federal
government, and (B) treat information in
such databases in a manner that
complies with applicable federal law on
privacy;
X. To oversee the Department’s
Information Sharing and Knowledge
Management Officer, and those
designated for each of the intelligence
components of the Department,
regarding coordinating the different
systems used in the Department to
gather and disseminate homeland
security information or national
intelligence (as defined in section 3(5)
of the National Security Act of 1947 (50
U.S.C. 401a(5)));
E:\FR\FM\15MYN1.SGM
15MYN1
mstockstill on PROD1PC66 with NOTICES
28130
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Notices
Y. To coordinate training and other
support to the elements and personnel
of the Department, other agencies of the
federal government, and state and local
governments that provide information to
the Department or are consumers of
information provided by the
Department, in order to facilitate the
identification and sharing of
information revealed in their ordinary
duties and the optimal utilization of
information received from the
Department;
Z. To provide to employees of the
Department opportunities for training
and education to develop an
understanding of the definitions of
homeland security information and
national intelligence (as defined in
section 3(5) of the National Security Act
of 1947 (50 U.S.C. 401a(5))), and how
information available to such employees
as part of their duties might qualify as
homeland security information or
national intelligence, and be relevant to
the Office of Intelligence and Analysis
and the intelligence components of the
Department;
AA. To evaluate, on an ongoing basis,
how employees of the Office of
Intelligence and Analysis and the
intelligence components of the
Department are utilizing homeland
security information or national
intelligence, sharing information within
the Department, and participating in the
information sharing environment
established under section 1016 of the
Intelligence Reform and Terrorism
Prevention Act of 2004 (6 U.S.C. 485);
and
BB. To perform other duties relating
to such responsibilities as the Secretary
may provide.
In addition to assigning I&A the
statutory responsibilities noted above,
relevant provisions of the Homeland
Security Act of 2002, which amended
the National Security Act of 1947 in
part, and subsequent amendments to
Executive Order 12333, effectively
designated I&A as an element of the
National Intelligence Community (IC)
and the position now occupied by the
Under Secretary for I&A as a ‘‘Senior
Official of the Intelligence Community’’
(SOIC). That, together with the
Secretary’s subsequent designation of
the head of I&A as Chief Intelligence
Officer of the Department—a dualdesignation recently codified in statute
through recent amendments to Title II of
the Homeland Security Act of 2002—the
Under Secretary for I&A now leads the
integrated DHS intelligence enterprise
in providing valuable, actionable
intelligence and intelligence-related
information for and among the National
leadership, all components of DHS, the
VerDate Aug<31>2005
16:18 May 14, 2008
Jkt 214001
IC, and our other Federal, State, local,
territorial, tribal, foreign and private
sector partners.
In his December 16, 2005,
memorandum concerning information
sharing activities at DHS, the Secretary
also assigned to what is now the
position of Under Secretary for I&A the
responsibility to ‘‘develop[ ] and
execut[e] the information sharing
enterprise within the Department to
ensure that the information and analysis
provided by the Department is
appropriate for providing security for
the homeland * * * [and to] ensure that
the sharing of intelligence and analysis
between DHS and its Federal, State,
local, tribal, and private sector partners
is sufficient to meet their homeland
security needs.’’
On February 1, 2007, the Secretary
formally issued the DHS Policy for
Internal Information Exchange and
Sharing, and in doing so, recognized
that all elements of DHS are ‘‘one
agency’’ for purposes of the Privacy Act
and information sharing activities
generally. Moreover, the Secretary
specifically reaffirmed that, within the
context of this ‘‘one agency’’ approach
to information sharing, the acting
incumbent to the position of Under
Secretary for I&A is ‘‘the official
responsible for assessing and analyzing
all terrorism, homeland security, and
related law enforcement and
intelligence information received by the
Department.’’
Thus, in accordance with the Privacy
Act of 1974, and to facilitate the
department-wide activities of I&A as
described herein, the DHS gives notice
that it proposes to add a new system of
records to its inventory of record
systems, namely the DHS I&A ERS to
maintain those records associated with
I&A operations, some of which existed
previously in the Homeland Security
Operations Center Database (HSOC)
system of records. This notice does not
rescind, revoke, or supersede the HSOC
system of record or notice insofar as
other components of DHS maintain
records within this system of records,
under their respective authorities.
The ERS will hold all records and
information utilized by I&A to provide
intelligence and analysis support to
DHS, and from which I&A can cull,
analyze, and fuse intelligence and
related information properly received
from other DHS components, and
United States Government (USG)
departments and agencies (including
law enforcement agencies), elements of
the IC, and our foreign, State, local,
territorial, tribal, and private sector
partners. A centrally managed records
system, will allow I&A to access and
PO 00000
Frm 00033
Fmt 4703
Sfmt 4703
communicate relevant information
quickly and effectively to DHS
leadership, and, as appropriate, the
other entities listed above. Indeed, as
defined in this notice, ERS which is a
multi-domain (classified and sensitiveunclassified) national security system
will enable I&A personnel to: (1)
Manage intelligence requirements and
leverage intelligence capabilities; (2)
provide timely, actionable, and relevant
intelligence information; (3) produce
action-oriented indications and
warnings, evaluations, and assessments
of evolving terrorist capabilities and
intent; (4) identify and disrupt terrorist
activities against, and other threats to,
our homeland and within our borders;
(5) develop and employ techniques for
alternative analysis; (6) facilitate the
production of accurate, timely, and
thorough finished intelligence products
to the end-user; and (7) maintain an
effective information sharing process,
operations, and systems environment
within and without DHS.
Given the nature of I&A’s mission to
ensure appropriate access to analytical
information and source records while
promoting a common and unified
standard for data integrity, safeguarding,
data exchange, and administrative
oversight of the information maintained,
by I&A, I&A has developed ERS as the
single system of records to support all
I&A operations.
The information in the ERS system of
records includes intelligence
information and other properly acquired
information received from agencies and
components of the federal government,
foreign governments, organizations or
entities, international organizations,
state and local government agencies
(including law enforcement agencies),
and private sector entities, as well as
information provided by individuals,
regardless of the medium used to submit
the information or the agency to which
it was submitted. This system also
contains: information regarding persons
on watch lists with known or suspected
links to terrorism; the results of
intelligence analysis and reporting;
ongoing law enforcement investigative
information, information systems
security analysis and reporting; active
immigration, customs, border and
transportation, security related records;
historical law enforcement, operational,
immigration, customs, border and
transportation security, and other
administrative records; relevant and
appropriately acquired financial
information; and public-source data
such as that contained in media reports
and commercially available databases,
as appropriate. Data about the providers
of information, including the means of
E:\FR\FM\15MYN1.SGM
15MYN1
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Notices
mstockstill on PROD1PC66 with NOTICES
transmission of the data, is also
retained.
I&A will use the information in the
ERS system of records, consistent with
its statutory responsibilities and
functions listed above in sub-paragraphs
A-BB of this section.
II. Legal Requirements
The Privacy Act embodies fair
information principles in a statutory
framework governing the means by
which the USG collects, maintains, uses
and disseminates personally identifiable
information.
The Privacy Act applies to
information that is maintained in a
system of records. A system of records
is defined as a group of any records
under the control of an agency from
which information is retrieved by the
name of the individual or by some
identifying number, symbol, or other
identifier particular to the individual.
Individuals may request their records
that are maintained in a system of
records in the possession or under the
control of DHS by complying with DHS
Privacy Act regulations, 6 CFR part 5.
The Privacy Act requires that each
agency publish in the Federal Register
a description denoting the type and
character of each system of records to
provide transparency to and notify
individuals about how the USG is using
personally identifiable information, to
assist individuals to more easily find
files within the agency, and to inform
the public if any applicable Privacy Act
exemptions will be claimed for the
system, which would affect access to
certain information contained in the
system.
DHS proposes to exempt the ERS
system of records from certain portions
of the Privacy Act to protect classified
or otherwise sensitive information that
is contained in the system and to protect
the integrity of ongoing
counterterrorism, intelligence, law
enforcement and other homeland
security activities. These exemptions are
necessary because ERS contains
information concerning certain
individuals, including but not limited to
known or suspected terrorists, and
activities that could impact the security
of people within the United States.
These exemptions are necessary,
moreover, because some of the
information contained in the system
may be derived from sensitive
intelligence, law enforcement, or other
operational sources and/or acquired
using sensitive intelligence or law
enforcement methods.
Specifically, DHS is claiming
exemptions from those provisions of the
Privacy Act contained at 5 U.S.C.
VerDate Aug<31>2005
16:18 May 14, 2008
Jkt 214001
552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and
(I), and (f) pursuant to 5 U.S.C.
552a(k)(1), (2), (3) and (5).
Elsewhere in today’s Federal Register
is the Notice of Proposed Rulemaking
for these exemptions.
Moreover, and notwithstanding those
provisions of the Privacy Act from
which DHS is seeking exemption today,
I&A, as a member of the National
Intelligence Community, also conducts
its mission in conformance with the
requirements of Executive Order 12333,
as amended, ‘‘United States Intelligence
Activities,’’ dated December 4, 1981.
Section 2.3 of Executive Order 12333
requires that each agency head within
the IC establish procedures to govern
the collection, retention, and
dissemination of information
concerning U.S. Persons in a manner
which protects the privacy and
constitutional rights of U.S. Persons.
Specifically within I&A, intelligence
personnel may acquire information
which identifies a particular U.S.
Person, retain it within or disseminate
it from ERS, as appropriate, only when
it is determined that the personally
identifying information is necessary for
the conduct of I&A’s functions and
otherwise falls into one of a limited
number of authorized categories.
The routine uses covered by this
system of records notice include the
sharing of covered information by I&A
with its homeland security partners,
including, where and when appropriate,
Federal, State, local, tribal, territorial,
foreign, or multinational governments
and agencies, and certain private sector
individuals and organizations, for
purposes of countering, deterring,
preventing, preparing for, responding to,
or recovering from natural or manmade
threats, including acts of terrorism; for
assisting in or facilitating the
coordination of homeland security
threat awareness, assessment, analysis,
deterrence, prevention, preemption, and
response; for assisting in authorized
investigations, prosecutions or
enforcement of the law, when acquired
information indicates a violation or
potential violation of law; where
disclosure is in furtherance of I&A’s
information sharing responsibilities
under statute or policy, including
disclosure in support of those entities
lawfully engaged in the collection of
intelligence, counterterrorism,
homeland security, and related law
enforcement information; for making
notifications and issuing warnings of
serious threats to the homeland or to
those specific individuals whose person
or property may become the targets of a
particular threat; and, as otherwise
necessary, to properly manage and
PO 00000
Frm 00034
Fmt 4703
Sfmt 4703
28131
oversee the administration of this
system of records and other
organizational activities of I&A,
including administrative
responsibilities related to interagency
support, litigation support,
congressional affairs and oversight,
records management, intelligence and
information oversight, human capital,
and internal security.
In accordance with 5 U.S.C. 552a(r),
DHS has provided a report of this new
system of records to the Office of
Management and Budget (OMB) and to
the Congress.
DHS/IA–001
SYSTEM NAME:
Office of Intelligence & Analysis (I&A)
Enterprise Records System.
SECURITY CLASSIFICATION:
The classification of records in this
system can range from UNCLASSIFIED
to TOP SECRET.
SYSTEM LOCATION:
Records are maintained by the Office
of Intelligence & Analysis (I&A),
Department of Homeland Security,
Washington, DC 20528, and at remote
locations where I&A maintains secure
facilities and/or conducts its mission.
CATEGORY OF INDIVIDUALS COVERED BY THE
SYSTEM:
A. Individuals who are known,
reasonably believed to be, or are
suspected of being, involved in or
linked to:
1. The existence, organization,
capabilities, plans, communications,
intentions, and vulnerabilities of, means
of finance or material support for, and
activities against or threats to the United
States or United States persons and
interests by, domestic, foreign or
international terrorist groups and/or
individuals involved in terrorism;
2. Groups or individuals believed to
be assisting or associated with domestic,
foreign, or international terrorist groups
and/or individuals involved in
terrorism;
3. Activities constituting a threat to
homeland security, and/or activities that
are preparatory to, or facilitate or
support such activities, including:
a. Activities related to the violation or
suspected violation of immigration or
customs laws and regulations of the
United States,
b. Activities, which could reasonably
be expected to assist in the development
or use of a weapon of mass effect;
c. Activities to identify, create,
exploit, or undermine the
vulnerabilities of the ‘‘key resources’’
(as defined in section 2(9) of the
E:\FR\FM\15MYN1.SGM
15MYN1
mstockstill on PROD1PC66 with NOTICES
28132
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Notices
Homeland Security Act of 2002) and
‘‘critical infrastructure’’ (as defined in
42 U.S.C. 5195c(c)) of the United States;
d. Activities to identify, create,
exploit, or undermine the
vulnerabilities of the cyber and national
telecommunications infrastructure,
including activities which may impact
the availability of a viable national
security and emergency preparedness
communications infrastructure.
e. Activities detrimental to the
security of transportation and
transportation systems;
f. Activities which violate or are
suspected of violating the laws relating
to counterfeiting of obligations and
securities of the United States and other
financial crimes, including access
device fraud, financial institution fraud,
identity theft, computer fraud; and
computer-based attacks on our nation’s
financial, banking, and
telecommunications infrastructure;
g. Activities, not wholly conducted
within the United States, which violate
or are suspected of violating the laws
which prohibit the production, transfer,
or sale of narcotics or substances
controlled in accordance with Title 21
of the United States Code, or those
associated activities otherwise
prohibited by Titles 21 and 46 of the
United States Code;
h. Activities which impact or concern
the security, safety, and integrity of our
international borders, including any
illegal activities that cross our borders
such as violations of the immigration or
customs laws of the United States;
i. Activities which impact, concern, or
otherwise threaten the safety and
security of the President and Vice
President, their families, heads of state,
and other designated individuals; the
White House, Vice President’s
residence, foreign missions, and other
designated buildings within the United
States;
j. Activities which impact, concern, or
otherwise threaten maritime safety and
security, maritime mobility and
navigation, or the integrity of the
maritime environment;
k. Activities which impact, concern,
or otherwise threaten the national
operational capability of the Department
to respond to natural and man-made
major disasters and emergencies,
including acts of terrorism, in support of
impacted communities; to coordinate all
Federal emergency management
response operations, response planning
and logistics programs; and to integrate
Federal, State, tribal and local response
programs to ensure the efficient and
effective delivery of immediate
emergency assistance to individuals and
communities impacted by major
VerDate Aug<31>2005
16:18 May 14, 2008
Jkt 214001
disasters, emergencies or acts of
terrorism.
l. Activities involving the detection of
and response to unauthorized attempts
to import, possess, store, develop, or
transport nuclear or radiological
material for use against the United
States
4. The capabilities, intentions, or
activities of foreign governments or
elements thereof, foreign organizations,
or foreign persons, where the
individuals may be officers or
employees of, or otherwise acting for or
on behalf of, a foreign power or
organization that may be owned or
controlled, directly or indirectly, by a
foreign power;
5. Intelligence activities, or other
individuals known or suspected of
engaging in intelligence activities, on
behalf of a foreign power or terrorist
group;
6. Activities or circumstances where
the health or safety of that individual
may be threatened, including
information concerning these
individuals that may be necessary for
identifying and implementing protective
security measures or other emergency
preparedness activities;
B. Individuals who voluntarily
request assistance or information,
through any means, from I&A, or
individuals who voluntarily provide
information concerning any of the
activities above, which may threaten or
otherwise affect homeland security.
C. Individuals who are or have been
associated with DHS or I&A activities or
with the administration of the
Department, including information
about individuals that is otherwise
required to be maintained by law or that
is necessary for the provision of
intelligence support to the Department.
CATEGORIES OF RECORDS IN THE SYSTEM:
I&A utilizes a single records system
for maintaining I&A’s operational and
administrative records, including:
A. Classified and unclassified
intelligence (includes national
intelligence, foreign intelligence, and
counterintelligence), counterterrorism,
homeland security, and related law
enforcement information, including
source records and the reporting and
results of any analysis of this
information, obtained from all agencies,
components and organizations of the
Federal government, including the IC;
foreign governments, organizations or
entities, and international organizations;
State, local, tribal and territorial
government agencies (including law
enforcement agencies); and private
sector entities;
PO 00000
Frm 00035
Fmt 4703
Sfmt 4703
B. Information provided by record
subjects and individual members of the
public;
C. Information obtained from the
Terrorist Screening Center, the National
Counterterrorism Center, or from other
organizations about individuals known
or reasonably suspected of being
engaged in conduct constituting,
preparing for, aiding, or relating to
terrorism;
D. Active and historical law
enforcement investigative information;
E. Information related to lawful DHS
Security investigations, including
authorized physical, personnel, and
communications security investigations,
and information systems security
analysis and reporting;
F. Operational and administrative
records, including correspondence
records;
G. Lawfully acquired financial
information, when relevant to an
authorized intelligence,
counterterrorism, homeland security, or
related law enforcement activity;
H. Public source data such as that
contained in media, including
periodicals, newspapers, broadcast
transcripts, and other public reports and
commercial databases; and
I. Data about the providers of any
information otherwise contained within
this system, including the means of
transmission of the data.
Examples of information related to the
‘‘Categories of Individuals’’ listed above
may include:
Full name, date of birth, gender,
country of citizenship, country of birth,
alien number, social security number,
driver’s license numbers, passport
numbers, fingerprint identification
number, or other unique identifying
numbers, current and past home and
work addresses, phone numbers,
terrorist associations, biometric
information including fingerprints and
photographs, physical description,
results from intelligence analysis related
to terrorism, financial information,
family members or associates, flight
information, border crossing
information, immigration information,
or other personally identifiable
information that is relevant and
necessary.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301; Title II and section 892
of the Homeland Security Act of 2002,
Pub. L. 107–296, 116 Stat. 2145 (Nov.
25, 2002), as amended (6 U.S.C. 121, et
seq.); 44 U.S.C. 3101; E.O. 9397; E.O.
12333; E.O. 12958; E.O. 13356; and E.O.
13388.
E:\FR\FM\15MYN1.SGM
15MYN1
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Notices
mstockstill on PROD1PC66 with NOTICES
PURPOSE(S):
ERS replaces the applicable portions
of the DHS, Homeland Security
Operations Center Database (DHS/IAIP–
001) system of records notice (SORN),
last published in full text on April 18,
2005 [70 F.R. 20156]. The DHS/IAIP–
001 SORN previously covered the
functional and organizational aspects of
I&A within DHS prior to realignment by
the Secretary and Congress,
respectively, in 2005 and 2006.
The mission-specific purposes of ERS
are as follows:
A. To manage, access, analyze,
integrate, and store intelligence
(including national intelligence, foreign
intelligence, and counterintelligence),
counterterrorism, homeland security,
related law enforcement, and other
information to carry out the
responsibilities of the Secretary of
Homeland Security and the Under
Secretary for I&A, as the official
responsible for assessing and analyzing
all terrorism, homeland security, and
related law enforcement and
intelligence information received by the
Department, under Title II of the
Homeland Security Act (6 U.S.C. 121, et
seq.), in support of the overall DHS
mission.
B. To fulfill the need for coordinated
intelligence support in all of the critical
mission areas specifically identified in
the President’s National Strategy for
Homeland Security or other related
activities as defined by separate
Executive Order, Homeland and/or
National Security Presidential Directive,
or other issuance concerning the
internal management and policy of
Executive Branch activities.
C. To enable the provision of
intelligence and analysis support to all
DHS activities, components, and
organizational elements, and to
maintain a record system from which
I&A can cull, analyze, and fuse
intelligence and related information
properly received from other DHS
components, other United States
Government (USG) departments and
agencies (including law enforcement
agencies), elements of the National
Intelligence Community (IC), as well as
our foreign, State, local, territorial,
tribal, and private sector partners.
D. To permit the Under Secretary for
I&A, as Chief Intelligence Officer of the
Department, to foster the development
and execution of an information sharing
environment within DHS; to integrate
the intelligence and information sharing
functions and activities of the DHS
intelligence enterprise to provide the
most valuable, actionable intelligence
and intelligence-related information for
the Nation’s leadership, all components
VerDate Aug<31>2005
16:18 May 14, 2008
Jkt 214001
of DHS, the IC, and our other partners;
and to ensure both that the information
and analysis provided by the
Department is appropriate for providing
security for the homeland and that the
sharing of intelligence and analysis
between DHS and its Federal, State,
local, territorial, tribal, foreign, and
private sector partners is sufficient to
meet their respective homeland security
needs.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM:
In addition to those disclosures
generally permitted under 5 U.S.C.
552a(b) of the Privacy Act, all or a
portion of the records or information
contained in this system may be
disclosed outside DHS as a routine use
pursuant to 5 U.S.C. 552a(b)(3) as
follows:
A. To any Federal, State, local, tribal,
territorial, foreign, or multinational
government or agency, or appropriate
private sector individuals and
organizations, with responsibilities
relating to homeland security, including
responsibilities to counter, deter,
prevent, prepare for, respond to, or
recover from a natural or manmade
threat, including an act of terrorism, or
to assist in or facilitate the coordination
of homeland security threat awareness,
assessment, analysis, deterrence,
prevention, preemption, and response;
B. To a Federal, State, local, tribal,
territorial, foreign, or multinational
government or agency with the
responsibility and authority for
investigating, prosecuting and/or
enforcing a law (civil or criminal),
regulation, rule, order or contract, where
the record, on its face or in conjunction
with other information, indicates a
violation or potential violation of any
such law, regulation, rule, order, or
contract enforced by that government or
agency;
C. To a Federal, State, local, tribal,
territorial, foreign, or multinational
government or agency, or other entity,
including, as appropriate, certain
private sector individuals and
organizations, where disclosure is in
furtherance of I&A’s information sharing
responsibilities under the Homeland
Security Act of 2002, as amended, the
Intelligence Reform and Terrorism
Prevention Act of 2004, the National
Security Act of 1947, as amended,
Executive Order 12333, as amended, or
any successor order, national security
directive, intelligence community
directive, other directive applicable to
I&A, and any classified or unclassified
implementing procedures promulgated
pursuant to such orders and directives,
or any other statute, Executive Order or
PO 00000
Frm 00036
Fmt 4703
Sfmt 4703
28133
directive of general applicability, and
where such disclosure is otherwise
compatible with the purpose for which
the record was originally acquired or
created by I&A;
D. To a Federal, State, local, tribal, or
territorial government or agency
lawfully engaged in the collection of
intelligence (including national
intelligence, foreign intelligence, and
counterintelligence), counterterrorism,
homeland security, law enforcement or
law enforcement intelligence, and other
information, where disclosure is
undertaken for intelligence,
counterterrorism, homeland security, or
related law enforcement purposes, as
authorized by U.S. Law or Executive
Order, and in accordance with
applicable disclosure policies;
E. To any other agency within the IC,
as defined in section 3.4(f) of Executive
Order 12333 of December 4, 1981, as
amended, for the purpose of allowing
that agency to determine whether the
information is relevant and necessary to
its mission-related responsibilities and
in accordance with that agency’s
classified or unclassified implementing
procedures promulgated pursuant to
such orders promulgated pursuant to
such orders and directives, or any other
statute, Executive Order or directive of
general applicability;
F. To foreign persons or foreign
government agencies, international
organizations, and multinational
agencies or entities, under
circumstances or for purposes mandated
by, imposed by, or conferred in, Federal
statute, treaty, or other international
agreement or arrangement, and in
accordance with applicable foreign
disclosure policies, such as the National
Security Decision Memorandum 119,
‘‘Disclosure of Classified United States
Military Information to Foreign
Governments and International
Organizations,’’ which is the
Presidential directive that allows for the
disclosure classified information to
foreign entities, and other applicable
directives;
G. To any individual, organization, or
entity, as appropriate, to notify them of
a serious threat to homeland security for
the purpose of guarding them against or
responding to such a threat, or where
there is a reason to believe that the
recipient is or could become the target
of a particular threat, to the extent the
information is relevant to the protection
of life, health, or property;
H. To any Federal government agency
when documents or other information
obtained from that agency are used in
compiling the particular record, the
record is also relevant to the official
responsibilities of that agency, and there
E:\FR\FM\15MYN1.SGM
15MYN1
mstockstill on PROD1PC66 with NOTICES
28134
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Notices
otherwise exists a need for that agency
to know the information in the
performance of its official functions;
I. To representatives of the
Department of Justice and other U.S.
Government entities, to the extent
necessary to obtain their advice on any
matter that is within their official
responsibilities to provide;
J. To the Department of Justice or
other Federal agency conducting
litigation or in proceedings before any
court, adjudicative or administrative
body, when: (a) DHS, or (b) any
employee of DHS in his/her official
capacity, or (c) any employee of DHS in
his/her individual capacity where DOJ
or DHS has agreed to represent the
employee, or (d) the United States or
any agency thereof, is a party to the
litigation or has an interest in such
litigation;
K. To a congressional office with
information from the record of a
particular individual, and in response to
an inquiry from that congressional office
made at the request of the individual to
whom the record pertains;
L. To individual members or staff of
the Senate Select Committee on
Intelligence and the House Permanent
Select Committee on Intelligence, and
the House Homeland Security
Subcommittee on Intelligence,
Information Sharing, and Terrorism Risk
Assessment, in connection with the
exercise of the Committees’ intelligence
oversight and legislative functions,
when such disclosures are necessary to
a lawful activity of the United States,
and the DHS Office of the General
Counsel determines that such
disclosures are otherwise lawful;
M. To the National Archives and
Records Administration or other federal
government agencies for the purpose of
records management inspections being
conducted under the authority of 44
U.S.C. sections 2904 and 2906;
N. To contractors, grantees, experts,
consultants, volunteers, and others
performing or working on a contract,
service, grant, cooperative agreement, or
other assignment for the Federal
government, when necessary to
accomplish an agency function related
to this system of records, in compliance
with the Privacy Act of 1974, as
amended;
O. To any agency, organization, or
individual for the purposes of
performing audit or oversight operations
of DHS and/or I&A authorized by law,
but only such information as is
necessary and relevant to such audit or
oversight function;
P. To the President’s Foreign
Intelligence Advisory Board, the
Intelligence Oversight Board, any
VerDate Aug<31>2005
16:18 May 14, 2008
Jkt 214001
successor organizations, and any
intelligence oversight entities
established by the President, when the
head of I&A determines that disclosure
will assist these entities in the
performance of their oversight
functions; and
Q. To an appropriate Federal, State,
local, tribal, territorial, foreign, or
international agency, if the information
is relevant and necessary to a requesting
agency’s decision concerning the hiring
or retention of an individual, or
issuance of a security clearance, license,
contract, grant, or other benefit, or if the
information is relevant and necessary to
a DHS decision concerning the hiring or
retention of an employee, the issuance
of a security clearance, the reporting of
an investigation of an employee, the
letting of a contract, or the issuance of
a license, grant or other benefit and
when disclosure is appropriate to the
proper performance of the official duties
of the person making the request.
DISCLOSURE TO CONSUMER REPORTING
AGENCIES:
None.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records in this system are stored in
paper and/or electronic format in secure
facilities. Electronic storage is on
servers, CD–ROMs, DVD–ROMs,
magnetic disc, tape, and digital media.
RETRIEVABILITY:
Data may be retrieved by an
individual’s name or other identifier,
including unique identifying numbers
assigned by I&A or other government
agencies.
SAFEGUARDS:
Hard copy (paper) records and
information in this system are
maintained in a secure facility with
access limited to only authorized
personnel or an authorized and escorted
visitor. Physical security includes
security guards and locked facilities
requiring badges and passwords for
access.
Hard copy records are stored in
vaults, safes or locked cabinets and are
accessible only to authorized
government personnel and contractors
who are properly screened, cleared and
trained in information security and the
protection of privacy information.
Electronic records are maintained on
and only accessible from secured
systems through hardware and software
devices protected by appropriate
physical and technological safeguards to
PO 00000
Frm 00037
Fmt 4703
Sfmt 4703
prevent unauthorized access, including
password protection.
Electronic or digital records or
information in this system are also
safeguarded in accordance with
applicable laws, rules, and policies,
including the DHS information
technology security policies and the
Federal Information Security
Management Act (FISMA). The
protective strategies are physical,
technical, administrative and
environmental in nature, which provide
access control to sensitive data, physical
access control to DHS facilities,
confidentiality of communications,
authentication of sending parties, and
personnel screening to ensure that all
personnel with access to data are
screened through background
investigations commensurate with the
level of access required to perform their
duties.
Strict controls have been imposed to
minimize the risks of compromising the
information that is being stored.
Access to the computer system
containing the records in this system is
limited to those individuals specifically
authorized and granted access under
DHS regulations, who hold appropriate
security clearances, and who have a
need to know the information in the
performance of their official duties.
Systems are also developed with an
incorporated auditing function of
individual use and access.
Classified information is
appropriately stored in a secured
certified and accredited facility, in
secured databases and containers, and
in accordance with other applicable
requirements, including those
pertaining to classified information.
Access is strictly limited to
authorized personnel only.
RETENTION AND DISPOSAL:
Records in this system will be
retained and disposed of in accordance
with a records retention and disposal
schedule to be submitted to and
approved by the National Archives and
Records Administration.
SYSTEM MANAGER(S) AND ADDRESS:
Director, Information Sharing and
Knowledge Management, Office of
Intelligence and Analysis, Department
of Homeland Security, Washington, DC
20528.
NOTIFICATION PROCEDURES:
Because this system contains
classified and sensitive unclassified
information related to intelligence,
counterterrorism, homeland security,
and law enforcement programs, records
in this system have been exempted from
E:\FR\FM\15MYN1.SGM
15MYN1
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Notices
notification, access, and amendment to
the extent permitted by subsection (k) of
the Privacy Act. A request for
notification of any non-exempt records
in this system may be made by writing
to the Disclosure Officer, Office of
Intelligence and Analysis, Department
of Homeland Security, Washington, DC
20528, in conformance with 6 CFR Part
5, Subpart B, which provides the rules
for requesting access to Privacy Act
records maintained by DHS.
RECORDS ACCESS PROCEDURES:
Because this system contains
classified and sensitive unclassified
information related to intelligence,
counterterrorism, homeland security,
and law enforcement programs, records
in this system have been exempted from
notification, access, and amendment to
the extent permitted by subsection (k) of
the Privacy Act. A request for access to
non-exempt records in this system may
be made by writing to the Disclosure
Officer, Office of Intelligence and
Analysis, Department of Homeland
Security, Washington, DC 20528, in
conformance with 6 CFR Part 5, Subpart
B, which provides the rules for
requesting access to Privacy Act records
maintained by DHS.
CONTESTING RECORD PROCEDURES:
Because this system contains
classified and sensitive unclassified
information related to intelligence,
counterterrorism, homeland security,
and law enforcement programs, records
in this system have been exempted from
notification, access, and amendment to
the extent permitted by subsection (k) of
the Privacy Act. A request to amend
non-exempt records in this system may
be made by writing to the System
Manager, identified above, in
conformance with 6 CFR Part 5, Subpart
B, which provides the rules for
requesting access to Privacy Act records
maintained by DHS.
RECORD SOURCE CATEGORIES:
mstockstill on PROD1PC66 with NOTICES
Information contained in this system
is obtained from individuals; other
government, non-government,
commercial, public, and private
agencies and organizations, both
domestic and foreign; media, including
periodicals, newspapers, and broadcast
transcripts; intelligence source
documents; investigative reports, and
correspondence.
EXEMPTIONS CLAIMED FOR THE SYSTEM:
DHS has exempted this system from
subsections (c)(3), (d), (e)(1), (e)(4)(G),
(H), and (I), and (f) of the Privacy Act,
pursuant to 5 U.S.C. 552a(k)(1), (2), (3),
and (5), as applicable. A Notice of
VerDate Aug<31>2005
16:18 May 14, 2008
Jkt 214001
Proposed Rulemaking for exempting
this record system has been
promulgated in accordance with the
requirements of 5 U.S.C. 553(b)(1), (2),
and (3), (c), and (e) and is being
published [in 6 CFR Part 5] concurrently
with publication of this Notice
Establishing a New System of Records
in the Federal Register.
Hugo Teufel III,
Chief Privacy Officer, Department of
Homeland Security.
[FR Doc. E8–10888 Filed 5–14–08; 8:45 am]
BILLING CODE 4410–10–P
DEPARTMENT OF HOMELAND
SECURITY
Office of the Secretary
[Docket No. DHS–2008–0002]
Privacy Act of 1974; System of Record
Privacy Office, DHS.
Notice of Privacy system of
AGENCY:
ACTION:
records.
SUMMARY: Pursuant to the Privacy Act of
1974, the Department of Homeland
Security, United States Coast Guard is
publishing this notice of system of
records entitled the Law Enforcement
Information Data Base (LEIDB)/
Pathfinder. A proposed rulemaking is
also published in this issue of the
Federal Register in which the
Department proposes to exempt
portions of this system of records from
one or more provisions of the Privacy
Act because of criminal, civil, and
administrative enforcement
requirements. Due to urgent homeland
security and law enforcement mission
needs, LEIDB is currently in limited
operation. Recognizing that USCG is
publishing a notice of system of records
for an existing system, USCG will
carefully consider public comments,
apply appropriate revisions, and
republish the LEIDB notice of system of
records within 180 days of receipt of
comments. Additionally, a Privacy
Impact Assessment will be posted on
the Department’s privacy Web site. (See
https://www.dhs.gov/privacy and follow
the link to ‘‘Privacy Impact
Assessments’’).
Comments must be received on
or before June 16, 2008. The established
system of records will be effective June
16, 2008. A revised LEIDB notice of
system of records that addresses public
comments and includes other USCG
changes will be published not later than
December 11, 2008 and will supersede
this notice of system of records.
DATES:
PO 00000
Frm 00038
Fmt 4703
Sfmt 4703
28135
You may submit comments,
identified by Docket Number DHS–
2008–0002 by one of the following
methods:
• Federal e-Rulemaking Portal:
https://www.regulations.gov. Follow the
instructions for submitting comments.
All comments received will be posted
without change to https://
www.regulations.gov, including any
personal information provided.
• Fax: 1–866–466–5370.
• Mail: Hugo Teufel III, Chief Privacy
Officer, Privacy Office, Department of
Homeland Security, Washington, DC
20528.
FOR FURTHER INFORMATION CONTACT: For
system related questions please contact:
Mr. Frank Sisto, Program Officer/System
Manager LEIDB/Pathfinder, Office of
ISR Systems and Technology, Data
Analysis & Manipulation Division (CG–
262), Phone 202–372–2795 or by mail
correspondence, U.S. Coast Guard, 2100
Second Street, SW., Washington, DC
20593–0001. For privacy issues, please
contact: Hugo Teufel III, Chief Privacy
Officer, Privacy Office, Department of
Homeland Security, Washington, DC
20528.
SUPPLEMENTARY INFORMATION:
ADDRESSES:
I. Background Information
In accordance with the Privacy Act of
1974, 5 U.S.C. 552a, the Department of
Homeland Security is establishing Law
Enforcement Information Data Base
(LEIDB)/Pathfinder as a system to meet
law enforcement information
management and analysis requirements.
LEIDB is currently in limited operation.
LEIDB is receiving message traffic,
however limitations on use of the data
are in place. Coast Guard policy restricts
LEIDB queries to searches that do not
utilize U.S. Citizen or Lawful Permanent
Resident Alien PII. Once the SORN is
approved and published, new
instructions will be published allowing
PII searches.
LEIDB/Pathfinder was developed to
efficiently manage field-created
intelligence and law enforcement
related reports. These intelligence
reports vary in content but are
submitted in a standard Coast Guard
message format, which is electronically
distributed through the Coast Guard
Message System (CGMS) (and to a lesser
extent the Defense Messaging System).
CGMS is the system by which the Coast
Guard manages all general message
traffic to and from Coast Guard
components and commands. After
processing and delivering a message,
CGMS archives the message for 30 days
before they are deleted regardless of the
content of the message.
E:\FR\FM\15MYN1.SGM
15MYN1
Agencies
[Federal Register Volume 73, Number 95 (Thursday, May 15, 2008)]
[Notices]
[Pages 28128-28135]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-10888]
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
Office of the Secretary
[Docket No. DHS-2007-0017]
Privacy Act; Office of Intelligence and Analysis Enterprise
Records System
AGENCY: Privacy Office, DHS.
ACTION: Notice of Privacy Act system of records notice.
-----------------------------------------------------------------------
SUMMARY: In accordance with the Privacy Act of 1974, the Department of
Homeland Security gives notice that it proposes to add a new system of
records to its inventory of record systems, namely the Office of
Intelligence & Analysis Enterprise Records System (ERS). Some of the
records that were previously maintained in the Homeland Security
Operations Center Database (DHS/IAIP-001), the system of records notice
for which was last published in full text on April 18, 2005 (70 FR
20156), will now be part of the ERS. This notice does not rescind,
revoke, or supersede the HSOC system of records notice insofar as other
components of DHS maintain records within that system of records, under
their respective authorities.
DATES: The new system of records will be effective June 16, 2008.
ADDRESSES: You may submit comments, identified by docket number, by one
of the following methods:
Federal eRulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments via docket number DHS-
2007-0017.
Fax: 1-866-466-5370.
Mail: Comments by mail may also be submitted to Hugo
Teufel III, Chief Privacy Officer, Department of Homeland Security,
Washington, DC 20528.
Instructions: All submissions received must include the
agency name and docket number for this rulemaking. All comments
received will be posted without change to https://www.regulations.gov,
including any personal information provided.
Docket: For access to the docket to read background
documents or comments received go to https://www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: For general questions, please contact
the Information Sharing and Knowledge Management Division, Office of
Intelligence and Analysis, Department of Homeland Security, Washington,
DC 20528. For privacy issues, please contact: Hugo Teufel III, Chief
Privacy Officer, Department of Homeland Security, Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
I. Background
The mission of DHS under the Homeland Security Act of 2002 is to
prevent terrorist attacks; reduce the vulnerability of the United
States to terrorism; minimize the damage and assist in the recovery
from terrorist attacks that may occur within the United States; carry
out the functions of the legacy agencies and entities transferred to
the Department, including by acting as a focal point regarding natural
and manmade crises and emergency planning; ensure that the functions of
the agencies and subdivisions within DHS not directly related to
securing the homeland are not diminished or neglected; ensure that the
civil rights and civil liberties of persons within, and the overall
economic security of, the United States are not diminished by efforts,
activities, and programs aimed at securing the homeland; and monitor
the connections between illegal drug trafficking and terrorism,
coordinate efforts to sever such connections, and contribute to the
effort to interdict illegal drug trafficking.
Recognizing the need for intelligence support in all of the
critical mission areas identified in the President's National Strategy
for Homeland Security and in direct support both of the DHS mission and
all elements of the Department responsible for executing the
Secretary's authorities in fulfilling it, the Under Secretary for
Intelligence & Analysis, as head of the DHS Office of Intelligence and
Analysis (I&A), is responsible for carrying out the responsibilities of
the Secretary relating to intelligence and information analysis across
the Department and, as Chief Intelligence Officer of the Department,
oversees the functional integration of the Department's intelligence
activities, including those occurring outside of I&A. Through
successive and specific delegations issued in 2006, the Under Secretary
for I&A was assigned the authority and responsibility: (1) To perform
the functions specified in Title II of the Homeland Security Act that
relate to the Office of Information Analysis (since renamed I&A); (2)
to exercise oversight and responsibility for the functions and duties
necessary to lead and manage the integration of Departmental
intelligence activities; and (3) to exercise the authority under
section 202 of the Homeland Security Act to ensure the timely and
efficient access to all information necessary to discharge the
responsibilities under section 201 of the Homeland Security Act. Taken
together, the Under Secretary for I&A exercises, through I&A, lead or,
in some cases, shared leadership responsibility under the Homeland
Security Act for the following:
A. To access, receive, and analyze law enforcement, intelligence,
and other information from federal, state, and local government
agencies (including law enforcement agencies), and private sector
entities, and to integrate such information, in support of the mission
responsibilities of the Department and the functions of the National
Counterterrorism Center established under section 119 of the National
Security Act of 1947 (50 U.S.C. 404o), in order to: (A) Identify and
assess the nature and scope of terrorist threats to the homeland; (B)
detect and identify threats of terrorism against the United States; and
(C) understand such threats in light of actual and potential
vulnerabilities;
B. To request additional information from other agencies of the
federal government, state and local government agencies, and the
private sector relating to threats of terrorism in the United States,
or relating to other areas of responsibility assigned by the Secretary;
C. To establish Department-wide procedures for the review and
analysis of information provided by State, local, and tribal
governments and the private sector, integrate such information into the
information gathered by the Department and other departments and
agencies of the Federal Government, as appropriate, and make available
such information, as appropriate, within the Department and to other
departments and agencies of the Federal Government;
D. To ensure the timely and efficient access by the Secretary of
Homeland Security and the Department to all information from other
agencies of the federal government, including reports, assessments,
analyses, and unevaluated intelligence related to threats of
[[Page 28129]]
terrorism against the United States and other areas under the
responsibility of the Secretary, and to all information concerning
infrastructure or other vulnerabilities of the United States to
terrorism, necessary for assessing, analyzing, and integrating
information for terrorism, homeland security, and related law
enforcement and intelligence purposes under the Homeland Security Act;
E. To disseminate information analyzed by the Department within the
Department, to other federal, state, and local government agencies, and
to private sector entities with responsibilities relating to homeland
security in order to assist in the deterrence, prevention, preemption
of, or response to (including mitigation of) terrorist attacks against
the United States;
F. To provide intelligence and information analysis and support to
other elements of the Department;
G. To coordinate and enhance integration among the intelligence
components of the Department, including through strategic oversight of
the intelligence activities of such components;
H. To establish the intelligence collection, processing, analysis,
and dissemination priorities, policies, processes, standards,
guidelines, and procedures for the intelligence components of the
Department, consistent with any directions from the President and, as
applicable, the Director of National Intelligence;
I. To establish a structure and process to support the missions and
goals of the intelligence components of the Department;
J. To integrate the information and standardize the format of the
products of the intelligence components of the Department containing
homeland security information, terrorism information, weapons of mass
destruction information, or national intelligence (as defined in
section 3(5) of the National Security Act of 1947 (50 U.S.C. 401a(5)));
K. To ensure that, whenever possible, the Department produces and
disseminates unclassified reports and analytic products based on open-
source information, and produces and disseminates such reports and
analytic products contemporaneously with reports or analytic products
concerning the same or similar information that the Department produced
and disseminated in a classified format;
L. To ensure that intelligence information is shared, retained, and
disseminated consistent with the authority of the Director of National
Intelligence to protect intelligence sources and methods, and similar
authorities of the Attorney General concerning sensitive law
enforcement information;
M. To consult with the Director of National Intelligence and other
appropriate intelligence, law enforcement, or other elements of the
federal government to establish collection priorities and strategies
for information, including law enforcement-related information, related
to threats of terrorism against the United States through such means as
the representation of the Department in discussions regarding
requirements and priorities in the collection of such information;
N. To coordinate with elements of the intelligence community and
with federal, state, and local law enforcement agencies and the private
sector, as appropriate;
O. To assist in carrying out comprehensive assessments of the
vulnerabilities of the key resources and critical infrastructure of the
United States, including the performance of risk assessments to
determine the risks posed by particular types of terrorist attacks
within the United States (including an assessment of the probability of
success of such attacks and the feasibility and potential efficacy of
various countermeasures to such attacks);
P. To integrate relevant information, analyses, and vulnerability
assessments in order to identify priorities for protective and support
measures by the Department, other federal, state, and local government
agencies and authorities, the private sector, and other entities;
Q. In coordination with other agencies of the federal government,
to provide specific warning information and advice about appropriate
protective measures and counter-measures, to state and local government
agencies and authorities, the private sector, other entities, and the
public;
R. To consult with state and local governments and private sector
entities to ensure appropriate exchanges of information, including law
enforcement-related information, related to threats of terrorism
against the United States (e.g., through information sharing networks
set up under state and local fusion centers, the National
Infrastructure Protection Program framework, or through the release of
information to the general public through the Homeland Security Alert
System);
S. To review, analyze, and make recommendations for improvements to
the policies and procedures governing the sharing of information within
the scope of the information sharing environment established under
section 1016 of the Intelligence Reform and Terrorism Prevention Act of
2004 (6 U.S.C. 485), including homeland security information, terrorism
information, and weapons of mass destruction information, and any
policies, guidelines, procedures, instructions, or standards
established under that section;
T. To ensure that any material received through authorized DHS
intelligence activities is protected from unauthorized disclosure and
handled and used only for the performance of official duties;
U. To establish and utilize a secure communications and information
technology infrastructure, including data-mining and other advanced
analytic tools, to access, receive, and analyze data and information
and to disseminate information acquired and analyzed by the Department,
as appropriate;
V. To establish, consistent with the policies and procedures
developed under section 1016 of the Intelligence Reform and Terrorism
Prevention Act of 2004 (6 U.S.C. 485), and consistent with the
enterprise architecture of the Department, a comprehensive information
technology network architecture for the Office of Intelligence and
Analysis that connects the various databases and related information
technology assets of the Office of Intelligence and Analysis and the
intelligence components of the Department in order to promote internal
information sharing among the intelligence and other personnel of the
Department;
W. To ensure that any information databases and analytical tools
developed or utilized by the Department (A) are compatible with one
another and with relevant information databases of other agencies of
the federal government, and (B) treat information in such databases in
a manner that complies with applicable federal law on privacy;
X. To oversee the Department's Information Sharing and Knowledge
Management Officer, and those designated for each of the intelligence
components of the Department, regarding coordinating the different
systems used in the Department to gather and disseminate homeland
security information or national intelligence (as defined in section
3(5) of the National Security Act of 1947 (50 U.S.C. 401a(5)));
[[Page 28130]]
Y. To coordinate training and other support to the elements and
personnel of the Department, other agencies of the federal government,
and state and local governments that provide information to the
Department or are consumers of information provided by the Department,
in order to facilitate the identification and sharing of information
revealed in their ordinary duties and the optimal utilization of
information received from the Department;
Z. To provide to employees of the Department opportunities for
training and education to develop an understanding of the definitions
of homeland security information and national intelligence (as defined
in section 3(5) of the National Security Act of 1947 (50 U.S.C.
401a(5))), and how information available to such employees as part of
their duties might qualify as homeland security information or national
intelligence, and be relevant to the Office of Intelligence and
Analysis and the intelligence components of the Department;
AA. To evaluate, on an ongoing basis, how employees of the Office
of Intelligence and Analysis and the intelligence components of the
Department are utilizing homeland security information or national
intelligence, sharing information within the Department, and
participating in the information sharing environment established under
section 1016 of the Intelligence Reform and Terrorism Prevention Act of
2004 (6 U.S.C. 485); and
BB. To perform other duties relating to such responsibilities as
the Secretary may provide.
In addition to assigning I&A the statutory responsibilities noted
above, relevant provisions of the Homeland Security Act of 2002, which
amended the National Security Act of 1947 in part, and subsequent
amendments to Executive Order 12333, effectively designated I&A as an
element of the National Intelligence Community (IC) and the position
now occupied by the Under Secretary for I&A as a ``Senior Official of
the Intelligence Community'' (SOIC). That, together with the
Secretary's subsequent designation of the head of I&A as Chief
Intelligence Officer of the Department--a dual-designation recently
codified in statute through recent amendments to Title II of the
Homeland Security Act of 2002--the Under Secretary for I&A now leads
the integrated DHS intelligence enterprise in providing valuable,
actionable intelligence and intelligence-related information for and
among the National leadership, all components of DHS, the IC, and our
other Federal, State, local, territorial, tribal, foreign and private
sector partners.
In his December 16, 2005, memorandum concerning information sharing
activities at DHS, the Secretary also assigned to what is now the
position of Under Secretary for I&A the responsibility to ``develop[ ]
and execut[e] the information sharing enterprise within the Department
to ensure that the information and analysis provided by the Department
is appropriate for providing security for the homeland * * * [and to]
ensure that the sharing of intelligence and analysis between DHS and
its Federal, State, local, tribal, and private sector partners is
sufficient to meet their homeland security needs.''
On February 1, 2007, the Secretary formally issued the DHS Policy
for Internal Information Exchange and Sharing, and in doing so,
recognized that all elements of DHS are ``one agency'' for purposes of
the Privacy Act and information sharing activities generally. Moreover,
the Secretary specifically reaffirmed that, within the context of this
``one agency'' approach to information sharing, the acting incumbent to
the position of Under Secretary for I&A is ``the official responsible
for assessing and analyzing all terrorism, homeland security, and
related law enforcement and intelligence information received by the
Department.''
Thus, in accordance with the Privacy Act of 1974, and to facilitate
the department-wide activities of I&A as described herein, the DHS
gives notice that it proposes to add a new system of records to its
inventory of record systems, namely the DHS I&A ERS to maintain those
records associated with I&A operations, some of which existed
previously in the Homeland Security Operations Center Database (HSOC)
system of records. This notice does not rescind, revoke, or supersede
the HSOC system of record or notice insofar as other components of DHS
maintain records within this system of records, under their respective
authorities.
The ERS will hold all records and information utilized by I&A to
provide intelligence and analysis support to DHS, and from which I&A
can cull, analyze, and fuse intelligence and related information
properly received from other DHS components, and United States
Government (USG) departments and agencies (including law enforcement
agencies), elements of the IC, and our foreign, State, local,
territorial, tribal, and private sector partners. A centrally managed
records system, will allow I&A to access and communicate relevant
information quickly and effectively to DHS leadership, and, as
appropriate, the other entities listed above. Indeed, as defined in
this notice, ERS which is a multi-domain (classified and sensitive-
unclassified) national security system will enable I&A personnel to:
(1) Manage intelligence requirements and leverage intelligence
capabilities; (2) provide timely, actionable, and relevant intelligence
information; (3) produce action-oriented indications and warnings,
evaluations, and assessments of evolving terrorist capabilities and
intent; (4) identify and disrupt terrorist activities against, and
other threats to, our homeland and within our borders; (5) develop and
employ techniques for alternative analysis; (6) facilitate the
production of accurate, timely, and thorough finished intelligence
products to the end-user; and (7) maintain an effective information
sharing process, operations, and systems environment within and without
DHS.
Given the nature of I&A's mission to ensure appropriate access to
analytical information and source records while promoting a common and
unified standard for data integrity, safeguarding, data exchange, and
administrative oversight of the information maintained, by I&A, I&A has
developed ERS as the single system of records to support all I&A
operations.
The information in the ERS system of records includes intelligence
information and other properly acquired information received from
agencies and components of the federal government, foreign governments,
organizations or entities, international organizations, state and local
government agencies (including law enforcement agencies), and private
sector entities, as well as information provided by individuals,
regardless of the medium used to submit the information or the agency
to which it was submitted. This system also contains: information
regarding persons on watch lists with known or suspected links to
terrorism; the results of intelligence analysis and reporting; ongoing
law enforcement investigative information, information systems security
analysis and reporting; active immigration, customs, border and
transportation, security related records; historical law enforcement,
operational, immigration, customs, border and transportation security,
and other administrative records; relevant and appropriately acquired
financial information; and public-source data such as that contained in
media reports and commercially available databases, as appropriate.
Data about the providers of information, including the means of
[[Page 28131]]
transmission of the data, is also retained.
I&A will use the information in the ERS system of records,
consistent with its statutory responsibilities and functions listed
above in sub-paragraphs A-BB of this section.
II. Legal Requirements
The Privacy Act embodies fair information principles in a statutory
framework governing the means by which the USG collects, maintains,
uses and disseminates personally identifiable information.
The Privacy Act applies to information that is maintained in a
system of records. A system of records is defined as a group of any
records under the control of an agency from which information is
retrieved by the name of the individual or by some identifying number,
symbol, or other identifier particular to the individual.
Individuals may request their records that are maintained in a
system of records in the possession or under the control of DHS by
complying with DHS Privacy Act regulations, 6 CFR part 5.
The Privacy Act requires that each agency publish in the Federal
Register a description denoting the type and character of each system
of records to provide transparency to and notify individuals about how
the USG is using personally identifiable information, to assist
individuals to more easily find files within the agency, and to inform
the public if any applicable Privacy Act exemptions will be claimed for
the system, which would affect access to certain information contained
in the system.
DHS proposes to exempt the ERS system of records from certain
portions of the Privacy Act to protect classified or otherwise
sensitive information that is contained in the system and to protect
the integrity of ongoing counterterrorism, intelligence, law
enforcement and other homeland security activities. These exemptions
are necessary because ERS contains information concerning certain
individuals, including but not limited to known or suspected
terrorists, and activities that could impact the security of people
within the United States. These exemptions are necessary, moreover,
because some of the information contained in the system may be derived
from sensitive intelligence, law enforcement, or other operational
sources and/or acquired using sensitive intelligence or law enforcement
methods.
Specifically, DHS is claiming exemptions from those provisions of
the Privacy Act contained at 5 U.S.C. 552a(c)(3), (d), (e)(1),
(e)(4)(G), (H), and (I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (2),
(3) and (5).
Elsewhere in today's Federal Register is the Notice of Proposed
Rulemaking for these exemptions.
Moreover, and notwithstanding those provisions of the Privacy Act
from which DHS is seeking exemption today, I&A, as a member of the
National Intelligence Community, also conducts its mission in
conformance with the requirements of Executive Order 12333, as amended,
``United States Intelligence Activities,'' dated December 4, 1981.
Section 2.3 of Executive Order 12333 requires that each agency head
within the IC establish procedures to govern the collection, retention,
and dissemination of information concerning U.S. Persons in a manner
which protects the privacy and constitutional rights of U.S. Persons.
Specifically within I&A, intelligence personnel may acquire
information which identifies a particular U.S. Person, retain it within
or disseminate it from ERS, as appropriate, only when it is determined
that the personally identifying information is necessary for the
conduct of I&A's functions and otherwise falls into one of a limited
number of authorized categories.
The routine uses covered by this system of records notice include
the sharing of covered information by I&A with its homeland security
partners, including, where and when appropriate, Federal, State, local,
tribal, territorial, foreign, or multinational governments and
agencies, and certain private sector individuals and organizations, for
purposes of countering, deterring, preventing, preparing for,
responding to, or recovering from natural or manmade threats, including
acts of terrorism; for assisting in or facilitating the coordination of
homeland security threat awareness, assessment, analysis, deterrence,
prevention, preemption, and response; for assisting in authorized
investigations, prosecutions or enforcement of the law, when acquired
information indicates a violation or potential violation of law; where
disclosure is in furtherance of I&A's information sharing
responsibilities under statute or policy, including disclosure in
support of those entities lawfully engaged in the collection of
intelligence, counterterrorism, homeland security, and related law
enforcement information; for making notifications and issuing warnings
of serious threats to the homeland or to those specific individuals
whose person or property may become the targets of a particular threat;
and, as otherwise necessary, to properly manage and oversee the
administration of this system of records and other organizational
activities of I&A, including administrative responsibilities related to
interagency support, litigation support, congressional affairs and
oversight, records management, intelligence and information oversight,
human capital, and internal security.
In accordance with 5 U.S.C. 552a(r), DHS has provided a report of
this new system of records to the Office of Management and Budget (OMB)
and to the Congress.
DHS/IA-001
SYSTEM NAME:
Office of Intelligence & Analysis (I&A) Enterprise Records System.
SECURITY CLASSIFICATION:
The classification of records in this system can range from
UNCLASSIFIED to TOP SECRET.
SYSTEM LOCATION:
Records are maintained by the Office of Intelligence & Analysis
(I&A), Department of Homeland Security, Washington, DC 20528, and at
remote locations where I&A maintains secure facilities and/or conducts
its mission.
CATEGORY OF INDIVIDUALS COVERED BY THE SYSTEM:
A. Individuals who are known, reasonably believed to be, or are
suspected of being, involved in or linked to:
1. The existence, organization, capabilities, plans,
communications, intentions, and vulnerabilities of, means of finance or
material support for, and activities against or threats to the United
States or United States persons and interests by, domestic, foreign or
international terrorist groups and/or individuals involved in
terrorism;
2. Groups or individuals believed to be assisting or associated
with domestic, foreign, or international terrorist groups and/or
individuals involved in terrorism;
3. Activities constituting a threat to homeland security, and/or
activities that are preparatory to, or facilitate or support such
activities, including:
a. Activities related to the violation or suspected violation of
immigration or customs laws and regulations of the United States,
b. Activities, which could reasonably be expected to assist in the
development or use of a weapon of mass effect;
c. Activities to identify, create, exploit, or undermine the
vulnerabilities of the ``key resources'' (as defined in section 2(9) of
the
[[Page 28132]]
Homeland Security Act of 2002) and ``critical infrastructure'' (as
defined in 42 U.S.C. 5195c(c)) of the United States;
d. Activities to identify, create, exploit, or undermine the
vulnerabilities of the cyber and national telecommunications
infrastructure, including activities which may impact the availability
of a viable national security and emergency preparedness communications
infrastructure.
e. Activities detrimental to the security of transportation and
transportation systems;
f. Activities which violate or are suspected of violating the laws
relating to counterfeiting of obligations and securities of the United
States and other financial crimes, including access device fraud,
financial institution fraud, identity theft, computer fraud; and
computer-based attacks on our nation's financial, banking, and
telecommunications infrastructure;
g. Activities, not wholly conducted within the United States, which
violate or are suspected of violating the laws which prohibit the
production, transfer, or sale of narcotics or substances controlled in
accordance with Title 21 of the United States Code, or those associated
activities otherwise prohibited by Titles 21 and 46 of the United
States Code;
h. Activities which impact or concern the security, safety, and
integrity of our international borders, including any illegal
activities that cross our borders such as violations of the immigration
or customs laws of the United States;
i. Activities which impact, concern, or otherwise threaten the
safety and security of the President and Vice President, their
families, heads of state, and other designated individuals; the White
House, Vice President's residence, foreign missions, and other
designated buildings within the United States;
j. Activities which impact, concern, or otherwise threaten maritime
safety and security, maritime mobility and navigation, or the integrity
of the maritime environment;
k. Activities which impact, concern, or otherwise threaten the
national operational capability of the Department to respond to natural
and man-made major disasters and emergencies, including acts of
terrorism, in support of impacted communities; to coordinate all
Federal emergency management response operations, response planning and
logistics programs; and to integrate Federal, State, tribal and local
response programs to ensure the efficient and effective delivery of
immediate emergency assistance to individuals and communities impacted
by major disasters, emergencies or acts of terrorism.
l. Activities involving the detection of and response to
unauthorized attempts to import, possess, store, develop, or transport
nuclear or radiological material for use against the United States
4. The capabilities, intentions, or activities of foreign
governments or elements thereof, foreign organizations, or foreign
persons, where the individuals may be officers or employees of, or
otherwise acting for or on behalf of, a foreign power or organization
that may be owned or controlled, directly or indirectly, by a foreign
power;
5. Intelligence activities, or other individuals known or suspected
of engaging in intelligence activities, on behalf of a foreign power or
terrorist group;
6. Activities or circumstances where the health or safety of that
individual may be threatened, including information concerning these
individuals that may be necessary for identifying and implementing
protective security measures or other emergency preparedness
activities;
B. Individuals who voluntarily request assistance or information,
through any means, from I&A, or individuals who voluntarily provide
information concerning any of the activities above, which may threaten
or otherwise affect homeland security.
C. Individuals who are or have been associated with DHS or I&A
activities or with the administration of the Department, including
information about individuals that is otherwise required to be
maintained by law or that is necessary for the provision of
intelligence support to the Department.
CATEGORIES OF RECORDS IN THE SYSTEM:
I&A utilizes a single records system for maintaining I&A's
operational and administrative records, including:
A. Classified and unclassified intelligence (includes national
intelligence, foreign intelligence, and counterintelligence),
counterterrorism, homeland security, and related law enforcement
information, including source records and the reporting and results of
any analysis of this information, obtained from all agencies,
components and organizations of the Federal government, including the
IC; foreign governments, organizations or entities, and international
organizations; State, local, tribal and territorial government agencies
(including law enforcement agencies); and private sector entities;
B. Information provided by record subjects and individual members
of the public;
C. Information obtained from the Terrorist Screening Center, the
National Counterterrorism Center, or from other organizations about
individuals known or reasonably suspected of being engaged in conduct
constituting, preparing for, aiding, or relating to terrorism;
D. Active and historical law enforcement investigative information;
E. Information related to lawful DHS Security investigations,
including authorized physical, personnel, and communications security
investigations, and information systems security analysis and
reporting;
F. Operational and administrative records, including correspondence
records;
G. Lawfully acquired financial information, when relevant to an
authorized intelligence, counterterrorism, homeland security, or
related law enforcement activity;
H. Public source data such as that contained in media, including
periodicals, newspapers, broadcast transcripts, and other public
reports and commercial databases; and
I. Data about the providers of any information otherwise contained
within this system, including the means of transmission of the data.
Examples of information related to the ``Categories of
Individuals'' listed above may include:
Full name, date of birth, gender, country of citizenship, country
of birth, alien number, social security number, driver's license
numbers, passport numbers, fingerprint identification number, or other
unique identifying numbers, current and past home and work addresses,
phone numbers, terrorist associations, biometric information including
fingerprints and photographs, physical description, results from
intelligence analysis related to terrorism, financial information,
family members or associates, flight information, border crossing
information, immigration information, or other personally identifiable
information that is relevant and necessary.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301; Title II and section 892 of the Homeland Security Act
of 2002, Pub. L. 107-296, 116 Stat. 2145 (Nov. 25, 2002), as amended (6
U.S.C. 121, et seq.); 44 U.S.C. 3101; E.O. 9397; E.O. 12333; E.O.
12958; E.O. 13356; and E.O. 13388.
[[Page 28133]]
PURPOSE(S):
ERS replaces the applicable portions of the DHS, Homeland Security
Operations Center Database (DHS/IAIP-001) system of records notice
(SORN), last published in full text on April 18, 2005 [70 F.R. 20156].
The DHS/IAIP-001 SORN previously covered the functional and
organizational aspects of I&A within DHS prior to realignment by the
Secretary and Congress, respectively, in 2005 and 2006.
The mission-specific purposes of ERS are as follows:
A. To manage, access, analyze, integrate, and store intelligence
(including national intelligence, foreign intelligence, and
counterintelligence), counterterrorism, homeland security, related law
enforcement, and other information to carry out the responsibilities of
the Secretary of Homeland Security and the Under Secretary for I&A, as
the official responsible for assessing and analyzing all terrorism,
homeland security, and related law enforcement and intelligence
information received by the Department, under Title II of the Homeland
Security Act (6 U.S.C. 121, et seq.), in support of the overall DHS
mission.
B. To fulfill the need for coordinated intelligence support in all
of the critical mission areas specifically identified in the
President's National Strategy for Homeland Security or other related
activities as defined by separate Executive Order, Homeland and/or
National Security Presidential Directive, or other issuance concerning
the internal management and policy of Executive Branch activities.
C. To enable the provision of intelligence and analysis support to
all DHS activities, components, and organizational elements, and to
maintain a record system from which I&A can cull, analyze, and fuse
intelligence and related information properly received from other DHS
components, other United States Government (USG) departments and
agencies (including law enforcement agencies), elements of the National
Intelligence Community (IC), as well as our foreign, State, local,
territorial, tribal, and private sector partners.
D. To permit the Under Secretary for I&A, as Chief Intelligence
Officer of the Department, to foster the development and execution of
an information sharing environment within DHS; to integrate the
intelligence and information sharing functions and activities of the
DHS intelligence enterprise to provide the most valuable, actionable
intelligence and intelligence-related information for the Nation's
leadership, all components of DHS, the IC, and our other partners; and
to ensure both that the information and analysis provided by the
Department is appropriate for providing security for the homeland and
that the sharing of intelligence and analysis between DHS and its
Federal, State, local, territorial, tribal, foreign, and private sector
partners is sufficient to meet their respective homeland security
needs.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM:
In addition to those disclosures generally permitted under 5 U.S.C.
552a(b) of the Privacy Act, all or a portion of the records or
information contained in this system may be disclosed outside DHS as a
routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
A. To any Federal, State, local, tribal, territorial, foreign, or
multinational government or agency, or appropriate private sector
individuals and organizations, with responsibilities relating to
homeland security, including responsibilities to counter, deter,
prevent, prepare for, respond to, or recover from a natural or manmade
threat, including an act of terrorism, or to assist in or facilitate
the coordination of homeland security threat awareness, assessment,
analysis, deterrence, prevention, preemption, and response;
B. To a Federal, State, local, tribal, territorial, foreign, or
multinational government or agency with the responsibility and
authority for investigating, prosecuting and/or enforcing a law (civil
or criminal), regulation, rule, order or contract, where the record, on
its face or in conjunction with other information, indicates a
violation or potential violation of any such law, regulation, rule,
order, or contract enforced by that government or agency;
C. To a Federal, State, local, tribal, territorial, foreign, or
multinational government or agency, or other entity, including, as
appropriate, certain private sector individuals and organizations,
where disclosure is in furtherance of I&A's information sharing
responsibilities under the Homeland Security Act of 2002, as amended,
the Intelligence Reform and Terrorism Prevention Act of 2004, the
National Security Act of 1947, as amended, Executive Order 12333, as
amended, or any successor order, national security directive,
intelligence community directive, other directive applicable to I&A,
and any classified or unclassified implementing procedures promulgated
pursuant to such orders and directives, or any other statute, Executive
Order or directive of general applicability, and where such disclosure
is otherwise compatible with the purpose for which the record was
originally acquired or created by I&A;
D. To a Federal, State, local, tribal, or territorial government or
agency lawfully engaged in the collection of intelligence (including
national intelligence, foreign intelligence, and counterintelligence),
counterterrorism, homeland security, law enforcement or law enforcement
intelligence, and other information, where disclosure is undertaken for
intelligence, counterterrorism, homeland security, or related law
enforcement purposes, as authorized by U.S. Law or Executive Order, and
in accordance with applicable disclosure policies;
E. To any other agency within the IC, as defined in section 3.4(f)
of Executive Order 12333 of December 4, 1981, as amended, for the
purpose of allowing that agency to determine whether the information is
relevant and necessary to its mission-related responsibilities and in
accordance with that agency's classified or unclassified implementing
procedures promulgated pursuant to such orders promulgated pursuant to
such orders and directives, or any other statute, Executive Order or
directive of general applicability;
F. To foreign persons or foreign government agencies, international
organizations, and multinational agencies or entities, under
circumstances or for purposes mandated by, imposed by, or conferred in,
Federal statute, treaty, or other international agreement or
arrangement, and in accordance with applicable foreign disclosure
policies, such as the National Security Decision Memorandum 119,
``Disclosure of Classified United States Military Information to
Foreign Governments and International Organizations,'' which is the
Presidential directive that allows for the disclosure classified
information to foreign entities, and other applicable directives;
G. To any individual, organization, or entity, as appropriate, to
notify them of a serious threat to homeland security for the purpose of
guarding them against or responding to such a threat, or where there is
a reason to believe that the recipient is or could become the target of
a particular threat, to the extent the information is relevant to the
protection of life, health, or property;
H. To any Federal government agency when documents or other
information obtained from that agency are used in compiling the
particular record, the record is also relevant to the official
responsibilities of that agency, and there
[[Page 28134]]
otherwise exists a need for that agency to know the information in the
performance of its official functions;
I. To representatives of the Department of Justice and other U.S.
Government entities, to the extent necessary to obtain their advice on
any matter that is within their official responsibilities to provide;
J. To the Department of Justice or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or
administrative body, when: (a) DHS, or (b) any employee of DHS in his/
her official capacity, or (c) any employee of DHS in his/her individual
capacity where DOJ or DHS has agreed to represent the employee, or (d)
the United States or any agency thereof, is a party to the litigation
or has an interest in such litigation;
K. To a congressional office with information from the record of a
particular individual, and in response to an inquiry from that
congressional office made at the request of the individual to whom the
record pertains;
L. To individual members or staff of the Senate Select Committee on
Intelligence and the House Permanent Select Committee on Intelligence,
and the House Homeland Security Subcommittee on Intelligence,
Information Sharing, and Terrorism Risk Assessment, in connection with
the exercise of the Committees' intelligence oversight and legislative
functions, when such disclosures are necessary to a lawful activity of
the United States, and the DHS Office of the General Counsel determines
that such disclosures are otherwise lawful;
M. To the National Archives and Records Administration or other
federal government agencies for the purpose of records management
inspections being conducted under the authority of 44 U.S.C. sections
2904 and 2906;
N. To contractors, grantees, experts, consultants, volunteers, and
others performing or working on a contract, service, grant, cooperative
agreement, or other assignment for the Federal government, when
necessary to accomplish an agency function related to this system of
records, in compliance with the Privacy Act of 1974, as amended;
O. To any agency, organization, or individual for the purposes of
performing audit or oversight operations of DHS and/or I&A authorized
by law, but only such information as is necessary and relevant to such
audit or oversight function;
P. To the President's Foreign Intelligence Advisory Board, the
Intelligence Oversight Board, any successor organizations, and any
intelligence oversight entities established by the President, when the
head of I&A determines that disclosure will assist these entities in
the performance of their oversight functions; and
Q. To an appropriate Federal, State, local, tribal, territorial,
foreign, or international agency, if the information is relevant and
necessary to a requesting agency's decision concerning the hiring or
retention of an individual, or issuance of a security clearance,
license, contract, grant, or other benefit, or if the information is
relevant and necessary to a DHS decision concerning the hiring or
retention of an employee, the issuance of a security clearance, the
reporting of an investigation of an employee, the letting of a
contract, or the issuance of a license, grant or other benefit and when
disclosure is appropriate to the proper performance of the official
duties of the person making the request.
DISCLOSURE TO CONSUMER REPORTING AGENCIES:
None.
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING,
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records in this system are stored in paper and/or electronic format
in secure facilities. Electronic storage is on servers, CD-ROMs, DVD-
ROMs, magnetic disc, tape, and digital media.
RETRIEVABILITY:
Data may be retrieved by an individual's name or other identifier,
including unique identifying numbers assigned by I&A or other
government agencies.
SAFEGUARDS:
Hard copy (paper) records and information in this system are
maintained in a secure facility with access limited to only authorized
personnel or an authorized and escorted visitor. Physical security
includes security guards and locked facilities requiring badges and
passwords for access.
Hard copy records are stored in vaults, safes or locked cabinets
and are accessible only to authorized government personnel and
contractors who are properly screened, cleared and trained in
information security and the protection of privacy information.
Electronic records are maintained on and only accessible from
secured systems through hardware and software devices protected by
appropriate physical and technological safeguards to prevent
unauthorized access, including password protection.
Electronic or digital records or information in this system are
also safeguarded in accordance with applicable laws, rules, and
policies, including the DHS information technology security policies
and the Federal Information Security Management Act (FISMA). The
protective strategies are physical, technical, administrative and
environmental in nature, which provide access control to sensitive
data, physical access control to DHS facilities, confidentiality of
communications, authentication of sending parties, and personnel
screening to ensure that all personnel with access to data are screened
through background investigations commensurate with the level of access
required to perform their duties.
Strict controls have been imposed to minimize the risks of
compromising the information that is being stored.
Access to the computer system containing the records in this system
is limited to those individuals specifically authorized and granted
access under DHS regulations, who hold appropriate security clearances,
and who have a need to know the information in the performance of their
official duties.
Systems are also developed with an incorporated auditing function
of individual use and access.
Classified information is appropriately stored in a secured
certified and accredited facility, in secured databases and containers,
and in accordance with other applicable requirements, including those
pertaining to classified information.
Access is strictly limited to authorized personnel only.
RETENTION AND DISPOSAL:
Records in this system will be retained and disposed of in
accordance with a records retention and disposal schedule to be
submitted to and approved by the National Archives and Records
Administration.
SYSTEM MANAGER(S) AND ADDRESS:
Director, Information Sharing and Knowledge Management, Office of
Intelligence and Analysis, Department of Homeland Security, Washington,
DC 20528.
NOTIFICATION PROCEDURES:
Because this system contains classified and sensitive unclassified
information related to intelligence, counterterrorism, homeland
security, and law enforcement programs, records in this system have
been exempted from
[[Page 28135]]
notification, access, and amendment to the extent permitted by
subsection (k) of the Privacy Act. A request for notification of any
non-exempt records in this system may be made by writing to the
Disclosure Officer, Office of Intelligence and Analysis, Department of
Homeland Security, Washington, DC 20528, in conformance with 6 CFR Part
5, Subpart B, which provides the rules for requesting access to Privacy
Act records maintained by DHS.
RECORDS ACCESS PROCEDURES:
Because this system contains classified and sensitive unclassified
information related to intelligence, counterterrorism, homeland
security, and law enforcement programs, records in this system have
been exempted from notification, access, and amendment to the extent
permitted by subsection (k) of the Privacy Act. A request for access to
non-exempt records in this system may be made by writing to the
Disclosure Officer, Office of Intelligence and Analysis, Department of
Homeland Security, Washington, DC 20528, in conformance with 6 CFR Part
5, Subpart B, which provides the rules for requesting access to Privacy
Act records maintained by DHS.
CONTESTING RECORD PROCEDURES:
Because this system contains classified and sensitive unclassified
information related to intelligence, counterterrorism, homeland
security, and law enforcement programs, records in this system have
been exempted from notification, access, and amendment to the extent
permitted by subsection (k) of the Privacy Act. A request to amend non-
exempt records in this system may be made by writing to the System
Manager, identified above, in conformance with 6 CFR Part 5, Subpart B,
which provides the rules for requesting access to Privacy Act records
maintained by DHS.
RECORD SOURCE CATEGORIES:
Information contained in this system is obtained from individuals;
other government, non-government, commercial, public, and private
agencies and organizations, both domestic and foreign; media, including
periodicals, newspapers, and broadcast transcripts; intelligence source
documents; investigative reports, and correspondence.
EXEMPTIONS CLAIMED FOR THE SYSTEM:
DHS has exempted this system from subsections (c)(3), (d), (e)(1),
(e)(4)(G), (H), and (I), and (f) of the Privacy Act, pursuant to 5
U.S.C. 552a(k)(1), (2), (3), and (5), as applicable. A Notice of
Proposed Rulemaking for exempting this record system has been
promulgated in accordance with the requirements of 5 U.S.C. 553(b)(1),
(2), and (3), (c), and (e) and is being published [in 6 CFR Part 5]
concurrently with publication of this Notice Establishing a New System
of Records in the Federal Register.
Hugo Teufel III,
Chief Privacy Officer, Department of Homeland Security.
[FR Doc. E8-10888 Filed 5-14-08; 8:45 am]
BILLING CODE 4410-10-P