Professional Documents
Culture Documents
)(C)
Se nt: 19 Aug 2019 13:19:40 +0000
To: r )(6); (b)(?)(C) I
Cc: b)(6); (b)(?)(C)
l(b)(6); (b)(7)(C)
Subject: RE: ICE SMOUTs
Attachme nts: CIU White Paper - Unattributed Browser Licenses 08022019 track changes.doc
l(b)(6);
kb)(6): !provided the attached draft last Friday (8/ 16). OPLA will now review. Not sure how long
it will take, as I have other priority tasks already on the queue. I may need until next week. Do
you want to take a look at the attached and let me know if you have specific concerns? Thank
you.
Kb)(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732~(b)(6);1
(iPhone) 202-787-fliillfill
Kb)(6); (b)(?)(C)
Best,
2020-ICLl-00023 1054
l(b)(6); (b)(?)(C) I
Mobile: 202-879~~~~~~:,J
Best,
l(b)(6); (b)(7)(C)
Mobile: 202-870Kb)(6);
b)(S)
From~b)(6); (b)(?)(C)
Date: Friday, Jul 26, 2019, 7:54 AM
To b)(6); (b)(7)(C)
Cc
b)(6); (b)(7)(C)
Subject: RE: ICE SMOUTs
Good Morningl(b)(6); I
2020-ICLl-00023 1055
I just wanted to check on the status of t he w hite paper. I know we agreed to a deadline of today to
have Privacy Office's approval for your procurement. To do that I'll need the white paper and OPLA's
confirmation that the program operates w it hin ERO's authorities and I can take it to the ICE Privacy
Officer for a final determination. If there is anything I can help with, please just let me know.
Best,
~b)(6); (b)(?)(C) I
Mobile: 202-870~(b)(6); I
From:kb)(6): ( b )(7)(C)
Sent: Tuesday, July 23, 2019 4: 17 PM
To b)(6); (b)(7)(C)
Cc:
b)(6); (b)(?)(C)
Subject: RE: ICE SMOUTs
l(b)(6);
Please express my appreciation to the HSI Open Source Team for sharing their white paper!
I've read t hrough each of the five (5) SMOUTs, the Directive, and the Instruction.
I am better understanding the document s, the requirements, and appreciate the guidance!
Thank you!
Kb)(6); I
From: l(b)(6); (b)(?)(C) I
Se nt: Tuesday, July 23, 2019 8:59 AM
To: b)(6); (b)(7)(C)
Cc:
b)(6); (b)(7)(C)
Thanks~ kb~)(_6)~; - ~
An HSI Open Source Team has cleared us to share their white paper for their use of social media. They
have been monitoring social media l(b)(7)(E) I
Kb)(7)(E) !They are governed by the Crimi nal
and Administrative Immigration Law Enforcement SM OUT as well.
Best,
kh)(R ) · ( h )(7 )(r.) !
Mobile: 202-870{b)(6):
From:~kb_)(_6_
): - - ~
Sent: M onday, July 22, 2019 4:39 PM
To: kb)(6): (b)(7)(C)
2020-ICLl-00023 1056
Cc:l(b)(6); (b)(?)(C) I
(b)(6); (b)(?)(C)
Hello (b)(6);
/ h \ /7 \/f ' \
As discussed, attached please find an email which includes all the ICE Social Media Operational
Use Templates (SMOUTs), as well as DHS Directive and Instructions on operational use of
social media.
The SMOUTs were used by DHS Privacy to find out the operational purposes for which ICE
needs to access social media, and to determine whether those uses are authorized under DHS
policies. Most relevant to ERO 's operational use of social media is the ' Criminal and Admin
Immigration LE' SMOUT. I've identified below portions of this SMOUT that may help CIU in
framing a document explaining ERO's intended useKb)(?)(E) ~o surveille publicly-available
social media sites.
b)(5)
2020-ICLl-00023 1057
b)(5)
I believe!~ )(?)( lhas audit functions, based on the attached Authentic8 overview document you
kindly provided this morning.
The Privacy folks may also be interested in whether ERO will download any personally
l
identifying info (PII) and/or sensitive PII from social media usinj _!:>)(7)( and if so, where the
downloads will be maintained, and how they will be secured. See ICE responses to Q 5(e) - (g)
on pp. 7-8.
Please let me know if you have any questions about the above. Thank you!
l(b )(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732~(b)(6): I
(iPhone) 202-787-lliEfil]
l(b )(6); (b )(7)(C)
2020-ICLl-00023 1058
for release, review, retransmission, dissemination, or use by anyone other than the intended recipient.
Please notify the sender if this email has been misdirected and immediately destroy all originals and
copies. Furthermore do not print, copy, re-transmit, disseminate, or otherwise use this information.
Any disclosure of this communication or its attachments must be approved by the Office of the Principal
Legal Advisor, U.S. Immigration and Customs Enforcement. This document is for INTERNAL
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of Information Act, 5
USC§§ 552(b)(S), (b)(7).
2020-ICLl-00023 1059
From: ~b)(6); (b)(?)(C) I
Sent: 5 Sep 2019 20:21:49 +0000
To: !fb)(6): !
Cc: Kb)(6); (b)(?)(C)
Kb )(6); (b)(7)(C)
Subject: RE: ICE SMOUTs
Good afternoonl(b)(6):
My apologies for the delay. (b)(?)(E)
b)(?)(E)
b)(?)(E)
(b)(S)
Best,
l(b)(6); (b)(7)(C)I
2020-ICLl-00023 1067
Mobile: 202-870J(b)(6);
Best,
l(b)(6);
Mobile: 202-870-~
~b)(6); _,
Kb)(6); !provided the attached draft last Friday (8/ 16). OPLA will now review. Not sure how long
it will take, as I have other priority tasks already on the queue. I may need until next week. Do
you want to take a look at the attached and let me know if you have specific concerns? Thank
you.
fo)(6):
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732~(b)(6); I
(iPhone) 202-787-llliRfil]
~b)(6): (b)(7)(C)
From=Kb)(6); (b)(7)(C) I
Se nt: Monday, August 19, 2019 9:12 AM
Toi(b)(6); (b)(7)(C)
2020-ICLl-00023 1068
Cc: l(b)(6): (b)(7)(C)
l(b)(6); (b)(7)(C)
Subject: RE: ICE SMOUTs
Best,
l(b )(6); (b )(7)(C) j
Mobile: 202-870~(b)(6): I
From:kb)(6); (b)(7)(C)
Sent: Friday, July 26, 2019 8:33 AM
To:l(b)(6); (b)(7)(C)
Cc:_
l(b)(6); (b)(7)(C)
Subject: RE: ICE SMOUTs
Best,
l(b)(6): ( b )(7)(C) I
Mobile: 202-870{ b)(6): I
From: l(b)(6); (b)(7)(C) I
Sent: Friday, July 26, 2019 8:32 AM
~~J b)(6); (b)(7)(C) I;
r-
kb-)(-==
6)=; (=b= ===) =======================,--~
)(7==)(C
Subject: RE: ICE SMOUTs
(b)(5)
~:r
Date: Friday, Jul 26, 2019, 7:54 AM
)(6); (b)(7)(C)
kh )(R )· (h ) (7)(r.)
Subject: RE: ICE SMOUTs
Good Morningl(b)(6):
I just wanted to check on the status of the white paper. I know we agreed to a deadline of today to
have Privacy Office's approval for your procurement. To do that I'll need the white paper and OPLA's
confirmation that the program operates within ERO's authorities and I can take it to the ICE Privacy
Officer for a final determination. If there is anything I can help with, please just let me know.
Best,
Kb)(6); (b)(?)(C) I
l(b)(6);
Please express my appreciation to the HSI Open Source Team for sharing their white paper!
I've read through each of the five (S) SMOUTs, the Directive, and the Instruction.
I am better understand ing the documents, the requirements, and appreciate the guidance!
Thank you!
l(b)(6); _ , I
From:kb)(6): ( b )(7)(C)
Sent: Tuesday, July 23, 2019 8:59 AM
To:l(b)(6); (b)(7)(C)
Cc:_
l(b)(6); (b)(7)(C)
Than ksJ(b)(6);
An HSI Open Source Team has cleared us to share their white paper for their use of social media. They
have been monitoring social media l(b)(?)(E) I
Kb)(?)(E) [They are governed by the Criminal
and Administrative Immigration Law Enforcement SMOUT as well.
2020-ICLl-00023 1070
Best,
kb)(6): (b)(7)(C)!
Mobile: 202-870.Yh)fn)· !
From:l(b)(6);
Sent: Monday, July 22, 2019 4:39 PM
Hellol(b)(6);
As discussed, attached please find an email which includes all the ICE Social Media Operational
Use Templates (SMOUTs), as well as DHS Directive and Instructions on operational use of
social media.
The SMOUTs were used by DHS Privacy to find out the operational purposes for which ICE
needs to access social media, and to determine whether those uses are authorized under DHS
policies. Most relevant to ERO 's operational use of social media is the 'Criminal and Admin
Immigration LE' SMOUT. I've identified below portions of this SMOUT that may help CIU in
framing a document explaining ERO' s intended use of SILO to surveille publicly-available
social media sites.
(b)(5)
2020-ICLl-00023 1071
b)(5)
I believel(b)(7)( lhas audit functions, based on the attached Authentic8 overview document you
kindly provided this morning.
The Privacy folks may also be interested in whether ERO will do µ..u.............,any personally
identifying info (PII) and/or sensitive PII from social media usin ~b)(?)(E and if so, where the
downloads will be maintained, and how they will be secured. See ICE responses to Q 5(e) - (g)
on pp. 7-8.
Please let me know if you have any questions about the above. Thank you!
l(b)(6): (b)(7)(C) I
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
2020-ICLl-00023 1072
U.S. Immigration and Customs Enforcement
(Desk) 202-732 (b)(6)
(iPhone) 202-78 (b)(6):
Kb)(6); (b)(?)(C)
2020-ICLl-00023 1073
From: l(b)(6);
Sent: 18 Sep 2019 22:05:41 +0000
To: rb)(6); (b)(7)(C)
Cc:
Subject: RE: ICE SMOUTs
Hellol~(b_)(_6)_; _ _.
I am on AIL this week. I came in to pick up something and saw your email below. I've not had
a chance to discuss withl(b)(6); l(Gov' t Information Law Division - GILD), but this is my take off
the top of my head (this is not an official OPLA opinion).
(b)(5)
l(b)(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732¥ b)(6)1
(iPhone) 202-787-llliRfil]
kb)(6); (b)(7)(C)
2020-ICLl-00023 1074
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of Information Act, 5
USC§§ 552(b)(S), (b)(7).
From:Kb)(6); (b)(7)(C)
Se nt: Monday, September 16, 2019 12:05 PM
To: Kb)(6); (b)(?)(C)
Subject: FW: ICE SMOUTs
Hi l(b)(6); (b)(?)(C) I
I just wanted to check back in if EROLD had any insight to the below. I'm hoping to put a bow on the
approval for the procurement that'll set us on the right foot in the PTA process.
Best,
kh ) (n) · ( h)(7 ){(;) !
Mobile: 202-870~(b)(6); I
From:l(b)(6): (b)(7)(C) I
Se nt: Thursday, September 5, 2019 4:22 PM
To:l(b)(6); (b)(?)(C)
Cc: _
r (6); (b)(7)(C)
Good afternoon~b)(6);
My apologies for the delay.l(b)(7)(E)
l(b)(7)(E)
(b )(5)
b)(5)
2020-ICLl-00023 1075
b)(5)
Best,
i(b)(6):
Best,
(b)(6);
(h)(7 )(<;)
Mobile: 202-870-@Eill
From:l(b)(6); (b)(?)(C)
Sent: Monday, August 19, 2019 9:20 AM
To:j(b)(6); (b)(7)(C)
Cc: I I
(b)(6); (b)(7)(C)
Kb)(6);
Kb)(6); Iprovided the attached draft last Friday (8/16). OPLA will now review. Not sure how long
it will take, as I have other priority tasks already on the queue. I may need until next week. Do
you want to take a look at the attached and let me know if you have specific concerns? Thank
you.
(b)(6); (b)(?)(C)
Associate Lega Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
2020-ICLl-00023 1076
U.S. Immigration and Customs Enforcement
(Desk) 202-732~
(iPhone) 202-787l(b)(6): I
l(b)(6): (b )(7)(C)
From;Kb)(6); (b)(7)(C) I
Sent: Monday, August 19, 2019 9:12 AM
To: b)(6); (b)(7)(C)
Cc:
(b)(6); (b)(7)(C)
Subject: RE: ICE SMOUTs
Best,
l(b)(6): (b)(7)(C)
Mobile: 202-8701(b)(6):I
Best,
kb)(6): (b)(7)(C) I
Mobile: 202-870i(b)(6); I
From:l(b)(6): (b)(7)(C)
Sent: Friday, July 26, 2019 8:32 AM
2020-ICLl-00023 1077
To: kb)(6): (b)(7)(C)
Cc:l(b)(6); (b)(7)(C)
kb )(6): ( b )(7)(C)
Subject: RE: ICE SMOUTs
(b)(5)
Good Morningl(b)(6);
I just wanted to check on the status of the w hite paper. I know we agreed to a deadline of today to
have Privacy Office's approval for your procurement. To do that I'll need the white paper and OPLA's
confirmation that the program operates w it hin ERO's authorities and I can take it to the ICE Privacy
Officer for a final determination. If there is anything I can help with, please just let me know.
Best,
kb )(6 ) : ( b )(7 )(C )I
b)(6);
/ L-..\ / "7\ / 1"'\
Please express my appreciation to the HSI Open Source Team for sharing their white paper!
I've read t hrough each of the five (5) SMOUTs, the Directive, and the Instruction.
2020-ICLl-00023 1078
I am better understanding the documents, the requirements, and appreciate the guidance!
Thank you!
Kb)(6); I
Fromf b)(6); (b)(7)(C)
Sent: Tuesday, July 23, 2019 8:59 AM
To b)(6); (b)(?)(C)
Cc:
(b)(6); (b)(7)(C)
Than ksl(b)(6);
An HSI Open Source Team has cleared us to share their white paper for their use of social media. They
have been monitoring social media !rh)f7 )fF) I
foV7)(E) [They are governed by the Criminal
and Administrative Immigration Law Enforcement SMOUT as well.
Best,
kb)(6):
Mobile: 202-870~(b)(6): I
From:Kb)(6);
Sent: Monday, July 22, 2019 4:39 PM
ToKb)(6); (b)(?)(C)
Cc~ I
b)(6); (b)(7)(C)
HelloKb)(6);
As discussed, attached please find an email which includes all the ICE Social Media Operational
Use Templates (SMOUTs), as well as DHS Directive and Instructions on operational use of
social media.
The SMOUTs were used by DHS Privacy to find out the operational purposes for which ICE
needs to access social media, and to determine whether those uses are authorized under DHS
policies. Most relevant to ERO 's operational use of social media is the 'Criminal and Admin
Immigration LE' SMOUT. I've identified below portions of this SMOUT that may help CIU in
framing a document explaining ERO's intended use of SILO to surveille publicly-available
social media sites.
2020-ICLl-00023 1079
b)(5)
I believe ~ )(7)( ~as audit functions, based on the attached Authentic8 overview document you
kindly provided this morning.
The Privacy folks may also be interested in whether ERO will download any personally
identifying info (PII) and/or sensitive PII from social media usin~ and if so, where the
downloads will be maintained, and how they will be secured. See ICE responses to Q 5(e)-(g)
on pp. 7-8.
Please let me know if you have any questions about the above. Thank you!
l(b)(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732~(b)(6): I
(iPhone) 202-787~
Kb)(6); (b)(7)(C)
2020-ICLl-00023 1081
U.S. Immigration and
Customs Enforcement
ACTIONABlE INTELUGENCE
'-
U.S. Immigration and Law Enforcement Justification
Customs Enforcement
U NC LASS I Fl ED//FOUO
U.S. Immigration and
Customs Enforcement
Open Source Fundamentals
Hello again.
As discussed, attached are the referenced documents regarding guidance for on-line behavior.
Prior to issuance of a kb)(7)(E) L each Field Intelligence Officer (FIO) will be provided these documents
and reminded of appropriate use and limitations for their actions in the system.
If you see that something is missing, please let me know. We are open to implementing necessary steps
to work within the guidelines to provide this valuable tool to our FIOs.
2020-ICLl-00023 1115
Policy Number: 10082.1 Office ofthe Director
FEA Number: 360- l 12-002b
U.S. Department or Homeland Security
500 12'h Street, SW
Washington, DC 20536
U.S. Immigration
and Customs
JUN 2·8 2012 Enforcement
MEMORANDUM FOR:
FROM:
Directo
Purpose
This memorandum provides U.S. Immigration and Customs Enforcement (ICE) law enforcement
personnel guidance on the acceptable use of online infom1ation within the scope of their law
enforcement duties.
Background
Discussion
(b)(5)
1
Law enforcement personne l are ICE employees who conduct and support criminal, civil, and administrative law
enforcement investigations and operations. Examples include special agents and other law enforcement officers,
law enforcement investigative support personnel, intelligence research specialists, criminal research specialists, and
attorneys prosecuting criminal, civil or administrative matters.
2020-ICLl-00023 111 6
The principles that address the use of the Internet for undercover activities apply only to ICE
personnel with the authority to conduct undercover investigations.
Personnel who conduct civil and criminal law enforcement activities for Enforcement and
Removal Operations should also adhere to the above principles when using information gathered
online in support of their law enforcement activities. Such personnel should remain mindful that
the principles that address the use of the Internet for undercover activities apply only to those
vested with such authority.
Attorneys with the Office of the Principal Legal Advisor should also adhere to the above
principles, except those that are applicable to undercover activities, when using information
gathered online in support of their handling of criminal, civil, or administrative matters.
Tb.is memorandwn is not intended to, does not, and may not be relied upon to create any right or
benefit, substantive or procedural, enforceable at law by any party in any administrative, civil, or
criminal matter.
2020-ICLl-00023 1119
From: ERO Taskings
Sent: Wednesday, November 07, 2012 3:01 PM
Subject: Amended Message: ICE directive, Use of Public and Non- Public Online Information
The following message is being sent by Gary Mead, Executive Associate Director,
Enforcement and Removal Operations
Subject: Amended Message: ICE directive, Use of Public and Non-Public Online
Information
On June 28, 2012, Director Morton issued Directive 10082.1, Use ofPublic and Non-Public Online
Information . The memorandum provides ICE law enforcement personnel guidance on the
acceptable use of online information within the scope of their law enforcement duties. On Thursday,
July 5, 2012 ICE distributed this Directive to all employees via an ICE Info Broadcast.
b)(7)(E) On
Tuesday, July 17, 2012, I provided a summary of this Directive, together with the directive itself and
associated operating procedures, to all ERO managers by distribution message dated July 17, 20 12
(attached below).
In part this Directive addresses public and private space on the Internet and specifies that law
enforcement personnel may passively observe and log real-time electronic communications open to
the public but may not access restricted online sources or facilities absent legal authority. Because
ERO Officers do not have undercover authority, they may not create fictitious online identities in
order to communicate with targets or other individuals, entities, or organizations. This prohibited
activity includes "friending," "fanning," or "liking" members of the public or organizations on the
Internet.
Please discuss this directive with all ofyour employees and send notification to the ERO Operation
Center mailbox a 4(b)(6); (b)(7)(C) Ito certifY completion ofthose discussions no
later than Wednesday, November 21, 2012.
Gary Mead
Executive Associate Director
Enforcement and Removal Operations
2020-ICLl-00023 1120
From: l(b)(6): (b)(7)(C) I
Se nt: 19 Nov 2019 22:02:24 +0000
To: l(b)(6); (b)(7)(C) I
Cc: Kb)(6); (b)(7)(C)
l(b)(6): (b )(7)(C)
Subject: RE: ERO Use o* b)(7)(E I
Attachme nts: Amended Message ICE directive, Use of Public and Non- Public Online
Information (11.7.2012).pdf
l(b)(6);
From;Kb)(6); (b)(7)(C)
Se nt: Tuesday, November 19, 2019 4:57 PM
To:l(b)(6); (b)(7)(C)
Cc:1 I
(b)(6); (b)(7)(C)
2020-ICLl-00023 1121
10-4! Understood. Thank you! So what authorities would need to be granted in order to allow this type
of activity? Does the memorandum need to be updated?
(b)(5)
Thank you.
Kb)(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732J(b)(6); I
(iPhone) 202-787~
* b )(6); (b )(7)(C)
2020-ICLl-00023 1122
To:l(b)(6); (b)(7)(C) I
Cc: I
b)(6); (b)(7)(C)
(b)(5)
(b)(5)
kb )(6); (b )(7)(C)I
Associate Legal Advisor
Enforcement and Remova l Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
2020-ICLl-00023 1123
(Desk) 202-732 (b)(6):
(iPhone) 202-787 b)(6);
l(b )(6); (b )(7)(C)
From:Kb)(6); (b)(7)(C)
Se nt: Tuesday, November 19, 2019 4:07 PM
To:l(b)(6); (b)(7)(C) I
b)(6); (b)(7)(C)
Cct;b)(6); (b)(7)(C) I
Subject: RE: ERO kb)(7 )(E )
Good afternoon . Trust this finds you all doing well! Hard to believe it's already November!
I was redirected to another project for a few weeks but am back and hoping to re-engage the topic of
unattributable browser licenses for ERO. To re-cap, I believe this is where we stand:
b)(5)
2020-ICLl-00023 1124
b)(5)
From:kb)(6); (b)(7)(C)
Se nt: Friday, October 18, 2019 8:45 AM
To: kb)(6): (b)(7)(C)
rb)(6); (b)(7)(C)
Cq(b)(6) ; (b )(7)(C)
Subject: RE: ERO !th \(7 \r~ \
Hil(b)(6);
Thanks very much for putting this together.
One point building upor{b)(6); Iclarification below: your discussion points indicate there are
b)(7)(C); (b)(5); (b)(6)
It was nice to meet everyone in-person and I look forward to working with you all on t his.
Best,
kb)(6):I
I
l(b)(6); (b)(7)(C)
Associate Legal Advisor
Homeland Security Investigations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
202-732 b)(6); office)
202-839 ~ )(7)( cell)
2020-ICLl-00023 1125
fb)(6); (b)(7)(C)
Cc:l(b)(6) ; (b)(7)(C)
l(b)(6) : (b )(7)(C)
Subject: RE: ERq(b)(7)(E)
I
Thank you l~~~~~t~, Your summary of today's meeting is very helpful.
b)(5)
l(b)(6); (b)(7)(C) I
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732~
(iPhone) 202-787 (b)(6);
(b)(6); (b)(7)(C)
2020-ICLl-00023 1126
--- ATTORNEY/CLIENT PRIVILEGE ---ATTORNEY WORK PRODUCT ---
This communication and any attachments m ay contain confidential and/or sensitive attorney/client
privileged information or attorney work product and/or law enforcement sensitive information . It is not
for release, review, retransmission, dissemination, or use by anyone other than the intended recipient.
Please notify the sender if this email has been misdirected and immediately destroy all originals and
copies. Furthermore do not print, copy, re-transmit, disseminate, or otherwise use this information.
Any disclosure of this communication or its attachments must be approved by the Office of the Principal
Legal Advisor, U.S. Immigration and Customs Enforcement. This document is for INTERNAL
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of Information Act, 5
USC§§ 552(b)(S), (b)(7).
Subject: EROl(b)(7)(E) I
Good afternoon everyone,
Thank you very much for meeting with us to discuss ERO'skb)(7)(E) I Privacy is
prepared to approve the acquisition of this tool, but I would like to ensure we're on the same page
regarding next steps before ERO begins operational use. Below, please find a summary of today's major
points and next steps. If I've stated anything incorrectly, don't hesitate to correct me.
(b)(5)
Next Steps
b)(5)
2020-ICLl-00023 1127
I'm happy to revise these bullets as necessary. Thanks again!
I~Privacy
~!~~\__OfficerI
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732 ~~!~~\
Mobile: 202-701- (b)(6);
Main: 202-732 (b)(6);
2020-ICLl-00023 1128
From: ERO Taskings
Sent: Wednesday, November 07, 2012 3:01 PM
Subject: Amended Message: ICE directive, Use of Public and Non- Public Online Information
The following message is being sent by Gary Mead, Executive Associate Director,
Enforcement and Removal Operations
Subject: Amended Message: ICE directive, Use of Public and Non-Public Online
Information
On June 28, 2012, Director Morton issued Directive 10082.1, Use ofPublic and Non-Public Online
Information . The memorandum provides ICE law enforcement personnel guidance on the
acceptable use of online information within the scope of their law enforcement duties. On Thursday,
July 5, 2012 ICE distributed this Directive to all employees via an ICE Info Broadcast.
J(b)(7)(E) I
On
Tuesday, July 17, 2012, I provided a summary of this Directive, together with the directive itself and
associated operating procedures, to all ERO managers by distribution message dated July 17, 20 12
(attached below).
In part this Directive addresses public and private space on the Internet and specifies that law
enforcement personnel may passively observe and log real-time electronic communications open to
the public but may not access restricted online sources or facilities absent legal authority. Because
ERO Officers do not have undercover authority, they may not create fictitious online identities in
order to communicate with targets or other individuals, entities, or organizations. This prohibited
activity includes "friending," "fanning," or "liking" members of the public or organizations on the
Internet.
Please discuss this directive with all ofyour employees and send notification to the ERO Operation
Center mailbox atkb)(6); (b)(7)(C); (b)(7)(E) Ito certifY completion ofthose discussions no
later than Wednesday, November 21, 2012.
Gary Mead
Executive Associate Director
Enforcement and Removal Operations
2020-ICLl-00023 1129
From: l(b)(6); (b)(7)(C)
Se nt: 20 Nov 2019 13:54:08 +0000
To: rb)(6); (b)(?)(C)
Cc:
b)(6): (b)(7)(C)
Subject: RE: ER (b)(?)(E)
Thanks so much for your helpf h)fR)· !As for Privacy, we are going to be updating our policies and
SMOUTs regarding the use of fictitious accounts for passive on line surveillance, and when that is
complete updating our generic Privacy training on PALMS. We would like to review the ROBs and SOPs
for ERO to ensure they are in line with the SMOUTs/policies.
rb)(5); (b)(7)(E)
Best,
l(b)(6); __
2020-ICLl-00023 1130
(iPhone) 202-787Kb)(6); I
l(b )(6); (b )(7)(C) I
--- ATTORNEY/CLIENT PRIVILEGE ---ATTORNEY WORK PRODUCT---
This communication and any attachments may contain confidential and/or sensitive attorney/client
privileged information or attorney work product and/or law enforcement sensitive information. It is not
for release, review, retransmission, dissem ination, or use by anyone other than the intended recipient.
Please notify the sender if this email has been misdirected and immediately destroy all originals and
copies. Furthermore do not print, copy, re-transmit, disseminate, or otherwise use this information.
Any disclosure of this communication or its attachments must be approved by the Office of the Principal
Legal Advisor, U.S. Immigration and Customs Enforcement. This document is for INTERNAL
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of Information Act, 5
USC§§ 552(b)(S), (b)(7).
From:kb)(6) ; (b )(7)(C)
Se nt: Tuesday, November 19, 2019 4:57 PM
To:l(b)(6); (b)(7)(C)
Cc: _
rb)(6); (b)(7)(C)
10-4! Understood. Thank you! So what authorities would need to be granted in order to allow this type
of activity? Does the memorandum need to be updated?
~b)(6); - · I
b)(5)
1nanK you.
2020-ICLl-00023 1131
(b)(6); (b)(7)(C
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732l(b)(6); _I
(iPhone) 202-78/!f1-,v i=;,-
~b)(6); (b)(7)(C)
From¥b)(6); (b)(7)(C)
Sent: Tuesday, November 19, 2019 4:49 PM
To:Kb)(6); (b)(7)(C) I
Cc:l(b)(6); (b)(7)(C) I
(b)(6); (b)(7)(C)
b)(5)
2020-ICLl-00023 1132
From:kb)(6): (b)(7)(C)
Sent: Tuesday, November 19, 2019 4:29 PM
To:l(b)(6); (b)(7)(C)
Cc: I I
b)(6); (b)(7)(C)
b)(5)
l(b)(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
{Desk) 202-732~(b)(6); I
{iPhone) 202-787-Kfil@I
kb)(6): (b)(7)(C)
c f b)(6); (b)(7)(C)
)(;;::::E"') ""-
SuoJect: RE: ER9(1i'Lb~)(r=;7~ ~ -----------------------__J
2020-ICLl-00023 1133
Good afternoon. Trust this finds you all doing well! Hard to believe it's already November!
I was redirected to another project for a few weeks but am back and hoping to re-engage the topic of
unattributable browser licenses for ERO. To re-cao I believe this is where we stand:
b)(5)
HiKb)(6);
Thanks very much for putting this together.
One point building upon (b)(6); clarification below: your discussion points indicate there are
b)(5)
2020-ICLl-00023 1134
b)(5)
It was nice to meet everyone in-person and I look forward to working with you all on this.
Best,
l(b)(6); I
Cc:l(b)(6); (b)(7)(C) I
b)(6); (b)(7)(C) I
Subject: RE: ERO Use of Silo
2020-ICLl-00023 1135
(b)(5)
l(b)(6); I
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732-kh,r~,I
(iPhone) 202-787~(b)(6)I
l(b)(6); (b)(7)(C)
From:Kb)(6); (b)(7)(C)
Sent: Thursday, October 17, 2019 3:43 PM
To: kb)(6); (b)(7)(C)
l'b)(6); (b)(7)(C)
(b)(5)
Next Steps
(b)(5)
Kb)(6); I
Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732f b)(6):I
Mobile: 202-7011aillfil]
Main: 202-732Kb)(6); I
2020-ICLl-00023 1137
From: !fh )(R ) · ( h ) (7)(r.) I
Sent: 21 Nov 2019 13:39:02 +0000
To: r b)(6); (b)(?)(C)
Cc:
Kb)(6); (b)(?)(C)
Subject: RE: EROl(b)(7)(E)
Hil(b)(6);
Yes Privacy will take the lead on putting together new training. We're currently writing an agency-wide
PIA on ICE's use of social media, so the information that we learn during that process will help us create
training materials. I agree that ERO should draft any RoBs/SOPs, and Privacy, Policy, and OPLA can
review.
kb)(6); (b )(7)(C)I
Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732 (b)(6);
Mobile: 202-7
I was thinking that ICE Privacy would draft the PALMs training and that the 2013 draft training PPP
would serve as a starting point. I defer to ICE Privacy but it seems like ICE Privacy would be more logica l
party for drafting the training since it is the SM Es on privacy; not ERO.
With respect to the RoB and SOP, it makes sense that ERO would draft it and ICE Privacy/ICE
Policy/OPLA would review for clearance. But perhaps ICE Privacy can provide a go-by as an example to
ERO? Thank you all!
l(b )(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
2020-ICLl-00023 1138
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732fb)(6): I
(iPhone) 202-787 b)(6);
(b)(6); (b)(?)(C)
From:kb)(6): (b)(7)(C)
Sent: Tuesday, November 19, 2019 4:29 PM
To:l(b)(6); (b)(7)(C)
Cc:I I
(b)(6); (b)(7)(C)
l(b)(6); (b)(7)(C) I
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732
(iPhone) 202-7,.i--,-(b-)(-6)....,
:
~b)(6); (b)(7)(C)
2020-ICLl-00023 1139
for release, review, retransmission, dissemination, or use by anyone other than the intended recipient.
Please notify the sender if this email has been misdirected and immediately destroy all originals and
copies. Furthermore do not print, copy, re-transmit, disseminate, or otherwise use this information.
Any disclosure of this communication or its attachments must be approved by the Office of the Principal
Legal Advisor, U.S. Immigration and Customs Enforcement. This document is for INTERNAL
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of Information Act, 5
USC§§ 552(b)(S), (b)(7).
From:l(b)(6); (b)(7)(C)
Sent: Tuesday, November 19, 2019 4:07 PM
r(6);
To:!rb)(6): (b)(7)(C)
(b)(7)(C)
Good afternoon. Trust this finds you all doing well! Hard to believe it's already November!
I was redirected to another project for a few weeks but am back and hoping to re-engage the topic of
unattributable browser licenses for ERO. To re-cap, I believe this is where we stand:
b)(5)
2020-ICLl-00023 1140
From:l(b)(6); (b)(7)(C)
Sent: Friday, October 18, 2019 8:45 AM
To:kb)(6): (b)(7)(C)
b)(6); (b)(7)(C)
One point building uponl(b)(6): !clarification below: your discussion points indicate there are
b)(5)
It was nice to meet everyone in-person and I look forward to working with you all on this.
Best,
b)(6);
/ 1...\ /"'7\ /r"\
l(b)(6); (b)(7)(C) I
Associate Legal Advisor
Homeland Security Investigations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
202-732 (b)(6) (office)
202-839 (._ " -" (cell)
From:l(b)(6): (b)(7)(C)
c d b)(6) ; (b)(7)(C)
l(b)(6) ; (b)(7)(C)
Subject: RE: EROKb)(7)(E)
2020-ICLl-00023 1141
There are just 2 points I would like to elaborate on.
b)(S)
kb)(6): (b)(?)(Cj
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk)202-732kbK6t I
(iPhone) 202-787j(b)(6);1
r b)(6); (b)(7)(C)
2020-ICLl-00023 1142
Any disclosure of this communication or its attachments must be approved by the Office of the Principal
Legal Advisor, U.S. Immigration and Customs Enforcement. This document is for INTERNAL
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of Information Act, 5
USC§§ 552(b)(S), (b)(7).
Thank you very much for meeting with us to discuss ERO'i(b)(?)(E) I Privacy is
prepared to approve the acquisition of this tool, but I would like to ensure we're on the same page
regarding next steps before ERO begins operational use. Below, please find a summary of today's major
points and next steps. If I've stated anything incorrectly, don't hesitate to correct me.
b)(5)
Next Steps
(b)(5)
l(b)(6); (b)(?)(C)I
Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
2020-ICLl-00023 1143
I
Desk: 202-732~(b)(6);
Mobile: 202-701{b)(6):!
I
Main: 202-732f b)(6);
2020-ICLl-00023 1144
From: !<b)(6):
Se nt: 19 Nov 2019 21:28:38 +0000
To: fb)(6): (b)(7)(C) I
Cc: l(b)(6); (b)(7)(C)
kb)(6): (b)(7)(C)
Subject: RE: ERO!rh)f7VF)
Attachme nts: Amended Message ICE directive, Use of Public and Non- Public Online
Information (11.7.2012).pdf
(b)(5)
f b)(6):
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732-l(b)(6)1
(iPhone) 202-787~
Kb)(6); (b)(7)(C)
2020-ICLl-00023 1145
I was redirected to another project for a few weeks but am back and hoping to re-engage the t opic of
unattributable browser licenses for ERO. To re-cap, I believe this is where we stand:
b)(5)
From:kb)(6); (b)(7)(C)
Sent: Friday, October 18, 2019 8:45 AM
To: kb)(6); (b)(7)(C)
[ b)(6); (b)(7)(C)
Hil(b)(6); I
Thanks very much for putting this together.
One point building uponkh\fR\· k larification below: your discussion points indicate t here are
2020-ICLl-00023 1146
It was nice to meet everyone in-person and I look forward to working with you all on t his.
Best,
Kb)(6); I
kb)(6): (b)(7)(C)
Associate Legal Advisor
Homeland Security Investigations Law Division
Office of t he Principal Legal Advisor
U.S. Immigration and Customs Enforcement
202-73 b)(6); office)
202-83 b)(7)( cell)
'
From:l(b)(6): (b)(?)(C)
Sent: Thursday, October 17, 2019 5:03 PM
To:!fh)(R) · fh)f7)fr.)
rb)(6); (b)(7)(C)
2020-ICLl-00023 1147
b)(5)
Kb )(6); (b)(7)(C) I
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732 (b 6
L..r.,~c:--,
(iPhone) 202-787 (b)(6);
l(b)(6); (b)(7)(C)
Thank you very much for meeting with us to discuss ERO'5Kb)(7)(E) !Privacy is
prepared to approve the acquisition of this tool, but I would like to ensure we're on the same page
2020-ICLl-00023 1148
regarding next steps before ERO begins operational use. Below, please find a summary of today's major
points and next steps. If I've stated anything incorrectly, don't hesitate to correct me.
(b)(5)
Next Steps
- (b)(5)
l(b)(6): (b)(7)(C)I
Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732 b)(6);
Mobile: 202-701 b)(6)
Main: 202-73 b)(6);
/ 1,..\ / 7 \ /,-..
2020-ICLl-00023 1149
From: ERO Taskings
Sent: Wednesday, November 07, 2012 3:01 PM
Subject: Amended Message: ICE directive, Use of Public and Non- Public Online Information
The following message is being sent by Gary Mead, Executive Associate Director,
Enforcement and Removal Operations
Subject: Amended Message: ICE directive, Use of Public and Non-Public Online
Information
On June 28, 2012, Director Morton issued Directive 10082.1, Use ofPublic and Non-Public Online
Information . The memorandum provides ICE law enforcement personnel guidance on the
acceptable use of online information within the scope of their law enforcement duties. On Thursday,
July 5, 2012 ICE distributed this Directive to all employees via an ICE Info Broadcast.
l(b)(7)(E) I On
Tuesday, July 17, 2012, I provided a summary of this Directive, together with the directive itself and
associated operating procedures, to all ERO managers by distribution message dated July 17, 20 12
(attached below).
In part this Directive addresses public and private space on the Internet and specifies that law
enforcement personnel may passively observe and log real-time electronic communications open to
the public but may not access restricted online sources or facilities absent legal authority. Because
ERO Officers do not have undercover authority, they may not create fictitious online identities in
order to communicate with targets or other individuals, entities, or organizations. This prohibited
activity includes "friending," "fanning," or "liking" members of the public or organizations on the
Internet.
Please discuss this directive with all ofyour employees and send notification to the ERO Operation
Center mailbox atK b)(7)(E) Ito certifY completion ofthose discussions no
later than Wednesday, November 21, 2012.
Gary Mead
Executive Associate Director
Enforcement and Removal Operations
2020-ICLl-00023 1150
From : kh) (n) · ( h )(7 )(r.)
Good Morningl(b)(6);
I just wanted to check on the status of the white paper. I know we agreed to a deadline of
today to have Privacy Office's approval for your procurement. To do that I'll need the white
paper and OPLA's confirmation that the program operates within ERO's authorities and I can
take it to the ICE Privacy Officer for a final determination. If there is anything I can help with,
please just let me know.
Best,
l(b)(6); (b)(7)(C) I
Mobile: 202-870~fb)(6): I
From:l(b)(6); (b)(7)(C) I
Sent: Tuesday, July 23, 2019 4:17 PM
To (b)(6); (b)(7)(C)
Cc:
b)(6); (b)(7)(C)
2020-ICLl-00023 1151
j(b)(6); (b)(7)(C)
Subject: RE: ICE SMOUTs
(b)(6);
(h )(7 )(r,)
Please express my appreciation to the HSI Open Source Team for sharing their white paper!
I've read through each of the five (5) SMOUTs, the Directive, and the Instruction.
I am better understanding the documents, the requirements, and appreciate the guidance!
Thank you!
~~ ~~6~;_- . I
From: Kb)(6); (b)(7)(C)
Sent: Tuesday, July 23, 2019 8:59 AM
To: kb)(6): (b)(7)(C)
Vb) (6) : (b)(7)(C)
Cc:!rh) fR ) · ( h ) (7 )(r,)
l(b)(6); (b)(7)(C)
Thanks Kb)(6);
An HSI Open Source Team has cleared us to share their white paper for t heir use of social
media. They have been monitoring social media l<b)(7)(E) I
~ )(7)(E) !They don't create alias accounts but have discussed doing so in the near f uture.
hey are governed by t he Criminal and Administrat ive Immigrat ion Law Enforcement SMOUT as
well.
Best,
Kb)(6); (b)(7)(cj
Mobile: 202-870~(b)(6) 1
From:!{b)(6):
Sent: Monday, July 22, 2019 4:39 PM
To:kb)(6): ( b )(7)(C)
Cc: l(b)(6); (b)(7)(C)
r b)(6); (b)(7)(C)
Hello Kb)(6);
As discussed, attached please find an email which includes all the ICE Social Media
Operational Use Templates (SMOUTs), as well as DHS Directive and Instructions on
operational use of social media.
2020-ICLl-00023 1152
The SMOUTs were used by DHS Privacy to find out the operational purposes for which
ICE needs to access social media, and to determine whether those uses are authorized
under DHS policies. Most relevant to ERO 's operational use of social media is the
'Criminal and Admin Immigration LE' SMOUT. I've identified below portions of this
SMOUT that may help CIU in framing a document explaining ERO's intended use of
SILO to surveille publicly-available social media sites.
(b)(5)
2020-ICLl-00023 1153
(b)(5)
I believeKb)(7)( lhas audit functions, based on the attached Authentic8 overview document
you kindly provided this morning.
The Privacy folks may also be interested in whether ERO will download any personally
I
identifying info (PII) and/or sensitive PII from social media using(b)(7)( and if so, where
the downloads will be maintained, and how they will be secured. See ICE responses to Q
5(e)- (g) on pp. 7-8.
Please let me know if you have any questions about the above. Thank you!
Kb)(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732!(b)(6):!
(iPhone) 202-7871lliRfil]
l(b)(6); (b)(7)(C)
2020-ICLl-00023 1154
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of
Information Act, S USC§§ 552(b)(S), (b)(7).
2020-ICLl-00023 1155
From: kb)(6); (b)(7)(C)
Sent: 1 Oct 2019 14:02:38 +0000
To: !(b)(6): (b)(7)(C) !
Subject:
Attachments:
RE: Rules of Behavior
NSU Open Source Rules of Behavior • 10.01.19).docx
Find enclosed. This all looks good, let me know if you have any questions. If you could ship me the final
product for a final review and our files I would be greatly appreciative. Thanks!
Best,
kb)(6):
Mobile: 202-870Kb)(6); I
From:Kb)(6); (b)(7)(C)
Sent: Friday, September 27, 2019 2:58 PM
To:l(b)(6); (b)(7)(C)
Subject: Rules of Behavior
Kb)(6);
I forgot to forward you the current NSU RoB. Please see attached.
Thank you,
kb)(6); (b)(7)(C)
Management & Program Analyst
ICE - Homeland Security Investigation
National Security Investigation Division - National Security Unit
(703) 235{b)(6)lphone
(703) 864-l__Jwork cell
WARNING: The information disclosed may be subject to specific nondisclosure provisions and other limitations on
use under existing law and policy, including but not limited to sections 222(f) (Department of State visa records) and
244(c)(6) (temporary protected status) of the Immigration and Nationality Act; 8 U.S.C. § 1367 (Violence Against
Women Act claims and T and U non-immigrant claims); and 8 C.F.R. § 208.6 (asylum information; protections
afforded to refugee data as a matter ofDHS policy). You must receive pennission from ICE before (I) sharing this
infotmation outside of your organization or (2) sharing this infonnation with individuals within your organization
who will use it for a purpose other than your original approved purpose (e.g., law enforcement identification)
2020-ICLl-00023 1156
(b)(5) ,, (b)(5)
--
''
'''
'''
:'' ....., -----------'
''' '''
' '
'' ''
''' '''
'' ''
''' '''
'' ''
''' '''
' '
'' ''
'' ''
.I
2020-ICLl-00023 1157
Supervisor' s signature and date
2020-ICLl-00023 1158
From: kb)(6); (b)(7)(C)
Se nt: 23 Sep 2019 13:10:43 +0000
To: (b)(6); (b)(7)(C)
Cc:
Subje ct:
Attachments:
RE: Rules of Behavior/User Agreement
ICE RoB 2013.pdf, NSU Open Source Rules of Behavior • 9.23.19).docx
Once you've got this close to where you want it, please send it back to me so I can do a final review.
Feel free to send over your SOP and Training as well.
Best,
Kb)(6);_- ·
Mobile: 202-870tb)(6); I
From;kb)(6): ( b )(7)(C)
Se nt: Friday, September 20, 2019 9:45 AM
To: b)(6); (b)(7)(C)
Cc:
--~~~~~~~~~~~-------'
Subject: RE: Rules o Behavior User Agreement
kb)(6):
As soon as we get everyone to read and sign off on these can we have the start on OS for our reports?
Thanks,
WARNING: The information disclosed may be subject to specific nondisclosure provisions and other limitations on
use under existing law and policy, including but not limited to sections 222(f) (Department of State visa records)
and 244(c)(6) (temporary protected status) of t he Immigration and Nationality Act; 8 U.S.C. § 1367 (Violence
Against Women Act claims and T and U non-immigrant claims); and 8 C.F.R. § 208.6 (asylum information;
protections afforded to refugee data as a matter of DHS policy). You must receive permission from ICE before (1)
sharing this information outside of your organization or (2) sharing this information with individuals within your
2020-ICLl-00023 1159
organization who will use it for a purpose other than your original approved purpose (e.g., law enforcement
identification)
From:Kb)(6); (b)(7)(C)
Sent: Thursday, September 19, 2019 4:27 PM
To:l(b)(6); (b)(7)(C)
Cc:
~--------------------~
Subject: RE: Rules of Behavior/User Agreement
HiKb)(6); I
Sorry for the delay, I got slammed with an unexpected amount of work yesterday and I'm digging out.
Hopefully I can get you something Tomorrow or Monday.
Best,
!(b)(6):
Mobile: 202-870kh1fn1· I
From:Kb)(6) ; (b )(7)(C)
Se nt: Wednesday, September 18, 2019 9:57 AM
To:l(b)(6); (b)(7)(C)
Cc:
~--------------------'
Subject: FW: Rules of Behavior/User Agreement
l(b)(6);
Please see the attached rules of behavior for NSU. Any help would be much appreciated.
Thanks,
l(b)(6 ); (b)(7)(C)
Management & Program Analyst
ICE - Homeland Security Investigation
National Security Investigation Division - National Security Unit
(703) 287 (b)(6) phone
(703) 864 (._, work cell
17
,
WARNING: The information disclosed may be subject to specific nondisclosure provisions and other limitations on
use under existing law and policy, including but not limited to sections 222(f) (Department of State visa records)
and 244(c)(6) (temporary protected status) of the Immigration and Nationality Act; 8 U.S.C. § 1367 (Violence
Against Women Act claims and T and U non-immigrant claims); and 8 C.F.R. § 208.6 (asylum information;
protections afforded to refugee data as a matter of OHS policy). You must receive permission from ICE before (1)
sharing this information outside of your organization or (2) sharing this information with individuals within your
organization who will use it for a purpose other than your original approved purpose (e.g., law enforcement
identification)
From:l(b)(6); (b)(7)(C)
Se nt: Tuesday, September 17, 2019 11:59 AM
2020-ICLl-00023 1160
To:l(b)(6); (b)(7)(C)
(b)(6); (b)(7)(C)
Cc:l(b)(6); (b)(7)(C) I
l(b)(6); (b)(7)(C) I
:SUbJect: Kules ot tsehav1or/User Agreement
Good afternoon,
Attached are the draft Open Source Rules of Behavior and User Agreement. Let me know if you have any
edits, thoughts, and/or suggestions.
Each person that conducts open source will need to read the Rules of Behavior and sign the User
Agreement.
Thanks,
fb)(6); (b)(7)(C)
2020-ICLl-00023 1161
From: kb)(6): (b)(7)(C)
[:~?
Sent: 10 Sep 2019 15:16:22 +0000
To:
Cc:
(b)(7)(C)
b)(6); (b)(7)(C)
I
RE: 1(b) (7) ___
M__a___s-ke_d_A_c_c_o _
u n_t_s_R_u_
le_s _o _
fB_e_h_a_v-io-r _ _ _ _ _ _ _____.
Subject: ,,...,
Attachments: Facebook Masked Accounts SOP DRAFT.docx
kb)(6); I
I wanted to shoot this over to you as well. It's a draft of what the beginning and Facebook section of the
SOP could potentially look like. If you wouldn't mind looking this over when you a get a chance and
letting me know if we're on the right track, I' d really appreciate it .
Thank again,
From:!(b)(6); (b)(7)(C)
Sent: Tuesday, September 10, 2019 9:53 AM
To:l(b)(6); (b)(7)(C)
Cc: .
r )(6); (b)(7)(C)
Hikb)(6);!
Per our conversation, I've attached the first d raft o f (b) (7) Masked Accounts ROB. Please provide any
feedback/edits you see necessary. I will start puttingt ogether a draft SOP in the meantime.
Thanks!
f b)(6):
Intelligence Research Specialist
(b} (7)(E)
ICE - Homeland Security Investigations
Office: 703-235J(b)(6)!
Cell: 703-258~
Email : kb)(6); ( b)(?)(C)
2020-ICLl-00023 1168
From: l(b)(6); (b)(7)(C)
Se nt: 18 Jul 2019 13:33:43 +0000
To: l(b)(6); (b)(?)(C) I
Subject: RE: ERO IP Masking Tool for Social Media Review
I have calls from 10-12, but I should be free around noon if that works for you.
Best,
l(b )(6);
Hi~b)(6); _
Can we chat about this email in about an hour. I'm still waiting for confirmation from NCATC on whether
they're doing anything close to active monitoring ... I just sent them a reminder.
From;Kb)(6); (b)(7)(C) I
Se nt: Wednesday, July 17, 2019 2:27 PM
~~rb)(6); (b)(7)(C)
Good afternoonkb)(6); I
I see that you are out of the office today. When you are back in the office, please let us know when you
are available to speak t q(b)(6); land I (both with EROLD) about ERO's request to join the HSI
contract with i(b)(7)/My understanding is that l(b)(6): I
is the HSI Privacy POC and that you would be the
ERO Privacy POC for this contract. If that is not the case, please let us know ASAP.
Thank you!
kb)(6): (b)(7)(C)
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
Desk: (202) 732{b)(6!
Cell: (202) 578kb)(6 !
~b)(6); (b)(?)(C)
2020-ICLl-00023 1173
or use by anyone other than the intended recipient. Please notify the sender if this email has been misdirected and immediately
destroy all originals and copies. Furthermore do not print, copy, re-transmit, disseminate, or otherwise use this information. Any
disclosure of this communication or its attachments must be approved by the Office of the Principal Legal Advisor, U.S.
Immigration and Customs Enforcement. Th is document is for INTERNAL GOVERNMENT USE ONLY and may be exempt
from disclosure under the Freedom oflnformation Act, 5 USC§§ 552(b)(5), (b)(7).
2020-ICLl-00023 1174
From: l~(b_)(_6)_; - ~
Se nt: 5 Sep 2019 16:24:01 +0000
To: kb)(6): (b)(7)(C) I
Subject: RE: ERO social media white paper
Attachme nts: CIU White Paper - Unattributed Browser licenses 08022019 track changes -
8.29.19). 9 OS 2019.doc
Hi [~)(6);___
Kb)(6);
Acting Privacy Officer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732 (b)(6);
Mobile: 202-701 b)(6)
Main: 202-732 (b)(6);
l(b)(6): (b)(7)(C)I
Privacy Analyst, J.D., CIPP/US/G
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732j(b)(6):I
Mobile: 202-870 (b)(6
Main: 202-732 (b)(6);
2020-ICLl-00023 1175
From: I
l(b)(6); (b)(?)(C)
Se nt: 17 Oct 2019 21:03:23 +0000
To: kb)(6): (b)(7)(C)
l(b )(6 ): (b )(7)(C )
Cc: Kb)(6); (b)(7)(C)
Subject: RE: EROl(b)(?)(E)
Attachme nts: RE: Socal Media Training
l(b)(6): (b)(7)(C) I
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-73~(b)(6);_ I
2020-ICLl-00023 1183
(iPhone) 202-78~(b)(6): I
Kb)(6); (b)(7)(C)
From:kh)fn)· f h)(7)(r.)
Sent: Thursday, October 17, 2019 3:43 PM
To:l(b)(6): (b)(7)(C)
rb)(6); (b)(7)(C)
Thank you very much for meeting with us to discuss ERO'1(b)(7)(E) I Privacy is
prepared to approve the acquisition of this tool, but I would like to ensure we're on the same page
regarding next steps before ERO begins operational use. Below, please find a summary of today's major
points and next steps. If I've stated anything incorrectly, don't hesitate to correct me.
(b)(5)
Next Steps
(b)(5)
2020-ICLl-00023 1184
I'm happy to revise these bullets as necessary. Thanks again!
b)(6); (b)(7)(C)
Privacy O icer
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732 ,~~~~~~
2020-ICLl-00023 1185
From: l(b )(6);
Sent: 5 Dec 2013 17:06:49 -0500
To: !(b)(6): (b)(7)(C) I
Cc: l<b)(6): !Davis, Mike Pkb)(6): (b)(7)(C) IOPLA Taskin~ b)(6);
l(b )(6); (b )(7)(C) I
Subject: RE: Socal Media Training
Attachments: Social Media Training - Final (PRO 10 31 2013)(OPLA Cmts Edits 12 OS 2013).ppt
Hello,
Earlier this week, ERO requested OPLA clearance of the attached draft social media training PPP, which
was created by ICE Privacy. OPLA has reviewed and cleared with minor comments/edits on slides, 21-
23, and 25-27. We request that ERO please include these comments/edits in its response to ICE Privacy.
Thank you!
~~---~
(Email) kh)(fi) · ( h )(7 )((;)
(Office) 202 - 732 ( h )(R ) ·
(Blackberr y) 202-787- b)(6):
Notice : Attorney Work Product/Privileged Communication
l(b)(6):
Did OPLA have any issues with this training power point? I checked with ERO and we are fine with it, but
wanted to check with you to see if OPLA was ok before I send forward as the staff of the OD was asking
me about this.
Thank you
Kb)(6); I
Attached is the required training on using social media at ICE, which will deploy on the VU sometime in
the near future. As you might remember, DHS requires that components create policies (rules of
behavior) to govern employee use of social media for law enforcement, personnel, and other
operational uses. ICE has established two separate rules of behavior for use of social media - one for
law enforcement uses and one for all other uses. This training takes employees through the two sets of
rules.
This email is for awareness and informational purposes only. Most of you or your staffs have already
reviewed the training and the rules of behavior that it is based on. However, if you have any concerns
about the training, please let me know as soon as possible.
The DHS directive on social media and ICE's two rules-of-behavior policies can be found on my social
media page here: i(b)(7)(E) I
Thanks.
~b)(6)· !
Privacy Officer
Assistant Director for Privacy & Records
U.S. Immigration & Customs Enforcement
Direct: (202) 732 ( b )(6)
Main: (202) 732 (b)(6
Questions? Please visit the Privacy & Records Office website ~~(h~)~(7~)~( F~)~ - - - - - - - - - - - - - ~
2020-ICLl-00023 1187
Privacy Requirements
for Operational Use of
Social Media
November 2013
a -.
,{
1
•
2
• U.S. Immigration
·•;. - ji · · and Customs
~ ' "l. · Enforcement
I
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 11 90
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 11 93
*
ICE Rules of
Behavior (ROB)
for Non-Law
Enforcement
Activities
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 11 98
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 11 99
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1200
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1201
*
• Privacy settings
§ You must respect individual privacy settings
and access only information that is publicly
available unless the individual whose
information you seek to access has given
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
you consent to access it.
I nlc lfll'llH'lll
2020-ICLl-00023 1202
*
• PII safeguards
§ Protect PII as required by the Privacy Act
and OHS privacy policy.
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1203
*
• Documentation
§ Retain the contents of your use of the
Internet, including social media, if you would
have retained that information had it been
written on paper.
§ Preserve in appropriate ICE recordkeeping
systems in accordance with office
procedures and in a manner authorized by
the relevant records schedule.
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1204
*
• LE Activities
§ If you engage in law enforcement activities, the
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-. training for Online Law Enforcement Activities
I nlc lfll'llH'lll
continues on the next slide.
2020-ICLl-00023 1206
*
ICE Rules of
Behavior (ROB)
for Online Law
Enforcement
Activities
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1207
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1211
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1212
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1213
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1214
*
Links:
ICE Law Enforcement Rules of Behavior
l(b)(7)(E)
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1217
U.S. Immigration
and Customs
Enforcement
From: !
!rb)(6): (b)(7)(C)
Sent: 11 Jul 2019 12:53:13 +0000
To: fo)(6): I
Cc: ICE-OPLA-EROLD;k'=b~)<~6~
): ~<b~)<~7~
)<C
~ )~ - - - - - - - - - - - - - - ~
Subject: RE: ERO use of social media and IP masking tools
Best,
Kb)(6);
Mobile: 202-870Kb)(6);
From:l(b)(6): I
Sent: Thursday, July 11, 2019 8:50 AM
To: kb)(6): (b)(7)(C)
Cc: ICE-OPLA-EROLD < b)(6): (b)(7)(C)
(b)(6); (b)(7)(C)
~b)(6); _ I
2020-ICLl-00023 1219
information or attorney work product and/or law enforcement sensitive information. It is not for release, review,
retransmission, dissemination, or use by anyone other than the intended recipient. Please notify the sender if this
email has been misdirected and immediately destroy all originals and copies. Furthermore do not print, copy, re-
transmit, disseminate, or otherwise use this information. Any disclosure of this communication or its attachments
must be approved by the Office of the Principal Legal Advisor, U.S. Immigration and Customs Enforcement. This
document is for INTERNAL GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom
oflnformation Act, 5 USC§§ 552(b)(5), (b)(7).
Good Morning,
(b)(5)
Best,
b)(6);
' '- '-
,/~,,...,
'\
(b)(7)(C)
fo) (6):
Privacy Analyst, J.D ., CIPP/US/G
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-7321(b)(6):I
Mobile: 202-870{b)(6);1
Main: 202-732t b)(6); I
2020-ICLl-00023 1220
From: l<b)(6 ):
Se nt: 30 Sep 2019 13:21:38 +0000
To: !rh 'l(R'l· ( h )(7 'lfr.1 !
Subject: RE: Fictitious Accounts materials
l<b)(6):
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732.fhVn)· I
(iPhone) 202-787filillfilJ
~ h \/~ \ · / h \/7 \/('\
From:kb)(6): (b)(7)(C)
Se nt: Monday, September 30, 2019 7:52 AM
To: kb)(6): (b)(7)(C)
Subject: Fictitious Accounts materials
Kb)(6); (b)(7)(C) I
Privacy Analyst, J.D., CIPP/US/G
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732l(b)(6): I
Mobile: 202-870~(b)(6); I
2020-ICLl-00023 1221
Main: 202-732- (b)(6);
f l,...\ I I \ /
2020-ICLl-00023 1222
From: !(b)(6 ); ( b)(7 )(C)
Sent: 23 Jul 2019 12:59:12 +0000
To: rb)(6); (b)(? )(C)
Cc:
Subject: RE: ICE SMOUTs
Attachments: (b) (7)(E) >eial Media White Paper_July 2018.pdf
Than ks kb )(6);
An HSI Open Source Team has cleared us to share their white paper for their use of social media. They
have been monitoring social media khVR\ · fh\f7 \f<:\ I
fb)(? )(E)
Best,
l(b)(6); (b)(7)(C) I
Mobile: 202-870i (b)(6) I
From: ..,_!
(b-'-)(;....
6.;.:..
); _ ___,
Sent: Monday, July 22, 2019 4:39 PM
To:l(b)(6); (b)(? )(C)
Cc: _
I'')(6); (b)(7)(C)
As discussed, attached please find an email which includes all the ICE Social Media Operational
Use Templates (SMOUTs), as well as DHS Directive and Instructions on operational use of
social media.
The SMOUTs were used by DHS Privacy to find out the operational purposes for which ICE
needs to access social media, and to determine whether those uses are authorized under DHS
policies. Most relevant to ERO 's operational use of social media is the 'Criminal and Admin
Immigration LE' SMOUT. I've identified below portions of this SMOUT that may help CIU in
framing a document explaining ERO 's intended use of SILO to surveille publicly-available
social media sites.
(b)(S)
2020-ICLl-00023 1223
I believe l(b)(?)(~as audit functions, based on the attached Authentic8 overview document you
kindly provided this morning.
The Privacy folks may also be interested in whether ERO will download any personally
identifying info (PII) and/or sensitive PII from social media using SILO, and if so, where the
downloads will be maintained, and how they will be secured. See ICE responses to Q 5(e) - (g)
on pp. 7-8.
Please let me know if you have any questions about the above. Thank you!
Kb)(6); I
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-73* b)(6);I
(iPhone) 202-787l(b)(6); I
fb)(6); (b)(7)(C)
--- ATTORNEY/CLIENT PRIVILEGE ---ATTORNEY WORK PRODUCT---
This communication and any attachments may contain confidential and/or sensitive attorney/client
privileged information or attorney work product and/or law enforcement sensitive information. It is not
for release, review, retransmission, dissemination, or use by anyone other than the intended recipient.
Please notify the sender if this email has been misdirected and immediately destroy all originals and
copies. Furthermore do not print, copy, re-transmit, disseminate, or otherwise use this information.
Any disclosure of this communication or its attachments must be approved by the Office of the Principal
Legal Advisor, U.S. Immigration and Customs Enforcement. This document is for INTERNAL
GOVERNMENT USE ONLY and may be exempt from disclosure under the Freedom of Information Act, 5
USC§§ 552(b)(S), (b)(7).
2020-ICLl-00023 1225
From: l(b)(6); (b)(7)(C) I
Sent: 16 Jul 2019 14:19:11 +0000
To: I
l(b)(6); (b)(7)(C)
Subject: RE: Policies
Good Morningl(b)(6); I
(b)(5)
Best,
~b)(6);
Mobile: 202-870~(b)(6:I
From:l(b)(6); (b)(?)(C) I
Sent: Monday, July 15, 2019 7:27 PM
To:l(b)(6); (b)(7)(C)
Subject: FW: Policies
I'm very confused about these email .... I wasn't involved in any ofthe telephone conferences, but they
seem to be addressing issues that!(b)(6); (b)(?)(C) land others (not even on the email list) and I are
already working on, i.e., social media issues involving ERO. I don't want to duplicate efforts.
Or are the conferences you've part icipated in about something else altogether? Thanks.
2020-ICLl-00023 1228
Froml(b)(6); (b)(7)(C)
Sent: Monday, July 15, 2019 3:15 PM
To:l(b)(6); (b)(7)(C)
kn" ~' · rn\f7 \fr ,
Cc: !<b)(6): ( b )(7)(C)
kb )(6); (b)(7)(C)
Subject: RE: Policies
l(b)(6); ~ CLEAR was not mentioned by name on the phone call this morning, so I do not know for sure.
NCATC is currently working on identifying the Privacy POC for the contract as well tracking down the
Statement of Work (SOW).
l(b)(6); (b)(7)(C) ~ thank you again for talking t q(b)(6); land I this morning. We both found it very
helpful. CIU is interested in discussing NCATC's operations with respect to reviewing publicly avai lable
information on targets' social media as well.
Is everyone available tomorrow (Tuesday) at 10:30am for a conference call? I'll send an Outlook invite
with call in information once a date and time is agreed upon.
kb)(6); (b)(7)(C)
Associate Legal Advisor
Enforcement and Removal Operations Law D ivision
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
Desk: (202) 732khVn)· I
Cell: (202) 578 (b)(6)
(b)(6); (b)(7)(C)
From:kb)(6); (b)(7)(C)
Sent: Monday, July 15, 2019 2:58 PM
To~(b)(6); (b)(7)(C)
i(b )(6): ( b )(7)(C)
Cc:kb)(6): ( b )(7)(C)
Subject: RE: Policies
2020-ICLl-00023 1229
Ht b)(6);
Is the service you are referring to CLEAR? Thanks for the follow up.
Best,
l(b)(6); (b)(7)(C) I
Mobile: 202-870Kb)(6);
Yes, the CIU is aware of the NCATC utilization of these types of services - generally, not specifically.
I would be very interested in participating in a conference call!
We have tossed around the idea of making a trip to the NCATC, but funding always seems to be an issue,
so a call would be ideal!
I will be at the NTC in Sterling all day on Wednesday of this week, but any other day- at any time -
would work for me.
From:l(b)(6); (b)(7)(C)
Se nt: M onday, July 15, 2019 2:44 PM
To: (b)(6); (b)(7)(C)
(b)(6); (b)(7)(C)
Cc: kb)(6): (b)(7)(C)
Subject: RE: Policies
Good afternoon,
This morningkh)(R)· land I reached out to the National Criminal Analysis and Targeting Center
I
{NCATC) and spoke tol(b)(6); (b)(7)(C) Director) and l(b)(6); t Deputy Director) and learned t hat their
office utilizes similar services to view publicly available information on social media platforms through a
contract with Thomas Reuters.
Is the CIU aware that NCATC is already engaged in similar efforts? If not, are you amenable to
participating in a conference call this week to discuss the simi larit ies and differences in their operations
and what you envision FIO's would do with Silo's services?
2020-ICLl-00023 1230
Kb)(6); (b)(?)(C)
Associate Legal Advisor
Enforcement and Removal Operations Law D ivision
Office of the Principal Legal Advisor
U.S. Inunigration and Customs Enforcement
Desk: (202) 73 (b)(6);
Cell: (202) 578 (b)(?)(C
(b)(6): (b)(7)(C)
Since kf,,ri:;, lmight not have been on the line today, maybe it would be helpful to outline how we would
like to use SILO.
I can certainly engage other CIU staff to better explain, but as a big-picture description:
The Combined Intelligence Unit (CIU) at HQ is comprised of both ERO and HSI employees working in
conjunction to share valuable intelligence from ERO's detained population.
The CIU utilizes trained Field Intelligence Officers (FIO) located at detention facilities across the nation.
These FIOs are Deportation Officers (1801) who graduate from a two-week advanced training course at
FLETC entitled Enforcement and Removal Intelligence Collection (ERIC).
The course curriculum is taught by members of the intelligence community, OPLA, ERO, HSI, and other
federal law enforcement entities and covers:
Law Review
Introduction to Intelligence
Foreign Threat Awareness
Terrorism
TOC / Gangs
Open-Source Intelligence
HSI Reports Officer Program
Intro to HUM INT Tradecraft
ERO Collection Management
DROLeads
KSTEP Protocols
2020-ICLl-00023 1231
Interviewing Techniques
Practical Exercises
The ERIC course trains the FIO to return to their office with the ability to identify, prepare to interview,
and interview ICE detainees in consensual settings to gather raw intelligence.
The intelligence gathered is documented by the FIO in the DROLead which is submitted to the Combined
Intelligence Unit (CIU) to be analyzed for potential intelligence value.
According to ERO's Priority Intelligence Requirements (PIR), topics that are of potential intelligence
value from the detained population include:
National Security Threats (PIR 1)
Transnational Organized Crime and Criminal Street Gangs (PIR 2)
Human Trafficking and Smuggling (PIR 3)
Operations and Force Protection (PIR 4)
Because detained populations are so vast, prior to an interview, cursory ICE database, open-source
database, and (potentially) social media checks are deemed important to aid in determining individuals'
activities that might have intelligence value. After an interview is conducted, it is helpful to be able to
utilize these same systems to check the truthfulness of the information provided during the interview -
which also goes to the value of the intelligence provided.
As we understand it, 1801s are not able to interact with individuals on social media but can look at
publicly available information (information the person has allowed to be viewed without interaction).
In order to view said information, it is necessary to establish program accounts. We have no intention
of the FIOs establishing back-stopped UC accounts, etc.
Our plan is to roll out training and the licenses together so they understand the capabilities and the
limitations.
I am very interested in knowing the next steps or what other information might be helpful to keep the
ball rolling.
Thank you!
b)(6);
202-732 (b)(6) desk)
HiKb)(6);
Thanks so much for this and thank you for coming on the call today, it was really helpful. These
documents are overarching policy documents as to how to institute a privacy sensitive social media
monitoring program, instead of operational documents. If ERO does have the authorities to collect this
type of information we will have to work up Rules of Business in line with these documents and have the
FIOs trained on them prior to implementation. We will also have to conduct a privacy threshold analysis
2020-ICLl-00023 1232
to determine what further compliance requirements we might have for the program as a whole. I'm
CCing Anne, our ERO privacy lead on this, as she will be assisting you through most of this process.
Once we figure out what authorities allow ERO to collect social media we can move from there. Thanks
everybody for your help!
Best,
(b )(6);
I L... \1"'7\ lr" \
Hello again.
As discussed, attached are the referenced documents regarding guidance for on-line behavior.
2020-ICLl-00023 1233
From: l(b )(6); (b )(7)(C)
Se nt: 27 Aug 2019 18:33:41 +0000
To: kh\/~ \· / h \ /7\/("'\ I
Subject: RE: privacy training
Thank you!
(b)(6); (b)(?)(C)
Spec1a Assistant
National Security Investigations Division
Homeland Security Investigations
Cell: 202.425l(b)(6);!
From:j(b)(6); (b)(7)(C)
Se nt: Tuesday, August 27, 2019 2:24 PM
To :l(b)(6): (b)(7)(C)
Subject: RE: privacy training
Best,
Kb)(6);
Mobile: 202-870~
From:Kb)(6) : (b )(7)(C)
Se nt: Tuesday, August 27, 2019 1:56 PM
To:l(b)(6): (b)(7)(C)
Subject: RE: privacy training
Do you mind sending me a sentence or two about the training so I can include it in t he meeting invite,
that way folks have an understanding about what they aer attending?
kb)(6): (b)(7)(C)
Special Assistant
National Security Investigations Division
Homeland Security Investigations
Cell: 202.425¥b)(6); I
2020-ICLl-00023 1234
From: Kb)(6); (b)(7)(C)
Sent: Tuesday, August 27, 2019 9:54 AM
To: kb)(6): (b)(7)(C)
Subject: RE: privacy training
Both are good, if Sept 25 th works better for you all let's do that.
Best,
l(b)(6);
Mobile: 202-870~(b)(6): I
From:!(b)(6 ) : (b )(7)(C)
Sent: Tuesday, August 27, 2019 9:51 AM
To:!{b)(6): (b)(7)(C)
Subject: RE: privacy t raining
Than ks ~(b)(7)(E)
Special Assistant
National Security Investigations Division
Homeland Security Investigations
I
Cell: 202.425.l(b)(§);
From:kb)(6); (b)(7)(C)
Sent: Tuesday, August 27, 2019 9:45 AM
To:l(b)(6): (b)(7)(C)
Subject: RE: privacy training
Good Morningl(b)(6):
That works for me! Thanks.
Best,
Kb)(6);
Mobile: 202-870kb)(6):
From:Kb)(6); (b )(7)(C)
Se nt: Tuesday, August 27, 2019 9:42 AM
To~(b)(6); (b)(7)(C)
Subject: RE: privacy t raining
HiKb)(6);
2020-ICLl-00023 1235
I'm thinking we need to do a Wednesday to get the most participation - the 18th has our large
conference rooms blocked with another big event. Can you do the 25th at lpm? If not, we can also do
October 2 at 10am (the following week).
l(b)(6): (b)(7)(C) I
Special Assistant
National Security Investigations Division
Homeland sy urity T vestigations
Cell: 202.425 b)(6);
Good Morningirh\rn\·
Will mid-September work? I'm relatively free any day around that t ime.
Best,
l(b)(6 ):
Mobile: 202-870fb)(6): I
From: l(b)(6): (b)(7)(C)
Se nt: Thursday, August 22, 2019 4:24 PM
To:l(b)(6); (b)(7)(C)
Cc:.
!<b)(6): (b)(7)(C)
Subject: privacy training
H1l(b)(6);
Reaching out regarding the Privacy Training you mentioned in the Staff meeting last Monday - when ca n
we schedule this for NSID?
Thanks!
i(b)(6): (b)(7)(C)
Special Assistant
National Security Investigations Division
2020-ICLl-00023 1236
Homeland Security Investigations
I
Cell: 202.42Sfb)(6);
2020-ICLl-00023 1237
From: l(b)(6); (b)(7)(C) I
Sent: 22 Jul 2019 19:53:48 +0000
To: (b_)(_6)_; (_b)_(7_)(_C_) - - - - - - - - - - - - - ~!Estrada,
~l
Rafael
Cc: kb)(6); (b)(7)(C)
Subject: RE: SILO Contract
Attachments: [4300A HB Att X] Social Media v14 (DHS Connect 12 14 2018).pdf,
lnstruction_ll0-01-00l_Privacy_Policy_for_Operational_Use_of_Social_Media_0.pdf, SM OUT, ICE -
Criminal Law Enforcement, 20130620 PRIV Final.pdf, SMOUT, ICE - Criminal and Admin Immigration LE,
20170103, PRIV Final.pdf, SMOUT, ICE - Undercover Criminal Law Enforcement, 20121106 PRIV
Final.pdf, 192119IHQRQNXXXX - Privacy and Security Checklist.doc, Base Contract Format - HUBZone
Socio-Economic Category.pdf
Best,
kb)(6);
From:!(b)(6 ) :
Sent: Monday, July 22, 2019 2:00 PM
To:l(b)(6); (b)(7)(C)
kb)(6); (b)(7)(C)
(b)(6); (b)(7)(C) ; Estrada, Rafael (b)(6); (b)(7)(C)
Cc (b)(6); (b)(7)(C)
Subject: RE: SILO Contract
Hello All,
Attached is the DAIP training PPP which is part of the ERIC officer training at FLETC.
(b)(5)
2020-ICLl-00023 1238
Director of National Intelligence the authority to render advisory tasking to intelligence elements
of those agencies and depaitments not within the National Intelligence Program."
What is the relevance of these references to the Intel Community with respect to ERIC's work
that involves the use of HAG/SILO? Thank you.
l(b)(6);
Associate Legal Advisor
Enforcement and Removal Operations Law Division
Office of the Principal Legal Advisor
U.S. Immigration and Customs Enforcement
(Desk) 202-732--thlZ6J
(iPhone) 202-787 (b)(6);
(b )(6) ; (b )(7)(C)
-----Original Appointment-----
Fromtb)(6); (b)(7)(C) I
Cc-
Sent: Monday, July 22, 2019 9:27 AM
To~ ~ - - - - - - - - - - - - - - - - - - - - - '
2020-ICLl-00023 1239
Homeland
Security
DHS 4300A
Sensitive Systems Handbook
Attachment X
Social Media
Version 14
July 24, 2018
2020-ICLl-00023 1240
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
0.7 May 12, 2011 Final Draft for Review; Includes Component Comments
9.1 July 24, 2012 Stylistic and formatti ng changes throughout the document
2020-ICLl-00023 1241
OHS 4 30 0A S ENSIT IVE SYSTEMS H ANDBOOK A TTACHMENT X- SOCIAL M EDIA
Contents
1.0 Introduction ............................................................................................................................................. 1
1.1 Background ......... .................... .................... ........................................ .................... .................... ......... 1
1.2 Purpose and Scope ............................................................................................................................... 2
1.3 Application .......... .................... .................... ........................................ .................... .................... ......... 2
3.0 Risks and Attack Techniques Associated with Social Media ..................................................................... 9
3.1 Common Risks of Cyber Attacks .................. .................... .................... .................... .................... ......... 9
3.2 Common Cyber Attack Techniques .................................................................................................... 10
3.2.1 Spear Phishing ....................................................................................................................... 10
3.2.2 Social Engineering ....... .................... ........................................ ............................................... 10
3.2.3 Web Application Attacks ....................................................................................................... 11
2020-ICLl-00023 1242
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X - SOCIAL M EDIA
Glossary ............................................................................................................................................................... 19
References ........................................................................................................................................................... 25
2020-ICLl-00023 1243
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
1.0 INTRODUCTION
Social media such as Facebook, Twitter, and Instagram have become ubiquitous in our daily life.
According to a study by the Pew Research Center, nearly two-thirds (65%) of all American
adults use social network sites- a nearly tenfold jump in the past decade 1. Due to extensive
casual Internet use, it comes as no surprise that Federal employees and contractors may have
difficulty deciding what constitutes acceptable and security-conscious behavior in using social
media.
Even as Government organizations consider how best to leverage the interactivity enabled by
social media, they must also ensure a common understanding of how employees are expected to
use those media.
Issued under the authority of the Department of Homeland Security (DHS) Chief Information
Officer (CIO), through the Office of the Chief Information Security Officer (OCISO), this
document expands on existing DHS policy as provided in Section 3. 16, "Social Media," of DHS
Sensitive Systems Policy Directive 4300A, and in DHS Management Directive (MD) 4400.1,
"Web (Internet, Intranet, and Extranet Information) and Information Systems."
This document is applicable under the following guidelines:
• Whether or not the use is official (work-related) or unofficial (personal)
• Whether or not the use occurs on sanctioned "official" social media sites or on
commercially managed sites
• Whether or not use is accomplished using Government-issued equipment or on electronic
devices owned by the employee or other third-party.
1.1 Background
Cyber attacks on and via social media are rapidly increasing because of the abundance of
personal information available on social media sites that is of interest to cybercriminals such as
home address, family names, friends ' names, and current employer. Due to the high threat of
malware infiltration and the sensitive nature of the information maintained at DHS, social media
host sites are blocked at the Department's Trusted Internet Connections (TIC). 2 The Assistant
Secretary, Office of Public Affairs (OPA), as well as Component public or external affairs
offices, however, do permit limited social media use "by exception," through sanctioned
Government and commercial social media sites and social networking services. These limited
uses of social media make information and services more widely available. Sanctioned social
media can:
• Provide additional sources that the public can use to obtain supplemental information
about the Department's activities
1
"Social Media Usage: 2005-2015", Pew Research Center, October 6, 2016,
http://www.pewinternet.org/2015/ 10/08/social-networking-usage-2005-2015/
2
Section 3.16, DHS Sensitive Systems Policy Directive 4300A.
2020-ICLl-00023 1244
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
1.3 Application
This document applies to all DHS Federal employees and contractors, describes the governance
of social media sites across DHS, and addresses the use and associated risks of social media
technologies in three scenarios:
• Required work-related use
• Unofficial or personal use on Government equipment
• Unofficial or personal use on non-Government equipment
The term equipment includes both non-portable devices such as desktop computers as well as
mobile devices such as laptop computers smartphones and tablets.
Commonly used social media terms are in bold italics throughout this attachment and are defined
in the Glossary.
2020-ICLl-00023 1245
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X - SOCIAL M EDIA
2.1.1 Governance
The DHS Office of Public Affairs (OPA) serves as the primary account holder for all DHS and
Component social media websites, approves and manages all content posted, and when necessary
acts as the final authority on comment acceptability. OPA will ensure that posted content meets
the requirements for publicly available information and materials.
2020-ICLl-00023 1246
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
As part of the Department's privacy compliance process, the DHS Privacy Office has developed
two Department-wide Privacy Impact Assessments (PIA), both found at www.dhs.gov/privacy.
to identify and mitigate privacy risks for the Department's use of social media for public
engagement or external affairs:
• "Use of Social Networking Interactions and Applications
(Communications/Outreach/Public Dialogue)," September 16, 2010
• "Use of Unidirectional Social Media Applications," March 8, 2011
These two PIAs and the DHS privacy policies, including those that are social media specific,
govern the Department's use of social media from a privacy standpoint. The DHS privacy policy
as well as privacy policies specific to social media can be found at www.dhs.gov.
PIA determination is made on a case by case basis through the social media privacy threshold
analysis (SMPTA). Components should work with their Component Privacy Office to ensure
compliance with privacy requirements. DHS Headquarters should contact the DHS Privacy
Office directly atKb)(7)(E) I
Approved PIAs are published on the Department's Privacy Impact Assessment Web page (see
www.dhs.gov/topic/privacy) unless they are classified. DHS has issued a PIA detailing the PII
to which the Department may have access because of its use of social networking applications,
how it will use the information, what information is retained and shared, and how individuals can
gain access to and correct their information.
If PII is posted on a social media site, the Department will attempt to delete it. If that is not
possible, the Department will disregard the PII and it will not be maintained in agency files. It
should be noted, however, that PII posted on a social media website or sent to the Department in
connection with the transaction of public business may become part of a Federal record and will
have to be maintained in accordance with appropriate records retention policies.
Note that this privacy compliance framework does not apply to the Department's "operational
use of social media." See section 2.2 for details.
2020-ICLl-00023 1247
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
Federal employees often inadvertently fail to comply with the stringent requirements of the
Hatch Act of 1939, which governs political speech by Federal employees. The U.S. Office of
Special Counsel (OSC) issued "Hatch Act Social Media and Email Guidance" regarding the
applicability of the Hatch Act to social media engagement in the workplace by Federal
employees 3. The Hatch Act's restrictions may determine whether or not Federal employees are
allowed to post content that could be interpreted in a political light. Employees should
understand the Hatch Act, and Sections 4 and 5 of this document, before posting on social media
or revealing professional titles or political affiliations.
2.2.1 Authority
Program Managers and System Managers must consult with counsel to ensure that appropriate
authority exists to engage in categories of operational use of social media before Component
employees engage in those activities.
SMOUTs are submitted to the Chief Privacy Officer for a prompt review and determination as to
whether a new or updated PIA or SORN is required. SMOUTs are also completed to document
3
Official of Special Counsel, "Hatch Act Social Media and Email Guidance", https://osc.gov/Pages/Hatch-Act-
Social-Media-and-Email-Guidance.aspx
2020-ICLl-00023 1248
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
categories of operational use of social media in existence prior to this Instruction to ensure
compliance with this Instruction. Once a SMOUT is approved for a category of operational use,
a new SMOUT is not required for additional use of social media within that category unless there
is a material modification of the Rules of Behavior applicable to that category. Components may
appeal to the Deputy Secretary of Homeland Security if there is a disagreement over the OHS
Ptivacy Office determination of privacy compliance for the operational use of social media.
2.2.3 Access
OHS employees who are authorized to use social media by their Component heads renew their
access authority annually, consistent with annual training requirements. Access is contingent
upon an employee's successfully completing privacy training for operational use of social media.
2020-ICLl-00023 1249
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
8. Document operational use of social media, including date, site(s) accessed, information
collected, and how it was used in the same manner that the Department would document
information collected from any source in the normal course of business. For instance,
where information obtained through authorized operational use of social media is used in
whole or in part to make decisions regarding an individual's rights, benefits or privileges,
employees document that fact in relevant records.
9. When use of the social media site is completed, always log out of the site.
2020-ICLl-00023 1250
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
"Unofficial Internet posts" result when DHS personnel express OHS-related thoughts, ideas,
knowledge, experience, and opinions on any Internet site, whether or not the site is DHS-
controlled. Unofficial Internet posts are personal expressions developed and released by an
employee or contractor that have not been initiated by any official part of the DHS organization
or reviewed through an official DHS approval process. Employees must remember that any
information about another individual is almost surely protected by the Ptivacy Act and should
not be shared.
Social networks are of particular concern because of the potential for users to disseminate
personal information about themselves and others. Unless strict privacy controls are applied to
online profiles, the information posted is viewable by a wide range of strangers. Normally
adversaries would have to engage in determined information gathering in order to collect
sensitive information, but social networks can easily provide them an opportunity to gather
sensitive information with relative ease. Even seemingly harmless facts can be collected and
used by adversaries to assemble profiles and select targets. Even with privacy controls in place,
DHS employees and contractors should not post any content that they would not be comfortable
disclosing to the public.
Employees must remember that any information that is work-related is sensitive and cannot be
repeated outside the workplace without appropriate approval. In addition, further limits are in
place if you identify yourself, whether directly or indirectly, as a DHS employee.
Consistent with the risks detailed above, the recent guidance issued by the U.S. Office of Special
Counsel (OSC) regarding social media outside the workplace does not differ substantially from
guidance for the workplace, although more latitude is given for employees to express political
thoughts and candidate advocacy and support on their personal websites. See Sections 4 and 5 of
this document for additional best practices and guidelines applicable to social media use.
2020-ICLl-00023 1251
OHS 4300A S ENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
4
"Location-Sharing Technologies: Privacy Risks and Controls", Carnegie Mellon University, February 1010,
http://cups.cs.cmu.edu/LBS pri vacy/files/TsaiKelleyCranorS adeh 2009.pdf
5
"Communications Act of 1934", Federal Communications Commission,
https://transition. fee.gov/Reports/ l 934new.pdf
2020-ICLl-00023 1252
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
privacy is protected. 6 The DHS Privacy Office requires all projects, programs, or systems
contemplating the use of LBS to submit a PTA.
6
Joint Hearing o n "The Collection and Use of Location Information for Commercial Purposes", February 24, 2010.
7"Guidelines for Secure Use of Social Media by Federal Departments and Agencies," Version 1.0, Federal CIO
Council, September 2009.
8"Spear Phishers: Angling to Steal Your Financial Info", FBI, April 2009,
https://archi ves.fbi.gov/archi ves/news/stories/2009/april/spearphishing 040 109
2020-ICLl-00023 1253
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
from members in order to operate. In every case, however, users needlessly granted the
applications total access to their account and therefore full access to all personal information.
When DHS employees join a social media website, they may identify themselves as DHS
employees. Their self-identification creates a DHS Internet footprint, which is valuable
information to adversaries. As more Federal employees self-identify on social media websites,
the Federal footprint on social networking will grow, creating a target-rich environment to help
adversaries target specific individuals to launch various social engineering attacks.
To learn personal information about an individual, an attacker can express a common interest in
a topic and build a trust relationship with the victim. This positions the attacker to influence the
victim's friends and co-workers or even to collect sufficient information to pose as the victim,
providing an easy avenue for penetrating the trust of the Department or of other DHS personnel.
High-profile Federal employees with greater name recognition are an especially prime target for
a social engineer seeking to exploit trust relationships in social networks.
2020-ICLl-00023 1254
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
9
"Facebook Privacy: 10 Settings to Check", Information Week, June 5, 2014,
http://www.information week.com/software/social/ facebook-pri vacy-10-settin gs-to-check/did-id/ 1269438
2020-ICLl-00023 1255
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
monitor the plivacy policies for social networking sites as they change often and without
warning. Remember though, there is a risk that even private information can be exposed, so do
not post anything that you would not want the public to see.
2020-ICLl-00023 1256
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
According to NIST (National Institute of Standards and Technology), a strong password should
contain no fewer than 12 characters, a rule adopted by the U.S. government in 2007 and further
defined in the U.S . Government Configuration Baseline. Admin passwords should be 15
characters. Readers may sigh at those lengths, but they have been the recommended minimum
for half a decade. Anything shorter is not considered secure.
2020-ICLl-00023 1257
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
and exercise discretion and common sense. Most social networks offer settings to keep profiles
private and restrict access to personal photographs or other personally identifiable details;
however, opting for privacy does not guarantee that others will not see your content. Content
can be forwarded or hacked.
Facebook has found itself at the center of privacy breakdown controversies numerous times, and
confusing Twitter interfaces have resulted in private messages being inadvertently posted to
public feeds. Hackers can force access and friends can forward your content to others. In short,
do not post anything that you do not want the public to see.
4.12 Be Professional
If you identify yourself as a DHS employee or have a public-facing position so that your DHS
association is known to the general public, ensure that your profile and related content are
consistent with how you wish to present yourself as a DHS professional, even if the information
is of a personal and unofficial nature. Ensure that all your posts and interactions are consistent
with the public trust associated with your position, and conform to existing standards such as
"Standards of Ethical Conduct for Employees of the Executive Branch."
If you establish online profiles, you may provide your DHS title and contact information. You
may also indicate that DHS is your employer, and you may describe your past and present job
responsibilities (as you would on your resume) if you do not disclose any DHS sensitive
information or the personal information of others.
4.15 Be Yourself
Do not forge or manipulate identities in your posts in an attempt to disguise, impersonate, or
misrepresent your identity or affiliation with any other person or entity.
2020-ICLl-00023 1258
OHS 4300A S ENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
2020-ICLl-00023 1259
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
10
Based on US OHS, ALCOAST 548/08, COMDTNOTE 5700. SUBJ: SOCIAL MEDIA - UNOFFICIAL
INTERNET POSTS.
2020-ICLl-00023 1260
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
2020-ICLl-00023 1261
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
GLOSSARY
Terms commonly used in relation to social media are defined below.
Term Explanation
Blog An abbreviation of "weblog." A blog is a web-based forum where individual
content providers contribute regular entries or "posts" in the form of
commentary, descriptions of events, or other materials on the website.
Visitors to the blog may add their own comments to posts. Biogs may be
"moderated" with the blog owner overseeing removal of any objectionable
material, or they may be "unmoderated," in which case there is no control
over the posted material.
Clickjacking A malicious technique of tricking a user into revealing confidential
information or of taking control of their computer when they click links on
seemingly harmless web pages. On a clickjacked page, the attacker shows a
set of dummy buttons or links, then loads another page over it in a
transparent layer. Users think they are clicking on the visible page while
they are actually performing actions on the hidden page which the users
never intended, such as changing privacy settings on a social networking site
or following someone on Twitter.
Commercialffhird Party Social media hosted on servers over which OHS has no control. This
Social Media includes proprietary social networking sites such as Facebook and MySpace,
as well as collaboration services such as Wikipedia, BlogSpot, and
Delicious.
Content Manager Any individual designated to manage web content for OHS or a Component.
The duties of the Web Content Manager include ensuring compl iance with
accessibility standards for persons with disabilities. This individual is the
organization's primary point of contact for Web issues. 11
Content Provider Any individual who creates content for publ ication to OHS websites.12
Enterprise Network The communications backbone that interconnects every computer and
associated device at every location under the j urisdiction of an organization,
such as OHS.
External Hosting Provision by an external organization or company of access, on a fee-per-
service basis, to the equipment, technology and support to needed to
establish and run a website, as opposed to an organization's using its own in-
house resources.
Farming See Pharming
Fishing See Phishing
11
DHS 4300A, IV Definitions, J
12
OHS 4300A, IV Definitions, K
2020-ICLl-00023 1262
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
Term Explanation
Foursquare A location-based social networking website and appl ication for mobile
devices. Users "check in" or report their location by accessing a mobile
website, text messaging or a device-specific application, so that their
whereabouts can be discovered by others. Foursquare also incorporates
elements of a game by awarding users points for being the first to visit a new
place, and for adding new info1mation about the locations they visit.
Hacker A person who uses their proficiency with electronics, computers and/or
programming skills to gain illegal access to others' digital resources,
including personal handheld devices, files, computers and networks.
Internet footprint The collective activities and behaviors recorded as an individual interacts in
a digital environment, including device usage, system logins and logouts,
website visits, files, transmitted emails, and posted messages. "Passive
footprints" are created when data are collected about individuals' activities
without any deliberate action on their part, such as tracking which products
customers are visiting on a vendor's website regardless of whether purchases
occur. " Active footprints" are created when personal data is released
intentionally by individuals for the purpose of sharing information with
others online. Footprints are sometimes used as a rough measure of an
individual's "web presence."
Keystroke loggers Also called a "key logger," It it is can be a hardware device or a program that
monitors and records each keystroke a user types on a computing device's
keyboard. Although sometimes used for legitimate purposes, such as
diagnostics or monitoring a child's Internet activity, a more typical use of
keystroke loggers is for the unauthorized capture of security credentials such
as passwords and personal identification numbers.
Malware Derived from the phrase "malicious software," this term is a generic term for
any program whose purpose is to cause harm to a computer system.
Typica)ly, malware is installed without the user's knowledge or consent,
although it is often packaged with other software the user does in fact choose
to install or download. Viruses and worms are examples of malware.
Mashup A web page or application that enables the fast, easy combination of data
and/or functionality from multiple sources to create a new, enriched result
that was not necessarily the reason for producing the original sources. Most
mashups use publicly-accessible resources. For example, a mashup might
supe1impose on a Google map of a neighborhood the average housing prices
drawn from a city assessor's online database.
Metadata Information abo ut the meaning of other informat ion. Metadata can describe
or summarize key attributes of a piece of information to facilitate finding
that information when needed. An example of metadata is a time stamp that
specifies when a piece of info1mation was created.
Micro-Blog Extremely shmt blog posts similar to text messaging. The messages can
either be viewed by anyone or by a restricted group that is chosen by the
user. Twitter, a popular micro-blog client, allows posts of up to 140
characters to be uploaded and read using instant messaging or mobile
devices via text messaging.
2020-ICLl-00023 1263
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
Term Explanation
Operational Use The authorized use of social media to collect personally identifiable
information for the purpose of enhancing situational awareness,
investigating an individual in a criminal, civil, or administrative context,
making a benefit determination about a person, making a personnel
determination about a Department employee, making a suitability
determination about a prospective Department employee, or for any other
official Department purpose that has the potential to affect the rights,
privileges, or benefits of an individual.
Password Attack An attempt to obtain a legitimate user's password. Hackers can use common
password lists, dictionaries, cracking programs, and password sniffers in
password attacks.
Personally Identifiable Any information that permits the identity of an individual to be
Information (PU)
directly or indirectly inferred, including other information that is
linked or linka ble to an individual regardless of whether the individual
is a United States citizen, legal permanent reside nt, or a visitor to the
United States. Examples of PII include, but are not limited to name,
date of birth, mailing address, telephone number, Social Security
Number, email address, zip code, account numbers, certificate/license
numbers, vehicle identifiers including license plates, uniform resource
locators (URLs), IP addresses, biometric identifiers (e.g., fingerprint,
voiceprint, iris scan, photographic facial images, or any other unique
identifying number or characteristic), and any information where it is
~-easonably foreseeable that the information w ill be linked with other
information to identify the individual. Also, Sensitive Personally
Identifia ble Information (SPII) that permits the identity of an
individual to be directly or indirectly inferred, including other
information that is linked or linkable to an individual. 13
Pharming An action whereby a hacker subverts a user's attempt to visit a legitimate
website by instead redirecting the111.1· to a counterfeit or "spoofed" website.
The spoofed site is designed to trick users into revealing personal
information such as usemames, passwords, and account information.
Phishing An attempt to fraudulently acquire a user's personal information, such as
passwords and credit card details, by masquerading as a trustworthy person
or business in an apparently official electronic communication. Phishing is
common in e-mail and instant messaging. For example, you might receive
an e-mail that appears to come from an official at your bank that instructs
you to "confirm" your Internet banking credential by clicking on a link. The
"spoofed" website to which you would be directed would capture your
credentials in order to enable a third party to access and withdraw all funds
from your bank account.
13
OHS 4300A, IV Definitions, H
2020-ICLl-00023 1264
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
Term Explanation
Sensitive Personally Sensitive PIT is personally identifiable information, which if lost,
Identifiable Information compromised, or disclosed without authorization, could result in substantial
(SPIT) harm, embanassment, inconvenience, or unfairness to an individual.
Sensitive PIT requires stricter handling guidelines because of the increased
risk to an individual if the data are compromised. SPII includes Social
Security Number, d1iver' s license or State ID number, passport number,
Alien Registration Number, fiancial acocunt number, and biometric
identifisers.
Social Bookmarking A Web-based service where users create and store links to information on
topics of particular interest to them. Although web browsers have the ability
to bookmark links to "favorite" pages, those links are tied to an individual
browser on a single computer. Social bookmarking, by contrast, stores links
in an online account which can be made public. These bookmarks can be
shared and discovered by others who are interested in finding information on
similar topics. Examples of social bookmarking sites include Delicious,
Digg, and Reddit.
Social Engineering The act of deceiving or tricking people into performing actions or divulging
confidential infonnation, rather than obtaining such information by breaking
in or using technical means. For example, someone posing as a help desk
representative might telephone you and claim to be diagnosing a connection
problem; the caller requests that you verify your login ID and password or
other personal information so it can be checked against the items on file.
Social Media Internet-based applications that build on the foundations of Web 2.0 to allow
the creation and exchange of user-generated content. Social media can take
many different forms, including but not limited to Web-based communities
and hosted services, social networking sites, video and photo sharing sites,
wikis, blogs, podcasts, virtual worlds, social bookmarking, and many
emergent technologies.
Social Networking Services Web-based services that connect people who share the same interests and/or
activities, or who are interested in exploring the interests and activities of
others. Social networking services provide a variety of ways for users to
interact. For example, Facebook is used as a place to socialize with friends,
whereas Linkedln caters to those who wish to make professional
connections.
Spam Unsolicited or undesired electronic messages. Spam includes legitimate
advertisements, misleading advertisements, and phishing messages- any
unsolicited message can be spam.
Spear Fishing See Spear Phishing
Spear Phishing A technique by which the attacker generates an e-mail message or prompts
linking to a website. The attack's target is a specific individual or small
group. The goal is to convince the targets to take action, which gives the
attacker access to their system by presenting them with text, images, or
URLs that they could actually expect and therefore mistake for legitimate.
2020-ICLl-00023 1265
OHS 4300A SENSITIVE SYSTEMS H ANDBOOK ATTACHMENT X- SOCIAL M EDIA
Term Explanation
Spoofed Webs.ite An impostor website that mimics a real company's website in order to steal
personal information from site visitors. Victims are often directed to these
spoofed sites through phishing e-mails. Spoofed sites can look extremely
convincing, but often contain small flaws such as spelling errors or "slightly
wrong" logos.
Spyware Any software that covertly gathers users' information through their
computing devices and/or their Internet connection without their knowledge
for unauthorized use. Spyware applications are typically hidden components
that users inadvertently download together with legitimate material.
Spyware may gather information such as e-mail addresses for advertising
purposes, or even passwords and credit card data.
Trusted Internet A DHS initiative implementing 0MB Memorandum M-08-05, to optimize
Connections (TIC) and standardize the security of individual external network connections
including connections to the Internet that are currently in use by the Federal
Government. A "TIC" is a physical location an agency uses to meet the
objectives of the TIC Initiative.
Twitter A social networking micro-blogging service that enables its users to send
and read other users' messages, called " tweets." Users ("followers") may
subscribe to ("follow") other users' tweets. Twitter is sometimes called the
"Short Message Service of the Internet" because of the compatibility of its
interface with smart phones. Tweets are limited to 140 characters.
Uniform Resource Locator In computing, the identifier that specifies where a resource is located and the
(URL) mechanism for retrieving it. The best-known example of the use of URLs is
for the addresses of web pages on the Internet, such as www.dhs.gov.
Video Sharing Websites on which users post video they have taken for others to view and
comment on. Such sites allow viewers to "embed" or display others' video
on their own sites. YouTube is probably the most widely known video
sharing site.
Virtual world Online communities where users or their digital representations (called
"avatars") can socialize, connect, and interact with one another using text
and voice chat. The term is used more specifica]ly to refer to an online
community such as Second Life that features a computer-based simulated
three-dimensional environment where users can not only interact but also
create and use virtual objects.
Virus A form of malware that can copy itself and spread from one computer to
another in the form of executable code when its host is taken to a target
computer. For example, a user might send an infected file over a network,
or c~my it on a removable medium such as a CD or thumb drive, or the virus
might send an instant message to all the contacts on the infected machine
which, when opened by the addressee, infects the recipient's computer.
While some viruses are benign, often a virus will cause a computer to
"hang," rendering it inoperable by corrupting and/or disabling key operating
system files and tools.
2020-ICLl-00023 1266
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
Term Explanation
Web 2.0 Although there is no agreed-upon definition of the term Web 2.0, it term
generally refers to the move toward a more social, interactive, collaborative,
and responsible Web. It can be characterized by capabilities and tools
fac ilitating social media dialog.
Whaling Phishing attacks targeted at high-ranking personnel in an organizational
hierarchy, such as Chief Executive Officers (CEO) and other top executives.
Widget A self-contained tool that can be embedded in a website or program to
deliver a single-purpose service, such as displaying the latest news and
weather, maps, or photos, or allowing a user to play interactive games with
other website visitors. Users of social networking sites often take advantage
of widgets as an easy way to make their sites more interesting to visitors;
care must be taken, however, since hackers often use widgets as malware
entry points.
Wiki A technology for creating collaborative websites. From the Hawaiian word
meaning "quick," a wiki is a collection of Web pages that encourages users
to contribute or modify the content. By using a simple Web interface, a
community can collaborate to develop a document or Web page, no matter
where the members of the community are located. By far the best-known
wiki is Wikipedia, a multilingual, web-based, free content encyclopedia
project.
Worm Self-replicating malware that uses a computer network to send copies of
itself from one computer system to another. Worms can cause excessive
network traffic and other malicious disruptions such as file deletion and
sending junk mail to every e-mail address it discovers on every computer
system as it spreads throughout a network.
2020-ICLl-00023 1267
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
REFERENCES
Federal Regulations
"Standards of Ethical Conduct for Employees of the Executive Branch," 5 CFR 2635
DHS Directives)
Directive 110-0 I, "Privacy Policy for the Operational Use of Social Media," June 8, 2012
MD No. 11042.1, "Safeguarding Sensitive But Unclassified (For Official Use Only) Information," January 6,
2005
Directive 139-05, "O ffice of Accessible Systems and T echnology," January 29, 2016
MD 262-04, "DHS Web (Internet, and Extranet Information)" (Revision 00), April 13, 2015
MD 4600. 1, "Personal Use of Government Office Equipment," April 14, 2003
MD 4900, "Individual Use and Operation of DHS Information Systems/Computers," undated DHS Privacy
Office Publicatio ns
MD 110-01, "Privacy Policy for the Operational Use of Social Media," June 8, 2012
Instruction 110-01-001, "Privacy Policy for Operational Use of Social Media," June 8, 2012
" OHS Privacy Impact Assessment for Use of Social Networking Interactions and Applications," OHS Privacy
Office, April 2010
"Government 2.0: Privacy and Best Practices: Report on the OHS Privacy O ffice Public Workshop, OHS
Privacy Office, November 2009
Congressional Proceedings
Joint Hearing, "Collection and Use of Location Information for Commercial Purposes," U.S. House of
Representatives, Energy and Commerce Committee, Subcommittee on Communications, Techno logy and the
Internet, and Subcommittee on Commerce, Trade, and Consumer Protection, February 24, 2010
"CIO Council Guidelines for Secure Use of Social Media by Federal Departments and Agencies," Federal CIO
Council, Versio n 1.0, September 2009
"Communications Act of 1934", Federal Communications Commission,
https://transition. fee. gov/Reports/ 1934new.pdf
"GSA Social Media Policy and Handbook," CIO 2 106. l , General Services Administration, July 17, 2009
"Hatch Act Social Media and Email Guidance," Office of Special Counsel, https://osc.gov/Pages/Hatch-Act-
Social-Media-and-Email-Guidance.aspx
"New Media and the Air Force," U.S. Air Force Public Affairs Agency, E merging T echnology Division, April
6, 2009
"Social Media and the Federal Government: Perceived and Real Barriers and Potential Solutions," Federal Web
Managers Council," December 23, 2008
"Social Media Security Mitigations," Version 1.1 , U.S. Centers for Disease Control and Preventio n, December
3,2009
2020-ICLl-00023 1268
OHS 4300A SENSITIVE SYSTEMS HANDBOOK ATTACHMENT X- SOCIAL MEDIA
"The Application Usage and Risk Report: An Analysis of End User Application Trends in the Enterprise," Palo
Alto Networks, Fall 2009
"Location-based Social Media Has Legal Implications for Employers & Employees,"
www.thesocialworkplace.com, April 16, 2010
" Location-Sharing Technologies: Privacy Risks and Controls", Carnegie Mellon University, February 1010,
http://cups.cs.cmu.edu/LBSprivacy/files/TsaiKelleyCranorSadeh 2009.pdf
"Spear Phishers: Angling to Steal Your Financial Info", FBJ, April 2009,
https://archives. fbi. gov/archives/news/stories/2009/april/spearphishing 040 I 09
2020-ICLl-00023 1269
Department of Homeland Security
DHS Directives System
Instruction Number: 110-01-001
Revision Number: 00
Issue Date: 6/8/2012
PRIVACY POLICY FOR
OPERATIONAL USE OF SOCIAL
MEDIA
I. Purpose
This Instruction implements Department of Homeland Security (OHS) Directive 110-01 ,
Privacy Policy for Operational Use of Social Media.
II. Scope
This Instruction applies throughout OHS regarding the access to and collection, use,
maintenance, retention , disclosure, deletion, and destruction of Personally Identifiable
Information (PII) in relation to operational use of social media, with the exception of
operational use of social media for: (a) communications and outreach with the public
authorized by the Office of Public Affairs; (b) situational awareness by the National
Operations Center; (c) situational awareness by Components other than the National
Operations Center, upon approval by the Chief Privacy Officer following completion of a
Social Media Operational Use Template; and (d) the conduct of authorized intelligence
activities carried out by the Office of Intelligence and Analysis, the intelligence and
counterintelligence elements of the United States Coast Guard, or any other
Component performing authorized foreign intelligence or counterintelligence functions,
in accordance with the provisions of Executive Order 12333, as amended. This
Instruction does not apply to the Office of the Inspector General ; however, the OIG will
comply with the spirit of the Instruction.
Ill. References
A. Public Law 107-347, "E-Government Act of 2002," as amended, Section
208 [44 U.S.C. § 3501 note]
D. Title 44, U.S.C., Chapter 35, Subchapter Ill, "Information Security" [The
Federal Information Security Management Act of 2002, as amended (FISMA)]
-1-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 1270
E. Title 6, C.F.R., Chapter 1, Part 5, "Disclosure of records and information"
-2-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 1271
IV. Definitions
A. Counsel means the Office of the General Counsel attorney, from either the
Immediate Office of the General Counsel or component counsel, assigned to
provide legal advice to the component covered by this Instruction.
-3-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 1272
Exemption from certain aspects of the Privacy Act (NPRM), and Final Rules for
Exemption from certain aspects of the Privacy Act.
G. Privacy Compliance Review (PCRJ means both the OHS Privacy Office
process to be followed and the document designed to provide a constructive
mechanism to improve a OHS program's ability to comply with assurances made
in existing Privacy Compliance Documentation including Privacy Impact
Assessments (PIAs), System of Records Notices (SORNs) and/or formal
agreements such as Memoranda of Understanding or Memoranda of Agreement.
H. Privacy Impact Assessment (PIA) means both the OHS Privacy Office
process to be followed and the document required whenever an information
technology (IT) system , technology, rulemaking, program, pilot project, or other
activity involves the planned use of PII or otherwise impacts the privacy of
individuals as determined by the Chief Privacy Officer. A PIA describes what
information OHS is collecting, why the information is being collected, how the
information will be used, stored, and shared, how the information may be
accessed, how the information will be protected from unauthorized use or
disclosure, and how long it will be retained. A PIA also provides an analysis of
the privacy considerations posed and the steps OHS has taken to mitigate any
impact on privacy. As a general rule, PIAs are public documents. The Chief
Privacy Officer may, in coordination with the affected component and the Office
of the General Counsel, modify or waive publication for security reasons, or to
protect classified, sensitive, or private information included in a PIA.
I. Program Manager means the OHS employee who is responsible for the
planning and operation of a OHS program.
2020-ICLl-00023 1273
involve collecting PII from social media for the proposed category of use(s) and
to assess whether there is a need for additional Privacy Compliance
Documentation. Templates are initially reviewed and adjudicated by the Chief
Privacy Officer, and every three years thereafter for accuracy.
M. System Manager means the OHS employee identified in a System of
Records Notice who is responsible for the operation and management of the
system of records to which the System of Records Notice pertains.
V. Responsibilities
A. All DHS employees are responsible for complying with Directive 110-01 ,
with privacy policies and procedures issued by the Chief Privacy Officer, and with
applicable Component policies on operational use of social media and for
protecting PII from unauthorized use or disclosure.
-5-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 1274
Components implement DHS privacy policy with respect to the operational
use of social media;
2020-ICLl-00023 1275
use of PII, if any, is limited to those uses described in the Privacy
Compliance Documentation;
C. Access: OHS employees who are granted access to use social media by
their Component heads renew their access authority annually, consistent with
-7-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 1276
annual training requirements. Access is contingent upon an employee's
successfully completing privacy training for operational use of social media.
Rules of Behavior include requirements for operational use of social media and
the consequences of failure to adhere to those requirements. Where a federal
policy establishes guidelines that apply to a Component's operational use of
social media, the Component's Rules of Behavior incorporate that policy and that
fact is noted in the Template. Unless otherwise noted in the Template
adjudication process, the Rules of Behavior provide, at a minimum, that OHS
employees:
1. Use social media for operational purposes only when activities are
authorized by statute, executive order, regulation, or policy;
7. Protect PII as required by the Privacy Act and OHS privacy policy;
and
-8-
Instruction# 110-01 -001
Revision # 00
2020-ICLl-00023 1277
8. Document operational use of social media, including date, site(s)
accessed, information collected, and how it was used in the same
manner that the Department would document information collected
from any source in the normal course of business. For instance,
where information obtained through authorized operational use of
social media is used in whole or in part to make decisions regarding
an individual's rights, benefits or privileges, employees document
that fact in relevant records.
-9-
Instruction# 110-01-001
Revision # 00
2020-ICLl-00023 1278
2. Components complete implementation of this Instruction, including
obtaining approval from the Chief Privacy Officer of Templates for
categories of operational use of social media in existence prior to
this Instruction, within 120 days, except that Components complete
training of all pertinent employees within 165 days.
VII. Questions
Address any questions or concerns regarding these Instructions to the OHS Privacy
Office or to the relevant Component Privacy Officer or PPOC.
(b)(6); (b)(7)(C)
J &Nl-~, 2.--6!2_
Date
Chief Privacy Officer
- 10 -
Instruction# 110-01-001
Revision # 00
2020-ICLl-00023 1279
Homeland The Privacy Office
U.S. Depan ment of Homeland Security
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unidirectional Social Media Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component p erforming authorized foreign intelligence or
counterintelligence functions, in accordance with the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by all programs engaging in
operational u ses of social media; to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PII and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is d isagreement over the DHS Privacy Office determination of privacy
compliance for the operational use of social media.
1
Gathering information by the Office of Operations Coordination and Planning (OPS) to enhance situational awa reness is exempt
from this requirement and is covered by the existing PIA: DHS/OPS/PIA-004(d) - Publicly Available Social Media Monitoring and
Situational Awareness Initiative Update.
2020-ICLl-00023 1280
Homeland The Privacy Office
U.S. Depan ment of Homeland Security
SUMMARY INFORMATION
2
Counsel listed here must certify that appropriate authority exists to engage in particular operational activities involving social
media.
2020-ICLl-00023 1281
Homeland The Privacy O ffice
U.S. Depan ment of Homeland Security
OHS/ ICE-003 - Gen eral Counsel Electronic Management Sys tem (GEMS)
OHS/ ICE-011 - Immig ration Enforcement Operational Record s Sys tem (ENFORCE)
2020-ICLl-00023 1282
Homeland The Privacy Office
U.S. Depan ment of Homeland Security
SPECIFIC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the DHS Instruction 110-01-001 Privacy Policy for the
Operational Use of Social Media (Privacy Policy) is drafted broadly so as to likely include
general use of the Internet and as social media technology is ever changing and evolving, this
submission addresses ICE's use of the Internet, to include social media as defined in the
Privacy Policy.
ICE uses the Internet, including social media as defined in the Privacy Policy, for criminal
law enforcement purposes. (This submission does not address the conduct of undercover
operations in the context of criminal law enforcement investigations. Those activities are
covered by a separately submitted document that covers undercover investigations only.)
This criminal law enforcement use of the Internet, including social media, falls into the
following three categories: (1) using the Internet, including social media, to assist in locating,
arresting, and adjudicatin g fugitives and assisting other law en forcemen t agencies with
investigations and adjudications related to the fugitive, (2) using the Internet, including social
media, to assist in investigating, gathering evidence, and gathering criminal intelligence on
criminal and potential criminal activity, and (3) pre-operational, operational, and situational
awareness uses related to officer safety or threats to the public at-large.
Category One: Locating, Arresting, and Adjudicating Fugitives
With regard to the use of the Internet, including social media, to locate and arrest fugitives
and criminals, ICE officers, agents, attorneys, and support personnel routinely use a variety
of government and commercial databases to identify, locate, and arrest fugitives. These
individuals could include members of the public or employees or contractors of ICE and CBP
su spected of committing crimes or other forms of misconduct. However, additional
information not available in these databases is available on the Internet, including social
media. The use of the Internet, including social media, will allow ICE to gather information
that assists in identifying, locating, and arresting fugitives wanted for crimes and assisting
other law enforcement agencies with identifying, locating, and arresting fugitives.
Category Two: Criminal Investigations and Law Enforcement Intelligence
ICE also uses the Internet, including social media, to assist in investigating, gathering
evidence, and gathering law enforcement intelligence on criminal and potential criminal
2020-ICLl-00023 1283
Homeland The Privacy Office
U.S. Depan ment of Homeland Security
activity. This use of the Internet, including social media, involves activities to gather
information such as Internet searches, reviewing social media sites, monitoring chat rooms,
and reviewing comments posted on websites. This information is gathered and used by ICE
officers, agents, attorneys, and support personnel in the same manner as information
gathered from non-Internet and non-social media sources such as information gath ered in
person, on the phone, or through research of hard copy documents. Information gathered in
this fashion may be used in criminal investigations of members of the public or employees or
contractors of ICE and CBP.
Category Three: Officer and Public Safety
ICE also uses the Internet, including social media, for pre-operational/operational/situational
awareness uses relating to officer safety or threats to the public at-large. Prior to conducting
tactical enforcement operations or otherwise initiating contact with a subject, ICE agents,
officers, and support personnel may collect information about the subject of the tactical
enforcement operation. This information gathering includes information available on the
Internet, including social media, such as firearms/weapons possession and
relatives/associates who may reside with them. This information assists officers with tactical
planning activities such as: number of officers required for the operation, any specialized
equipment that may be necessary for the operation, and intelligence on when and where the
operation should be conducted for officer safety and tactical efficiency.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
• Homeland Security Act of 2002, as amended, Pub. L. No. 107-296, 116 Stat. 2135 (2002)
• OHS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcement
• 19 U.S.C. § 1589a, Enforcement authority of customs officers
• 8 U.S.C. § 1357, Powers of immigration officers and employees
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
[:8'.] Yes. 0No.
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
2020-ICLl-00023 1284
Homeland The Privacy Office
U.S. Depan ment of Homeland Security
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
s. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
OYes. !SJ No. If not, please explain:
The nature of criminal investigations may require investigators to use non-
government-issued equipment when engaging in criminal investigations.
Investigators at times find themselves in rapidly evolving situations in the field that
call for the use of adaptive measures. In situations where government-issued
equipment is either not available, or is technologically insufficient to perform the
required task at hand, investigators may need to rely on non-government-issued
equipment. However, ICE is currently working to provide government-issued
equipment so as to not require the u se of non-government-issued equipment in these
circumstances.
b) Email and accounts. Use online screen names or identities that indicate an official OHS
affiliation and use OHS email addresses to open accounts u sed when engaging in social
media in the performan ce of their duties;
Because the activities described in Question 1 are for criminal law enforcement purposes,
the employees who engage in these activities will not identify themselves as ICE or OHS
personnel, or law enforcement personnel. This is necessary to ensure the safety of law
enforcement personnel, to avoid compromising law enforcement operations, to prevent
tipping off individuals who are sought by law enforcement for violations of law, and to
prevent disclosing litigation strategy and tactics.
c) Public interaction. Access publicly available information through social media only by
reviewing posted information without interacting with any individual who posted the
information;
2020-ICLl-00023 1285
Homeland The Privacy Office
U.S. Depan ment of Homeland Security
Law enforcement personnel may not access restricted online sources or facilities absent
legal authority p ermitting entry into private space. Where legal authority exists, law
enforcement personnel may access restricted onJine information.
e) PII collection: Collect the minimum PII necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable SORNs cited above are aJl exempted by Final Rules from the Privacy Act
(e)(l) requirement (5 U.S.C. § 552a(e)(l)), w hich normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l) requirement is necessary to ensure the integrity of law enforcem ent investigations,
as more fully detailed in the Final Rules.
f) PII safeguards. Protect PIT as required by the Privacy Act (if applicable) and DHS privacy
policy;
ICE's rules of behavior state that law enforcem ent personnel should retain the
information they access on the Internet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
communications.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational u ses of social m edia, access requirements, and
requirem ents for documenting operational u ses of social media.
2020-ICLl-00023 1286
Homeland The Privacy Office
U.S. Depan ment of Homeland Security
2020-ICLl-00023 1287
Homeland The Privacy O ffice
U.S. Depan ment of Homeland Security
D New.
D Updated. <Please include the name and number of PIA to b e updated
here.>
2020-ICLl-00023 1288
Homeland The Privacy Office
U.S. Depan ment of Homeland Security
~ A SORN is required:
~ Covered by existing SORN.
DHS PRIV also requested additional guidance on how the requirements to retain records were covered. ICE PRIV
advised that Section 5 of the ICE principles covers the retention of records. DHS PRIV concurs.
2020-ICLl-00023 1289
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Pu blic Dialogu e and DHS/ALL/PIA-036 -
Use of Unidirectional Social Media Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance with the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by all programs engaging in
operational uses of social media; to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PU and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a n eed for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the OHS Privacy Office determination of privacy
compliance for the operational use of social media.
1 Gathering information by the Office of Operations Coordination and Planning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existi ng PIA: DHS/OPS/PIA-004/d) - Publicly Available Social Media Monitoring and
Situational Awareness Initiative Update.
2020-ICLl-00023 1290
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
SUMMARY INFORMATION
IT System(s) where social media data is stored: TECS Case Management, Fugitive Case
Management System, Enforcement Integrated Database, and Alien Criminal Response
Information Management System
2
Counsel listed here must certify that appropriate authority exists to engage in particular operational activities involving social
media.
2020-ICLl-00023 1291
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
DHS/USCIS-ICE-CBP-001- Alien File, Index, And National File Tracking System SORN
2020-ICLl-00023 1292
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
SPECIFIC QUESTION S
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of u se, please submit separate template for each category.
As the definition of social media in the OHS Instruction 110-01-001 PrivactJ Policy for the
Operational Use of Social Media (Privacy Policy) is drafted broadly so as to likely include general
use of the Internet and as social media technology is ever changing and evolving, this template
addresses ICE's use of the Internet, to include social media as defined in the Privacy Policy.
ICE uses the Internet, including social media as defined in the Pri vacy Policy, for criminaJ and
administrative immigration law enforcement purposes. (This template does not address the
conduct of undercover operations in the context of criminal immigration law enforcement
investigations. Those activities are covered by a separately submitted template that covers
undercover investigations only.) This immigration law enforcement use of the Internet including
social media, falls into the following four categories: (1) using the Internet, including social
media, to assist in locating, arresting, and adjudicating individuals who may be amenable to
removal under the Immigration and Nationality Act or are otherwise suspected of violations of
U.S. immigration law and assisting other law enforcement agencies with investigations and
adjudications related to individuals, (2) identify individuals who may be inadmissible to the
United States under the Immigration and Nationality Act, (3) pre-operational, operational, and
situational awaren ess u ses related to officer safety or threats to the public at-large, and (4) to
obtain information to assist in d etermining whether to exercise prosecutorial discretion.
Categor_y One: Basic Criminal and Administrative Enforcement of the Immigration and
Nationality Act
With regard to the u se of the Internet, including social media, to locate and arrest individuals,
ICE officers, agents, attorneys, and suppor t p ersonnel routinely u se a variety of government and
commercial databases to identify, locate, and arrest in dividuals who may be amenable to removal
and meet ICE's current enforcement p riorities. However, additional information not available in
these databases is available on the Internet, including social media. The use of the Internet,
including social media, will allow ICE to gather information that assists in identifying, locating,
and arresting individuals wanted for crimes and/or who may be amenable to removal, and
assisting other law enforcement agencies with investigations related to individuals where
necessary and appropriate. It will also allow ICE attorneys who represent the agency in civil
2020-ICLl-00023 1293
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
immigration proceedings before the Executive Office for Immigration Review to conduct general
and specific case research and preparation.
Category Two: Inadmis sibility Recommendations under the Immigration and N ationality Act
ICE also uses the Internet, including social media, to identify individuals who may be
inadmissible to the United States u nder the Immigration and Nationality Act. As a function of the
Visa Security Program, ICE makes recommendations to the Department of State on the issuance
and status of non-immigrant visas. ICE may collect information about non-immigrant visa
applicants and their associated points of contact listed on their visa application in order to make
these recommendations. This includes gathering information publicly available on the Internet,
including social media, before and after visa approval. ICE may also collect information about
non-immigrant visa holders. If derogatory information about a non-immigrant visa holder is
uncovered, information may be shared with the Department of State and/or forwarded to the
appropriate ICE Homeland Security Investigations field office for appropriate action depending
on whether the non-immjgrant visa h older has entered the United States.
ICE also uses the Internet, including social media, for pre-operational/operational/situational
awareness uses relating to officer safety or threats to the public at-large. Prior to conducting
tactical enforcement operations or o therwise initiating contact w ith a subject, ICE agents, officers,
or support personnel may collect information about the subject of the tactical enforcement
operation. This includes gathering information publicly available on the Internet, including social
media, such as firearms/weapons possession and relatives/associates who may reside with him.
This information assists agents and officers with tactical planning activities such as: number of
agents and officers reguired for the operation, any specialized equipment that may be necessary
for the operation, and intelligence on when and where the operation should be conducted for
agent and officer safety and tactical efficiency.
Finally, ICE also uses the Internet, including social media, to gather information related to the
possible exercise of prosecutorial discretion. Pursuant to Director Morton's June 17, 2011
memorandum relating to the exercising of prosecutorial discretion, ICE law enforcement
personnel are expected to consider a number of factors when deciding whether to exercise
prosecutorial discretion in various situations. Some of these factors include: whether the
su bject is a danger to the community or to national security, whether the subject is the
primary caregiver to a m inor, or a person with a physical or mental disability, a subject's
educational and military background, a subject's ties and con tributions to the community,
whether the subject (or the subject's spouse) is pregnant or nursing, whether the subject or
subject's spouse suffers from severe mental or physical illness. These factors can be difficult
to ascertain using routine government and commercial databases and the use of the Internet
2020-ICLl-00023 1294
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
including social media serves as another tool to attempt to identify these unique factors.
Similarly, some of these same factors may also apply when setting conditions of release from
ICE custody. The Internet, including social media, provides a source of information that can
be used to help determine when it is appropriate to release an individual from ICE custody.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
• Homeland Security Act of 2002, as amended, Pub. L. No. 107-296, 116 Stat. 2135 (2002)
• Immigration and Nationality Act of 1952, as amended, U.S. Code Title 8
• OHS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcement
• ICE Delegation No. 0001, Delegation of Authority to the Directors, Detention and Removal
and Investigations, and to Field Office Directors, Special Agents in Charge and Certain Other
Officers of the Bureau of Immigration and Customs Enforcement
• 8 C.F.R. § 2.1, Authority of the Secretary of Homeland Security
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
IXJ Yes. ONo.
3. Is this use of social media in development or operational?
D In d evelopment. IXJ Operational. Date first launched: Unknown
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social m edia;
OYes. IXJ No. If not, please explain:
Because the activities described in Question 1 are for immigration law enforcement
purposes, the employees who engage in these activities will not identify themselves
as ICE or OH S personnel, or law enforcement personnel. This is necessary to ensure
the safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevent tipping off individuals who are sought by law enforcement for
violations of law, and to prevent d isclosing litigation strategy and tactics.
2020-ICLl-00023 1295
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
b) Email and accounts. Use online screen names or identities that indicate an official OHS
affiliation and use OHS email addresses to open accounts used when engaging in social
med ia in the performance of their duties;
Because the activities described in Question 1 are for immigration law enforcement
purposes, the employees who engage in these activities will not identify themselves as
ICE or OHS personnel, or law enforcement personnel. This is necessary to ensure the
safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevent tipping off individuals who are sought by law enforcement for
violations of law, and to prevent d isclosing litigation strategy and tactics.
c) Public interaction. Access publicly avail.able information through social med ia only by
reviewing p osted information without interacting with any individual who posted the
information;
e) PII collection: Collect the minimum PII necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects o f the Privacy Act;
The applicable S0RNs cited above are all exempted by Final Rules from the Privacy Act
(e)(l ) requirement (5 U.S.C. § 552a(e)(l)), which normally limits agen cies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l ) requirement is necessary to ensure the integrity of law enforcement investigations,
as more fully detailed in the Final Ru les.
f) PII safeguards. Protect PTT as required by the Privacy Act (if applicable) and OHS privacy
policy;
2020-ICLl-00023 1296
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
ICE's rules of behavior stated that law enforcement personnel should retain the
information they access on the Internet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved in
a manner authorized by ICE procedures governing the preservation of electronic
communications.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational u ses of social media, access requirements, and
requirements for documenting operational u ses of social media.
Mechanisms are (or will be) in place to verify that users have completed training.
D Yes, employees self-certify that they have read and understood their Component
Rules of Behavior.
2020-ICLl-00023 1297
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
DESIGNATION
This program is covere d by the foll owing Privacy Impact Assessme nt and Privacy Act
System of Records N otice:
1. Category of Use:
D Law Enforcement Intelligence;
~ Criminal law enforcement investigations;
D Background investigations;
D Professional responsibility investigations;
D Administrative or benefit determinations (including fraud detection);
D Situational awareness; and
2020-ICLl-00023 1298
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
2. Has Component Counsel reviewed and determined that there is authority to engage in the
above Category of Use?
~ Yes. 0No.
D Users must use governmen t email addresses or official OHS accounts online.
c. Public interaction.
d . Privacy settings.
2020-ICLl-00023 1299
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
f. PI! safeguards.
cgj PII is protected as required by the Privacy Act and OHS privacy policy.
g. Documentation.
D Users mus t appropriately docu men t their use of social media, and collection
of information from social media website.
h. Training.
cgj All u sers must complete annual privacy training that has been approved by
Component Privacy Officer. Training indudes:
2020-ICLl-00023 1300
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
~ Mechanisms are (or will be) in place to verify that users have completed
training.
D Yes, employees self-certify that they have read and tmderstood their
Component Rules of Behavior.
~ Program has met requirements to use social media for the stated authorized
operational purposes, and must continue compliance with the requirements above.
D Program has not yet met requirements to utilize social media for operational
purposes.
D Program authorities do not authorize operational use of social media.
D Rules of Behavior do not comply. <Please explain analysis.>
D Training required .
Additional Privacy compliance documentation is required:
D A PIA is required.
D New.
0 Updated.
D A SORN is required:
D New.
0 Updated.
2020-ICLl-00023 1301
Homeland T he Privacy O ffice
U.S. Department of Homeland Security
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Public Dialogue and DHS/ALL/PIA-036 -
Use of Unid irectional Social Media Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance with the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by all programs engaging in
operational uses of social media; to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PII and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a need for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the OHS Privacy Office determination of privacy
compliance for the operational use of social media.
1 Gathering information by the Office of Operations Coordination and Planning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existing PIA: DHS/OPS/PIA-004/d) - Publicly Available Social Media Monitoring: and
Situational Awa reness Initiative Update.
2020-ICLl-00023 1302
Homeland The Privacy Office
U.S. Department of Homeland Security
SUMMARY INFORMATION
2Counsel listed here must certify that appropriate authority exists to engage in particular operational activities involving social
media.
2020-ICLl-00023 1303
Homeland T he Privacy O ffice
U.S. Department of Homeland Security
2020-ICLl-00023 1304
Homeland The Privacy O ffice
U.S. Department of Homeland Security
SPECIFIC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Instruction 110-01-001 Privacy Policy for the
Operational Use of Social Media (Privacy Policy) is drafted broadly so as to likely include
general use of the Internet and as social media technology is ever changing and evolving, thjs
template addresses ICE's use of the Internet, to include social media as defined in the Privacy
Policy.
With the enactment of the Homeland Security Act of 2002, Congress authorized ICE to
conduct certified undercover investigative operations to obtain evidence or information
concerning violations of laws enforced by ICE and stemming from the authorities of its
legacy agencies, the U.S. Customs Service (USCS) and the Immigration and Naturalization
Service (INS). Within ICE, investigations are only conducted by the Homeland Security
Investigations (HSI) component and the Office of Professional Responsibility (OPR). The
authority to certify undercover operations has been delegated to the Executive Associate
Director of HSI and the Assistant Director for OPR. HSI and OPR may also engage in limited
use of social media, when authorized, if an investigation does not otherwise warrant being
placed under a certified undercover operation. These activities are detailed in the templates
addressing Criminal Law Enforcement and Admjnistrative Law Enforcement.
Undercover activities and operations are undertaken for numerous potential objectives that
include: (1) determining if a violation of law has occurred or is in progress; (2) identifying
specific v iolations of law; (3) identifying criminal violators, conspirators, and their
methodologies; (4) disrupting and/or dismantling criminal organizations; (5) locating the
violation sites and equipment used; (6) locating assets for seizure and forfeiture; (7) obtainjng
eviden ce for prosecution; (8) determining the safest and most advantageous time to make
arrests, execute search warrants, and make seizures; (9) identifying witnesses and
cooperating individuals; (10) identifying associations between conspirators; (11) checking the
reliability of sources of information and cooperating defendants; and (12) gathering
intelligence that allows ICE management to evaluate threats, reallocate resources, and
organize enforcement activity. ICE may collect personally identifiable information from or
about individuals over the Internet, including via social media sites.
The nature of undercover operations often requires an ICE-HSI or OPR criminal investigator
to appear to be engaged in a criminal enterprise and to befriend or become business
2020-ICLl-00023 1305
Homeland The Privacy O ffice
U.S. Department of Homeland Security
associates with potential violators. This is crucial to the successful integration of undercover
operatives with those who commit illegal acts. As part of a certified undercover investigation
or operation, when authorized, undercover operatives may participate in activities that
would constitute a crime under federal, state, or .local law. This otherwise ill.egal activity
includes, for example, the purchase of stolen or contraband goods, the purchase of illegal
and/or fraudulent immigration documents, and the controlled delivery of drugs or other
contraband that will not enter the commerce of the United States. ICE-HSI and OPR review
and authorize, as appropriate, requests to engage in various otherwise illegal activities in
furtherance of undercover operations. In the course of carrying out these authorized
undercover activities, ICE-HSI or OPR criminal investigators may collect personally
identifiable information using the Internet. Any of these activities may take place in part
over the Internet, to include social media.
As the "rules" for undercover operations are different than non-undercover law enforcement
work, and may require agents to engage in activities that would otherwise be considered
prohibited or unauthorized, the rules of behavior for undercover criminal investigations are
different than for non-undercover investigations.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
USCS was vested with the authority to conduct certified undercover operations through the Anti-
Drug Abuse Act of 1986, which enacted 19 U.S.C. § 2081; INS received similar authority through
the Illegal Immigration Reform and Immigrant Responsibility Act of 1996, specifically 8 U.S.C. §
1363a. With the enactment of the Homeland Security Act of 2002, these statutory authorities
transferred to the newly created Department of Homeland Security (OHS) and were delegated to
the Assistant Secretary of ICE in OHS Delegation Number 7030.2, "Delegation of Authority to the
Assistant Secretary for U.S. Immigration and Customs Enforcement," and further redelegated to
the Directors of OI and OPR in ICE Delegation Order 04-002 entitled, "Authority to Certify the
Exemption of Undercover Operations From Certain Laws Within U.S. Immigration and Customs
Enforcement." ICE-HSI and OPR criminal investigators are granted their enforcement au thority
in 8 U.S.C. § 1357 and 19 U.S.C. § 1589a.
a) • Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
IZ] Yes. 0No.
2020-ICLl-00023 1306
Homeland The Privacy Office
U.S. Department of Homeland Security
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social media;
IZJ Yes. D No. If not, please explain:
b) Email and accounts. Use online screen names or identities that indicate an official DHS
affiliation and use DHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
c) Public interaction. Access publicly available information through social media only by
reviewing posted information without interacting w ith any individual who posted the
information;
The nahire of undercover criminal investigations may result in agents interacting with
individuals who use social media sites. This interaction only takes place during
authorized undercover investigations.
d) Privaci; settings. Respect individuals' privacy settings and access only information that is
publicly available;
Law enforcement personnel may not access restricted online sources or facilities absent
legal authority permitting entry into private space. Where legal authority exists, law
enforcement personnel may access restricted onJine information.
2020-ICLl-00023 1307
Homeland The Privacy Office
U.S. Department of Homeland Security
e) PII collection: Collect the minimum PIT necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects of the Privacy Act;
The applicable SORNs cited above are all exempted by Final Rules from the Privacy Act
(e)(l) requirement (5 U.S.C. § 552a(e)(l)), which normally limits agencies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l) requirement is necessary to ensure the integrity of law enforcement investigations,
as more fully detailed in the Final Rules.
f) PII safeguards. Protect PII as required by the Privacy Act (if applicable) and OHS privacy
policy;
ICE's rules of behavior state that law enforcement personnel should retain information
they access on their use of the Internet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved
in a manner authorized by ICE procedures governing the preservation of electronic
communications.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational uses of social media, access requirements, and
requirements for documenting operational uses of social media.
2020-ICLl-00023 1308
Homeland The Privacy Office
U.S. Department of Homeland Security
0 New.
0 Updated. <Please include the name and number of PIA to be updated
here.>
IZJ A SORN is required:
2020-ICLl-00023 1309
Homeland T he Privacy O ffice
U.S. Department of Homeland Security
D New.
D Updated. <Please include the name and number of SORN to be updated
here.>
ICE PRIY provided additional feedback on authorities to conduct UC Ops. Stating that ICE legal counsel advises
that UC authority is granted specifically by Congress to identified federal LE agencies - we are one of 6 federal LE
agencies that hold this authority. ICE's undercover authority is found in the authorities of its legacy agencies
(USCS and INS), the statutory language for which has not been updated to reflect ICE as the current agency.
However, through various transfer provisions in the Homeland Security Act and then a OHS delegation to ICE, the
authority now rests with ICE. It is a bit convoluted, but here is how it breaks down:
• 19 U.S.C. 2081 "Undercover investigative operations of Customs Service." This is the authority held by
the legacy USCS, and is now held by ICE HSI. For transfer of functions, personnel, assets, and liabilities
of the United States Customs Service of the Department of the Treasury, including functions of the
Secretary of the Treasury relating thereto, to the Secretary of Homeland Security, see sections 203( l ),
55l(d), 552(d), and 557 of Title 6, Domestic Security, and the Department of Homeland Security
Reorganization Plan of November 25, 2002, as modified, set out as a no te under section 542 of Title 6.
• 8 U.S.C. 1363a "Undercover investigation authority." This is the authority held by the legacy INS
investigative arm, and is now held by ICE HSI. For discussion of transfer of function, see 8 U.S.C. 1551
note: " ABOLITION OF IMMIGRATION AND NATURALIZATION SERVICE AND TRANSFER OF
FUNCTIONS The Immigration and Naturalization Service was abolished by section 291 (a) of Title 6,
Domestic Security, upon completion of all transfers from the Immigration and Naturalization Service as
2020-ICLl-00023 1310
Homeland T he Privacy O ffice
U.S. Department of Homeland Security
provided for by chapter J of Title 6. Functions of the Commissioner of Immigration and Naturalization
performed under the Border Patrol program, the detention and removal program, the intelligence program,
the investigations program, and the inspections program, and all personnel, assets, and liabilities pertaining
to such programs, were transferred to the Under Secretary for Border and Transportation Security of the
Department of Homeland Secmity by section 251 of Title 6 and the Department of Homeland Security
Reorganization Plan of November 25, 2002, as modified, set out as a note under section 542 of Title 6."
• OHS Delegation No 7030.2 "Delegation of Authority to the Assistant Secretary for U.S. Immigration and
Customs Enforcement." (link here:
http://dhsconnect.dhs.gov/policies/Documents/7030.2%20Delegation%20of%20Authority%20to%20the%2
0Assistant%20Secretary%20for%20the%20Bureau%20of%20Immigration%20and%20Customs%20Enfor
cement.pdf) Section 2(A) delegates the 19 U.S.C. 2081 authority to ICE. Section 2(DD) delegates the 8
U.S.C. 1363a authority to ICE.
OHS PRIV also requested additional guidance on how the requirements to retain records were covered.
ICE PRIV advised that Section 5 of the ICE principles covers the retention of records. OHS PRIV concurs.
2020-ICLl-00023 1311
From: l(b)(6); (b)(?)(C)
Se nt: 28 Oct 2019 19:48:22 +0000
To: Kb)(6); (b)(7)(C) I
Subject: ROB for WCH use
Attachme nts: NSU Open Source Rules of Behavior Final.docx, SMOUT, ICE - Criminal and
Admin Immigration LE, 20170103, PRIV Final.pdf
Hi~~~~6\ _, I
Here's a ROB I advised on that you can use as a template.Kb)(5)
b)(5)
b)(5) let me know and we can talk about updating the SMOUT or drafting
one specific to WCH.
!(b)(6): (b)(7)(C)
Privacy Analyst, J.D., CIPP/US/G
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732ill@l]
Mobile: 202-870Kb)(6);
Main: 202-732!<b)(6): I
2020-ICLl-00023 1312
Homeland Security lnves1igations
U.S. Immigration National Security Investigations Division
All National Security Unit (NSU) Open Source (OS) Team users will abide by the follow ing Rules of
Behavior when conducting open source research:
1. All open source searches will be conducted in an unattributable browser, under the user's
unattributable browser account as assigned by a NSU supervisor. Only in times of exigent
circumstances when the unattributed browser account is not available, the NSU Supervisor may
instruct the OS Team to use their attributed government equipment and browser to conduct urgent
narrowly defined searches.
2. Users may only access the NSU proxy server service using government furnished equipment, and
under the supervision of a designated supervisor. At no time w ill a user:
a. Create an email address or use an email address for personal or investigative purposes.
b. Log into any account, including but not limited to, personal or professional accounts.
c. Access login protected portions/pages of any website that require an email address, username,
or other sign-on information.
d. Interact with any member of the public online. This can include, but is not limited to
messaging, chatting, friending, liking, following, or subscribing to an individual.
3. Users will only conduct open source research on the subject of a submitted request and his or her
associates and linked businesses.
4. In addition to the restrictions regarding engagement with individuals online, users are also prohibited
from posting, creating, or sharing any content online. This includes, but is not limited to images, text,
locational identifiers, or links to other web content.
5. Users will not conduct any personal business or local address searches (ex: lunch near the office) that
would identify the actual location of the user while using the unattributable browser.
6. Users will not cross contaminate the unattributable browser with information that would be able to
identify the OHS Network (A-LAN).
a. Users will not download or upload anything onto the DHS network. Only supervisors have
the capability to download/upload files.
b. Users will not share information between the unattributable browser and the OHS Network
via email, USB connection, or other methods.
c. Users m ust understand accessing a website from an attributed browser within a certain time
period of an unattributed browser may reveal a relationship between the two.
This agreement will be utilized at all times when conducting open source research as an employee of the
NSU. Policies set forth in this agreement were established to ensure employee compliance with federal
and other business mandates, as well as abide by the code of ethics and conduct for OHS/ICE employees.
It is essential that all NSU open source users operate according to policies and guidelines referenced in
this agreement.
www.ice.gov
2020-ICLl-00023 1313
SUBJECT: NSU OS Rules of Behavior
Page 2
By signing below, I acknowledge that I have read, understand, and will comply with the National Security
Unit Rules of Behavior for Open Source Analysis. Additionally, I verify that I have taken the annual ICE
Social Media Privacy Training and ICE Computer Security Training. I understand that failure to comply
with the Rules of Behavior could result in verbal or written warning, removal of system access,
reassignment to other duties, criminal or civil prosecution, or termination.
2020-ICLl-00023 1314
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
a) Communications and outreach with the public authorized by the Office of Public Affairs
(covered by the existing PIAs: DHS/ALL/PIA-031 - Use of Social Networking Interactions
and Applications Communications/Outreach/Pu blic Dialogu e and DHS/ALL/PIA-036 -
Use of Unidirectional Social Media Applications);
b) The conduct of authorized intelligence activities carried out by the Office of Intelligence
and Analysis, the intelligence and counterintelligence elements of the United States
Coast Guard, or any other Component performing authorized foreign intelligence or
counterintelligence functions, in accordance with the provisions of Executive Order
12333, as amended.
This template shall be used to document the process to be followed by all programs engaging in
operational uses of social media; to identify information technology systems, technologies, rulemakings,
programs, or pilot projects that involve PU and other activities that otherwise impact the privacy of
individuals as determined by the Chief Privacy Officer; and to assess whether there is a n eed for
additional Privacy Compliance Documentation. Components may appeal to the Deputy Secretary for
Homeland Security if there is disagreement over the OHS Privacy Office determination of privacy
compliance for the operational use of social media.
1 Gathering information by the Office of Operations Coordination and Planning (OPS) to enhance situational awareness is exempt
from this requirement and is covered by the existi ng PIA: DHS/OPS/PIA-004/d) - Publicly Available Social Media Monitoring and
Situational Awareness Initiative Update.
2020-ICLl-00023 1315
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
SUMMARY INFORMATION
IT System(s) where social media data is stored: TECS Case Management, Fugitive Case
Management System, Enforcement Integrated Database, and Alien Criminal Response
Information Management System
2
Counsel listed here must certify that appropriate authority exists to engage in particular operational activities involving social
media.
2020-ICLl-00023 1316
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
DHS/USCIS-ICE-CBP-001- Alien File, Index, And National File Tracking System SORN
2020-ICLl-00023 1317
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
SPECIFIC QUESTIONS
1. Describe the category of use for collecting personally identifiable information from social
media sources. Examples include: law enforcement intelligence, criminal investigations,
background investigations, administrative investigations, professional responsibility
investigations, benefit or employment determinations, or situational awareness. If use does
not fit into one of these categories, please describe in full below. If your component has
multiple categories of use, please submit separate template for each category.
As the definition of social media in the OHS Instruction 110-01-001 PrivactJ Policy for the
Operational Use of Social Media (Privacy Policy) is drafted broadly so as to likely include general
use of the Internet and as social media technology is ever changing and evolving, this template
addresses ICE's use of the Internet, to inclu de social media as defined in the Privacy Policy.
ICE u ses the In ternet, in cluding social media as defined in the Pri vacy Policy, for criminaJ and
administrative immigration law enforcement purposes. (This template does not address the
conduct of undercover operations in the context of criminal immigration law enforcement
investigations. Those activities are covered by a separately submitted template that covers
undercover investigations only.) This immigration law enforcement use of the Internet including
social media, falls into the following four categories: (1) using the Internet, including social
media, to assist in locating, arresting, and adjudicating individuals who may be amenable to
removal under the Immigration and Nationality Act or are otherwise suspected of violations of
U.S. immigration law and assisting other law enforcement agencies with investigations and
adjudications related to individuals, (2) identify individuals who may be inadmissible to the
United States u nder the Immigration and Nationality Act, (3) pre-operational, operational, and
situational awareness uses related to officer safety or threats to the public at-large, and (4) to
obtain information to assist in determinin g whether to exercise prosecutorial discretion.
Categor_y One: Basic Criminal and Administrative Enforcement of the Immigration and
Nationality Act
With regard to the u se of the Internet, including social media, to locate an d arrest individu als,
ICE officers, agents, attorneys, and support personnel routinely use a variety of government and
comm ercial databases to identify, locate, and arrest in dividuals who may be amenable to removal
and meet ICE's current enforcement p riorities. However, additional information not available in
these databases is available on the Internet, including social media. The use of the Internet,
including social media, will allow ICE to gather information that assists in identifying, locating,
and arresting individuals wanted for crimes and/or who may be amenable to removal, and
assistin g other law enforcemen t agencies with investigations related to individuals where
necessary and appropriate. It will also allow ICE attorneys who represent the agency in civil
2020-ICLl-00023 1318
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
immigration proceedings before the Executive Office for Immigration Review to conduct general
and specific case research and preparation.
Category Two: Inadmis sibility Recommendations under the Immigration and N ationality Act
ICE also uses the Internet, including social media, to identify individuals who may be
inadmissible to the United States u nder the Immigration and Nationality Act. As a function of the
Visa Security Program, ICE makes recommendations to the Department of State on the issuance
and status of non-immigrant visas. ICE may collect information about non-immigrant visa
applicants and their associated points of contact listed on their visa application in order to make
these recommendations. This includes gathering information publicly available on the Internet,
including social media, before and after visa approval. ICE may also collect information about
non-immigrant visa holders. If derogatory information about a non-immigrant visa holder is
uncovered, information may be shared with the Department of State and/or forwarded to the
appropriate ICE Homeland Security Investigations field office for appropriate action depending
on whether the non-immjgrant visa h older has entered the United States.
ICE also uses the Internet, including social media, for pre-operational/operational/situational
awareness uses relating to officer safety or threats to the public at-large. Prior to conducting
tactical enforcement operations or o therwise initiating contact w ith a subject, ICE agents, officers,
or support personnel may collect information about the subject of the tactical enforcement
operation. This includes gathering information publicly available on the Internet, including social
media, such as firearms/weapons possession and relatives/associates who may reside with him.
This information assists agents and officers with tactical planning activities such as: number of
agents and officers reguired for the operation, any specialized equipment that may be necessary
for the operation, and intelligence on when and where the operation should be conducted for
agent and officer safety and tactical efficiency.
Finally, ICE also uses the Internet, including social media, to gather information related to the
possible exercise of prosecutorial discretion. Pursuant to Director Morton's June 17, 2011
memorandum relating to the exercising of prosecutorial discretion, ICE law enforcement
personnel are expected to consider a number of factors when deciding whether to exercise
prosecutorial discretion in various situations. Some of these factors include: whether the
su bject is a danger to the community or to national security, whether the subject is the
primary caregiver to a m inor, or a person with a physical or mental disability, a subject's
educational and military background, a subject's ties and con tributions to the community,
whether the subject (or the subject's spouse) is pregnant or nursing, whether the subject or
subject's spouse suffers from severe mental or physical illness. These factors can be difficult
to ascertain using routine government and commercial databases and the use of the Internet
2020-ICLl-00023 1319
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
including social media serves as another tool to attempt to identify these unique factors.
Similarly, some of these same factors may also apply when setting conditions of release from
ICE custody. The Internet, including social media, provides a source of information that can
be used to help determine when it is appropriate to release an individual from ICE custody.
2. Based on the operational use of social media listed above, please provide the appropriate
authorities.
• Homeland Security Act of 2002, as amended, Pub. L. No. 107-296, 116 Stat. 2135 (2002)
• Immigration and Nationality Act of 1952, as amended, U.S. Code Title 8
• OHS Delegation No. 7030.2, Delegation of Authority to the Assistant Secretary of U.S
Immigration and Customs Enforcement
• ICE Delegation No. 0001, Delegation of Authority to the Directors, Detention and Removal
and Investigations, and to Field Office Directors, Special Agents in Charge and Certain Other
Officers of the Bureau of Immigration and Customs Enforcement
• 8 C.F.R. § 2.1, Authority of the Secretary of Homeland Security
a) Has Counsel listed above reviewed these authorities for privacy issues and
determined that they permit the Program to use social media for the listed operational
use?
IXJ Yes. ONo.
3. Is this use of social media in development or operational?
D In d evelopment. IXJ Operational. Date first launched: Unknown
4. Please attach a copy of the Rules of Behavior that outline the requirements below.
See Memorandum from John Morton, Use of Public and Non-Public Online Information, June 28,
2012.
5. Please describe the Rules of Behavior in effect for the listed operational use of social media. If
users do NOT follow a particular Rule, please detail reasoning for not following that Rule:
a) Equipment. Use only government-issued equipment when engaging in the operational
use of social m edia;
OYes. IXJ No. If not, please explain:
Because the activities described in Question 1 are for immigration law enforcement
purposes, the employees who engage in these activities will not identify themselves
as ICE or OH S personnel, or law enforcement personnel. This is necessary to ensure
the safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevent tipping off individuals who are sought by law enforcement for
violations of law, and to prevent d isclosing litigation strategy and tactics.
2020-ICLl-00023 1320
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
b) Email and accounts. Use online screen names or identities that indicate an official OHS
affiliation and use OHS email addresses to open accounts used when engaging in social
media in the performance of their duties;
Because the activities described in Question 1 are for immigration law enforcement
purposes, the employees who engage in these activities will not identify themselves as
ICE or OHS personnel, or law enforcement personnel. This is necessary to ensure the
safety of law enforcement personnel, to avoid compromising law enforcement
operations, to prevent tipping off individuals who are sought by law enforcement for
violations of law, and to prevent disclosing litigation strategy and tactics.
c) Public interaction. Access publicly avail.able information through social media only by
reviewing p osted information without interacting with any individual who posted the
information;
e) PII collection: Collect the minimum PII necessary for the proper performance of their
authorized duties except for systems subject to Final Rules for Exemption from certain
aspects o f the Privacy Act;
The applicable S0RNs cited above are all exempted by Final Rules from the Privacy Act
(e)(l ) requirement (5 U.S.C. § 552a(e)(l)), which normally limits agen cies to collecting
only information about individuals that is relevant and necessary to accomplish a
purpose of the agency required by statute or Executive Order. The exemption from the
(e)(l ) requirement is necessary to ensure the integrity of law enforcement investigations,
as more fully detailed in the Final Rules.
f) PII safeguards. Protect PTT as required by the Privacy Act (if applicable) and OHS privacy
policy;
2020-ICLl-00023 1321
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
ICE's rules of behavior stated that law enforcement personnel should retain the
information they access on the Internet, including social media, if they would have
retained that content had it been written on paper. These contents should be preserved in
a manner authorized by ICE procedures governing the preservation of electronic
communications.
h) Training. Users complete annual privacy training which has been approved by
Component Privacy Officer (or Privacy Point of Contact) based upon training materials
provided by the OHS Privacy Office. Training must include, at minimum: legal
authorities, acceptable operational u ses of social media, access requirements, and
requirements for documenting operational u ses of social media.
Mechanisms are (or will be) in place to verify that users have completed training.
D Yes, employees self-certify that they have read and understood their Component
Rules of Behavior.
2020-ICLl-00023 1322
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
DESIGNATION
This program is covere d by the foll owing Privacy Impact Assessme nt and Privacy Act
System of Records N otice:
1. Category of Use:
D Law Enforcement Intelligence;
~ Criminal law enforcement investigations;
D Background investigations;
D Professional responsibility investigations;
D Administrative or benefit determinations (including fraud detection);
D Situational awareness; and
2020-ICLl-00023 1323
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
2. Has Component Counsel reviewed and determined that there is authority to engage in the
above Category of Use?
~ Yes. 0No.
D Users must use governmen t email addresses or official OHS accounts online.
c. Public interaction.
d . Privacy settings.
2020-ICLl-00023 1324
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
f. PI! safeguards.
cgj PII is protected as required by the Privacy Act and OHS privacy policy.
g. Documentation.
D Users must appropriately docu men t their use of social media, and collection
of information from social media website.
h. Training.
cgj All u sers must complete annual privacy training that has been approved by
Component Privacy Officer. Training indudes:
2020-ICLl-00023 1325
Homeland The Privacy Office
U.S. Depa11111en1 of Homeland Security
~ Mechanisms are (or will be) in place to verify that users have completed
training.
D Yes, employees self-certify that they have read and tmderstood their
Component Rules of Behavior.
~ Program has met requirements to use social media for the stated authorized
operational purposes, and must continue compliance with the requirements above.
D Program has not yet met requirements to utilize social media for operational
purposes.
D Program authorities do not authorize operational use of social media.
D Rules of Behavior do not comply. <Please explain analysis.>
D Training required.
Additional Privacy compliance documentation is required:
D A PIA is required.
D New.
0 Updated.
D A SORN is required:
D New.
0 Updated.
2020-ICLl-00023 1326
From:
r b)(6); (b)(7)(C)
To:
Cc:
Subject: RE: SEVPAMS Cloud Migration Real Data Testing
Date: Tuesday, August 20, 2019 7:35:17 PM
Attachments: imaae001.jpa
imaaeoo2 ioa
Thanks,Kb)(6); I
l(b)(6); (b)(7)(C) l J.D./Joint M.S. Cybersecurity
M anagement and Program Ana lyst
Portfolio: Stu dent and Exchange Visitor Program (SEVP) I DHS/ICE/HSI/NSID
Office of Information Governa nce and Privacy
U.S. Immigration and Customs Enforcement
Mobile: 401-826kb)(6): I
b)(6); (b)(7)(C)
(b)(6);
(b)(?VC)
Per ou r conversat ion, for your records, and so you can forward th is on, please read it ems 19 thru 22.
b)(5)
fb)(6); (b)(7)(C)
ITPM SEVPAMS & SitS
FAC-P/ PM (Mid-Level), COR Levi Ill
Systems Management Unit
l J- l•
Hi b)(6);
1,..\ /"7\ /r"'
Is SEVP cont inuing to use t he SEVP Cloud M igrat ion real data? If not , please forwa rd a completed
cert ificate of destruction because it appea rs th e authorization was until sometime in 2017
(attached).
I am not sure if t he dat a set was d estroyed and that there is a certificate of destruction as I was not
involved in t he process. I am add ingl(b)( land b)(6); eca use t hey w ere involved and likely know what
/ L ' 1 -,\ I
2020-ICLl-00023 1328
happened to t he test data set.
rb )(6); (b)(7)(C)
SEVPAMS Product Owner/Program Manager
Student and Exchange Visitor Program (SEVP)
National Security Investigations Division
202-497K~~~~\
1
From:!<b)(6): (b)(7)(C)
Sent: Thursday, August 15, 2019 12:31 PM
To: Kb)(6); (b)(?)(C)
Subject: FW: SEVPAMS Cloud M igration Real Data Testing
Hi Kb)(6);1
Thanks, !~~~(~\ I
fb)(6); (b)(?)(C) ~ J.D./Joint M.S. Cybersecurity
M anagement and Program Ana lyst
Portfolio : Student and Exchange Visitor Program (SEVP) I DHS/ICE/HSI/NSID
Office of Information Governa nce and Privacy
U.S. Immigration and Customs Enforcement
Mobile: 401-826Kb)(6); I
(b)(6);
(b)(?)(C)
From:kb)(6); (b)(7)(C)
Sent: Frid ay, August 2, 2019 2:00 PM
To: Kb)(6); (b)(7)(C)
Subject: SEVPAMS Cloud M igration Real Data Testing
Hi i<b)(6):
Could you please find out if SEVP is cont inuing to use the SEVP Cloud M igration real data, or if not
we would like a completed cert ificate of destruction because it appea rs the authorization was until
sometime in 2017 (attached).
Thanks,
2020-ICLl-00023 1329
U.S. Immigration & Customs Enforcement
Direct: (202) 732-b)(6)
Main: (202) 732 (b)(6);
2020-ICLl-00023 1330
From: kb)(6); (b)(7)(C)
Se nt: 22 Aug 2019 15:23:39 +0000
To: l(b)(6); (b)(7)(C) I
Subject: Social Media Training
Attachme nts: Social Media Training - Final_Updated Links- 08 16 19).ppt
Find enclosed!
Here's the PALMS link for the individuals you need to on board between training sessions.
l(b)(7)(E)
l(b)(6); (b)(7)(C)
Privacy Analyst, J.D., CIPP/US/G
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
Desk: 202-732kb)(6): I
Mobile: 202-870f h\t~\- I
Main: 202-732l(b)(6); I
2020-ICLl-00023 1331
Privacy Requirements
for Operational Use of
Social Media
August 2019
a -.
,{
1
•
2
• U.S. Immigration
·•;. - ji · · and Customs
~ ' "l. · Enforcement
I
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1334
*
2020-ICLl-00023 1
*
Applicable Laws
The Privacy Act of 1974
•A code of practices for the collection, maintenance, use, and
dissemination of information about individuals
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1338
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1339
*I *
Personally Identifiable
Information (PII)
Name
Who You Are Date of
ID Numbers
I Sensitive PII I DNA
Home Phone#
Medical Records
Immigration
Biometrics Status
Family Info Drivers Fingerprint
Other Info License # Ss . S . # Photograph
oc1a1 ecunty
About You Stand-
Passport#
Financial
Info
8
lJ.S. ln1111i:.,:r.1ti(JII
,111d Cu-.l<J111-.
( nlc lfll'l1H'11l
2020-ICLl-00023 1340
*
•:.n--.1 ,>.i 1:,1..(-;'fl., • · ••• "a'-1 ~ . ) I i , ~ ~ . - ,:tJ L•• ~ hill"l(-f ;"fl [ll ;,: F,:,,l pi>.ii in;.:,!T>-J,on.
lr._~;:,,lo!;., ~ llii)A'.I {ail lr.:ff"(ll 9»:I .,..-.:-.;-ffl •.,IIJ .,,.,,~ nTI ~ ,...,,¥,'.1):(I ~
'1~~ M[li. ~•°': I!' • ~ ~•,'!'.ill ,._~..,.I fllh.fl~• ,«~ 11)1:j!, ti! :llirl:llfl!JH
P.KII.Trp r.:i,i~ l:)119'-:- l,j r,'¥11 ."11,1~ !(iq!':'11"1'
,...
lJ.S. ln1111i:..:r.1ti(J11
Si"• •l'!i!'".'t.~ ~ • IToHl¥•.•~• i."'•.nl i:,tl,'Nl.;tlJ. 1,'1'.111~ ,1-. 'll ;,'.Ii NP.N"I
,111d Cu-.l<J111-.
QI'~
I nlc lfll'llH'lll
2020-ICLl-00023 1342',-'! ,..
*
ICE Rules of
Behavior (ROB)
for Non-Law
Enforcement
Activities
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1344
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1345
*
ICE Rules of
Behavior (ROB)
for Online Law
Enforcement
Activities
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1346
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1347
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1349
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1351
*
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1352
*
Links:
ICE Law Enforcement Rules of Behavior
l(b)(7)(E)
lJ.S. ln1111i:..:r.1ti(J11
,111d Cu-.l<J111-.
I nlc lfll'llH'lll
2020-ICLl-00023 1354
U.S. Immigration
and Customs
Enforcement
Federal Register /Vol. 75, No. 39/Monday, March 1, 2010/Notices 9233
Periodically, CDC estimates the food safety progress that cannot be DEPARTMENT OF HOMELAND
overall burden of foodborne illness. directly linked to health outcomes. SECURITY
CDC's estimate of the overall burden of These include measures of process
foodborne illness has a much larger control in food production, studies on Office of the Secretary
scope than CDC's annual reports and the prevalence of specific pathogens in [Docket No. DHS-2009- 0071]
draws heavily from FoodNet data as specific classes of food, and studies of
well as from a much wider variety of compliance with recommended or Privacy Act of 1974; U.S. Immigration
data sources, both inside and outside of required food safety practices in retail and Customs Enforcement-006
CDC. This estimate also includes and food-service operations. Intelligence Records System of
norovirus, a major contributor to the Records
Specifically, topics to be discussed
overall burden of foodbome disease,
include CDC's data sources and AGENCY: Privacy Office, DHS .
which can be transmitted not only by
foods, but also by environmental methods, including methods for
ACTION: Notice of Privacy Act system of
sources, and is not monitored by estimating the burden of foodborne
records.
FoodNet. CDC's last estimate of the illness, and their various limitations and
overall burden of foodborne illness was utilities; and FDA's and USDA's SUMMARY: In accordance with the
issued in 1999 and included unknown ongoing measures to gauge the success, Privacy Act of 1974, U.S. Immigration
causes of foodborne illness (Ref. 2). or implied success (i.e., via the kinds of and Customs Enforcement is modifying
Since then, advances in methodology proxy measures described in previously an existing system of records titled the
and data sources have improved mentioned examples; e.g., surveys for E. Immigration and Customs Enforcement-
capabilities in developing disease coli O157:H? and Salmonella in 006 Intelligence Records System (Dec. 9,
burden estimates; these will be reflected produce and tracking of specific 2008), to clarify the nature of the
in CDC's next estimate. pathogens in meat), of policies and personally identifiable information that
In addition to CDC estimates, FDA interventions, including the level of will be collected and maintained on
and USDA use other measures to gauge compliance with food safety regulations. individuals. In conjunction with its
the success, or implied success (i.e., via publication of the Privacy Impact
III. Transcripts
proxy measures), of policies and Assessment for the JCEGangs system,
interventions for reducing foodborne Please be advised that as soon as a Immigration and Customs Enforcement
illness. For example, although transcript is available, it will be is modifying the DHS/ICE-006
measurements of the food industry's accessible at http:!! Immigration and Customs Enforcement
compliance with a given food safety www.regulations.gov. It may be viewed Intelligence Records system of records
regulation cannot be used to directly at the Division of Dockets Management notice to more clearly explain the type
measure the regulation's impact on the (HFA- 305), Food and Drug of information it gathers on suspected
rate of foodborne illness, improved Administration, 5630 Fishers Lane, rm. and confirmed gang members and
compliance can be reasonably expected 1061, Rockville, MD 20852. A transcript associates. This OHS/Immigration and
to improve the likelihood that the foods will also be available in either h ardcopy Customs Enforcement-006 Intelligence
involved will be safer and, thus, the or on CD- ROM, after submission of a Records system of records notice
likelihood that fewer illnesses will Freedom of Information request. Written updates categories of individuals;
result. Examples include the tracking of requests are to be sent to Division of categories of records; purpose of the
E. coli O157:H? in ground beef and of Freedom of Information (HFI- 35), Office system; adding a routine use; and
Salmonella in meat, and surveys of both of Management Programs, Food and policies and practices for retaining and
domestic and imported produce, such as disposing of records in the system.
Drug Administration, 5600 Fishers
surveys conducted by FDA and USDA's Lane, rm. 6-30, Rockville, MD 20857. Immigration and Customs Enforcement
Microbiological Data Program, which is soliciting comments on this SORN
have targeted Salmonella and E. coli IV. References due to the clarifying changes that were
O157:H?. made since the original publication. A
Th e following references are on Privacy Impact Assessment on ICEGangs
II. Purpose of the Workshop and Topics display at the Division of Dockets
for Discussion that describes the system in detail is
Management (see Transcripts), between being published concurrently with this
The purpose of this initial 1-day 9 a.m. and 4 p.m., Monday through notice. In addition, this notice addresses
public workshop is to discuss current Friday. (FDA has verified the following one comment that was received in
and potential measurements for Web site address, but FDA is not response to the original publication of
assessing progress in food safety and to responsible for any subsequent changes the Immigration and Customs
provide workshop participants an to the Web site after this document Enforcement Intelligence Records SORN
opportunity to learn about metrics and publishes in the Federal Register.) on December 9, 2008. A final rule is
to consider and suggest metrics for 1. President's Food Safety Working Group being published concurrently with this
assessing the effects that policies and findings, http:/ lwwiv.foodsafetyworking notice in which the Department
interventions have on foodborne illness. group.gov/ContentKeyFindings/HomeKey exempts portions of this system of
The workshop will focus on the current Findings.htm. records from one or more provisions of
status and challenges involved in 2. Mead P.S., L. Slutsker, V. Dietz, et al., the Privacy Act because of criminal,
measuring foodborne illness and trends Food-Reloted Illness ond Death in the United civil, and administrative enforcement
over time, including incidence and States, Emerging Infectious Diseases, 5(5),
requirements.
trends in the overall burden of 607-625, 1999.
foodborne illness and illnesses DATES: This amended system of records
Dated: February 23, 2010.
associated with specific foodborne ·will be effective March 31, 2010.
Leslie Kux, Written comments must be submitted
pathogens and specific pathogens that
affect specific foods. The workshop will Acting Assistant Commissioner for Policy. on or before March 31, 2010.
include a discussion of other measures [FR Doc. 2010-4110 Filed 2- 26-10; 8:45 am) ADDRESSES: You may submit comments,
that are, or could be, used to measure BILLING CODE 4160- 01- S identified by docket number DHS-
2020-ICLl-00023 1356
9234 Federal Register /Vol. 75, No. 39/Monday, March 1, 2010/Notices
2009-0071 by one of the following Investigations concerning suspected or II. Public Comment
methods: confirmed gang members and associates One public comment was received,
• Federal e-Rulemaking Portal: http:// included in a database called ICEGangs. but as it did not pertain to the SORN or
www.regulations.gov. Follow the ICEGangs maintains personal proposed rule, it is not addressed here.
instructions for submitting comments. information about individuals wh o A final rule is published concurrently
• Fax: 703-483- 2999. qualify as suspected or confirmed gang lArith this notice in th is issue of the
• Mail: Mary Ellen Callahan, Chief members and associates under ICE Federal Register.
Privacy Officer, Privacy Office, criteria. ICEGangs stores the following
Department of Homeland Security, data about each gang member and III. Privacy Act
Washington, DC 20528. associate to the extent it is available: The Privacy Act embodies fair
• Instructions: All submissions Biographic information (name, date of information principles in a statutory
received must include the agency name birth, etc.), immigration status, gang framework governing the means by
and docket number for this rulemaking. affiliation, physical description, which the United States Government
All comments received will be posted government-issued identification collects, maintains, uses, and
without change to http:// numbers, photos of the individual, disseminates personally identifiable
www.regulations.gov, including any identities of gang associates, field information. The Privacy Act applies to
personal information provided. interview notes, and criminal history information th at is maintained in a
• Docket: For access to the docket to information. ICEGangs also stores "system of records." A "system of
read background documents or general comments entered by the ICE records" is a group of any records under
comments received go to http:// agent that created the gang member or the control of an agency for which
www.regulations.gov. associate record as well as a reference to information is retrieved by the name of
FOR FURTHER INFORMATION CONTACT: For
the official evidentiary system of an individual or by some identifying
general questions p lease contact Lyn M. records where official case files are number, symbol, or other identifying
Rahilly (202-732-3300), Privacy Officer, stored. particular assigned to the individual. In
ICEGangs h as two main purposes.
U.S. Immigration and Customs the Privacy Act, an individual is defined
First, it supplements the existing ICE
Enforcement, 500 12th Street, SW., to encompass United States citizens and
case management system by providing a
Washington, DC 20536. For privacy consolidated repository of information legal permanent residents. As a matter
issues please contact Mary Ellen on gang members and associates and of policy, OHS extends administrative
Callahan (703-235-0780). Chief Privacy Privacy Act protections to all
gang-related activity. ICEGangs allows
Officer, Privacy Office, U.S. Department ICE agents and support personnel to individuals where systems of records
of Homeland Security, Washington, DC search gang-oriented information in a maintain information on U.S. citizens,
20528. more efficient and effective manner th an lawful permanent residents, and
SUPPLEMENTARY INFORMATION: is possible in ICE's standard visitors. Individuals may request access
investigative case management system. to their own records that are maintained
I. Background in a system of records in the possession
For example, an ICE field agent can
The Immigration and Customs query ICEGangs for a list of members in or under the control of OHS by
Enforcement (ICE) Intelligence Records a specific gang. It is not currently compl)ring with DHS Privacy Act
(HRS) system of records was originally possible to perform the same sort of regulations, 6 CFR Part 5.
established on December 9, 2008 (73 FR query using ICE's investigative case The Privacy Act requires each agency
74735), and public comments were management system. As a matter of to publish in the Federal Register a
solicited for the SORN and the policy, ICE agents are required to create description denoting the type and
associated Notice of Proposed and/or update ICEGangs records for character of each system of records that
Rulemaking (73 FR 74633, Dec. 9, 2008) suspected and/or confirmed gang the agency maintains, and the routine
which proposed to exempt this system members and associates whenever they uses that are contained in each system
from one or more provisions of the encounter gang members and associates in order to make agency record keeping
Privacy Act because of criminal, civil, in the field during their official law practices transparent, to notify
and administrative enforcement enforcement activities. ICEGangs individuals regarding the uses to which
requirements. Due to urgent homeland records also contain references to tlie personally identifiable information is
security and law enforcement mission official evidentiary system of records, put, and to assist individuals to more
needs, ICE was already maintaining which allows ICE agents and support easily find such files within the agency.
these records when the original IIRS personnel to refer to official case Below is the description of the
SORN was published. Recognizing that records. Immigration and Customs Enforcement-
ICE published a system of records notice Second, ICEGangs facilitates the 006 Intelligence Records system of
for an existing system, ICE committed to sharing of gang information between ICE records.
reviewing and considering public and oth er law enforcement agencies. In In accordance with 5 U.S.C. 552a(r),
comments, apply appropriate revisions, particular, ICE currently provides the DHS has provided a report of this new
and republish th e !IRS system of records California Department of Justice system of records to the Office of
notice within 180 days of receipt of (CalDOJ) access to the data in ICEGangs. Management and Budget and to
comments. A new routine use is also CalDOJ users access ICEGangs through Congress.
proposed to allow data sharing between their own CalGangs application which SYSTEM OF RECORDS
ICE and other law enforcement agencies accesses the ICEGangs repository
for the purpose of collaboration, remotely. In the future, ICE anticipates DHS/ICE-006
coordination, and de-confliction of that it will share information with other SYSTEM NAME:
cases. State and local law enforcement ICE Intelligence Records System
In addition to the records described in agencies that use the GangNET software. (!IRS).
the initial publication of HRS, this ICE will require access controls for State
notice also consists of information and local agencies as a prerequisite to SECURITY CLASSIFICATION:
maintained by the ICE Office of gaining access to ICEGangs. Sensitive But Unclassified, Classified.
2020-ICLl-00023 1357
Federal Register /Vol. 75, No. 39/Monday, March 1, 2010/Notices 9235
Records are maintained at ICE Categories of records in this system The purpose of this system is:
Headquarters in Washington, DC, and include: (1) Biographic information (a) To maintain records that reflect
and generally support ICE's collection,
field offices. (name, date of birth, social security
analysis, reporting, and distribution of
number, alien registration number,
law enforcement, immigration
CATEGORIES OF INDIVIDUALS COVERED BY THE citizenship/immigration status, passport
administration, terrorism, intelligence,
SYSTEM: information, addresses, phone numbers,
and homeland security information in
Categories of individuals covered by etc.); (2) Records of immigration
support ofICE's law enforcement. and
this system include the following: (1) enforcement activities or law
immigration administration mission.
Individuals (e.g., subjects, witnesses, enforcement investigations/activities (b) To produce law-enforcement
associates) associated with immigration conducted by ICE, the former intelligence reporting that provides
enforcement activities or law Immigration and Naturalization Service, actionable information to ICE's law
enforcement investigations/activities or the former U.S. Customs Service; (3) enforcement and immigration
conducted by ICE, the former Information (including documents and administration personnel and to other
Immigration and Naturalization Service, electronic data) collected by DHS from appropriate government agencies.
or the former U.S. Customs Service; (2) or about individuals during (c) To enhance the efficiency and
individuals associated with law investigative activities and border effectiveness of the research and
enforcement investigations or activities searches; (4) Records of immigration analysis process for DHS law
conducted by other Federal, State, enforcement activities and law enforcement, immigration, and
Tribal, territorial, local or foreign enforcement investigations/activities intelligence personnel through
agencies where there is a potential that have a possible nexus to ICE's law information technology tools that
nexus to ICE's law enforcement and enforcement and immigration provide for advanced search and
immigration enforcement enforcement responsibilities or analysis of various datasets.
responsibilities or homeland security in homeland security in general; (5) Law (d) To facilitate multi-jurisdictional
general; (3) individuals known or enforcement, intelligence, crime, and informational exchange between ICE
appropriately suspected to be or have incident reports (including financial and other law enforcement agencies
been engaged in conduct constituting, in reports under the Bank Secrecy Act and regarding known and suspected gang
preparation for, in aid of, or related to law enforcement bulletins) produced by members and associates; and
terrorism; (4) individuals involved in, DHS and other government agencies; (6) (e) To identify potential criminal
associated with, or who have reported U.S. visa, border immigration and activity, immigration violations, and
suspicious activities, threats, or other naturalization benefit data, including threats to homeland security; to uphold
incidents reported by domestic and arrival and departure data; (7) Terrorist and enforce the law; and to ensure
foreign government agencies, watchlist information and other public safety.
multinational or non-governmental terrorism related information regarding
ROUTINE USES OF RECORDS MAINTAINED IN THE
organizations, critical infrastructure threats, activities, and incidents; (8) Lost
SYSTEM, INCLUDING CATEGORIES OF USERS AND
owners and operators, private sector and stolen passport data; (9) Records THE PURPOSES OF SUCH USES:
entities and organizations, and pertaining to known or suspected
In addition to those disclosures
individuals; (5) individuals who are the terrorists, terrorist incidents, activities, generally permitted under 5 U.S.C.
subjects of or otherwise identified in groups, and threats; (10) ICE-generated
552a(b) of the Privacy Act, all or a
classified or unclassified intelligence intelligence requirements, analysis,
reporting, and briefings; (11) Third party portion of the records or information
reporting received or reviewed by ICE; contained in this system may be
and (6) individuals who are known or intelligence reporting; (12) Articles,
public-source data, and other published disclosed outside DHS as a routine use
suspected gang members or associates, pursuant to 5 U.S.C. 552a(b)(3) as
including records maintained in the information on individuals and events
of interest to ICE; (13) Records and follows:
ICEGangs system. A. To the Department. of Justice or
IIRS includes an information information from government data
other Federal agency conducting
technology system known as the systems or retrieved from commercial
litigation or in proceedings before any
Intelligence Fusion System (IFS). In data providers in the course of
court, adjudicative or administrative
addition to the categories of individuals intelligence research, analysis and body, when (1) DHS or any component
listed above, IFS also includes the reporting; (14) Reports of suspicious
thereof; (2) any employee of DHS in his/
activities, threats, or other incidents
following: (1) Individuals identified in her official capacity; (3) any employee
law enforcement, intelligence, crime, generated by ICE and third parties; and
of DHS in his/her individual capacity
and incident reports (including (15) Additional information about
where DOJ or DHS h as agreed to
financial reports under the Bank known and suspected gang members
represent the employee; or (4) the
Secrecy Act and law enforcement and associates such as biographic
United States or any agency thereof, is
information (name, date of birth, etc.),
bulletins) produced by DHS and other a party to the litigation or has an interest
government agencies; (2) individuals immigration status, gang affiliation,
in such litigation; and DHS determines
identified in U.S. visa, border, physical description, government-issued
that the records are both relevant and
immigration and naturalization benefit identification numbers, photos of the
necessary to the litigation and th e use of
data, including arrival and departure individual, identities of gang associates,
such records is compatible with the
data; (3) individuals identified in DHS field interview notes, and criminal
purpose for which DHS collected the
law enforcement and immigration history information.
records.
records; (4) individuals not authorized AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
B. To the Department. of Justice (DOJ),
to work in the United States; (5) Civil Rights Division, for the purpose of
individuals whose passports have been 5 U.S.C. 301; 8 U.S.C. 1103, 1105, responding to matters within the DOJ's
lost or stolen; and (6) individuals 1225(d)(3), 1324(b)(3), 1357(a), and jurisdiction to include allegations of
identified in public news reports. 1360(b); 19 U.S.C. 1 and 1509. fraud and/or nationality discrimination.
2020-ICLl-00023 1358
9 236 Federal Register /Vol. 75, No. 39/Monday, March 1, 2010/Notices
C. To a congressional office from the requested such redress on behalf of enforcement responsibilities, including
record of an individual in response to another individual. the collection of law enforcement
an inquiry from that congressional office I. To a former employee of DHS, in intelligence.
made at the request of the individual to accordance with applicable regulations, N. To appropriate Federal, State,
whom the record pertains. for purposes of responding to an official local, Tribal, or foreign governmental
D. To the National Archives and inquiry by a Federal, St.ate or local agencies or multilateral government.al
Records Administration or other Federal government entity or professional organizations responsible for
government agencies pursuant to licensing authority; or facilitating investigating or prosecuting the
records management inspections being communications with a former violations of, or for enforcing or
conducted under the authority of 44 employee that may be necessary for implementing, a statute, rule,
U.S.C. 2904 and 2906. personnel-related or other official regulation, order, license, or treaty
E. To an agency, organization, or purposes where the Department requires where OHS determines that the
individual for the purpose of performing information or consultation assistance information would assist in the
audit or oversight operations as from the former employee regarding a enforcement of civil, criminal, or
authorized by law, but only such matter within that person's former area regulatory laws.
information as is necessary and relevant of responsibility. 0. To third parties during the course
to such audit or oversight function. ]. To an appropriate Federal, State, of an investigation by OHS, a
F. To appropriate agencies, entities, local, Tribal, foreign, or international proceeding within the purview of the
and persons when: (1) OHS suspects or agency. if the information is relevant immigration and nationality laws, or a
has confirmed that the security or and necessary to the agency's decision matter under DHS's jurisdiction, to the
confidentiality of information in the concerning the hiring or retention of an extent necessary to obtain information
individual or the issuance, grant, pertinent to the investigation, provided
system of records has been
renewal, suspension or revocation of a disclosure is appropriate to the proper
compromised; (2) the Department has
security clearance, license, contract, performance of the official duties of the
determined that as a result of the
grant, or other benefit; or if the officer making the disclosure.
suspected or confirmed compromise
information is relevant. and necessary to
there is a risk of harm to economic or P. To a Federal, State, or local agency,
a DHS decision concerning the hiring or
property interests, identity theft or or other appropriate entity or
retention of an employee, the issuance
fraud, or harm to the security or individual , or through established
of a security clearance, the reporting of
integrity of this system or other systems liaison channels to selected foreign
an investigation of an employee, the
or programs (whether maintained by governments, in order to provide
letting of a contract, or the issuance of
OHS or another agency or entity) that a license, grant or other benefit and intelligence, counterintelligence, or
rely upon the compromised when disclosure is appropriate to the other information for the purposes of
information, or harm to an individual; intelligence, counterintelligence, or
proper performance of the official duties
and (3) the disclosure made to such of the person receiving the information. antiterrorism activities authorized by
agencies, entities, and persons is K. To appropriate Federal, State, U.S. law, Executive Order, or other
reasonably necessary to assist in local, Tribal, or foreign governmental applicable national security directive.
connection with DHS's efforts to agencies or multilateral governmental Q . To Federal and foreign government
respond to the suspected or confirmed organizations for the purpose of intelligence or counterterrorism
compromise and prevent, minimize, or protecting the vital interests of a data agencies when OHS reasonably believes
remedy such harm. subject or other persons, including to there to be a threat or potential threat to
G. To contractors and their agents, assist such agencies or organizations in national or international security for
grantees, experts, consultants, and preventing exposure to or transmission which the information may be useful in
others performing or working on a of a communicable or quarantinable countering the threat or potential threat,
contract, service, grant, cooperative disease or to combat other significant when OHS reasonably believes such use
agreement, or other assignment for DHS, public health threats; appropriate notice is to assist in anti-terrorism efforts, and
when necessary to accomplish an will be provided of any identified health disclosure is appropriate to the proper
agency function related to this system of risk. performance of the official duties of the
records. Individuals provided L. To a public or professional person making the disclosure.
information under this routine use are licensing organization when such R. To an organization or individual in
subject to the same Privacy Act information indicates, either by itself or either the public or private sector, either
requirements and limitations on in combination with other information, foreign or domestic, where there is a
disclosure as are applicable to DHS a violation or potential violation of reason to believe that the recipient is or
officers and employees. professional standards, or reflects on the could become the target of a particular
H. To a Federal, State, territorial, moral, educational, or professional terrorist activity or conspiracy, to the
Tribal, local, international, or foreign qualifications of an individual who is extent the information is relevant to the
government agency or entity for the licensed or who is seeking to become protection of life or property and
purpose of consulting with that agency licensed. disclosure is appropriate to the proper
or entity: (1) To assist in making a M. To a Federal, State, Tribal, local or performance of the official duties of the
determination regarding redress for an foreign government agency or person making the disclosure.
individual in connection with the organization, or international S. To international and foreign
operations of a OHS component or organization, lawfully engaged in government.al authorities in accordance
program; (2) for the purpose of verifying collecting law enforcement intelligence ,,vith law and formal or informal
the identity of an individual seeking information, whether civil or criminal, international agreements.
redress in connection with the or charged with investigating, T. To the Department. of State in the
operations of a OHS component or prosecuting, enforcing or implementing processing of petitions or applications
program; or (3) for the purpose of civil or criminal laws, related rules, for benefits under the Immigration and
verifying the accuracy of information regulations or orders, to enable these Nationality Act, and all other
submitted by an individual who has entities to carry out their law immigration and nationality laws
2020-ICLl-00023 1359
Federal Register /Vol. 75, No. 39/Monday, March 1, 2010/Notices 9237
including treaties and reciprocal number, or passport number. Records http://www.dhs.gov/foia under
agreements. may also be retrieved by non-personal "contacts." If an individual believes
U. To appropriate Federal, State, information such as transaction date, more than one component maintains
local, Tribal, or foreign governmental entity/institution name, description of Privacy Act records concerning him or
agencies or multilateral governmental goods, value of transactions, and other her the individual may submit the
organizations where DHS is aware of a information. request to the Chief Privacy Officer,
need to utilize relevant data for Department of Homeland Security, 245
SAFEGUARDS:
purposes of testing new technology and Murray Drive, SW., Building 410,
systems designed to enhance national Records in this system are STOP- 0550, Washington, DC 20528.
security or identify other violations of safeguarded in accordance with When seeking records about yourself
law. applicable rules and policies, including from this system of records or any other
V. To appropriate Federal, State, all applicable DHS automated systems Department.al system of records your
local, Tribal, or foreign government security and access policies. Strict request must conform with the Privacy
agencies or multinational government controls have been imposed to minimize Act regulations set forth in 6 CFR Part
organizations where DHS desires to the risk of compromising the 5. You must first verify your identity,
exchange relevant data for the purpose information that is being stored. Access meaning that you must provide your full
of developing new software or to the computer system containing the name, current address and date and
implementing new technologies for the records in this system is limited to those place of birth. You must sign your
purposes of data sharing to enhance individuals who have a need to know request, and your signature must either
homeland security, national security or the information for the performance of be notarized or submitted under 28
law enforcement. their official duties and who have U.S.C. 1746, a law that permits
W. To a criminal, civil, or regulatory appropriate clearances or permissions. statements to be made under penalty or
law enforcement authority (whether The system maintains a real-time perjury as a substitute for notarization.
Federal, State, local, territorial, Tribal, auditing function of individuals who While no specific form is required, you
international or foreign) where the access the system. Additional may obtain forms for this purpose form
information is necessary for safeguards may vary by component. and the Director, Disclosure and FOIA,
collaboration, coordination and de- program. http://www.dhs.gov or 1-866-431- 0486.
confliction of investigative matters, to In addition you should provide the
RETENTION AND DISPOSAL:
avoid duplicative or disruptive efforts following:
and for the safety of law enforcement ICE is in the process of drafting a • An explanation of why you believe
officers who may be working on related proposed record retention schedule for the Department would have information
investigations. the information maintained in IIRS, on you,
X. To the news media and the public, including system information stored in • Identify which component(s) of the
with the approval of the Chief Privacy IFS. ICE anticipates retaining the Department you believe may have the
Officer in consultation with counsel, records from other databases in IFS for information about you,
when there exists a legitimate public 20 years, records for which IFS is the • Specify when you believe the
interest in the disclosure of the repository ofrecord for 75 years, and records would have been created,
information or when disclosure is ICE-generated intelligence reports for 75 • Provide any other information that
necessary to preserve confidence in the years. The original electronic data ·will help the FOIA staff determine
integrity of DHS or is necessary to containing the inputs to IFS will be which DHS component agency may
demonstrate the accountability of DHS's destroyed after upload and verification have responsive records,
officers, employees, or individuals or returned to the source. • If your request is seeking records
covered by the system, except to the ICE is in the process of drafting a pertaining to another living individual,
extent it is determined that release of proposed record retention schedule for you must include a statement from that
the specific information in the context the information maintained in individual certifying his/her agreement
of a particular case would constitute an ICEGangs. ICE anticipates retaining for you to access his/her records.
unwarranted invasion of personal ICEGangs records for five years from the Without this bulleted information the
privacy. date the record was last accessed. component(s) will not be able to
SYSTEM MANAGER AND ADDRESS:
conduct an effective search, and your
DISCLOSURE TO CONSUMER REPORTING
request may be denied due to lack of
AGENCIES: Director, ICE Office of Intelligence, specificity or lack of compliance ,,vith
None. 500 12th Street, SW., Washington, DC
applicable regulations.
20536.
POLICIES AND PRACTICES FOR STORING,
RECORD ACCESS PROCEDURES:
RETRIEVING, ACCESSING, RETAINING, AND NOTIFICATION PROCEDURE:
DISPOSING OF RECORDS IN THE SYSTEM: See "Notification procedure" above.
The Secretary of Homeland Security
STORAGE: has exempted this system from the CONTESTING RECORD PROCEDURES:
Records in this system are stored notification, access, and amendment See "Notification procedure" above.
electronically or on paper in secure procedures of the Privacy Act because it
is a law enforcement system. However, RECORD SOURCE CATEGORIES:
facilities in a locked drawer behind a
locked door. The records are stored on ICE will consider individual requests to Federal, State, local, territorial, Tribal
magnetic disc, tape, digital media, and determine whether or not information or other domestic agencies, foreign
CD-ROM. may be released. Thus, individuals agencies, multinational or non-
seeking notification of and access to any governmental organizations, critical
RETRIEVABILITY: record contained in this system of infrastructure owners and operators,
Records may be retrieved by personal records, or seeking to contest its private sector entities and organizations,
identifiers such as but not limited to content, may submit a request in writing individuals, commercial data providers,
name, alien registration number, phone to the component's FOIA Officer, whose and public sources such as news media
number, address, social security contact information can be found at outlets and the Internet.
2020-ICLl-00023 1360
9238 Federal Register /Vol. 75, No. 39/Monday, March 1, 2010/Notices
EXEMPTIONS C LAIMED FOR THE SYSTEM: categories of records have been of records is being renamed DHS/ICE-
Pursuant to exemption 5 U .S.C. reviewed, and the purpose statement 011 Immigration and Enforcement
552a(j)(2) of the Privacy Act, portions of and routine uses of this system have Operational Records System of Records
this system are exempt from 5 U.S.C. been updated to b etter reflect th e (ENFORCE) to better reflect the nature
552a(c)(3) and (4); (d); (e)(l), (e)(2), current status of these records. and scope of the records maintained.
(e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and Additionally, this notice includes non- DHS is updating this notice to include
(e)(8); (f); and (g). Pursuant to 5 U.S.C. substantive changes to simplify the the following substantive changes: (1)
552a (k)(2), this system is exempt from formatting and text of the previously An update to the categories of records
the following provisions of the Privacy published notice. This updated system to include clarifying language as well as
Act, subject to the limitations set forth will continue to be included in the to provide the Department of Justice
in those subsections: 5 U.S.C. 552a(c)(3), Department of Homeland Security's (DOJ) with DNA samples as required by
(d), (e)(l), (e)(4)(G), (e)(4)(H), and (f). inventory of record systems. 28 CFR Part 28; (2) th e addition of
Dated: February 24, 2010. DATES: Submit comments on or before routine uses to (a) incorporate the
Mary Ellen Callahan, March 31, 2010. This amended system routine uses that were already part of
will be effective March 31 , 2010. the published DHS/ICE-011
ChiefPrivacy Officer, Department of
Homeland Security. ADDRESSES : You may submit comments, Removable Aliens Records System of
[FR Doc. 2010-4102 Filed 2- 26- 10; 8:45 am] identified by docket number DHS- Records (RARS) (74 FR 20719, May 5,
2009-0144 by one of the following 2009) into this newly consolidated
BILLING CODE 9111- 28-P
methods: SORN, (b) provide information to
• Federal e-Rulemaking Portal: individuals in the determination of
DEPARTMENT OF HOMELAND http://www.regulations.gov. Follow the whether or not an alien has been
SECURITY instructions for submitting comments. removed from the U.S., (cl assist
• Fax: 703-483- 2999. agencies in collecting debts owed to
Office of the Secretary • Mail: Mary Ellen Callahan, Chief them or the U.S. Government, (d) allow
Privacy Officer, Privacy Office, sharing with the Department of State
[Docket No. DHS-200~144] Department of Homeland Security, (DOS) for immigration benefits and visa
Washington, DC 20528. activities, as well as when DOS is
Privacy Act of 1974; Department of • Instructions: All submissions
Homeland Security United States contacted by foreign governments to
received must include the agency name discuss particular matters involving
Immigration Customs and and docket number for this rulemaking. aliens in custody or other ICE
Enforcement-011 Immigration and All comments received will be posted enforcement matters that may involve
Enforcement Operational Records without change to http:// identified individuals, (e) allow the
System of Records www.regulations.gov, including any Office of Management and Budget
AGENCY: Privacy Office, DHS. personal information provided. (0MB) to review the private
• Docket: For access to th e docket to immigration relief bill process in
ACTION: Notice of amendment of Privacy read background documents or
Act system of records. Congress, (f) inform members of
comments received go to http:// Congress about an alien who is being
SUMMARY: In accordance with the www.regulations.gov. considered for private immigration
Privacy Act of 1974 the Department of FOR FURTHER INFORMATION CONTACT: Lyn relief, (g) share operational information
Homeland Security U.S. Immigration Rahilly (703- 732- 3300), Privacy Officer, with other law enforcement agencies to
and Customs Enforcement is updating U.S. Immigration and Customs prevent conflicting investigations or
an existing system of records titled, Enforcement, 500 12th Street, SW., activities, (h) coordinate the
Department of Homeland Security/U.S. Washington, DC 20536; or Mary Ellen transportation, custody, and care of U.S.
Immigration and Customs Callahan (703-235-0780), Chief Privacy Marshals Service (USMS) prisoners, (i)
Enforcement-011 Removable Alien Officer, Privacy Office, U.S. Department allow third parties to facilitate the
Records System of Records, January 28, of Homeland Security, Washington, DC placement or release of an alien who has
2009, and renaming it Department of 20528. been or are in the process of being
Homeland Security/U.S. Immigration SUPPLEMENTARY INFORMATION: released from ICE custody, (j) provide
and Customs Enforcement- 011 information about an alien who has or
Immigration and Enforcement I. Background is in the process of being released from
Operational Records System of Records. In accordance with the Privacy Act of ICE custody who may pose a health or
With the publication of this updated 1974, the Department of Homeland safety risk, (k) to provide information
system of records, the Department of Security is updating and reissuing facilitating the issuance of an
Homeland Security is also retiring an Department of Homeland Security immigration detainer on an individual
existing system of records titled, (DHS)/U.S. Immigration and Customs in custody or the transfer of an
Department of Homeland Security/U.S. Enforcement (ICE)-011 Removable individual to ICE or another agency, (1)
Immigration and Customs Alien Records System of Records (74 FR disclose DNA samples and related
Enforcement-Customs and Border 4965, Jan. 28, 2009) to include information as required by Federal
Protection- U.S. Citizenship and additional DHS records pertaining to the regulation, (m) to facilitate the
Immigration Services- 001- 03 investigation, arrest, booking, detention, transmission of arrest information to the
Enforcement Operational Immigration and removal of persons encountered Department of Justice for inclusion in
Records System of Records, March 20, during immigration and criminal law relevant law enforcement databases and
2006, and transferring certain law enforcement investigations and for the enforcement Federal firearms
enforcement and immigration records operations conducted by DHS. This licensing laws, and (n) to disclose
described th erein that are owned by system of records is also being updated information to persons seeking to post
U.S. Immigration and Customs to include records pertaining to fugitive or arrange immigration bonds. These
Enforcement to this updated system of aliens and aliens paroled into the updated routine uses are compatible
records. Categories of individuals and United States (U.S.) by ICE. The system with the purpose of this system because
2020-ICLl-00023 1361
~"''"'"~m9
INH;,•MAroc,)ls
G >O
72080 Federal Register /Vol. 81, No. 202/Wednesday, October 19, 2016/Notices
Freedom of Information Act Officer, • JUSTICE/FBI-002 The FBI Central DHS/ICE is updating this system of
http://www.dhs.gov/foia or 1-866-431- Records System, 72 FR 3410 (January records to: Change the system of records
0486. In addition, you should: 25, 2007); name to "DHS/ICE- 011 Criminal Arrest
• Explain why you believe the • DoDIA0025- 2 Defense Biometric Records and Immigration Enforcement
Department would have information on Services, 74 FR 48237, (September 22, Records (CARIER)" System of Records;
you; 2009); update and reorganize the categories of
• Identify which component(s) of the • DoD Detainee Biometric individuals for clarity; expand the
Department you believe may have the Information System, 72 FR 14534, categories of records to include
information about you; (March 28, 2007); and recordings of detainee telephone calls
• Specify when you believe the • DoDIA0025-2a Defense Biometric and information about these calls, as
records would have been created; and Identification Records System, 74 FR well as information related to detainees'
• Provide any other information that 17840, (April 17, 2009). accounts for telephone or commissary
will help the FOIA staff determine services in a detention facility; update
EXEMPTIONS CLAIMED FOR THE SYSTEM:
which DHS component agency may the system manager; clarify system
have responsive records; None. location; and add twenty-five routine
If your request is seeking records Dated: October 5, 2016. uses and modify twenty routine uses to
pertaining to another living individual, Jonathan R. Cantor, describe how the Department of
you must include a statement from that Acting ChiefPrivacy Officer, Department of Homeland Security may share
individual certifying his/her agreement Homeland Security. information from this system.
for you to access his/her records. [FR Doc. 2016- 25195 Filed 10- 18- 16; 8:45 am] Additionally, this notice includes non-
Without the above information, the BILLING CODE 9111 - 97- P
substantive changes to simplify the
component(s) may not be able to formatting and text of the previously
conduct an effective search, and your published notice.
request may b e denied due to lack of DEPARTMENT OF HOMELAND This updated system will be included
specificity or lack of compliance with SECURITY in the Department of Homeland
applicable regulations. Security's inventory ofrecord systems.
Office of the Secretary
RECORD ACCESS PROCEDURES: DATES: Submit comments on or before
[Docket No. DHS-2016-0073) November 18, 2016. This updated
See "Notification procedure" above.
system will be effective November 18,
CONTESTING RECORD PROCEDURES: Privacy Act of 1974; Department of 2016.
See "Notification procedure" above. Homeland Security United States
ADDRESSES: You may submit comments,
Immigration Customs and
Enforcement-011 Criminal Arrest identified by docket number DHS-
RECORD SOURCE CATEGORIES:
Records and Immigration Enforcement 2016-0073 by one of the following
DHS/USCIS obtains records from the methods:
applicant, and his or her accredited Records System of Records
• Federal e-Rulemaking Portal: http://
representative, preparer, or interpreter. AGENCY: Privacy Office, Department of www.regulations.gov. Follow the
Other information sources include Homeland Security. instructions for submitting comments.
family members, federal databases for ACTION : Notice of Privacy Act System of
security screening ch ecks, RSCs, the • Fax:202-343-4010.
Records.
DOS Refugee Processing Center, • Mail: Jonathan R. Cantor, Acting
resettlement agencies, international SUMMARY: In accordance with the Chief Privacy Officer, Privacy Office,
organizations, and local sources at Privacy Act of 1974, the Department of Department of Homeland Security,
overseas sites. DHS/USCIS personnel Homeland Security (DHS) proposes to Washington, DC 20528.
may input information as they process update, rename, and reissue a current Instructions: All submissions received
a case, including information from DHS system ofrecords titled, "DHS// must include the agency name and
internal and external sources to verify U.S. Immigration and Customs docket number for this rulemaking. All
whether a benefit requestor or family is Enforcement (ICE)- 011 Immigration and comments received will be posted
eligible for the refugee benefit Enforcement Operational Records without change to http:/ I
requested. Refugee Case Process and (ENFORCE)" system of records. DHS/ www.regulations.gov, including any
Security Screening also stores and uses ICE collects, uses, and maintains personal information provided.
information from the following USCIS, ENFORCE to support the identification, Docket: For access to the docket to
DHS, and other federal agency systems apprehension, and removal of read background documents or
of records: individuals unlawfully entering or comments received, please visit http://
• DHS/USCIS/ICE/CBP-001 Alien present in the United States in violation www.regulations.gov.
File, Index, and National File Tracking of the Immigration and Nationality Act,
System of Records, 78 FR 69864 including fugitive aliens. DHS/ICE also FOR FURTHER INFORMATION CONTACT: For
(November 21, 2013); uses ENFORCE to support the general questions, please contact:
• DHS/USCIS-002 Background Check identification and arrest of individuals Amber Smith, (202-732-3300), Privacy
Service, 72 FR 31082 (June 5, 2007); (both citizens and non-citizens) who Officer, U.S. Immigration and Customs
• DHS/USCIS- 003 Biometric Storage commit violations of federal criminal Enforcement, 500 12th Street SW., Mail
System, 72 FR 17172 (April 6, 2007); laws enforced by DHS. This system of Stop 5004, Washington, DC 20536. For
• STATE-05, Overseas Citizen records is being created from a privacy questions, please contact:
Services Records (May 2, 2008); previously issued system of records, Jonathan R. Cantor, (202-343-1717),
• STATE- 26, Passport Records, (Mar. DHS/ ICE 011- Immigration and Acting Chief Privacy Officer, Privacy
24, 2015)STATE- 39, DOS Visa Opinion Enforcement Operational Records Office, U.S. Department of Homeland
Information Service (VOIS), 77 FR (ENFORCE). See 80 FR 24,269 (Apr. 30, Security, Washington, DC 20528.
65245, (Oct. 25, 2012); 2015). SUPPLEMENTARY INFORMATION:
2020-ICLl-00023 1362
Federal Register/Vol. 81, No. 202/Wednesday, October 19, 2016/Notices 720 81
I. Background Fourth, the system location and national intelligence and security
security classification have been investigations or to assist in anti-
In accordance with the Privacy Act of updated to indicate that certain records terrorism efforts;
1974, 5 U.S.C. 552a, DHS/ICE is may be replicated from ICE's (P) To disclose information to the U.S.
updating, renaming, and reissuing a Enforcement Integrated Database (EID) Department. of Justice (DOJ) Executive
DHS system of records now titled, and stored on both DHS unclassified Office of Immigration Review (EOIR)
"DHS/Immigrat.ion and Enforcement. and classified networks to allow for and to the Board of Immigration
(ICE)- 011 Criminal Arrest Records and analysis and vetting consistent with Appeals (the entities that adjudicate
Immigration Enforcement Records existing DHS/ICE authorities and immigration cases), to the extent
(CARIER) System of Records." purposes and this published notice. necessary to carry out their authorized
The DHS/ICE update to CARIER Fifth, the title ofthe system manager duties pertaining to the adjudication of
includes several changes. First, the has been updated. matters arising under the INA;
system of records is being renamed to Finally, DHS is proposing to add new (DD) To DOJ and other law
better align it with the purpose of the routine uses that would allow ICE to enforcement or custodial agencies to
system. This system of records covers share information from the CARIER facilitate payments and reporting under
records documenting ICE's criminal system of records with the specified the State Criminal Alien Assistance
arrests, and also those documenting recipients for the specified purpose. Program or similar programs;
most of ICE's immigration enforcement DHS is also proposing to delete several (EE) To any law enforcement agency
actions, such as the issuance of routine uses and modify several others or custodial agency (such as a jail or
immigration det.ainers; the arrests, to clarify their meaning and/or to prison) to serve that agency with notice
charging, detention, and removal of expand or limit the scope of the of an immigration detainer, or to update
aliens for administrative immigration information shared. Several of the or remove a previously issued
violations; the search for and routine uses being added to or updated immigration detainer, for an individual
apprehension of fugitive aliens; and ICE in the CARIER SORN are the same believed to be in that agency's custody;
decisions concerning the grant or denial routine uses included in the Department (MM) To courts, magistrates,
of parole to aliens. This system of of Homeland Security/U.S. Customs and administrative tribunals, opposing
records is being created from a Immigration Services (USCIS)/ICE/ counsel, parties, and witnesses, in the
previously issued system of records Customs and Border Protection (CBP)- course of immigration, civil, or criminal
named, DHS/ICE 011-Immigration and 001 Alien File, Index, and National File proceedings (including discovery,
Enforcement Operational Records Tracking (A-File) SORN. 78 FR. 69,864, presentation of evidence, and settlement
(ENFORCE), 80 FR 24,269 (Apr. 30, (Nov. 21, 2013). Although both SORNs negotiations), and when DHS
2015). support the immigration enforcement determines that use of such records is
mission, they often contain different relevant and necessary to the litigation
Second, this update seeks to clarify
the types of individuals whose information about aliens that may need before a court or adjudicative body
to be shared. Therefore, identical or when any of the following is a party to
information is contained in this system
similar routine uses may be needed in or have an interest in the litigation:
of records. Some items in the category
both SORNs to ensure that immigration 1. DHS or any component thereof;
of individuals section have been
information can be shared as needed for 2. Any employee ofDHS in his/her
reorganized and edited to more clearly
law enforcement and other authorized official capacity;
identify the individuals whose records
purposes. 3. Any employee of DHS in his/her
may be present in this system of Below is a summary of the new
records. individual capacity when DOJ or DHS
routine uses and their corresponding has agreed to represent the employee; or
Third, the categories of records letter: 4. The United States, when DHS
section has been expanded to provide a (HJ To prospective claimants and determines that litigation is likely to
more detailed and complete list of the their attorneys for the purpose of affect DHS or any of its components.
types of information contained in the negotiating the settlement of an actual (NN) To federal, state, local, tribal,
system of records. The new categories of or prospective claim against DHS or its territorial, international, or foreign
records added to the system of records current or former employees, in advance government agencies or entities for the
are domestic and foreign criminal of the initiation of formal litigation or purpose of consulting with that agency
history information; information related proceedings; or entity:
to detainees' accounts for telephone or OJ To federal, state, local, tribal, or 1. To assist in making a determination
commissary services in a detention territorial government agencies, or other regarding redress for an individual in
facility; and video recordings of entities or individuals, or through connection with the operations of a DHS
detainees. The CARIER system of established liaison channels to selected component or program;
records also contains detainee foreign governments, in order to provide 2. To verify the identity of an
voiceprints used to verify identity when intelligence, counterintelligence, or individual seeking redress in
a detainee is released under an other information for the purposes of connection with the operations of a DHS
alternative to detention program, as well national security, intelligence, component or program; or
as the actual audio recordings of counterintelligence, or antiterrorism 3. To verify the accuracy of
detainee "check-in" telephone calls. activities authorized by U.S. law, E.O., information submitted by an individual
Additionally, the CARIER system of or other applicable national security who has requested such redress on
records contains recordings of detainee directive; behalf of another individual.
telephone calls made from a detention (K) To federal and foreign government (00) To federal, st.ate, local, tribal,
facility and information about these intelligence or counterterrorism territorial , or foreign governmental
calls such as the date, time, duration, agencies or components when DHS agencies; multilateral governmental
and telephone number called (Note: becomes aware of an indication of a organizations; or other public health
Information for protected telephone threat or potential threat to national or entities, for the purposes of protecting
calls, such as calls with an attorney, is international security, or when such the vi ta! interests of a data subject or
not recorded). disclosure is to support the conduct of other persons, including to assist such
2020-ICLl-00023 1363
72082 Federal Register/Vol. 81, No. 202/Wednesday, October 19, 2016/Notices
agencies or organizations during an (VV) To members of the public, with (DDO) To federal, state, local, tribal,
epidemiological investigation, in regard to disclosure of limited detainee territorial, foreign, or international
facilitating continuity of care, in biographical information for the agencies, after discovery of such
preventing exposure to or transmission purpose of facilitating the deposit of information, if DHS determines: (1) The
of a communicable or quarantinable monies into detainees' accounts for information is relevant and necessary to
disease of public health significance, or telephone or commissary services in a that agency's decision concerning the
to combat other significant public health detention facility; hiring or retention of an individual, or
threats. (WW) To federal, state, local, tribal, or issuance of a security clearance, license,
(PP) To foreign governments for the territorial government agencies seeking contract, grant, or other benefit; and (2)
purpose of providing information about to verify or ascertain the citizenship or Failure to disclose the information is
their citizens or permanent residents, or immigration status of any individual likely to create a substantial risk to
family members thereof, during local or within the jurisdiction of the agency for government facilities, equipment or
national disasters or health emergencies; any purpose authorized by law; personnel; sensitive information; critical
(QQ) To a coroner for purposes of (XX) To DOJ or other federal agency infrastructure; or public safety.
affirmatively identifying a deceased conducting litigation or in proceedings Below is a summary of the routine
individual (whether or not such before any court, adjudicative or uses that are proposed to be modified or
individual is deceased as a result of a administrative body, when necessary to deleted, and their corresponding letter:
crime) or cause of death; assist in the development of such (A) Expanded scope to include
(RR) To a former employee of DHS for agency's legal and/or policy position; sharing with the Offices of the United
purposes of responding to an official (YY) To federal, state, local, tribal, States Attorneys. Also removed sharing
inquiry by federal, state, local, tribal, or with a court, magistrate, administrative
and territorial courts or government
territorial government agencies or tribunal, opposing counsel, parties, and
agencies involved in criminal
professional licensing authorities; or witnesses because routine use LL now
investigation or prosecution, pre-trial,
facilitating communications with a permits sharing with these recipients.
sentencing, parole, probation, bail
former employee that may be relevant (C) Updated to note that records will
and necessary for personnel-related or bonds, or any other aspect of the
criminal justice process, and to defense be provided specifically to the General
other official purposes, when DHS Services Administration rather than to
counsel representing an individual in a
requires information or consultation other Federal Government agencies.
assistance from the former employee domestic criminal proceeding, in order
to ensure the integrity and efficiency of (O) Updated to clarify that records
regarding a matter within that person's will not be given to individuals, but to
former area of responsibility; the criminal justice system by informing
these recipients of the existence of an agencies or organizations performing the
(SS) To federal, state, local, tribal, audit.
territorial, foreign, or international immigration detainer or the individual's
(E) Updated to add the risk of identity
agencies, if the information is relevant status in removal proceedings,
theft or fraud , and harm to economic or
and necessary to a requesting agency's including removal or custodial status/
property interests as additional risks
decision concerning the hiring or location. Disclosure of the individual's
that OHS may determine may be a result
retention of an individual, or the Alien Registration Number (A-Number)
of the suspected or confirmed
issuance, grant, renewal, suspension or and country of birth is also authorized
compromise.
revocation of a security clearance, to facilitate these recipients' use of the Routine use H in the previous version
license, contract, grant, or other benefit; ICE Online Detainee Locator System for of the SORN, which authorized
or if the information is relevant and the purposes listed above; disclosure during court proceedings, has
necessary to a DHS decision concerning (ZZ) To a foreign government to notify been removed and replaced by new
the hiring or retention of an employee, it concerning its citizens or residents routine use MM. The new routine use
the issuance of a security clearance, the who are incapacitated, an contains improved wording that is
reporting of an investigation of an unaccompanied minor, or deceased; clearer about when disclosures may be
employee, the letting of a contract, or (AAA) To family members, guardians, made under these circumstances.
the issuance of a license, grant or other committees, friends, or other agents (I) Updated to enable OHS to share
benefit; identified by law or regulation to information when it deems that such
(TT) To a public or professional receive notification, decisions, and disclosure is necessary to carry out its
licensing organization when such other papers as provided in 8 CFR 103.8 functions and statutory mandates.
information indicates, either by itself or from DHS or EOIR following verification (J) Former routine uses J and K have
in combination with other information, of a familial or agency relationship with been removed and the sharing they
a violation or potential violation of an alien when DHS is aware of indicia permitted is now combined into one
professional standards, or reflects on the of incompetency or when an alien has routine use that authorizes disclosure
moral, educational, or professional been detern1ined to be mentally for the purposes of national security,
qualifications of licensed professionals incompetent by an immigration judge; intelligence, counterintelligence, or
or who those seeking to become (BBB) To an organization or person in antiterrorism activities.
licensed professionals; either the public or private sector, either Routine use L in the previous version
(UU) To an attorney or representative foreign or domestic, when there is a of the SORN has been removed and
(as defined in 8 CFR 1.2 , 202.1, reason to believe that the recipient is or replaced by a n ew routine use K
1001. l(f), or 1202.12) who is acting on could become the target of a particular permitting sharing with federal and
behalf of an individual covered by this terrorist activity or conspiracy, or when foreign government intelligence or
system of records in connection with the information is relevant to the counterterrorism agencies or
any proceeding before U.S. Citizenship protection of life, property, or other vital components in support of national
and Immigration Services (USCIS), ICE, interests of a person. intelligence and security investigations
U.S. Customs and Border Protection (CCC) To clerks and judges of courts or to assist in anti-terrorism efforts.
(CBP), or the EOIR, as required by law exercising naturalization jurisdiction for (N) Updated to clarify that in
or as deemed necessary in the discretion the purpose of granting or revoking disclosing custodial location to family
of the Department; naturalization. members, attorneys, and other agents
2020-ICLl-00023 1364
Federal Register /Vol. 81, No. 202/Wednesday, October 19, 2016/Notices 720 83
acting on the behalf of an alien, the the sharing to developing and citizens and lawful permanent
agency may also disclose if the alien implementing new software or residents. As a matter of policy, DHS
was released from ICE custody and/or technology when the purpose of the extends administrative Privacy Act
transferred to the custody of another software or technology is related to this protections to all individuals when
agency. This authority was implied but system of records. systems of records maintain information
not expressly stated in the previous (LL) (previously routine use GG) on U.S. citizens, lawful permanent
version of routine use N. Also modified Former routine use GG has been residents, and visitors.
to clarify that disclosure is authorized to removed and the sharing it permitted is Below is the description of the OHS/
attorneys representing the alien in any now contained in two new routine uses ICE- 011 Criminal Arrest Records and
legal proceeding, not only immigration to improve clarity: Routine use LL Immigration Enforcement Records
proceedings. permitting the disclosure of information (CARIER) System of Records.
(O) Updated to clarify that via the ICE Online Detainee Locator In accordance with 5 U.S.C. 552a(r),
information can be shared for other System or any successor system, and OHS has provided a report of this
purposes or activities within the scope routine use VV permitting the system of records to the Office of
of the EOIR contract. disclosure of information to facilitate Management and Budget and to
(R) (previously routine use Q) the deposit of monies into detainees' Congress.
Expanded scope to include sharing with accounts for telephone or commissary
services in a detention facility. System of Records
domestic courts and to clarify agencies
collecting the repayment of loans, or Finally, there have been changes Department of Homeland Security
fraudulently or erroneously secured regarding the retention period for some (DHS)/U.S. Immigration and
benefits. records. Retention periods h ave been Enforcement Operations (ICE)- 011
(V) (previously routine use U) added for records concerning paroled
SYSTEM NAME:
Expanded scope to include prosecutions aliens and fugitive aliens maintained in
and/or other law enforcement actions. certain ICE information systems. Also, DHS/ICE- 011 Criminal Arrest
(W) (previously routine use V) the fingerprints and photographs Records and Immigration Enforcement
Expanded scope to include sharing with collected using the booking application Records
federal, state, local, tribal, or territorial EID Arrest Guide for Law Enforcement SECURITY CLASSIFICATION :
law enforcement or correctional (EAGLE), previously known as Mobile Unclassified; Controlled Unclassified
agencies concerning individuals in ICE IDENT, originally were stored for up to
Information (CUI). The data may be
custody that are to be transferred to seven (7) days in the cache of an
retained on the classified networks, but
such agency's custody, in order to encrypted Government laptop or other
this does not change the nature and
coordinate th e transportation, custody, IT device. Now they are stored for up to
character of th e data until it is combined
and care of the individuals. fifty (50) days.
Consistent with DHS's information with classified inforniation.
(X) (previously routine use W)
Expanded scope to include sharing in sharing mission, information stored in SYSTEM LOCATION:
order to arrange other social services. the DHS/ICE-011 Criminal Arrest Records are maintained at DHS/ICE
(Y) (previously routine use X) Records and Immigration Enforcement information technology (IT) systems
Updated to replace ICE with DHS. Records may be shared with other DHS (e.g., the EID and the various ICE
(BB) (previously routine use CC) Components that have a need to know applications associated with it, Parole
Expanded the sharing of custodial the information to carry out their Case Tracking System (PCTS), Online
information to witnesses and national security, law enforcement, Detainee Locator System (DOLS),
in dividuals with a legal responsibility to immigration, intelligence, or other Electronic Travel Document (eTD)
act on behalf of or acting at the request homeland security functions. In System, the contractor-owned IT system
of a victim or witness, as well as addition, DHS/ICE may share supporting ICE's Alternatives to
external victim notification systems. information with appropriate federal, Detention (ATD) program) and
(CC) (previously routine use Y) Scope state, local, tribal, territorial, foreign, or associated electronic and paper files
is narrowed to exclude sharing in order international government agencies located at ICE Headquarters in
to place an immigration detainer on an consistent with the routine uses set Washington, DC, ICE field and attache
individual. Sharing in order to place a forth in this system of records notice. offices, contractor offices, an d detention
detainer is now covered by routine use Th is updated system will be included facilities operated by or on behalf of
DD. Additionally, this routine use in DHS's inventory ofrecord systems. ICE, or that otherwise house individuals
previously was used when ICE was arrested or detained by ICE. Records are
II. Priv acy Act
transferring an individual to another replicated from th e operational DHS/ICE
agency. It has been expanded to allow The Privacy Act embodies fair
IT systems and maintained on DHS
sharing during the course of transfer of information principles in a statu tory
unclassified and classified networks
custody of an individual either to or framework governing the means by
used for analysis and vetting.
from ICE's custody. which Federal Government agencies
(HH) (previously routine use BB) collect, maintain, use, and disseminate CATEGORIES OF INDIVIDUALS COVERED BY THE
Expanded scope to include sharing with individuals' records. The Privacy Act SYSTEM :
the attorney or guardian ad !item of an applies to information that is Categories of individuals covered by
individual's child for purposes of maintained in a "system ofrecords." A this system includ e (1) individuals
allowing the attorney/guardian to "system of records" is a group of any arrested, detained, or removed from the
identify th e location or status of the records under the control of an agency United States for criminal or
individual. from which information is retrieved by administrative violations of the
(KK) (previously routine use FF) the name of an individual or by some Immigration and Nationality Act, or
Expanded scope to includ e sharing with identifying number, symbol, or other individuals issued a Notice to Appear in
territorial government agencies or identifying particular assigned to the immigration court; (2) individuals who
entities or multinational governmental individual. In the Privacy Act, an are the subject of an immigration
agencies. It also expands the purposes of individual is defined to encompass U.S. detainer issued to another law
2020-ICLl-00023 1365
72084 Federal Register/Vol. 81, No. 202/Wednesday, October 19, 2016/Notices
enforcement or custodial agency; (3) • Domestic and foreign criminal • Information related to prosecutorial
individuals arrested by ICE for history (e.g., arrest, charges, discretion determinations;
violations of criminal laws enforced by dispositions, and sentencing, • Property inventory and receipt;
ICE or DHS; (4) individuals who fail to corres_ponding dates, jurisdictions); • In formation related to disciplinary
leave the United States after receiving a • Physical Description (e.g., height, issues or grievances;
final order of removal, deportation, or weight, eye color, hair color, race, • Documents and video recordings
exclusion, or who fail to report to ICE ethnicity, identifying marks like scars, related to alleged misconduct and other
for removal after receiving notice to do tattoos, or birthmarks); incidents involving detainees; and
so (fugitive aliens); (5) individuals who • Biometric (i.e., fingerprints, • Other detention-related information
illegally re-enter the United States after voiceprints, iris images, photographs, (e.g., documentation of an allegation of
departing pursuant to an order of and DNA samples). DNA samples sexual abuse or assault, documentation
voluntary departure or being removed required by DOJ regulation (see 28 CFR of strip and body cavity searches,
from the United States (illegal re- part 28) are collected and sent to the documentation of reasons for
entrants); (6) individuals who request to FBI. DNA samples are not retained or segregation or oth er housing placement,
be removed at their own expense or are analyzed by DHS; and documentation of participation in the
eligible for voluntary removal from the • Information pertaining to ICE's orientation process).
United States pursmmt to sec. 250 of the collection of DNA samples, limited to Detention data for U.S. Marshals
Immigration and Nationality Act; (7) the date and time of a successful Service prisoners:
individuals who are granted parole into collection and confirmation from the • Full Name;
the United States under sec. 212(d)(5) of FBI that the sample was able to be • Date of birth;
the Immigration and Nationality Act sequenced. ICE does not receive or • Country of birth;
(parolees); (8) attorneys or maintain the results of the FBI's DNA • Identification numbers (e.g.,
representatives who represent analysis (i.e., DNA sequences). detainee, FBI, state);
Case-related data: • Book-in/book-out date and time;
individuals listed in the categories • Case number;
above; (9) other individuals whose and
• Record number; • Security classification.
information may be collected or • Case category;
obtained during the course of an Limited health information relevant to
• Charges brought and disposition; an individual's placement in an ICE
immigration enforcement or criminal • Case agent;
matter, such as witnesses, associates, detention facility or transportation
• Data initiated and completed; and
and relatives; (10) persons who post or • Other data describing an event requirements:
arrange bond for the release of an involving alleged violations of criminal • Medical alerts or general
or immigration law (i.e., location; date; information on physical disabilities or
individual from ICE detention, or
time; type of criminal or immigration other special needs or vulnerabilities to
receive custodial property of a detained
alien; and (11) prisoners of the U.S. law violations alleged; type of property facilitate placement in a facility or bed
Marshals Service held in ICE detention involved; use of violence, weapons, or that best accommodates these needs.
facilities. assault against DHS personnel or third Medical records about individuals in
parties; attempted escape; and other ICE custody (i.e., records relating to the
CATEGORIES OF RECORDS IN THE SYSTEM:
related information). diagnosis or treatment of individuals)
Biographic, biometric, descriptive, Information presented to or collected are maintained in DHS/ICE- 013 Alien
historical, and other identifying data, by ICE during immigration and law Medical Records System of Records.
including: enforcement proceedings or activities: Progress, status, and final result of
• Full Name; • Date of birth; removal, prosecution, and other DHS
• Alias(es); • Place of birth; processes and related appeals:
• A-Number; • Marital status; • Information relating to criminal
• Social Security number (SSN); • Education history; convictions;
• Date of birth; • Employment history; • Incarceration;
• Place of birth; • Travel history; and • Travel documents; and
• Nationality; • Other information derived from • Other information pertaining to the
• Fingerprint Identification Number affidavits, certificates, manifests, and actual removal of aliens from the United
(FIN); other documents. This data typically States.
• Federal Bureau of Investigation pertains to subjects, relatives, associates, Contact, biographical, and identifying
(FBI) number; and witnesses. data about Relatives, Attornevs or
• Other unique identifying numbers Detention data on aliens: Representatives, Associates ;,_. Witnesses
(e.g., federal, state, local and tribal • Immigration detainers issued; of an alien in proceedings initiated or
identification numbers); • Transportation information;
• Government-issued identification
conducted by DHS may include:
• Detention-related identification • Full Name;
(e.g., passport, drivers' license): numbers;
o Document type; • Date of birth;
• Detention facility; • Place of birth; and
o Issuing organization; • Security, risk, and custody
o Document number; • Contact or location information
classification;
o Expiration date; • Custody recommendation; (e.g., addresses, phone numbers,
• Visa information; • Flight risk indication; business, or agency name).
• Contact or location information • Book-in/book-out date and time; Data concerning personnel of other
(e.g., known or possible addresses, • Mandatory detention and criminal agencies that arrested, or assisted or
phone numbers); flags; participated in the arrest or
• Employment history; • Aggravated felon status; investigation of, or are maintaining
• Education history; • Other alerts; custody of an individual whose arrest
• Immigration history (e.g., • Information about an alien's release record is contained in this system of
citizenship/naturalization certificate from custody on bond, recognizance, or records may include:
number, removals, explanations); supervision; • Full Name;
2020-ICLl-00023 1366
Federal Register/Vol. 81, No. 202/Wednesday, October 19, 2016/Notices 72085
• Title; non-citizens) who commit violations of necessary and relevant to such audit or
• Contact or location information criminal laws enforced by ICE or DHS. oversight function.
(e.g., addresses, phone numbers, 3. To track the process and results of E. To appropriate agencies, entities,
business, or agency name); and administrative and criminal proceedings and persons when:
• Other information. against individuals who are alleged to 1. DHS suspects or has confirmed that
Data about persons who post or have violated the Immigration and the security or confidentiality of
arrange an immigration bond for the Nationality Act or other laws enforced information in the system ofrecords has
release of an individual from ICE by DHS. been compromised;
custody, or receive custodial property of 4. To support the grant or denial of 2. DHS has determined that as a result
an individual in ICE custody may parole, and tracking of individuals who of the suspected or confirmed
include: seek or receive parole into the United compromise, there is a risk of identity
• Full Name; States. theft or fraud, harm to economic or
• Address; 5. To provide criminal and property interests, harm to an
• Phone numbers; immigration history information during individual, or harm to the security or
• SSN; and DHS enforcement encounters, and to integrity of this system or other systems
• Other information. support background checks on or programs (whether maintained by
Recordings of detainee telephone calls applicants for DHS immigration benefits DHS or another agency or entity) that
when responding as part ofan (e.g., employment authorization and rely upon the compromised
alternative to detention program or of petitions). information; and
detainee calls made in detention 6. To identify potential criminal 3. The disclosure made to such
facilities. Information about these calls activity, immigration violations, and agencies, entities, and persons is
may include: threats to homeland security; to uphold reasonably necessary to assist in
• Date; and enforce the law; and to ensure connection with DHS' efforts to respond
• Time; public safety. to the suspected or confirmed
• Duration; and compromise and prevent, minimize, or
• Phone number called. (Note: ROUTINE USES OF RECORDS MAINTAINED IN THE remedy such harm.
Protected telephone calls, such as calls SYSTEM, INCLUDING CATEGORIES OF USERS AND F. To contractors and their agents,
THE PURPOSES OF SUCH USES: grantees, experts, consultants, and
with an attorney, are not recorded and
information about protected telephone In addition to those disclosures others performing or working on a
calls is not retained.) generally permitted under 5 U.S.C. contract, service, grant, cooperative
Information related to detainees' 552a(b) of the Privacy Act, all or a agreement, or other assignment for DHS,
accounts for telephone or commissary portion of the records or information when necessary to accomplish an
services in a detention facility. contained in this system may be agency function related to this system of
disclosed outside DHS as a routine use records. Individuals provided
AUTHORITY FOR MAINTENANCE OF THE SYSTEM: pursuant to 5 U.S.C. 552a(b)(3) as information under this routine use are
Authority for maintain this system is follows: subject to the same Privacy Act
in 8 U.S.C. 1103, 1225, 1226, 1324, A. To the Department of Justice (DOJ), requirements and limitations on
1357, 1360, and 1365(a)(b); Title 18, including Offices of the United States disclosure as are applicable to DHS
United States Code, Chapters 27, 77, 85, Attorneys, or other federal agency officers and employees.
95, 109A, 110, 113, and 117; Title 31, conducting litigation or in proceedings G. To an appropriate federal, state,
United States Code, Chapter 53, before any court, adjudicative, or local, tribal, territorial, international, or
Subchapter II; Title 50 Appendix, administrative body, when it is relevant foreign law enforcement agency or other
United States Code; The Tariff Act of or necessary to the litigation and one of appropriate authority charged with
1930; Justice for All Act of 2004 (Pub. the following is a party to the litigation investigating or prosecuting a violation,
L. 108-405); DNA Fingerprint Act of or has an interest in such litigation: enforcing, or implementing a law, rule,
2005 (Pub. L. 109-162); Adam Walsh 1. DHS or any component thereof; regulation, or order, when a record,
Child Protection and Safety Act of 2006 2. Any employee or former employee either on its face or in conjunction with
(Pub. L. 109- 248); and 28 CFR part 28, of DHS in his/her official capacity; other information, indicates a violation
"DNA-Sample Collection and Biological 3. Any employee or former employee or potential violation of law, which
Evidence Preservation in the Federal of DHS in his/her individual capacity includes criminal, civil, or regulatory
Jurisdiction;" DHS Delegation Number when DOJ or DHS has agreed to violations and such disclosure is proper
7030.2, Delegation of Authority to the represent the employee; or and consistent with the official duties of
Assistant Secretary for the Bureau of 4. The United States or any agency the person making the disclosure.
Immigration and Customs Enforcement thereof. H. To prospective claimants and their
and the Reorganization Plan B. To a congressional office from the attorneys for the purpose of negotiating
Modification for the Department of record of an individual in response to the settlement of an actual or
Homeland Security (January 30, 2003). an inquiry from that congressional office prospective claim against DHS or its
made at the request of the individual to current or former employees, in advance
PURPOSE{S): whom the record pertains. of the initiation of formal litigation or
The purposes of this system are: C. To the National Archives and proceedings.
1. To support the identification, Records Administration (NARA) or I. To federal, state, local, tribal,
arrest, charging, detention, and removal General Services Administration territorial, or foreign government
of individuals unlawfully entering or pursuant to records management agencies, as well as to other individuals
present in the United States in violation inspections being conducted under the and organizations during the course of
of the Immigration and Nationality Act, authority of 44 U.S.C. 2904 and 2906. an investigation by DHS or the
including fugitive aliens and illegal re- D. To an agency or organization for processing of a matter under DHS's
entrants. the purpose of performing audit or jurisdiction, or during a proceeding
2. To support the identification and oversight operations as authorized by within the purview of immigration and
arrest of individuals (both citizens and law, but only such information as is nationality laws, when DHS deems that
2020-ICLl-00023 1367
72086 Federal Register/Vol. 81, No. 202/Wednesday, October 19, 2016/Notices
such disclosure is necessary to carry out information about aliens who are or may enforcement officers who may be
its functions and statutory mandates or be placed in removal proceedings so working on related law enforcement
to elicit information required by DHS to that EOIR may arrange for the provision matters.
carry out its functions and statutory of educational services to those aliens \IV. To the U.S. Marshals Service
mandates. under EOIR's Legal Orientation (USMS) concerning USMS prisoners
J. To federal, state, local, tribal, or Program, or for other purposes or that are or will be held in detention
territorial government agencies, or other activities within the scope of the EOIR facilities operated by or on behalf of
entities or individuals, or through contract. ICE, and to federal, state, local, tribal, or
established liaison channels to selected P. To disclose information to the DOJ territorial law enforcement or
foreign governments, in order to provide EOIR and to the Board of Immigration correctional agencies concerning
intelligence, counterintelligence, or Appeals, to the extent necessary to carry individuals in DHS custody that are to
other information for the purposes of out their authorized duties pertaining to be transferred to such agency's custody,
national security, intelligence, the adjudication of matters arising in order to coordinate the
counterintelligence, or antiterrorism under the INA. transportation, custody, and care of
activities authorized by U.S. law, E.O., Q. To attorneys or legal these individuals.
or other applicable national security representatives for the purpose of X. To third parties to facilitate
directive. facilitating group presentations to aliens placement or release of an individual
K. To federal and foreign government in detention that will provide the aliens (e.g., at a group home, homeless shelter)
intelligence or counterterrorism with information about their rights who has been or is about to be released
agencies or components when DHS under U.S. immigration law and from DHS custody but only such
becomes aware of an indication of a procedures. information that is relevant and
threat or potential threat to national or R. To federal, state, tribal, territorial, necessary to arrange housing,
international security, or when such or local government agencies or continuing medical care, or other social
disclosure is to support the conduct of domestic courts to assist such agencies services for the individual.
national intelligence and security in collecting the repayment of loans, or Y. To a domestic government agency
investigations or to assist in anti- fraudulently or erroneously secured or other appropriate authority for the
terrorism efforts. benefits, grants, or other debts owed to purpose of providing information about
L. To any federal agency to enable them or to the United States an individual who has been or is about
such agency to make determinations Government, or to obtain information to be released from DHS custody who,
regarding the payment. of federal that may assist DHS in collecting debts due to a condition such as mental
benefits to the record subject in owed to the United States Government. illness, may pose a health or safety risk
accordance with that agency's statutory S. To the Department of State in the to himself/herself or to the community.
responsibilities. processing of petitions or applications DHS will only disclose information
M. To foreign governments for the for benefits under the Immigration and about the individual that is relevant to
purpose of coordinating and conducting Nationality Act, and all other the health or safety risk they may pose
the removal of aliens from the United immigration and nationality laws and/or the means to mitigate that risk
States to other nations under the including treaties and reciprocal (e.g., the individual's need to remain on
Immigration and Nationality Act (INA); agreements; or when the Department of certain medication for a serious mental
and to international, foreign, State requires information to consider or health condition).
intergovernmental, and multinational provide an informed response to a Z. To a domestic law enforcement
agencies, authorities, and organizations request for information from a foreign, agency or other agency operating a sex
in accordance with law and formal or international, or intergovernmental offender registry for the purpose of
informal international arrangements. agency, authority, or organization about providing notice of an individual's
N. To family members and attorneys an alien or an enforcement operation release from DHS custody or removal
or other agents acting on behalf of an with transnational implications. from the United States, when the
alien in immigration or other legal T. To the Office of Management and individual is required to register as a sex
proceedings, to assist those individuals Budget (0MB) in connection with the offender, in order to assist those
in determining whether: (1) The alien review of private relief legislation as set agencies in updating sex offender
has been arrested by DHS for forth in 0MB Circular No. A- 19 at any registries and otherwise carrying out the
immigration violations; (2) the location stage of the legislative coordination and sex offender registration requirements
of the alien if in DHS custody; or (3) the clearance process as set forth in the within their jurisdictions.
alien has been removed from the United Circular. AA. To a domestic law enforcement
States, released from DHS custody, or U. To the U.S. Senate Committee on agency for the purpose of providing
transferred to the custody of another the Judiciary or the U.S. House of notice of an individual's release from
agency, provided however, that the Representatives Committee on the DHS custody or removal from the
requesting individuals are able to verify Judiciary when necessary to inform United States, when the individual has
the alien's date of birth or A-Number, or members of Congress about an alien a conviction(s) for a violent or serious
can otherwise present adequate who is being considered for private crime(s) and the agency receiving the
verification of a familial or agency immigration relief. notification has an interest in the
relationship with the alien, such as a V. To federal, state, local, territorial, individual due to: (1) A pending
Form G-514 or other proof of tribal, international, or foreign criminal, investigation or prosecution, (2) parole
representation in a legal proceeding civil, or regulatory law enforcement or other forms of supervision, or (3) the
(e.g., notice of appearance, court authorities when the information is individual's intended residence or
appointment). necessary for collaboration, location of release falling within the
0 . To the DOJ Executive Office of coordination and de-confliction of agency's jurisdiction.
Immigration Review (EOIR) or its investigative matters, prosecutions, and/ BB. To victims and witnesses
contractors, consultants, or others or other law enforcement actions to regarding custodial information, such as
performing or working on a contract for avoid duplicative or disruptive efforts transfer to another custodial agency or
EOIR, for the purpose of providing and to ensure the safety of law location, release on bond, order of
2020-ICLl-00023 1368
Federal Register/Vol. 81, No. 202/Wednesday, October 19, 2016/Notices 72087
supervision, removal from the United loss of life or serious bodily injury, such 00. To federal, state, local, tribal,
States, or death in custody, about an as disclosure of custodial release territorial , or foreign governmental
individual who is the subject of a information to witnesses who have agencies; multilateral governmental
criminal or immigration investigation, received threats from individuals in organizations; or other public health
proceeding, or prosecution. This would custody. entities, for the purposes of protecting
also authorize disclosure of custodial JJ. To an individual or entity seeking the vital interests of a data subject or
information to individuals with a legal to post or arrange, or who has already other persons, including to assist such
responsibility to act on behalf of a posted or arranged, an immigration agencies or organizations during an
victim or witness (e.g., attorney, parent, bond for an alien to aid the individual epidemiological investigation, in
legal guardian) and individuals acting at or entity in (1) identifying the location facilitating continuity of care, in
the request of a victim or witness; as of the alien; (2) posting the bond; (3) preventing exposure to or transmission
well as external victim notification obtaining payments related to the bond; of a communicable or quarantinable
systems that make such information or (4) conducting other administrative disease of public health significance, or
available to victims and witnesses in or financial management activities to combat other significant public health
electronic form . related to the bond. threats.
CC. To the Federal Bureau of Prisons KK. To federal, state, local, tribal, PP. To foreign governments for the
(BOP) and other federal, state, local, territorial, or foreign government purpose of providing information about
territorial, tribal, and foreign law agencies or entities or multinational their citizens or permanent residents, or
enforcement or custodial agencies for governmental agencies when DHS family members thereof, during local or
the purpose of facilitating the transfer of desires to exchange relevant data for the national disasters or health emergencies.
custody of an individual to or from that purpose of developing, testing, or QQ. To a coroner for purposes of
agency. This will include the transfer of implementing new software or affirmatively identifying a deceased
information about unaccompanied technology whose purpose is related to individual (whether or not such
minor children to the U.S. Department this system of records. individual is deceased as a result of a
of Health and Human Services (HHS) to LL. Limited detainee biographical crime) or cause of death.
facilitate the custodial transfer of such information will be publicly disclosed RR. To a former employee of DHS for
children from DHS to HHS. via the ICE Online Detainee Locator purposes of responding to an official
DD. To DOJ and other law System or any successor system for the inquiry by federal, state, local, tribal, or
enforcement or custodial agencies to purpose of identifying whether a territorial government agencies or
facilitate payments and reporting under detainee is in ICE custody and the professional licensing authorities; or
the State Criminal Alien Assistance custodial location. facilitating communications with a
Program or similar programs. MM. To courts, magistrates, former employee that may be relevant
EE. To any law enforcement agency or administrative tribunals, opposing and necessary for personnel-related or
custodial agency (such as a jail or counsel, parties, and witnesses, in the other official purposes, when DHS
prison) to serve that agency with notice course of immigration, civil, or criminal requires information or consultation
of an immigration detainer, or to update proceedings (including discovery, assistance from the former employee
or remove a previously issued presentation of evidence, and settlement regarding a matter within that person's
immigration detainer, for an individual negotiations) and when DHS determines former area of responsibility.
who is believed to be in that agency's that use of such records is relevant and SS. To federal, state, local, tribal,
custody. necessary to the litigation before a court territorial, foreign, or international
FF. To DOJ, disclosure of DNA or adjudicative body when any of the agencies, if the information is relevant
samples and related information as following is a party to or have an and necessary to a requesting agency's
required by 28 CFR part 28. interest in the litigation: decision concerning the hiring or
GG. To DOJ, disclosure of arrest and 1. DHS or any component thereof; retention of an individual, or the
removal information for inclusion in 2. Any employee ofDHS in his/her issuance, grant, renewal, suspension or
relevant DOJ law enforcement databases official capacity; revocation of a security clearance,
and for use in the enforcement of federal 3. Any employee ofDHS in his/her license, contract, grant, or other benefit;
firearms laws (e.g., Brady Handgun individual capacity when DOJ or DHS or if the information is relevant and
Violence Prevention Act, as amended by has agreed to represent. the employee; or necessary to a DHS decision concerning
the NICS Improvement Amendments 4. The United States, when DHS the hiring or retention of an employee,
Act). determines that litigation is likely to the issuance of a security clearance, the
HH. To the attorney or guardian ad affect DHS or any of its components. reporting of an investigation of an
!item of an individual's child, or to NN. To federal, state, local, tribal, employee, the letting of a contract, or
federal, state, local, tribal, territorial, or territorial, international, or foreign the issuance of a license, grant or other
foreign governmental or quasi- government agencies or entities for the benefit.
governmental agencies or courts, to purpose of consulting with that agency TT. To a public or professional
confirm the location, custodial status, or entity: licensing organization when such
removal, or voluntary departure of an 1. To assist in making a determination information indicates, either by itself or
individual from the United States, in regarding redress for an individual in in combination with other information,
order to facilitate the recipients' connection with the operations of a DHS a violation or potential violation of
exercise of responsibilities pertaining to component or program; professional standards, or reflects on the
the custody, care, or legal rights 2. To verify the identity of an moral, educational, or professional
(including issuance of a U.S. passport) individual seeking redress in qualifications of licensed professionals
of the individual's children, or the connection with the operations of a DHS or those seeking to become licensed
adjudication or collection of child component or program; or professionals.
support payments or other similar debts 3. To verify the accuracy of UU. To an attorney or representative
owed by the individual. information submitted by an individual (as defined in 8 CFR 1 .2, 202.1,
II. To any person or entity to the who has requested such redress on 1001.l(f), or 1202.12) who is acting on
extent necessary to prevent immediate behalf of another individual. behalf of an individual covered by this
2020-ICLl-00023 1369
72088 Federal Register /Vol. 81, No. 202/Wednesday, October 19, 2016/Notices
system of records in connection with reason to believe that the recipient is or policies, including all applicable DHS
any proceeding before U.S. Citizenship could become the target of a particular automated systems security and access
and Immigration Services (USCIS), ICE, terrorist. activity or conspiracy, or when policies. Str ict controls have been
U.S. Customs and Border Protection the information is relevan t to th e imposed to minimize the risk of
(CBP), or the EOIR, as required by law protection of life, property, or other vital compromising th e information that is
or as deemed necessary in the discretion interests of a person. being stored. Access to the computer
of the Department. CCC. To clerks and judges of courts system containing the records in this
VV. To members of the public, with exercising naturalization jurisdiction for system is limited to those individuals
regard to disclosure of limited detainee the purpose of granting or revoking who have a need to know the
biographical information for the naturalization. information for th e performance of their
purpose of facilitating the deposit of DDD. To federal, state, local, tribal, official duties and wh o have appropriate
monies into detainees' accounts for territorial, foreign, or international clearances or permissions.
telephone or commissary services in a agencies, after discovery of such
detention facility. RETENTION AND DISPOSAL:
information, if DHS determines: (1) The
WW. To federal, state, local, tribal, or information is relevant and necessary to ICE retains records of arrests,
territorial government agencies seeking that agency's decision concerning the detentions, and removals in EID for one
to verify or ascertain the citizenship or hiring or retention of an individual, or hundred (100) years; records concerning
immigration status of any individual issuance of a security clearance, license, U.S. Marshals Service prisoners for ten
with in the jurisdiction of th e agency for contract, gran t, or other benefit; and (2) (10) years; fingerprints and photographs
any purpose authorized by law. Failure to disclose the information is collected using EAGLE application for
XX. To the Department of Justice likely to create a substantial risk to up to fifty (50) days in the cache of an
(including Offices of the United St.ates government facilities, equipment, or encrypted Governmen t laptop or other
Attorneys) or other federal agency personnel; sensitive information; critical IT device; Enforcement Integrated
conducting litigation or in proceedings infrastructure; or public safety. Database Data Mart (EID- DM),
before any court, adjudicative, or EEE. To the news media and the ENFORCE Alien Removal Module Data
administrative body, wh en necessary to p ublic, with the approval of the Chief Mart (EARM- DM), and ICE Integrated
assist in the development of such Privacy Officer in consultation with Decision Support (!IDS) records for
agency's legal and/or policy position. counsel, when there exists a legitimate seventy-five (75) years; user account
YY. To federal, st.ate, local, tribal, and management records (UAM) for ten (10)
territorial courts or government agencies public interest in the disclosure of the
information, wh en disclosure is years following an individual's
in volved in criminal in vestigation or separation of employment from federal
necessary to preserve confidence in th e
prosecution, pre-trial, sentencing, service; statistical records for ten (10)
integrity of DHS, or when disclosure is
parole, probation, bail bonds, or any years; audit files for fifteen (15) years;
necessary to demonstrate the
other aspect of the criminal justice and backup files for up to one (1)
account.ability of DHS's officers,
process, and to defense counsel month.
employees, or individuals covered by
representing an individual in a domestic ICE retain s records in the PCTS for 25
the system, except to the extent the
criminal proceeding, in order to ensure years from the termination of parole.
Chief Privacy Officer determines that
the integrity and efficiency of the The ODLS uses an extract of EID data
release of the specific information in the
criminal justice system by informing about current detainees and detainees
context of a particular case would
these recipients of the existence of an that were released during the last sixty
constitute an unwarranted invasion of
immigration detainer or the individual's (60) days. Records are retained in ODLS
personal privacy.
status in removal proceedings, for as long as they meet the extract
including removal or custodial status/ DISCLOSURE TO CONSUMER RE PORTING criteria. The eTD System stores travel
location. Disclosure of the individual's AGENCIES: documents for twenty (20) years. The
A-Number and country of birth is also None. ATD system's records are not yet the
authorized to facilitate these recipients' subject of a records schedule, however,
use of the ICE Online Detainee Locator POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
ICE is in the process of developin g one
System for th e purposes listed above. and will propose the records are
DISPOSING OF RECORDS IN THE SYSTEM:
ZZ. To a foreign government to notify retained for ten years from the end of
it concerning its citizens or residents STORAGE: the calendar year in which the alien is
who are incapacitated, an ICE may store information in case file removed from the ATD program.
unaccompanied minor, or deceased. fo lders, cabinets, safes, or a variety of
AAA. To family members, gu ardians, electronic or computer databases and SYSTEM MANAGER AND ADDRESS:
committees, friends, or other agents storage media. Executive Associate Director, Office of
identified by law or regulation to Homeland Security Investigations, U.S.
receive notification, decisions, and RETRIEVABILITY: Immigration & Customs Enforcemen t,
other papers as provided in 8 CFR 103.8 ICE may retrieve records by name, 500 12th Street SW., Wash ington, DC
from th e Department of Homeland biometric identifiers, identification 20536.
Security or Executive Office for numbers including, but not limited to,
Immigration Review following NOTIFICATION PROCEDURE:
A-Number, fingerprint identification
verification of a familial or agency number, SSN, case or record number if The Secretary of Homeland Security
relationship with an alien when DHS is applicable, case related data, or a has exempted this system from the
aware of indicia of incompetency or combination of other personal notification, access, and amendment
when an alien has been determined to identifiers including, but not limited to, procedures of the Privacy Act because it
be mentally incompetent by an date of birth, and nationality. is a law enforcement system. However,
immigration judge. ICE will consider in dividu al requests to
BBB. To an organization or person in SAFEGUARDS: determine wh eth er or not information
either the public or private sector, either ICE safeguards records in this system may be released. Thus, individuals
foreign or domestic, when there is a in accordance with applicable rules and seeking notification of and access to any
2020-ICLl-00023 1370
Federal Register/Vol. 81, No. 202/Wednesday, October 19, 2016/Notices 72089
record contained in this system of is obtained from individuals covered by November 4, 2016, from 9 a.m.-3:30
records, or seeking to contest its this system, and other federal, state, p.m.
content, may submit a request in writing local, tribal, or foreign governments. ADDRESSES: Homeland Security, 1120
to ICE's Freedom of Information Act More specifically, DHS/ICE- 011 records
Vermont Ave. NW., 8th Floor,
(FOIA) Officer, whose contact derive from the following sources:
Washington, DC 20005.
information can be found at http:// (a) Individuals covered by the system
www.ice.gov/foia under "Contacts." and other individuals (e.g., witnesses, FOR FURTHER INFORMATION CONTACT:
When seeking records about yourself family members); Michel Kareis, HSSTAC Designated
from this system of records or any other (b) Other federal, state, local, tribal, or Federal Official, S&T IAO STOP 0205 ,
Departmental system of records your foreign governments and government Department of Homeland Security, 245
request must conform with the Privacy information systems; Murray Lane, Washington, DC 20528-
Act regulations set forth in 6 CFR part (c) Business records; 0205, 202- 254- 8778 (Office), 202- 254-
5. You must first verify your identity, (d) Evidence, contraband, and other 6176 (Fax) Michel.Kareis@hq.dhs.gov
meaning that you must provide your full seized material; and (Email).
name, current address, and date and (e) Public and commercial sources. SUPPLEMENTARY INFORMATION: Due to
place of birth. You must sign your EXEMPTIONS CLAIMED FOR THE SYSTEM: security requirements, screening pre-
request, and your signature must either registration is required for this event.
be notarized or submitted under 28 The Secretary of Homeland Security,
Please see the "REGISTRATION"
U.S.C. 1746, a law that permits pursuant to 5 U.S.C. 552a(j)(2), has
section below.
statements to be made under penalty of exempted this system from the
following provisions of the Privacy Act: The meeting may close early if the
perjury as a substitute for notarization. committee has completed its business.
While no specific form is required, you 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(l),
may obtain forms for this purpose from (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), I. Background
the Chief Privacy Officer and Chief (e)(8); (f); and (g). Additionally, the
Secretary of Homeland Security, Notice of this meeting is given under
Freedom of lnformation Act Officer, the Federal Advisory Committee Act
http://www.dhs.gov!foia or 1- 866--431- pursuant to 5 U.S.C. 552a(k)(2), has
(FACA), 5 U.S.C. appendix (Pub. L. 92-
0486. In addition you should provide exempted this system of records from
the following provisions of the Privacy 463). The committee addresses areas of
the following: interest and importance to the Under
• Explain why you believe the Act: 5 U.S.C. 552a(c)(3); (d); (e)(l),
(e)(4)(G), (e)(4)(H); and (t). When a Secretary for Science and Technology
Department would have information on (S&T), such as new developments in
you; record received from another system has
been exempted in that source system systems engineering, cyber-security,
• Identify which component(s) of the knowledge management and hm,v best to
Department you believe may have the under 5 U.S.C. 552a(j)(2) or (k)(2), DHS
will claim the same exemptions for leverage related technologies funded by
information about you; other Federal agencies and by the
• Specify when you believe the those records that are claimed for the
original primary systems of records from private sector. It also advises the Under
records would have been created; and Secretary on policies, management
• Provide any other information that which they originated and claims any
additional exemptions set forth here. processes, and organizational constructs
will help the FOIA staff determine as needed.
which DHS component agency may Dated: October 5, 2016.
have responsive records. Jonathan R. Cantor, II. Registration
• If your request is seeking records Acting Chief Privacy Officer, Department of To pre-register for the virtual meeting
pertaining to another living individual, Homeland Security. (webinar) please send an email to:
you must include a statement from that [FR Doc. 2016-25197 Filed 10-18-16; 8:45 am] hsstac@hq.dhs.gov. The email should
individual certifying his/her agreement BILLING CODE 9111-28---P include the name(s), title, organization/
for you to access his/her records. affiliation, email address, and telephone
Without this bulleted information the number of those interested in attending.
component(s) may not be able to DEPARTMENT OF HOMELAND For information on services for
conduct an effective search, and your SECURITY individuals with disabilities or to
request may be denied due to lack of request special assistance at the
specificity or lack of compliance with [Docket No. DHS-2016-0084)
meeting, please contact Michel Kareis as
applicable regulations. Homeland Security Science and soon as possible.
In processing requests for access to If you plan to attend the meeting in-
Technology Advisory Committee
information in this system, DHS/ICE person you must RSVP by November 1,
will review not only the records in the AGENCY: Science and Technology 2016. To register, email hsstac@
operational system, but also the records Directorate, DHS. hq.dhs.gov with the following subject
that were replicated on the unclassified ACTION : Committee Management; Notice line: RSVP to HSSTAC Meeting. The
and classified networks, and based on of Federal Advisory Committee Meeting. email should include the name(s), title,
this notice provide appropriate access to organization/affiliation, email address,
the information. SUMMARY: The Homeland Security
and telephone number of those
Science and Technology Advisory interested in attending.
RECORD ACCESS PROCEDURES:
Committee (HSSTAC) will meet on
See "Notification procedure" above. November 3-4, 2016 in Washington, DC. III. Public Comment
CONTESTING RECORD PROCEDURES:
The meeting will be an open session At the end of each open session, there
with both in-person and webinar will be a period for oral statements.
See "Notification procedure" above. participation. Please note that the oral statement
RECORD SOURCE CATEGORIES: DATES: The HSSTAC will meet in- period may end before the time
Records in the system are supplied by person Thursday, November 3, 2016, indicated, following the last call for oral
several sources. In general, information from 10 a.m.-4:25 p.m. and Friday, statements. To register as a speaker,
2020-ICLl-00023 1371
From: ICE Privacy-General Mailbox
Se nt: 18 Apr 2018 17:35:14 +0000
To: l(b)(6 ): I
Subject: FW: Safeguarding Sensitive Personally Identifiable Information
Attachme nts: Fw: Safeguarding Sensitive Personally Identifiable Information
!fh V R)·
Privacy Compliance Specialist
Information Governance and Privacy (IGP)
U.S. Immigration & Customs Enforcement
Direct: (202) 73 b )(6)
Main: (202) 73 b)(6):
From: l<b)(6 ) :
Se nt: Wednesday, April 18, 2018 1:27 PM
To: ICE Privacy-General Mailbox ~~(b-)-( 6_)_
: (-b-)(-7 )-(C
--
) --------~
Subject: Re: Safeguarding Sensitive Personally Identifiable Information
thanks, can you forward me the email and assign to me in POTS? I'll handle this one.
!t h \ U::\ ·
Privacy Compliance Specialist
Information Governance and Privacy (IGP)
U.S. Immigration & Customs Enforcement
Direct: (202) 732 ( b )(6 '
Main: (202) 732 b)(6
2020-ICLl-00023 1372
Good afternoon,
I'm an acting Unit Chief at Domestic Operations and we had a question about privacy issues and
PU or SPII as it relates to our High Profile Removal notifications and other
communication. These notifications are typically shared with government entities within DHS to
provide final notification that a high profile removal is imminent and the operation plan includes
specifics of the removal operation. The broadcast below from Mr. Albence raised some questions
about to whom these notices are sent and what we can have in the Subject line, etc ... I'm happy to
provide more background on the topic if you need to or if you need any additional information.
Thanks,
The purpose of this message is to remind all ERO employees of the importance of protecting
Sensitive Personally Identifiable Information (Sensitive PII).
In our mission to identify, arrest, and remove aliens that are a risk to public safety, ERO collects
Sensitive PII from aliens, citizens, legal residents and visitors, such as Names and Alien
Registration Numbers. We are obligated by law and DHS policy to protect this information to
prevent identity theft or other adverse consequences of a privacy incident or misuse of Sensitive
PU data.
The DHS Performance and Learning Management System (PALMS) offers a mandatory course
titled, "Privacy at DHS: Protecting Personal Information." This course is designed to raise
employee awareness of the importance of maintaining privacy in the workplace and sets out clear
methods for safeguarding Sensitive PII and for reporting any breach or loss of sensitive data.
2020-ICLl-00023 1373
All ERO employees are required to complete the PALMS course annually by September 30,
2018. Visit the PALMS home page a~(b)(?)(E) I In the interim, please take this
opportunity to review the attached DHS factsheet on how to properly collect, use, share and
dispose of Sensitive PII.
A few reminders:
• PII should not be included in the subject lines of email.
• When you send Sensitive PII in email to users with a need to know AND to a non-
dhs.gov account, DHS policy requires ICE employees and contractors to send
Sensitive PII in an encrypted or password protected attachment.
• When you send electronic files in the mail, DHS policy recommends any removable
media (e.g., CD, DVD) is password protected and it must be sent using a tracking number
or return receipt.
To obtain more detailed requirements and recommendations on the safe handling of PII,
download the "Handbook for Safeguarding Sensitive PII" at www.dhs.gov/privacy or contact the
ICE Office oflnformation Governance and Privacy at (202) 732l(b)(6); I
NOTICE: This communication may contain privileged or otherwise confidential information. If you arc not an intended recipient
or believe you have received this communication in error, please do not print, copy, retransmit, disseminate, or otherwise use this
information. Please infonn the sender that you received this message in error and delete the message from your system.
2020-ICLl-00023 1374
From: l(b)(6); (b)(?)(C)
Sent: 18 Apr 2018 17:14:23 +0000
To: ICE Privacy-General Mailbox
Subject: Fw: Safeguarding Sensitive Personally Identifiable Information
Attachments: How to Safeguard Sensitive PII.PDF
Good afternoon,
I'm an acting Unit Chief at Domestic Operations and we had a question about privacy
issues and PII or SPII as it relates to our High Profile Removal notifications and other
communication. These notifications are typically shared with government entities within
DHS to provide final notification that a high profile removal is imminent and the
operation plan includes specifics of the removal operation. The broadcast below from
Mr. Albence raised some questions about to whom these notices are sent and what we
can have in the Subject line, etc ... I'm happy to provide more background on the topic if
you need to or if you need any additional information.
Thanks,
The purpose of this message is to remind all ERO employees of the importance of
protecting Sensitive Personally Identifiable Information (Sensitive PII).
In our mission to identify, arrest, and remove aliens that are a risk to public safety, ERO
collects Sensitive PII from aliens, citizens, legal residents and visitors, such as Names
and Alien Registration Numbers. We are obligated by law and DHS policy to protect this
information to prevent identity theft or other adverse consequences of a privacy incident
or misuse of Sensitive PII data.
The DHS Performance and Learning Management System (PALMS) offers a mandatory
course titled, "Privacy at DHS: Protecting Personal Information." This course is designed
to raise employee awareness of the importance of maintaining privacy in the workplace
2020-ICLl-00023 1375
and sets out clear methods for safeguarding Sensitive PII and for reporting any breach or
loss of sensitive data.
All ERO employees are required to complete the PALMS course annually by September
30, 2018. Visit the PALMS home page at kb)(7)(E) I In the interim, please
take this opportunity to review the attached DHS factsheet on how to properly collect,
use, share and dispose of Sensitive PII.
A few reminders:
• PII should not be included in the subject lines of email.
• When you send Sensitive PII in email to users with a need to know AND to a
non-dhs.gov account, DHS policy requires ICE employees and contractors to
send Sensitive PII in an encrypted or password protected attachment.
• When you send electronic files in the mail, DHS policy recommends any
removable media (e.g., CD, DVD) is password protected and it must be sent using
a tracking number or return receipt.
To obtain more detailed requirements and recommendations on the safe handling of PII,
download the "Handbook for Safeguarding Sensitive PII" at www.dhs. ov/ rivac or
contact the ICE Office oflnformation Governance and Privacy at (202) 732 (b)(6);
NOTICE: This communication may contain privileged or otherwise confidential information. If you are not an intended
recip ient or believe you have received this communication in error, please do not print, copy, retransmit, disseminate,
or otherwise use this information. Please infom1 the sender that you received th is message in error and delete the
message from your system.
2020-ICLl-00023 1376
The Privacy Office
Security
To protect the privacy of individuals, all DHS staff are required by law and DHS policy to proactively safeguard
Personally Identifiable Information (PII) when collecting, accessing, using, sharing, and destroying it. This
factsheet summarizes best practices and DHS policy requirements to prevent a privacy incident during the
information lifecycle, as detailed in the Handbook for Safeguarding Sensitive Pl/, available on the DHS website.
2020-ICLl-00023 1377
DISSEMINATING SENSITIVE PII
• When mailing Sensitive PII externally, encrypt the data, if possible, and use a receipted delivery service
(i.e., Return Receipt, Certified or Registered mail) or a tracking service (e.g., "Track & Return") to ensure
secure delivery is made to the appropriate recipient.
Sensitive PII, including that found in archived emails, must be disposed of when no longer required, consistent
with the applicable records retention schedule. If destruction is required, take the following steps:
• Printed material must be destroyed using an approved cross-cut shredder or burn bag, or secured in a
locked and properly-marked bin.
• Portable electronic devices and computers containing Sensitive PII must be sanitized according to your
Information System Security Manager's standards when no longer needed.
You must report all privacy incidents immediately, whether suspected or confirmed, to your Component Help
Desk, Security Operations Center, Privacy Officer or Privacy Point of Contact, or to the DHS Privacy Office at
the phone number or email below.
• PHONE: 202-343l(b)(6); I
• E-MAIL: (b)(6); (b)(?)(C)
• WEB:
OCTOBER 2017
2020-ICLl-00023 1378
From: Kb)(6); (b)(7)(C) I
Sent: 6 Nov 2018 14:33:35 +0000
To: (b)(6); (b)(7)(C)
Cc:
Subject: Information Sharing Disclosures~ Waiver
Attachments: g-28.pdf, g-639.pd.pdf, HIPAA and Privacy Act Waiver.doc
I hope this is helpful. Please let me know if you have any questions or require assistance. Thank
you
Kind regards,
l(b)(6); (b)(7)(C) I
Privacy Analyst
CBP Detail to ICE Privacy Office
Office of Information Governance and Privacy
U.S. Immigration and Customs Enforcement
(202) 341~(b)(6)1Mobile
Questions? Please visit our website af~b_)(_7_)(_E_) - - - - - - - - - - - - - - ~
2020-ICLl-00023 1379
Notice of Entry of Appearance DHS
as Attorney or Accredited Representative Form G-28
0MB No. 1615-0105
Department of Homeland Security Expires 03/31/2018
3.h. Country
Information About Applicant, Petitioner,
Requestor, or Respondent
4. Daytime Telephone Number
5.a. Famjly Name
(Last Name)
5.b. Given Name
5. Fax Number (First Name)
5.c. Middle Name
6. E-Mail Address (if any)
6. Name of Company or Organization (if applicable)
the attorney or accredited representative ofrecord 2.a D I request DHS send any notice (including Form I-94)
who previously filed Form G-28 in this case, and my on an application, petition, or request to the U.S.
appearance as an attorney or accredited representative business address of my attorney of record or
is at his or her request. accredited representative as listed in this form. I
understand that I may change this election at any
NOTE: If you select this item, also complete Item
future date through written notice to DHS.
Numbers 1.a. - l.b. or Item Numbers 2.a. - 2.c. in
Part 3. (whichever is appropriate). 2.b. D I request that OHS send any secure identity document,
such as a Permanent Resident Card, Employment
4.a. D I am a law student or law graduate working under the Authorization Document, or Travel Document, that I am
direct supervision of the attorney or accredited approved to receive and authorized to possess, to the
representative of record on this form in accordance U.S. business address of my attorney of record or
with the requirements in 8 CFR 292.l(a)(2)(iv). accredited representative as listed in this fonn or to a
designated military or diplomatic address for pickup in a
4.b. Name of Law Student or Law Graduate foreign country (if permitted). I consent to having my
secure identity document sent to my attorney of record
or accredited representative's U.S. business address and
understand that I may request, at any future date and
through written notice to DHS, that DHS send any
Part 4. Applicant, Petitioner, Requestor, or secure identity document to me directly.
Respondent Consent to Representation, Contact
Information, and Signature
NOTE: Use of this form is optional. USCIS accepts any written request, regardless of format, provided that the request complies
with the applicable requirements under the FOIA and the Privacy Act.
3.g. Province
Full Name of the Subject of Record
3.h. Postal Code
2.a. Family Name
3.i. Country (Last Name)
2.b. G iven Name
(First Name)
2.c. Middle N ame
2.e. StateLJ 2.f. ZIP Code I By my signature, I consent to USCIS releasing the
requested records to the requestor (if applicable)
2.g. Province named in Part 2. I also consent to pay all costs
incurred for search, duplication, and review of
2.h. Postal Code documents up to $25 (if filing this request for myselt).
2.i. Country
Signature of Subject of Record
Other Information for the Subj ect of Record Date of Signature (mm/dd/yyyy)
I I I I I
3.d.
I I
6.d.
I I
4.d.
I, _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ , hereby authorize
[Medical Provider's Name] to disclose my
medical information, including but not limited to: diagnosis and patient history, office
notes, test results, consults, billing records, insurance records, to U.S. Customs and
Border Protection (CBP), Department of Homeland Security, or any person who is
authorized by CBP, relating to my treatment at the above-referenced medical provider,
during the dates of _ _ _ _ _ _ _ _ _ _ _. I understand that this medical
information is needed in connection with an investigation into my prior sick leave
requests.
By executing this authorization I knowingly and willfully waive the protections of the
Privacy Act and the Health Insurance Portability and Accountability Act of 1996
(HIP AA) with regard to communications with the medical provider specified herein for
the purposes set fo1ih above.
[Employee's Name]
[Employee's Signature]
Date:
---------------
2020-ICLl-00023 1388
From: ICE Privacy-General Mailbox
Sent: 18 Apr 2018 17:26:37 +0000
To: l(b)(6); (b)(7)(C)I
Subject: FW: Safeguarding Sensitive Personally Identifiable Information
Attachments: How to Safeguard Sensitive PII.PDF
This just came in from rom ERO. I am going to put it in POTS, and in the tracker.
!fb)(6): (b)(7)(C)!
Privacy Compliance Specialist
Information Governance and Privacy (IGP)
U.S. Immigration & Customs Enforcement
Direct: (202) 732 b )(6 )
Main: (202) 73 (b)(6);
Good afternoon,
I'm an acting Unit Chief at Domestic Operations and we had a question about privacy issues and
PU or SPII as it relates to our High Profile Removal notifications and other
communication. These notifications are typically shared with government entities within DHS to
provide final notification that a high profile removal is imminent and the operation plan includes
specifics of the removal operation. The broadcast below from Mr. Albence raised some questions
about to whom these notices are sent and what we can have in the Subject line, etc ... I'm happy to
provide more background on the topic if you need to or if you need any additional information.
Thanks,
The purpose of this message is to remind all ERO employees of the importance of protecting
Sensitive Personally Identifiable Information (Sensitive PII).
In our mission to identify, arrest, and remove aliens that are a risk to public safety, ERO collects
Sensitive PII from aliens, citizens, legal residents and visitors, such as Names and Alien
Registration Numbers. We are obligated by law and OHS policy to protect this information to
prevent identity theft or other adverse consequences of a privacy incident or misuse of Sensitive
PII data.
The DHS Performance and Leaming Management System (PALMS) offers a mandatory course
titled, "Privacy at OHS: Protecting Personal Information." This course is designed to raise
employee awareness of the importance of maintaining privacy in the workplace and sets out clear
methods for safeguarding Sensitive PII and for reporting any breach or loss of sensitive data.
All ERO employees are required to complete the PALMS course annually by September 30,
2018. Visit the PALMS home page at~b)(7)(E) I
In the interim, please take this
opportunity to review the attached DH factsheet on how to properly collect, use, share and
dispose of Sensitive PII.
A few reminders:
• When you send Sensitive PII in email to users with a need to know AND to a non-
dhs.gov account, DHS policy requires ICE employees and contractors to send
Sensitive PII in an encrypted or password protected attachment.
• When you send electronic files in the mail, DHS policy recommends any removable
media (e.g., CD, DVD) is password protected and it must be sent using a tracking number
or return receipt.
To obtain more detailed requirements and recommendations on the safe handling of PII,
download the "Handbook for Safeguarding Sensitive PII" at www.dhs.gov/privacy or contact the
ICE Office oflnformation Governance and Privacy at (202) 732-3300.
NOTICE: This communication may contain privileged or otherwise confidential information. If you are not an intended recipient
or believe you have received this communication in error, please do not print, copy, retransmit, disseminate, or otherwise use this
information. Please inform the sender that you received this message in error and delete the message from your system.
2020-ICLl-00023 1390
The Privacy Office
Security
To protect the privacy of individuals, all DHS staff are required by law and DHS policy to proactively safeguard
Personally Identifiable Information (PII) when collecting, accessing, using, sharing, and destroying it. This
factsheet summarizes best practices and DHS policy requirements to prevent a privacy incident during the
information lifecycle, as detailed in the Handbook for Safeguarding Sensitive Pl/, available on the DHS website.
2020-ICLl-00023 1391
DISSEMINATING SENSITIVE PII
• When mailing Sensitive PII externally, encrypt the data, if possible, and use a receipted delivery service
(i.e., Return Receipt, Certified or Registered mail) or a tracking service (e.g., "Track & Return") to ensure
secure delivery is made to the appropriate recipient.
Sensitive PII, including that found in archived emails, must be disposed of when no longer required, consistent
with the applicable records retention schedule. If destruction is required, take the following steps:
• Printed material must be destroyed using an approved cross-cut shredder or burn bag, or secured in a
locked and properly-marked bin.
• Portable electronic devices and computers containing Sensitive PII must be sanitized according to your
Information System Security Manager's standards when no longer needed.
You must report all privacy incidents immediately, whether suspected or confirmed, to your Component Help
Desk, Security Operations Center, Privacy Officer or Privacy Point of Contact, or to the DHS Privacy Office at
the phone number or email below.
• PHONE:
• E-MAIL:
• WEB:
OCTOBER 2017
2020-ICLl-00023 1392
From: kb)(6); (b)(7)(C)
Sent: 22 May 2018 14:09:43 +0000
To: l(b )(6); (b )(7)(C)
Cc:
Subject: Question regarding Test Fingerprints in EAGLE
b)(5)
Thank you,
rb)(6); (b)(7)(C)
Marc A. Rapp
DHS/ICE US Embassy Rome, Italy
(b)(6); (b)(7)(C)
+39 33 (b)(6);
From~(b)(6): (b)(7)(C)
Date: Monday, May 21, 2018, 8:44 PM
To: Rapp, Marc A i(b)(6): (b)(7)(C)
Cc: l(b)(6): (b)(7)(C)
Subject: FW: Test Prints EAGLE
2020-ICLl-00023 1393
Good Afternoon Marc,
Thank you for providing clarity. Per ou r discussionfb)(6); ~ nd I will work through this request and
provide feedback prior to Friday.
Thank you,
l(b)(6); (b)(7)(C)
W ill do.
Thank you,
~b)(6); (b)(7)(C)
From:Kb)(6); (b)(7)(C) I
Sent: M onday, May 21, 2018 11:51 AM
2020-ICLl-00023 1394
Tot b)(6); (b)(?)(C)
Cc:I
~-------------------------~
Subject: FW: Test Prints EAGLE
l(b)(6); (b)(?)(C) I
kh)fn)- !needs some help obtaining sample prints from EAGLE ""kb""')"'"'
(7....;.)""'
(E=)_ _ _ _ _ _ _ _ _ ___.I Can
you work with the team to obtain?
Thank you,
(b)(6); (b)(7)(C)
Office
Mobile
''The definition ofinsanity is doing the same thing over and over again, but expecting different results".
Unknown
Warning: Thi.s document is UNCLASSfflED//FOR OFFICIAL USE ONLY (U//FOUO). It contains information that may be exempt from public release under the Freedom of
Information Act (5 U.S.C. 552). II is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with OHS policy relating to FOUO information and is
not to be released to the public or other perSonnel who do not ba,·e a \':JUd 11 need-to-k.now11 without prior approval of an aulhorized OHS official. No por1ion of lhi.s repor1 should be
furnished to the media. either in written or \'Crbal form
Marc A. Rapp
DHS ICE US Embass Rome, Italy
(b)(6); (b)(?)(C)
2020-ICLl-00023 1395
Marc,
I think b)(5)
~-------------------------------------------~ Do
you mind if I forward this to the PM in charge of EAGLE to obtain the images?
Thank you,
fb)(6); (b)(7)(C)
(202) 732 b)(6);
(202) 534 b)(7)( obile
(b)(6); (b)(7)(C)
"The definition ofinsanity is doing the same thing over and over again, but expecting different results".
U11k11ow11
Warning: This document is UNCLASSIFl~D/IFOR OF"f.lC IA L USE ONLY (U//f.'OUO). It contains information that may he exempt from public release under the Freedom of
Information Act (S U.S.C. 552). II is 10 be conlrolled, stored. handled, transmilted, distributed, and disposed of in accordance with DHS policy rel.aling to FOCO i_n formation and is
not to be released to the public or other personnel who do not hne a val.id "need-to-know" without prior apprnval of an authorized DHS official. No portion of th~ repol't should be
furnished to the mc<llo, either in wrincn or verbal form
(b)(5)
Thanks.
Marc Rapp
Deputy Attache-Removal
Department of Homeland Security
ICE Attache Office- Rome
+39 335 65 (b)(6 cell)
(b)(6); (b)(7)(C) Email
2020-ICLl-00023 1396
Warning: This document is UNCLASSIFIED USE ONLY {U//FOUO). It contains information that may be exempt from public
release under the Freedom of Information Act (S U.S.C. 552). It 1s lled, stored, handled, t ransmitted, distributed, and d isposed of
in accordance w ith OHS policy relating to FOUO information and is not to be release · or other personnel who do not have a
valid " need-to-know" without prior approval of an authorized OHS official. No portion of this report sifhio
o~uffl"l~iwi:.i~~_!
in written or verbal form.
2020-ICLl-00023 1397
From: CTR)
Sent: ........--.------..-....................- s:Ol +0000
To:
Subject: Privacy Question
Kb)(6); _.
Is the video image of an individual considered PII?
v/r
kb)(6) ; (b)(7)(C)
Information Systems Security Officer
2020-ICLl-00023 1398
From: l(b)(6); (b)(?)(C) JCTR)
Sent: 18 Jan 2018 20:35:01 +0000
To: l(b)(6); (b)(?)(C)I
Subject: Privacy Question
(b)(6);
( h )(7 )(r,)
v/r
Vh)(fl) · (h)(7 )(r,)
Information Systems Security Officer
2020-ICLl-00023 1399