Privacy Act of 1974: Implementation of Exemptions; Law Enforcement Information Database (LEIDB)/Pathfinder, 28062-28066 [E8-10893]
Download as PDF
yshivers on PROD1PC62 with PROPOSALS
28062
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Proposed Rules
substances controlled in accordance with
Title 21 of the United States Code, or those
associated activities otherwise prohibited by
Titles 21 and 46 of the United States Code;
(7) activities which impact, concern, or
otherwise threaten the safety and security of
the President and Vice President, their
families, heads of state, and other designated
individuals; the White House, Vice
President’s residence, foreign missions, and
other designated buildings within the United
States; (8) activities which impact, concern,
or otherwise threaten domestic maritime
safety and security, maritime mobility and
navigation, or the integrity of the domestic
maritime environment; (9) activities which
impact, concern, or otherwise threaten the
national operational capability of the
Department to respond to natural and
manmade major disasters and emergencies,
including acts of terrorism; (10) activities
involving the importation, possession,
storage, development, or transportation of
nuclear or radiological material without
authorization or for use against the United
States;
(iv) Foreign governments, organizations, or
persons (foreign powers); and
(v) Individuals engaging in intelligence
activities on behalf of a foreign power or
terrorist group.
Thus, by notifying the record subject that he/
she is the focus of such efforts or interest on
the part of DHS, or other agencies with whom
DHS is cooperating and to whom the
disclosures were made, this information
could permit the record subject to take
measures to impede or evade such efforts,
including the taking of steps to deceive DHS
personnel and deny them the ability to
adequately assess relevant information and
activities, and could inappropriately disclose
to the record subject the sensitive methods
and/or confidential sources used to acquire
the relevant information against him/her.
Moreover, where the record subject is the
actual target of a law enforcement
investigation, this information could permit
him/her to take measures to impede the
investigation, for example, by destroying
evidence, intimidating potential witnesses, or
avoiding detection or apprehension.
(2) From subsections (d)(1), (2), (3), and (4)
(Access to Records) because these provisions
concern individual rights of access to and
amendment of records (including the review
of agency denials of either) contained in this
system, which consists of intelligence,
counterterrorism, homeland security, and
related investigatory records concerning
efforts of the Department, as described more
fully in subsection (b)(1), above. Compliance
with these provisions could inform or alert
the subject of an intelligence,
counterterrorism, homeland security, or
investigatory effort undertaken on behalf of
the Department, or by another agency with
whom DHS is cooperating, of the fact and
nature of such efforts, and/or the relevant
intelligence, counterterrorism, homeland
security, or investigatory interest of DHS
and/or other intelligence, counterterrorism,
or law enforcement agencies. Moreover,
compliance could also compromise sensitive
information either classified in the interest of
national security, or which otherwise
VerDate Aug<31>2005
16:04 May 14, 2008
Jkt 214001
requires, as appropriate, safeguarding and
protection from unauthorized disclosure;
identify a confidential source or disclose
information which would constitute an
unwarranted invasion of another individual’s
personal privacy; reveal a sensitive
intelligence or investigative technique or
method, including interfering with
intelligence or law enforcement investigative
processes by permitting the destruction of
evidence, improper influencing or
intimidation of witnesses, fabrication of
statements or testimony, and flight from
detection or apprehension; or constitute a
potential danger to the health or safety of
intelligence, counterterrorism, homeland
security, and law enforcement personnel,
confidential sources and informants, and
potential witnesses. Amendment of the
records would interfere with ongoing
intelligence, counterterrorism, homeland
security, and law enforcement investigations
and activities, including incident reporting
and analysis activities, and impose an
impossible administrative burden by
requiring investigations, reports, and
analyses to be continuously reinvestigated
and revised.
(3) From subsection (e)(1) (Relevant and
Necessary) because it is not always possible
for DHS to know in advance of its receipt the
relevance and necessity of each piece of
information it acquires in the course of an
intelligence, counterterrorism, or
investigatory effort undertaken on behalf of
the Department, or by another agency with
whom DHS is cooperating. In the context of
the authorized intelligence, counterterrorism,
and investigatory activities undertaken by
DHS personnel, relevance and necessity are
questions of analytic judgment and timing,
such that what may appear relevant and
necessary when acquired ultimately may be
deemed unnecessary upon further analysis
and evaluation. Similarly, in some situations,
it is only after acquired information is
collated, analyzed, and evaluated in light of
other available evidence and information that
its relevance and necessity can be established
or made clear. Constraining the initial
acquisition of information included within
the ERS in accordance with the relevant and
necessary requirement of subsection (e)(1)
could discourage the appropriate receipt of
and access to information which DHS and
I&A are otherwise authorized to receive and
possess under law, and thereby impede
efforts to detect, deter, prevent, disrupt, or
apprehend terrorists or terrorist groups, and/
or respond to terrorist or other activities
which threaten homeland security.
Notwithstanding this claimed exemption,
which would permit the acquisition and
temporary maintenance of records whose
relevance to the purpose of the ERS may be
less than fully clear, DHS will only disclose
such records after determining whether such
disclosures are themselves consistent with
the published ERS routine uses. Moreover, it
should be noted that, as concerns the receipt
by I&A, for intelligence purposes, of
information in any record which identifies a
U.S. Person, as defined in Executive Order
12333, as amended, such receipt, and any
subsequent use or dissemination of that
identifying information, is undertaken
PO 00000
Frm 00003
Fmt 4702
Sfmt 4702
consistent with the procedures established
and adhered to by I&A pursuant to that
Executive Order. Specifically, I&A
intelligence personnel may acquire
information which identifies a particular U.S.
Person, retain it within or disseminate it from
ERS, as appropriate, only when it is
determined that the personally identifying
information is necessary for the conduct of
I&A’s functions, and otherwise falls into one
of a limited number of authorized categories,
each of which reflects discrete activities for
which information on individuals would be
utilized by the Department in the overall
execution of its statutory mission.
(4) From subsections (e)(4) (G), (H) and (I)
(Access), and (f) (Agency Rules), inasmuch as
it is unnecessary for the publication of rules
and procedures contemplated therein since
the ERS, pursuant to subsections (1) and (2),
above, will be exempt from the underlying
duties to provide to individuals notification
about, access to, and the ability to amend or
correct the information pertaining to them in,
this system of records. Furthermore, to the
extent that subsection (e)(4)(I) is construed to
require more detailed disclosure than the
information accompanying the system notice
for ERS, as published in today’s Federal
Register, exemption from it is also necessary
to protect the confidentiality, privacy, and
physical safety of sources of information, as
well as the methods for acquiring it. Finally,
greater specificity concerning the description
of categories of sources of properly classified
records could also compromise or otherwise
cause damage to the national or homeland
security.
Hugo Teufel III,
Chief Privacy Officer, Department of
Homeland Security.
[FR Doc. E8–10891 Filed 5–14–08; 8:45 am]
BILLING CODE 4410–10–P
DEPARTMENT OF HOMELAND
SECURITY
6 CFR Part 5
[Docket No. DHS–2008–0003]
Privacy Act of 1974: Implementation of
Exemptions; Law Enforcement
Information Database (LEIDB)/
Pathfinder
Privacy Office, Office of the
Secretary, DHS.
ACTION: Notice of proposed rulemaking.
AGENCY:
SUMMARY: The Department of Homeland
Security is giving concurrent notice of a
system of records pursuant to the
Privacy Act of 1974 for the United
States Coast Guard’s Law Enforcement
Information Data Base (LEIDB)/
Pathfinder system. In this proposed
rulemaking, the Department proposes to
exempt this system of records from one
or more provisions of the Privacy Act
because of criminal, civil, intelligence
and administrative enforcement
requirements.
E:\FR\FM\15MYP1.SGM
15MYP1
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Proposed Rules
Comments must be received on
or before June 16, 2008.
ADDRESSES: You may submit comments,
identified by DOCKET NUMBER DHS–
2008–0003 by one of the following
methods:
• Federal e-Rulemaking Portal:
https://www.regulations.gov. Follow the
instructions for submitting comments.
• Facsimile: 1–866–466–5370.
• Mail: Hugo Teufel III, Chief Privacy
Officer, Privacy Office, Department of
Homeland Security, Washington, DC
20528.
Instructions: All submissions received
must include the agency name and
docket number for this notice. All
comments received will be posted
without change to https://
www.regulations.gov, including any
personal information provided.
Docket: For access to the docket to
read background documents or
comments received, go to https://
www.regulations.gov.
DATES:
FOR FURTHER INFORMATION CONTACT:
Department of Homeland Security
United States Coast Guard (LEIDB/
Pathfinder System Manager),
Intelligence Division (CG–262), 2100
2nd Street, SW., Washington, DC
20593–0001; Hugo Teufel III, Chief
Privacy Officer, Privacy Office,
Department of Homeland Security,
Washington, DC 20528; telephone 703–
235–0780.
SUPPLEMENTARY INFORMATION:
yshivers on PROD1PC62 with PROPOSALS
Background
Elsewhere in today’s Federal Register,
the Department of Homeland Security
(DHS) is publishing a Privacy Act
system of records notice DHS/USCG–
061 LEIDB/Pathfinder.
In accordance with the Privacy Act of
1974, 5 U.S.C. 552a, the Department of
Homeland Security is establishing Law
Enforcement Information Data Base
(LEIDB)/Pathfinder as a system to meet
urgent homeland security and law
enforcement mission needs.
The Assistant Commandant for
Intelligence and Criminal Investigations
(CG–2) identified a need to archive
messages for more than thirty (30) days
and to be able to perform analysis of the
data contained within the messages to
support law enforcement (LE) and
intelligence activities. Pathfinder was
selected and implemented to support
the requirement. LEIDB is currently in
limited operation. LEIDB is receiving
message traffic, however limitations on
use of the data are in place. Coast Guard
policy restricts LEIDB queries to
searches that do not utilize U.S. Citizen
or Lawful Permanent Resident Alien PII.
Once the SORN is approved and
VerDate Aug<31>2005
16:04 May 14, 2008
Jkt 214001
published, new instructions will be
published allowing PII searches.
LEIDB/Pathfinder is installed on the
Secure Internet Protocol Router Network
(SIPRNET). LEIDB/Pathfinder contains
both unclassified and National Security
Classified information. Message traffic
originating from federal agencies and
managed on the Coast Guard Message
System (CGMS) or the Defense Message
Systems (DMS) are moved to the LEIDB/
Pathfinder automatically and via
personnel intervention with e-mail.
Users of the system access LEIDB/
Pathfinder data via a web browser
interface. The interface allows users to
search for data using Boolean searches
that are run against the unstructured
text in a message. Messages contained in
LEIDB/Pathfinder are not machine
processed in any fashion to enable data
manipulation; they are not normalized
or correlated.
The Law Enforcement Information
Database (LEIDB)/Pathfinder is a
historical repository of selected Coast
Guard message traffic. LEIDB/Pathfinder
supports law enforcement intelligence
activities. LEIDB/Pathfinder users can
query archived message traffic and link
relevant information across multiple
data records within LEIDB/Pathfinder.
Users have system tools enabling the
user to identify potential relationships
between information contained in
otherwise unrelated documents. These
tools allow the analysts to build high
precision and low return queries, which
minimize false hits and maximize
analyst productivity while working with
unstructured, unformatted, free test
documents.
The Privacy Act also allows
government agencies, as appropriate, to
exempt certain records from the access
and amendment provisions. Where an
agency seeks to claim an exemption,
however, it must issue a Notice of
Proposed Rulemaking to make clear to
the public the reasons why a particular
exemption is claimed. DHS is claiming
exemptions from certain requirements
of the Privacy Act by publication of this
proposed rule.
Accordingly, DHS proposes to exempt
this system, in part, from certain
provisions of the Privacy Act and to add
that exemption to Appendix C to Part 5,
DHS Systems of Records Exempt from
the Privacy Act. Coast Guard needs
these exemptions in order to protect
information relating to authorized
intelligence, counterterrorism,
homeland security, and related law
enforcement activities from disclosure
to subjects of investigations and others
who, by accessing or knowing this
information, could interfere with those
activities or otherwise place in jeopardy
PO 00000
Frm 00004
Fmt 4702
Sfmt 4702
28063
the national or homeland security.
Specifically, the exemptions are
necessary in order to prevent revealing
information concerning intelligence,
counterterrorism, homeland security, or
related investigative efforts. Revealing
such information to the subject or other
individual could reasonably be expected
to compromise ongoing efforts of the
Department to identify, understand,
analyze, investigate, and counter the
activities that threaten national or
homeland security; compromise
classified or other sensitive information;
identify a confidential source or
disclose information which would
constitute an unwarranted invasion of
another individual’s personal privacy;
reveal a sensitive intelligence or
investigative technique or method, and
interfere with intelligence or law
enforcement analytic or investigative
processes; or constitute a potential
danger to the health or safety of
intelligence, counterterrorism,
homeland security, and law
enforcement personnel, confidential
sources and informants, or potential
witnesses.
The exemptions proposed here are
standard law enforcement and national
security exemptions exercised by a large
number of Federal law enforcement and
intelligence agencies. Nonetheless, DHS
will examine each separate request on a
case-by-case basis, and, after conferring
with the appropriate component or
agency, may waive applicable
exemptions in appropriate
circumstances and where it would not
appear to interfere with or adversely
affect the law enforcement or national
security purposes of the systems from
which the information is recompiled or
in which it is contained.
Regulatory Requirements
A. Regulatory Impact Analyses
Changes to Federal regulations must
undergo several analyses. In conducting
these analyses, DHS has determined:
1. Executive Order 12866 Assessment
This rule is not a significant
regulatory action under Executive Order
12866, ‘‘Regulatory Planning and
Review’’ (as amended). Accordingly,
this rule has not been reviewed by the
Office of Management and Budget
(OMB). Nevertheless, DHS has reviewed
this rulemaking, and concluded that
there will not be any significant
economic impact.
2. Regulatory Flexibility Act Assessment
Pursuant to section 605 of the
Regulatory Flexibility Act (RFA), 5
U.S.C. 605(b), as amended by the Small
E:\FR\FM\15MYP1.SGM
15MYP1
28064
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Proposed Rules
Business Regulatory Enforcement and
Fairness Act of 1996 (SBREFA), DHS
certifies that this rule will not have a
significant impact on a substantial
number of small entities. The rule
would impose no duties or obligations
on small entities. Further, the
exemptions to the Privacy Act apply to
individuals, and individuals are not
covered entities under the RFA.
3. International Trade Impact
Assessment
This rulemaking will not constitute a
barrier to international trade. The
exemptions relate to criminal
investigations and agency
documentation and, therefore, do not
create any new costs or barriers to trade.
4. Unfunded Mandates Assessment
Title II of the Unfunded Mandates
Reform Act of 1995 (UMRA), (Pub. L.
104–4, 109 Stat. 48), requires Federal
agencies to assess the effects of certain
regulatory actions on State, local, and
tribal governments, and the private
sector. This rulemaking will not impose
an unfunded mandate on State, local, or
tribal governments, or on the private
sector.
B. Paperwork Reduction Act
The Paperwork Reduction Act of 1995
(PRA) (44 U.S.C. 3501 et seq.) requires
that DHS consider the impact of
paperwork and other information
collection burdens imposed on the
public and, under the provisions of PRA
section 3507(d), obtain approval from
the Office of Management and Budget
(OMB) for each collection of
information it conducts, sponsors, or
requires through regulations. DHS has
determined that there are no current or
new information collection
requirements associated with this rule.
C. Executive Order 13132, Federalism
This action will not have a substantial
direct effect on the States, on the
relationship between the national
Government and the States, or on the
distribution of power and
responsibilities among the various
levels of government, and therefore will
not have federalism implications.
yshivers on PROD1PC62 with PROPOSALS
D. Environmental Analysis
DHS has reviewed this action for
purposes of the National Environmental
Policy Act of 1969 (NEPA) (42 U.S.C.
4321–4347) and has determined that
this action will not have a significant
effect on the human environment.
E. Energy Impact
The energy impact of this action has
been assessed in accordance with the
VerDate Aug<31>2005
16:04 May 14, 2008
Jkt 214001
Energy Policy and Conservation Act
(EPCA) Public Law 94–163, as amended
(42 U.S.C. 6362). This rulemaking is not
a major regulatory action under the
provisions of the EPCA.
List of Subjects in 6 CFR Part 5
Freedom of information, Privacy,
Sensitive information.
For the reasons stated in the
preamble, DHS proposes to amend
Chapter I of Title 6, Code of Federal
Regulations, as follows:
PART 5—DISCLOSURE OF RECORDS
AND INFORMATION
1. The authority citation for part 5
continues to read as follows:
Authority: Pub. L. 107–296, 116 Stat. 2135,
6 U.S.C. 101 et seq.; 5 U.S.C. 301. Subpart A
also issued under 5 U.S.C. 552.
2. At the end of Appendix C to part
5, add the following new section 7:
Appendix C to Part 5—DHS Systems of
Records Exempt From the Privacy Act
*
*
*
*
*
6. DHS/USCG–061, LEIDB/Pathfinder.
(a) Pursuant to 5 U.S.C. 552a(j)(2), (k)(1),
and (k)(2) certain records or information in
the above mentioned system of records are
exempt from 5 U.S.C. 552a(c)(3) and (4);
(d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G)
through (I), (e)(5), and (8); (f), and (g). These
exemptions apply only to the extent that
information in this system is subject to
exemption. Where compliance would not
appear to interfere with or adversely affect
the intelligence, counterterrorism, homeland
security, and related law enforcement
purposes of this system, the applicable
exemption may be waived by DHS.
(b) Exemptions from the particular
subsections are justified for the following
reasons:
(1) From subsection (c)(3) (Accounting for
Disclosures) because making available to a
record subject the accounting of disclosures
from records concerning him/her would
specifically reveal any interest in the
individual of an intelligence,
counterterrorism, homeland security, or
related investigative nature. Revealing this
information could reasonably be expected to
compromise ongoing efforts of the
Department to identify, understand, analyze,
investigate, and counter the activities of:
(i) Known or suspected terrorists and
terrorist groups;
(ii) Groups or individuals known or
believed to be assisting or associated with
known or suspected terrorists or terrorist
groups;
(iii) Individuals known, believed to be, or
suspected of being engaged in activities
constituting a threat to homeland security,
including (1) activities which impact or
concern the security, safety, and integrity of
our international borders, including any
illegal activities that either cross our borders
or are otherwise in violation of the
immigration or customs laws and regulations
PO 00000
Frm 00005
Fmt 4702
Sfmt 4702
of the United States; (2) activities which
could reasonably be expected to assist in the
development or use of a weapon of mass
effect; (3) activities meant to identify, create,
or exploit the vulnerabilities of, or
undermine, the ‘‘key resources’’ (as defined
in section 2(9) of the Homeland Security Act
of 2002) and ‘‘critical infrastructure’’ (as
defined in 42 U.S.C. 5195c(c)) of the United
States, including the cyber and national
telecommunications infrastructure and the
availability of a viable national security and
emergency preparedness communications
infrastructure; (4) activities detrimental to the
security of transportation and transportation
systems; (5) activities which violate or are
suspected of violating the laws relating to
counterfeiting of obligations and securities of
the United States and other financial crimes,
including access device fraud, financial
institution fraud, identity theft, computer
fraud; and computer-based attacks on our
nation’s financial, banking, and
telecommunications infrastructure; (6)
activities, not wholly conducted within the
United States, which violate or are suspected
of violating the laws which prohibit the
production, transfer, or sale of narcotics or
substances controlled in accordance with
Title 21 of the United States Code, or those
associated activities otherwise prohibited by
Titles 21 and 46 of the United States Code;
(7) activities which impact, concern, or
otherwise threaten the safety and security of
the President and Vice President, their
families, heads of state, and other designated
individuals; the White House, Vice
President’s residence, foreign missions, and
other designated buildings within the United
States; (8) activities which impact, concern,
or otherwise threaten domestic maritime
safety and security, maritime mobility and
navigation, or the integrity of the domestic
maritime environment; (9) activities which
impact, concern, or otherwise threaten the
national operational capability of the
Department to respond to natural and
manmade major disasters and emergencies,
including acts of terrorism; (10) activities
involving the importation, possession,
storage, development, or transportation of
nuclear or radiological material without
authorization or for use against the United
States;
(iv) Foreign governments, organizations, or
persons (foreign powers); and
(v) Individuals engaging in intelligence
activities on behalf of a foreign power or
terrorist group.
Thus, by notifying the record subject that
he/she is the focus of such efforts or interest
on the part of DHS, or other agencies with
whom DHS is cooperating and to whom the
disclosures were made, this information
could permit the record subject to take
measures to impede or evade such efforts,
including the taking of steps to deceive DHS
personnel and deny them the ability to
adequately assess relevant information and
activities, and could inappropriately disclose
to the record subject the sensitive methods
and/or confidential sources used to acquire
the relevant information against him/her.
Moreover, where the record subject is the
actual target of a law enforcement
investigation, this information could permit
E:\FR\FM\15MYP1.SGM
15MYP1
yshivers on PROD1PC62 with PROPOSALS
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Proposed Rules
him/her to take measures to impede the
investigation, for example, by destroying
evidence, intimidating potential witnesses, or
avoiding detection or apprehension.
(2) From subsection (c)(4) (Accounting for
Disclosure, notice of dispute) because certain
records in this system are exempt from the
access and amendment provisions of
subsection (d), this requirement to inform
any person or other agency about any
correction or notation of dispute that the
agency made with regard to those records,
should not apply.
(3) From subsections (d)(1), (2), (3), and (4)
(Access to Records) because these provisions
concern individual rights of access to and
amendment of records (including the review
of agency denials of either) contained in this
system, which consists of intelligence,
counterterrorism, homeland security, and
related investigatory records concerning
efforts of the Department, as described more
fully in subsection (b)(1), above. Compliance
with these provisions could inform or alert
the subject of an intelligence,
counterterrorism, homeland security, or
investigatory effort undertaken on behalf of
the Department, or by another agency with
whom DHS is cooperating, of the fact and
nature of such efforts, and/or the relevant
intelligence, counterterrorism, homeland
security, or investigatory interest of DHS
and/or other intelligence, counterterrorism,
or law enforcement agencies. Moreover,
compliance could also compromise sensitive
information either classified in the interest of
national security, or which otherwise
requires, as appropriate, safeguarding and
protection from unauthorized disclosure;
identify a confidential source or disclose
information which would constitute an
unwarranted invasion of another individual’s
personal privacy; reveal a sensitive
intelligence or investigative technique or
method, including interfering with
intelligence or law enforcement investigative
processes by permitting the destruction of
evidence, improper influencing or
intimidation of witnesses, fabrication of
statements or testimony, and flight from
detection or apprehension; or constitute a
potential danger to the health or safety of
intelligence, counterterrorism, homeland
security, and law enforcement personnel,
confidential sources and informants, and
potential witnesses. Amendment of the
records would interfere with ongoing
intelligence, counterterrorism, homeland
security, and law enforcement investigations
and activities, including incident reporting
and analysis activities, and impose an
impossible administrative burden by
requiring investigations, reports, and
analyses to be continuously reinvestigated
and revised.
(4) From subsection (e)(1) (Relevant and
Necessary) because it is not always possible
for DHS to know in advance of its receipt the
relevance and necessity of each piece of
information it acquires in the course of an
intelligence, counterterrorism, or
investigatory effort undertaken on behalf of
the Department, or by another agency with
whom DHS is cooperating. In the context of
the authorized intelligence, counterterrorism,
and investigatory activities undertaken by
VerDate Aug<31>2005
16:04 May 14, 2008
Jkt 214001
DHS personnel, relevance and necessity are
questions of analytic judgment and timing,
such that what may appear relevant and
necessary when acquired ultimately may be
deemed unnecessary upon further analysis
and evaluation. Similarly, in some situations,
it is only after acquired information is
collated, analyzed, and evaluated in light of
other available evidence and information that
its relevance and necessity can be established
or made clear. Constraining the initial
acquisition of information included within
the LEIDB in accordance with the relevant
and necessary requirement of subsection
(e)(1) could discourage the appropriate
receipt of and access to information which
DHS and USCG are otherwise authorized to
receive and possess under law, and thereby
impede efforts to detect, deter, prevent,
disrupt, or apprehend terrorists or terrorist
groups, and/or respond to terrorist or other
activities which threaten homeland security.
Notwithstanding this claimed exemption,
which would permit the acquisition and
temporary maintenance of records whose
relevance to the purpose of the LEIDB may
be less than fully clear, DHS will only
disclose such records after determining
whether such disclosures are themselves
consistent with the published LEIDB routine
uses. Moreover, it should be noted that, as
concerns the receipt by USCG, for
intelligence purposes, of information in any
record which identifies a U.S. Person, as
defined in Executive Order 12333, as
amended, such receipt, and any subsequent
use or dissemination of that identifying
information, is undertaken consistent with
the procedures established and adhered to by
USCG pursuant to that Executive Order.
Specifically, USCG intelligence personnel
may acquire information which identifies a
particular U.S. Person, retain it within or
disseminate it from LEIDB, as appropriate,
only when it is determined that the
personally identifying information is
necessary for the conduct of USCG’s
functions, and otherwise falls into one of a
limited number of authorized categories,
each of which reflects discrete activities for
which information on individuals would be
utilized by the Department in the overall
execution of its statutory mission.
(5) From subsection (e)(2) (Collection of
Information from Individuals) because
application of this provision could present a
serious impediment to counterterrorism or
law enforcement efforts in that it would put
the subject of an investigation, study or
analysis on notice of that fact, thereby
permitting the subject to engage in conduct
designed to frustrate or impede that activity.
The nature of counterterrorism, and law
enforcement investigations is such that vital
information about an individual frequently
can be obtained only from other persons who
are familiar with such individual and his/her
activities. In such investigations it is not
feasible to rely solely upon information
furnished by the individual concerning his
own activities.
(6) From subsection (e)(3) (Notice to
Subjects), to the extent that this subsection is
interpreted to require DHS to provide notice
to an individual if DHS or another agency
receives or collects information about that
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
28065
individual during an investigation or from a
third party. Should the subsection be so
interpreted, exemption from this provision is
necessary to avoid impeding
counterterrorism or law enforcement efforts
by putting the subject of an investigation,
study or analysis on notice of that fact,
thereby permitting the subject to engage in
conduct intended to frustrate or impede that
activity.
(7) From subsections (e)(4)(G), (H) and (I)
(Access), inasmuch as it is unnecessary for
the publication of rules and procedures
contemplated therein since the LEIDB,
pursuant to subsections (2) and (3), above,
will be exempt from the underlying duties to
provide to individuals notification about,
access to, and the ability to amend or correct
the information pertaining to them in, this
system of records. Furthermore, to the extent
that subsection (e)(4)(I) is construed to
require more detailed disclosure than the
information accompanying the system notice
for LEIDB, as published in today’s Federal
Register, exemption from it is also necessary
to protect the confidentiality, privacy, and
physical safety of sources of information, as
well as the methods for acquiring it. Finally,
greater specificity concerning the description
of categories of sources of properly classified
records could also compromise or otherwise
cause damage to the national or homeland
security.
(8) From subsection (e)(5) (Collection of
Information) because many of the records in
this system coming from other system of
records are derived from other domestic and
foreign agency record systems and therefore
it is not possible for DHS to vouch for their
compliance with this provision; however, the
DHS has implemented internal quality
assurance procedures to ensure that data
used in its screening processes is as
complete, accurate, and current as possible.
In addition, in the collection of information
for law enforcement and counterterrorism
purposes, it is impossible to determine in
advance what information is accurate,
relevant, timely, and complete. With the
passage of time, seemingly irrelevant or
untimely information may acquire new
significance as further investigation brings
new details to light. The restrictions imposed
by (e)(5) would limit the ability of those
agencies’ trained investigators and
intelligence analysts to exercise their
judgment in conducting investigations and
impede the development of intelligence
necessary for effective law enforcement and
counterterrorism efforts.
(9) From subsection (e)(8) (Notice on
Individuals) because to require individual
notice of disclosure of information due to
compulsory legal process would pose an
impossible administrative burden on DHS
and other agencies and could alert the
subjects of counterterrorism or law
enforcement investigations to the fact of
those investigations then not previously
known.
(10) From subsection (f) (Agency Rules)
because portions of this system are exempt
from the access and amendment provisions
of subsection (d). Access to, and amendment
of, system records that are not exempt or for
which exemption is waived may be obtained
E:\FR\FM\15MYP1.SGM
15MYP1
28066
Federal Register / Vol. 73, No. 95 / Thursday, May 15, 2008 / Proposed Rules
under procedures described in the related
SORN or Subpart B of this Part.
(11) From subsection (g) to the extent that
the system is exempt from other specific
subsections of the Privacy Act relating to
individuals’ rights to access and amend their
records contained in the system. Therefore
DHS is not required to establish rules or
procedures pursuant to which individuals
may seek a civil remedy for the agency’s
refusal to amend a record; refusal to comply
with a request for access to records; failure
to maintain accurate, relevant, timely, and
complete records; or failure to otherwise
comply with an individual’s right to access
or amend records.
Hugo Teufel III,
Chief Privacy Officer.
[FR Doc. E8–10893 Filed 5–14–08; 8:45 am]
BILLING CODE 4410–10–P
DEPARTMENT OF HOMELAND
SECURITY
6 CFR Part 5
[Docket No. DHS–2007–0073]
Privacy Act of 1974: Implementation of
Exemptions; Maritime Awareness
Global Network (MAGNET)
Privacy Office, Office of the
Secretary, DHS.
ACTION: Notice of proposed rulemaking.
yshivers on PROD1PC62 with PROPOSALS
AGENCY:
SUMMARY: The Department of Homeland
Security is giving concurrent notice of a
revised and updated system of records
pursuant to the Privacy Act of 1974 for
the United States Coast Guard’s
Maritime Awareness Global Network
(MAGNET) system. In this proposed
rulemaking, the Department proposes to
exempt this system of records from one
or more provisions of the Privacy Act
because of criminal, civil, intelligence
and administrative enforcement
requirements.
DATES: Comments must be received on
or before June 16, 2008.
ADDRESSES: You may submit comments,
identified by DOCKET NUMBER DHS–
2007–0073 by one of the following
methods:
• Federal e-Rulemaking Portal:
https://www.regulations.gov. Follow the
instructions for submitting comments.
• Facsimile: 1–866–466–5370.
• Mail: Hugo Teufel III, Chief Privacy
Officer, Privacy Office, Department of
Homeland Security, Washington, DC
20528.
Instructions: All submissions received
must include the agency name and
docket number for this notice. All
comments received will be posted
without change to https://
www.regulations.gov, including any
personal information provided.
VerDate Aug<31>2005
16:04 May 14, 2008
Jkt 214001
Docket: For access to the docket to
read background documents or
comments received, go to https://
www.regulations.gov.
FOR FURTHER INFORMATION CONTACT:
Department of Homeland Security
United States Coast Guard (MAGNET
Executive Agent), Intelligence Division
(CG–26), 2100 2nd Street, SW.,
Washington, DC 20593–0001; Hugo
Teufel III, Chief Privacy Officer, Privacy
Office, Department of Homeland
Security, Washington, DC 20528;
telephone 703–235–0780.
SUPPLEMENTARY INFORMATION:
Background
Elsewhere in today’s Federal Register,
the Department of Homeland Security
(DHS) is publishing a Privacy Act
system of records notice DHS/USCG–
061 Maritime Awareness Global
Network (MAGNET). These records
were previously covered by a legacy
system of records, Department of
Transportation DOT/CG 642 System of
Records Notice known as Joint Maritime
Information Element, JMIE, Support
System, JSS (67 FR 19475). When fully
operational, MAGNET will replace and
enhance JMIE/JSS by adding additional
data sources, media storage, access
capabilities, and infrastructure.
MAGNET will provide rapid, near realtime data to the Coast Guard and other
authorized organizations both within
and outside DHS with a need to know
the information.
The information in MAGNET
establishes Maritime Domain
Awareness. Maritime Domain
Awareness is the collection of as much
information as possible about the
maritime world. In other words,
MAGNET establishes a full awareness of
the entities (people, places, things) and
their activities within the maritime
industry. MAGNET collects the
information and connects the
information in order to fulfill this need.
Coast Guard Intelligence (through
MAGNET) will provide awareness to the
field as well as to strategic planners by
aggregating data from existing sources
internal and external to the Coast Guard
or DHS. MAGNET will correlate and
provide the medium to display
information such as ship registry,
current ship position, crew background,
passenger lists, port history, cargo,
known criminal vessels, and suspect
lists. Coast Guard Intelligence (CG–2)
will serve as MAGNET’s executive agent
and will share appropriate aggregated
data to other law enforcement and
intelligence agencies.
The Privacy Act also allows
government agencies, as appropriate, to
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
exempt certain records from the access
and amendment provisions. Where an
agency seeks to claim an exemption,
however, it must issue a Notice of
Proposed Rulemaking to make clear to
the public the reasons why a particular
exemption is claimed. DHS is claiming
exemptions from certain requirements
of the Privacy Act by publication of this
proposed rule.
Accordingly, DHS proposes to exempt
this system, in part, from certain
provisions of the Privacy Act and to add
that exemption to Appendix C to Part 5,
DHS Systems of Records Exempt from
the Privacy Act. Coast Guard needs
these exemptions in order to protect
information relating to authorized
intelligence, counterterrorism,
homeland security, and related law
enforcement activities from disclosure
to subjects of investigations and others
who, by accessing or knowing this
information, could interfere with those
activities or otherwise place in jeopardy
the national or homeland security.
Specifically, the exemptions are
necessary in order to prevent revealing
information concerning intelligence,
counterterrorism, homeland security, or
related investigative efforts. Revealing
such information to the subject or other
individuals could reasonably be
expected to compromise ongoing efforts
of the Department to identify,
understand, analyze, investigate, and
counter the activities that threaten
national or homeland security;
compromise classified or other sensitive
information; identify a confidential
source or disclose information which
would constitute an unwarranted
invasion of another individual’s
personal privacy; reveal a sensitive
intelligence or investigative technique
or method, and interfere with
intelligence or law enforcement analytic
or investigative processes; or constitute
a potential danger to the health or safety
of intelligence, counterterrorism,
homeland security, and law
enforcement personnel, confidential
sources and informants, or potential
witnesses.
The exemptions proposed here are
standard law enforcement and national
security exemptions exercised by a large
number of federal law enforcement and
intelligence agencies.
Nonetheless, DHS will examine each
separate request on a case-by-case basis,
and, after conferring with the
appropriate component or agency, may
waive applicable exemptions in
appropriate circumstances and where it
would not appear to interfere with or
adversely affect the law enforcement or
national security purposes of the
E:\FR\FM\15MYP1.SGM
15MYP1
Agencies
[Federal Register Volume 73, Number 95 (Thursday, May 15, 2008)]
[Proposed Rules]
[Pages 28062-28066]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-10893]
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
6 CFR Part 5
[Docket No. DHS-2008-0003]
Privacy Act of 1974: Implementation of Exemptions; Law
Enforcement Information Database (LEIDB)/Pathfinder
AGENCY: Privacy Office, Office of the Secretary, DHS.
ACTION: Notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: The Department of Homeland Security is giving concurrent
notice of a system of records pursuant to the Privacy Act of 1974 for
the United States Coast Guard's Law Enforcement Information Data Base
(LEIDB)/ Pathfinder system. In this proposed rulemaking, the Department
proposes to exempt this system of records from one or more provisions
of the Privacy Act because of criminal, civil, intelligence and
administrative enforcement requirements.
[[Page 28063]]
DATES: Comments must be received on or before June 16, 2008.
ADDRESSES: You may submit comments, identified by DOCKET NUMBER DHS-
2008-0003 by one of the following methods:
Federal e-Rulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments.
Facsimile: 1-866-466-5370.
Mail: Hugo Teufel III, Chief Privacy Officer, Privacy
Office, Department of Homeland Security, Washington, DC 20528.
Instructions: All submissions received must include the agency name
and docket number for this notice. All comments received will be posted
without change to https://www.regulations.gov, including any personal
information provided.
Docket: For access to the docket to read background documents or
comments received, go to https://www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: Department of Homeland Security United
States Coast Guard (LEIDB/Pathfinder System Manager), Intelligence
Division (CG-262), 2100 2nd Street, SW., Washington, DC 20593-0001;
Hugo Teufel III, Chief Privacy Officer, Privacy Office, Department of
Homeland Security, Washington, DC 20528; telephone 703-235-0780.
SUPPLEMENTARY INFORMATION:
Background
Elsewhere in today's Federal Register, the Department of Homeland
Security (DHS) is publishing a Privacy Act system of records notice
DHS/USCG-061 LEIDB/Pathfinder.
In accordance with the Privacy Act of 1974, 5 U.S.C. 552a, the
Department of Homeland Security is establishing Law Enforcement
Information Data Base (LEIDB)/Pathfinder as a system to meet urgent
homeland security and law enforcement mission needs.
The Assistant Commandant for Intelligence and Criminal
Investigations (CG-2) identified a need to archive messages for more
than thirty (30) days and to be able to perform analysis of the data
contained within the messages to support law enforcement (LE) and
intelligence activities. Pathfinder was selected and implemented to
support the requirement. LEIDB is currently in limited operation. LEIDB
is receiving message traffic, however limitations on use of the data
are in place. Coast Guard policy restricts LEIDB queries to searches
that do not utilize U.S. Citizen or Lawful Permanent Resident Alien
PII. Once the SORN is approved and published, new instructions will be
published allowing PII searches.
LEIDB/Pathfinder is installed on the Secure Internet Protocol
Router Network (SIPRNET). LEIDB/Pathfinder contains both unclassified
and National Security Classified information. Message traffic
originating from federal agencies and managed on the Coast Guard
Message System (CGMS) or the Defense Message Systems (DMS) are moved to
the LEIDB/Pathfinder automatically and via personnel intervention with
e-mail.
Users of the system access LEIDB/Pathfinder data via a web browser
interface. The interface allows users to search for data using Boolean
searches that are run against the unstructured text in a message.
Messages contained in LEIDB/Pathfinder are not machine processed in any
fashion to enable data manipulation; they are not normalized or
correlated.
The Law Enforcement Information Database (LEIDB)/Pathfinder is a
historical repository of selected Coast Guard message traffic. LEIDB/
Pathfinder supports law enforcement intelligence activities. LEIDB/
Pathfinder users can query archived message traffic and link relevant
information across multiple data records within LEIDB/Pathfinder. Users
have system tools enabling the user to identify potential relationships
between information contained in otherwise unrelated documents. These
tools allow the analysts to build high precision and low return
queries, which minimize false hits and maximize analyst productivity
while working with unstructured, unformatted, free test documents.
The Privacy Act also allows government agencies, as appropriate, to
exempt certain records from the access and amendment provisions. Where
an agency seeks to claim an exemption, however, it must issue a Notice
of Proposed Rulemaking to make clear to the public the reasons why a
particular exemption is claimed. DHS is claiming exemptions from
certain requirements of the Privacy Act by publication of this proposed
rule.
Accordingly, DHS proposes to exempt this system, in part, from
certain provisions of the Privacy Act and to add that exemption to
Appendix C to Part 5, DHS Systems of Records Exempt from the Privacy
Act. Coast Guard needs these exemptions in order to protect information
relating to authorized intelligence, counterterrorism, homeland
security, and related law enforcement activities from disclosure to
subjects of investigations and others who, by accessing or knowing this
information, could interfere with those activities or otherwise place
in jeopardy the national or homeland security. Specifically, the
exemptions are necessary in order to prevent revealing information
concerning intelligence, counterterrorism, homeland security, or
related investigative efforts. Revealing such information to the
subject or other individual could reasonably be expected to compromise
ongoing efforts of the Department to identify, understand, analyze,
investigate, and counter the activities that threaten national or
homeland security; compromise classified or other sensitive
information; identify a confidential source or disclose information
which would constitute an unwarranted invasion of another individual's
personal privacy; reveal a sensitive intelligence or investigative
technique or method, and interfere with intelligence or law enforcement
analytic or investigative processes; or constitute a potential danger
to the health or safety of intelligence, counterterrorism, homeland
security, and law enforcement personnel, confidential sources and
informants, or potential witnesses.
The exemptions proposed here are standard law enforcement and
national security exemptions exercised by a large number of Federal law
enforcement and intelligence agencies. Nonetheless, DHS will examine
each separate request on a case-by-case basis, and, after conferring
with the appropriate component or agency, may waive applicable
exemptions in appropriate circumstances and where it would not appear
to interfere with or adversely affect the law enforcement or national
security purposes of the systems from which the information is
recompiled or in which it is contained.
Regulatory Requirements
A. Regulatory Impact Analyses
Changes to Federal regulations must undergo several analyses. In
conducting these analyses, DHS has determined:
1. Executive Order 12866 Assessment
This rule is not a significant regulatory action under Executive
Order 12866, ``Regulatory Planning and Review'' (as amended).
Accordingly, this rule has not been reviewed by the Office of
Management and Budget (OMB). Nevertheless, DHS has reviewed this
rulemaking, and concluded that there will not be any significant
economic impact.
2. Regulatory Flexibility Act Assessment
Pursuant to section 605 of the Regulatory Flexibility Act (RFA), 5
U.S.C. 605(b), as amended by the Small
[[Page 28064]]
Business Regulatory Enforcement and Fairness Act of 1996 (SBREFA), DHS
certifies that this rule will not have a significant impact on a
substantial number of small entities. The rule would impose no duties
or obligations on small entities. Further, the exemptions to the
Privacy Act apply to individuals, and individuals are not covered
entities under the RFA.
3. International Trade Impact Assessment
This rulemaking will not constitute a barrier to international
trade. The exemptions relate to criminal investigations and agency
documentation and, therefore, do not create any new costs or barriers
to trade.
4. Unfunded Mandates Assessment
Title II of the Unfunded Mandates Reform Act of 1995 (UMRA), (Pub.
L. 104-4, 109 Stat. 48), requires Federal agencies to assess the
effects of certain regulatory actions on State, local, and tribal
governments, and the private sector. This rulemaking will not impose an
unfunded mandate on State, local, or tribal governments, or on the
private sector.
B. Paperwork Reduction Act
The Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3501 et seq.)
requires that DHS consider the impact of paperwork and other
information collection burdens imposed on the public and, under the
provisions of PRA section 3507(d), obtain approval from the Office of
Management and Budget (OMB) for each collection of information it
conducts, sponsors, or requires through regulations. DHS has determined
that there are no current or new information collection requirements
associated with this rule.
C. Executive Order 13132, Federalism
This action will not have a substantial direct effect on the
States, on the relationship between the national Government and the
States, or on the distribution of power and responsibilities among the
various levels of government, and therefore will not have federalism
implications.
D. Environmental Analysis
DHS has reviewed this action for purposes of the National
Environmental Policy Act of 1969 (NEPA) (42 U.S.C. 4321-4347) and has
determined that this action will not have a significant effect on the
human environment.
E. Energy Impact
The energy impact of this action has been assessed in accordance
with the Energy Policy and Conservation Act (EPCA) Public Law 94-163,
as amended (42 U.S.C. 6362). This rulemaking is not a major regulatory
action under the provisions of the EPCA.
List of Subjects in 6 CFR Part 5
Freedom of information, Privacy, Sensitive information.
For the reasons stated in the preamble, DHS proposes to amend
Chapter I of Title 6, Code of Federal Regulations, as follows:
PART 5--DISCLOSURE OF RECORDS AND INFORMATION
1. The authority citation for part 5 continues to read as follows:
Authority: Pub. L. 107-296, 116 Stat. 2135, 6 U.S.C. 101 et
seq.; 5 U.S.C. 301. Subpart A also issued under 5 U.S.C. 552.
2. At the end of Appendix C to part 5, add the following new
section 7:
Appendix C to Part 5--DHS Systems of Records Exempt From the Privacy
Act
* * * * *
6. DHS/USCG-061, LEIDB/Pathfinder.
(a) Pursuant to 5 U.S.C. 552a(j)(2), (k)(1), and (k)(2) certain
records or information in the above mentioned system of records are
exempt from 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4);
(e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f), and (g).
These exemptions apply only to the extent that information in this
system is subject to exemption. Where compliance would not appear to
interfere with or adversely affect the intelligence,
counterterrorism, homeland security, and related law enforcement
purposes of this system, the applicable exemption may be waived by
DHS.
(b) Exemptions from the particular subsections are justified for
the following reasons:
(1) From subsection (c)(3) (Accounting for Disclosures) because
making available to a record subject the accounting of disclosures
from records concerning him/her would specifically reveal any
interest in the individual of an intelligence, counterterrorism,
homeland security, or related investigative nature. Revealing this
information could reasonably be expected to compromise ongoing
efforts of the Department to identify, understand, analyze,
investigate, and counter the activities of:
(i) Known or suspected terrorists and terrorist groups;
(ii) Groups or individuals known or believed to be assisting or
associated with known or suspected terrorists or terrorist groups;
(iii) Individuals known, believed to be, or suspected of being
engaged in activities constituting a threat to homeland security,
including (1) activities which impact or concern the security,
safety, and integrity of our international borders, including any
illegal activities that either cross our borders or are otherwise in
violation of the immigration or customs laws and regulations of the
United States; (2) activities which could reasonably be expected to
assist in the development or use of a weapon of mass effect; (3)
activities meant to identify, create, or exploit the vulnerabilities
of, or undermine, the ``key resources'' (as defined in section 2(9)
of the Homeland Security Act of 2002) and ``critical
infrastructure'' (as defined in 42 U.S.C. 5195c(c)) of the United
States, including the cyber and national telecommunications
infrastructure and the availability of a viable national security
and emergency preparedness communications infrastructure; (4)
activities detrimental to the security of transportation and
transportation systems; (5) activities which violate or are
suspected of violating the laws relating to counterfeiting of
obligations and securities of the United States and other financial
crimes, including access device fraud, financial institution fraud,
identity theft, computer fraud; and computer-based attacks on our
nation's financial, banking, and telecommunications infrastructure;
(6) activities, not wholly conducted within the United States, which
violate or are suspected of violating the laws which prohibit the
production, transfer, or sale of narcotics or substances controlled
in accordance with Title 21 of the United States Code, or those
associated activities otherwise prohibited by Titles 21 and 46 of
the United States Code; (7) activities which impact, concern, or
otherwise threaten the safety and security of the President and Vice
President, their families, heads of state, and other designated
individuals; the White House, Vice President's residence, foreign
missions, and other designated buildings within the United States;
(8) activities which impact, concern, or otherwise threaten domestic
maritime safety and security, maritime mobility and navigation, or
the integrity of the domestic maritime environment; (9) activities
which impact, concern, or otherwise threaten the national
operational capability of the Department to respond to natural and
manmade major disasters and emergencies, including acts of
terrorism; (10) activities involving the importation, possession,
storage, development, or transportation of nuclear or radiological
material without authorization or for use against the United States;
(iv) Foreign governments, organizations, or persons (foreign
powers); and
(v) Individuals engaging in intelligence activities on behalf of
a foreign power or terrorist group.
Thus, by notifying the record subject that he/she is the focus
of such efforts or interest on the part of DHS, or other agencies
with whom DHS is cooperating and to whom the disclosures were made,
this information could permit the record subject to take measures to
impede or evade such efforts, including the taking of steps to
deceive DHS personnel and deny them the ability to adequately assess
relevant information and activities, and could inappropriately
disclose to the record subject the sensitive methods and/or
confidential sources used to acquire the relevant information
against him/her. Moreover, where the record subject is the actual
target of a law enforcement investigation, this information could
permit
[[Page 28065]]
him/her to take measures to impede the investigation, for example,
by destroying evidence, intimidating potential witnesses, or
avoiding detection or apprehension.
(2) From subsection (c)(4) (Accounting for Disclosure, notice of
dispute) because certain records in this system are exempt from the
access and amendment provisions of subsection (d), this requirement
to inform any person or other agency about any correction or
notation of dispute that the agency made with regard to those
records, should not apply.
(3) From subsections (d)(1), (2), (3), and (4) (Access to
Records) because these provisions concern individual rights of
access to and amendment of records (including the review of agency
denials of either) contained in this system, which consists of
intelligence, counterterrorism, homeland security, and related
investigatory records concerning efforts of the Department, as
described more fully in subsection (b)(1), above. Compliance with
these provisions could inform or alert the subject of an
intelligence, counterterrorism, homeland security, or investigatory
effort undertaken on behalf of the Department, or by another agency
with whom DHS is cooperating, of the fact and nature of such
efforts, and/or the relevant intelligence, counterterrorism,
homeland security, or investigatory interest of DHS and/or other
intelligence, counterterrorism, or law enforcement agencies.
Moreover, compliance could also compromise sensitive information
either classified in the interest of national security, or which
otherwise requires, as appropriate, safeguarding and protection from
unauthorized disclosure; identify a confidential source or disclose
information which would constitute an unwarranted invasion of
another individual's personal privacy; reveal a sensitive
intelligence or investigative technique or method, including
interfering with intelligence or law enforcement investigative
processes by permitting the destruction of evidence, improper
influencing or intimidation of witnesses, fabrication of statements
or testimony, and flight from detection or apprehension; or
constitute a potential danger to the health or safety of
intelligence, counterterrorism, homeland security, and law
enforcement personnel, confidential sources and informants, and
potential witnesses. Amendment of the records would interfere with
ongoing intelligence, counterterrorism, homeland security, and law
enforcement investigations and activities, including incident
reporting and analysis activities, and impose an impossible
administrative burden by requiring investigations, reports, and
analyses to be continuously reinvestigated and revised.
(4) From subsection (e)(1) (Relevant and Necessary) because it
is not always possible for DHS to know in advance of its receipt the
relevance and necessity of each piece of information it acquires in
the course of an intelligence, counterterrorism, or investigatory
effort undertaken on behalf of the Department, or by another agency
with whom DHS is cooperating. In the context of the authorized
intelligence, counterterrorism, and investigatory activities
undertaken by DHS personnel, relevance and necessity are questions
of analytic judgment and timing, such that what may appear relevant
and necessary when acquired ultimately may be deemed unnecessary
upon further analysis and evaluation. Similarly, in some situations,
it is only after acquired information is collated, analyzed, and
evaluated in light of other available evidence and information that
its relevance and necessity can be established or made clear.
Constraining the initial acquisition of information included within
the LEIDB in accordance with the relevant and necessary requirement
of subsection (e)(1) could discourage the appropriate receipt of and
access to information which DHS and USCG are otherwise authorized to
receive and possess under law, and thereby impede efforts to detect,
deter, prevent, disrupt, or apprehend terrorists or terrorist
groups, and/or respond to terrorist or other activities which
threaten homeland security. Notwithstanding this claimed exemption,
which would permit the acquisition and temporary maintenance of
records whose relevance to the purpose of the LEIDB may be less than
fully clear, DHS will only disclose such records after determining
whether such disclosures are themselves consistent with the
published LEIDB routine uses. Moreover, it should be noted that, as
concerns the receipt by USCG, for intelligence purposes, of
information in any record which identifies a U.S. Person, as defined
in Executive Order 12333, as amended, such receipt, and any
subsequent use or dissemination of that identifying information, is
undertaken consistent with the procedures established and adhered to
by USCG pursuant to that Executive Order. Specifically, USCG
intelligence personnel may acquire information which identifies a
particular U.S. Person, retain it within or disseminate it from
LEIDB, as appropriate, only when it is determined that the
personally identifying information is necessary for the conduct of
USCG's functions, and otherwise falls into one of a limited number
of authorized categories, each of which reflects discrete activities
for which information on individuals would be utilized by the
Department in the overall execution of its statutory mission.
(5) From subsection (e)(2) (Collection of Information from
Individuals) because application of this provision could present a
serious impediment to counterterrorism or law enforcement efforts in
that it would put the subject of an investigation, study or analysis
on notice of that fact, thereby permitting the subject to engage in
conduct designed to frustrate or impede that activity. The nature of
counterterrorism, and law enforcement investigations is such that
vital information about an individual frequently can be obtained
only from other persons who are familiar with such individual and
his/her activities. In such investigations it is not feasible to
rely solely upon information furnished by the individual concerning
his own activities.
(6) From subsection (e)(3) (Notice to Subjects), to the extent
that this subsection is interpreted to require DHS to provide notice
to an individual if DHS or another agency receives or collects
information about that individual during an investigation or from a
third party. Should the subsection be so interpreted, exemption from
this provision is necessary to avoid impeding counterterrorism or
law enforcement efforts by putting the subject of an investigation,
study or analysis on notice of that fact, thereby permitting the
subject to engage in conduct intended to frustrate or impede that
activity.
(7) From subsections (e)(4)(G), (H) and (I) (Access), inasmuch
as it is unnecessary for the publication of rules and procedures
contemplated therein since the LEIDB, pursuant to subsections (2)
and (3), above, will be exempt from the underlying duties to provide
to individuals notification about, access to, and the ability to
amend or correct the information pertaining to them in, this system
of records. Furthermore, to the extent that subsection (e)(4)(I) is
construed to require more detailed disclosure than the information
accompanying the system notice for LEIDB, as published in today's
Federal Register, exemption from it is also necessary to protect the
confidentiality, privacy, and physical safety of sources of
information, as well as the methods for acquiring it. Finally,
greater specificity concerning the description of categories of
sources of properly classified records could also compromise or
otherwise cause damage to the national or homeland security.
(8) From subsection (e)(5) (Collection of Information) because
many of the records in this system coming from other system of
records are derived from other domestic and foreign agency record
systems and therefore it is not possible for DHS to vouch for their
compliance with this provision; however, the DHS has implemented
internal quality assurance procedures to ensure that data used in
its screening processes is as complete, accurate, and current as
possible. In addition, in the collection of information for law
enforcement and counterterrorism purposes, it is impossible to
determine in advance what information is accurate, relevant, timely,
and complete. With the passage of time, seemingly irrelevant or
untimely information may acquire new significance as further
investigation brings new details to light. The restrictions imposed
by (e)(5) would limit the ability of those agencies' trained
investigators and intelligence analysts to exercise their judgment
in conducting investigations and impede the development of
intelligence necessary for effective law enforcement and
counterterrorism efforts.
(9) From subsection (e)(8) (Notice on Individuals) because to
require individual notice of disclosure of information due to
compulsory legal process would pose an impossible administrative
burden on DHS and other agencies and could alert the subjects of
counterterrorism or law enforcement investigations to the fact of
those investigations then not previously known.
(10) From subsection (f) (Agency Rules) because portions of this
system are exempt from the access and amendment provisions of
subsection (d). Access to, and amendment of, system records that are
not exempt or for which exemption is waived may be obtained
[[Page 28066]]
under procedures described in the related SORN or Subpart B of this
Part.
(11) From subsection (g) to the extent that the system is exempt
from other specific subsections of the Privacy Act relating to
individuals' rights to access and amend their records contained in
the system. Therefore DHS is not required to establish rules or
procedures pursuant to which individuals may seek a civil remedy for
the agency's refusal to amend a record; refusal to comply with a
request for access to records; failure to maintain accurate,
relevant, timely, and complete records; or failure to otherwise
comply with an individual's right to access or amend records.
Hugo Teufel III,
Chief Privacy Officer.
[FR Doc. E8-10893 Filed 5-14-08; 8:45 am]
BILLING CODE 4410-10-P