Download:
html
Federal Register, Volume 75 Issue 39 (Monday, March 1, 2010)
[Federal Register Volume 75, Number 39 (Monday, March 1, 2010)]
[Notices]
[Pages 9233-9238]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2010-4102]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
Office of the Secretary
[Docket No. DHS-2009-0071]
Privacy Act of 1974; U.S. Immigration and Customs Enforcement-006
Intelligence Records System of Records
AGENCY: Privacy Office, DHS.
ACTION: Notice of Privacy Act system of records.
-----------------------------------------------------------------------
SUMMARY: In accordance with the Privacy Act of 1974, U.S. Immigration
and Customs Enforcement is modifying an existing system of records
titled the Immigration and Customs Enforcement-006 Intelligence Records
System (Dec. 9, 2008), to clarify the nature of the personally
identifiable information that will be collected and maintained on
individuals. In conjunction with its publication of the Privacy Impact
Assessment for the ICEGangs system, Immigration and Customs Enforcement
is modifying the DHS/ICE-006 Immigration and Customs Enforcement
Intelligence Records system of records notice to more clearly explain
the type of information it gathers on suspected and confirmed gang
members and associates. This DHS/Immigration and Customs Enforcement-
006 Intelligence Records system of records notice updates categories of
individuals; categories of records; purpose of the system; adding a
routine use; and policies and practices for retaining and disposing of
records in the system. Immigration and Customs Enforcement is
soliciting comments on this SORN due to the clarifying changes that
were made since the original publication. A Privacy Impact Assessment
on ICEGangs that describes the system in detail is being published
concurrently with this notice. In addition, this notice addresses one
comment that was received in response to the original publication of
the Immigration and Customs Enforcement Intelligence Records SORN on
December 9, 2008. A final rule is being published concurrently with
this notice in which the Department exempts portions of this system of
records from one or more provisions of the Privacy Act because of
criminal, civil, and administrative enforcement requirements.
DATES: This amended system of records will be effective March 31, 2010.
Written comments must be submitted on or before March 31, 2010.
ADDRESSES: You may submit comments, identified by docket number DHS-
[[Page 9234]]
2009-0071 by one of the following methods:
Federal e-Rulemaking Portal: http://www.regulations.gov.
Follow the instructions for submitting comments.
Fax: 703-483-2999.
Mail: Mary Ellen Callahan, Chief Privacy Officer, Privacy
Office, Department of Homeland Security, Washington, DC 20528.
Instructions: All submissions received must include the
agency name and docket number for this rulemaking. All comments
received will be posted without change to http://www.regulations.gov,
including any personal information provided.
Docket: For access to the docket to read background
documents or comments received go to http://www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: For general questions please contact
Lyn M. Rahilly (202-732-3300), Privacy Officer, U.S. Immigration and
Customs Enforcement, 500 12th Street, SW., Washington, DC 20536. For
privacy issues please contact Mary Ellen Callahan (703-235-0780), Chief
Privacy Officer, Privacy Office, U.S. Department of Homeland Security,
Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
I. Background
The Immigration and Customs Enforcement (ICE) Intelligence Records
(IIRS) system of records was originally established on December 9, 2008
(73 FR 74735), and public comments were solicited for the SORN and the
associated Notice of Proposed Rulemaking (73 FR 74633, Dec. 9, 2008)
which proposed to exempt this system from one or more provisions of the
Privacy Act because of criminal, civil, and administrative enforcement
requirements. Due to urgent homeland security and law enforcement
mission needs, ICE was already maintaining these records when the
original IIRS SORN was published. Recognizing that ICE published a
system of records notice for an existing system, ICE committed to
reviewing and considering public comments, apply appropriate revisions,
and republish the IIRS system of records notice within 180 days of
receipt of comments. A new routine use is also proposed to allow data
sharing between ICE and other law enforcement agencies for the purpose
of collaboration, coordination, and de-confliction of cases.
In addition to the records described in the initial publication of
IIRS, this notice also consists of information maintained by the ICE
Office of Investigations concerning suspected or confirmed gang members
and associates included in a database called ICEGangs. ICEGangs
maintains personal information about individuals who qualify as
suspected or confirmed gang members and associates under ICE criteria.
ICEGangs stores the following data about each gang member and associate
to the extent it is available: Biographic information (name, date of
birth, etc.), immigration status, gang affiliation, physical
description, government-issued identification numbers, photos of the
individual, identities of gang associates, field interview notes, and
criminal history information. ICEGangs also stores general comments
entered by the ICE agent that created the gang member or associate
record as well as a reference to the official evidentiary system of
records where official case files are stored.
ICEGangs has two main purposes. First, it supplements the existing
ICE case management system by providing a consolidated repository of
information on gang members and associates and gang-related activity.
ICEGangs allows ICE agents and support personnel to search gang-
oriented information in a more efficient and effective manner than is
possible in ICE's standard investigative case management system. For
example, an ICE field agent can query ICEGangs for a list of members in
a specific gang. It is not currently possible to perform the same sort
of query using ICE's investigative case management system. As a matter
of policy, ICE agents are required to create and/or update ICEGangs
records for suspected and/or confirmed gang members and associates
whenever they encounter gang members and associates in the field during
their official law enforcement activities. ICEGangs records also
contain references to the official evidentiary system of records, which
allows ICE agents and support personnel to refer to official case
records.
Second, ICEGangs facilitates the sharing of gang information
between ICE and other law enforcement agencies. In particular, ICE
currently provides the California Department of Justice (CalDOJ) access
to the data in ICEGangs. CalDOJ users access ICEGangs through their own
CalGangs application which accesses the ICEGangs repository remotely.
In the future, ICE anticipates that it will share information with
other State and local law enforcement agencies that use the GangNET
software. ICE will require access controls for State and local agencies
as a prerequisite to gaining access to ICEGangs.
II. Public Comment
One public comment was received, but as it did not pertain to the
SORN or proposed rule, it is not addressed here. A final rule is
published concurrently with this notice in this issue of the Federal
Register.
III. Privacy Act
The Privacy Act embodies fair information principles in a statutory
framework governing the means by which the United States Government
collects, maintains, uses, and disseminates personally identifiable
information. The Privacy Act applies to information that is maintained
in a ``system of records.'' A ``system of records'' is a group of any
records under the control of an agency for which information is
retrieved by the name of an individual or by some identifying number,
symbol, or other identifying particular assigned to the individual. In
the Privacy Act, an individual is defined to encompass United States
citizens and legal permanent residents. As a matter of policy, DHS
extends administrative Privacy Act protections to all individuals where
systems of records maintain information on U.S. citizens, lawful
permanent residents, and visitors. Individuals may request access to
their own records that are maintained in a system of records in the
possession or under the control of DHS by complying with DHS Privacy
Act regulations, 6 CFR Part 5.
The Privacy Act requires each agency to publish in the Federal
Register a description denoting the type and character of each system
of records that the agency maintains, and the routine uses that are
contained in each system in order to make agency record keeping
practices transparent, to notify individuals regarding the uses to
which personally identifiable information is put, and to assist
individuals to more easily find such files within the agency. Below is
the description of the Immigration and Customs Enforcement-006
Intelligence Records system of records.
In accordance with 5 U.S.C. 552a(r), DHS has provided a report of
this new system of records to the Office of Management and Budget and
to Congress.
SYSTEM OF RECORDS
DHS/ICE-006
SYSTEM NAME:
ICE Intelligence Records System (IIRS).
SECURITY CLASSIFICATION:
Sensitive But Unclassified, Classified.
[[Page 9235]]
SYSTEM LOCATION:
Records are maintained at ICE Headquarters in Washington, DC, and
field offices.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
Categories of individuals covered by this system include the
following: (1) Individuals (e.g., subjects, witnesses, associates)
associated with immigration enforcement activities or law enforcement
investigations/activities conducted by ICE, the former Immigration and
Naturalization Service, or the former U.S. Customs Service; (2)
individuals associated with law enforcement investigations or
activities conducted by other Federal, State, Tribal, territorial,
local or foreign agencies where there is a potential nexus to ICE's law
enforcement and immigration enforcement responsibilities or homeland
security in general; (3) individuals known or appropriately suspected
to be or have been engaged in conduct constituting, in preparation for,
in aid of, or related to terrorism; (4) individuals involved in,
associated with, or who have reported suspicious activities, threats,
or other incidents reported by domestic and foreign government
agencies, multinational or non-governmental organizations, critical
infrastructure owners and operators, private sector entities and
organizations, and individuals; (5) individuals who are the subjects of
or otherwise identified in classified or unclassified intelligence
reporting received or reviewed by ICE; and (6) individuals who are
known or suspected gang members or associates, including records
maintained in the ICEGangs system.
IIRS includes an information technology system known as the
Intelligence Fusion System (IFS). In addition to the categories of
individuals listed above, IFS also includes the following: (1)
Individuals identified in law enforcement, intelligence, crime, and
incident reports (including financial reports under the Bank Secrecy
Act and law enforcement bulletins) produced by DHS and other government
agencies; (2) individuals identified in U.S. visa, border, immigration
and naturalization benefit data, including arrival and departure data;
(3) individuals identified in DHS law enforcement and immigration
records; (4) individuals not authorized to work in the United States;
(5) individuals whose passports have been lost or stolen; and (6)
individuals identified in public news reports.
CATEGORIES OF RECORDS IN THE SYSTEM:
Categories of records in this system include: (1) Biographic
information (name, date of birth, social security number, alien
registration number, citizenship/immigration status, passport
information, addresses, phone numbers, etc.); (2) Records of
immigration enforcement activities or law enforcement investigations/
activities conducted by ICE, the former Immigration and Naturalization
Service, or the former U.S. Customs Service; (3) Information (including
documents and electronic data) collected by DHS from or about
individuals during investigative activities and border searches; (4)
Records of immigration enforcement activities and law enforcement
investigations/activities that have a possible nexus to ICE's law
enforcement and immigration enforcement responsibilities or homeland
security in general; (5) Law enforcement, intelligence, crime, and
incident reports (including financial reports under the Bank Secrecy
Act and law enforcement bulletins) produced by DHS and other government
agencies; (6) U.S. visa, border immigration and naturalization benefit
data, including arrival and departure data; (7) Terrorist watchlist
information and other terrorism related information regarding threats,
activities, and incidents; (8) Lost and stolen passport data; (9)
Records pertaining to known or suspected terrorists, terrorist
incidents, activities, groups, and threats; (10) ICE-generated
intelligence requirements, analysis, reporting, and briefings; (11)
Third party intelligence reporting; (12) Articles, public-source data,
and other published information on individuals and events of interest
to ICE; (13) Records and information from government data systems or
retrieved from commercial data providers in the course of intelligence
research, analysis and reporting; (14) Reports of suspicious
activities, threats, or other incidents generated by ICE and third
parties; and (15) Additional information about known and suspected gang
members and associates such as biographic information (name, date of
birth, etc.), immigration status, gang affiliation, physical
description, government-issued identification numbers, photos of the
individual, identities of gang associates, field interview notes, and
criminal history information.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301; 8 U.S.C. 1103, 1105, 1225(d)(3), 1324(b)(3), 1357(a),
and 1360(b); 19 U.S.C. 1 and 1509.
PURPOSE(S):
The purpose of this system is:
(a) To maintain records that reflect and generally support ICE's
collection, analysis, reporting, and distribution of law enforcement,
immigration administration, terrorism, intelligence, and homeland
security information in support of ICE's law enforcement and
immigration administration mission.
(b) To produce law-enforcement intelligence reporting that provides
actionable information to ICE's law enforcement and immigration
administration personnel and to other appropriate government agencies.
(c) To enhance the efficiency and effectiveness of the research and
analysis process for DHS law enforcement, immigration, and intelligence
personnel through information technology tools that provide for
advanced search and analysis of various datasets.
(d) To facilitate multi-jurisdictional informational exchange
between ICE and other law enforcement agencies regarding known and
suspected gang members and associates; and
(e) To identify potential criminal activity, immigration
violations, and threats to homeland security; to uphold and enforce the
law; and to ensure public safety.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND THE PURPOSES OF SUCH USES:
In addition to those disclosures generally permitted under 5 U.S.C.
552a(b) of the Privacy Act, all or a portion of the records or
information contained in this system may be disclosed outside DHS as a
routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
A. To the Department of Justice or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or
administrative body, when (1) DHS or any component thereof; (2) any
employee of DHS in his/her official capacity; (3) any employee of DHS
in his/her individual capacity where DOJ or DHS has agreed to represent
the employee; or (4) the United States or any agency thereof, is a
party to the litigation or has an interest in such litigation; and DHS
determines that the records are both relevant and necessary to the
litigation and the use of such records is compatible with the purpose
for which DHS collected the records.
B. To the Department of Justice (DOJ), Civil Rights Division, for
the purpose of responding to matters within the DOJ's jurisdiction to
include allegations of fraud and/or nationality discrimination.
[[Page 9236]]
C. To a congressional office from the record of an individual in
response to an inquiry from that congressional office made at the
request of the individual to whom the record pertains.
D. To the National Archives and Records Administration or other
Federal government agencies pursuant to records management inspections
being conducted under the authority of 44 U.S.C. 2904 and 2906.
E. To an agency, organization, or individual for the purpose of
performing audit or oversight operations as authorized by law, but only
such information as is necessary and relevant to such audit or
oversight function.
F. To appropriate agencies, entities, and persons when: (1) DHS
suspects or has confirmed that the security or confidentiality of
information in the system of records has been compromised; (2) the
Department has determined that as a result of the suspected or
confirmed compromise there is a risk of harm to economic or property
interests, identity theft or fraud, or harm to the security or
integrity of this system or other systems or programs (whether
maintained by DHS or another agency or entity) that rely upon the
compromised information, or harm to an individual; and (3) the
disclosure made to such agencies, entities, and persons is reasonably
necessary to assist in connection with DHS's efforts to respond to the
suspected or confirmed compromise and prevent, minimize, or remedy such
harm.
G. To contractors and their agents, grantees, experts, consultants,
and others performing or working on a contract, service, grant,
cooperative agreement, or other assignment for DHS, when necessary to
accomplish an agency function related to this system of records.
Individuals provided information under this routine use are subject to
the same Privacy Act requirements and limitations on disclosure as are
applicable to DHS officers and employees.
H. To a Federal, State, territorial, Tribal, local, international,
or foreign government agency or entity for the purpose of consulting
with that agency or entity: (1) To assist in making a determination
regarding redress for an individual in connection with the operations
of a DHS component or program; (2) for the purpose of verifying the
identity of an individual seeking redress in connection with the
operations of a DHS component or program; or (3) for the purpose of
verifying the accuracy of information submitted by an individual who
has requested such redress on behalf of another individual.
I. To a former employee of DHS, in accordance with applicable
regulations, for purposes of responding to an official inquiry by a
Federal, State or local government entity or professional licensing
authority; or facilitating communications with a former employee that
may be necessary for personnel-related or other official purposes where
the Department requires information or consultation assistance from the
former employee regarding a matter within that person's former area of
responsibility.
J. To an appropriate Federal, State, local, Tribal, foreign, or
international agency, if the information is relevant and necessary to
the agency's decision concerning the hiring or retention of an
individual or the issuance, grant, renewal, suspension or revocation of
a security clearance, license, contract, grant, or other benefit; or if
the information is relevant and necessary to a DHS decision concerning
the hiring or retention of an employee, the issuance of a security
clearance, the reporting of an investigation of an employee, the
letting of a contract, or the issuance of a license, grant or other
benefit and when disclosure is appropriate to the proper performance of
the official duties of the person receiving the information.
K. To appropriate Federal, State, local, Tribal, or foreign
governmental agencies or multilateral governmental organizations for
the purpose of protecting the vital interests of a data subject or
other persons, including to assist such agencies or organizations in
preventing exposure to or transmission of a communicable or
quarantinable disease or to combat other significant public health
threats; appropriate notice will be provided of any identified health
risk.
L. To a public or professional licensing organization when such
information indicates, either by itself or in combination with other
information, a violation or potential violation of professional
standards, or reflects on the moral, educational, or professional
qualifications of an individual who is licensed or who is seeking to
become licensed.
M. To a Federal, State, Tribal, local or foreign government agency
or organization, or international organization, lawfully engaged in
collecting law enforcement intelligence information, whether civil or
criminal, or charged with investigating, prosecuting, enforcing or
implementing civil or criminal laws, related rules, regulations or
orders, to enable these entities to carry out their law enforcement
responsibilities, including the collection of law enforcement
intelligence.
N. To appropriate Federal, State, local, Tribal, or foreign
governmental agencies or multilateral governmental organizations
responsible for investigating or prosecuting the violations of, or for
enforcing or implementing, a statute, rule, regulation, order, license,
or treaty where DHS determines that the information would assist in the
enforcement of civil, criminal, or regulatory laws.
O. To third parties during the course of an investigation by DHS, a
proceeding within the purview of the immigration and nationality laws,
or a matter under DHS's jurisdiction, to the extent necessary to obtain
information pertinent to the investigation, provided disclosure is
appropriate to the proper performance of the official duties of the
officer making the disclosure.
P. To a Federal, State, or local agency, or other appropriate
entity or individual, or through established liaison channels to
selected foreign governments, in order to provide intelligence,
counterintelligence, or other information for the purposes of
intelligence, counterintelligence, or antiterrorism activities
authorized by U.S. law, Executive Order, or other applicable national
security directive.
Q. To Federal and foreign government intelligence or
counterterrorism agencies when DHS reasonably believes there to be a
threat or potential threat to national or international security for
which the information may be useful in countering the threat or
potential threat, when DHS reasonably believes such use is to assist in
anti-terrorism efforts, and disclosure is appropriate to the proper
performance of the official duties of the person making the disclosure.
R. To an organization or individual in either the public or private
sector, either foreign or domestic, where there is a reason to believe
that the recipient is or could become the target of a particular
terrorist activity or conspiracy, to the extent the information is
relevant to the protection of life or property and disclosure is
appropriate to the proper performance of the official duties of the
person making the disclosure.
S. To international and foreign governmental authorities in
accordance with law and formal or informal international agreements.
T. To the Department of State in the processing of petitions or
applications for benefits under the Immigration and Nationality Act,
and all other immigration and nationality laws
[[Page 9237]]
including treaties and reciprocal agreements.
U. To appropriate Federal, State, local, Tribal, or foreign
governmental agencies or multilateral governmental organizations where
DHS is aware of a need to utilize relevant data for purposes of testing
new technology and systems designed to enhance national security or
identify other violations of law.
V. To appropriate Federal, State, local, Tribal, or foreign
government agencies or multinational government organizations where DHS
desires to exchange relevant data for the purpose of developing new
software or implementing new technologies for the purposes of data
sharing to enhance homeland security, national security or law
enforcement.
W. To a criminal, civil, or regulatory law enforcement authority
(whether Federal, State, local, territorial, Tribal, international or
foreign) where the information is necessary for collaboration,
coordination and de-confliction of investigative matters, to avoid
duplicative or disruptive efforts and for the safety of law enforcement
officers who may be working on related investigations.
X. To the news media and the public, with the approval of the Chief
Privacy Officer in consultation with counsel, when there exists a
legitimate public interest in the disclosure of the information or when
disclosure is necessary to preserve confidence in the integrity of DHS
or is necessary to demonstrate the accountability of DHS's officers,
employees, or individuals covered by the system, except to the extent
it is determined that release of the specific information in the
context of a particular case would constitute an unwarranted invasion
of personal privacy.
DISCLOSURE TO CONSUMER REPORTING AGENCIES:
None.
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING,
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records in this system are stored electronically or on paper in
secure facilities in a locked drawer behind a locked door. The records
are stored on magnetic disc, tape, digital media, and CD-ROM.
RETRIEVABILITY:
Records may be retrieved by personal identifiers such as but not
limited to name, alien registration number, phone number, address,
social security number, or passport number. Records may also be
retrieved by non-personal information such as transaction date, entity/
institution name, description of goods, value of transactions, and
other information.
SAFEGUARDS:
Records in this system are safeguarded in accordance with
applicable rules and policies, including all applicable DHS automated
systems security and access policies. Strict controls have been imposed
to minimize the risk of compromising the information that is being
stored. Access to the computer system containing the records in this
system is limited to those individuals who have a need to know the
information for the performance of their official duties and who have
appropriate clearances or permissions. The system maintains a real-time
auditing function of individuals who access the system. Additional
safeguards may vary by component and program.
RETENTION AND DISPOSAL:
ICE is in the process of drafting a proposed record retention
schedule for the information maintained in IIRS, including system
information stored in IFS. ICE anticipates retaining the records from
other databases in IFS for 20 years, records for which IFS is the
repository of record for 75 years, and ICE-generated intelligence
reports for 75 years. The original electronic data containing the
inputs to IFS will be destroyed after upload and verification or
returned to the source.
ICE is in the process of drafting a proposed record retention
schedule for the information maintained in ICEGangs. ICE anticipates
retaining ICEGangs records for five years from the date the record was
last accessed.
SYSTEM MANAGER AND ADDRESS:
Director, ICE Office of Intelligence, 500 12th Street, SW.,
Washington, DC 20536.
NOTIFICATION PROCEDURE:
The Secretary of Homeland Security has exempted this system from
the notification, access, and amendment procedures of the Privacy Act
because it is a law enforcement system. However, ICE will consider
individual requests to determine whether or not information may be
released. Thus, individuals seeking notification of and access to any
record contained in this system of records, or seeking to contest its
content, may submit a request in writing to the component's FOIA
Officer, whose contact information can be found at http://www.dhs.gov/foia under ``contacts.'' If an individual believes more than one
component maintains Privacy Act records concerning him or her the
individual may submit the request to the Chief Privacy Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410,
STOP-0550, Washington, DC 20528.
When seeking records about yourself from this system of records or
any other Departmental system of records your request must conform with
the Privacy Act regulations set forth in 6 CFR Part 5. You must first
verify your identity, meaning that you must provide your full name,
current address and date and place of birth. You must sign your
request, and your signature must either be notarized or submitted under
28 U.S.C. 1746, a law that permits statements to be made under penalty
or perjury as a substitute for notarization. While no specific form is
required, you may obtain forms for this purpose form the Director,
Disclosure and FOIA, http://www.dhs.gov or 1-866-431-0486. In addition
you should provide the following:
An explanation of why you believe the Department would
have information on you,
Identify which component(s) of the Department you believe
may have the information about you,
Specify when you believe the records would have been
created,
Provide any other information that will help the FOIA
staff determine which DHS component agency may have responsive records,
If your request is seeking records pertaining to another
living individual, you must include a statement from that individual
certifying his/her agreement for you to access his/her records.
Without this bulleted information the component(s) will not be able
to conduct an effective search, and your request may be denied due to
lack of specificity or lack of compliance with applicable regulations.
RECORD ACCESS PROCEDURES:
See ``Notification procedure'' above.
CONTESTING RECORD PROCEDURES:
See ``Notification procedure'' above.
RECORD SOURCE CATEGORIES:
Federal, State, local, territorial, Tribal or other domestic
agencies, foreign agencies, multinational or non-governmental
organizations, critical infrastructure owners and operators, private
sector entities and organizations, individuals, commercial data
providers, and public sources such as news media outlets and the
Internet.
[[Page 9238]]
EXEMPTIONS CLAIMED FOR THE SYSTEM:
Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act,
portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4);
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8);
(f); and (g). Pursuant to 5 U.S.C. 552a (k)(2), this system is exempt
from the following provisions of the Privacy Act, subject to the
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d),
(e)(1), (e)(4)(G), (e)(4)(H), and (f).
Dated: February 24, 2010.
Mary Ellen Callahan,
Chief Privacy Officer, Department of Homeland Security.
[FR Doc. 2010-4102 Filed 2-26-10; 8:45 am]
BILLING CODE 9111-28-P
File Type | text/html |
File Modified | 0000-00-00 |
File Created | 0000-00-00 |