Professional Documents
Culture Documents
I have attached my most recent updates to the Criminal and Administrative Immigration LE SMOUT.
S:\PrivRecOff\PB\Projects & Offices\Social Media lssues\Social Media Templates SMOUTs\Criminal and
Administrative Immigration LE (ERO HSI OPLA)\SMOUT 2019
fo)(6): (b\(7\/C\ I
Privacy Compliance Specialist, CIPP/G
Information Governance and Privacy (IGP)
U.S. Immigration & Customs Enforcement
Direct: (202) 73 (b)(6):
Main: (202} 73 ( b )(6):
2020-ICLl-00023 544
From: kb)(6); (b)(7)(C) I
Sent: 29 Aug 2019 11:50:16 +0000
To: ~b)(6); I
Subject: ERO social media white paper
Attachme nts: OU White Paper - Unattributed Browser licenses 08022019 track changes -
8.29.19).doc
Good Morningl(b)(6}; I
Find enclosed t he w hite paper with our maior questions regarding ERO's social media use. Like we
discussed last week, rt doesn't actually talk about what they are trying to do operationally (the whole
point of the white paper). They've stated they want it for fugrtive ops, but there are some references in
the white paper for detainee ops. I see the purpose, I just genuinely don't know if detainee officers
have the authority to ihvestigate outside a facility. So the things we need OPLA to answer:
(b)(7}( E)
!f h V fl\ · f h \ f7\fr.\
Privacy Analyst, J.D., CIPP/US/G
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732~
Mobile: 202-87 (b)(~): _
Main: 202-732 b)(6);
2020-ICLl-00023 606
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 1 of14
Use this form to propose a change to an approved Proposal to Use Real Data.for Testing Appropriate uses of this
form are to make discrete modifications to the scope of the original approved testing authorization, for example, to
extend the dates of testing authorization, to obtain a refresh of the data not originally authorized, or to make minor
changes to the scope of tlze test data or the purposes In the event the proposed changes are deemed significnnt by the
Privacy Office or OCISO, the program may be required to submit a new Proposal to Use Real Data for Testing
DESCRIPTION:
This is an addendum to the FRR Proposal to Use Real Data for Testing. The original determination date for
this proposal was J0/12/20) l. A first addendum was approved on 3/24/20)5 requesting an e;xtension of
the testing to 07/18/2017. This addendum is to expand the existing testing proposal to include additional
datasets for Business Management Dashboard (BMD). This addendum is not requesting an extension of
the testing period.
b)(5)
2020-ICLl-00023 614
Homeland ICE OCI SO & Pr ivacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 3 o/14
DETERMINATION
(To be completed by the ICE Privacy Office and OCIO IAD)
CONDITIONS
(1) OCIO Stakeholders and the ISSO will support scheduled risk assessments by IAD in bo th the
PCN Data Center and the subnet of FRR a nd BMD testing and development environments .
(2) While refreshin g the BMD datasets is authorized, this authorization is limi ted to the d ata.set
as defined at the time of this authorization. If any changes are made to the d atasets, s uch as
adding new d ata fields, th ose changes must first be coordrnated w ith the IAD and the ICE
Privacy Office before the test d ataset in datasets m ay be changed.
2020-ICLl-00023 61'6
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 4 o/14
(3) The project shall track the " test data must be destroyed" and "authorization to use the test
data" dates as an integral part of the project's schedule management
(4) Any requests for extension shall be referred to the ICE Privacy Office for review and
approval; change requests should be presented to the ICE Privacy Office by 06/06/2017; 6-
weeks prior to expiration of the authorized extension period defined in the condition section
above.
2020-ICLl-00023 617
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 5 o/14
Data
Column N ame Comment
Source
b)(?)(E) The most current record if multiple records exist in an upload
The number corresponding to the pay period for which this document is
being processed
The century the pay period begins for the related record
The century the pay period begins processing for the related record
The Year the Pay period begins processing for the related record
2020-ICLl-00023 618
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 6 of14
Data
Col umn Name Comment
Source I
b}(?)(E) same pay period
This is the first NOAC of an employee record
This is the second NOAC of an employee record
The not to exceed date shown on the personnel action (eg, appointments,
non pay status, etc)
The not to exceed century shown on the personnel action (eg, appointments,
non pay status, etc)
The not to exceed year shown on the personnel action (eg, appointments,
non pay status, etc)
The not to exceed month shown on the personnel action (eg, appointments,
non pay status, etc)
The not to exceed day shown on the personnel action (eg, appointments,
non pay status, etc)
The time basis an employee is scheduled to work
Data
II Column Name Comment
Source I
b)(7)(E) A description of the official or classification title of the employee's position
The individual position number the employee is occupying
A code to indicate the nature of managerial, supervisory or non-supervisory
responsibility assigned to a position
A number assigned by the agency to identify the master record that is
connected to like individual positions
Race indicator from the employee text file This field is required to validate
employee workforce statistics
The first law, executive order, rule, regulation, or other basis that identifies
the legal authority for the first nature of action code that authorizes the
appointing officer to effect a personnel action on an employee
The second law, executive order, rule, regulation, or other basis that
identifies the legal authority for the first nature of action code that
authorizes the appointing officer to effect a personnel action on an
employee
The first law, executive order, rule, regulation, or other basis that identifies
the legal authority for the second nature of acti on code that authorizes the
appointing officer to effect a personnel action on an employee
The second law, executive order, rule, regulation, or other basis that
identifies the legal authority for the second nature of action code that
authorizes the appointing officer to effect a personnel action on an
employee
Describes the organizational or working title of the employee's position as
determined from the official or classification title
The agency assigned code established for the organizational structure
The pay basis for the salary the employee is receiving for the position held
The occupational series code the employee will retain during the period of
grade retention
Indicates the task to be performed by the employee
The grade as provided under the pay plan for the position
A specific salary within a grade, level, class, rank, or pay band
Identifies whether the employee is receiving a rate of pay other than the
regular rate for the position, and, if so, to identify the .legal and/or regulatory
basis therefore
The state or country where the position is located
The city code where the position is located
The county code where the position is located
The date when service creditable for retirement purpose:; began
The century when service creditable for retirement purposes began
The year when service creditable for retirement purposes began
The month when service creditable for retirement purposes began
The day when service creditable for retirement purposes began
The employee's service computation date for reduction -in-force {RIF)
purposes
The employee's service computation century for reduction -in-force {RIF)
purposes
The employee's service computation year for reduction -in-force (RIF)
2020-ICLl-00023 620
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 8 of14
Data
Column Name Comment
Source
(b)(?)(E) purposes
The employee's service computation month for reduction-in-force (RIF)
purposes
The employee's service computation day for reduction-in -force (RIF)
purposes
The date from which service is to be credited toward the employee's next
w ithin grade salary increase
The century from which service is to be credited toward the employee's next
w ithin grade salary increase
The year from which service is to be credited toward the employee's next
w ithin grade salary increase
The month from which service is to be credited toward the employee's next
wi thin grade salary increase
The day from which service is to be credited toward the employee's next
w ithin grade salary increase
The starting date for the supervisory/managerial probationary period, or for
SES probationary period
The starting century for the supervisory/managerial probationary period, or
for SES probationary period
The starting year for the supervisory/managerial probationary period, or for
SES probationary period
The starting month for the supervisory/managerial probationary period, or
for SES probationary period
The starting day for the supervisory/managerial probationary period, orfor
SES probationary period
Indicates if the employee's position is in the competitive service, excepted
service, or Senior Executive Service
Indicates whether an employee is eligible for coverage by a bargaining unit,
and if covered, the specific bargaining unit
Identifies whether the employee is receiving retired or retained pay from
previous civilian or military service
Indicates whether the employee i s in a special employment program
Indicates, for budgetary purposes, whether the individual position is
permanent
Identifies whether the employee's appointment is subject to completion of a
year probationary (or trial) period and to show the commencing date of the
probationary period
The date when the employee was most recently assigned to the current
grade
2020-ICLl-00023 621
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 9 of14
Data
Column Name Comment
Source I
b}(?)(E) The century when the employee was most recently assigned to the current
grade
The year when the employee was most recently assigned to the current
grade
The month when the employee was most recently assigned to the current
grade
The day when the employee was most recently assigned to the current grade
Identifies whether the employee is a veteran who served during the Vietnam
Era (8/6/64-5/7/75)
lndicates1f the action is to correct the employee's name
The number of hours a part-time employee is scheduled to work per pay
period
The type of appointment the employee has accepted
Identifies employees as belonging to a special category of pay processing not
accommodated in any other part of the Payroll/Personnel System; This code
enables certain operations to be performed which would not otherwise be
applicable to this type of employee
Identifies whether the employee is entitled to receive a cost of living
allowance (COLA) and/or post differential, in addition to the base salary
The monetary amount to be deducted - either per day or per period - from
the salary of an employee who is being furnished quarters, utilities, etc ("in
kind allowances")
Identifies whether the quarters deduction amount is to be a taxable/tax
exempt per day or per pay period deduction
Indicates whether the minimum pay and overtime provisions of the Fair
Labor Standards Act cover employee
Indicates what, if any, access personnel action was taken for this record
2020-ICLl-00023 622
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 10 of14
Data
Column Name Comment
Source I
b)(7)(E)
The day the personnel action is valid
The begin date of the last pay period an employee was paid
The begin century of the last pay period an employee was pafd
The begin year of the last pay period an employee was paid
The begin month of the last pay period an employee was paid
2020-ICLl-00023 623
Homeland ICE OCISO & Privacy Office
Addendum to Tes ting Authorization
Security FRRBMD
Page 11 o/14
Data
Col umn Name Comment
Source
b)(?)(E)
The begin day of the last pay period an employee was paid
The time basis on whlch an employee is. scheduled to work Refers to type of
employment
2020-ICLl-00023 624
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 12 of14
Data
Column Name Comment
Source I
b)(?)(E) The grade a detailed employee is assigned
The number of days an employee worked on the payroll for this pay period
The date of the last AUO status change for the employee
The century of the last AUO status change for the employee
The year of the last AUO status change for the employee
The month of the last AUO status change for the employee
The day of the last AUO status change for the employee
2020-ICLl-00023 625
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRRBMD
Page 13 o/14
Data
Column Name Comment
Source
b )(?)(E)
The month an appointment is made effective
2020-ICLl-00023 626
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security FRR BMD
Page 14 o/14
Da ta
Col umn Name Comme nt
Source
b)(?)(E)
2020-ICLl-00023 627
From: kb)(6): (b)(7\(C)
Sent: 6 Nov 2019 16:06:20 +0000
To: l(b)(6); (b)(?)(C)I
Subject: FW: **DUE AT 12:30 - CONFIRM RECEIPT**FW: Review and Comment -P-
109932- U.S. Senator Kamala Harris writes to ICE re: Detainee Death at Otay Mesa Detention Center
ICATT:0045277
Attachments: 109932-11.05-Draft response to Sen Harris re death notifications (IGP
11.6.19).docx
Hey~(b)(6);
Find enclosed a tasker for your review. It's probably something you would want to look at. Basically
the question is if we are allowed to release information to next of kin when a detainee dies. I didn't see
a RU for next of kin, but I figure the privacy act doesn't apply to dead people, so we can release
anyways. Find enclosed my draft response.
Best,
Mobile: 202-870~(b)(6); l
FromJ b)/6\: (b)(7\(C\
Sent : Wednesday, November 6, 2019 10:37 AM
To:l(b)(6): {b){7){C)
l(b)(6\: (b)(7)(C\
Cc:Kb)(6); (b)(?)(C}
l(b)(6); (b)(7)(C)
Subje ct: RE: **DUE AT 12:30 - CONFIRM RECEIPT**FW: Review and Comment -P-109932- U.S. Senator
Kamala Harris writes to ICE re: Detainee Death at Otay Mesa Detention Cent er ICATT:0045277
Hey guys - just want to make sure someone's going to take this. Please let me know ASAP, due at
1230pm.
Best,
kb\(6): (b\(7)(C) I
Desk: 202-732~(b){6\I
fb)(6); (b)(7)(C)
From:kb)(6): (b)(?)(C)
Se nt: Wednesday, November 6, 2019 9:43 AM
To: kb)(6): (b)(7\(C)
l(b)(6); (b)(7)(C)
Cc: (b}(6); (b}(7) C)
(b)(6); (b)(?)(C)
Subje ct: **DUE AT 12:30 - CONFIRM RECEIPT**FW: Review and Comment -P-109932- U.S. Senator
2020-ICLl-00023 628
Kamala Harris writes to ICE re: Detainee Death at Otay Mesa Detention Center ICATT:0045277
Importance: High
Good Morning:
Tasking CL-Cor-P-109932 has been received by IGP. Please find a brief of the tasking below. '*NOTE:
PLEASE CONFIRM RECEIPT AND SPECIFY WHO WILL BE TAKING THE LEAD ON THIS TASKER. **
Folder: CL-Cor-P-109932
Please review the following documents and clear NLT Wed. 11/6/19 at
12:30 p.m. EST:
Best,
kb)(6); (b)(7)(C)
Desk: 202-732 b)(6};
b)(6); (b)(7)(C)
2020-ICLl-00023 629
From: !CATT.Alert {b)(6}; (b)(7)(C)
Sent: Wednesday, November 6, 2019 9:28 AM
To: #ICEIGPTaskings ~.....
(b_)(_6)_; (_b_)(7
_)_(C_) _ _ _ ___.
Subject: Review and Comment -P-109932- U.S. Senator Kamala Harris writes to ICE re: Detainee Death
at Otay Mesa Detention Center ICATT:0045277
Hello IGP,
Instructions:
Please r eview the fo l lowing documents and c l ear NLT Wed . 1 1/6/1 9 at
3 p . m . EST :
Thank you .
Thank you.
2020-ICLl-00023 630
U.S. IMM IGRATION AND CUSTOMS E NFORCEMENT
b)(5)
ii....!- - - - - - - - - - - -~
i I
l,' ':'
I '
' J
I '
I
i
I
I
i
I
I
I
i
I
I
2020-ICLl-00023 631
From: Kb)(6); (b)(?)(C)
Sent: 14 Nov 2019 18:13:14 +0000
To: ~b)(6): (b)(7)(C) I
Subject: Appendix B matters
Attachments: 2019 DRAFT Media Release Memo (IGP 10 02 2019) CLEAN.docx
~b)(6); (b)(?)(C) I
Privacy Analyst
Office of Information Governance and Privacy
Immigration and Customs Enforcement
U.S. Department of Homeland Security
Desk: 202-73 b )(6);
Mobile: 202-897 (b)(6):
Main: 202-732 b)(6);
ft,. ',..,,,
2020-ICLl-00023 703
Homeland The Piivacy Ofticc
U.S. D<p11r1ment of Humelund Secun1y
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DI-IS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Media Applications);
b) The conduct of authorized inte lligence activities carried out by the Office of Intelligence
and Analysis, the intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component perform.mg authorized foreign intelligence or
cou11terintellige11ce functions, in accorda11ce w ith the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by all programs engaging in
ope.rational uses of social media~ to identify information technology systems, technologies, .rulemakings,
programs, or pilot projects that involve Pll and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the OHS Privacy Office determination of privacy
complian ce for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Pla1rning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/O PS/PIA-004/d \ · Publicly Avai lable Social Media Monjtming an d
Situational Awa reness Initiative Update.
2020-ICLl-00023 714
Homeland The Piivacy O fticc
U.S. D<p11r1ment of Humelund Secun1y
SUMMARY INFORMATION
IT System(s) where social media data is stored: Gene.ral. Cotmse.l Electroni.c Management
System (GEMS), Joint Integrity Case Management System (JICMS), and Personnel Secu.rity
Activities Management System (PSAMS)/l ntegrated Security Management System (lSMS).
1Counsel listed here mu.st certify that appropriate a uthority exists to engage in pa rticular operational activities involving social
media.
2020-ICLl-00023 715
Homeland The P,ivncy Ofti cc
U.S. D"f'11r1menl of Hmnelund Securhy
Security 103.23
W~., hingron. DC 20528
(b )(6);
www. is.gov pnvac-y
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or empfoyment determinations1 oc situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Instruction 110-01-001 Pri1.1acy Policy for the
Operational Use of Social Media (Privacy J:'olicy) is drafted broadly so as to likely include
general use of the Internet and as social m edia technology is ever changing and evolving, this
submission addresses ICE's use of the Internet, to include social media as defined in the
Privacy Policy.
TCE u ses the Internet, including social media, as defined in the Privacy Policy, for
administrative law enforcement purposes in an internal affairs context. This administrative
law enforcement use of the Internet, including social media, includes assisting in
investigating, gathering evidence, and gathering information on improper or potentially
improper activity by ICE or CBP employees or contractors.
This u se of the Internet, including social media, involves activities to gather infonnation such
as Internet searches, reviewing social media sites, monitoring chat rooms, and reviewing
comments posted on websites. This information is gathered and used by ICE agents,
attorneys, and support personnel in the same manner as information gathered from non-
Internet and non-social media sources such as i.nformation gathered in person, on the phone,
or through research of hard copy documents. Information gathered in this fashion may be
used in administrative investigations of employees or contractors of ICE and CBP.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
• Ins pector General Act o f 1978, as amended. (Pub. L, 95-452, 92 Stat 1101 (1978)
• Homeland Secudty Act of 2002, as amended, Pub. L No. 107-296, 116 Stat. 2135 (2002)
• OHS Management Directive 0810.1, The Office of Inspector General
• OHS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcement
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
cgjYes. ONo .
2020-ICLl-00023 716
Homeland The P,ivncy Ofticc
U.S. D<p11r1menl of Homelund se-,uritY
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipme11t. Use only government-issued equipment when engaging in the operationaJ
use of social media;
OYes. 1:8] No. If not, please explain:
The nature of adminish·ative law enforcement investigations may require
investigators to use non-government-issued equipment when engaging in
investigations. Investigators a t times find themselves in rapidly evolving situations
in the field that call for the use of adaptive measures. fn situations where
government-issued equipment is either not available, or is technologically
insufficient to perform the requiT-ed task at hand, investigators may need to rely on
non-government-issued equipment. However, ICE is currently working to provide
government-issued equipment so as to not requiTe the use of non-government-issued
equipment in these circumstances.
b) Email and accounts. Use onli.ne screen names or identities that ind icate an official DHS
affiliation and use DHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
Because the activities described in Question 1 are for administrative law enforcement
purposes in an internal affairs context, the employees who engage in these activities will
not identify themselves as ICE or OHS personnel, or law enforcement personnel. This is
necessary to ensure the safety of law enforcement personnel, to avoid compromising law
enforcement operations, to prevent tipping off individuals who are sought by law
enforcement for violations of law, and to prevent disclosing litigation strategy and
tactics.
2020-ICLl-00023 717
Homeland The P,ivncy Ofticc
U.S. D<p11r1ment of Hornelund Setur11y
c} Public interaction. Access publicly available information th.rough sociaJ media only by
reviewing posted information without interacting with any individual who posted the
information;
d) Pr-ivaci; settings. Respect individuals' pr•ivacy settings and access only information that is
publicly available;
Law enforcement personnel may not access restricted online sources or facilities absent
legal authority permitting entry into private space. Where legal authority exists, law
enforcement personnel may access restricted online information.
e) Pll collection: Collect the minimum Pll necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable SORNs cited above are all exempted by Final Rules from the Privacy Act
(e)(1) requirement (5 U.S.C. § 552a(e)(1)), which normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l) requirement is necessary to ensure the integrity oflaw enforcement investigations,
as more fully detailed in the Final Rules.
f) Pll safeguards. Protect PU as required by the Privacy Act (if applicable) and DHS privacy
policy;
ICE's rules of behavior state that law enforcement personnel should retain the
information they access on the Internet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
communications.
2020-ICLl-00023 718
Homeland The Piivacy Ofticc
U.S. Depurtment of Homelund Security
h) Traiuing. Users complete annual p1ivacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon h·aining materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
D Yes, employees sell-certify that they have read and understood their Component
Rules of Behavior.
2020-ICLl-00023 719
Homeland The P,ivncy O fticc
U.S. D<p11r1ment of Humelund Secun1y
D New.
D Updated. <Please include the name and number of PIA to be updated
here.>
~ A SORN is required:
[gJ Covered by existing SORN.
Applicabl e Sys tem of Records N otice(s ) (SORN ):
2020-ICLl-00023 720
Homeland The Piivncy Office
U.S. Depurtment l>f Homelund Security
2020-ICLl-00023 721
Homeland The Piivncy O fticc
U.S. D<p11r1ment of Humelund Securi1y
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the e.xisting PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Med ia Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the .intelligence and counterintelligence elements oi the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance w ith the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by a ll programs engaging in
operational uses of social media~ to identify information technology systems, technologies, .rulemakings,
programs, or pilot projects that involve PU and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the DHS Privacy Office determination of privacy
compliance for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Planning (OI'S) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/OPS!PlA-004(dl · Publicly Avai lable Social Media Monjtming and
Situatio nal Awa reness Initiative Update.
2020-ICLl-00023 722
Homeland The P,ivncy O fticc
U.S. D<p11r1ment of Humelund Securi1y
SUMMARY INFORMATION
Counsel2 Contact Information :~b)(6); (b)(7)(C) !Chie f, Enforcement and Removal Operations
Division, OPLA; Kuyomars ''Q" Golparvar, Chief, Immigration Law and Pr actice Division,
OPLA.
IT System(s) where social media data is store d: TECS Case Management, Fugitive Case
M anagement System, Enforcement Integrated Database, and Alien Criminal Response
lnformation Management System
1Counsel listed here mu.st certify that a ppropriate authority exists to engage in pa rticular operational activities involving social
media.
2020-ICLl-00023 723
Homeland The Privncy Ofti cc
U.S. D"f'11r1menl of Homeh1rul se-,uritY
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS lnstruction 110-01-001 Privacy Policy for the
Opera.tioHal Use of Soda/ Media (Privacy Policy) is drafted broadly so as to }jkely include
general use of the lnternet and as social media technology i.s ever changing and evolving, this
template addresses ICE's use of the Internet, to include social media as defined in the Privacy
Policy.
ICE uses the Internet, including social media as defined in the Privacy Policy, for criminal
and administrative immigration law enforcement purposes. (111is template does not address
the conduct of undercover operations in the context of criminal immigration law en forcement
investigations. Those activities aie covered by a separately submitted template that covers
undercover mvestigations only.) This immigration law enforcement use of the Internet
including social media, falls into the following three categories: (1) using the Internet,
including social media, to assist in locating, arresting, and adjudicating individuals who may
be amenable to removal under the Immigration and Nationality Act or are otherwise
suspected of violations of U.S. immigration law and assisting other law enforcement agencies
wlth investigations and adjudications related to individuals, (2) pre-operational, operational,
and situational awareness uses related to officer safety or threats to the public at-large, and
(3) to obtain information to assist in detennining whether to exercise prosecutorial discretion.
Categocy One: Basic Criminal and Administrative Enforcement of the Immigration and
Nationality Act
With regard to the use of the Internet, including social media, to locate and arrest
individuals, ICE officers, agents, attorneys, and support personnel routinely use a variety of
government and commercial databases to identify, locate, and arrest individuals who may be
amenable to rem.oval and meet ICE's current enforcement priorities. However, additional
in.fonnation not available in these databases is available on the Internet, including social
media. The use of the fntem et, i11cluding social media, will allow ICE to gather information
that assists in identifying, locating, and arresting indivjduals wanted for crimes and/or who
may be amenable to removal, and assisting other law enforcement agen cies with
investigations related to individuals where necessary and appropriate. 1t will also allow ICE
attorneys who represent the agency i n civil immigration proceedings before the Executive
Office for Immigration Review to conduct general and specific case research and preparation.
2020-ICLl-00023 725
Homeland The Piivncy Ofti cc
U.S. D"f'11r1menl of Humelund Se-•urhy
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
• Homeland Security Act of 2002, as amended, Pub. L. No. 107-296, 116 Stat. 2135 (2002)
• Immigration and Nationality Act of 1952, as amended, U.S. Code Title 8
• OHS Delegation No. 7030,2, Delegation of Authority to the Assistant Secretary of U.S
Immigrntion and Customs Enforcement
• ICE Delegation No, 0001, Delegation of Authority to the Directors, Detention and Removal
and Investigations, and to Field Office Directors, Special Agents in Charge and Certain Other
Officers of the Bureau of Immigration and Customs Enforcement
• 8 C.F.R § 2.1, Authority of the Secretary of Homeland Security
2020-lCLl-00023 726
Homeland The P,ivncy Ofti cc
U.S. O"'f'11r1ment of Humelund Se-Wt\JI
Security 703 2
W~Bhingron. DC 20528
• ~~~~ }J,~}iuv,p,tvnty I
Version date: June 12, 2012
Page 6 of
11
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they perm.it the Program to use social media for the listed operational
use?
C8'.] Yes. 0No.
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
0Yes. C8'.] No. If not, please explain:
11,e nature of immigration law enforcement investigations may require investigators
to use non-government-issued equipment when engaging in investigations.
Investigators at times find themselves in rapidly evolving situations in the :field that
call for the use of adaptive measures. 1n situations where government-issued
equipment is either not available, or is technologically insufficient to perform the
required task at hand, investigators may need to rely on non-government-issued
equipment. However, ICE is currently working to provide government-issued
equipment to all personnel so as to not require the use of non-government-issued
equipment in these circumstances.
b) Email and accounts. Use onljne screen names or identities that indicate an official DHS
affiliation and use DHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
2020-ICLl-00023 727
Homeland The Piivncy Ofti cc
U.S. D"'f'11r1menl of Humelund se-,urity
Because the activities described in Question 1 are for immigration law enforcement
purposes, the employees w ho engage in these activities will not identify themselves as
lCE or OHS personnel, or law enforcement personnel. This is necessary to ensure the
safety of law en forcement personnel, to avoid compromising law en forcement
operations, to prevent tipping off individuals who are sought by law enforcement for
violations of law, and to prevent disclosing litigation strategy and tactics.
c) Public interaction. Access publicly available in.formation through social media only by
reviewing posted information without interacting with any individual who posted the
infonnation;
e) PII collection: Collect the minimum PIT necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable S0RNs cited above are all exempted by Final Rules from t he Privacy Act
(e)(l) requirement (5 U.S.C. § 552a(e)(l)), which normally Limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute oi: Executive Order. The exemption from the
(e)(1) requirement is necessary to ensure the integrity oflaw enforcement investigations,
as more fully detailed in the Final Rules.
f) PII safeguards. Protect PIT as required by the Privacy Act (if app.licable) and DHS privacy
policy;
2020-ICLl-00023 728
Homeland The Piivacy O fticc
U.S. O"'f'11r1ment of Homelund Securi1y
ICE' s rules of behavior stated that law enforcement personnel should retain the
infonnation they access on the h1ternet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
communications.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
All ICE users will complete the necessary training when it is available.
Mechanisms are (or will be) in place to verify that user s have completed training.
D Yes, employees self-certify that they have read and understood their Componeot
Rules of Behavior.
2020-ICLl-00023 729
Homeland The P,ivncy O fticc
U.S. O"'f'11r1ment of Homelund Securi1y
D New.
D Updated. <Please include the name and number of PIA to be updated
here.>
D A SORN is required:
[8J Covered by existing SORN:
DHS/ICE-009 - · External Investigations
2020-ICLl-00023 730
Homeland The Piivacy Ofticc
U.S. Depurtment of Ht>melund Security
2020-ICLl-00023 731
Homeland The Piivncy O fticc
U.S. O"'f'11r1ment of Humelund Securi1y
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the e.xisting PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Med ia Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the .intelligence and counterintelligence elements oi the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance w ith the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by a ll programs engaging in
operational uses of social media~ to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PU and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the DHS Privacy Office determination of privacy
compliance for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Planning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/OPS/PIA-004(dl · Publicly Avai lable Social Media Monjtming and
Situational Awa reness Initiative Update.
2020-ICLl-00023 733
Homeland The Piivncy O fticc
U.S. D<p11r1ment of Humelund Securi1y
SUMMARY INFORMATION
Contact Information: l(b)(6); (b)(7)(C) IDeputy Privacy Officer, (202) 732 b)(6);
f l,..\l~ \ f f "
IT System(s) where social media data is s tored: TECS, ICE Child Exploitation Tracking
System (CETS), General Counsel Electronic Management System (GEMS), Personnel Security
Activities Management System (PSAMS)/lntegrated Security Management System (ISMS), Joint
Integrity Case Manage ment Sys tem (JICMS), Enforcement Integrated Database (E ID), and
FALCON Search & Analys is Sy stem (FALCON-SA).
1Counsel listed here mu.st certify that a ppropriate authority exists to engage in particular op erational activities involving social
media.
2020-ICLl-00023 734
Homeland The Piivacy Office
U.S. O"J'urtment of Ht>melund Security
2020-ICLl-00023 735
Homeland The Privncy Ofti cc
U.S. D"f'11r1menl of H~meh1ruJ se-,un(Y
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social m edia in the OHS lnstruction 110-01-001 Privacy Policy for the
Operational Use of Social Media (Privacy Policy) is drafted broadly so as to Jjkely include
general use of the lnternet and as sodaI media technology is ever changing and evolving, this
submission addresses ICE's use of the Internet, to include social media as defined in the
Privacy Policy,
lCE uses the internet, including social media as defined in the Privacy Policy, for criminal
law en forcement purposes. (TI1is submission does not address the conduct of undercover
operations in the context of criminal law enforcement investigations. Those activities are
covered by a separately submitted document that covers undercover .investigations only.)
This criminal law enforcement use of the Internet, including social media, falls into the
following three categories: (1) using the Internet, including social media, to assist in locating,
arresting, and adjudicating fugitives and assisting other law enfm-cement agencies with
investigations and adjudications related to the fugitive, (2) using the Internet, including social
media, to assist i11 investigating, gathering evidence, and gathering criminal intelligence on
criminal and potential criminal activity, and (3) pre-operational, operational, and situation al
awareness u ses related to officer safety or threa ts to the public at-large.
Category One: Locating, Arresting, and Adjudicating Fugitives
With regard to the use of the Internet, including social media, to locate and arrest fugitives
and criminals, ICE officers, agents, attorneys, and support personnel routinely use a variety
of government and commercial databases to identify, locate, and arrest fugitives. These
individuals could include members of the public or employees or contractors of ICE and CBP
suspected of committing crimes or other forms of misconduct. However, additional
infonnation not avaiJable in these databases is available on the Internet, including social
media. The use of the Internet, including social media, w ill allow ICE to gather information
that assists in .id entifyin g, locating, and arresting fugitives wanted for c1im es and assisting
other law enforcem ent agencies with identifying, locating, and arresting fogitives.
Category Two: Criminal Investigations and Law Enforcement InteJligence
ICE also uses the Internet, including social media, to assist in investigating, gathering
evidence, and gathering law enforcement .intelligence on criminal and potential criminal
2020-ICLl-00023 736
Homeland The Privncy Ofti cc
U.S. D"f'11r1ment of Homeh1ruJ se-,urilJI
activity. This use of the Internet, including social media, involves activities to gather
information such as internet searches, reviewing social media sites, monjtoring chat rooms,
and reviewing comments posted on websites. This information is gathered and used by ICE
officers, agents, attorneys, and support personnel in the same manner as information
gathered from non-lnternet and non-social m edia sources such as information gathered in
person, on the phone, or through research of hard copy documents. Information gathered in
this fashion may be used in criminal investigations of members of the public or employees or
contractors of ICE and CBP.
Category Three: Officer and Public Safety
ICE a lso uses the Internet, including social media, for pre-operational/operational/situational
awareness uses relating to officer safety or threats to the public at-large. Prior to conducting
tactical enforcement operations or otherwise injtiating contact with a subject, ICE agents,
officers, and support personnel may collect in fonnation about the subject of the tactical
enfoTcement operation. This information gathering includes information available on tbe
Internet, including social m edia, such as firearms/weapons possession and
relatives/associates who may reside with them. This infonnation assists officers with tactical
planning activities such as: number of officers required for the operation, any specialized
equipment that may be necessary for the operation, and intelligence on when and where the
operation should be conducted for officer safety and tactical efficiency.
2. Based on the operational use of social media Jisted above, please provide the appropriate
authorities.
• Homeland Security Act of 2002, as amended, Pub. L No. 107-296, 116 Stat. 2135 (2002)
• OHS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcement
• 19 U.S.C. § 1589a, Enforcement authority of customs officers
• 8 U.S.C § 1357, Powers of immigTation officers and employees
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
cg] Yes. ONo.
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
2020-ICLl-00023 737
Homeland The Piivncy Ofti cc
U.S. D<p11r1ment of Homelund Se-•urhy
See Memorandum from Jolm Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
OYes. ~ No. U not, please explain:
The nature. of criminal investigations may require investigators to use n on-
govemment-issued equipment when engaging in criminal investigations.
Investigators at times find themselves in rapidly evolving situations in the field that
call for the use of adaptive meas1.Lres. In situations where governm.e nt-issued
equipment is either not available, or is technologically insufficient to perform the
required task at hand, investigators may need to rely on n on-government-issued
equipment. However, ICE is currently working to provide government-issued
equipment so as to not require the use of non-government-issued equipment in these
circumstances.
b) Email and accounts. Use online screen names or identities that indicate an official DHS
affiliation and use DHS email addresses to open ac:counts used when engaging in social
media in the performance of their duties;
Because the activities described in Question 1 are for criminal law enforcement purposes,
the employees who engage. in these activities will not identify themselves as ICE or DHS
personnel, or law enforcement personnel. This is necessary to ensure the safety of law
enforcement personnel, to avoid compromising law enforcement operations, to prevent
tipping off indiv.iduals who are sought by law enforcement for violations of law, and to
prevent disclosing litigation strategy and tactics.
c} Public interaction. Access publicly available information through social media only by
reviewing posted information without interacting with any individual who posted the
information;
d) Privacy settings. Respect individuals' privacy settings and access only information that is
publicly availablei
2020-ICLl-00023 738
Homeland The Privncy Ofti cc
U.S. D"f'11r1ment of HQroehtrul Se-Wt\JI
Law enforcement personnel may not access restricted onl.i.ne sources or facilities absent
legal authority permitting entry i:nto private space. Where legal authority exists, law
enforcement perso1mel may access reshicted online information.
e) PJI collectio11: Collect the minimum PH necessary for the proper p erformance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of th e Privacy Act;
The applicable SORNs cited above are all exempted by Final Ru.I.es from the Privacy Act
(e)(1) requirement (5 U.S.C § 552a(e)(l)), which normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l ) requirement is necessary to ensw-e the integrity of law enforcement investigations,
as more folly detailed in the Final Rules.
f) PJI safeguards. Protect PIT as requ ired by the Privacy Act (if applicable) and DHS privacy
policy;
lCE's rules of behavior state that law enforcement personnel should retain the
infonnation they access on the. h1temet, including social media, if they woul d have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
communications.
h) Training. Users complete annual privacy training whkh has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the DHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
2020-ICLl-00023 739
Homeland The Privacy O ftice
U.S. Department of Homehmd Security
2020-ICLl-00023 740
Homeland The P,i vncy O fticc
U.S. D<p11r1ment of H\>melund Securi1y
D New.
D Updated. <Please include the name and number of PlA to be updated
here.>
2020-IC Ll-00023 7 41
Homeland The Piivacy O fticc
U.S. D<p11rtment of H1>melund Security
~ A SORN is requfred:
[8J Covered by existing SORN.
DHS/ICE-006 - IC E lntelligence Records Sys tem (HRS)
2020-ICLl-00023 742
Homeland The Piivncy O fticc
U.S. O"'f'11r1ment of Humelund Securi1y
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DI-IS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Media Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component perform.mg authorized foreign intelligence or
cou11terintellige11ce functions, in accorda11ce w ith the provisions of Executive Order
12333, as amended.
This template shall be u sed to document the process to be followed by all programs engaging in
ope.rational uses of social media~ to identify information technology systems, technologies, .rule.makings,
programs, or pilot projects that involve Pll and other activities that otherwise impact the privacy of
individuals as determined by the C hief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may app eal to the Deputy Secretary for
Homeland Security if there is disagreement over the OHS Privacy Office determination of privacy
compliance for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Pla1rning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/O PS/PIA-004/d \ · Publicly Avai lable Social Media Monjtming an d
Situational Awa reness Initiative Update.
2020-ICLl-00023 744
Homeland The Piivacy O fticc
U.S. O"'f'lirtment of Humelund Security
SUMMARY INFORMATION
Contact Information: kb)(6); (b)(?)(C) IDeputy Privacy Officer, (202) 732-f b)(6ll
Counsel2 Contact Information: l(b}(6); (b)(?)(C) ~ Chief of Staff, (202) 732 j\~)(~);_I
1Counsel listed here mu.st certify that appropriate authority exists to engage in particular operational activities involving social
media.
2020-ICLl-00023 745
Homeland The P,ivncy Ofti cc
U.S. D<p11r1menl of Humelund se-,urilJI
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal inv estigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or empfoyment determinations1 oc s ituational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Instruction 110-01-001 Prhiacy Policy for the
Operational Use of Social M.edia (Privacy l:'olicy) is drafted broadly so as to likely include
gen eral use of the Internet and as social m edia technology is ever changing and evolving, this
template addresses lCE's use of the Internet, to include social media as defined in the Privacy
Policy.
TCE uses the Tntemet, including social media, for general research purposes. Use of the
Tntemet, including social media, for general research purposes includes: (1) using the
Internet, including social media, for legal purposes such as researching individuals or
organizations who may be .involved in lawsuits or other legal actions with ICE, judges
adjudicating cases involving ICE, opposing counsel for cases involving ICE, and legal blogs
and other online forums where legal issues of interest to ICE may be discussed; (2) using the
Internet, including social media, to assist in gathering information on individuals who may
meet w ith lCE officials to prepare lCE officials for those meetings; (3) using the Internet,
induding social media, to assist in gathering information on individuals who are suspected
of attempting to hack into ICE systems, and (4) other general Internet, including social media,
research.
Category One: Legal Uses
Most of ICE attorneys and support personnel's use of th e [ntemet, including social media, is
addressed in the four ICE Social Media Templates addressing: (1) Criminal and
Adm.inistrative Immigration Law Enforcement, (2) Criminal Law Enforcement, (3)
Undercover Criminal Law Enforcement, and (4) Administrative Law Enforcement. With
regard to the use of the Internet, including social media, for other legal purposes, ICE
attorneys and support personn el may view certain legal biogs such as SCOTUSblog3 to keep
informed on legal issues relevant to ICE. During the review of these sites, personally
identifiable information, genetalJy limited to an it:1dividual's name, may be viewed and jn
some cases recorded if relevant to a discussion or legal issue (wheth er author of a blog entry
or individual mentioned in the blog), Further, while excluded from the definition of
Operational Use, ICE attorneys and support personnel may also conduct general Internet
research to find information on parties participating in litigation with ICE and jud ges
3
SCOTUSblog is a ,legal blog focusing on discussions of recent developments in U.S. Supreme Court jurisprudence.
2020-ICLl-00023 746
Homeland The P,ivncy Ofti cc
U.S. D<p11r1menl of H11melund se-,urity
adjudicating cases involving ICE. For example, labor and employment attomeys may search
the b1ternet to find relevant information on employees against whom allegations of
misconduct have been made ot who are otherwise involved in litigation against fCE.
Category Two: Meeting Preparations
ICE also uses the Internet, including social media, to research individuals with whom ICE
employees may be meeting. For example, if the ICE Directo.r is meeting with the head of the
Virginia State Police, ICE employees may search on the Internet to gather biographical
information, news reports, or other publicly available ,i nformation on the head of the Virginia
State Police so as to provide briefing materials to the Director. During these searches
information may be pulled from public biogs and other publicly available online discussions.
Category Three: Security Operations Center
TCE also uses the Internet, including social media, to research individuals who are suspected
of attempting to compromise ICE system integrity. Tn these instances the TCE Security
Operations Center (SOC) performs searches in the process of performing cyber-incident
investigations. During the course of incident response, SOC personnel sometimes will
attempt to identify who may be attempting to hack ICE systems. To gain as much
information as possible about the potential hacker, SOC personnel will investigate using
major search engines and social media websites.
Category Four: General Research
Finally, ICE also uses the Internet, including social media, for geneTal researd1 purposes
including researching individuals providing training to ICE so as to gather information on
their background. This general Internet research is excluded from the definition of
Operational Use but included here for transparency.
2. Based on the operational use of social media listed above, please provide the approp-riate
authorities.
• Homeland Security Act of 2002, as amended, Pub. l. No. 107-296, 116 Stat. 2135
• Federal Information Security Management Act of 2002 (FISMA) (codified at 44 U.S.C. §
3541 et seq.)
• DJ-IS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcement
• DHS Management Directive 140-01 Information Technology System Security
• DHS Sensitive Systems Policy Directive 4300A.
2020-ICLl-00023 747
Homeland The Piivncy Ofti cc
U.S. D"'f'11r1ment of Homelund se-..,uritY
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
[gjYes. 0No.
4. Please attach a copy of the Rules of Behavior that out1ine the requireJnents below.
See Memorandum from John Morton, Use of Public Online Information for Non-Law
Enforcement Work-Related Activities.
5. Please describe the Rules of Beha~or in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
[gj Yes. D No. If not, please explain:
b) Email and accounts. Use onJine screen names or identities that indicate an official DHS
affiliation and use DHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
2020-ICLl-00023 748
Homeland The P,ivncy O fticc
U.S. O"'f'11r1ment of Homelund Secun1y
f) Pll safeguards. Protect PU as required by the Privacy Act (if applicable) and OHS privacy
policy;
ICE employees should retain the contents of their use of the Internet, including social
media, if they would have retained that content had it been written on paper. These
contents should be preserved in accordance with office procedures in a manner
authorized by the relevant records schedule.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Con tact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational uses of social media, access requiremen ts, and
requirements for documenting operational uses of social media.
2020-ICLl-00023 749
Homeland The P,ivncy O fticc
U.S. D"'f'11r1ment of Hurnelund Securi1y
Security Washi
103.23
10
(b )(6);
.
www.dhs.gov/plivacy
2052
0New.
D Updated. <Please include the name and number of SORN to be updated
here.>
2020-ICLl-00023 750
Homeland The Piivncy O fticc
U.S. D"'f'11r1ment of Homelund Security
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Med ia Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the .intelligence and counterintelligence elements oi the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance with the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by a ll programs engaging in
operational uses of social media~ to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PU and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the DHS Privacy Office determination of privacy
compliance for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Planning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/OPS/PIA-004(dl - Publicly Avai lable Social Media Monjtming and
Situational Awa reness Initiative Update.
2020-ICLl-00023 752
Homeland The Piivncy O fticc
U.S. D"'f'11r1ment of Humelund Security
SUMMARY INFORMATION
1Counsel listed here rnwt certify that appropriate authority exists to engage in particular operational activities involving social
media.
2020-ICLl-00023 753
Homeland The Piivncy Office
U.S . Dep:utment l>f Ht>melund Security
2020-ICLl-00023 754
Homeland The P,ivncy Ofti cc
U.S. D<p11r1menl of H11melund Securil)I
Security 703 2
•
Wa,, h ington, DC 20528
l~Jb~tgM,p1tvnty I
Version date: June 12, 2012
Page4 of
10
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Instruction 1)0-01-001 Privacy Policy for the
Opera.tio1ial Use of Social Media (Privacy Policy) is drafted broadly so as to }jkely include
general use of the ln ternet and as social media technology i.s ever changing and evolving, this
template addresses ICE's use of the Internet, to include social media as defined in the Privacy
Policy.
With the enachnent of the Homeland Security Act of 2002, Congress authorized ICE to
conduct certified undercover investigative operations to obtain evidence or information
concerning violations of laws enforced by ICE and stemming from the authorities of its
Legacy agencies, the U.S. Customs Service (USCS) and the Immigration and Naturalization
Service (INS). Within ICE, investigations are only conducted by the Homeland Security
Investigations (HSI) component and the Office of Professional Responsibility (OPR). The
authority to certify undercover operations has been delegated to the Executive Associate
Director of HSI and the Assistant Director for OPR. HSI and OPR may also engage .in limited
use of social media, when authorized, if an investigation does not otherwise warrant being
placed under a certified m,dercover operation. These activities are detailed i:n the templates
addressing Criminal Law Enforcement and Administrative Law Enforcement.
Undercover activities and operations are undertaken for numerons potential objectives that
include: (1) determining if a v iolation of law has occurred or is in progress; (2) identifying
specific violations of law; (3) identifying cTiminal violators, conspirators, and their
methodologies; (4) disrupting and/or dismantling criminal organizations; (5) locating the
violation sites and equipment tJSed; (6) locating assets for seizure and forfeiture; (7) obtaining
evidence for prosecution; (8) determining the safest and most advantageous time to make
ar.rests, execute search warrants, and make seizures; (9) identifying witnesses and
cooperating individuals; (10) identifying associations between conspirators; (11) checking the
reliability of sources of infonnation and cooperating defendants; and (12) gathering
intelligence that allows ICE management to evaluate threats, reallocate resources, and
organize enforcement activity. ICE may collect personally identifiable information ftom or
about individuals over the Internet, including via social media sites.
The nature of undercover operations often requires an ICE-HSI or OPR criminal investigator
to appear to be engaged in a criminal enterprise and to befriend or become business
2020-ICLl-00023 755
Homeland The Privncy Ofti cc
U.S. D"f'11r1menl of Homeh1rul se-,uri\JI
associates with potential violators. This is crucial to the successful integration of undercover
operatives with those who comm.it illegal acts. As part of a certified undercover investigation
or operation, when authorized, W1dercov er operatives may participate in activities that
would constitute a crime under fed eral, state, or local law. This otherwise illegal activity
includes, for example, the purch ase of stolen or co11traband goods, the purchase of illegal
and/or fraudulent immigration documents, and U1e controlled delivery of drugs or other
contraband that wm not enter the commerce of th e United States. ICE-HSl and 0PR review
and authorize, as appropriate, requests to engage in various otherwise illegal activities in
furtherance of undercover operations. ln the course of carry ing ont these authorized
undercover activities, ICE-HSI or 0PR criminal inv estigators may collect personally
identifiable information using the Internet. Any of these activities may take place in part
over the Internet, to include social media.
As the "rules'' for undercover operations are different than non-undercover law enforcen1ent
work, and may require agents to engage in activities that would otherwise be considered
prohibited or unauthorized, the rules of behavior for undercover criminal investigations are
different than for non-undercover in vestigations.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
USCS was vested with the authority to conduct certified undercover operations through the Anti-
Drug Abuse Act o.f 1986, which enacted 19 U.S.C. § 2081; INS received similar authority through
the Illegal Immigration Reform and Immigrant Respornibility Act of 1996, specifically 8 U.S.C. §
1363a. With the enactment of the Homeland Security Act of 2002, these statutory authorities
transferred to the newly created Department of Homeland Security (OHS) and were delegated to
the Assistant Secretary of ICE in OHS Delegation Number 7030.2, "Delegation of Authority to the
Assistant Secretary for U.S. lmmigration ai1d Customs Enforcement,'' and further redelegated to
the Directors of 0 1 and 0PR in ICE Delegation Order 04-002 entitled, "Authority to Certify the
Exemption of Undercover Operations From Certain Laws Within U.S. Immigration and Customs
Enforcem ent." TCE-HST and 0PR criminal jnvestigators are granted their enforcem ent authority
in 8 U.S.C. § 1357 and 19 U.S.C. § 1589a.
a) • Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
[g'.]Yes. ONo.
2020-ICLl-00023 756
Homeland The P,ivncy Ofticc
U.S. D<p11r1menl of Homelund Security
4. Please attach a copy of the Ru.les of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Ru.le, please detail reasoning for not following that Ru.le:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
Because the activities d escribed in Question 1 are fo1· undercover investigative purposes,
the employees who engage in these activities have assumed an undercove r identity and
therefore will not identify themselves as ICE or OHS personnel, or law enforcement
personnel in general. This is necessary to ensure the safety of law enforcement
personnel, to avoid compromising undercover law enforcement operations, and to
prevent tipping off individuals who are sought by law enforcement for violations of law.
c) Public interaction. Access publicly available in.formation through sociaJ media only by
reviewing posted information without interacting with any individual who posted the
information;
The nature o f undercover criminal investigations may resultin agents inte racting with
individuals who use sociaJ media sites. This interaction only takes place during
a uthorized undercover investigations.
d) Privacy settings. Respect individuals' privacy settings and access only information that is
publicly available;
Law enforcement perso1mel may not access restricted o njjne sources or facilities absent
legal authority permitting entry into private space. Where legal authority exists, law
enforcem ent personnel may access restricted online information.
2020-ICLl-00023 757
Homeland The P,ivncy Ofticc
U.S. O"'f'11r1ment of Humelund Setur11y
e) PII collecHon: Collect the minimmn PU necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable SORNs cited above are all exempted by Pinal Ru I.e s from the Privacy Act
(e)(1) requirement (5 U.S.C. § 552a(e)(l)), which normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l) requirement is necessary to ensure the integrity of law enforcement investigations,
as more fully detailed in the Final Rules.
f) Pll safeguards. Protect PU as required by the Privacy Act (if applicable) and OHS ptivacy
policy;
ICE's rules of behavior state that law enforcement personnel should retain information
they access on their use of the Internet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
comm uni cations.
h) Training. Users complete annual privacy training w hich has been approved by
Component Privacy Officer (or Privacy Point of Coutact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum; legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
D Yes, employees self-certify that they have read and understood their Component
Rules of Behavior.
2020-ICLl-00023 758
Homeland The P,ivncy O fticc
U.S. D"'f'11r1ment of Homelund Securi1y
0New.
D Updated. <Please inc.lude the name and number of PlA to be u pdated
here.>
[8J A SORN is required:
2020-ICLl-00023 759
Homeland The Piivacy O fticc
U.S. Depurtment of Humelund Security
2020-ICLl-00023 760
From: l(b)(6); (b)(7}(C) I
Sent: 22 Jul 2019 20:38:38 +0000
To: ~b)(6); (b)(7)(C)
Cc: l
I(.._b-'-'
)(__,
6 ).....,
; (__,b )-'-
(7-'-'
){_
C)'--______,Ikb)( 6 ): I
Subject: ICE SMOUTs
Attachments: Social Media Documents, Authentic8 Security Overview.pdf
Hello Xb)(6);
As ctiscussed, attached please find an email which includes all the ICE Social Mectia Operational
Use Templates (SMOUTs), as well as DHS Directive and Instructions on operational use of
social media.
The SMOUTs were used by DHS Privacy to find out the operational purposes for which ICE
needs to access social media, and to determine whether those uses are authorized under DHS
policies. Most relevant to ERO 's operational use of social media is the 'Criminal and Admin
Inunigration LE' SMOUT. I've identified below portions of this SMOUT that may help CIU in
framing a document explaining ERO 's intended use of SILO to surveille publicly-available
social media sites.
b)(S)
2020-ICLl-00023 762
b)(5)
Please let me know if you have any questions about the above. Thank yout
l(b)(6); (b)(7}(C )
Associate legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732*b)(6); I
(IPhone) 202-787~
l(b)(6 }; (b)(7 }(C}
2020-ICLl-00023 763
This communication and any attachments may contain confidential and/or sensitive attorney/client
privileged information or attorney work product and/or law enforcement sensitive information. It is not
for release, review, retransmission, dissemination, or use by anyone other than the intended recipient.
Please notify the sender if this email has been misdirected and immediately destroy all originals and
copies. Furthermore do not print, copy, re-transmit, disseminate, or otherwise use this information.
Any disclosure of this communication or rts attachments must be approved by the Office of the Principal
Legal Advisor, U.S. Immigration and Customs Enforcement. This document is for INTERNAL
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of Information Act, 5
USC§§ 552(b)(S), (b)(7).
2020-ICLl-00023 764
From: ~b)(6); (b)(7)(C)
Sent: 17 Dec 2012 12:11:04-0500
To: l(b)(6); I
Subject: Social Media Documents
Attachments: OHS Directive 110-01, Privacy Policy for Operational Use of Social Media
(Signed).pdf, OHS Instruction 110-01-001, Privacy Policy for Operational Use of Social Media
(Signed) .pdf, SMOUT, ICE - Administrative Law Enforcement, 20121106 PRIV Final.pdf, SMOUT, ICE -
Criminal and Ad min Immigration LE, 20121106 PRIV Final.pdf, SMOUT, ICE - Criminal Law Enforcement,
20121106 PRIV Final.pdf, SMOUT ICE - General Non-LE Use 20121101 PRIV final.pdf, SMOUT, ICE -
Undercover Criminal Law Enforcement, 20121106 PRIV Final.pdf
Kb)(6);
Attached are the relevant documents. These include the directive and instruction and ICE's templates
(SMOUTS) addressing TCE's five categories of operational use of social media. ERO's activities in this
case are likely covered under both Criminal Law Enforcement and Criminal and Administrative
Immigration Law Enforcement
l(b)(6); (b)(7)(C) I
Deputy Privacy Officer
Chief of Staff for Privacy & Records
U.S. Immigration and Customs Enforcement
Department of Homeland Security
500 12th Street SW, Mail Stop 5004, Washington, DC 20536
Phone: 202-732lrh\t~,1Fax: 202-732-4263 j Email:..,..
kb-)(,-
6.,...
);....,..
(b-)=(7..,...
)(,- C.,....
) ------,
( E_) _ _ _ _ _ _ _ _ _~
For help with privacy questions, visit our website on the l CE Intranet: !~(b_)_(7_)~
2020-ICLl-00023 765
Department of Homeland Security
DHS Directives System
Directive Number: 110-01
Revision Number: 00
Issue Date: 6/8/2012
PRIVACY POLICY FOR
OPERATIONAL USE OF SOCIAL
MEDIA
I. Purpose
This Directive establishes privacy policy for operational use of social media by the
Department of Homeland Security (OHS or Department).
II. Scope
This Directive applies throughout OHS regarding the access to and collection, use,
maintenance, retention, disclosure, deletion, and destruction of Personally Identifiable
Information (PII) in relation to operational use of social media, with the exception of
operational use of social media for: (a) communications and outreach with the public
authorized by the Office of Public Affairs; (b) situational awareness by the National
Operations Center; (c) situational awareness by Components other than the National
Operations Center, upon approval by the Chief Privacy Officer following completion of a
Social Media Operational Use Template; and (d) the conduct of authorized intelligence
activities carried out by the Office of Intelligence and Analysis, the intelligence and
counterintelligence elements of the United States Coast Guard, or any other
Component performing authorized foreign intelligence or counterintelligence functions,
in accordance with the provisions of Executive Order 12333, as amended. This
Directive does not apply to the Office of the Inspector General; however, the OIG will
comply with the spirit of the Directive.
Ill. Authorities
A. Public Law 107-347, !!E-Government Act of 2002," as amended, Section
208 [44 U.S.C. § 3501 note]
- 1-
Directive # 110-01
Revision # 00
2020-ICLl-00023 766
D. Title 44, U.S.C., Chapter 35, Subchapter Ill, "Information Security" [The
Federal Information Security Management Act of 2002, as amended (FISMA)]
IV. Responsibilities
A. The Chief Privacy Officer is responsible for establish.ing, overseeing the
implementation of, and issuing guidance and providing training on OHS privacy
policy for operational use of social media; and ensuring, in coordination with
Component heads, Component Privacy Officers, and Privacy Points of Contact
(PPOCs), that the Department follows OHS privacy policy, privacy laws
applicable to OHS, and federal government-wide privacy policies on operational
use of social media.
B. The Chief Privacy Officer determines privacy policy and standards for the
Department's operational use of social media consistent with Directive 047-01 ,
Privacy Policy and Compliance; oversees compliance with OHS privacy policy,
privacy laws applicable to OHS, and federal government-wide policies as they
relate to the operational use of social media; and provides privacy guidance and
training to OHS personnel regarding operational use of social media. Component
heads work with the Chief Privacy Officer to ensure that Department operational
activities using social media follow OHS privacy policy and procedures, thereby
enhancing the overall consistency of privacy protections across OHS.
- 2-
Directive# 110-01
R-evision # 00
2020-ICLl-00023 767
VI. Questions
Address any questions or concerns regarding this Directive to the DHS Privacy Office.
-3-
Directive# 110-01
Revision # 00
2020-ICLl-00023 768
Department of Homeland Security
DHS Directives System
Instruction Number: 110-01-001
Revision Number: 00
Issue Date: 6/8/2012
PRIVAc·y POLICY FOR
OPERATIONAL USE OF SOCIAL
MEDIA
I. Purpose
This Instruction implements Department of Homeland Security (OHS) Directive 110-01 ,
Privacy Policy for Operational Use of Social Media.
II. Scope
This Instruction applies throughout OHS regarding the access to and collection, use,
maintenance, retention , disclosure, deletion, and destruction of Personally Identifiable
Information (PII) in relation to operational use of social media, with the exception of
operational use of social media for: (a) communications and outreach with the public
authorized by the Office of Public Affairs; (b) situational awareness by the National
Operations Center; (c) situational awareness by Components other than the National
Operations Center, upon approval by the Chief Privacy Officer following completion of a
Social Media Operational Use Template; and (d) the conduct of authorized intelligence
activities carried out by the Office of Intelligence and Analysis, the intelligence and
counterintelligence elements of the United States Coast Guard, or any other
Component performing authorized foreign intelligence or counterintelligence functions,
in accordance with the provisions of Executive Order 12333, as amended. This
Instruction does not apply to the Office of the Inspector General; however, the OIG will
.comply with the spirit of the Instruction.
Ill. References
A. Public Law 107-347, "E-Government Act of 2002," as amended, Section
208 (44 U.S.C. § 3501 note]
D. Title 44, U.S.C., Chapter 35, Subchapter nl, "Information Security" [The
Federal Information Security Management Act of 2002, as amended (FISMA)]
- 1-
Instruction # 110-01 -001
Revision # 00
2020-ICLl-00023 769
E. Title 6, C.F.R., Chapter 1, Part 5, "Disclosure of records and information"
-2-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 770
IV. Definitions
A. Counsel means the Office of the General Counsel attorney, from either the
Immediate Office of the General Counsel or component counsel, assigned to
provide legal advice to the component covered by this Instruction.
- 3-
Instruction # 110-01 -001
Revision # 00
2020-ICLl-00023 771
Exemption from certain aspects of the Privacy Act (NPRM), and Final Rules for
Exemption from certain aspects of the Privacy Act.
G. Privacy Compliance Review {PCR) means both the OHS Privacy Office
process to be followed and the document designed to provide a constructive
mechanism to improve a OHS program's ability to comply with assurances made
in existing Privacy Compliance Documentation including Privacy Impact
Assessments (PIAs), System of Records Notices (SORNs) and/or formal
agreements such as Memoranda of Understanding or Memoranda of Agreement.
H. Privacy Impact Assessment (PIA) means both the OHS Privacy Office
process to be followed and the document required whenever an information
technology (IT) system, technology, rulemaking, program, pilot project, or other
activity involves the planned use of PII or otherwise impacts the privacy of
individuals as determined by the Chief Privacy Officer. A PIA describes what
information OHS is collecting, why the information is being collected, how the
information will be used, stored, and shared, how the information may be
accessed, how the information will be protected from unauthorized use or
disclosure, and how long it will be retained. A PIA also provides an analysis of
the privacy considerations posed and the steps OHS has taken to mitigate any
impact on privacy. As a general rule, PIAs are public documents. The Chief
Privacy Officer may, in coordination with the affected component and the Office
of the General Counsel, modify or waive publication for security reasons, or to
protect classified, sensitive, or private information included in a PIA.
I. Program Manager means the OHS employee who is responsible for the
planning and operation of a OHS program.
K. Social Media means the sphere of webs ites, applications, and web-based
tools that connect users to engage in dialogue, st,are information and media,
collaborate, and interact. Social media take many different forms, including but
not limited to web-based communities and hosted services, social networking
sites, video and photo sharing sites, biogs, virtual worlds, social bookmarking,
and other emerging technologies. This definition does not apply to internal
Department intranets or applications.
2020-ICLl-00023 772
involve coHecting PII from social media for the proposed category of use(s) and
to assess whether there is a need for additional Privacy Compliance
Documentation. Templates are initially reviewed and adjudicated by the Chief
Privacy Officer, and every three years thereafter for accuracy.
M. System Manager means the OHS employee identified in a System of
Records Notice who is responsible for the operation and management of the
system of records to which the System of Records Notice pertains.
V. Responsibilities
A. All DHS employees are responsible for complying with Directive 110-01 ,
with privacy policies and procedures issued by the Chief Privacy Officer, and with
applicable Component policies on operational use of social media and for
protecting PII from unauthorized use or disclosure.
-5-
Instruction # 110-01 -001
Revision # 00
2020-ICLl-00023 773
Components implement OHS privacy policy with respect to the operational
use of social media;
2020-ICLl-00023 774
use of PII, if any, is limited to those uses described in the Privacy
Compliance Documentation;
C. Access: OHS employees who are granted access to use social media by
their Component heads renew their access authority annually, consistent with
-7-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 775
annual training requirements. Access is contingent upon an employee's
successfully completing privacy training for operational use of social media.
Rules of Behavior include requirements for operational use of social media and
the consequences of failure to adhere to those requirements. Where a federal
policy establishes guidelines that apply to a Component's operational use of
social media, the Component's Rules of Behavior incorporate that policy and that
fact is noted in the Template. Unless otherwise noted in the Template
adjudication process, the Rules of Behavior provide, at a minimum , that OHS
employees:
1. Use social media for operational purposes only when activities ·are
authorized by statute, executive order, regulation , or policy;
7. Protect PII as required by the Privacy Act and OHS privacy policy;
and
-8-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 776
8. Document operational use of social media, including date, site(s)
accessed, information collected, and how it was used in the same
manner that the Department would document information collected
from any source in the normal course of business. For instance,
where information obtained through authorized operational use of
social media is used in whole or in part to make decisions regarding
an individual's rights, benefits or privileges, employees document
that fact in relevant records.
- 9-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 777
2. Components complete implementation of this Instruction, including
obtaining approval from the Chief Privacy Officer of Templ,ates for
categories of operational use of social media in existence prior to
this Instruction, within 120 days, except that Components c::omplete
training of all pertinent employees within 165 days.
VII. Questions
Address any questions or concerns regarding these Instructions to the OHS Privacy
Office or to the relevant Component Privacy Officer or PPOC.
- 10 -
Instruction# 1 '10-01-001
Revision # 00
2020-ICLl-00023 778
Homeland The Piivacy O fticc
U.S. O"'f'11r1ment of Humelund Secun1y
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Ap plications Communications/Outreach/Pu blic Dialogu e and DHS/ALL/PIA-036 -
Use of Unidirectional Social Media Application s);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
cou11terintellige11ce functions, in accorda11ce w ith the provisions of Executive Order
12333, as amended.
This template shall be u sed to document the process to be followed by all programs engaging in
ope.rational uses of social media~ to identify information technology systems, technologies, .rulemakings,
programs, or pilot projects that involve Pll and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the OHS Privacy Office determination of privacy
compliance for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Pla1rning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/OPS/PIA-004/d\ - Publicly Avai lable Social Media Monjtming and
Situational Awa reness Initiative Update.
2020-ICLl-00023 779
Homeland The Piivacy O fticc
U.S. O"'f'11r1ment of Homelund Secun1y
SUMMARY INFORMATION
1Counsel listed here mu.st certify that appropriate authority exists to engage in particular operational activities involving social
media.
2020-ICLl-00023 780
Homeland The P,ivncy Ofti cc
U.S. D<p11r1ment of Humelund St-Wt\JI
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or empfoyment determinations1 oc s ituational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Instruction 110-01-001 Pri1.1acy Policy for the
Operational Use of Social Media (Privacy J:'olicy) is drafted broadly so as to likely in clude
gen eral use of the Internet an d as social m edia technology is ever changing and evolving, this
subm ission addresses ICE's use of the Internet, to include social media as defined in the
Privacy Policy.
TCE u ses the Internet, including social media, as d efined in the Privacy Policy, for
administrative law enforcemen t purposes in an internal affairs context. This administrative
law enforcemen t use of the Internet, inclu ding social media, includes assisting in
investigating, gathering evidence, and gathering information on improper or potentially
improper activity by ICE or CBP employees or contractors.
This u se of the Internet, including social media, involves activities to gather infonnation such
as l.ntemet searches, reviewing social media sites, monitoring chat room s, and reviewin g
comments posted on websi tes. This information is gathered and used by ICE agents,
attorneys, and s upport p ersonnel in the same manner as information gathered from non-
Internet and non-social media sources such as i.nformation gathered in person, on the phone,
or through research of hard copy documents. Information gathered in this fashion may be
used in administrative investigations of employees or contractors of ICE and C BP.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
• Inspector General Act of 1978, as amended . (Pub. L, 95-452, 92 Stat. 1101 (1978)
• Homeland Secud ty Act of 2002, as amended, Pub. L No. 107-296, 116 Stat. 2135 (2002)
• OHS Managem en t Directive 0810.1, The Office of Inspector General
• OHS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcemen t
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
u se?
cgjYes. ONo .
2020-ICLl-00023 781
Homeland The P,ivncy Ofti cc
U.S. D<p11r1menl of Homelund se-,uritY
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipme11t. Use only government-issued equipment when engaging in the operationaJ
use of social media;
OYes. 1:8] No. If not, please explain:
The nature of adminish·ative law enforcement investigations may require
investigators to use non-government-issued equipment when engaging in
investigations. Investigators a t times find themselves in rapidly evolving situations
in the field that call for the use of adaptive measures. fn situations where
government-issued equipment is either not available, or is technologically
insufficient to perform the requiT-ed task at hand, investigators may need to rely on
non-government-issued equipment. However, ICE is currently working to provide
government-issued equipment so as to not requiTe the use of non-government-issued
equipment in these circumstances.
b) Email and accounts. Use onli.ne screen names or identities that indicate an official OHS
affiliation and use OHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
Because the activities described in Question 1 are for administrative law enforcement
purposes in an internal affairs context, the employees who engage in these activities will
not identify themselves as ICE or OHS personnel, or law enforcement personnel. This is
necessary to ensure the safety of law enforcement personnel, to avoid compromising law
enforcement operations, to prevent tipping off individuals who are sought by law
enforcement for violations of law, and to prevent disclosing litigation strategy and
tactics.
2020-ICLl-00023 782
Homeland The P,ivncy Ofticc
U.S. D<p11r1ment of Humelund Setur11y
c} Public interaction. Access publicly available information th.rough sociaJ media only by
reviewing posted information w ithout interacting with any individual who posted the
information;
d) Pr-ivaci; settings. Respect individuals' pr•ivacy settings and access only information that is
publicly available;
Law enforcement personnel may not access restricted online sources or facilities absent
legal authority permitting entry into private space. Where legal authority exists, law
enforcement personnel may access restricted online information.
e) Pll collection: Collect the minimum Pll necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable SORNs cited above are all exempted by Final Rules from the Privacy Act
(e)(1) requirement (5 U.S.C. § 552a(e)(1)), which normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l) requirement is necessary to ensure the integrity oflaw enforcement investigations,
as more fully detailed in the Final Rules.
f) Pll safeguards. Protect PU as required by the Privacy Act (if applicable) and DHS privacy
policy;
ICE's rules of behavior state that law enforcement personnel should retain the
information they access on the Internet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
communications.
2020-ICLl-00023 783
Homeland The Piivncy O fticc
U.S. Depurtment of Hllmelund Security
h) Traiuing. Users complete annual p1ivacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon h·aining materials
provided by the OHS Privacy Office. Training must include, at minimu m: legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
D Yes, employees sell-certify that they have read and understood their Component
Rules of Behavior.
2020-ICLl-00023 784
Homeland The P,ivncy O fticc
U.S. D<p11r1ment of Homelund Secun1y
D New.
D Updated. <Please include the name and number of PIA to be updated
here.>
~ A SORN is required:
[gJ Covered by existing SORN.
Applicable System of Records Notice(s) (SORN):
2020-ICLl-00023 785
Homeland The Piivacy Ofticc
U.S. Depur1ment vf Ht>melund Security
2020-ICLl-00023 786
Homeland The Piivncy O fticc
U.S. D<p11r1ment of Homelund Securi1y
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the e.xisting PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Med ia Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the .intelligence and counterintelligence elements oi the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance w ith the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by a ll programs engaging in
operational uses of social media~ to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PU and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the DHS Privacy Office determination of privacy
compliance for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Planning (OI'S) to enhance situatio nal awareness is exempt
from this requirement and is covered by the existing PIA; DHS/OPS!PlA-004(dl - Publicly Avai lable Social Media Monjtming and
Situatio nal Awa reness Initiative Update.
2020-ICLl-00023 787
Homeland The Piivncy Ofticc
U.S. D<p11r1ment of Humelund Securi1y
SUMMARY INFORMATION
Contact Information: j(b)(6); (b)(7)(C) !Deputy Privacy Officer1 (202) 732i (b)(6);
IT System(s) whe re social me dia data is stored: TECS Case Management, Fugitive Case
Management System, Enforcement Integrated Database, and Alien Criminal Response
lnformation Management System
1Counsel listed here mu.st certify that a ppropriate authority exists to engage in particular operational activities involving social
media.
2020-ICLl-00023 788
Homeland The Privacy O ffice
U.S. Department of Homeland Security
DHS/USCIS-ICE-CBP-001 - Alien File, Index, and National File Tracking System SORN
2020-ICLl-00023 789
Homeland The Privncy O fticc
U.S. D"f'11r1ment of HoroeJ11ruJ Se-Wt\JI
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS lnstruction 110-01-001 Privacy Policy f or the
Opera.tioHal Use of Soda/ Media (Privacy Policy) is drafted broadly so as to }jkely include
general use of the ln ternet and as social media technology i.s ever changing and evolving, this
template addresses ICE's use of the Internet, to include social media as defined in the Privacy
Policy.
ICE uses the Internet, including social media as defined in the Privacy Policy, for criminal
and administrative immigration law enforcement purposes. (111is template does not address
the conduct of undercover operations in the context of criminal immigration law enforcement
investigations. Those activities aie covered by a separately submitted template that covers
undercover mvestigations only.) This immigration law enforcement use of the Internet
including social media, falls into the following three categories: (1) using the Internet,
including social media, to assist in locating, arresting, and adjudicating individuals who may
be amenable to removal under the Immigration and Nationality Act or are otherwise
suspected of violations of U.S. immigration law and assisting other law enforcement agencies
wlth investigations and adjudications related to individuals, (2) pre-operational, operational,
and situational awareness uses related to officer safety or threats to the public at-large, and
(3) to obtain information to assist in detennining whether to exercise prosecutorial d iscretion.
Categocy One: Basic Criminal and Administrative Enforcement of the Immigration and
Nationality Act
With regard to the use of the Internet, including social media, to locate and arrest
individuals, ICE officers, agents, attorneys, and support personnel routinely use a variety of
government and commercial databases to identify, locate, and arrest individuals who may be
amenable to rem.oval and meet ICE' s current enforcement priorities. However, additional
in.fonnation not available in these databases is available on the Internet, including social
media. The use of the fntem et, i11cluding social med ia, will allow ICE to gather information
that assists in identifying, locating, and arresting indivjduals wanted for crimes and/or who
may be amenable to removal, and assisting other law enforcemen t agen cies with
investigations related to individuals where necessary and appropriate. 1t will also allow ICE
attorneys who represent the agency i n civil immigration proceedings before the Executive
Office for Immigration Review to conduct general and specific case research and preparation.
2020-ICLl-00023 790
Homeland The P,ivncy Ofti cc
U.S. D<p11r1ment of Homelund Se-..•uritY
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
• H omeland Security Act of 2002, as amended, Pub. L. No. 107-296, 116 Stat. 2135 (2002)
• Immigration and Nation ality Act of 1952, as amended, U.S. Code Title 8
• OHS Delegation No. 7030,2, Delegation of Authority to the Assistant Secretary of U.S
ImmigTation and Customs Enforcement
• ICE Delegation No, 0001, Delegation of Authority to the Directors, Detention and Removal
and Investigations, and to Field Office Directors, Special Agents in Charge and Certain Other
Officers of the Bureau of Immigration and Customs Enforcement
• 8 C.F.R § 2.1, Authority of the Secretary of Homeland Security
2020-lCLl-00023 791
Homeland The Piivncy Ofti cc
U.S. D"f'11r1ment of Hornelund Se,.,urilJI
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they perm.it the Program to use social media for the listed operational
use?
C8'.] Yes. 0No.
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
0Yes. C8'.] No. If not, please explain:
11,e nature of immigration law enforcement investigations may require investigators
to use non-government-issued equipment when engaging in investigations.
Investigators at times find themselves in rapidly evolving situations in the :field that
call for the use of adaptive measures. 1n situations where government-issued
equipment is either not available, or is technologically insufficient to perform the
required task at hand, investigators may need to rely on non-government-issued
equipment. However, ICE is currently working to provide government-issued
equipment to all personnel so as to not require the use of non-government-issued
equipment in these circumstances.
b) Email and accounts. Use onljne screen names or identities that indicate an official OHS
affiliation and use DHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
2020-ICLl-00023 792
Homeland The P,ivncy Ofti cc
U.S. D<p11r1ment of Humelund se-,uri\JI
Because the activities described in Question 1 are for immigration law enforcement
purposes, the employees who engage in these activities will not identify themselves as
lCE or OHS personnel, or law enforcement personnel. This is necessary to ensure the
safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevent tipping off individuals who are sought by law enforcement for
violations of law, and to prevent disclosing litigation strategy and tactics.
c) Public interaction. Access publicly available in.formation through social media only by
.reviewing posted information without interacting with any individual who posted the
infonnation;
Law enforcement personnel may not access restricted onljne sources or facilities absent
legal authority permitting entry into private s pace.
e) PII collection: Collect the minimum PIT necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable S0RNs cited above are all exempted by Final Rules from the Privacy Act
(e)(l) requirement (5 U.S.C. § 552a(e)(l)), which normally Limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute oi: Executive Order. The exemption from the
(e)(1) requirement is necessary to ensure the integrity oflaw enforcement investigation s,
as more fully detailed in the Final Rules.
f) PII safeguards. Protect PIT as required by the Privacy Act (if app.licable) and DHS privacy
policy;
2020-ICLl-00023 793
Homeland The Piivacy O fticc
U.S. D<p11r1ment of Homelund Securi1y
ICE's rules of behavior stated that law enforcement personnel should retain the
infonnation they access on the h1ternet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governin g the preservation of electronic
communications.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
proyjded by the OHS Privacy Office. Training must includ e, at minimum: legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
All ICE users w ill complete the necessary training when it is available.
Mechanisms are (or will be) in place to verify that user s have completed training.
D Yes, employees self-certify that they have read and understood their Componeot
Rules of Behavior.
2020-ICLl-00023 794
Homeland The P,ivncy O fticc
U.S. D<p11r1ment of Humelund Securi1y
D New.
D Updated. <Please include the name and number of PIA to be updated
here.>
D A SORN is required:
[8J Covered by existing SORN:
DHS/ICE-009 - · External Investigations
2020-ICLl-00023 795
Homeland The Piivacy Ofticc
U.S. Depurtment of Homelund Security
2020-ICLl-00023 796
Homeland The Piivacy O fticc
U.S. D<p11r1ment of Humelund Securi1y
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Med ia Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the .intelligence and counterintelligence elements oi the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance w ith the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by a ll programs engaging in
operational uses of social media~ to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PU and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the DHS Privacy Office determination of privacy
compliance for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Planning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/OPS/PIA-004(dl - Publicly Avai lable Social Media Monjtming and
Situational Awa reness Initiative Update.
2020-ICLl-00023 798
Homeland The Piivncy O fticc
U.S. D<p11r1ment of Humelund Securi1y
SUMMARY INFORMATION
IT System(s) where social media data is stored: TECS, ICE Child Exploitation Tracking
System (CETS), General Counsel Electronic Management System (GEMS), Personnel Security
Activities Management System (PSAMS)/Integrated Security Management System (ISMS), Joint
Integrity Case Management Sys tem (JICMS), Enforcement Integrated Database (EID), and
FALCON Search & Analys is System (FALCON-SA).
1Counsel listed here m u.st certify tha t a ppropriate a uthority exists to engage in pa rticular op erational acti vi ties invo lving social
media.
2020-ICLl-00023 799
Homeland The Piivacy Ofticc
U.S. Depurtment of H1>melund Security
2020-ICLl-00023 800
Homeland The Privncy Ofti cc
U.S. D<p11r1ment of Horoeh1ruJ se-,uritY
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS lnstruction 110-01-001 Privacy Policy for the
Operational Use of Social Media (Privacy Policy) is drafted broadly so as to Jjkely include
general use of the lnternet and as sodaI media technology is ever changing and evolving, this
submission addresses ICE's use of the Internet, to include social media as defined in the
Privacy Policy,
lCE uses the internet, including social media as defined in the Privacy Policy, for criminal
law enforcement purposes. (TI1is submission does not address the conduct of undercover
operations in the context of criminal law enforcement investigations. Those activities are
covered by a separately submitted document that covers undercover investigations only.)
This criminal law enforcement use of the Internet, including social media, falls into the
following three categories: (1) using the Internet, including social media, to assist in locating,
arresting, and adjudicating fugitives and assisting other law enfm-cement agencies with
investigations and adjudications related to the fugitive, (2) using the Internet, including social
media, to assist i11 investigating, gathering evidence, and gathering criminal intelligence on
criminal and potential criminal activity, and (3) pre-operational, operational, and situational
awareness uses related to officer safety or threats to the public at-large.
Category One: Locating, Arresting, and Adjudicating Fugitives
With regard to the use of the Internet, including social media, to locate and arrest fugitives
and criminals, ICE officers, agents, attorneys, and support personnel routinely use a variety
of government and commercial databases to identify, locate, and arrest fugitives. These
individuals could include members of the public or employees or contractors of ICE and CBP
suspected of committing crimes or other forms of misconduct. However, additional
infonnation not avaiJable in these databases is available on the Internet, including social
media. The use of the Internet, including social media, w ill allow ICE to gather information
that assists in .i dentifying, locatin g, and arresting fugitives wanted for c1im es and assisting
other law enforcement agencies with identifying, locating, and arresting fogitives.
Category Two: Criminal Investigations and Law Enforcement InteJligence
ICE also uses the Internet, including social media, to assist in investigating, gathering
evidence, and gathering law enforcement .intelligence on criminal and potential criminal
2020-ICLl-00023 801
Homeland The Privncy Ofti cc
U.S. D"f'11r1ment of HQroeh trul Se-Wt\JI
activity. This use of the Internet, including social media, involves activities to gather
information such as internet searches, reviewing social media sites, monjtoring chat rooms,
and reviewing comments posted on websites. This information is gathered and used by ICE
officers, agents, attorneys, and support personnel in the same m anner as information
gathered from non-ln ternet and non-social media sources such as information gathered in
person, on the phone, or through research of hard copy documents. Information gathered in
this fashion may be used in criminal investigations of members of the public or employees or
contractors of ICE and CBP.
Category Three: Officer and Public Safety
ICE a lso uses the Internet, including social media, for pre-operational/operational/situational
awareness uses relating to officer safety or threats to the public at-large. Prior to conducting
tactical enforcement operations or otherwise initiating contact with a subject, ICE agents,
officers, an d support personnel may collect infonnation about the subject of the tactical
enfoTcement operation . This in formation gathering includes information available on tbe
Internet, including social media, such as firearms/weapons possession and
relatives/associates who may reside with them. This infonnation assjsts officers with tactical
planning activities such as: number of officers required for the operation, any specialized
equipment that may be necessary for the operation, and intelligence on when and where the
operation should be conducted for officer safety and tactical efficiency.
2. Based on the operational use of social media Jisted above, please provide the appropriate
authorities.
• Homeland Security Act of 2002, as amended, Pub. L No. 107-296, 116 Stat. 2135 (2002)
• OHS Delegation No. 7030.2, Delegation of Authori ty to the Assistan t Secretary of U.S
Imm igration an d Customs Enforcement
• 19 U.S.C. § 1589a, Enforcement authority of customs officers
• 8 U.S.C § 1357, Powers of immigTation officers and employees
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
cg] Yes. ONo.
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
2020-ICLl-00023 802
Homeland The P,i vncy Ofti cc
U.S. D<p11r1menl of Humelund se-,uri\JI
See Memorandum from Jolm Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, p lease detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
OYes. ~ No. U not, please explain:
The nature. of criminal investigations may require investigators to use n on-
govemment-issued equipment when engaging in criminal investigations.
Investigators at times find themselves in rapidly evolving situations in the field that
call for the use of adaptive meas1.Lres. In situations where governm.e nt-issued
equipment is either not available, or is technologically insufficient to perform the
required task at hand, investigators may need to rely on n on-government-issued
equipment. However, ICE is currently working to provide government-issued
equipment so as to not require the use of non-government-issued equipment in these
circumstances.
b) Email and accounts. Use online screen names or identities that indicate an official DHS
affiliation and use OHS email addresses to open ac:counts used when engaging in social
media in the performance of tl1eir duties;
Because the activities described in Question 1 are for criminal law enforcement purpose~
the employees who engage. in these activities will not identify themselves as ICE or DHS
personnel, or law enforcement personnel. This is necessary to ensure the safety of law
enforcement personnel, to avoid compromising law enforcement operations, to prevent
tipping o.ff individuals who are sought by law enforcement for violations of law, and to
prevent disclosing litigation strategy and tactics.
c} Public interaction. Access publicly available information through social media only by
reviewing posted information without interacting with any individual who posted the
information;
d) Privacy settings. Respect individuals' privacy settings and access only information that is
publicly availablei
2020-ICLl-00023 803
Homeland The Privncy Ofti cc
U.S. Doplfr1menl of Ht•mehtrul s.-..,url\JI
Law enforcement personnel may not access restricted onl.ine sources or facilities absent
legal authority permitting entry i:nto private space. Where legal authority exists, law
enforcement perso1mel may access reshicted online information.
e) PJI collectio11: Collect the minimum PH necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable SORNs cited above are all exempted by Final Ru.I.es from the Privacy Act
(e)(1) requirement (5 U.S.C § 552a(e)(l)), which normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l ) requirement is necessary to ensw-e the integrity of law enforcement investigations,
as more folly detailed in the Final Rules.
f) PJI safeguards. Protect PIT as required by the Privacy Act (if applicable) and DHS privacy
policy;
lCE' s rules of behavior state that law enforcement personnel should retain the
infonnation they access on the h1temet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
communications.
h) Training, Users complete annual privacy training whkh has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
2020-ICLl-00023 804
Homeland The Privacy O ftice
U.S. Department of Homehmd Security
2020-ICLl-00023 805
Homeland The P,ivncy O fticc
U.S. D<p11r1ment of Humelund Secun1y
D New.
D Updated. <Please include the name and number of PlA to be updated
here.>
2020-ICLl-00023 806
Homeland The Piivacy O fticc
U.S. D"'f'11r1ment of Homelund Security
~ A SORN is requfred:
[8J Covered by existing SORN.
DHS/ICE-006 - IC E lnte lligence Records Sys tem (HRS)
DHS/l CE-003 - Gen eral Counsel Electronic Man agement System (GEMS)
2020-ICLl-00023 807
Homeland The Piivncy O fticc
U.S. D<p11r1ment of Homelund Securi1y
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DI-IS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Media Applications);
b) The conduct of authorized inte lligence activities carried out by the Office of Intelligence
and Analysis, the intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component perform.mg authorized foreign intelligence or
cou11terintellige11ce functions, in accorda11ce w ith the provisions of Executive Order
12333, as amended.
This template shall be u sed to document the process to be followed by all programs engaging in
ope.rational uses of social media~ to identify information technology systems, technologies, .rulemakings,
programs, or pilot projects that involve Pll and other activities that otherw ise impact the privacy of
individuals as d etermined by the C hief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may app eal to the Deputy Secretary for
Homeland Security if there is disagreement over the OHS Privacy Office determination of privacy
compliance for the operational use o f social media.
• Gather ing infonnalion by the Office of Operations Coordination and Pla1rning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/O PS/PIA-004/d \ - Publicly Avai lable Social Media Monjtming an d
Situational Awa reness Initiative Update.
2020-ICLl-00023 809
Homeland The Piivacy O fticc
U.S. O"'f'11rtment of H\>melund Security
SUMMARY INFORMATION
Contact Informatio n j(b)(6); (b)(7)(C) IDeputy Privacy Officer, (202) 732 (b)(6); / 1..\ /'7\ l
Counsel2 Contact Information: ~b)(6); (b)(7 )(C) f hief of Staff, (202) 73 I b)(6);
L.. \ /""1 \ , ,-.. ,
1Counsel listed here mu.st certify that a ppropriate authority exists to engage in particular operational activities involving social
media.
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or empfoyment determinations1 oc s ituational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Insh1.1ction 110-01-001 Prhiacy Policy for the
Operational Use of Social M.edia (Privacy l:'olicy) is drafted broadly so as to likely include
general use of the Internet and as social m edia technology is ever changing and evolving, this
template addresses ICE's use of the Internet, to include social media as defined in the Privacy
Policy.
TCE uses the Tntemet, including social media, for general research purposes. Use of the
Tntemet, including social media, for general research purposes includes: (1) using the
Internet, including social media, for legal purposes such as researching individuals or
organizations who may be .involved in lawsuits or other legal actions with ICE, judges
adjudicating cases involving ICE, opposing counsel for cases involving ICE, and legal blogs
and other online forums where legal issues of interest to ICE may be discussed; (2) using the
Internet, including social media, to assist in gathering information on individuals who may
meet with lCE officials to prepare lCE officials for those meetings; (3) using the Internet,
induding social media, to assist in gathering information on individuals who are suspected
of attempting to hack into ICE systems, and (4) other general Internet, including social media,
research.
Category One: Legal Uses
Most of ICE attorneys and support personnel's use of th e Internet, including social media, is
addressed in the four ICE Social Media Templates addressing: (1) Criminal and
Adininistrative Immigration Law Enforcement, (2) Criminal Law Enforcement, (3)
Undercover Criminal Law Enforcement, and (4) Administrative Law Enforcement. With
regard to the use of the Internet, including social media, for other legal purposes, ICE
attorneys and support personnel may view certain legal biogs such as SCOTUSblog3 to keep
informed on legal issues relevant to lCE. During the review of these sites, personally
identifiable information, generalJy limited to an it:1dividual's name, may be viewed and jn
some cases recorded if relevant to a discussion or legal issue (whether author of a blog entry
or individual mentioned in the blog), Further, while excluded from the definition of
Operational Use, ICE attorneys and support personnel may also conduct general Internet
research to find information on parties participating in litigation with ICE and judges
3
SCOTUSblog is a ,legal blog focusing on discussions of recent developments in U.S. Supreme Court jurisprudence.
2020-ICLl-00023 811
Homeland The P,ivncy Ofti cc
U.S. D"f'11r1ment of Homelund Securi\JI
adjudicating cases involving ICE. For example, labor and employment attomeys may search
the b1ternet to find relevant information on employees against whom allegations of
misconduct have been made ot who are otherwise involved in litigation against fCE.
Category Two: Meeting Preparations
ICE also uses the Internet, including social media, to research individuals with whom ICE
employees may be meeting. For example, if the ICE Directo.r is meeting with the head of the
Virginia State Police, ICE employees may search on the Internet to gather biographical
information, news reports, or other publicly available ,i nformation on the head of the Virginia
State Police so as to provide briefing materials to the Director. During these searches
information may be pulled from public biogs and other publicly available online discussions.
Category Three: Security Operations Center
TCE also uses the Internet, including social media, to research individuals who are suspected
of attempting to compromise ICE system integrity. Tn these instances the TCE Security
Operations Center (SOC) performs searches in the process of performing cyber-incident
investigations. During the course of incident response, SOC personnel sometimes will
attempt to identify who may be attempting to hack ICE systems. To gain as much
information as possible about the potential hacker, SOC personnel will investigate using
major search engines and social media websites.
Category Four: General Research
Finally, ICE also uses the Internet, including social media, for geneTal researd1 purposes
including researching individuals providing training to ICE so as to gather information on
their background. This general Internet research is excluded from the definition of
Operational Use but included here for transparency.
2. Based on the operational use of social media listed above, please provide the approp..-iate
authorities.
• Homeland Security Act of 2002, as amended, Pub. l. No. 107-296, 116 Stat. 2135
• Federal Information Security Management Act of 2002 (FISMA) (codified at 44 U.S.C. §
3541 et seq.)
• DJ-IS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcement
• DHS Management Directive 140-01 Information Technology System Security
• DHS Sensitive Systems Policy Directive 4300A.
2020-ICLl-00023 812
Homeland The P,ivncy Ofti cc
U.S. D"f'11r1ment of Humelund Se-,ur1ty
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
[gjYes. 0No.
4. Please attach a copy of the Rules of Behavior that out1ine the requireJnents below.
See Memorandum from John Morton, Use of Public Online Information for Non-Law
Enforcement Work-Related Activities.
5. Please describe the Rules of Beha~or in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use o f social media;
[gj Yes. D No. If not, please explain:
b) Email and accounts. Use onJine screen names or identities that indicate an official DHS
affiliation and use OHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
f) Pll safeguards. Protect PU as required by the Privacy Act (if applicable) and OHS privacy
policy;
ICE employees should retain the contents of their use of the Internet, including social
media, if they would have retained that content had it been written on paper. These
contents should be preserved in accordance with office procedures in a manner
authorized by the relevant records schedule.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational uses 0£ social media, access requirements, and
.requirements for documenting operational uses of social media.
2020-ICLl-00023 814
Homeland The Piivacy O fticc
U.S. O"'f'11r1ment of Homelund Secun1y
0New.
D Updated. <Please include the name and number of SORN to be updated
here.>
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the e.xisting PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Med ia Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the .intelligence and counterintelligence elements oi the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance w ith the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by a ll programs engaging in
operational uses of social media~ to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PU and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the DHS Privacy Office determination of privacy
compliance for the operational use of social media.
• Gathering infonnalion by the Office of Operations Coordination and Planning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA; DHS/OPS/PIA-004(dl · Publicly Avai lable Social Media Monjtming and
Situational Awa reness Initiative Update.
2020-ICLl-00023 817
Homeland The Piivacy O fticc
U.S. D<p11r1ment of Humelund Securi1y
SUMMARY INFORMATION
1Counsel listed here rnwt certify that appropriate authority exists to engage in pa rticular operational activities involving social
media.
2020-ICLl-00023 819
Homeland The P,ivncy Ofti cc
U.S. D"'f'11r1menl of Humelund se-,uri\JI
SPECfFlC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Instruction 1)0-01-001 Privacy Policy for the
Opera.tio1ial Use of Social Media (Privacy Policy) is drafted broadly so as to }jkely include
general use of the ln ternet and as social media technology is ever changing and evolving, this
template addresses ICE's use of the Internet, to include social media as defined in the Privacy
Policy.
With the enachnent of the Homeland Security Act of 2002, Congress authorized ICE to
conduct certified undercover investigative operations to obtain evidence or information
concerning violations of laws enforced by ICE and stemming from the authorities of its
Legacy agencies, the U.S. Customs Service (USCS) and the Immigration. and Naturalization
Service (INS). Within ICE, investigations are only conducted by the Homeland Security
Investigations (HSI) component and the Office of Professional Responsibility (OPR). The
authority to certify undercover operations has been delegated to the Executive Associate
Director of HSI and the Assistant Director for OPR. HSI and OPR may also engage in limited
use of social media, when authorized, if an investigation does not otherw ise warrant being
placed under a certified m,dercover operation. These activities are detailed i:n the templates
addressing Criminal Law Enforcemen t and Adm inistrative Law Enforcement.
Undercover activities and operations are undertaken for numerons potential objectives that
include: (1) determining if a v iolation of law has occurred or is in progress; (2) identifying
specific violations of law; (3) identifying cTiminal violators, conspirators, and their
methodologies; (4) disrupting and/or dismantling criminal organizations; (5) locating the
violation sites and equipment tJSed; (6) locating assets for seizure and forfeiture; (7) obtaining
evidence for prosecution; (8) determining the safest and most advantageous time to make
ar.rests, execute search warrants, and make seizures; (9) identifying witnesses and
cooperating individuals; (10) identifying associations between conspirators; (11) checking the
reliability of sources of infonnation and cooperating defendants; and (12) gathering
intelligence that allows ICE management to evaluate threats, reallocate resources, and
organize enforcement activity. ICE may collect personaily identifiable information ftom or
about individuals over the Internet, including via social media sites.
The nature of undercover operations often requires an ICE-HSI or OPR criminal investigator
to appear to be engaged in a criminal enterprise and to befriend or become business
2020-ICLl-00023 820
Homeland The Privncy Ofti cc
U.S. D"f'11r1menl of Homeh1ruJ se-,uri\JI
associates with potential violators. This is cruciaJ to the successfuJ integration of undercover
operatives with those who comm.it illegal acts. As part of a certified u ndercover investigation
or operation, when authorized, W1dercover operatives may participate in activities that
would constitute a crime u n der federal, state, or local law. This otherwise illegal activity
includes, for example, the purchase of stolen or co11traband goods, the p urchase of illegal
and/or fraudulent immigration documents, and U1e controlled delivery of drugs or other
contraband that wm not enter the com merce of the United States. ICE-HSl and 0PR review
and authorize, as ap propriate, requests to engage in various otherwise illegal activities in
furtherance of undercover operations. In the course of carrying ont these authorized
undercover activities, ICE-HSI or 0PR criminal investigators may collect personally
identifiable information using the Internet. Any of these activities may take place in part
over the Internet, to include social media.
As the "rules'' for undercover operations are different than non-undercover law enforcen1ent
work, and may require agents to engage in activities that would otherwise be considered
prohibited or unauthorized, the rules of behavior for undercover criminal investigations are
different than for non-undercover investigations.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
USCS was vested with the authority to conduct certified undercover operations through the Anti-
Drug Abuse Act o.f 1986, which enacted 19 U.S.C. § 2081; INS received similar authority through
the Illegal Immigration Reform and Immigrant Respornibility Act of 1996, specifically 8 U.S.C. §
1363a. With the enactment of the Homeland Security Act of 2002, these statutory authorities
transferred to the newly created Department of Homeland Security (OHS) and were delegated to
the Assistant Secretary of ICE in OHS Delegation Number 7030.2, "Delegation of Authority to the
Assistant Secretary for U.S. lmmigration ai1d Customs Enforcement,'' an d further redelegated to
the Directors of 0 1 and 0PR in ICE Delegation Order 04-002 entitled, "Authority to Certify the
Exemption of Undercover Operations From Certain Laws Withi n U.S. Imm igration an d Customs
En forcem ent." TCE-HST and 0 P R crimin al jn vestigators are granted their enforcement authority
in 8 U.S.C § 1357 and 19 U.S.C § 1589a.
a) • Has Counsel listed above revi ewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
[g'.]Yes. ONo.
2020-ICLl-00023 821
Homeland The P,ivncy Ofti cc
U.S. D<p11r1menl of Humelund Se.uritY
4. Please attach a copy of the Ru.les of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012,
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Ru.le:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
Because the activities d escribed in Ques tion 1 are fo1· undercover investigative purposes,
the employees who engage in these activities have assumed an undercove r identity and
therefore will not identify themselves as ICE or OHS personnel, or law enforcement
personnel in general. This is necessary to ensure the safety of law enforcement
personnel, to avoid compromising undercover law enforcement operations, and to
prevent tipping off individuals who are sought b y law enforcement for violations of law.
c} Public interaction. Access publicly available in.formation through sociaJ media only by
reviewing posted information without interacting with any individual who posted the
information;
d) Privacy settings. Respect individuals' privacy settings and access only information that is
publicly available;
Law enforcement perso1mel may not access restricted o njjne sources or facilities absent
legal authority permitting entry into private space . Where legal authority exists, law
enforcem ent personnel may access restricted onlin e inform ation.
2020-ICLl-00023 822
Homeland The P,ivncy Ofticc
U.S. D"f'11r1menl of Humelund Secur11y
e) PII collecHon: Collect the minimmn PU necessary for the proper performance of their
authorized d uties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable SORNs cited above are all exempted by Pinal Rul,es from the Privacy Act
(e)(1) requirement (5 U.S.C. § 552a(e)(l)), which normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l) requirement is necessary to ensure the integrity of law enforcement investigations,
as more fully detailed in the Final Rules.
f) Pll safeguards. Protect PU as required by the Privacy Act (if applicable) and OHS ptivacy
policy;
ICE's rules of behavior state that law enforcement personnel should retain information
they access on their use of the Internet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
comm uni cations.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Coutact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum; legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
D Yes, employees self-certify that they have read and understood their Component
Rules of Behavior.
2020-ICLl-00023 823
Homeland The P,ivncy O fticc
U.S. D<p11r1ment of Humelund Secur11y
0New.
D Updated. <Please inc.Jude the name and number of PlA to be updated
here.>
[8J A SORN is required:
2020-ICLl-00023 824
Homeland The Piivacy Office
U.S. O"J'urtment of Homelund Security
2020-ICLl-00023 825
From: !(b)(6\: (b\(7 \(C\
Se nt: 10 Sep 2019 13:24:25 +0000
To: I
l(b)(6); (b)(7)(C)
Subje ct: FW: ERO social media white paper
"Some time later, a Johnson City police officer named Thomas Garrison, using an undercover account,
sent Farrad "a friend request on Facebook." R. 71 (Trial Tr. Vol. I at 81, 90-91) (Page ID #679, 688-89).
After Farrad "accept[ed] 865*865 the friend request," US v. Farrad, 895 F.3d 859 (6th Cir. 2018).
https ://scholar.google .com/scholar case ?case=9622776040984860897&q=re lated: sriNfqSsxHcJ :scholar.
google.com/&hl=en&as sdt=0,9&as ylo=2019&scioq=social+and+media+and+%22terms+of+use%22+a
nd+%221aw+enforcement%22
From:Kb)(6); (b)(7)(C)
Se nt: Monday, September 9, 2019 10:39 AM
Tof b)(6); (b)(7)(C)
Subject: RE: ERO social media white paper
Thanks!
Best
(b )(6);
/ 1,,.\/7 \ / r,\
Mobile: 202-870Kb)(6); I
From;kb)(6); (b )(7)(C)
Sent: Monday, September 9, 2019 10:38 AM
To: fo)(6\: (b)(7\(C)
Subje ct: FW: ERO social media white paper
"United States v. Robison, No. l 1CR380 DWF/TNL, 2012 WL 1110086, at *1-2 (D. Minn. Mar.
16, 2012) (noting that law enforcement created fake online identity
and became Facebook friends with defendant, "which permitted [the govermnent] to view [the
defendant's] name and photo on his Facebook account"); United States v. Phillips,
Criminal No. 3:06-CR-47, 2009 WL 1918931 , at *7 (N.D. W. Va. July 1, 2009) (noting that the
government 'created an undercover user profile on www.myspace.com')," available at,
https ://scholarship.richmond.edu/cgi/viewcon tent.cgi ?article= 13 80&context=j o lt and
https: //scholarsbank.uoregon .edu/xmlui/bitstream/handle/1794/225 66/J ones201 7.pdf?seguence=
l &isAllowed=y
2020-ICLl-00023 827
FromKb )(6); (b)(7)(C)
Sent : Friday, September 61 2019 12:22 PM
Tol(b)(6 ); (b ){7)(C)
Subject: FW: ERO social media white paper
"Additionally, ICE independently began a pilot to use social media screening during the visa issuance
process. However, these pilots, on which DHS plans to base future department-wide use of social media
screening, lack criteria for measuring performance to ensure they meet their objectives. Although the
pilots include some objectives, such as determining the effectiveness of an automated search tool and
assessing data collection and dissemination procedures, it is not clear DHS is measuring and evaluating
the pilots' results to determine how well they are performing ... ln August 2016, ICE independently began
a pilot to screen the social media activity...ln our opinion, a clearly defined performance evaluation is
essential to determining whether, how, and when to integrate pilot activities into overall efforts and will
enable the Department to implement a more effective social media screening program"
https.//www .oig.dhs.gov/sites/default/files/assets/2017 /OIG-17-40-Febl7.pdf
" .... However, upon discovering the lack of performance measures in USCIS' and ICE's pilots for social
media screening for immigration benefits, we adjusted our scope and reviewed DHS' social media task
force and DHS' use of pilots to help create a social media screening program. Although we reviewed DHS
policies relevant to social media screening, including DHS Instruction Number 110-01-001, Privacy Policy
for Operational Use of Social Media, we could not evaluate specific policies and procedures for the pilots
because they had not been written." https://www.oig.dhs.gov/sites/defau1t/files/assets/2017/01G-17-
40-Feb17.pdf
https://www.nextgov.com/policy/2019/09/dhs-using-fake-social-media-profiles-investigate-
immigrants/159606/
2020-ICLl-00023 828
https://www.uscis.gov/sites/default/files/files/nativedocuments/Delegation to Conduct Certain Law
Enforcement Activities.pdf
Memorandum from John M011on, "Use of Public and Non-Public Online Information for Law
Enforcement Personnel" (June 28, 2012):
Undercover Communications. Law enforcement personnel communicating online with witnesses,
subjects, or victims must disclose their affiliation with law enforcement when ICE guidelines would
require such disclosure if the communication were taking place in person or over the teleghone. law
enforcement personnel may communicate online under a non-identifying name or fictitious identity if
ICE guidelines and rocedures would authorize such communications in the hysical world. For
purposes ofiCE undercover guidelines, each discrete conversation online constitutes a separate
undercover activity or contact, but such a conversation may comprise more than one transmission
between the law enforcement personnel and another person.
https://insight.ice.dhs.gov/mgt/igp/Documents/pdf/law-enforcement-online-policy.pdf
"Moreover, federal law enforcement agents communicating on line with witnesses, subjects, or victims
must disclose their affiliation with law enforcement when DHS guidelines would require such disclosure
if the communication were taking place in person or over the telephone - they may communicate
online under a non-identifying name or fictitious identity if DHS guidelines and procedures would
authorize such communications in the physical world ."
https://www.dhs.gov/news/2012/02/15/written-testimony-priv-house-homeland-security-
su beam m ittee-cou nterterrorism-a nd https://www .govi nfo.gov/content/pkg/CH RG-
112hh rg76514/htm I/CH RG-112hh rg76514. htm
See, e.g., Online Investigative Principles for Federal Law Enforcement Agents (Department of Justice,
1999) and Civil Liberties and Privacy Guidance for Intelligence Community Professionals: Properly
Obtaining and Using Publicly Available Information (Office of the Director of National Intelligence,
2011).
https://www.dni.gov/fi1es/documents/CLP0/CLP0%20Publication Publicly%20Available%201nformation
July%202011%20-%20Public%20Release%20Version.pdf
Vb)(6): I
Privacy Compliance Specialist, CIPP/G
Information Governance and Privacy (IGP)
U.S. Im migration & Customs Enforcement
Direct: (202) 73 (b)(6);
M ain: (202) 73 (b)(?)(C
2020-ICLl-00023 829
From: ~(b)(6); (b)(7)(C)
Sent: Thursday, September 5, 2019 4:14 PM
To:l(b)(6); (b)(7)(C)
Cc:_
Subject: RE: ERO social media white paper
If you want to do a quick survey of other DHS programs and social media PIAs and send the links in a
consolidated email, that would be great. No specific due date, but if one of you has the bandwidth to
take that on, it would really help our forthcoming document.
I
l(b)(6): (b )(7)(C)
Acting Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732 (b)(6);
Mobile: 202-701 b)(6};
Main: 202-732j(b)/6): I
From:Kb)(6}; (b)(7}(C)
Se nt: Thursday, September 5, 2019 4:01 PM
To: kb)(6); (b)(7}(C}
Subject: RE: ERO social media white paper
I don't know if you saw this, but USCIS published a PIA for their use of fictitious accounts. It may be a
(b \(7\(E\
Mobile: 202-870~(b)(6);
From:l(b)(6); (b)(7)(C)
Sent: Thursday, September 5, 2019 12:24 PM
To:l(b)(6); (b)(7)(C)
Subject: RE: ERO social media white paper
Hi l(b)(6);
Some responses to your comments in the attached. Essentially, I'm mainly concerned w ith ERO's
authority to create a fake profile and how we would get around the Terms of Service of certain social
media providers. See my other responses to your questions regarding ERO's general mission/authority
and we can confirm our question w ith ERO.
2020-ICLl-00023 830
l(b }{6);
Acting Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732l(b l(6): I
Mobile: 202-70lkb)(6\'. I
Main: 202-732!(b)(6):I
From:l(b)(6); (b)(7)(C)
Se nt: Thursday, August 29, 2019 7 :50 AM
To: f b)(6): (b)(7)(C)
Subje ct: ERO social media white paper
Good Morning!(b)(6\:
Find enclosed the white paper with our major questions regarding ERO's social media use. Uke we
discussed last week, it doesn't actually talk about what they are trying to do operationally (the whole
point of the white paper). They've stated they want it for fugitive ops, but there are some references in
the white paper for detainee ops. I see the purpose, I just genuinely don't know if detainee officers
havet • · · •1 ••• '.-·• •••• ···•·'.•·····••,:.•.···
1.
2.
I
kb )(6t (b H7)(C)
Privacy Analyst, J.D.1 CIPP/US/G
Office of lnformatlon Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732~/h\te:.1-I
Mobile: 202-870{ b\C6}1
Main: 202-732~/h\/R\·I
2020-ICLl-00023 831
From: l(b)(6); (b)(7)(C)
Sent: 10 Sep 2019 08:53:41 -0400
To: kb )(6): (b )(7)(C) I
Subject: Information Copy from or MGMT Workflow # 1185104
(Service 1185104) (Intranet Quorum IMA007207360)
For review. please find OHS lnstrnction 262-11 -004, Revision 00, "Withholding of Personnel's Personally
l<lentitiable fnformation from Disclosure" (Attachment 1). The comment sheet is Attachment 2. The
comments are due by September 20, 2019. Thanksl/b)(6): I
Kb)(6); (b )(7)(C)
2020-ICLl-00023 832
From: kb)(6); (b)(7)(C)I
Sent: 6 Sep 2019 16:18:32 +0000
To: Kb)(6); (b)(7)(C)I
Subject: FW: ERO social media white paper
"Additionally, ICE independently began a pilot to use social media screening during the visa issuance
process. However, these pilots, on which DHS plans to base future department-wide use of social media
screening, lack criteria for measuring performance to ensure they meet their objectives. Although the
pilots include some objectives, such as determining the effectiveness of an automated search tool and
assessing data collection and dissemination procedures, it is not clear DHS is measuring and evaluating
the pilots' results to determine how well they are performing ... ln August 2016, ICE independently began
a pilot to screen the social media activity... ln our opinion, a clear ly defined performance evaluation is
essential to determining whether, how, and when to integrate pilot activities into overall efforts and will
enable the Department to implement a more effective social media screening program"
https://www .oig.dhs.gov/sites/default/files/assets/2017/OIG-17-40-Febl7 .pdf
" .... However, upon discovering the lack of performance measures in USCIS' and ICE's pilots for social
media screening for immigration benefits, we adjusted our scope and reviewed DHS' social media task
force and DHS' use of pilots to help create a social media screening program. Although we reviewed DHS
policies relevant to social media screening, including DHS Instruction Number 110-01-001, Privacy Policy
for Operational Use of Social Media, we could not evaluate specific policies and procedures for the pilots
because they had not been written." https://www.oig.dhs.gov/sites/default/files/assets/2017 /OtG-17-
40-Feb17.pdf
https://www.nextgov.com/policy/2019/09/dhs-using-fake-social-media-profiles-investigate-
immigrants/159606/
Memorandum from John Morton, "Use ofPublic and Non-Public On.line Information for Law
Enforcement Personnel" (June 28, 2012):
Undercover Communications. Law enforcement personnel communicating on.line with witnesses,
subjects, or victims must disclose their affiliation with law enforcement when £CE guidelines would
require such disclosure if the communication were takingJ?,lace in person or over the tele hone. Law
enforcement personnel may communicate online under a non-identifying name or fictitious identity i ·
ICE guidelines and procedures would authorize such communications in the physical world. For
purposes ofiCE undercover guidelines, each discrete conversation ouline constitutes a separate
2020-ICLl-00023 833
undercover activ ity or contact, but such a conversation may comprise more than one transmission
between the law enforcement personnel and another person.
l(b)(7)(E)
"Moreover, federal law enforcement agents communicating on line with witnesses, subjects, or victims
must disclose their affiliation with law enforcement when DHS guidelines would require such disclosure
if the communication were taking place in person or over the telephone - they may communicate
online under a non-ident ifying name or fictitious identity if DHS guidelines and procedures would
authorize such communications in t he physical world ."
https ://www.dhs.gov/n ews/2012/02/ 15 /written-testimony-priv-ho use-homeland-security-
subcorn m ittee-co unterterrorisrn-and https ://www.govinfo.gov/content/pkg/CHRG-
112hhrg76514/htmI/CH RG-112hhrg76514.htm
See, e.g., Online Investigative Principles for Federal Law Enforcement Agents (Depart ment of Justice,
1999) and Civil Liberties and Privacy Guidance for Intelligence Community Professionals: Properly
Obtaining and Using Publicly Available Information (Office of the Director of National Intelligence,
2011).
https://www.dni.gov/fi1es/documents/CLPO/CLP0%20Publication Publicly%20Available%20Information
July%202011%20-%20Public%20Release%20Version.pdf
l/b)(6): /b)(7)/C)!
Privacy Compliance Specialist, CIPP/G
Information Governance and Privacy (IGP)
U.S. Immigration & Customs Enforcement
Direct: (202) 73 b)(6);
Main: (202) 732 b)(7)(
From:kb)/6): /b)/7)(C)
Sent: Thursday, September 5, 2019 4:14 PM
To:l(b)(6); (b)(7)(C)
Cc:~
, -----------------~
Subject: RE: ERO social media white paper
If you want to do a quick survey of other DHS programs and social media PIAs and send the links in a
consolidated email, that would be great. No specific due date, but if one of you has the bandwidth to
take that on, it would really help our forthcoming document.
~?~~~~:,~. I
Acting Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732Kb)(6); I
Mobile: 202-701 /b)/6):
Main: 202-732 (b)(6);
2020-ICLl-00023 834
From :!(b\(6\: (b\(7 ){C )
Sent : Thursday, September 5, 2019 4:01 PM
To t b)(6); (b)(?)(C ) I
Subject: RE: ERO social media white paper
I don't know if you saw this, but USCIS published a PIA for their use of flctitious accounts. It may be a
good template for our Social Media PIA and to backstop ERO and HSI creating fake accounts.
Best,
(b )(6):
I L \ l '"? \ fr "'.
Mobile: 202-870Kb)(6); I
H1 !(b)(6):
Some responses to your comments in the attached. Essentially, I' m mainly concerned with ERO's
authority to create a fake profile and how we would get around the Terms of Service of certain social
media providers. See my other responses to your questions regarding ERO's general mission/authority
and we can confirm our question with ERO.
!rh){fl)·
Acting Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732-Rfil@]
Mobile: 202-701f b)(6); I
Main: 202-73~(b)(6)I
From:kbH6): (b)(7)(C)
Sent: Thursday, August 29, 2019 7:50 AM
To f b)(6): (b)(?)(C)
Subject: ERO social media white paper
Good Morningllhvrn· I
Find enclosed the white paper with our major questions regarding ERO's social media use. Like we
discussed last week, it doesn't actually talk about what they are trying to do operationally (the whole
point of the white paper). They've stated they want it for fugitive ops, but there are some references in
the white paper for detainee ops. I see the purpose, l just genuinely don't know if detainee officers
have the authority to investigate outside a facility. So the things we need OPLA to answer:
Kb)(5)
2020-ICLl-00023 835
From: l(b)(6); (b)(?)(C)
Sent: 25 Nov 2019 13:09:20 +0000
To: Kb)(6); (b)(?)(C) I
Subject: FW: Protective Markings on FOUO vs LES
FYI. I checked this with some people in the FOIA section and they said the same thing.
Best,
~b)(6);
b)(5)
-
Feel free to give me a call with any other questions!
Good Afternoon,
2020-ICLl-00023 837
(b)(6); (b)(7)(C)
-
Thanks for the help!
llb)(6): /b)(7)/C) I
Privacy Analyst, J.D., CIPP/US/G
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732 b)(6);
/1-
Mobile: 202-8 b)(6):
Main: 202-732tb)(6);
2020-ICLl-00023 838
From: I
j(b)(6); (b)(7)(C)
Sent: 10 Jul 2019 15:39:36 +0000
To: I
!(b)(6) ; (b)(7)(C}
Subject: FW: SMOUTs
Attachments: Criminal and Administrative Immigration LE (IGP 07 10 2019).DOCX
Hil(b)(6):
I made some edits before we talk later today (attached). S:\PrivRecOff\PB\Projects & Offices\Social
Media lssues\Social Media Templates SMOUTs\Criminal and Administrative Immigration LE (ERO HSI
OPLA)\SMOUT 2019
Best,
Kb}(6); (b}(7)(C)
From:kb)(6): (b)(7)(C)
Sent: Wednesday, July 10, 2019 8:24 AM
To: Kb)(6); (b)(7)(C)
Subject: FW: SMOUTs
Best,
Kb)(6); (b)(7)(C) I
Mobile: 202-870~(b)(6); I
From:l(b)(6): (b)(7)(C)
Sent: Tuesday, July 9, 2019 4 :50 PM
To:l(b)(6); (b)(7)(C)
Subject: RE: SMOUTs
Vb\16 \: I
Privacy Compliance Specialist, CIPP/G
Information Governance and Privacy (IGP)
2020-ICLl-00023 839
From:kb\(6 \: (b\(7 )(C\
Sent: Tuesday, July 9, 2019 4:49 PM
To:l(b)(6); (b)(7)(C)
Subject: RE: SMOUTs
Heyl(b)(6):
There are quite a few updates needed for the LE SMOUT, let' s get together sometime tomorrow and
run it down.
Best,
l(b)(6);
From:kb)(6); (b)(7)(C)
Sent: Tuesday, July 9, 2019 1:05 PM
To:l(b)(6); (b)(7)(C)
l'b)(6); (b)(7)(C)
Subject: RE: SMOUTs
Hi All,
Just a reminder, during the course of this social media project, if you find that any of the program offices
come back with social media update(s) that pertain to the SMOUTs please keep me in the loop as I am
tasked w ith updating the attached SMOUTs.
Thanks,
Hi all,
2020-ICLl-00023 840
During the course of this social media project if you find that any of the program offices come back with
social media update(s) that pertain to the SMOUTs please keep me in the loop as I am tasked w rth
updating the attached SMOUTs.
l(b)(6): (b)(7)(C) I
Privacy Compliance Specialist, CIPP/G
Information Governance and Privacy (IGP)
U.S. Immigration & Customs Enforcement
Direct: (202) 732-~
Main: (202) 732 b)(6);
.... \/7 \I
Subject: SMOUTs
a) Communications and oub:each with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Commmucations/Oub·each/Public Dialogue and DHS/ALL/PlA-036 -
Use of Unidirection al Social Med ia Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Inte lligence
and Analysis, the intelligence and cow1terintelligence elements of the United States
Coast Guard, or any other Component performing authorized foreign inteUigence or
counterintelligence functions, in accordance vvith the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by all programs engaging in
operational uses of social media; to identify information technology systems, teclmologies, rulemakings,
programs, or pilot projects that involve Pll and other activities that otherwise impact the privacy of
ind ividuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the DHS Privacy Office determination of privacy
compliance for the operational use of social media.
1 Gathering informatfon by ll1e Office of Operations Coordination and Planning {OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existjng PIA: DHS/OPS/PIA-004/dl - Publicly Available Social. Media Monitoring and
Situational Awareness Tniti• tive Update.
2020-ICLl-00023 842
Homeland The P1ivacy Office
U.S. o,,purtment ofH0111el.rnd s~curity
SUMMARY INFORMATION
CounseF Contact Information : Adam Loiacono, Chief, Enforcement and Re moval operations
Law Div ision, OPLA; l(b}(6); (b}(7)(C) IChief, Government Information Law Div ision, OPLA
IT System(s) where social media data is stored: ICE Investigative Case Management (1CM),
LeadTrac System, Fugitive Case Manageme nt System, Enforcement Integrated Database, and
Alien Criminal Res ponse Information Management System
Applicable Syste m o f Records Notice(s) (SORN): <Please enter the SORN name(s) and
number(s).>
1 Counsel listed here must certify that appropriate authority exists to engage in particular operational activities involving social media.
2020-ICLl-00023 843
Homeland The P,i vacy Office
U.S. Dopurtmeoi of Homeland S~curity
• ICE Delegation No. 0001, Delegation of Authority to the Directors, Detention and Removal and
Investigatio11s, and to Field Office rnrectors, Special Agents in Charge and Certain Other
Officers of the Bureau of Immigration and Customs Enforcement
• 8 C.F.R. § 2.1, Authority of the Secretary of Homeland Security
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
[SJ Yes. ONo.
ls this use of social media in development or operational?
D In development. [SJ Operational. Date first launched: Unknown
Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online !,,formation, June 28, 2012.
Please describe the Rules of Behavior in effect for the listed operational use of social media. If users
do NOT follow a particular Rule, please detail reasoning for not following that Rule:
b) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
OYes. [SJ No. If not, please explain:
Because the activities described in Question 1 axe for immigration law enforcement
purposes, U1e employees who engage u1 these activities will not identify themselves as
ICE or OHS personnel, or law enforcement personnel. This is necessary to ensure the
safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevent tipping off individuals who are sought by law enforcement for
viola.tion s of law, and to preve11t d isclosing litiga.tio11 strategy and tactics.
c) Email and accounts. Use online screen names or identities that indicate an official OHS
affiliation and use OHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
Because the activities described in Question 1 are for immigration law enforcement
purposes, the employees who engage in these activities will not identify themselves as
2020-ICLl-00023 847
Homeland The P,ivacy Office
U.S, De1purtmenl of Ho111el.tnd S~curity
ICE or OHS personnel, or law enfoi-cement personnel This is necessary to ensure the
safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevent tipping off individuals who are sought by law en forcement for
violations of law, ai1d to prevent d isclosing litigation strategy and tactics.
d) Public interaction. Access publicly available information through social media only by
reviewing posted information without interacting with any individual who posted the
information;
f) PU collection: Collect the minimum PU necessary fot: the proper perfonnance of their
authorized du ties except for systems subject to Final Ru !es for Exemption from certain
aspects of the Privacy Act;
The applicable S0RNs cited above are all exempted by Final Rules from the Privacy Act
(e)(l) requirement (5 U.S.C. § 552a(e)(l)), which normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l) requirement is necessary to ensure the integrity of law enforcement investigations,
as more fully detailed in the Final Rules.
g) Pll safeguards. Protect PIT as required by tl;ie Privacy Act (if applicable) and OHS privacy
policy;
ICE's rules of behavior stated that law enforcement personnel should retain the
information they access on the Internet, including social m edia, if they would have
retained that content had it been written on paper. These contents should be preserved in
2020-ICLl-00023 848
Homeland The P,ivocy Office
U.S. o,,purtment of H0111el.1nd S~curity
i) Tmilling . Users complete am1Ual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational uses of social media, access reguirements, and
reguirernents for documenting operational uses of social media.
Mechanisms are (or will be) in place to verify that users have completed training.
D Yes, employees self-certify that they have read and understood their Component
Rules of Behavior.
2020-ICLl-00023 849
Homeland The P,ivacy Office
U.S. o,,purtment of H0111eh1nd S~curity
NAME of the OHS Privacy Office Reviewer: <Please enter name of reviwer.>
2020-ICLl-00023 850
From: l(b)(6); (b)(7)(C)
Sent: 8 Oct 2019 15:44:56 +0000
To: kb )(6): (b )(7)(C) I
Subject: NSU Open Source
Attachme nts: NSU Open Source Rules of Behavior (KC 10.01.19) - Final.docx, SMOUT, ICE -
Criminal and Admin Immigration LE, 20170103, PRIV Final.pdf, PTA ICE- HSI NSU OST - Draft
10082019.docx
Kb)(6);
I was recently named the Team Lead for the new Open Source Pro·ect at NSU so I am in the proces-s of
finalizing our SOP and Rules of Behavior. After talking to b)(6); {b)(7)(C) and !(b){6): (b )(7 \CC\ 11
know they have worked with you to get most of the heavy lifting complete. I believe the PTA and
SMOUT are looking good-to-go but we made some minor tweaks to the ROB based on your suggestions.
Would you mind taking a look at our latest version of the ROB? If everything looks good, I can get this
blessed off by NSU leadership this week and begin refining our SOP and start training.
Very Respectfully,
Kb)(6); (b)(7)(C) I
National Security Unjt
Homeland Security Investigations
U.S. Immigration and Customs Enforcement
Desk: 571-468,Kb\fn\· I
Cell: 404-41 b)(6);
(b)(6); (b)(7)(C)
2020-ICLl-00023 859
Homeland The Privacy Office
U.S. Depannwnt or HomeJ,md Security
a) Communications and oulTeach with the public authorized by the Office of Public Aifairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networki.ng Interactions
and Applications Communications/Outreach/Public Dialog:ue and DHS/ALL/PJA-036 -
Use of Unidirectional Social Media Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the .intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance with t he provisions of Executive Order
12333, as amended.
This tern.plate shall be used to document the process to be followed by all programs engaging in
operational uses of social media; to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve Pll and other activi ties that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
ad ditional Privacy Compliance Documentation. Components may appeal to the Depu ty Secreta ry for
Homeland Security if there is disagreement over the OHS Privacy Office determination of privacy
compliance for the operational u se of social media.
• Gathering information by the Office of Operations Coordination and Planning (OPS) to enhance situational awareness is exempt
frorn this requirement a nd is covered by the existing PIA, IJHS/OPS/PLA· 004(d) • Publiclv AvaUable Soc:ia.l Media Monito.1ing an.d
Si!·uational Awareness Initiative Update.
2020-ICLl-00023 862
Homeland The Privacy Office
U.S. Depanmen1 oO-LomeJ,md Security
SUMMARY INFORMATION
I
Contact Information: l(b)(6); (b)(7}(C) Privacy Officer, (202) 732J~?(~); . I
Counsel2 Contact Information: Adam Loiacono, Chief, Enforcement and Removal operations
Law Division, OPLA; j(b)(6); (b)(7)(C) I
(A) Chief, Government Information Law Division,
OPLA
IT System(s) where social media data is stored: TECS Case Management, Fugitive Case
Management System, Enforcement Integrated Database, and Alien Criminal Response
Information Management System
• Counsel 1.isted here must certify that appropriate authority exists to engage in particular ope(aHonal activities in volving social
media.
2020-ICLl-00023 863
Homeland The Pfivacy O f_fice
U.S. Depaliment of liomel,md Security
DHS/USCIS-ICE-CBP-001 -Alien File, Index, And National File Tracking System SORN
2020-ICLl-00023 864
Homeland The Privacy Office
U.S. D•p~linwnt or HomeJ,md Security
SPECIFIC QUESTIONS
1. Describe the category of use for coJlecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or s ituational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Insb·uctiun 110-01-001 Privacy Policy for the
Operational Use of Social Media (Privacy Policy) is drafted broadly so as to likely include general
use of the Internet and as social media technology is ever changing and evolving, this template
addresses lCE's use of the Internet, to include social media as defined in the Privacy .Policy.
ICE uses the Internet, including social media as defined jt1 the Privacy Policy, for criminal and
administrative immigration law enforcement purposes. (This template does not address the
conduct of undercover operations in the context of criminal immigration law enforcement
investigations. Those activities are covered by a separately submitted template that covers
undercover investigations only.) This immjgration law enforcement use of the Internet including
social media, falls into the following four categories: (1) using the Internet, including social
media, to assist in locating, arresting, and adjudicating individuals who may be amenable to
removal under the Immigration and Nationality Act or are otherwise suspected of violations of
U.S. immigration law and assisting other law enforcement agencies with investigations and
adjudications related to individuals, (2) identify individuals who may be inadmissible to the
United States under the Immigration and Nationality Act, (3) pre-operational, operational, and
situational awareness uses related to officer safety or threats to the public at-large, and (4) to
obtain information to assist in d etermining whether to exercise prosecu torial discretion.
Category One: Basic Criminal and Administrative Enforcement of the Immigration and
Nationality Act
With regard to the use of the Internet, including social media, to locate and arrest individuals,
ICE officers, agents, attorneys, and support personnel routinely use a variety of government and
comm ercial databases to identify, locate, and arrest individuals who may be amenable to removal
and meet ICE's current enforcement priorities. However, additional ·information not available in
these databases is available on the Internet, including social media. The use of the Internet,
including social media, will allow ICE to gather information that assists in identifying, locating,
and arresting individuals wanted for crimes and/or who may be amenable to removal, and
assisting other law enforcement agencies with investigations related to individu.a ls where
necessary and appropriate. It will also allow ICE attorneys who represent the agency in civil
2020-ICLl-00023 865
Homeland The Privacy Of-fice
U.S. D•p~linwn1 ,•rHumeJand Se~urlty
immigration proceedings before the Executive Office for Immigration Review to conduct gelleraJ
and specifi c case research an d preparation.
Category Two: Inadmissibility Recommendations unde.r the Immigration and Nationality Act
ICE also uses the Intemet, iricluding social media, to iden tify iridividuals who may be
inadmissible to the United States under the lmmigration aJ1d Nationality Act. As a function of the
Visa Security Program, ICE makes recommendations to the Department of State on the issuance
and status of non-immigrant visas. ICE may collect information about non-immigrant visa
applicants and their associated points of contact listed on their v isa application in order to make
these recommendations. This includes gathering information publicly available on the Internet,
including social media, before and after visa approval. ICE may also collect information about
non-immigrant visa holders. If derogatory information about a non-immigrant visa ho lder is
w1covered, in.formation m ay be sh ared with the Department of State and/or forwarded to the
appropriate ICE Homeland Security Investigations field office for appropriate action depending
on whether the non-immigrant visa h older has entered the United States.
ICE also uses the Internet, includin g social media, for pre-operational/operational/situational
awareness uses relating to officer safety or threats to the public at-large. Prior to conducting
tactical enforcement operations or otherwise initiating contact with a subject, ICE agents, officers,
or support personnel may collect it,fonnation about the subject of the tactical enforcement
operation. This includes gathering information publicly available on the Internet, i ncluding social
media, such as fireanns/weapons possession and relatives/associates who may reside with him.
This information assists agents an d officers with tactical planning activities su ch as: number of
agents and officers required for the operation, any specialized equ ipment that may be necessary
for the operation, and intelligence on when and where the operation should be conducted for
agent and officer safety and tactical efficiency.
Finally, ICE also uses the Internet, including social media, to gather .information.related to the
possible exercise of prosecutorial discretion. Pursuant to Director Morton' s Jw,e 17, 2011
memorandum relating to the exercising of prosecutorial discretion, ICE law enforcement
personnel are expected to consider a number of factors when deciding whether to exercise
prosecutoriaJ discretion in various situations. Some of these factors include: whether the
subject is a dan ger to the community or to national security, whether the subject is the
primary caregiver to a minor, or a person wi th a physical or mental disability, a subject's
edu cational and military background, a subject's ties and contributions to the community,
whether tbe subject (or the subject's sp ouse) is pregnant or nursing, whether the subject or
subject's spouse suffers from severe mentaJ or physical illness. These factors can be difficult
to ascertain using routine goven1ment and commercial databases and the use of the Internet
2020-ICLl-00023 866
Homeland The Privacy Office
U.S. D•p~Jimen1 or liomeJand Security
including sociaJ media serves as another tool to attempt to idehtify these unique factors.
Similarly, some of these same factors may also apply when setting conditions of release from
ICE custody. The Internet, including social media, p rovides a source of information that can
be used to help determine when it is appropriate to release an individual from ICE custody.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
• Homeland Security Act of 2002, as amended, Pub. L. No. 107-296, 116 Stat. 2135 (2002)
• Immigration and Nationality Act of 1952, as amended, U.S. Code Title 8
• OHS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcement
• TCE Delegfltion No. 0001, Delegation of Authority to th,e Dfrectors, Detention an d Removal
and Investigations, and to Field Office Directors, Special Agents in Charge and Certain Other
Officers of the Bureau of Immigration and Customs Enforcement
• 8 C.F.R. § 2.1, Authority of the Secretary of Homeland Security
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
~Yes. O No.
3. Is this use of social media in development or operational?
D Tn development. ~ Operational. Date first launched: Unknown
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not fol1owing that Rule:
a) Eq11ipme11f. Use only government-issued equipment when engaging in the operational
use of social rned~a;
D Yes. ~ No. If not, please explain:
Because the activities described in Question 1 are for immigration law enforcement
purposes, tl1e employees who engage in tl1.ese activities will not identify themselves
as ICE or OHS pernom1.el, or law enforcement personnel. This .is necessary to ensure
the safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevel1t tipping off individuals who are sought by law enforcement for
violations of law, and to prevent disclosing litigation strategy and tactics.
2020-ICLl-00023 867
Homeland The Privacy Office
U.S, Dep~n ment of HomeJ,md Security
b) Email and accounts. Use online screen names or identities that indicate an officia.l DHS
affiliation and use OHS email addresses to open accounts used when engaging in social
media ln the perfonnance of their duties;
Because the activities described in Question 1 are for immigration law enforcement
purposes, the employees who engage in these activities will not identify themselves as
ICE or OHS personnel, or law enforcement personnel. This is necessary to ensure the
safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevent tipping off individuals who are sought by law enforcement for
violations of law, and to p revent disclosing litigation sh·ategy and tactics.
c) Public interaction. Access publicly available information through social m edia only by
reviewing posted information without interacting with any individual who posted the
information;
d) Privacy settings. Respect individuals' privacy settings and access only information that is
publicly available;
Law enforcement personnel may not access restricted online sources or facilities absen t
legal authority permitting enh·y into private space.
e) Pl/ collection: CoUect the minimum Pll necessary for the proper performance of their
authorized duties except for systems subject to Final Rvles for Exemption from certain
aspects of the Privacy Act;
The applicable S0RNs cited above are all exempted by Final Rules from the Privacy Act
(e)(l ) requirement (5 U.S.C. § 552a(e)(1)), which normally l.imits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(1) requirement is necessary to ensure the integrity of law enforcement investigations,
as more fully detailed in the Final Rules.
f) PIT safeguards. Protect PIT as required by the Privacy Act (if applicable) and OHS privacy
policy;
2020-ICLl-00023 868
Homeland The Privacy Office
U.S. Depalimen1 of HomeJ,md Security
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational u ses of social media, access requirements, and
requirements for documenting operational uses of social media.
All ICE users will complete the necessary training when it is available.
Mechanisms are (or will be) in place to verify that users have completed training.
D Yes, employees self-certify that they have read and understood their Component
Rules of Behavior.
2020-lCLl-00023 869
Homeland The Privacy Office
U.S. Depalinwnt of HomeJ,md Security
DESIGNATION
This program is covered by the following Privacy Impact Assessm e nt and Privacy Act
System of Records Notice:
1. Category of Use:
D Law Enforcemen t Intelligence;
[gj Criminal law en forcement investigations;
D Background investigations;
D Profession al responsibility investigations;
D Ad ministrative or benefit determinations (including .fraud detection);
D Situational awareness; and
2020-ICLl-00023 870
Homeland The Privacy Of6ce
U.S. Dep~Iiment or liomeJand Security
2. Has Component Counsel reviewed and determined that there is authority to engage in the
above Category of Use?
~ Yes. D No.
0 Users must use government em.ail addresses or official DHS accouf1ts on line.
c. Public interaction.
d. Privacy settings.
2020-ICLl-00023 871
Homeland The Privacy Of-fice
U.S. Depanment or HomeJ,md Security
f. PII safeguards.
rgj PII is protected as required by the Privacy Act and OHS privacy policy.
g. Documentation.
D Users must appropriately document their use of social media, and collection
of information from social media website.
h. Training.
rgj All users must complete annual privacy training that has been approved by
Component Privacy Officer. Training includes:
~ Legal authorities;
2020-ICLl-00023 872
Homeland The Privacy O ffice
U.S. Depannient or f-lomeJ,md Security
IZ] Mechanisms are (or will be) in place to verify that users have completed
training.
D Yes, employees self-certify that they have read and unders tood their
Compo.ne.nt Rules of Behavior.
2020-ICLl-00023 873
Homeland ICE OCISO & Privacy Office
Addendum to Testing Authorization
Security Page 1
nos
o/2
Use this form to propose a change to an approved Proposal to Use Real 0(J.la for Testing. Appropriate uses of this
form are to make discrete modifications to the scope of the original approved testing ll'Uthorization, for example, to
extend the dates of testing authorization, to obtain a teftesh of the data not originally authorized, or to make minor
changes to the scope of the test data or the purposes. In the event the proposed changes are deemed significant by the
Privacy Office or OCISO, the program may be required to submit a new Proposal to Use Real Data for Testing.
DESCRIPTION
Describe specifically the proposed changes to the scope of the testing authorization, Lisi what sections of the
a11tJwrization will be affected, and how. Explain why the change is required (e.g., more time needed due to
llnexpected delays).
The IID$ ITPM is requesting an additional twelve (12) months to complete the testing. This
extends the approved testing date to 5/28/2018.
Since OCIO Infrastructure plan to build a security compliant IIDS future environment on the
p795 in DCl which provides exceptional performance, massive scalability and bandwidth to
efficiently and concurrently support a full range of complex, mission-critical applications for
legacy and OBIEE environment. Therefore, IIDS team needs more testing to ensure the
environment is suitable for the applications.
DETERMINATION
OCISO Reviewer:
COMMENTS
r b)(5)
2020-ICLl-00023 882
Homeland ICE 000 OCIS0 & ICE Privacy and Records Office, Pri vacy Branch
Proposal to Use Real Data for Testing
Security Page 1 o/21
Complete this Testing Questionnaire when there is a need to requ est permission to u se real data, whether
in original or altered form, to test an IT system/project at ICE.
"Real data" means data from a production system, vendor, or public records, or any other dataset which
a system and contains data about real individuals, matters, or cases, would be real data. A set of public
records that was pttrchased from a vendor for u se in testing would also be real data.
The JCE Privacy and Records Office, Privacy Branch and ICE Ofnce of the Chjef Information Officer,
Office of Chief Tnfonnation Secunty Officer {OCTSO) \-vi)] u se this form to determine wh ether to authorize
the u se of real data for testing and u nder what conditions. The goal is to erisure that risks to privacy aiid
security are minimized while allowing needed tests to proceed, If you are unsure if the test dataset is real
data, please contact the Privacy Branch.
lnstructio11s: Return this completed form to the Privacy Branch and the 0OS0 emaH addresses below.
P lease include a copy of the .Independent Test Plan. The Privacy Branch will coordinate with OCISO and
the final determination will be reflected on the last page of this form. The form will be returned to you in
PDF when final The requestor and System ISSO a.re responsible for uploading the document into Xacta
and the ICE Electronic Lifecycle Management System s (ELMS).
Contact Points:
(b)(5)
2020-ICLl-00023 884
ICE 000 OCIS0 & ICE Privacy and Record5 Office, Pri vacy Branch
Proposal to Use Real Data for Testing
Page 2 o/ 21
Wha t PIA(s) describes this system/ project and the data being used for testing?
What SORN(s ) covers the data in this system/project and the data being us ed for tes ting?
b)(5)
Alternate OCIO POC (** Dele gate for Primary O CIO POC unless otherwise designated)
Name: Kb)(6); (b)(7)(C) I
Title: Chief, Secmity Assmance
DHS Email address: (b)(6); (b)(7)(C)
Phone number: (202) 732 b)(6);
System Owner POC ( ** Pleas e e n s ure this POC i s a w are of this propos al)
N ame: l(b)(6); (b)(7)(C) I
Title: Acting Director, Office of Assurance and Compli ance
DH S Em ail address: i{!b:!..!lis6Ll.·w(!!.b~~~ ,__ _ __ j
' (b)(6)·
P hone number: (202) 73 (h\f?)f(;)
2020-ICLl-00023 885
ICE 000 OCISO & ICE Privacy and Records Office, Privacy Branch
Proposal to Use Real Data for Testing
Page3 o/21
System ISSO
Name: l(b)(6); (b)(7)(C)
Title: ISSO
DHS Email address: kb )(6); (b)(7)(C)
Phone number: (202) 403-1@@1
FRR POC
Name: l(b)(6); (b)(7)(C~
Title: TTPM
DHS Email address: b)(6); (b)(7 )(C)
Phone number: (202) 732 .b~(~\ _.
Requester POC
Name: Kb)(6); (b)(7)(C)
Title: Program Manager, OFM
OHS Email address: b)(6); (b)(7)(C)
Phone number: (202) 904 b)(6);
Data Owner POC (** Please identify the data owners or their delegated representative for all sources
of the production data or any other real data)
Name: Kb)(6); (b)(7)(C) I
Title: Assistant Director, Data and Technology
DHS Email address: l(b)(6): (b)(7)(C) I
Phone number: (202) 732f b)(6); I
OCISO Reviewer
Name:
Title:
DHS Email address:
Phone number:
2020-ICLl-00023 886