Privacy Act of 1974: U.S. Immigration and Customs Enforcement, ICE Pattern Analysis and Information Collection (ICEPIC) System of Records, 48226-48231 [E8-19031]
Download as PDF
48226
Federal Register / Vol. 73, No. 160 / Monday, August 18, 2008 / Notices
not exceed 162 and groups will last
approximately 90 minutes.
• Case Study Key Informant
Interviews (7 versions). The Case Study
Key Informant Interviews (CSIs) include
7 qualitative interview versions: (1)
Administrator, (2) Counseling Staff, (3)
Coalition Member—Faculty, (4)
Prevention Staff, (5) Case Finder, (6)
Campus Police, and (7) Student Leader.
Local project staff will be responsible
for identifying appropriate respondents
for each CSI version and scheduling the
interview to occur during site visits by
the case study team. A total of 16
interviews will be conducted during
each campus site visit (a total of up to
192 interviews). The case study team
from Macro International Inc. will be
responsible for administering the
interviews and is trained in qualitative
interviewing. Sixteen individuals from
each of the campus sites will be selected
as key informants to participate in the
CSIs in the first and third stages of the
GLS Campus Case Studies, for a total of
64 respondents. Questions on the CSIs
include whether respondents are aware
of suicide prevention activities, what
the campus culture is related to suicide
prevention, and what specific efforts are
in place to prevent suicide among the
campus population. Items are formatted
as open-ended and semi-structured
questions. The CSIs include 16 to 21
items and will take approximately 60
minutes to complete. On the second site
visit, the case study team will
incorporate preliminary findings from
the case studies in the interviews,
which may be modified to some extent
to collect more comprehensive
information and gather feedback from
local key informants surrounding the
context of the preliminary findings. The
CSIs for the second site visit will last 60
minutes.
The average annual respondent
burden is estimated below. This project
is scheduled to be completed in 12
months; thus, the table reflects the total
burden for one year, the project length.
The estimate reflects the total annual
respondents for the project (at which
time the CCS would conclude), the
average annual number of respondents,
the average annual number of responses,
the time it will take for each response,
and the average burden.
TOTAL AND ANNUAL AVERAGES: RESPONDENTS, RESPONSES AND HOURS
Number of
respondents
Measure name
Number of
responses per
respondent
Hours/response
Response
burden
Enhanced Module ..........................................................................................
Focus Group—Student Version .....................................................................
Focus Group—Faculty Version .....................................................................
Focus Group—Staff Version ..........................................................................
Interview—Student Leader Version ...............................................................
Interview—Case Finder Version ....................................................................
Interview—Faculty Version ............................................................................
Interview—Campus Police Version ...............................................................
Interview—Counseling Staff Version .............................................................
Interview—Prevention Staff Version ..............................................................
Interview—Administrator Version ..................................................................
1200
324
108
54
12
6
12
12
12
18
12
1
1
1
1
1
1
1
1
1
1
1
0.17
1.5
1.5
1.5
1
1
1
1
1
1
1
204
486
162
81
12
6
12
12
12
18
12
Total ........................................................................................................
590
........................
..........................
1317
Send comments to Summer King,
SAMHSA Reports Clearance Officer,
Room 7–1044, One Choke Cherry Road,
Rockville, MD 20857 and e-mail her a
copy at summer.king@samhsa.hhs.gov.
Written comments should be received
within 60 days of this notice.
Dated: August 11, 2008.
Elaine Parry,
Acting Director, Office of Program Services.
[FR Doc. E8–19071 Filed 8–15–08; 8:45 am]
BILLING CODE 4162–20–P
DEPARTMENT OF HOMELAND
SECURITY
Office of the Secretary
sroberts on PROD1PC70 with NOTICES
[Docket No. DHS–2008–0072]
Privacy Act of 1974: U.S. Immigration
and Customs Enforcement, ICE Pattern
Analysis and Information Collection
(ICEPIC) System of Records
AGENCY:
Privacy Office, DHS.
VerDate Aug<31>2005
16:50 Aug 15, 2008
Jkt 214001
Modification to an existing
system of records.
ACTION:
SUMMARY: U.S. Immigration and
Customs Enforcement (ICE) is republishing the system of records notice
(SORN) for the ICE Pattern Analysis and
Information Collection (ICEPIC) system
to address comments received through
the Federal Register comment
procedure. A minor change has been
made to the SORN to update the contact
point for individual requests for access
to and amendment of records in the
system and to propose a new routine
use for investigation and remediation of
any loss or compromise of personal data
from the system, should such a loss or
compromise occur.
On January 30, 2008, ICE originally
established this system of records and
published the SORN and associated
proposed rulemaking in the Federal
Register, 73 FR 5577 and 73 FR 5460
(Jan. 30, 2008). ICE received and
considered the public comments, all of
which were generally in favor of the
system and the proposed rule. In light
of the comments received, ICE
PO 00000
Frm 00040
Fmt 4703
Sfmt 4703
concluded that no changes to the SORN
are warranted at this time other than the
proposed addition of a new routine use
and to update the contact point for
requests to access and correct system
records. A final rulemaking is also
published in this issue of the Federal
Register in which the Department
exempts portions of this system of
records from one or more provisions of
the Privacy Act because of criminal,
civil, and administrative enforcement
requirements.
DATES: The established system of
records was effective as of February 29,
2008, based upon the prior ICEPIC
system of records notice published on
January 30, 2008. Comments are being
solicited on the new routine use
proposed in this notice. Written
comments must be submitted on or
before September 17, 2008. The new
routine use will be effective September
17, 2008.
ADDRESSES: You may submit comments,
identified by docket number DHS–
2008–0072 by one of the following
methods:
E:\FR\FM\18AUN1.SGM
18AUN1
Federal Register / Vol. 73, No. 160 / Monday, August 18, 2008 / Notices
• Federal e-Rulemaking Portal:
https://www.regulations.gov. Follow the
instructions for submitting comments.
• Fax: 1–866–466–5370.
• Mail: Hugo Teufel III, Chief Privacy
Officer, Privacy Office, Department of
Homeland Security, Washington, DC
20528.
• Instructions: All submissions
received must include the agency name
and docket number for this rulemaking.
All comments received will be posted
without change to https://
www.regulations.gov, including any
personal information provided.
• Docket: For access to the docket, to
read background documents, or
comments received go to https://
www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: Lyn
Rahilly, Privacy Officer, (202–514–
1900), U.S. Immigration and Customs
Enforcement, 425 I Street, NW.,
Washington, DC 20536, e-mail:
ICEPrivacy@dhs.gov, or Hugo Teufel III
(703–235–0780), Chief Privacy Officer,
Privacy Office, U.S. Department of
Homeland Security, Washington, DC
20528.
sroberts on PROD1PC70 with NOTICES
SUPPLEMENTARY INFORMATION:
I. Background
Part of ICE’s mission is to investigate
possible violations of U.S. immigration
law. Many times this involves hours of
analysis regarding a particular case or
operation. As part of the investigative
process analysts must identify and
understand the relationships among
individuals, places, and items that are
the subject of investigation.
The ICEPIC Tool builds on earlier ICE
initiatives to verify the identity of
Special Interest Aliens (SIAs), as
designated by the Department of State.
In 2003 ICE implemented the National
Security Entry Exit Registration System
(NSEERS) to manage the growing
collection of over 500,000 SIA records.
National and international terrorist
threats in the 2004 and 2005 timeframe
resulted in ICE reviewing not only the
SIA records in NSEERS, but also the
records of aliens registered with the
Student and Exchange Visitor
Information System (SEVIS) and entered
into the United States Visitor and
Immigrant Status Indicator Technology
(US VISIT) system as well. Since 2005,
ICE’s expanding law enforcement role
has demanded increasingly
sophisticated tools to detect potential
violations of immigration and criminal
law and terrorist threats.
ICE analyzes relationships among
individuals using conventional database
queries and link analysis tools;
however, traditional link analysis tools
VerDate Aug<31>2005
16:50 Aug 15, 2008
Jkt 214001
rely on the consistency of key data, such
as names and addresses, to establish
relationships. If the source data is of
poor quality or an individual seeks to
conceal his/her identity through
intentional, but subtle, changes to
names, addresses, and other biographic
information, then conventional tools are
less effective at recognizing
relationships. As a result, investigators
and analysts may miss important
relationships among suspects, family
members, other associates,
organizations, addresses, and vehicles.
ICEPIC allows ICE law enforcement
agents and analysts to look for nonobvious relationship patterns among
individuals and organizations that are
indicative of violations of the customs
and immigration laws that are enforced
by DHS agencies, as well as possible
terrorist threats and plots. From these
relationships, ICE agents can develop
specific leads and law enforcement
intelligence for active and new
investigations. Identified relationships
can also be recorded for reuse in
subsequent investigative analyses. The
information processed by ICEPIC comes
from existing ICE investigative and
apprehension records systems, as well
as immigration and alien admission
records systems. All ICEPIC activity is
predicated on ongoing and valid law
enforcement investigations.
ICEPIC includes capabilities that
assist investigators to record results of
analyses performed in support of
investigations and to capture additional
relevant information obtained from
outside sources. The information
collected by, on behalf of, in support of,
or in cooperation with DHS and its
components may contain personally
identifiable information collected by
other Federal, state, local, tribal, foreign,
or international government agencies or
organizations.
ICEPIC assists ICE investigators by
automating five business processes:
A. Analysis of leads, law enforcement
and intelligence reports, referrals, and
processing of queries of ICE and DHS
information to locate relevant records
and produce reports;
B. Integration and resolution of
information from multiple ICE and DHS
databases to provide leads for law
enforcement investigations and
disruption of potential terrorist
activities;
C. Initiation of analyses that support
investigative cases in DHS and field
offices and recording the results of
beneficial analyses;
D. Production and dissemination of
target indicator profiles and other law
enforcement intelligence; and
PO 00000
Frm 00041
Fmt 4703
Sfmt 4703
48227
E. Management of analysis workflows
and information resources.
Information that is produced or
maintained by ICEPIC is used by ICE
agents in headquarters and field offices
to identify potential violations of
customs or immigration law, confirm
suspected violations, or investigate
potential terrorist threats. ICEPIC is
used to identify relationships among
different individuals or among records
for the same individual from multiple
sources when an individual or
individuals have been identified as
subjects, leads, or associates in an
investigative case. In cases where DHS
determines that the information would
assist in the enforcement of civil or
criminal laws, ICE may share the
information with the appropriate
Federal, State, local, tribal, or foreign
governmental agencies or multilateral
governmental organizations.
Information may also be used by
national intelligence community
agencies where analysis of the records
indicates a potential or confirmed threat
of terrorist activity justifying further
analysis or investigation. ICE may also
share this information with the FBI
when ICE becomes aware of information
that may be related to an individual in
the Terrorist Screening Database.
The Department of Justice (DOJ) and
other Federal agencies may use reports
generated through ICEPIC in the review,
settlement, and prosecution of claims,
complaints, and lawsuits involving
matters over which ICE exercises
jurisdiction or when conducting
litigation or in proceedings before any
court, adjudicative, or administrative
body. This includes any litigation
matters where ICE, DOJ, or an employee
in his or her official capacity in support
of ICE, the United States, or any agency
thereof is involved.
For a more detailed description of the
origin and purpose of this system and
its functionality, the Privacy Impact
Assessment published at https://
www.dhs.gov/privacy (follow link to
‘‘privacy impact assessments.’’).
Because ICEPIC contains information
that relates to official DHS national
security, law enforcement, immigration,
and intelligence activities and is used in
support of those activities, the
Department published a proposed
rulemaking seeking to exempt the
ICEPIC system of records from various
provisions of the Privacy Act, including
the requirement that individuals be
provided access to and correction of
their own records. These exemptions are
permitted by the Privacy Act and are
needed to protect information relating to
DHS law enforcement or intelligence
activities from disclosure to subjects or
E:\FR\FM\18AUN1.SGM
18AUN1
48228
Federal Register / Vol. 73, No. 160 / Monday, August 18, 2008 / Notices
sroberts on PROD1PC70 with NOTICES
others related to these activities. For a
complete discussion of the specific
exemptions proposed and the reasons
they were claimed, please see the notice
of proposed rulemaking in the Federal
Register, 73 FR 5577 (Jan. 30, 2008). A
final rulemaking is published
concurrently to this notice in this issue
of the Federal Register.
Public Comments
In the January 30, 2008 publication of
the ICEPIC SORN, the Department
requested public comments on the
SORN and the proposed rulemaking.
ICE received and considered the public
comments, which are discussed further
below, and concluded that no
substantive changes to the SORN are
warranted at this time. However, ICE is
updating the SORN to change the
contact information for submission of
requests to access and amend records in
this system.
Six comments were received. While
all comments were in favor of the
proposed rule, two commenters also
raised specific concerns related to this
system of records. Those concerns are
addressed below.
One commenter expressed concern
that individuals would be unable to
ensure their personal information in
ICEPIC is accurate unless they are
permitted access to their records. Other
means exist to verify the accuracy of
ICEPIC data and ensure that incorrect
data are not used to prejudice that
individual. ICEPIC users are trained to
verify information obtained from ICEPIC
before including it in analytical reports
that will be used during investigations
or shared with government personnel
outside of ICE. Verification procedures
include direct queries to the source
databases from which ICEPIC originally
obtained the information, queries of
commercial or other government
databases, and ICE agent interviews
with individuals or others who are in a
position to confirm the ICEPIC data.
These procedures mitigate the risk
posed by inaccurate data in the system
and raise the probability that such data
will be identified and corrected before
any action is taken that would prejudice
an individual. In addition, the source
systems from which ICEPIC obtains
information may, themselves, have
mechanisms in place to ensure the
accuracy of the data prior to the
information being accessed through
ICEPIC.
Another commenter, while in favor of
the system, expressed concerns as
follows:
‘‘By limiting access to a small number of
people, power and responsibility may be
monopolized in the hands of some who are
VerDate Aug<31>2005
16:50 Aug 15, 2008
Jkt 214001
never given a system of checks and balances
over their power. The only other concern that
I have is that, as domestic and international
security policies and concerns shift over
time, this proposed rule change will be
stagnant. I would propose then that this rule
be revisited in the coming years as security
threats continue to fluctuate.’’
To ensure the system contains
appropriate checks and balances to
oversee those who have access to
ICEPIC information, ICE has established
appropriate controls and safeguards that
provide oversight of authorized ICEPIC
users. All user activity is audited and
subject to periodic review to identify
unauthorized use or activity. ICE
investigates instances of unauthorized
or inappropriate access or use of the
system and takes appropriate
disciplinary actions where violations
have occurred.
The commenter also recommended a
review of this system in the future
because ‘‘security threats continue to
fluctuate.’’ ICE and DHS continue to
exercise diligence in the response to the
evolving threat environment. Should
there be a need to substantially alter this
system in the future, similar public
notice and an opportunity to comment
will be provided.
Proposed Routine Use
ICE is proposing to include a new
routine use to support the investigation
and remediation of any suspected or
confirmed compromise of personal data
from the system (i.e., a ‘‘data breach’’).
This routine use would allow ICE to
share information with other agencies,
entities, contractors, or individuals for
the purpose of supporting ICE’s efforts
to respond to the suspected or
confirmed compromise and prevent,
minimize, or remedy any risk of harm.
ICE is soliciting comments on this
proposed routine use pursuant to 5
U.S.C. 552a(e)(11).
II. Privacy Act
The Privacy Act embodies fair
information principles in a statutory
framework governing the means by
which the United States Government
collects, maintains, uses, and
disseminates personally identifiable
information. The Privacy Act applies to
information that is maintained in a
‘‘system of records.’’ A ‘‘system of
records’’ is a group of any records under
the control of an agency from which
information is retrieved by the name of
the individual or by some identifying
number, symbol, or other particular
assigned to the individual. Individuals
may request access to their own records
that are maintained in a system of
records in the possession or under the
PO 00000
Frm 00042
Fmt 4703
Sfmt 4703
control of the Department by complying
with the Department’s Privacy Act
regulations, 6 CFR part 5.21 and DHS
will review each request on a case-bycase basis in light of exemptions taken
by ICEPIC.
The Privacy Act requires each agency
to publish in the Federal Register a
description of the type and character of
each system of records that the agency
maintains, and the routine uses that are
contained in each system in order to
make agency record keeping practices
transparent, to notify individuals
regarding the uses to which personally
identifiable information is put, and to
assist individuals in finding such files
within the agency. In accordance with 5
U.S.C. 552a(r), the Department has
provided a report of this revised system
of records to the Office of Management
and Budget and to the Congress.
SYSTEM OF RECORDS:
DHS–ICE–002.
SYSTEM NAME:
ICE Pattern Analysis and Information
Collection.
SECURITY CLASSIFICATION:
Sensitive But Unclassified.
SYSTEM LOCATION:
U.S. Department of Homeland
Security Immigration and Customs
Enforcement Headquarters data facilities
are located in the Virginia suburbs of
Washington, DC, with continuity of
operations sites in remote locations
within the continental United States.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
A. Individuals or entities who are
associated with investigations,
inspections, apprehensions, detentions,
patrols, removals, examinations,
naturalizations, intelligence production,
legal proceedings, or other operations
that implement and enforce the
Immigration and Nationality Act (INA)
(8 U.S.C. 1101 et seq.) and related
treaties, statutes, orders, and
regulations.
B. Individuals or entities who are
associated with investigations,
inspections, apprehensions, detentions,
law enforcement intelligence
production, legal proceedings or other
operations that implement and enforce
immigration- and customs-related laws,
specifically those found in Titles 8, 19,
and 31 of the United States Code.
C. Individuals who are respondents,
representatives, or witnesses in
administrative, civil penalty, or
forfeiture proceedings, or defendants,
representatives or witnesses in criminal
prosecution or extradition proceedings
E:\FR\FM\18AUN1.SGM
18AUN1
Federal Register / Vol. 73, No. 160 / Monday, August 18, 2008 / Notices
under immigration or customs-related
laws or regulations.
D. Associates of the above individuals
and entities who are sources of
information relevant to an investigation.
E. Individuals wanted by other law
enforcement agencies, including
Federal, State, local, tribal, foreign and
international, or individuals who are the
subject of inquiries, lookouts, or notices
by another agency or a foreign
government.
F. Individuals, including U.S.
Citizens, Lawful Permanent Residents,
immigrants and non-immigrants who
apply for immigration benefits and/or
any form of automated or other
expedited inspection for verifying
eligibility to cross the borders into the
United States.
G. Non-United States citizens and
Non-Lawful Permanent Residents who
present themselves for entry into and/or
exit from the United States, including
individuals subject to the requirements
and processes of US–VISIT. Individuals
covered under US–VISIT include those
who are not United States citizens at the
time of entry or exit or who are United
States citizens or Lawful Permanent
Residents who have not identified
themselves as such at the time of entry
or exit.
H. Individuals unlawfully present in
the United States to include persons
who have failed to maintain a valid
immigration status as well as persons
who are otherwise unlawfully present in
the United States.
I. Nationals of countries that threaten
to wage war, or are at war with the
United States, and individuals required
to register as agents of foreign
governments in the United States.
sroberts on PROD1PC70 with NOTICES
CATEGORIES OF RECORDS IN THE SYSTEM:
Records come directly from
information collected from individuals
during DHS or federal enforcement
encounters, from information provided
by individuals when applying for U.S.
immigration benefits or temporary
admission to the U.S., or from persons
entering or leaving the U.S. Analyzed
records include biographical data;
biometric identifiers, including
fingerprints and photographs; and
information or data related to the
individual subject’s case, including
immigration history, alien registration,
and other identification or record
numbers. The system maintains records
used to show relationships across all
categories of records. These records
include:
A. Information collected from
individuals during a DHS enforcement
encounter or investigation, including,
but not limited to: Names, aliases, dates
VerDate Aug<31>2005
16:50 Aug 15, 2008
Jkt 214001
of birth, phone numbers, addresses,
nationality, identification numbers such
as A-File Number, Social Security
Number, or driver’s license number, and
physical characteristics. This
information is maintained in the
Treasury Enforcement Communications
System (TECS), last published October
18, 2001, 66 FR 52984 and in the DHS
Enforcement Operational Immigration
Records (ENFORCE) system, last
published DHS/ICE–CBP–CIS–001–03,
ENFORCE/IDENT March 20, 2006, 71
FR 13987;
B. Information collected about
individuals during a DHS enforcement
encounter or investigation, or provided
by other State, local, tribal Federal, or
foreign law enforcement or other
relevant agencies, including, but not
limited to: Names, aliases, nationality,
dates of birth, phone numbers,
addresses, affiliations, identification
numbers such as A–File Number, Social
Security Number, or driver’s license
number, or physical characteristics.
This information is maintained in TECS;
C. Biographic information such as
names, aliases, dates of birth, phone
numbers, addresses, nationality,
identification numbers such as A–File
Number, Social Security Number, or
driver’s license number, and
immigration violation information
obtained from the DHS ENFORCE or
successor systems;
D. Biographic information such as
names, aliases, dates of birth, phone
numbers, addresses, nationality,
identification numbers such as A–File
Number, Social Security Number, or
driver’s license number, and descriptive
information obtained from U.S.
Citizenship and Immigration Services
(USCIS) immigration benefits
applications and application review
findings;
E. Information obtained from other
Federal or foreign law enforcement
agencies about individuals known or
reasonably suspected to be or to have
been engaged in conduct constituting, in
preparation for, in aid of, or related to
terrorism;
F. Biographic information and other
information such as name, address, and
phone number obtained from
commercial data providers for
individuals identified as prospective
leads or suspects in active
investigations; and
G. Biographic information such as
names, aliases, dates of birth, phone
numbers, addresses, nationality,
identification numbers such as A–File
Number, Social Security Number, or
driver’s license number, and descriptive
information obtained from U.S. Customs
and Border Protection (CBP) encounters
PO 00000
Frm 00043
Fmt 4703
Sfmt 4703
48229
at Ports of Entry during border
crossings.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301; 8 U.S.C. 1103; 8 U.S.C.
1225(d)(3); 8 U.S.C. 1324(b)(3); 8 U.S.C.
1357(a); 8 U.S.C. 1360(b); 19 U.S.C. 1;
and 19 U.S.C. 1509.
PURPOSE:
The purpose of the ICEPIC system is
to provide the information technology
infrastructure products and services that
enable investigators and analysts within
ICE and other DHS components to
recognize non-obvious person, address,
and organizational relationships within
existing DHS records systems, and to
develop timely, actionable leads needed
to accomplish ICE law enforcement and
counter-terrorism mission objectives.
All ICEPIC activity is predicated on
ongoing and valid law enforcement
investigations. Current manual and
automated processes for research,
collation, organization, validation, and
analysis of the information in numerous
DHS alien registration, entry,
intelligence, lookout, and enforcement
systems can accomplish similar
objectives, but are cumbersome, timeconsuming, and error-prone. ICEPIC
will provide a reliable, responsive, and
secure system to support production of
actionable leads and law enforcement
intelligence for DHS components and
other Federal entities, as appropriate
and in conformance with this system of
records notice.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
THE PURPOSES OF SUCH USES:
In addition to those disclosures
generally permitted under the Privacy
Act, 5 U.S.C. 552a(b), all or a portion of
the records or information contained in
this system may be disclosed to
authorized entities, as is determined to
be relevant and necessary, outside DHS
as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
A. To the Department of Justice (DOJ)
or other Federal agency in the review,
settlement, defense, and prosecution of
claims, complaints, and lawsuits
involving matters over which ICE
exercises jurisdiction, or when
conducting litigation or in proceedings
before any court, adjudicative or
administrative body, when: (a) DHS; or
(b) any employee of DHS in his/her
official capacity; or (c) any employee of
ICE in his/her individual capacity,
where DOJ or DHS has agreed to
represent the employee; or (d) the
United States, or any agency thereof, is
a party to the litigation or has an interest
in such litigation, and DHS determines
E:\FR\FM\18AUN1.SGM
18AUN1
sroberts on PROD1PC70 with NOTICES
48230
Federal Register / Vol. 73, No. 160 / Monday, August 18, 2008 / Notices
that the records are both relevant and
necessary to the litigation and the use of
such records is compatible with the
purpose for which DHS collected the
records.
B. To appropriate Federal, State, local,
tribal, or foreign governmental agencies
or multilateral governmental
organizations responsible for
investigating or prosecuting the
violations of, or for enforcing or
implementing, a statute, rule,
regulation, order, license, or treaty
where DHS determines that the
information would assist in the
enforcement of domestic and foreign
civil or criminal laws.
C. To U.S. agencies of the national
intelligence community or through
established liaison channels to selected
foreign governments where analysis of
the records indicates a potential or
confirmed threat of terrorist activity
justifying further analysis or
investigation.
D. To an agency, organization, or
individual for the purpose of performing
audit or oversight operations as
authorized by law, but only such
information as is necessary and relevant
to such audit or oversight function.
Those provided information under this
routine use are subject to the same
Privacy Act limitations as are applicable
to DHS officers and employees.
E. To the National Archives and
Records Administration (NARA) or
other Federal agencies pursuant to
records management inspections being
conducted under the authority of 44
U.S.C. 2904 and 2906.
F. To contractors and their agents,
grantees, experts, consultants, and
others performing or working on a
contract, service, grant, cooperative
agreement, or other assignment for DHS,
when necessary to accomplish an
agency function related to this system of
records. Those provided information
under this routine use are subject to the
same Privacy Act limitations as are
applicable to DHS officers and
employees.
G. To appropriate Federal, State,
tribal, local, or foreign law enforcement,
intelligence, and regulatory agencies,
foreign governments, and international
law enforcement organizations, for
example: the Department of Defense; the
Department of State; the Department of
the Treasury; the Central Intelligence
Agency; the Selective Service System;
the United Nations; and INTERPOL; as
well as to other individuals and
organizations during the course of an
investigation by DHS or the processing
of a matter under DHS’s jurisdiction, or
during a proceeding within the purview
of the immigration and nationality laws,
VerDate Aug<31>2005
16:50 Aug 15, 2008
Jkt 214001
when DHS deems that such disclosure
is necessary to elicit information
required to accomplish the purposes
described in this paragraph.
H. To an appropriate Federal, State,
tribal, local, or foreign government
agency or organization, or international
organization, lawfully engaged in
collecting law enforcement intelligence,
whether civil or criminal, or charged
with investigating, prosecuting,
enforcing or implementing civil or
criminal laws, related rules, regulations
or orders, to enable these entities to
carry out their law enforcement
responsibilities, including the collection
of law enforcement intelligence, but
only when the disclosure is appropriate
to the proper performance of the official
duties of the person receiving the
disclosure.
I. To an appropriate Federal, State,
local, tribal, or foreign government
agency, international organization, or
private organization where the President
or the Secretary of the Department of
Homeland Security has declared an
event to be a National Special Security
Event, if the information is relevant and
necessary to a requesting agency’s
decision concerning the hiring or
retention of an individual, or issuance
of a security clearance, license, contract,
grant, or other benefit, or if the
information is relevant and necessary to
a DHS decision concerning the hiring or
retention of an employee, the issuance
of a security clearance, the reporting of
an investigation of an employee, the
letting of a contract, or the issuance of
a license, grant or other benefit, but only
when disclosure is appropriate to the
proper performance of the official duties
of the person making the request, and;
J. To appropriate agencies, entities,
and persons when (1) DHS suspects or
has confirmed that the security or
confidentiality of information in the
system of records has been
compromised; (2) DHS has determined
that as a result of the suspected or
confirmed compromise there is a risk of
harm to economic or property interests,
identity theft or fraud, harm to the
security or integrity of this system or
other systems or programs (whether
maintained by DHS or another agency or
entity) that rely upon the compromised
information, or harm to the individual;
and (3) the disclosure made to such
agencies, entities, and persons is
reasonably necessary to assist in
connection with DHS’s efforts to
respond to the suspected or confirmed
compromise and prevent, minimize, or
remedy such harm.
PO 00000
Frm 00044
Fmt 4703
Sfmt 4703
DISCLOSURE TO CONSUMER REPORTING
AGENCIES:
None.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records are stored electronically at
one or more ICE data centers that are
located in secure facilities. The records
are stored on magnetic disc, tape, digital
media, and optical media, and may also
be retained in hard copy format in
secured file folders.
RETRIEVABILITY:
Data are retrievable by an individual’s
name, Social Security Number, A–File
Number, or other unique identifier, as
well as by non-identifying information
such as address or date of entry into the
United States.
SAFEGUARDS:
Information in this system is
safeguarded in accordance with
applicable laws and policies, including
the DHS information technology
security policies and the Federal
Information Security Management Act
(FISMA). All records are protected from
unauthorized access through
appropriate administrative, physical,
and technical safeguards. These
safeguards include restricting access to
authorized personnel who have a needto-know, using locks, and password
protection features. The system is also
protected through a multi-layer security
approach. The protective strategies are
physical, technical, administrative and
environmental in nature, which provide
access control to sensitive data, physical
access control to DHS facilities,
confidentiality of communications,
authentication of sending parties, and
personnel screening to ensure that all
personnel with access to data are
screened through background
investigations commensurate with the
level of access required to perform their
duties. The system also maintains a realtime auditing log of individuals who
access and update the system. Audit
logs are reviewed and analyzed for
unauthorized and inappropriate system
usage. DHS will investigate instances of
unauthorized or inappropriate access or
use of the system and take appropriate
disciplinary actions where violations
have occurred.
RETENTION AND DISPOSAL:
The National Archives Records
Administration has not yet approved a
retention schedule for this system of
records. Because a history of Federal
law enforcement interactions with
E:\FR\FM\18AUN1.SGM
18AUN1
Federal Register / Vol. 73, No. 160 / Monday, August 18, 2008 / Notices
persons and organizations is essential to
detecting criminal and terrorist patterns
of behavior and locating leads in current
investigations, ICE has proposed to
retain records in ICEPIC for ten (10)
years from ICE’s last use of the
individual’s data, and then archive the
information for an additional five (5)
years. After the five (5) year period,
information will be destroyed unless it
has become relevant to a legal action, at
which point the retention schedule
would reset.
SYSTEM MANAGER(S) AND ADDRESS:
Unit Chief, Program Management
Oversight, Mission Support, Office of
Investigations, U.S. Immigration and
Customs Enforcement, 425 I Street,
NW., Washington, DC 20536, telephone:
(202) 307–6201.
NOTIFICATION PROCEDURES:
Pursuant to 5 U.S.C. 552a(j) and (k),
this system of records may not be
accessed by members of the public for
purposes of determining if the system
contains a record pertaining to a
particular individual. Nonetheless
persons may seek access to records
maintained in ICEPIC as outlined in the
Record Access Procedures section
below. Requests for such access will be
reviewed on a case-by-case basis.
RECORD ACCESS PROCEDURES:
ICEPIC is exempt from record access
procedures pursuant to 5 U.S.C. 552a(j)
and (k). Nonetheless persons may seek
access to records maintained in ICEPIC
by contacting U.S. Immigration and
Customs Enforcement Freedom of
Information Act Office, 800 North
Capitol Street, NW., Room 585,
Washington, DC 20536. Individuals
must submit their request and use the
form found at https://www.ice.gov/
doclib/g-639.pdf. Requests for such
access will be reviewed on a case-bycase basis to ensure that the records
meet the requirements set out by the
Privacy Act.
CONTESTING RECORD PROCEDURES:
This system is exempt from 5 U.S.C.
552a(c)(3), (d), (e)(1), (e)(4) (G) and (H),
and (f) pursuant to 5 U.S.C. 552a(j)(2),
(k)(2); however, requests for amendment
of records may be reviewed on a caseby-case basis. Follow the ‘‘Record
Access Procedures’’ noted above.
sroberts on PROD1PC70 with NOTICES
RECORD SOURCE CATEGORIES:
Information contained in the system
is obtained from DHS investigators,
other DHS law enforcement officers,
other Federal, State, foreign and tribal
law enforcement and intelligence
agencies, public records, commercial
VerDate Aug<31>2005
16:50 Aug 15, 2008
Jkt 214001
data aggregators, and immigration and
alien admission records systems.
EXEMPTIONS CLAIMED FOR THE SYSTEM:
Pursuant to exemption 5 U.S.C.
552a(j)(2) of the Privacy Act, portions of
this system are exempt from 5 U.S.C.
552a(c)(3) and (4); (d); (e)(1), (e)(2),
(e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and
(e)(8); (f), and (g). Pursuant to 5 U.S.C.
552a(k)(2), this system is exempt from
the following provisions of the Privacy
Act, subject to the limitations set forth
in those subsections: 5 U.S.C. 552a(c)(3),
(d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). In
addition, to the extent a record contains
information from other exempt systems
of records, ICE will rely on the
exemptions claimed for those systems.
Dated: August 11, 2008.
Hugo Teufel III,
Chief Privacy Officer, Department of
Homeland Security.
[FR Doc. E8–19031 Filed 8–15–08; 8:45 am]
BILLING CODE 4410–10–P
DEPARTMENT OF HOMELAND
SECURITY
Office of the Secretary
[Docket No. DHS–2007–0054]
Privacy Act of 1974; United States
Citizenship and Immigration Services;
Fraud Detection and National Security
Data System (FDNS–DS) System of
Records
Privacy Office, DHS.
Notice of Privacy Act system of
AGENCY:
ACTION:
records.
SUMMARY: The USCIS has developed the
Fraud Detection and National Security
Data System (FDNS–DS), a case
management system used to record,
track, and manage immigration
inquiries, investigative referrals, law
enforcement requests, and case
determinations involving benefit fraud,
criminal activity, public safety and
national security concerns.
DATES: Written comments must be
submitted on or before September 17,
2008.
You may submit comments,
identified by docket number DHS–
2007–0054 by one of the following
methods:
• Federal e-Rulemaking Portal:
https://www.regulations.gov. Follow the
instructions for submitting comments.
• Fax: 1–866–466–5370.
• Mail: Hugo Teufel III, Chief Privacy
Officer, Privacy Office, Department of
Homeland Security, Washington, DC
20528.
ADDRESSES:
PO 00000
Frm 00045
Fmt 4703
Sfmt 4703
48231
• Instructions: All submissions
received must include the agency name
and docket number for this rulemaking.
All comments received will be posted
without change to https://
www.regulations.gov, including any
personal information provided.
• Docket: For access to the docket to
read background documents or
comments received go to https://
www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: For
general questions please contact: United
States Citizenship and Immigration
Services, Privacy Officer, Donald
Hawkins, 111 Massachusetts Avenue,
NW., Washington, DC 20529. For
privacy issues please contact: Hugo
Teufel III (703–235–0780), Chief Privacy
Officer, Privacy Office, U.S. Department
of Homeland Security, Washington, DC
20528.
SUPPLEMENTARY INFORMATION:
I. Background
The Office of Fraud Detection and
National Security (FDNS) of the United
States Citizenship and Immigration
Services (USCIS) has developed a new
system named the Fraud Detection and
National Security Data System (FDNS–
DS). FDNS–DS is a central repository
that permits specially-trained
employees to record, track, and manage
the background checks and adjudicative
processes related to immigration
applications and petitions with
suspected or confirmed fraud, criminal
activity, egregious public safety, and/or
national security concerns, and cases
randomly selected for benefit fraud
assessments (BFAs). The system will
also have the capability to track the
following:
1. USCIS investigative referrals to law
enforcement agencies (LEAs);
2. LEA referrals to USCIS concerning
subjects with pending immigration
benefit applications or petitions;
3. background check referrals and
resolutions associated with suspected or
confirmed fraud, criminal activity,
egregious public safety, and/or national
security concerns; and
4. any additional inquiries conducted
in order to confirm that the information
on file is correct.
FDNS has created FDNS–DS, a
centralized data system, in order to
increase the effectiveness of United
States (U.S.) immigration system in
identifying threats to national security,
combating benefit fraud, and locating
and removing vulnerabilities that
compromise the integrity of the legal
immigration system. With the
implementation of FDNS–DS, USCIS’s
capabilities for detecting and tracking
E:\FR\FM\18AUN1.SGM
18AUN1
Agencies
[Federal Register Volume 73, Number 160 (Monday, August 18, 2008)]
[Notices]
[Pages 48226-48231]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-19031]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
Office of the Secretary
[Docket No. DHS-2008-0072]
Privacy Act of 1974: U.S. Immigration and Customs Enforcement,
ICE Pattern Analysis and Information Collection (ICEPIC) System of
Records
AGENCY: Privacy Office, DHS.
ACTION: Modification to an existing system of records.
-----------------------------------------------------------------------
SUMMARY: U.S. Immigration and Customs Enforcement (ICE) is re-
publishing the system of records notice (SORN) for the ICE Pattern
Analysis and Information Collection (ICEPIC) system to address comments
received through the Federal Register comment procedure. A minor change
has been made to the SORN to update the contact point for individual
requests for access to and amendment of records in the system and to
propose a new routine use for investigation and remediation of any loss
or compromise of personal data from the system, should such a loss or
compromise occur.
On January 30, 2008, ICE originally established this system of
records and published the SORN and associated proposed rulemaking in
the Federal Register, 73 FR 5577 and 73 FR 5460 (Jan. 30, 2008). ICE
received and considered the public comments, all of which were
generally in favor of the system and the proposed rule. In light of the
comments received, ICE concluded that no changes to the SORN are
warranted at this time other than the proposed addition of a new
routine use and to update the contact point for requests to access and
correct system records. A final rulemaking is also published in this
issue of the Federal Register in which the Department exempts portions
of this system of records from one or more provisions of the Privacy
Act because of criminal, civil, and administrative enforcement
requirements.
DATES: The established system of records was effective as of February
29, 2008, based upon the prior ICEPIC system of records notice
published on January 30, 2008. Comments are being solicited on the new
routine use proposed in this notice. Written comments must be submitted
on or before September 17, 2008. The new routine use will be effective
September 17, 2008.
ADDRESSES: You may submit comments, identified by docket number DHS-
2008-0072 by one of the following methods:
[[Page 48227]]
Federal e-Rulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments.
Fax: 1-866-466-5370.
Mail: Hugo Teufel III, Chief Privacy Officer, Privacy
Office, Department of Homeland Security, Washington, DC 20528.
Instructions: All submissions received must include the
agency name and docket number for this rulemaking. All comments
received will be posted without change to https://www.regulations.gov,
including any personal information provided.
Docket: For access to the docket, to read background
documents, or comments received go to https://www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: Lyn Rahilly, Privacy Officer, (202-
514-1900), U.S. Immigration and Customs Enforcement, 425 I Street, NW.,
Washington, DC 20536, e-mail: ICEPrivacy@dhs.gov, or Hugo Teufel III
(703-235-0780), Chief Privacy Officer, Privacy Office, U.S. Department
of Homeland Security, Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
I. Background
Part of ICE's mission is to investigate possible violations of U.S.
immigration law. Many times this involves hours of analysis regarding a
particular case or operation. As part of the investigative process
analysts must identify and understand the relationships among
individuals, places, and items that are the subject of investigation.
The ICEPIC Tool builds on earlier ICE initiatives to verify the
identity of Special Interest Aliens (SIAs), as designated by the
Department of State. In 2003 ICE implemented the National Security
Entry Exit Registration System (NSEERS) to manage the growing
collection of over 500,000 SIA records. National and international
terrorist threats in the 2004 and 2005 timeframe resulted in ICE
reviewing not only the SIA records in NSEERS, but also the records of
aliens registered with the Student and Exchange Visitor Information
System (SEVIS) and entered into the United States Visitor and Immigrant
Status Indicator Technology (US VISIT) system as well. Since 2005,
ICE's expanding law enforcement role has demanded increasingly
sophisticated tools to detect potential violations of immigration and
criminal law and terrorist threats.
ICE analyzes relationships among individuals using conventional
database queries and link analysis tools; however, traditional link
analysis tools rely on the consistency of key data, such as names and
addresses, to establish relationships. If the source data is of poor
quality or an individual seeks to conceal his/her identity through
intentional, but subtle, changes to names, addresses, and other
biographic information, then conventional tools are less effective at
recognizing relationships. As a result, investigators and analysts may
miss important relationships among suspects, family members, other
associates, organizations, addresses, and vehicles.
ICEPIC allows ICE law enforcement agents and analysts to look for
non-obvious relationship patterns among individuals and organizations
that are indicative of violations of the customs and immigration laws
that are enforced by DHS agencies, as well as possible terrorist
threats and plots. From these relationships, ICE agents can develop
specific leads and law enforcement intelligence for active and new
investigations. Identified relationships can also be recorded for reuse
in subsequent investigative analyses. The information processed by
ICEPIC comes from existing ICE investigative and apprehension records
systems, as well as immigration and alien admission records systems.
All ICEPIC activity is predicated on ongoing and valid law enforcement
investigations.
ICEPIC includes capabilities that assist investigators to record
results of analyses performed in support of investigations and to
capture additional relevant information obtained from outside sources.
The information collected by, on behalf of, in support of, or in
cooperation with DHS and its components may contain personally
identifiable information collected by other Federal, state, local,
tribal, foreign, or international government agencies or organizations.
ICEPIC assists ICE investigators by automating five business
processes:
A. Analysis of leads, law enforcement and intelligence reports,
referrals, and processing of queries of ICE and DHS information to
locate relevant records and produce reports;
B. Integration and resolution of information from multiple ICE and
DHS databases to provide leads for law enforcement investigations and
disruption of potential terrorist activities;
C. Initiation of analyses that support investigative cases in DHS
and field offices and recording the results of beneficial analyses;
D. Production and dissemination of target indicator profiles and
other law enforcement intelligence; and
E. Management of analysis workflows and information resources.
Information that is produced or maintained by ICEPIC is used by ICE
agents in headquarters and field offices to identify potential
violations of customs or immigration law, confirm suspected violations,
or investigate potential terrorist threats. ICEPIC is used to identify
relationships among different individuals or among records for the same
individual from multiple sources when an individual or individuals have
been identified as subjects, leads, or associates in an investigative
case. In cases where DHS determines that the information would assist
in the enforcement of civil or criminal laws, ICE may share the
information with the appropriate Federal, State, local, tribal, or
foreign governmental agencies or multilateral governmental
organizations. Information may also be used by national intelligence
community agencies where analysis of the records indicates a potential
or confirmed threat of terrorist activity justifying further analysis
or investigation. ICE may also share this information with the FBI when
ICE becomes aware of information that may be related to an individual
in the Terrorist Screening Database.
The Department of Justice (DOJ) and other Federal agencies may use
reports generated through ICEPIC in the review, settlement, and
prosecution of claims, complaints, and lawsuits involving matters over
which ICE exercises jurisdiction or when conducting litigation or in
proceedings before any court, adjudicative, or administrative body.
This includes any litigation matters where ICE, DOJ, or an employee in
his or her official capacity in support of ICE, the United States, or
any agency thereof is involved.
For a more detailed description of the origin and purpose of this
system and its functionality, the Privacy Impact Assessment published
at https://www.dhs.gov/privacy (follow link to ``privacy impact
assessments.'').
Because ICEPIC contains information that relates to official DHS
national security, law enforcement, immigration, and intelligence
activities and is used in support of those activities, the Department
published a proposed rulemaking seeking to exempt the ICEPIC system of
records from various provisions of the Privacy Act, including the
requirement that individuals be provided access to and correction of
their own records. These exemptions are permitted by the Privacy Act
and are needed to protect information relating to DHS law enforcement
or intelligence activities from disclosure to subjects or
[[Page 48228]]
others related to these activities. For a complete discussion of the
specific exemptions proposed and the reasons they were claimed, please
see the notice of proposed rulemaking in the Federal Register, 73 FR
5577 (Jan. 30, 2008). A final rulemaking is published concurrently to
this notice in this issue of the Federal Register.
Public Comments
In the January 30, 2008 publication of the ICEPIC SORN, the
Department requested public comments on the SORN and the proposed
rulemaking. ICE received and considered the public comments, which are
discussed further below, and concluded that no substantive changes to
the SORN are warranted at this time. However, ICE is updating the SORN
to change the contact information for submission of requests to access
and amend records in this system.
Six comments were received. While all comments were in favor of the
proposed rule, two commenters also raised specific concerns related to
this system of records. Those concerns are addressed below.
One commenter expressed concern that individuals would be unable to
ensure their personal information in ICEPIC is accurate unless they are
permitted access to their records. Other means exist to verify the
accuracy of ICEPIC data and ensure that incorrect data are not used to
prejudice that individual. ICEPIC users are trained to verify
information obtained from ICEPIC before including it in analytical
reports that will be used during investigations or shared with
government personnel outside of ICE. Verification procedures include
direct queries to the source databases from which ICEPIC originally
obtained the information, queries of commercial or other government
databases, and ICE agent interviews with individuals or others who are
in a position to confirm the ICEPIC data. These procedures mitigate the
risk posed by inaccurate data in the system and raise the probability
that such data will be identified and corrected before any action is
taken that would prejudice an individual. In addition, the source
systems from which ICEPIC obtains information may, themselves, have
mechanisms in place to ensure the accuracy of the data prior to the
information being accessed through ICEPIC.
Another commenter, while in favor of the system, expressed concerns
as follows:
``By limiting access to a small number of people, power and
responsibility may be monopolized in the hands of some who are never
given a system of checks and balances over their power. The only
other concern that I have is that, as domestic and international
security policies and concerns shift over time, this proposed rule
change will be stagnant. I would propose then that this rule be
revisited in the coming years as security threats continue to
fluctuate.''
To ensure the system contains appropriate checks and balances to
oversee those who have access to ICEPIC information, ICE has
established appropriate controls and safeguards that provide oversight
of authorized ICEPIC users. All user activity is audited and subject to
periodic review to identify unauthorized use or activity. ICE
investigates instances of unauthorized or inappropriate access or use
of the system and takes appropriate disciplinary actions where
violations have occurred.
The commenter also recommended a review of this system in the
future because ``security threats continue to fluctuate.'' ICE and DHS
continue to exercise diligence in the response to the evolving threat
environment. Should there be a need to substantially alter this system
in the future, similar public notice and an opportunity to comment will
be provided.
Proposed Routine Use
ICE is proposing to include a new routine use to support the
investigation and remediation of any suspected or confirmed compromise
of personal data from the system (i.e., a ``data breach''). This
routine use would allow ICE to share information with other agencies,
entities, contractors, or individuals for the purpose of supporting
ICE's efforts to respond to the suspected or confirmed compromise and
prevent, minimize, or remedy any risk of harm. ICE is soliciting
comments on this proposed routine use pursuant to 5 U.S.C. 552a(e)(11).
II. Privacy Act
The Privacy Act embodies fair information principles in a statutory
framework governing the means by which the United States Government
collects, maintains, uses, and disseminates personally identifiable
information. The Privacy Act applies to information that is maintained
in a ``system of records.'' A ``system of records'' is a group of any
records under the control of an agency from which information is
retrieved by the name of the individual or by some identifying number,
symbol, or other particular assigned to the individual. Individuals may
request access to their own records that are maintained in a system of
records in the possession or under the control of the Department by
complying with the Department's Privacy Act regulations, 6 CFR part
5.21 and DHS will review each request on a case-by-case basis in light
of exemptions taken by ICEPIC.
The Privacy Act requires each agency to publish in the Federal
Register a description of the type and character of each system of
records that the agency maintains, and the routine uses that are
contained in each system in order to make agency record keeping
practices transparent, to notify individuals regarding the uses to
which personally identifiable information is put, and to assist
individuals in finding such files within the agency. In accordance with
5 U.S.C. 552a(r), the Department has provided a report of this revised
system of records to the Office of Management and Budget and to the
Congress.
System of Records:
DHS-ICE-002.
System name:
ICE Pattern Analysis and Information Collection.
Security Classification:
Sensitive But Unclassified.
System Location:
U.S. Department of Homeland Security Immigration and Customs
Enforcement Headquarters data facilities are located in the Virginia
suburbs of Washington, DC, with continuity of operations sites in
remote locations within the continental United States.
Categories of Individuals Covered by the System:
A. Individuals or entities who are associated with investigations,
inspections, apprehensions, detentions, patrols, removals,
examinations, naturalizations, intelligence production, legal
proceedings, or other operations that implement and enforce the
Immigration and Nationality Act (INA) (8 U.S.C. 1101 et seq.) and
related treaties, statutes, orders, and regulations.
B. Individuals or entities who are associated with investigations,
inspections, apprehensions, detentions, law enforcement intelligence
production, legal proceedings or other operations that implement and
enforce immigration- and customs-related laws, specifically those found
in Titles 8, 19, and 31 of the United States Code.
C. Individuals who are respondents, representatives, or witnesses
in administrative, civil penalty, or forfeiture proceedings, or
defendants, representatives or witnesses in criminal prosecution or
extradition proceedings
[[Page 48229]]
under immigration or customs-related laws or regulations.
D. Associates of the above individuals and entities who are sources
of information relevant to an investigation.
E. Individuals wanted by other law enforcement agencies, including
Federal, State, local, tribal, foreign and international, or
individuals who are the subject of inquiries, lookouts, or notices by
another agency or a foreign government.
F. Individuals, including U.S. Citizens, Lawful Permanent
Residents, immigrants and non-immigrants who apply for immigration
benefits and/or any form of automated or other expedited inspection for
verifying eligibility to cross the borders into the United States.
G. Non-United States citizens and Non-Lawful Permanent Residents
who present themselves for entry into and/or exit from the United
States, including individuals subject to the requirements and processes
of US-VISIT. Individuals covered under US-VISIT include those who are
not United States citizens at the time of entry or exit or who are
United States citizens or Lawful Permanent Residents who have not
identified themselves as such at the time of entry or exit.
H. Individuals unlawfully present in the United States to include
persons who have failed to maintain a valid immigration status as well
as persons who are otherwise unlawfully present in the United States.
I. Nationals of countries that threaten to wage war, or are at war
with the United States, and individuals required to register as agents
of foreign governments in the United States.
Categories of Records in the System:
Records come directly from information collected from individuals
during DHS or federal enforcement encounters, from information provided
by individuals when applying for U.S. immigration benefits or temporary
admission to the U.S., or from persons entering or leaving the U.S.
Analyzed records include biographical data; biometric identifiers,
including fingerprints and photographs; and information or data related
to the individual subject's case, including immigration history, alien
registration, and other identification or record numbers. The system
maintains records used to show relationships across all categories of
records. These records include:
A. Information collected from individuals during a DHS enforcement
encounter or investigation, including, but not limited to: Names,
aliases, dates of birth, phone numbers, addresses, nationality,
identification numbers such as A-File Number, Social Security Number,
or driver's license number, and physical characteristics. This
information is maintained in the Treasury Enforcement Communications
System (TECS), last published October 18, 2001, 66 FR 52984 and in the
DHS Enforcement Operational Immigration Records (ENFORCE) system, last
published DHS/ICE-CBP-CIS-001-03, ENFORCE/IDENT March 20, 2006, 71 FR
13987;
B. Information collected about individuals during a DHS enforcement
encounter or investigation, or provided by other State, local, tribal
Federal, or foreign law enforcement or other relevant agencies,
including, but not limited to: Names, aliases, nationality, dates of
birth, phone numbers, addresses, affiliations, identification numbers
such as A-File Number, Social Security Number, or driver's license
number, or physical characteristics. This information is maintained in
TECS;
C. Biographic information such as names, aliases, dates of birth,
phone numbers, addresses, nationality, identification numbers such as
A-File Number, Social Security Number, or driver's license number, and
immigration violation information obtained from the DHS ENFORCE or
successor systems;
D. Biographic information such as names, aliases, dates of birth,
phone numbers, addresses, nationality, identification numbers such as
A-File Number, Social Security Number, or driver's license number, and
descriptive information obtained from U.S. Citizenship and Immigration
Services (USCIS) immigration benefits applications and application
review findings;
E. Information obtained from other Federal or foreign law
enforcement agencies about individuals known or reasonably suspected to
be or to have been engaged in conduct constituting, in preparation for,
in aid of, or related to terrorism;
F. Biographic information and other information such as name,
address, and phone number obtained from commercial data providers for
individuals identified as prospective leads or suspects in active
investigations; and
G. Biographic information such as names, aliases, dates of birth,
phone numbers, addresses, nationality, identification numbers such as
A-File Number, Social Security Number, or driver's license number, and
descriptive information obtained from U.S. Customs and Border
Protection (CBP) encounters at Ports of Entry during border crossings.
Authority for Maintenance of the System:
5 U.S.C. 301; 8 U.S.C. 1103; 8 U.S.C. 1225(d)(3); 8 U.S.C.
1324(b)(3); 8 U.S.C. 1357(a); 8 U.S.C. 1360(b); 19 U.S.C. 1; and 19
U.S.C. 1509.
Purpose:
The purpose of the ICEPIC system is to provide the information
technology infrastructure products and services that enable
investigators and analysts within ICE and other DHS components to
recognize non-obvious person, address, and organizational relationships
within existing DHS records systems, and to develop timely, actionable
leads needed to accomplish ICE law enforcement and counter-terrorism
mission objectives. All ICEPIC activity is predicated on ongoing and
valid law enforcement investigations. Current manual and automated
processes for research, collation, organization, validation, and
analysis of the information in numerous DHS alien registration, entry,
intelligence, lookout, and enforcement systems can accomplish similar
objectives, but are cumbersome, time-consuming, and error-prone. ICEPIC
will provide a reliable, responsive, and secure system to support
production of actionable leads and law enforcement intelligence for DHS
components and other Federal entities, as appropriate and in
conformance with this system of records notice.
Routine Uses of Records Maintained in the System, Including Categories
of Users and the Purposes of Such Uses:
In addition to those disclosures generally permitted under the
Privacy Act, 5 U.S.C. 552a(b), all or a portion of the records or
information contained in this system may be disclosed to authorized
entities, as is determined to be relevant and necessary, outside DHS as
a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
A. To the Department of Justice (DOJ) or other Federal agency in
the review, settlement, defense, and prosecution of claims, complaints,
and lawsuits involving matters over which ICE exercises jurisdiction,
or when conducting litigation or in proceedings before any court,
adjudicative or administrative body, when: (a) DHS; or (b) any employee
of DHS in his/her official capacity; or (c) any employee of ICE in his/
her individual capacity, where DOJ or DHS has agreed to represent the
employee; or (d) the United States, or any agency thereof, is a party
to the litigation or has an interest in such litigation, and DHS
determines
[[Page 48230]]
that the records are both relevant and necessary to the litigation and
the use of such records is compatible with the purpose for which DHS
collected the records.
B. To appropriate Federal, State, local, tribal, or foreign
governmental agencies or multilateral governmental organizations
responsible for investigating or prosecuting the violations of, or for
enforcing or implementing, a statute, rule, regulation, order, license,
or treaty where DHS determines that the information would assist in the
enforcement of domestic and foreign civil or criminal laws.
C. To U.S. agencies of the national intelligence community or
through established liaison channels to selected foreign governments
where analysis of the records indicates a potential or confirmed threat
of terrorist activity justifying further analysis or investigation.
D. To an agency, organization, or individual for the purpose of
performing audit or oversight operations as authorized by law, but only
such information as is necessary and relevant to such audit or
oversight function. Those provided information under this routine use
are subject to the same Privacy Act limitations as are applicable to
DHS officers and employees.
E. To the National Archives and Records Administration (NARA) or
other Federal agencies pursuant to records management inspections being
conducted under the authority of 44 U.S.C. 2904 and 2906.
F. To contractors and their agents, grantees, experts, consultants,
and others performing or working on a contract, service, grant,
cooperative agreement, or other assignment for DHS, when necessary to
accomplish an agency function related to this system of records. Those
provided information under this routine use are subject to the same
Privacy Act limitations as are applicable to DHS officers and
employees.
G. To appropriate Federal, State, tribal, local, or foreign law
enforcement, intelligence, and regulatory agencies, foreign
governments, and international law enforcement organizations, for
example: the Department of Defense; the Department of State; the
Department of the Treasury; the Central Intelligence Agency; the
Selective Service System; the United Nations; and INTERPOL; as well as
to other individuals and organizations during the course of an
investigation by DHS or the processing of a matter under DHS's
jurisdiction, or during a proceeding within the purview of the
immigration and nationality laws, when DHS deems that such disclosure
is necessary to elicit information required to accomplish the purposes
described in this paragraph.
H. To an appropriate Federal, State, tribal, local, or foreign
government agency or organization, or international organization,
lawfully engaged in collecting law enforcement intelligence, whether
civil or criminal, or charged with investigating, prosecuting,
enforcing or implementing civil or criminal laws, related rules,
regulations or orders, to enable these entities to carry out their law
enforcement responsibilities, including the collection of law
enforcement intelligence, but only when the disclosure is appropriate
to the proper performance of the official duties of the person
receiving the disclosure.
I. To an appropriate Federal, State, local, tribal, or foreign
government agency, international organization, or private organization
where the President or the Secretary of the Department of Homeland
Security has declared an event to be a National Special Security Event,
if the information is relevant and necessary to a requesting agency's
decision concerning the hiring or retention of an individual, or
issuance of a security clearance, license, contract, grant, or other
benefit, or if the information is relevant and necessary to a DHS
decision concerning the hiring or retention of an employee, the
issuance of a security clearance, the reporting of an investigation of
an employee, the letting of a contract, or the issuance of a license,
grant or other benefit, but only when disclosure is appropriate to the
proper performance of the official duties of the person making the
request, and;
J. To appropriate agencies, entities, and persons when (1) DHS
suspects or has confirmed that the security or confidentiality of
information in the system of records has been compromised; (2) DHS has
determined that as a result of the suspected or confirmed compromise
there is a risk of harm to economic or property interests, identity
theft or fraud, harm to the security or integrity of this system or
other systems or programs (whether maintained by DHS or another agency
or entity) that rely upon the compromised information, or harm to the
individual; and (3) the disclosure made to such agencies, entities, and
persons is reasonably necessary to assist in connection with DHS's
efforts to respond to the suspected or confirmed compromise and
prevent, minimize, or remedy such harm.
Disclosure to consumer reporting agencies:
None.
Policies and Practices for Storing, Retrieving, Accessing, Retaining
and Disposing of Records in the System:
Storage:
Records are stored electronically at one or more ICE data centers
that are located in secure facilities. The records are stored on
magnetic disc, tape, digital media, and optical media, and may also be
retained in hard copy format in secured file folders.
Retrievability:
Data are retrievable by an individual's name, Social Security
Number, A-File Number, or other unique identifier, as well as by non-
identifying information such as address or date of entry into the
United States.
Safeguards:
Information in this system is safeguarded in accordance with
applicable laws and policies, including the DHS information technology
security policies and the Federal Information Security Management Act
(FISMA). All records are protected from unauthorized access through
appropriate administrative, physical, and technical safeguards. These
safeguards include restricting access to authorized personnel who have
a need-to-know, using locks, and password protection features. The
system is also protected through a multi-layer security approach. The
protective strategies are physical, technical, administrative and
environmental in nature, which provide access control to sensitive
data, physical access control to DHS facilities, confidentiality of
communications, authentication of sending parties, and personnel
screening to ensure that all personnel with access to data are screened
through background investigations commensurate with the level of access
required to perform their duties. The system also maintains a real-time
auditing log of individuals who access and update the system. Audit
logs are reviewed and analyzed for unauthorized and inappropriate
system usage. DHS will investigate instances of unauthorized or
inappropriate access or use of the system and take appropriate
disciplinary actions where violations have occurred.
Retention and Disposal:
The National Archives Records Administration has not yet approved a
retention schedule for this system of records. Because a history of
Federal law enforcement interactions with
[[Page 48231]]
persons and organizations is essential to detecting criminal and
terrorist patterns of behavior and locating leads in current
investigations, ICE has proposed to retain records in ICEPIC for ten
(10) years from ICE's last use of the individual's data, and then
archive the information for an additional five (5) years. After the
five (5) year period, information will be destroyed unless it has
become relevant to a legal action, at which point the retention
schedule would reset.
System Manager(s) and Address:
Unit Chief, Program Management Oversight, Mission Support, Office
of Investigations, U.S. Immigration and Customs Enforcement, 425 I
Street, NW., Washington, DC 20536, telephone: (202) 307-6201.
Notification Procedures:
Pursuant to 5 U.S.C. 552a(j) and (k), this system of records may
not be accessed by members of the public for purposes of determining if
the system contains a record pertaining to a particular individual.
Nonetheless persons may seek access to records maintained in ICEPIC as
outlined in the Record Access Procedures section below. Requests for
such access will be reviewed on a case-by-case basis.
Record Access Procedures:
ICEPIC is exempt from record access procedures pursuant to 5 U.S.C.
552a(j) and (k). Nonetheless persons may seek access to records
maintained in ICEPIC by contacting U.S. Immigration and Customs
Enforcement Freedom of Information Act Office, 800 North Capitol
Street, NW., Room 585, Washington, DC 20536. Individuals must submit
their request and use the form found at https://www.ice.gov/doclib/g-
639.pdf. Requests for such access will be reviewed on a case-by-case
basis to ensure that the records meet the requirements set out by the
Privacy Act.
Contesting Record Procedures:
This system is exempt from 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)
(G) and (H), and (f) pursuant to 5 U.S.C. 552a(j)(2), (k)(2); however,
requests for amendment of records may be reviewed on a case-by-case
basis. Follow the ``Record Access Procedures'' noted above.
Record Source Categories:
Information contained in the system is obtained from DHS
investigators, other DHS law enforcement officers, other Federal,
State, foreign and tribal law enforcement and intelligence agencies,
public records, commercial data aggregators, and immigration and alien
admission records systems.
Exemptions Claimed for the System:
Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act,
portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4);
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8);
(f), and (g). Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt
from the following provisions of the Privacy Act, subject to the
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d),
(e)(1), (e)(4)(G), (e)(4)(H), and (f). In addition, to the extent a
record contains information from other exempt systems of records, ICE
will rely on the exemptions claimed for those systems.
Dated: August 11, 2008.
Hugo Teufel III,
Chief Privacy Officer, Department of Homeland Security.
[FR Doc. E8-19031 Filed 8-15-08; 8:45 am]
BILLING CODE 4410-10-P