Login
or
Register
Home
»
Trains Magazine
»
Forums
»
General Discussion
»
Does Subsidiezed transit violate free trade agreements?
Edit post
Edit your reply below.
Post Body
Enter your post below.
Page 37 <br />-35- <br />iv. <br />Have any challenges to certifications under section 236A(a)(3) of the <br />INA been brought in habeas corpus proceedings in accordance with <br />section 236A(b)? If so, please identify the case(s) and the status of <br />each proceeding. <br />v. <br />Has the Attorney General released any aliens detained under section <br />236A because the alien was not charged with a criminal offense or <br />placed into removal proceedings within seven days? <br />vi. <br />How many non-certified aliens have received relief from removal and <br />remain detained longer than 6 months since such relief was ordered? <br />Answer to i through vi: Prior to the transfer of INS to DHS, the Attorney <br />General did not use the authority provided by section 412 of the USA PATRIOT <br />Act for the mandatory detention of certified aliens. Numerous aliens who could <br />have been considered for section 236A certifications have been detained since <br />September 11, 2001 and the enactment of the USA PATRIOT Act. It has not <br />been necessary, however, to use the new certification procedure in these particular <br />cases because traditional administrative bond proceedings have been sufficient to <br />detain these individuals without bond. We believe that this authority should be <br />retained for use in appropriate situations. <br />22. <br />On September 20, 2001, the INS issued an interim rule amending the period of time <br />that an alien may be detained while the agency assesses whether to issue a Notice to <br />Appear (NTA), placing the alien in immigration proceedings. Prior to amendment, <br />the INS was required to issue an NTA within 24 hours of the alien’s arrest. As <br />amended, the INS has 48 hours after an alien is arrested to decide whether to issue <br />an NTA, “except in the event of an emergency or other extraordinary circumstance <br />in which case a determination will be made within an additional reasonable period <br />of time.” <br />A. <br />What is the authority for the INS to detain an alien for longer than 48 hours <br />without filing charges? <br />B. <br />How many aliens have been detained for more than 48 hours without being <br />charged under the authority in this regulation? <br />C. <br />What is the longest period that an alien has been detained without being <br />charged under the authority in this regulation? <br />D. <br />Have any challenges to this regulation been brought in judicial proceedings? <br />If so, please identify the case(s) and the status of each proceeding. <br /> <br />Page 38 <br />-36- <br />Answer: Pursuant to the Committee’s April 1, 2003, letter, in light of the transfer <br />of the INS to DHS, we have referred these questions to DHS for a response. We <br />previously provided the Committee with a copy of this referral. <br />23. <br />Since September 11, 2001, the government has required that certain non-citizens <br />from certain Middle Eastern countries register with the INS (or its successor <br />agency). <br />A. <br />How many terrorists or suspected terrorists have been investigated and/or <br />detained as a result of the requirement that non-citizens register with the <br />federal government? <br />B. <br />What is the government’s policy regarding whether non-citizens are able to <br />have counsel present during the registration process, specifically during the <br />interview? <br />C. <br />If counsel are not permitted at any point, what is the government’s authority <br />for denying such right to counsel? <br />Answer: Pursuant to the Committee’s April 1, 2003, letter, in light of the transfer <br />of the INS to DHS, we have referred these questions to DHS for a response. We <br />previously provided the Committee with a copy of this referral. <br />24. <br />Since September 11, 2001, how many individuals have been deported from the <br />United States? To what countries were those individuals deported? What was the <br />racial and ethnic background of such individuals? For what reason were these <br />individuals deported? <br />Answer: Pursuant to the Committee’s April 1, 2003, letter, in light of the transfer of the <br />INS to DHS, we have referred this question to DHS for a response. We previously <br />provided the Committee with a copy of this referral. <br />Attorney General’s Investigative Guidelines <br />25. <br />On May 14, 2002, the Department issued revised investigative guidelines that <br />established procedures for the initiation of investigations by the Federal Bureau of <br />Investigation (“Bureau”). <br />A. <br />Why were the guidelines for General Crimes and Domestic Security <br />Investigations revised when the apparent threat against the United States is a <br />threat from foreign terrorist groups? Do these guidelines apply only to <br />investigations of U.S. citizens? Are U.S. citizens not subject to the foreign <br />intelligence investigative guidelines? <br /> <br />Page 39 <br />-37- <br />Answer: In May 2002, the Attorney General issued a revised version of the <br />Attorney General’s Guidelines on General Crimes, Racketeering Enterprise and <br />Terrorism Enterprise Investigations (the Guidelines). The previous version of the <br />Guidelines also governed criminal investigations of domestic and international <br />terrorism. The revision of the Guidelines was critical in providing the FBI with <br />the appropriate tools to combat terrorism, because foreign terrorists often engage <br />in conduct that violates the criminal laws of the United States. These guidelines <br />apply to criminal investigations of citizens and non-citizens alike. Similarly, both <br />citizens and non-citizens are subject to the classified foreign intelligence <br />guidelines, though in certain instances standards in those guidelines are different <br />for U.S. persons and non-U.S. persons. <br />B. <br />The new guidelines allow FBI agents to attend a public event, such as a <br />political demonstration or a religious service, and to use data mining services, <br />provided doing so is for the purpose of preventing or detecting terrorism. <br />How will it be determined that the purpose of attending the event or using <br />the service is to prevent or detect terrorism? How does the amount of <br />evidence establishing that predicate differ from the amount of evidence that <br />would be sufficient to check out leads or open a preliminary inquiry? What <br />level of predication is required to permit FBI agents to attend public events <br />or to use data mining services? <br />Answer: The revised Attorney General’s Guidelines were designed to afford FBI <br />agents the same degree of access to publicly available information as all other <br />members of the general public enjoy. The old Guidelines did not clearly authorize <br />agents to gather information for counterterrorism or other law enforcement <br />purposes – for example, by visiting public places, or researching publicly <br />available information – unless they were looking into particular crimes or criminal <br />enterprises. In effect, agents had to wait for terrorist plots to develop, and for <br />some lead or evidence to come from others, before they could begin gathering <br />information. The revised Guidelines were designed to enable law enforcement to <br />proactively gather intelligence that could be useful to detecting and preventing <br />terrorist attacks, by attending public events or collecting publicly available <br />information. <br />Agents can do so, however, only to the extent that such events or information are <br />available to any other member of the general public. Part VI.A.2 of the Attorney <br />General’s Guidelines specifically provides that “[f]or the purpose of detecting or <br />preventing terrorist activities, the FBI is authorized to visit any place and attend <br />any event that is open to the public, on the same terms and conditions as members <br />of the public generally.” The Guidelines specifically mandate that “[n]o <br />information obtained from such visits shall be retained unless it relates to <br />potential criminal or terrorist activity” and prohibit the FBI from “maintaining <br /> <br />Page 40 <br />-38- <br />files on individuals solely for the purpose of monitoring activities protected by the <br />First Amendment or the lawful exercise of any other rights secured by the <br />Constitution or laws of the United States.” <br />The Guidelines also authorize the FBI to operate and participate in identification, <br />tracking, and information systems for the purpose of identifying and locating <br />terrorists, excluding or removing from the United States alien terrorists and alien <br />supporters of terrorist activity as authorized by law, assessing and responding to <br />terrorist risks and threats, or otherwise detecting, prosecuting, or preventing <br />terrorist activities. <br />The Guidelines authorize the FBI to engage in these activities (subject to certain <br />limitations, including those mentioned above) in the absence of a pre-existing lead <br />or specific predication. This authority is designed to enable the FBI to draw <br />proactively on available sources of information in order to prevent acts of <br />terrorism. The determination whether a proposed use of this authority is for the <br />purpose of preventing or detecting terrorism is made by the relevant FBI field <br />office, and an agent who attends a public event when unrelated to preventing or <br />detecting terrorism is subject to sanction for violating the Guidelines. <br />The Guidelines also recognize three levels of investigative activity: (1) the prompt <br />and extremely limited checking out of initial leads; (2) preliminary inquiries <br />(which are undertaken when there is information or an allegation that indicates the <br />possibility of criminal activity and the responsible handling of which requires <br />some further scrutiny beyond checking initial leads); and (3) full investigations <br />(which may be initiated where facts or circumstances reasonably indicate that a <br />federal crime has been, is being, or will be committed). <br />C. <br />Since the issuance of these guidelines, how many religious sites (mosques, <br />churches, temples, synagogues, etc.) have federal authorities entered in an <br />official capacity without disclosing their identities? Please provide the total <br />number of such sites and a breakdown of how many were affiliated with each <br />particular type of site (mosque, church, temple, synagogue, etc.). <br />When agents visit religious sites pursuant to AG guidelines, what <br />investigative tools are they permitted to use (i.e., wearing a wire, placing a <br />listening device in the site)? If the information obtained from such visits is <br />found unrelated to any criminal or terrorist investigation, when is such <br />information destroyed and in what manner? Have, and if so provide details, <br />any terrorism-related investigations or prosecutions resulted from such <br />visits? <br />Answer: The revised Attorney General’s Guidelines clarify that agents who are <br />investigating individuals with ties to religious groups may use the same <br /> <br />Page 41 <br />-39- <br />techniques they would use when investigating any other person. Individuals <br />affiliated with religious entities are not singled out for special scrutiny. But <br />neither will they have effective immunity from lawful investigations. <br />The old Guidelines did not clearly state that FBI agents could investigate terrorists <br />with ties to mosques in the same way they could investigate suspects with ties to <br />other sorts of entities. As a result, agents were reluctant to follow suspected <br />terrorists into mosques – even when those facilities were held open to all members <br />of the general public. The lack of clear authority to proactively collect terrorism- <br />related information may have hampered the FBI’s investigation of Sheik Omar <br />Ahmad Rahman, who was convicted for his role in the 1993 World Trade Center <br />bombing. According to one media account: <br />Although the FBI placed Rahman’s bodyguard and driver under loose <br />surveillance, Rahman himself was never questioned or put before a grand <br />jury. Nor were his offices bugged, according to a former senior FBI <br />official. Records of Rahman’s mosques in Brooklyn and Jersey City were <br />never subpoenaed, and no wiretaps were put on the mosques’ phones, the <br />official said. <br />FBI Wary of Investigating Extremist Muslim Leaders, W <br />ASH <br />. <br />P <br />OST <br />, <br />Oct. 29, 2001, <br />at A04. <br />The new Guidelines simultaneously enhance the FBI’s ability to visit public <br />places and attend public events, and impose significant limitations designed to <br />safeguard the civil liberty and privacy of law-abiding citizens. The new <br />Guidelines allow FBI agents, like any community police officer, to visit public <br />places and attend public events, but only “on the same terms and conditions as the <br />general public.” In addition, the Guidelines prohibit agents from retaining any <br />information from such visits unless it relates to potential criminal or terrorist <br />activity. <br />Because the FBI only retains from such visits information about potential terrorist <br />attacks or other criminal conduct, it does not keep records or statistics reflecting <br />the number of occasions that agents have visited public places. However, in <br />response to numerous requests, officials in the FBI’s Office of the General <br />Counsel recently conducted an informal survey of the FBI’s field offices. Their <br />discussions with approximately 45 field offices indicate that fewer than ten of <br />those offices have conducted investigative activities at mosques since September <br />11, 2001. All but one of those visits were conducted pursuant to, or were related <br />to, open preliminary inquiries or full investigations. In the one reported instance <br />where a visit was conducted pursuant to the Guidelines provision authorizing <br />agents to visit public places and attend public events, no information relating to <br /> <br />Page 42 <br />-40- <br />potential terrorism or criminal activity was found and, therefore, no substantive <br />information from the visit was retained in FBI records. <br />D. <br />Since the issuance of these guidelines, how many public meetings, and what <br />types of such meetings (rallies, town halls), have federal authorities entered <br />in an official capacity without disclosing their identities? <br />When agents visit public meetings pursuant to FBI guidelines, what <br />investigative tools are they permitted to use (e.g., wearing a wire, placing a <br />listening device in the meeting area)? If the information obtained from such <br />visits is found unrelated to any criminal or terrorist investigation, when is <br />such information destroyed and in what manner? Have, and if so provide <br />details, any terrorism-related investigations of prosecutions resulted from <br />such visits? <br />Answer: The new Guidelines allow the FBI to proactively visit public places and <br />attend public events to detect or prevent terrorist activities prior to developing <br />evidence of the possibility of criminal activity or a specific lead. Use of this tool <br />is explicitly limited to the detection and prevention of terrorist activities. If an <br />agent desires to collect evidence of non-terrorism crimes by visiting public places <br />and attending public events, he or she must first be within one of the categories of <br />authorized investigative activity – either the prompt and extremely limited <br />checking out of leads, a preliminary investigation, or a full investigation. <br />The investigative techniques that are authorized during attendance at public places <br />depend upon the stage of the investigation when the public visit occurs. For <br />example, the Guidelines bar the use of non-consensual electronic surveillance <br />except during a full investigation. Moreover, all constitutional, statutory, and <br />regulatory restrictions on the use of any investigative technique must, of course, <br />be observed. <br />FBI agents who visit public places and events may not retain any information <br />unless it relates to terrorism or other criminal activity. As a result, the Department <br />has not maintained centralized statistics on how many times agents attend public <br />meetings. <br />E. <br />Are FBI agents required to record in writing – before they use data mining <br />techniques or attend a public event under the guidelines -- how such activity <br />is for the purpose of detecting or preventing terrorism? <br />Answer: There is currently no requirement that agents record in writing the <br />purpose for which they use information systems. The determination whether a <br />proposed use of this authority is for the purpose of preventing or detecting <br />terrorism is made by the relevant FBI field office, and an agent who attends a <br /> <br />Page 43 <br />-41- <br />public event when unrelated to preventing or detecting terrorism is subject to <br />sanction for violating the Guidelines. <br />F. <br />The changes to the preliminary inquiry procedures extended the period that <br />such an inquiry can remain open and allowed extensions for up to a year <br />without notice to FBI Headquarters. In considering this change, did you find <br />that your field agents had been reluctant to conduct preliminary inquiries <br />because they could not keep them open long enough without burdensome <br />approval requirements? What other problems did the 90-day limit present <br />to agents? What other problems did requiring approval from Headquarters <br />to continue a preliminary inquiry present to agents? How does <br />Headquarters conduct important analysis of information generated by a <br />preliminary inquiry if Headquarters is unaware of the inquiry for a year? <br />Answer: The revised Guidelines extend the period to complete the preliminary <br />inquiry to 180 days. Additional extensions of time may be granted for 90-day <br />periods. The first two extensions may be granted by the Special Agent in Charge <br />(SAC), upon a statement of reasons why further investigative steps are warranted <br />when no “reasonable indication” of criminal activity exists. All extensions <br />following the second extension may only be granted by FBI Headquarters, upon <br />receipt of a written request and the statement of such reasons. <br />The prior 90-day limit did not always afford a sufficient period within which to <br />make an appropriate analysis of the value of continuing the investigation. <br />Finally, agents are required to share foreign intelligence collected during criminal <br />investigations -- including during preliminary inquiries -- with the intelligence <br />community pursuant to the Attorney General’s Guidelines Regarding Disclosure <br />to the Director of Central Intelligence and Homeland Security Officials of Foreign <br />Intelligence Acquired in the Course of a Criminal Investigation, adopted on <br />September 23, 2002. <br />G. <br />The Guidelines now permit a Special Agent in Charge to open a terrorism <br />enterprise investigation without obtaining approval from FBI Headquarters. <br />Instead, Headquarters must only be notified. What is contained in the <br />required notice? Does the notice provide enough of a description of the <br />evidence to permit FBI Headquarters to make an evaluation of the evidence <br />and determine whether the investigation should continue or is it simply a <br />formal notification that such an investigation has been opened and/or is <br />continuing? Will the information in the notification be sufficient to use it to <br />coordinate that investigation with others? <br />Answer: As part of the initiation of a Terrorism Enterprise Investigation (TEI), <br />field offices are required to submit to FBI Headquarters a communication setting <br /> <br />Page 44 <br />4 <br />Attachment E. <br />-42- <br />forth a factual description describing how the predication standards for the <br />initiation of the TEI have been satisfied. Additionally, a Section Chief within the <br />Counterterrorism Division must concur with the initiation of the TEI. FBI <br />Headquarters must also submit to the Department of Justice a memorandum <br />justifying the initiation of the TEI. These procedures are described in Part III.B of <br />the Attorney General’s Guidelines on General Crimes, Racketeering Enterprise <br />and Terrorism Enterprise Investigations. (A copy of the Guidelines is attached.) <br />4 <br />Finally, with respect to coordination of terrorism investigations, field agents are <br />required to share foreign intelligence collected during criminal investigations with <br />the intelligence community pursuant to the Attorney General’s Guidelines <br />Regarding Disclosure to the Director of Central Intelligence and Homeland <br />Security Officials of Foreign Intelligence Acquired in the Course of a Criminal <br />Investigation, adopted on September 23, 2002. Such sharing does not ordinarily <br />occur through FBI Headquarters. <br />H. <br />Who at the Bureau is responsible for making and approving the decision for <br />a field agent to enter a public place, and must such approval be in writing <br />prior to entering the public place? <br />Answer: The Guidelines do not require supervisory approval before an agent <br />enters a public place on the same terms and conditions as members of the public <br />generally. <br />I. <br />After a field agent visits a public place or event, are any notes or other <br />records of what he or she observed retained? If so, under what <br />circumstances, for what reasons, and for how long are they retained? Under <br />what circumstances is information related to protected 1 <br />st <br />Amendment <br />activity retained in FBI or DOJ files? Are any records retained if a <br />preliminary inquiry is never opened? <br />Answer: No substantive information obtained from the visit may be retained <br />unless it relates to potential criminal or terrorist activity. If information obtained <br />during the visit rises to the level of a lead, such information must be properly <br />documented, including a statement describing how the information is related to <br />potential criminal and/or terrorist activity, and then filed accordingly. If the visit <br />does not develop information relating to potential criminal or terrorist activity, an <br />agent must note in the file the date, time and place visited and that the visit had <br />negative results. <br />J. <br />Who has access to any records and how does the FBI keep them secure? <br /> <br />Page 45 <br />-43- <br />Answer: The FBI is subject to numerous laws, regulations, and policies <br />regarding access to and the security of FBI systems and records. Safeguards <br />include maintaining records in limited access space and password protections on <br />computerized data. All FBI personnel are required to pass an extensive <br />background investigation. Information is accessed only by authorized FBI <br />personnel or by non-FBI personnel properly authorized to assist in the conduct of <br />an agency function related to the information. <br />K. <br />Given the transfer of a substantial number of agents into terrorism <br />investigations, what training did those agents receive on the use of the <br />Guidelines? <br />Answer: One hundred of the agents transferred to counterterrorism squads have <br />received training on the Guidelines at the Basic Counterterrorism Operators In- <br />service at the FBI Academy in Quantico, Virginia; 160 more agents will receive <br />this training at the same course that started April 21, 2003. In January 2003, <br />training on the revised Guidelines was given at the annual Chief Division Counsel <br />(CDC) conference. The goal was to enable the CDCs to provide subsequent <br />training to agents stationed in their respective field offices. In addition, <br />instruction on the revised Guidelines was given during a recent Joint Terrorism <br />Task Force conference. <br />L. <br />With the FBI’s authority to “data mine” under the Guidelines, many fear <br />that the FBI will have too much information and that the Bureau does not <br />currently have the tools necessary to make good use of intelligence or to keep <br />vast amounts of information secure. What has been done and is being done <br />to improve the Bureau’s ability to interpret all of this new data? What <br />security measures have been implemented to prevent unauthorized access to <br />such data? <br />Answer: The Secure Counterterrorism Operational Prototype Environment <br />(SCOPE) and Investigative Data Warehouse constitute the FBI’s programs to <br />provide current technologies to investigators and analysts and to collaborate with <br />its law enforcement and intelligence partners. SCOPE will allow the FBI to use a <br />number of specialized tools to identify and present hidden relationships found in <br />data. The FBI is also utilizing software products that allow for the search, <br />retrieval, and categorization of information. In addition, the CIA and NSA are <br />helping to upgrade the FBI’s analytic tradecraft by training and co-locating their <br />personnel with FBI analysts. <br />With respect to security, please see the answer to question (J), supra. The same <br />FBI security measures apply for preventing unauthorized access to law <br />enforcement data. It is restricted to those with a need to know and is limited to <br />official duties. Access to all data is logged and recorded. Specifically, the FBI <br /> <br />Page 46 <br />-44- <br />Special Technologies Applications Section (STAS) implements user-access- <br />control by issuing a user-ID and password to every authorized user. It implements <br />role-based security by assigning every user to roles that are required for their <br />position, and labels every record in the database with necessary tags to protect the <br />confidentiality of the data. Distribution procedures require that all reports be <br />vetted through an FBI agent who reviews the dissemination list and report <br />produced. <br />M. <br />Since the Guidelines permit the use of “publicly available” information, what <br />efforts are going to be made to verify the accuracy of the data retrieved? <br />Will agents be required to attempt to independently verify retrieved <br />information for accuracy? <br />Answer: Safeguards to ensure the accuracy and reliability of information are <br />essential components of any effective information system. Pursuant to a directive <br />of the Director of the FBI, Reports Officers are being assigned to Headquarters <br />and Field Offices to vet information provided to law enforcement, intelligence, <br />and policy entities and to ensure its accuracy. <br />In collecting information for law enforcement purposes, it is impossible to <br />determine in advance what specific information is relevant, timely, and complete. <br />With the passage of time information may acquire new significance as further <br />investigation brings new details to light. Trained investigators and analysts <br />exercise due diligence to verify information through links, relationships, and other <br />interpretations discovered during investigative efforts. <br />N. <br />What type of supervision will be required when agents use data mining? <br />Will field agents be able to initiate data mining on their own or will they be <br />required to obtain approval from a supervisor? <br />Answer: Since all FBI personnel using information systems will have the proper <br />security clearance, access and need to know, general supervision guidelines will <br />apply. Agents are able to access information systems based on their own <br />investigative need and authorization, and the system will keep track of where and <br />what is accessed. Supervisors can review this information as necessary. <br />O. <br />What data mining services has the FBI used? How long will data obtained <br />through data mining be retained and how will it be indexed? <br />Answer: The FBI does not use a data mining service but typically uses search <br />engines, queries and indexing programs in order to collate and access its <br />information systems. Search results from such information systems will be <br />maintained in accordance with the Federal Records Act and applicable records <br /> <br />Page 47 <br />-45- <br />disposition schedules. Data is indexed in accordance with FBI Indexing <br />Guidelines. <br />P. <br />In its May 2002 Report on Financial Privacy, Law Enforcement, and <br />Terrorism, the Prosperity Task Force on Information Exchange and <br />Financial Privacy outlined many problems with sharing too much <br />information with too many countries and without proper controls. How has <br />the FBI protected against the wide distribution of information to too many <br />countries without proper controls? <br />Answer: The FBI, Department of Justice, and Intelligence Community have <br />substantial controls on dissemination of information to foreign countries. These <br />controls are extensive and complex in nature and are applied according to the <br />manner in which information is obtained and disseminated. For example, any <br />dissemination of information first depends upon the means by which it was <br />collected/obtained – e.g., via federal grand jury or other subpoena process, court <br />authorized criminal search warrants and Title III electronic surveillance orders, <br />consent searches, FISA-authorized searches and surveillance collections, National <br />Security Letters, and other sensitive and classified intelligence collection methods <br />and sources. <br />Dissemination of information obtained via criminal court authorized processes is <br />subject to controls imposed by various court orders, statutes, and the Federal <br />Rules of Criminal Procedure. Dissemination of information obtained or derived <br />from FISA is likewise subject to controls imposed by the FISA and the Foreign <br />Intelligence Surveillance Court. Furthermore, the FBI’s National Security Law <br />Unit and the Department’s Office of Intelligence Policy and Review are consulted <br />on and provide appropriate advice on dissemination of FISA and foreign <br />intelligence information. Information obtained or derived from the FISA process <br />is always appropriately marked as such to ensure any dissemination complies with <br />relevant procedures and controls. With regard to foreign intelligence information, <br />the Director of Central Intelligence formulates policy concerning relationships <br />between the U.S. Intelligence Community and foreign intelligence services. <br />Classified information is designated by established classification levels and <br />marked according to established classification standards which include <br />appropriate controls over dissemination of the information. As is the case with <br />information obtained or derived from grand jury subpoenas and Title III orders, <br />the USA PATRIOT Act removed many barriers to the timely sharing of <br />information between counterintelligence and counterterrorism intelligence <br />operations and criminal investigations. While many barriers have been removed, <br />extensive controls over dissemination of information still remain. With regard to <br />information obtained or derived from other than the means addressed above, <br />dissemination to foreign governments is carefully scrutinized and evaluated <br />according to a number of factors ranging from the sensitivity and potential <br /> <br />Page 48 <br />-46- <br />importance of the information to the status of the country to which the <br />information is to be provided, and is evaluated in context with the reason the <br />information was requested and the intended use of the information. In short, the <br />FBI does not and cannot haphazardly disseminate information to foreign countries <br />without proper controls and careful evaluation. <br />Q. <br />Since Syria, Cuba, Libya, Iran, Iraq, China, and others are members of <br />Interpol and share in the international information exchange system, what <br />procedures prevent these countries from receiving information on terrorist <br />suspects who may be supported by participating countries? <br />Answer: The information provided by an Interpol Member Country remains the <br />Member Country’s information and that Member Country controls the distribution <br />and use of that information and can ask for the information to be deleted or <br />adapted. For example, when a Member Country, providing information to the <br />Interpol General Secretariat (IPSG), asks for database checks to be completed or <br />queries other Member Countries and provides a copy to the IPSG, the Member <br />Country provides information regarding any further distribution of this <br />information. The Member Country may advise that the information cannot be <br />released without prior authorization, may specifically state which countries, <br />regions or zones can receive the information, or may designate that the <br />information can be provided to all Interpol Member Countries. Most Member <br />Countries utilize a mixture of all three options, depending on the sensitivity of the <br />investigation and the specific information. Many Member Countries also have a <br />routine rule regarding most police information, including or excluding specific <br />countries or regions. As such, information provided by the United States remains <br />U.S. information, and the U.S. controls the distribution and use of that <br />information. <br />R. <br />The Guidelines permit acceptance and retention of information “voluntarily <br />provided by private entities.” What will the FBI do to ensure the accuracy of <br />the information received from such sources? To what extent have such <br />“private entities” been third parties as opposed to the specific individuals to <br />whom the information pertained? How does the Department interpret <br />“voluntarily” (e.g., does it mean the information was unsolicited, was <br />provided pursuant to a government request, or was provided pursuant to a <br />government subpoena?)? <br />Answer: Evaluation of source information has always been a fundamental <br />component of FBI investigations. Historically, agents have received information <br />from various sources, including criminal informants, anonymous callers, or other <br />sources of information. The decision to take action based on such information, its <br />use in obtaining investigative tools such as search warrants and electronic <br />surveillance court orders, and ultimately the use of such information in a criminal <br /> <br />Page 49 <br />-47- <br />prosecution have always required an assessment of the reliability of the <br />information provided by the source and/or the credibility of the source of <br />information. <br />The FBI does not have readily available data indicating to what extent private <br />entities voluntarily providing information have been third parties, as opposed to <br />specific individuals to whom the information pertained. <br />The FBI interprets “voluntarily” as meaning the information was provided other <br />than in response to compulsory process (e.g., a grand jury or other subpoena). <br />S. <br />Where and how is information obtained through data mining stored? Is <br />access to data obtained through data mining limited to those involved in a <br />particular investigation? How is erroneous information corrected or purged, <br />if at all? Has the Department issued written policies to provide guidance in <br />this area? Does it plan to issue such policies? <br />Answer: To the extent that Department activities in the collection, use or <br />dissemination of records are subject to Privacy Act restrictions, the Department <br />must comply with these restrictions, regardless of the medium involved. <br />Information obtained by the FBI is stored in appropriate FBI systems in both hard <br />copy and electronic format. Access to data is governed by applicable legal <br />restrictions, including the Privacy Act. Amendment or correction of data is <br />conducted in accordance with the Privacy Act. Sections 16.40 to 16.55 of Title <br />28, Code of Federal Regulations, contain Department of Justice Privacy Act rules. <br />Has, and from what companies, the Department purchased information or <br />entered into contracts with data mining companies? To what extent and how <br />will persons listed in such information be able to correct errors or <br />inaccuracies? <br />Answer: The Department has purchased information or entered into contracts <br />with companies that warehouse public source information. Persons listed in those <br />data collections should seek to correct errors or inaccuracies with source agencies. <br />The FBI has access to Lexis/Nexis news, public source and financial data on a <br />query basis; however, it is currently not aggregated with any other data. <br />Commercial data from Choicepoint and iMap is also available for our unclassified <br />users and its use is based on acceptable DOJ privacy constraints. The FBI also <br />has access to a number of other databases from non-DOJ components of the <br />intelligence community at the classified level that are currently being used for <br />data-mining and pattern recognition. A listing of all the classified databases that <br />are available through Intelink, Intelink-S, and CT-Link should be addressed to the <br />Director of Central Intelligence. Additionally, the FBI has access to a number of <br /> <br />Page 50 <br />-48- <br />unclassified sources from non-DOJ components such as the State Department <br />VISA application database and INS data, as well as unclassified data from the <br />Open Sources Information System (OSIS) as part of the intelligence community. <br />T. <br />Is retained information reviewed at reasonable intervals to determine its <br />continuing relevance to antiterrorism efforts? If so, who is responsible for <br />performing such reviews? <br />Answer: Yes, retained information is reviewed at reasonable intervals to <br />determine its relevance. Reviews may be routinely performed by analysts, case <br />agents, task force members, supervisors, and legal counsel. In the course of an <br />investigation, trained investigators and analysts exercise due diligence to verify <br />information through links, relationships and other interpretations discovered <br />during the use of information systems and other investigative efforts. <br />Miscellaneous Authorities <br />26. <br />There have been numerous reports that the Department of Justice has detained <br />individuals as material witnesses, presumably pursuant to judicial orders under 18 <br />U.S.C. § 3144, in connection with terrorism investigations. Please provide the <br />Committee with the following information with respect to each such detainee since <br />September 11, 2001: (1) the length of detention of each detainee; (2) the number of <br />such detainees who either sought review of or filed an appeal from a detention order <br />under 18 U.S.C. § 3145; and (3) the results of such review or appeal. <br />A. <br />Were these individuals given access to legal counsel? If not, why not? <br />Answer: Every single person detained as a material witness as part of the <br />September 11 investigation has been represented by counsel. Indeed, material <br />witnesses have the right to a lawyer who can assist them in challenging the <br />legality of the detention at any time. The witnesses get counsel at their first <br />appearance before a judge. The court will appoint free counsel for material <br />witnesses who are financially unable to obtain adequate representation. See 18 <br />U.S.C. § 3006A(a)(1)(G) (“[r]epresentation shall be provided for any financially <br />eligible person who . . . is in custody as a material witness”). Other witnesses may <br />retain counsel of their choice. <br />Every single person detained as a material witness as part of the September 11 <br />investigations was found by a federal judge to have information material to the <br />grand jury’s investigation. An individual may be detained under the material <br />witness statute, 18 U.S.C. § 3144, only when a federal judge concludes that (1) his <br />testimony is “material in a criminal proceeding,” (2) it may become impracticable <br />to secure his presence by subpoena, and (3) he meets the criteria for detention <br />under the Bail Reform Act, 18 U.S.C. § 3142. These witnesses also all have the <br /> <br />Page 51 <br />-49- <br />right to be presented promptly before a judge to have bond set and to argue that <br />they should be released on bond. In some cases, the Government has agreed to <br />release individuals on bond, and courts have released witnesses on bond in a few <br />additional cases. See, e.g., United States v. Awadallah, 202 F. Supp. 2d 55 <br />(S.D.N.Y. 2002). Material witnesses have status hearings in court, when <br />requested by their counsel or scheduled by the judge, regarding the length of their <br />detention and progress toward obtaining their testimony. <br />We note that Rule 6(e) requires secrecy of everyone involved in the grand jury <br />process except the witness. Thus, each of the detained material witnesses is free <br />to identify himself publicly. The fact that few have elected to do so suggests they <br />wi***heir detention to remain non-public. <br />With respect to the request for details about material witnesses detained during <br />terrorism investigations, the Department of Justice has consistently taken the view <br />that Federal Rule of Criminal Procedure 6(e) and court orders in individual cases <br />prohibit it from revealing the exact numbers of material witnesses who are <br />detained pending their testimony before a grand jury. The Department also cannot <br />reveal the details of cases, as that would reveal the direction and focus of secret <br />grand jury proceedings. In addition, disclosing such specific information would <br />be detrimental to the war on terror and the investigation of the September 11 <br />attacks. Thus, it continues to be imperative that the specific number of material <br />witnesses detained as part of the September 11 investigation, the districts and <br />investigations to which they relate, and the length of their detention not be <br />released. <br />Likewise, the Department cannot provide the number of detainees who may have <br />appealed their detention orders, or the results of such appeals, except where they <br />have been made public by the courts. See, e.g., United States v. Awadallah, 202 <br />F. Supp. 2d 55 (S.D.N.Y. 2002); In re the Application of the United States for a <br />Material Witness Warrant, 213 F. Supp. 2d 287, 288 n.1 (S.D.N.Y. 2002) (neither <br />the witness’s name nor identifying facts are set forth in the opinion because the <br />matter was sealed as proceedings ancillary to grand jury proceedings). We note <br />that the use of the material witness statute is rarely challenged on appeal, probably <br />because the use of the statute in grand jury proceedings is an appropriate law <br />enforcement technique authorized by Congress, routinely used by the Department, <br />and repeatedly approved by federal courts nationwide. See Bacon v. United <br />States, 449 F.2d 933 (9th Cir. 1971), In re the Application of the United States for <br />a Material Witness Warrant, 213 F. Supp. 2d 287 (S.D.N.Y. 2002). <br />There have been some misconceptions in the public about the number of material <br />witness warrants that the Government issued as part of its September 11 <br />investigation, as well as the circumstances, length, and terms of these detentions. <br />Notwithstanding the restrictions noted above on releasing specific information <br /> <br />Page 52 <br />-50- <br />about material witnesses, the Department is able to provide some general <br />information about these material witnesses: <br />• <br />As of January 2003, the total number of material witnesses detained in the <br />course of the September 11 investigation was fewer than 50. <br />• <br />Approximately 90% of these material witnesses were detained for 90 days <br />or less. <br />• <br />Approximately 80% of these material witnesses were detained for 60 days <br />or less. <br />• <br />Approximately 50% of these material witnesses were detained for 30 days <br />or less. <br />• <br />The few individuals detained for more than 90 days were detained for an <br />extended period of time in part because they pursued litigation that <br />precluded obtaining their testimony, made efforts to proffer or seek <br />immunity before testifying, or took other actions that delayed the <br />proceedings. While such actions are legitimate, they often take time to <br />resolve and can result in longer detention. Moreover, some detainees <br />facing deportation did not pursue efforts to provide prompt testimony. <br />B. <br />What is the percentage breakdown for the detainees in terms of national <br />origin, race, and ethnicity? <br />Answer: We do not maintain data on these characteristics of detained material <br />witnesses. <br />C. <br />Please list the charges that the Department has brought against each such <br />detainee. <br />Answer: We can only provide information about those material witnesses whose <br />status has been made public in court proceedings. In this regard, Osama <br />Awadallah was charged with perjury; Abdallah Higazy was charged with lying to <br />federal agents; Mohammed Osman Idris was charged with false statements on a <br />passport application; Mohammed Hassan El-Yacoubi was charged with false <br />statements on a passport application; Saleh Ali Almari was charged with <br />conspiracy to commit mail and wire fraud; Earnest James Ujaama was charged <br />with conspiracy to provide material support to Al Qaeda and with using, carry, <br />possessing and discharging a firearm during a crime of violence; and Zacarias <br />Moussaoui was charged with conspiracy to commit acts of terrorism transcending <br />national boundaries, conspiracy to murder United States employees, conspiracy to <br />commit aircraft piracy, conspiracy to use weapons of mass destruction, conspiracy <br /> <br />Page 53 <br />-51- <br />to destroy aircraft, and conspiracy to destroy property. Most material witnesses <br />remain witnesses and have not been charged with a criminal offense. <br />D. <br />Please provide the legal basis for detaining those individuals who have been <br />cleared of any connection with terrorism beyond the date of such clearance. <br />Answer: When a material witness has satisfied his warrant by providing the <br />relevant information he possesses, the warrant is dismissed and the witness is then <br />released unless he is transferred to custody on another legal basis, such as <br />immigration charges or federal or state criminal charges. <br />E. <br />Please provide a list of all requests by the government to seal proceedings in <br />connection with any of the detainees and copies of any orders issued <br />pursuant thereto. <br />Answer: We are prohibited by court orders from providing any information <br />regarding specific sealed material witness proceedings, including copies of sealing <br />orders. We routinely move to seal all grand jury material witness proceedings <br />pursuant to Rule 6(e) of the Federal Rules of Criminal Procedure. <br />27. <br />On October 31, 2001, the Department of Justice promulgated an interim rule, with <br />provision for post promulgation public comment, that requires the director of the <br />Bureau of Prisons to monitor or review the communications between certain <br />inmates and their lawyers for the purpose of deterring future acts that could result <br />in death or serious bodily injury to persons or substantial damage to property that <br />would entail the risk of death or serious bodily injury to persons. 66 Fed. Reg. <br />55062, 55066 (2001). <br />A. <br />How many inmates have been subject to the interim rule? <br />Answer: The Attorney General has ordered the monitoring of attorney <br />communications for a single inmate: Sheik Omar Ahmad Rahman, who was <br />convicted for his part in the 1993 plot to bomb the World Trade Center. He is <br />confined in the Administrative Maximum United States Penitentiary in Florence, <br />Colorado. <br />A federal grand jury has indicted Rahman’s lawyer, Lynne Stewart, for helping <br />him communicate with his terrorist associates outside of prison. According to the <br />indictment, Stewart distracted prison guards while Rahman and his translator <br />discussed whether to continue to comply with a cease-fire in terrorist activities <br />against Egyptian authorities. <br /> <br />Page 54 <br />-52- <br />Rahman and his attorneys were notified that their communications were subject to <br />monitoring. No monitoring has occurred, however, because the inmate and his <br />attorneys thus far have chosen not to communicate further with each other. <br />B. <br />The interim rule required prior written notification to an inmate and any <br />attorneys involved “[e]xcept in the case of prior court authorization. 66 Fed. <br />Reg. at 55066. Under this exception to the required notification, how many <br />cases were there/are there where inmates and their attorneys were not <br />notified that their communications were monitored? <br />Answer: In our interpretation, the requirement that prior written notification be <br />given to an inmate and attorneys involved “[e]xcept in the case of prior court <br />authorization” refers to a court-authorized interception. While there may have <br />been cases where inmates have been targeted and conversations have been <br />intercepted between such inmates and their attorneys, Title III requires that those <br />conversations be minimized, i.e., not listened to after initial identification of the <br />parties involved, due to the attorney-client privilege. There also may have been <br />cases where attorneys have been the subject of an investigation and, as a result, <br />had their conversations intercepted. Such conversations would have also been <br />minimized under established procedures. Neither the Department, nor any federal <br />law enforcement agency to our knowledge, maintains any records that track the <br />number of attorneys and/or inmates whose communications were intercepted <br />and/or monitored by prior court authorization. <br />C. <br />The interim rule prohibited disclosure of information prior to approval of <br />disclosure by a federal judge, except where the person in charge of the <br />monitoring determines that acts of violence or terrorism are imminent. How <br />many times did the person in charge of the monitoring disclose information <br />after approval by a federal judge? After a determination that acts of <br />violence or terrorism are imminent? <br />Answer: As indicated in the answer to question 27(A), supra, no monitoring has <br />occurred under the interim rule. Thus, there have been no occasions in which <br />information obtained through monitoring has been disclosed. <br />D. <br />How many post-promulgation comments were received by the Department of <br />Justice? <br />Answer: The Bureau of Prisons received thousands of form letters and <br />approximately 30 substantive comments on the interim rule during the comment <br />period. <br />E. <br />Is the Department of Justice considering any revisions to the interim rule? <br /> <br />Page 55 <br />-53- <br />Answer: The Department of Justice is considering the comments and is in the <br />process of preparing the final rule. <br />28. <br />The Department of Defense has detained two United States citizens in military <br />prisons in the United States as enemy combatants. These detentions have been <br />challenged in court, where the Department of Justice has represented the <br />Department of Defense. Has the Department of Justice received any information <br />regarding the detention by the Department of Defense within the United States or <br />abroad of any other United States citizens? Does the Department of Justice have <br />any agreement, arrangement, or understanding, formal or informal, with the <br />Department of Defense regarding the detention of United States citizens as enemy <br />combatants? <br />Answer: At this time, the Department of Justice is aware of the detention by the <br />Department of Defense (either within the United States or abroad) of no United States <br />citizens as enemy combatants besides Yaser Hamdi and Jose Padilla. <br />As the question notes, the Department of Justice has represented officials of the <br />Department of Defense who have been named respondents in habeas corpus actions <br />brought on behalf of detained enemy combatants. The Department of Justice is assigned <br />that role by statute. See 5 U.S.C. § 3106. Thus, at least to this extent, the Department of <br />Justice has a “formal” “arrangement” with the Department of Defense regarding the <br />detention of U.S. citizens as enemy combatants and litigation surrounding such <br />detentions. The Department of Justice and Department of Defense also maintain lines of <br />communication to ensure that intelligence concerning persons who may properly be <br />deemed enemy combatants (a category that might, from time to time, potentially include <br />U.S. citizens) is shared in a timely manner in order to permit each department to carry out <br />its functions. <br />29. <br />FBI Director Robert Mueller announced the formation of “flying squads” that <br />would be prepared to be deployed on short notice into terrorism investigations. <br />A. <br />Have these “flying squads” been formed? <br />Answer: Yes, the Flying Squads were created in June 2002. <br />B. <br />How many agents are assigned to a flying squad? <br />Answer: Two flying squads have been formed within the FBI’s Counterterrorism <br />Division, with a total of 24 agents. Both flying squads are managed by a Unit <br />Chief and supported by a Supervisory Special Agent for administrative <br />deployment matters. Each of the two flying squads is led by a Team Leader <br />(Supervisory Special Agent), an Assistant Team Leader (Term-Supervisory <br />Special Agent), and is staffed with nine Special Agents. <br /> <br />Page 56 <br />-54- <br />C. <br />What kind of training have the flying squad agents received? <br />Answer: Flying squad agents have received training in post-blast investigations <br />and personal safety while working in an overseas environment. In the near future, <br />they will receive specialized training in the following: major case management, <br />basic statement analysis, effective interrogation and negotiation techniques, crisis <br />management, FISA, weapons of mass destruction, advanced overseas security <br />awareness, U.S. Embassy operations, U.S. intelligence community operations and <br />issues, and other specialty areas. <br />D. <br />Have they been deployed into investigations? <br />Answer: Yes, the flying squads have been deployed into investigations. <br />E. <br />If so, how many times? <br />Answer: Since their establishment, the flying squads have deployed 23 times (12 <br />domestically and 11 internationally). <br />F. <br />Did they prove to be a useful addition to the investigation to which they were <br />deployed? <br />Answer: Yes. Flying squads have been used to very good operational effect. <br />They have been deployed at the direction of FBI Headquarters executive <br />management, field office management and Legal Attaches. The flying squads, as <br />necessary, have been accompanied by an array of FBI operational and supporting <br />assets, including terrorist financial operations and analysis, intelligence, <br />laboratory/forensics and substantive investigative specialists. The flying squads <br />have proved useful in assisting FBI field offices and Legal Attaches in their <br />terrorism investigations, to determine the whereabouts of all subjects, assess their <br />involvement in terrorist activities, determine links to others, and to fully exploit <br />all investigative techniques (e.g., FISA). The flying squads have provided <br />guidance, strategies, and analytical support to the requested field offices or Legal <br />Attaches and have recommended various courses of action. Such assistance has <br />been very beneficial to the terrorism investigative efforts of field offices and Legal <br />Attaches. <br />30. <br />Does the FBI use, as one of its terrorism investigative tools, aircraft to conduct <br />surveillance of various persons or locations? What type of information is sought <br />using such surveillance? <br />Answer: The answer to this question is classified and, accordingly, will be delivered to <br />the Committee under separate cover. <br /> <br />Page 57 <br />-55- <br />31. <br />Has the DOJ through any of its agencies formulated a policy position regarding <br />criteria for establishing the authenticity of foreign government-issued identity cards <br />since the passage of the USA PATRIOT Act? If so, please produce a copy of that <br />position. <br />Answer: Pursuant to the Committee’s April 1, 2003, letter, in light of the transfer of the <br />INS to DHS, we have referred this question to DHS for a response. We previously <br />provided the Committee with a copy of this referral. <br />32. <br />Has the DOJ through any of its agencies, including especially the INS, prepared or <br />issued a policy with regard to security standards and acceptance of “Matricula <br />Consulars” identity cards issued by foreign governments to persons who are <br />residing in the United States but who may not be lawfully present in the United <br />States.? If so, has that policy been provided in writing to the Office of Management <br />and Budget, the Secretary of State, or the Secretary of the Treasury? If such a <br />policy has been prepared, please provide a copy to the Committee. <br />Answer: The Department of Justice is currently participating in an interagency process <br />to develop an Administration policy regarding consular identification cards. We refer you <br />to DHS for information related to the former INS on this issue. <br />33. <br />Regarding the FBI’s National Crime Information Database, has the Department <br />lifted a requirement that the FBI ensure the accuracy and timeliness of information <br />about criminals and crime victims before adding it to the database? Please provide <br />a copy of any memoranda pertaining to the requirement that was lifted. <br />Answer: The FBI recently obtained a limited Privacy Act exemption for the National <br />Crime Information Center (NCIC) database but the exemption does not change any of the <br />requirements for entry, audit, validation, and hit confirmation of NCIC records as <br />provided for in the Criminal Justice Information Services (CJIS) User Agreement and the <br />NCIC 2000 Operating Manual. <br />Paragraph (j)(2) of the Privacy Act permits the head of any agency to promulgate rules to <br />exempt any system of records within the agency from certain provisions of the Privacy <br />Act. When an agency claims an exemption, it must publish reasons for the exemption in <br />the Federal Register and afford the public an opportunity to comment. <br />Paragraph (e)(5) of the Privacy Act states that agencies shall maintain all records used by <br />the agency in making any determination about any individual “with such accuracy, <br />relevance, timeliness, and completeness as is reasonably necessary to assure fairness to <br />the individual in the determination.” <br />On January 31, 2003, the FBI published a proposed rule in the Federal Register <br />exempting the NCIC (JUSTICE/FBI-001) from paragraph (e)(5) of the Act. See 68 F.R. <br /> <br />Page 58 <br />-56- <br />4974 (Jan.31, 2003). No comments were received regarding the proposed rule. <br />Accordingly, after the close of the public comment period, on March 24, 2003, the FBI <br />published a final rule exempting NCIC from paragraph (e)(5) of the Act. See 68 F.R. <br />14141 (Mar. 24, 2003). <br />34. <br />Is the FBI ordering its field offices to ascertain the number of mosques and Muslims <br />in their areas? Is the government seeking membership lists from mosques? If so, <br />why? From how many mosques is the government seeking such lists? How, if at all, <br />has the agency reassigned its agents as a result? How many investigations of or <br />prosecutions for terrorism as a result of these activities? <br />Answer: The FBI has undertaken a broad demographic assessment for the primary <br />purpose of providing FBI Executive management with a snapshot of each field office’s <br />working environment and of the communities they serve. As a relatively small part of <br />that broad assessment, information concerning the number of mosques and the <br />approximate size of the Muslim population in a given geographic area was collected, <br />mostly from publicly available sources. <br />If the FBI is to perform effectively its primary mission of detecting and preventing acts of <br />terrorism, our field offices need to reach out to the overwhelmingly law-abiding and <br />patriotic members of these communities to help us locate terrorists and their supporters <br />who may reside among them in an effort to avoid detection. The demographic survey has <br />facilitated the FBI’s efforts in knowing where these communities are concentrated and <br />where to turn for assistance. <br />For example, the FBI has reached out to these communities to assure them that, despite <br />the emphasis on counterterrorism, investigating civil rights remains a high priority of the <br />FBI. The FBI field offices have been tasked to contact Muslim leaders for the purpose of <br />establishing a dialogue and discussing procedures for alerting the local FBI office to such <br />issues. Over 500 such meetings have occurred since September 11, 2001. <br />35. <br />Is the Department assisting in the implementation of the Computer Assisted <br />Passenger Prescreening System (CAPPS I or II), which would be used to screen <br />airline passengers? <br />A. <br />To what extent is the Department, or any of its components, providing <br />information about specific persons for inclusion in CAPPS? <br />Answer: CAPPS I and CAPPS II are projects of the Transportation Security <br />Administration (TSA), which is part of DHS. CAPPS II is currently under <br />development and will function as a server that, when operational, will examine <br />and check passenger identification with associated information in airline <br />passenger name records. Following this check, CAPPS II will then match the <br /> <br />Page 59 <br />-57- <br />individual passenger name characteristics against numerous government databases <br />and other criminal and public databases. <br />One of the databases that CAPPS II, when operational, proposes to access is the <br />Violent Gang Terrorist Organization File (VGTOF) that is maintained by the FBI. <br />The VGTOF is the FBI’s primary list of suspected terrorists. An individual may <br />be entered into VGTOF by FBI field offices if there is an open terrorism case in <br />the field office. In addition, even if no case has been opened by a field office, an <br />individual’s name may also be entered into VGTOF by the FBI’s Terrorist Watch <br />and Warning Unit if the individual is of special interest to the Counterterrorism <br />Division at FBI Headquarters. <br />B. <br />From what databases or other sources, including companies, does such <br />information come from? <br />Answer: As previously mentioned, FBI field offices, based on an open terrorism <br />case, and the FBI’s Terrorist Watch and Warning Unit may enter an individual’s <br />name into VGTOF. Information regarding an individual to be entered in VGTOF <br />may come from but is not limited to: leads developed during an open terrorism <br />case in FBI field offices, human intelligence sources, court authorized electronic <br />surveillance sources, and information shared with the FBI by other law <br />enforcement, intelligence, and homeland security agencies. <br />C. <br />What checks are in place to ensure that the information is accurate and does <br />not constitute inappropriate profiling? <br />Answer: TSA can provide additional information regarding the accuracy of the <br />information accessed by CAPPS II. <br />D. <br />In what manner are individuals afforded an opportunity to correct <br />erroneous or inaccurate information? <br />Answer: TSA can provide additional information regarding the correction of <br />erroneous or inaccurate information found in CAPPS II. <br />36. <br />“Operation Liberty Shield” involves stopping cars at airports, checking the <br />identification of truckers who transport hazardous material on the highway, and <br />monitoring Internet and financial transactions. <br />A. <br />Please identify the specific authority on which “Operation Liberty Shield” <br />was created and implemented. <br />B. <br />What level of predication is required before an agent may monitor the <br />Internet and financial transactions? <br /> <br />Page 60 <br />-58- <br />C. <br />What terrorism-related investigations and/or prosecutions have resulted <br />from Operation Liberty Shield? <br />Answer: Pursuant to the Committee’s April 1, 2003, letter, in light of the transfer <br />of the INS to DHS, we have referred these questions to DHS for a response. We <br />previously provided the Committee with a copy of this referral. <br />37. <br />There have been three successive FBI sweeps since September 11, 2001, to monitor, <br />question, arrest, detain, or deport various immigrants. The first sweep focused on <br />young Arab and Muslim males and occurred in the months following September 11, <br />2001. The second sweep occurred in March 2002 and centered on thousands of <br />individuals of Middle Eastern and South Asian heritage. The third sweep occurred <br />in March 2003 as part of “Operation Liberty Shield.” Please provide information <br />on each of these operations. <br />A. <br />When were the plans for such operations first considered by the <br />Department? <br />B. <br />What guidance was provided to U.S. Attorney’s Offices and/or FBI offices <br />with respect to questions that should be asked of such immigrants? <br />C. <br />What has been the outcome of each of these plans? Please provide details <br />such as how many were monitored, questioned, arrested, detained, or <br />deported for each operation. Please provide details as to the number and <br />types of terrorism-related investigations and prosecutions that have resulted <br />from these sweeps. <br />D. <br />Please identify the specific authority relied on to create and implement these <br />plans, including the monitoring, questioning, arrests, detentions, and <br />deportations. <br />Answer: The answers relating to these questions are classified, and, accordingly, will be <br />delivered to the Committee under separate cover. <br />38. <br />In August 2002, a Justice Department rule went into effect giving authority to state <br />and local police to enforce immigration laws. <br />A. <br />Which state and local governments are using this new authority and to what <br />extent? <br />B. <br />How many immigration violations were found as a result of state and local <br />law enforcement participation under this new authority? <br /> <br />Page 61 <br />-59- <br />C. <br />Have any persons or groups affected by this new authority (e.g. immigrants, <br />civil rights organizations) submitted any formal complaints to the <br />Department (including the Inspector General) regarding this authority. If <br />so, please provide details. <br />Answer to A through C: The only rule that went into effect in August 2002 <br />giving authority to state and local police to enforce immigration laws was the <br />Mass Influx Rule, published at 67 F.R. 48354 (July 24, 2002). This rule, which <br />implements authority given the Attorney General in section 372 of the Illegal <br />Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA), Pub. L. <br />No. 104-208, Div. C., 110 Stat. 3009-46, gives state and local police the authority <br />to assist federal immigration officers in the event of a mass influx of aliens as <br />declared by the Attorney General (now the Secretary of DHS). This rule requires <br />the signing of a Memorandum of Understanding with the state or local <br />government and requires training, although under a rule published on February 26, <br />2003, the training requirement may be abbreviated or waived in unanticipated <br />situations requiring an expeditious response to protect the public safety, public <br />health, or national security. To date, there has been no declaration that a situation <br />of a mass influx of aliens exists. Consequently, no state or local government has <br />exercised this authority, and therefore no immigration violations were found as a <br />result of state and local law enforcement participation under this new authority. <br />We are not aware of any complaints regarding this authority (other than comments <br />received during the rule-making process). <br />This question may be referring to the inherent arrest authority that is possessed by <br />States. This power is not the creation of the federal government. However, the <br />Attorney General did cite this authority on June 5, 2002, in announcing the <br />development of the National Security Entry-Exit Registration System (NSEERS). <br />He stated the following: <br />“When federal, state and local law enforcement officers encounter <br />an alien of national security concern who has been listed on the <br />NCIC [National Crime Information Center] for violating <br />immigration law, federal law permits them to arrest that individual <br />and transfer him to the custody of the INS. The Justice <br />Department’s Office of Legal Counsel has concluded that this <br />narrow, limited mission that we are asking state and local police to <br />undertake voluntarily – arresting aliens who have violated criminal <br />provisions of Immigration and Nationality Act or civil provisions <br />that render an alien deportable, and who are listed on the NCIC – is <br />within the inherent authority of the states.” <br />With respect to the legal authority of state and local law enforcement officers to <br />arrest such aliens, the Justice Department’s Office of Legal Counsel (OLC) <br /> <br />Page 62 <br />-60- <br />previously had opined that states possess inherent authority to arrest aliens for <br />criminal immigration law violations generally. In April 2002, OLC additionally <br />opined that states also possess inherent authority to arrest aliens whose names <br />have been entered into the NCIC database because they have both (1) violated <br />civil provisions of the federal immigration laws that render them deportable and <br />(2) been determined by federal authorities to pose special risks, either because <br />they present national security concerns or because they are absconders who have <br />not complied with a final order of removal or deportation. The federal <br />government has never preempted this authority; the only barriers to executing <br />such arrests are statutes or policies that states or municipalities may have imposed <br />upon themselves. <br />This authority is crucial to the success of the absconder initiative. Although every <br />absconder has potentially committed a criminal immigration violation because <br />ignoring a final order of removal is a criminal act, the crime occurred only if the <br />act was “willful.” As of February 2003, 1,141 absconders had been apprehended, <br />with 545 removed from the United States, 391 in the custody of federal <br />immigration authorities awaiting removal, and 44 under criminal prosecution by <br />the United States Attorneys for various crimes. Some of the apprehensions <br />involved local law enforcement officials. Others did not. We do not have a <br />statistical breakdown indicating which of these arrests involved civil immigration <br />violations or which local law enforcement agencies, if any, were involved. <br />The exercise of this arrest authority in the context of the absconder initiative has <br />not generated any formal complaints by arrested aliens. However, there has been <br />one highly-speculative lawsuit on the issue, Tejeda-Delgado, et. al., v. City of Los <br />Angeles, in which several removable plaintiffs (who were not arrested) claim that <br />the INS conspired to have the Los Angeles Police Department wrongfully arrest <br />them for civil deportation purposes by posting their names in the NCIC database. <br /> <br />
Tags (Optional)
Tags are keywords that get attached to your post. They are used to categorize your submission and make it easier to search for. To add tags to your post type a tag into the box below and click the "Add Tag" button.
Add Tag
Update Reply
Join our Community!
Our community is
FREE
to join. To participate you must either login or register for an account.
Login »
Register »
Search the Community
Newsletter Sign-Up
By signing up you may also receive occasional reader surveys and special offers from Trains magazine.Please view our
privacy policy
More great sites from Kalmbach Media
Terms Of Use
|
Privacy Policy
|
Copyright Policy