161
ICE FOIA 10-2674.0010795

Ice Secure Communities Memo

Embed Size (px)

Citation preview

Page 1: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 1/160

ICE FOIA 10-2674.0010795

Page 2: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 2/160

ICE FOIA 10-2674.0010796

Page 3: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 3/160

ICE FOIA 10-2674.0010797

(b) (5)

(b) (5)

Page 4: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 4/160

ICE FOIA 10-2674.0010798

(b) (5)

Page 5: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 5/160

ICE FOIA 10-2674.0010799

Page 6: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 6/160

ICE FOIA 10-2674.0010800

Page 7: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 7/160

ICE FOIA 10-2674.0010801

Page 8: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 8/160

ICE FOIA 10-2674.0010802

Page 9: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 9/160

ICE FOIA 10-2674.0010803

Page 10: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 10/160

ICE FOIA 10-2674.0010804

Page 11: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 11/160

Office of the Principal Legal Advisor U.S. Department of Homeland Security500 12thStreet, SWWashington, DC 20024

A Department of Homeland Security Attorney prepared this document for INTERNAL GOVERNMENT USEONLY. This document is pre-decisional in nature and qualifies as an intra-agency document containingdeliberative process material. This document contains confidential attorney-client communications relating tolegal matter for which the client has sought professional advice. Under exemption 5 of section (b) of 5 U.S.C. §552 (Freedom of Information Act), this material is EXEMPT FROM RELEASE TO THE PUBLIC.

October 2, 2010

MEMORANDUM FOR: Beth N. GibsonAssistant Deputy Director 

FROM: Riah RamloganDeputy Principal Legal Advisor 

SUBJECT: Secure Communities – Mandatory in 2013

Executive SummaryWe present the arguments supporting a position that participation in Secure Communities will be mandatory in 2013. Based on applicable statutory authority, legislative history, and caselaw, we conclude that participation in Secure Communities will be mandatory in 2013 withoutviolating the Tenth Amendment.Because the contemplated 2013 information-sharing technology change forms the factual basisfor the legal analysis, we have included that background here. Readers familiar with thetechnology and the 2013 deployment may proceed directly to the Discussion section.

In the Discussion section, we review the three statutes from which the mandatory nature of the

2013 Secure Communities deployment derives: 28 U.S.C § 534, relating to Attorney Generalsharing of criminal records with other government officials; 8 U.S.C. § 1722, which mandatesa data-sharing system to enable intelligence and law enforcement agencies to determine theinadmissibility or deportability of an alien; and 42 U.S.C. §14616, which establishes aninformation-sharing compact between the federal government and ratifying states.Congressional history further underscores the argument that the 2013 Secure Communitiesdeployment fulfills a Congressional mandate.Our analysis of case law concentrates on  Printz v. United States, 521 U.S. 898, 925 (1997), theseminal case on unconstitutional state participation in mandatory government programs.Significantly, Printz holds that that “federal laws which require only the provision of information to the Federal Government” do not raise the Tenth Amendment prohibition of “theforced participation of the States’ executive in the actual administration of a federal program.” Id. at 918. We examine several potential legal challenges and arguments that law enforcementagencies may make to avoid the reach of Secure Communities in 2013, and conclude that eachseems rather weak in the face of  Printz and its progeny.

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

Page 12: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 12/160

2

Finally, we note that certain statutes relating to immigration information collected by states donot provide a legal basis for characterizing participation in Secure Communities in 2013 asmandatory, but as these are essentially irrelevant given other statutory support, we addressthem only briefly.Background A review of the Secure Communities information-sharing technology, which is admittedlycomplicated, aids the understanding of the applicable law and the corresponding conclusionthat participation will become mandatory in 2013. The process by which fingerprint and other information is relayed will change in 2013 to create a more direct me thod for ICE to receivethat information from DOJ. Consequently, choices available to law enforcement agencies whohave thus far decided to decline or limit their participation in current information-sharing processes will be streamlined and aspects eliminated. In that way, the process, in essence, becomes “mandatory” in 2013, when the more direct method will be in place. The year 2013was chosen by ICE and DOJ for policy and resource feasibility reasons.

Secure Communities’ Use of IDENT/IAFIS Interoperability1

In Fiscal Year 2008, Congress appropriated $200 million for ICE to “improve and modernizeefforts to identify aliens convicted of a crime, sentenced to imprisonment, and who may bedeportable, and remove them from the United States, once they are judged deportable….”2Inresponse, ICE launched the Secure Communities initiative to transform the way ICE identifiesand removes criminal aliens from the United States. In this initiative, Secure Communitiesutilizes existing technology, i.e. the ability of IDENT and IAFIS to share information, not onlyto accomplish its goal of identifying criminal aliens, but also to share immigration statusinformation with state and local law enforcement agencies (LEAs). The Secure Communities“Program Management Office” provides the planning and outreach support for ongoing effortsto activate IDENT/IAFIS Interoperability in jurisdictions nationwide. See generally SecureCommunities: Quarterly Report, Fiscal Year Quarterly Report to Congress Third Quarter, at iv,20. (Aug 11, 2010).The following is a description of the full IDENT/IAFIS Interoperability process:

1. When a subject is arrested and booked into custody, the arresting LEA sends thesubject’s fingerprints and associated biographical information to IAFIS via theappropriate State Identification Bureau (SIB).

2. CJIS3electronically routes the subject’s biometric and biographic information to US-VISIT/IDENT to determine if there is a fingerprint match with records in its system.

3. As a result of a fingerprint match with data in IDENT, CJIS generates an ImmigrationAlien Query (IAQ) to the ICE Law Enforcement Support Center (LESC).

1“Interoperability” was previously defined as the “sharing of alien immigration history, criminal history, and 

terrorist information based on positive identification and the interoperable capabilities of IDENT and IAFIS.”DHS IDENT/IAFIS Interoperability Report, at p. 2 (May, 2005). Currently, Secure Communities officially refersto the process as “IDENT/IAFIS Interoperability.”2

Consolidated Appropriations Act, 2008, Pub. L. No. 110-161, 121 Stat 1844, 2050 (2007).3

“CJIS,” which stands for the FBI’s Criminal Justice Information Services Division, manages IAFIS.

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

Page 13: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 13/160

3

4. The LESC queries law enforcement and immigration databases to make an initialimmigration status determination and generates an Immigration Alien Response (IAR)to prioritize enforcement actions.

5. The LESC sends the IAR to CJIS, which routes it to the appropriate State SIB to send to the originating LEA. The LESC also sends the IAR to the local ICE field office,which prioritizes enforcement actions based on level of offense.

There are two types of participation in Secure Communities by which IDENT/IAFISInteroperability is deployed. First, participation may involve “full-cycle” information-sharingin which the SIB and LEA choose to participate and receive the return message from theIDENT/IAFIS Interoperability process informing about the subject’s immigration status (SeeStep 5, first sentence). Second, a state or LEA may choose to participate but elect not toreceive the return message or the state may not have the technological ability to receive thereturn message from CJIS or relay the message to the LEA.

 IDENT/IAFIS Interoperability in 2013According to Secure Communities, Assistant Director David Venturella and the CJIS Director reached an agreement by which CJIS will send ICE, starting in 2013, all fingerprint requestsfrom any LEAs that are not participating in Secure Communities. This future informationsharing will not include the component of the current IDENT/IAFIS Interoperability processwhere the SIB and LEA receive (if technically feasible) the automatic return message fromICE regarding the subject’s immigration status. According to Secure Communities, this process is technologically available now; however for policy reasons and to ensure adequateresources are in place, CJIS and Secure Communities have currently chosen to wait until 2013,when all planned deployments should be completed, until instituting this process.

Current CJIS-Required Tasks In Order to Physically Deploy IDENT/IAFIS  Interoperability to an LEA

According to Secure Communities, there are two ministerial-related IT tasks that, pursuant tocurrent CJIS policy, must be performed in order to physically deploy IDENT/IAFISInteroperability to a LEA. The LEA must “validate” its “unique identifier” (called an “ORI”)that is attached to its terminal (i.e, a state or local official contacts CJIS to inform CJIS that theORI pertains to the LEA’s terminal). Once this validation occurs, CJIS must note within IAFISthe LEA’s ORI so that IAFIS will be informed to relay fingerprints to IDENT that originatefrom the LEA.

4  

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

(b) (5)

(b) (5)

Page 14: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 14/160

4

Discussion

The FBI has Statutory Authority To Share Fingerprint Submission Information with DHS/ICE Via IDENT/IAFIS Interoperability, and this Authority Supports theMandatory Nature of Anticipated 2013 Secure Communities Information-Sharing  Deployment 

It is unquestioned that the FBI has authority to share fingerprint information with DHS, and,therefore, ICE. This authority derives from three distinct statutes: 28 U.S.C § 534, relating toAttorney General sharing of criminal records with other government officials: 8 U.S.C. § 1722,which mandates a data-sharing system to enable intelligence and law enforcement agencies todetermine the inadmissibility or deportability of an alien; and 42 U.S.C. §14616, whichestablishes an information-sharing compact between the federal government and ratifyingstates. Federal register notices and the legislative history of these provisions make plain that asystem such as the 2013 Secure Communities deployment is mandatory in nature.

28 U.S.C. § 534Specifically, 28 U.S.C. § 534 provides that the Attorney General shall “acquire, collect,classify, and preserve identification, criminal identification, crime, and other records.” 28U.S.C. § 534(a)(1). That law also provides for the sharing of the information, by requiring thatthe Attorney General “exchange such records and information with, and for the official use of,authorized officials of the Federal Government. . . .” 28 U.S.C. § 534(a)(4); see 8 U.S.C. §1105 (FBI must provide ICE access to criminal history record information contained within National Crime Information Center files). Further, the applicable System of Records Noticefor the FBI’s Fingerprint Identification Records System (FIRS), which are maintained withinIAFIS, provides that identification and criminal history record information (i.e., fingerprintsand rap sheets) may be disclosed, in relevant part, to a federal law enforcement agency directlyengaged in criminal justice activity “where such disclosure may assist the recipient in the performance of a law enforcement function” or to a federal agency for “a compatible civil lawenforcement function; or where such disclosure may promote, assist, or otherwise serve themutual law enforcement efforts of the law enforcement community.” Notice of Modified Systems of Records, 64 Fed. Reg. 52343, 52348 (September 28, 1999).

8 U.S.C. § 1722The FBI has further authority to share the fingerprint information with DHS via IDENT/IAFISInteroperability. Specifically, Congress required the establishment of an interoperableelectronic data system to provide current and immediate access to information in databases of Federal law enforcement agencies and the intelligence community that is relevant to determinethe admissibility or deportability of an alien. See 8 U.S.C. § 1722.5IDENT/IAFIS5

8 U.S.C. § 1722 provides, in relevant part:(2) Requirement for interoperable data systemUpon the date of commencement of implementation of the plan required by section 1721(c), the President shall

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

(b) (5)

Page 15: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 15/160

5

Interoperability is the technological mechanism that was developed pursuant to thisinformation-sharing requirement by which the FBI automates the sharing of current fingerprintsubmissions by LEAs to IAFIS6with DHS so that DHS may, in part, determine theadmissibility or deportability of an alien based on the alien’s criminal history.From the early stages of the IDENT/IAFIS integration efforts, Congress fully intended thatIDENT/IAFIS Interoperability involve both the sharing of information between the FBI and DHS, but also the sharing of the relevant immigration information between the federalagencies and state and local law enforcement. Specifically, Congress described the earlyIDENT/IAFIS integration project as follows:

This project was established to integrate the separate identification systems operated bythe Department of Homeland Security (DHS) with the Federal Bureau of Investigation(FBI). The IDENT/IAFIS project was designed to support the apprehension and 

 prosecution of criminal aliens and to provide State and local law enforcement personnelwith direct access to DHS data through IAFIS. With realtime connection between thetwo systems, DHS would have the capability to determine whether an apprehended  person is subject to a currently posted Want/Warrant or has a record in the FBI'sCriminal Master File. Collaterally, the integration of IDENT and IAFIS would enablecognizant law enforcement agencies to obtain all relevant immigration information as part of a criminal history response from a single FBI search.

develop and implement an interoperable electronic data system to provide current and immediate access toinformation in databases of Federal law enforcement agencies and the intelligence community that is relevant todetermine whether to issue a visa or to determine the admissibility or deportability of an alien (also known as the“Chimera system”).

8 U.S.C. 1721, referred to above, provides, in relevant part:(a) Interim directiveUntil the plan required by subsection (c) of this section is implemented, Federal law enforcement agencies and theintelligence community shall, to the maximum extent practicable, share any information with the Department of State and the Immigration and Naturalization Service relevant to the admissibility and deportability of aliens,consistent with the plan described in subsection (c) of this section.(b) Report identifying law enforcement and intelligence information(1) In general

 Not later than 120 days after May 14, 2002, the President shall submit to the appropriate committees of Congressa report identifying Federal law enforcement and the intelligence community information needed by theDepartment of State to screen visa applicants, or by the Immigration and Naturalization Service to screenapplicants for admission to the United States, and to identify those aliens inadmissible or deportable under theImmigration and Nationality Act [8 U.S.C.A. § 1101 et seq.](2) Omitted (c) Coordination plan(1) Requirement for plan

 Not later than one year after October 26, 2001, the President shall develop and implement a plan based on thefindings of the report under subsection (b) of this section that requires Federal law enforcement agencies and theintelligence community to provide to the Department of State and the Immigration and Naturalization Service allinformation identified in that report as expeditiously as practicable.6

The States, whose record repositories are the primary source of criminal history records maintained at the FBI,are not required to provide fingerprint information to the FBI, but do so voluntarily in order to gain the mutual

 benefit of receiving access to criminal history information on individuals who have resided in other States. SeePrivacy Impact Assessment for the Federal Bureau of Investigation Fingerprint Identification Records System(FIRS) Integrated Automated Fingerprint Identification System (IAFIS) Outsourcing for Noncriminal JusticePurposes – Channeling (May 5, 2008) (available on FBI’s website). State law, however, may require LEAs tosend the fingerprints to IAFIS upon each arrest. See, e.g ., Cal. Penal Code § 13150.

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

Page 16: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 16/160

6

H.R. Rep. No. 109-118 (2005). Congress similarly explained that it was not only crucial thatDHS and the Department of Justice ensure that IDENT “is able to retrieve, in real time, theexisting biometric information contained in the IAFIS database7…[but] it is equally essentialfor the FBI, and State and local law enforcement to have the ability to retrieve the proper levelof information out of the IDENT/USVISIT database.”8S. Rep. No. 108-280, at 15 (2004)(emphasis added). Because IDENT/IAFIS Interoperability accomplishes the Congressionally-intended information-sharing objectives, Congress has explicitly supported expansion of Secure Communities. See H.R. Rep. No. 111-157 (2009).

42 U.S.C. § 14616

42 U.S.C. §14616 also supports the mandatory nature of Secure Communities, at least for twenty-nine states. This statute establishes a compact for the organization of an electronicinformation sharing system among the federal government and the states to exchange criminalhistory records for non-criminal justice purposes authorized by Federal or State law, includingimmigration and naturalization matters. See 42 U.S.C. § 14616. Under this compact, the FBIand the ratifying states agree to maintain detailed databases of their respective criminal historyrecords, including arrests and dispositions, and to make them available to the federalgovernment and to other ratifying states for authorized purposes. See 42 U.S.C. 14616(b).According to the FBI website, twenty-nine states have ratified the compact as of July 1, 2010.9For these twenty-nine states, a court may find participation in Secure Communities mandatorysince they are already required by the above statute to make their criminal history recordsavailable for immigration matters.

Compelling Participation in Secure Communities in 2013 Does Not RaiseConstitutional Concerns

Although LEAs may argue that the Tenth Amendment of the U.S. Constitution prohibits ICEfrom compelling participation in Secure Communities, applicable case law supports a position

that Tenth Amendment protections are not at issue. Under the Tenth Amendment, “[t]heFederal Government may not compel the States to implement, by legislation or executiveaction, federal regulatory programs.”10

 Printz v. United States, 521 U.S. 898, 925 (1997).Similarly, “[t]he Federal Government may neither issue directives requiring the States to7

Similarly, Congress later reiterated “it is essential that. . . IDENT and US-VISIT can retrieve, in real time, biometric information contained in the IAFIS database, and that the IAFIS database can retrieve, in real time, biometric information contained in IDENT and US-VISIT.” H.R. Rep. No. 108-792 (2004).8The Senate Committee for Appropriations further stated, with respect to early IDENT/IAFIS integration efforts,that “in order for Federal, State and local law enforcement agencies to effectively fight crime, they need to be ableto access fingerprint records of visitors and immigration law violators.” S. Rep. No. 108-344 (2004).9See Compact Council, National Crime Prevention and Privacy Compact (2010),http://www.fbi.gov/hq/cjisd/web%20page/pdf/compact_history_pamphlet.pdf (containing a listing of Compactstates).10

Both DHS and ICE officials have described Secure Communities as a “program.” See e.g., Fiscal 2011Appropriations: Homeland Security, Committee on House Appropriations Subcommittee on Homeland Security(2010) (statement of ICE Director Morton) (thanking Subcommittee and the Committee for “providing vitalresources to establish the Secure Communities program”); DHS Office of Inspector General, The Performance of 287(g) Agreements, at 82 (2010). Moreover, Secure Communities’ staff is located in the “Program ManagementOffice.” Thus, ICE would likely not prevail in any argument that Secure Communities is not a federal “program.”

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

Page 17: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 17/160

7

address particular problems, nor command the States’ officers, or those of their politicalsubdivisions, to administer or enforce a federal regulatory program.”  Id. at 935. In Printz , theSupreme Court found unconstitutional Brady Handgun Violence Prevention Act provisionsrequiring the chief law enforcement officer of each jurisdiction to conduct background checkson prospective handgun purchasers and to perform certain related ministerial tasks. See id. at933-34. The Supreme Court held that such provisions constituted the forced participation of the States’ executive in the actual administration of a federal program. See id. at 935.Significantly, however, the Printz court also held that that “federal laws which require onlythe provision of information to the Federal Government” do not raise the TenthAmendment prohibition of “the forced participation of the States' executive in the actualadministration of a federal program.”  Id. at 918 (emphasis added).Applying this holding, the United States District Court for the Southern District of New York found no Tenth Amendment issue in a federal act that required “state officials to provideinformation regarding sexual offenders-information that the state officials will typicallyalready have through their own state registries-to the federal government.” U.S. v. Brown, No.07-Cr. 485(HB), 2007 WL 4372829, at * 5 (S.D.N.Y. Dec. 12, 2007). The District Courtexplained that “because the individuals subject to the Act are already required to register  pursuant to state registration laws, and because the Act only requires states to provideinformation rather than administer or enforce a federal program, the Act does not violate theTenth Amendment.”  Id. at * 6.Similarly, the United States Court of Appeals for the Fourth Circuit upheld a District Court’sconclusion that a federal reporting requirement does not violate the Tenth Amendment becausethe federal law only requires the state to forward information and “does not require the state todo anything that the state itself has not already required, authorized, or provided by its ownlegislative command.” Frielich v Upper Chesapeake Health, Inc., 313 F.3d 205, 214 (4th Cir.2002) (citing Frielich v. Board of Directors of Upper Chesapeake Health, Inc., 142 F.Supp.2d 679, 696 (D.Md. 2001)); see United States v. Keleher , No. 1:07-cr-00332-OWW, 2008 WL5054116, at * 12 (E.D.Cal. Nov. 19, 2008) (rejecting a Tenth Amendment challenge to the provisions of the same federal law as in Brown that required a state to accept registrationinformation from a sex offender, holding that, unlike the state officers in  Printz , the federal law“does not require states, or their state officials, to do anything they do not already do under their own laws.”) (citing United States v. Pitts, No. 07-157-A, 2007 WL 3353423 (M.D.La. Nov. 7, 2007)); cf. Reno v. Condon, 528 U.S. 141, 150-51 (2000) (holding a federal act whichrestricts the nonconsensual sale or release by a state of a driver’s personal information does notviolate the Tenth Amendment, as the Act does not require the states in their sovereign capacityto regulate their own citizens, but regulates the states as the owners of databases).A court following the above reasoning would similarly recognize that an LEA’s participationin Secure Communities (i.e. accepting deployment of IDENT/IAFIS Interoperability) does notviolate the Tenth Amendment. Specifically, participation in Secure Communities does notalter the normal booking process and only requires the same provision of information to theFBI that the LEAs currently provide as regular practice11or as required by state law. See, e.g .,Cal. Penal Code § 13150 (requiring LEAs to provide fingerprint submissions along with arrestdata to the Department of Justice for each arrest made) . Therefore, unlike in Printz where the

11See FN 6, supra.

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

Page 18: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 18/160

8

federal law forced the state officials to perform added duties, participation in SecureCommunities does not require local officials “to do anything they do not already do.”Despite the above reasoning, a challenger to Secure Communities may argue that the currenttask to validate the LEA’s ORI prior to activating IDENT/IAFIS Interoperability extends participation in Secure Communities beyond mere information-sharing and constitutes thesame prohibited conscription of state or local officials as in  Printz . The Supreme Court in Printz held that Congress cannot force state officials to even perform “discrete, ministerialtasks” to implement a federal regulatory program.  Printz , 521 U.S. at 929-30. The Printz court explained “even when the States are not forced to absorb the costs of implementing afederal program, they are still put in the position of taking the blame for its burdensomenessand for its defects.”  Id. at 930. A court following this Printz reasoning could recognize thatcertain jurisdictions do not want to be blamed for the immigration consequences of itsconstituents resulting from its participation in Secure Communities.ICE has several defenses to the above claim. First, Secure Communities, CJIS, and US-VISITare currently discussing the necessity of this ministerial requirement; therefore, it is possiblethat this additional pre-activation requirement may not exist by 2013, and may be eliminated sooner. Second, state and local officials already validate the ORIs bi-annually with the FBI;

therefore, like in Frielich, Keleher , and  Pitts, this validation task does not force state and localofficials “to do anything they do not already do.” Last, ICE may argue that, despite thisministerial task, participation in Secure Communities does not compel state or local officials toenact a legislative program, administer regulations, or perform any functions enforcingimmigration law, but rather only involves the same sharing of information to the federalgovernment as currently practiced. See New York v. United States, 505 U.S. 144, 175-76(1992) (holding a federal law violated the Tenth Amendment by requiring states either to enactlegislation providing for the disposal of radioactive waste generated within their borders or toimplement an administrative solution for taking title to, and possession of, the waste).A challenger to Secure Communities may also argue, in reliance on Printz , that 2013 participation in Secure Communities violates the Tenth Amendment because it may require theState to expend significant funds in order to implement the program. The Printz Court held that Congress cannot force state governments to absorb the financial burden of implementing afederal regulatory program. See Printz , 518 U.S. at 930. Currently, according to SecureCommunities, an SIB may need to pay for its own technological upgrades in order to have thecapability to receive the return IAR message from CJIS in the IDENT/IAFIS Interoperability process or relay that message to the LEA.The above fiscal argument is misleading and should fail both in 2010 and in 2013. First, participation in Secure Communities does not require the states or LEAs to receive the returnIAR message. In fact, Secure Communities has consistently informed LEAs that they may“opt out” of receiving the return IAR message if they so choose or if the SIB does not have thetechnological capability to receive that message or relay that message to the LEA. Second, as per the aforementioned agreement between Mr. Venturella and the CJIS Director for 2013,the 2013 process by which CJIS will send ICE all fingerprint requests from any non- participating LEA will not include the component of the current IDENT/IAFIS Interoperability process where the SIB and LEA receive the automatic return IAR message. Therefore, the2013 process would not require the state to expend any funds in order for IDENT/IAFISInteroperability to be deployed.

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

Page 19: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 19/160

9

Certain Statutes Relation to the Sharing of Immigration Information Do Not Lend Support to the Argument that Secure Communities Will Become Mandatory in 2013Last, please note that 8 U.S.C. §§ 137312and 1644,13which relate to voluntary sharing of immigration information by government employees, do not support mandatory participation inSecure Communities, but lack of support by these statutes is essentially irrelevant becausestatutory support exists elsewhere. We include them because the notoriety of the legal casesassociated with these statutes has potential to become a “red herring” in discussions about themandatory nature of Secure Communities participation. In City of New York v. United States,179 F.3d 29 (2d Cir. 1999), the Mayor of New York City issued a 1989 order prohibiting cityemployees from voluntarily sending immigration status information about an individual to theimmigration authorities. Following passage of IIRIRA and PRWORA in 1996, the City brought suit against the federal government, claiming, in relevant part, that 8 U.S.C. § 1373and 8 U.S.C. § 1644 violated the Tenth Amendment by directly compelling states to enact and enforce a federal regulatory program. The Second Circuit held that 8 U.S.C. § § 1373 and 1644 “do not directly compel states or localities to require or prohibit anything. Rather, they prohibit state and local government entities or officials only from directly restricting thevoluntary exchange of immigration information with the INS.” City of New York , 179 F. 3d at

35.ConclusionBased on applicable statutory authority, legislative history, and case law, we conclude thatthere is ample support for the argument that participation in Secure Communities will bemandatory in 2013, and that the procedures by which state and local information will be shared with ICE at that time does not create legitimate Tenth Amendment concerns of unconstitutionalcompulsion by states in a mandatory federal program.

128 U.S.C. § 1373 provides, in relevant part:

(a) In general Notwithstanding any other provision of Federal, State or local law, a Federal, State or local government entity or official may not prohibit, or in any way restrict, any governmental entity or official from sending to, or receivingfrom, the Immigration and Naturalization Service information regarding the citizenship or immigration status,lawful or unlawful, of any individual.(b) Additional authority of government entities

 Notwithstanding any other provision of Federal, State, or local law, no person or agency may prohibit, or in anyway restrict, a Federal, State, or local government entity from doing any of the following with respect toinformation regarding the immigration status, lawful or unlawful, of any individual:

(1) Sending such information to, or requesting or receiving such information from, the Immigration and  Naturalization Service.(2) Maintaining such information.(3) Exchanging such information with any other Federal, State, or local governmental entity.

138 U.S.C. § 1644 provides “Notwithstanding any other provision of Federal, State, or local law, no State or local

government entity may be prohibited, or in any way restricted, from sending to or receiving from theImmigration and Naturalization Service information regarding the immigration status, lawful or unlawful, of analien in the United States.”

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

Page 20: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 20/160

10

cument ID: 0.7.98.12345 CLEAN ICE FOIA 10-2674.000

Page 21: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 21/160

Page 22: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 22/160

Page 23: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 23/160

Page 24: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 24/160

Page 25: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 25/160

Page 26: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 26/160

Page 27: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 27/160

Page 28: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 28/160

Page 29: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 29/160

Page 30: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 30/160

Page 31: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 31/160

Page 32: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 32/160

Page 33: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 33/160

Page 34: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 34/160

Page 35: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 35/160

Page 36: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 36/160

Page 37: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 37/160

Page 38: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 38/160

Page 39: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 39/160

Office of the Principal Legal Advisor U.S. Department of Homeland Security500 12thStreet, SWWashington, DC 20024

A Department of Homeland Security Attorney prepared this document for INTERNAL GOVERNMENT USEONLY. This document is pre-decisional in nature and qualifies as an intra-agency document containingdeliberative process material. This document contains confidential attorney-client communications relating tolegal matter for which the client has sought professional advice. Under exemption 5 of section (b) of 5 U.S.C. §552 (Freedom of Information Act), this material is EXEMPT FROM RELEASE TO THE PUBLIC.

October 2, 2010

MEMORANDUM FOR: Beth N. GibsonAssistant Deputy Director 

FROM: Riah RamloganDeputy Principal Legal Advisor 

SUBJECT: Secure Communities – Mandatory in 2013

Executive SummaryWe present the arguments supporting a position that participation in Secure Communities will be mandatory in 2013. Based on applicable statutory authority, legislative history, and caselaw, we conclude that participation in Secure Communities will be mandatory in 2013 withoutviolating the Tenth Amendment.Because the contemplated 2013 information-sharing technology change forms the factual basisfor the legal analysis, we have included that background here. Readers familiar with thetechnology and the 2013 deployment may proceed directly to the Discussion section.

In the Discussion section, we review the three statutes from which the mandatory nature of the

2013 Secure Communities deployment derives: 28 U.S.C § 534, relating to Attorney Generalsharing of criminal records with other government officials; 8 U.S.C. § 1722, which mandatesa data-sharing system to enable intelligence and law enforcement agencies to determine theinadmissibility or deportability of an alien; and 42 U.S.C. §14616, which establishes aninformation-sharing compact between the federal government and ratifying states.Congressional history further underscores the argument that the 2013 Secure Communitiesdeployment fulfills a Congressional mandate.Our analysis of case law concentrates on  Printz v. United States, 521 U.S. 898, 925 (1997), theseminal case on unconstitutional state participation in mandatory government programs.Significantly, Printz holds that that “federal laws which require only the provision of information to the Federal Government” do not raise the Tenth Amendment prohibition of “theforced participation of the States’ executive in the actual administration of a federal program.” Id. at 918. We examine several potential legal challenges and arguments that law enforcementagencies may make to avoid the reach of Secure Communities in 2013, and conclude that eachseems rather weak in the face of  Printz and its progeny.

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

Page 40: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 40/160

2

Finally, we note that certain statutes relating to immigration information collected by states donot provide a legal basis for characterizing participation in Secure Communities in 2013 asmandatory, but as these are essentially irrelevant given other statutory support, we addressthem only briefly.Background A review of the Secure Communities information-sharing technology, which is admittedlycomplicated, aids the understanding of the applicable law and the corresponding conclusionthat participation will become mandatory in 2013. The process by which fingerprint and other information is relayed will change in 2013 to create a more direct me thod for ICE to receivethat information from DOJ. Consequently, choices available to law enforcement agencies whohave thus far decided to decline or limit their participation in current information-sharing processes will be streamlined and aspects eliminated. In that way, the process, in essence, becomes “mandatory” in 2013, when the more direct method will be in place. The year 2013was chosen by ICE and DOJ for policy and resource feasibility reasons.

Secure Communities’ Use of IDENT/IAFIS Interoperability1

In Fiscal Year 2008, Congress appropriated $200 million for ICE to “improve and modernizeefforts to identify aliens convicted of a crime, sentenced to imprisonment, and who may bedeportable, and remove them from the United States, once they are judged deportable….”2Inresponse, ICE launched the Secure Communities initiative to transform the way ICE identifiesand removes criminal aliens from the United States. In this initiative, Secure Communitiesutilizes existing technology, i.e. the ability of IDENT and IAFIS to share information, not onlyto accomplish its goal of identifying criminal aliens, but also to share immigration statusinformation with state and local law enforcement agencies (LEAs). The Secure Communities“Program Management Office” provides the planning and outreach support for ongoing effortsto activate IDENT/IAFIS Interoperability in jurisdictions nationwide. See generally SecureCommunities: Quarterly Report, Fiscal Year Quarterly Report to Congress Third Quarter, at iv,20. (Aug 11, 2010).The following is a description of the full IDENT/IAFIS Interoperability process:

1. When a subject is arrested and booked into custody, the arresting LEA sends thesubject’s fingerprints and associated biographical information to IAFIS via theappropriate State Identification Bureau (SIB).

2. CJIS3electronically routes the subject’s biometric and biographic information to US-VISIT/IDENT to determine if there is a fingerprint match with records in its system.

3. As a result of a fingerprint match with data in IDENT, CJIS generates an ImmigrationAlien Query (IAQ) to the ICE Law Enforcement Support Center (LESC).

1“Interoperability” was previously defined as the “sharing of alien immigration history, criminal history, and 

terrorist information based on positive identification and the interoperable capabilities of IDENT and IAFIS.”DHS IDENT/IAFIS Interoperability Report, at p. 2 (May, 2005). Currently, Secure Communities officially refersto the process as “IDENT/IAFIS Interoperability.”2

Consolidated Appropriations Act, 2008, Pub. L. No. 110-161, 121 Stat 1844, 2050 (2007).3

“CJIS,” which stands for the FBI’s Criminal Justice Information Services Division, manages IAFIS.

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

Page 41: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 41/160

3

4. The LESC queries law enforcement and immigration databases to make an initialimmigration status determination and generates an Immigration Alien Response (IAR)to prioritize enforcement actions.

5. The LESC sends the IAR to CJIS, which routes it to the appropriate State SIB to send to the originating LEA. The LESC also sends the IAR to the local ICE field office,which prioritizes enforcement actions based on level of offense.

There are two types of participation in Secure Communities by which IDENT/IAFISInteroperability is deployed. First, participation may involve “full-cycle” information-sharingin which the SIB and LEA choose to participate and receive the return message from theIDENT/IAFIS Interoperability process informing about the subject’s immigration status (SeeStep 5, first sentence). Second, a state or LEA may choose to participate but elect not toreceive the return message or the state may not have the technological ability to receive thereturn message from CJIS or relay the message to the LEA.

 IDENT/IAFIS Interoperability in 2013According to Secure Communities, Assistant Director David Venturella and the CJIS Director reached an agreement by which CJIS will send ICE, starting in 2013, all fingerprint requestsfrom any LEAs that are not participating in Secure Communities. This future informationsharing will not include the component of the current IDENT/IAFIS Interoperability processwhere the SIB and LEA receive (if technically feasible) the automatic return message fromICE regarding the subject’s immigration status. According to Secure Communities, this process is technologically available now; however for policy reasons and to ensure adequateresources are in place, CJIS and Secure Communities have currently chosen to wait until 2013,when all planned deployments should be completed, until instituting this process.

Current CJIS-Required Tasks In Order to Physically Deploy IDENT/IAFIS  Interoperability to an LEA

According to Secure Communities, there are two ministerial-related IT tasks that, pursuant tocurrent CJIS policy, must be performed in order to physically deploy IDENT/IAFISInteroperability to a LEA. The LEA must “validate” its “unique identifier” (called an “ORI”)that is attached to its terminal (i.e, a state or local official contacts CJIS to inform CJIS that theORI pertains to the LEA’s terminal). Once this validation occurs, CJIS must note within IAFISthe LEA’s ORI so that IAFIS will be informed to relay fingerprints to IDENT that originatefrom the LEA.

4  

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

(b) (5)

(b) (5)

Page 42: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 42/160

4

Discussion

The FBI has Statutory Authority To Share Fingerprint Submission Information with DHS/ICE Via IDENT/IAFIS Interoperability, and this Authority Supports theMandatory Nature of Anticipated 2013 Secure Communities Information-Sharing  Deployment 

It is unquestioned that the FBI has authority to share fingerprint information with DHS, and,therefore, ICE. This authority derives from three distinct statutes: 28 U.S.C § 534, relating toAttorney General sharing of criminal records with other government officials: 8 U.S.C. § 1722,which mandates a data-sharing system to enable intelligence and law enforcement agencies todetermine the inadmissibility or deportability of an alien; and 42 U.S.C. §14616, whichestablishes an information-sharing compact between the federal government and ratifyingstates. Federal register notices and the legislative history of these provisions make plain that asystem such as the 2013 Secure Communities deployment is mandatory in nature.

28 U.S.C. § 534Specifically, 28 U.S.C. § 534 provides that the Attorney General shall “acquire, collect,classify, and preserve identification, criminal identification, crime, and other records.” 28U.S.C. § 534(a)(1). That law also provides for the sharing of the information, by requiring thatthe Attorney General “exchange such records and information with, and for the official use of,authorized officials of the Federal Government. . . .” 28 U.S.C. § 534(a)(4); see 8 U.S.C. §1105 (FBI must provide ICE access to criminal history record information contained within National Crime Information Center files). Further, the applicable System of Records Noticefor the FBI’s Fingerprint Identification Records System (FIRS), which are maintained withinIAFIS, provides that identification and criminal history record information (i.e., fingerprintsand rap sheets) may be disclosed, in relevant part, to a federal law enforcement agency directlyengaged in criminal justice activity “where such disclosure may assist the recipient in the performance of a law enforcement function” or to a federal agency for “a compatible civil lawenforcement function; or where such disclosure may promote, assist, or otherwise serve themutual law enforcement efforts of the law enforcement community.” Notice of Modified Systems of Records, 64 Fed. Reg. 52343, 52348 (September 28, 1999).

8 U.S.C. § 1722The FBI has further authority to share the fingerprint information with DHS via IDENT/IAFISInteroperability. Specifically, Congress required the establishment of an interoperableelectronic data system to provide current and immediate access to information in databases of Federal law enforcement agencies and the intelligence community that is relevant to determinethe admissibility or deportability of an alien. See 8 U.S.C. § 1722.5IDENT/IAFIS5

8 U.S.C. § 1722 provides, in relevant part:(2) Requirement for interoperable data systemUpon the date of commencement of implementation of the plan required by section 1721(c), the President shall

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

(b) (5)

Page 43: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 43/160

5

Interoperability is the technological mechanism that was developed pursuant to thisinformation-sharing requirement by which the FBI automates the sharing of current fingerprintsubmissions by LEAs to IAFIS6with DHS so that DHS may, in part, determine theadmissibility or deportability of an alien based on the alien’s criminal history.From the early stages of the IDENT/IAFIS integration efforts, Congress fully intended thatIDENT/IAFIS Interoperability involve both the sharing of information between the FBI and DHS, but also the sharing of the relevant immigration information between the federalagencies and state and local law enforcement. Specifically, Congress described the earlyIDENT/IAFIS integration project as follows:

This project was established to integrate the separate identification systems operated bythe Department of Homeland Security (DHS) with the Federal Bureau of Investigation(FBI). The IDENT/IAFIS project was designed to support the apprehension and 

 prosecution of criminal aliens and to provide State and local law enforcement personnelwith direct access to DHS data through IAFIS. With realtime connection between thetwo systems, DHS would have the capability to determine whether an apprehended  person is subject to a currently posted Want/Warrant or has a record in the FBI'sCriminal Master File. Collaterally, the integration of IDENT and IAFIS would enablecognizant law enforcement agencies to obtain all relevant immigration information as part of a criminal history response from a single FBI search.

develop and implement an interoperable electronic data system to provide current and immediate access toinformation in databases of Federal law enforcement agencies and the intelligence community that is relevant todetermine whether to issue a visa or to determine the admissibility or deportability of an alien (also known as the“Chimera system”).

8 U.S.C. 1721, referred to above, provides, in relevant part:(a) Interim directiveUntil the plan required by subsection (c) of this section is implemented, Federal law enforcement agencies and theintelligence community shall, to the maximum extent practicable, share any information with the Department of State and the Immigration and Naturalization Service relevant to the admissibility and deportability of aliens,consistent with the plan described in subsection (c) of this section.(b) Report identifying law enforcement and intelligence information(1) In general

 Not later than 120 days after May 14, 2002, the President shall submit to the appropriate committees of Congressa report identifying Federal law enforcement and the intelligence community information needed by theDepartment of State to screen visa applicants, or by the Immigration and Naturalization Service to screenapplicants for admission to the United States, and to identify those aliens inadmissible or deportable under theImmigration and Nationality Act [8 U.S.C.A. § 1101 et seq.](2) Omitted (c) Coordination plan(1) Requirement for plan

 Not later than one year after October 26, 2001, the President shall develop and implement a plan based on thefindings of the report under subsection (b) of this section that requires Federal law enforcement agencies and theintelligence community to provide to the Department of State and the Immigration and Naturalization Service allinformation identified in that report as expeditiously as practicable.6

The States, whose record repositories are the primary source of criminal history records maintained at the FBI,are not required to provide fingerprint information to the FBI, but do so voluntarily in order to gain the mutual

 benefit of receiving access to criminal history information on individuals who have resided in other States. SeePrivacy Impact Assessment for the Federal Bureau of Investigation Fingerprint Identification Records System(FIRS) Integrated Automated Fingerprint Identification System (IAFIS) Outsourcing for Noncriminal JusticePurposes – Channeling (May 5, 2008) (available on FBI’s website). State law, however, may require LEAs tosend the fingerprints to IAFIS upon each arrest. See, e.g ., Cal. Penal Code § 13150.

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

Page 44: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 44/160

6

H.R. Rep. No. 109-118 (2005). Congress similarly explained that it was not only crucial thatDHS and the Department of Justice ensure that IDENT “is able to retrieve, in real time, theexisting biometric information contained in the IAFIS database7…[but] it is equally essentialfor the FBI, and State and local law enforcement to have the ability to retrieve the proper levelof information out of the IDENT/USVISIT database.”8S. Rep. No. 108-280, at 15 (2004)(emphasis added). Because IDENT/IAFIS Interoperability accomplishes the Congressionally-intended information-sharing objectives, Congress has explicitly supported expansion of Secure Communities. See H.R. Rep. No. 111-57 (2009).

42 U.S.C. § 14616

42 U.S.C. §14616 also supports the mandatory nature of Secure Communities, at least for twenty-nine states. This statute establishes a compact for the organization of an electronicinformation sharing system among the federal government and the states to exchange criminalhistory records for non-criminal justice purposes authorized by Federal or State law, includingimmigration and naturalization matters. See 42 U.S.C. § 14616. Under this compact, the FBIand the ratifying states agree to maintain detailed databases of their respective criminal historyrecords, including arrests and dispositions, and to make them available to the federalgovernment and to other ratifying states for authorized purposes. See 42 U.S.C. 14616(b).According to the FBI website, twenty-nine states have ratified the compact as of July 1, 2010.9For these twenty-nine states, a court may find participation in Secure Communities mandatorysince they are already required by the above statute to make their criminal history recordsavailable for immigration matters.

Compelling Participation in Secure Communities in 2013 Does Not RaiseConstitutional Concerns

Although LEAs may argue that the Tenth Amendment of the U.S. Constitution prohibits ICEfrom compelling participation in Secure Communities, applicable case law supports a position

that Tenth Amendment protections are not at issue. Under the Tenth Amendment, “[t]heFederal Government may not compel the States to implement, by legislation or executiveaction, federal regulatory programs.”10

 Printz v. United States, 521 U.S. 898, 925 (1997).Similarly, “[t]he Federal Government may neither issue directives requiring the States to7

Similarly, Congress later reiterated “it is essential that. . . IDENT and US-VISIT can retrieve, in real time, biometric information contained in the IAFIS database, and that the IAFIS database can retrieve, in real time, biometric information contained in IDENT and US-VISIT.” H.R. Rep. No. 108-792 (2004).8The Senate Committee for Appropriations further stated, with respect to early IDENT/IAFIS integration efforts,that “in order for Federal, State and local law enforcement agencies to effectively fight crime, they need to be ableto access fingerprint records of visitors and immigration law violators.” S. Rep. No. 108-344 (2004).9See Compact Council, National Crime Prevention and Privacy Compact (2010),http://www.fbi.gov/hq/cjisd/web%20page/pdf/compact_history_pamphlet.pdf (containing a listing of Compactstates).10

Both DHS and ICE officials have described Secure Communities as a “program.” See e.g., Fiscal 2011Appropriations: Homeland Security, Committee on House Appropriations Subcommittee on Homeland Security(2010) (statement of ICE Director Morton) (thanking Subcommittee and the Committee for “providing vitalresources to establish the Secure Communities program”); DHS Office of Inspector General, The Performance of 287(g) Agreements, at 82 (2010). Moreover, Secure Communities’ staff is located in the “Program ManagementOffice.” Thus, ICE would likely not prevail in any argument that Secure Communities is not a federal “program.”

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

Page 45: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 45/160

7

address particular problems, nor command the States’ officers, or those of their politicalsubdivisions, to administer or enforce a federal regulatory program.”  Id. at 935. In Printz , theSupreme Court found unconstitutional Brady Handgun Violence Prevention Act provisionsrequiring the chief law enforcement officer of each jurisdiction to conduct background checkson prospective handgun purchasers and to perform certain related ministerial tasks. See id. at933-34. The Supreme Court held that such provisions constituted the forced participation of the States’ executive in the actual administration of a federal program. See id. at 935.Significantly, however, the Printz court also held that that “federal laws which require onlythe provision of information to the Federal Government” do not raise the TenthAmendment prohibition of “the forced participation of the States' executive in the actualadministration of a federal program.”  Id. at 918 (emphasis added).Applying this holding, the United States District Court for the Southern District of New York found no Tenth Amendment issue in a federal act that required “state officials to provideinformation regarding sexual offenders-information that the state officials will typicallyalready have through their own state registries-to the federal government.” U.S. v. Brown, No.07-Cr. 485(HB), 2007 WL 4372829, at * 5 (S.D.N.Y. Dec. 12, 2007). The District Courtexplained that “because the individuals subject to the Act are already required to register  pursuant to state registration laws, and because the Act only requires states to provideinformation rather than administer or enforce a federal program, the Act does not violate theTenth Amendment.”  Id. at * 6.Similarly, the United States Court of Appeals for the Fourth Circuit upheld a District Court’sconclusion that a federal reporting requirement does not violate the Tenth Amendment becausethe federal law only requires the state to forward information and “does not require the state todo anything that the state itself has not already required, authorized, or provided by its ownlegislative command.” Frielich v Upper Chesapeake Health, Inc., 313 F.3d 205, 214 (4th Cir.2002) (citing Frielich v. Board of Directors of Upper Chesapeake Health, Inc., 142 F.Supp.2d 679, 696 (D.Md. 2001)); see United States v. Keleher , No. 1:07-cr-00332-OWW, 2008 WL5054116, at * 12 (E.D.Cal. Nov. 19, 2008) (rejecting a Tenth Amendment challenge to the provisions of the same federal law as in Brown that required a state to accept registrationinformation from a sex offender, holding that, unlike the state officers in  Printz , the federal law“does not require states, or their state officials, to do anything they do not already do under their own laws.”) (citing United States v. Pitts, No. 07-157-A, 2007 WL 3353423 (M.D.La. Nov. 7, 2007)); cf. Reno v. Condon, 528 U.S. 141, 150-51 (2000) (holding a federal act whichrestricts the nonconsensual sale or release by a state of a driver’s personal information does notviolate the Tenth Amendment, as the Act does not require the states in their sovereign capacityto regulate their own citizens, but regulates the states as the owners of databases).A court following the above reasoning would similarly recognize that an LEA’s participationin Secure Communities (i.e. accepting deployment of IDENT/IAFIS Interoperability) does notviolate the Tenth Amendment. Specifically, participation in Secure Communities does notalter the normal booking process and only requires the same provision of information to theFBI that the LEAs currently provide as regular practice11or as required by state law. See, e.g .,Cal. Penal Code § 13150 (requiring LEAs to provide fingerprint submissions along with arrestdata to the Department of Justice for each arrest made) . Therefore, unlike in Printz where the

11See FN 6, supra.

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

Page 46: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 46/160

8

federal law forced the state officials to perform added duties, participation in SecureCommunities does not require local officials “to do anything they do not already do.”Despite the above reasoning, a challenger to Secure Communities may argue that the currenttask to validate the LEA’s ORI prior to activating IDENT/IAFIS Interoperability extends participation in Secure Communities beyond mere information-sharing and constitutes thesame prohibited conscription of state or local officials as in  Printz . The Supreme Court in Printz held that Congress cannot force state officials to even perform “discrete, ministerialtasks” to implement a federal regulatory program.  Printz , 521 U.S. at 929-30. The Printz court explained “even when the States are not forced to absorb the costs of implementing afederal program, they are still put in the position of taking the blame for its burdensomenessand for its defects.”  Id. at 930. A court following this Printz reasoning could recognize thatcertain jurisdictions do not want to be blamed for the immigration consequences of itsconstituents resulting from its participation in Secure Communities.ICE has several defenses to the above claim. First, Secure Communities, CJIS, and US-VISITare currently discussing the necessity of this ministerial requirement; therefore, it is possiblethat this additional pre-activation requirement may not exist by 2013, and may be eliminated sooner. Second, state and local officials already validate the ORIs bi-annually with the FBI;

therefore, like in Frielich, Keleher , and  Pitts, this validation task does not force state and localofficials “to do anything they do not already do.” Last, ICE may argue that, despite thisministerial task, participation in Secure Communities does not compel state or local officials toenact a legislative program, administer regulations, or perform any functions enforcingimmigration law, but rather only involves the same sharing of information to the federalgovernment as currently practiced. See New York v. United States, 505 U.S. 144, 175-76(1992) (holding a federal law violated the Tenth Amendment by requiring states either to enactlegislation providing for the disposal of radioactive waste generated within their borders or toimplement an administrative solution for taking title to, and possession of, the waste).A challenger to Secure Communities may also argue, in reliance on Printz , that 2013 participation in Secure Communities violates the Tenth Amendment because it may require theState to expend significant funds in order to implement the program. The Printz Court held that Congress cannot force state governments to absorb the financial burden of implementing afederal regulatory program. See Printz , 518 U.S. at 930. Currently, according to SecureCommunities, an SIB may need to pay for its own technological upgrades in order to have thecapability to receive the return IAR message from CJIS in the IDENT/IAFIS Interoperability process or relay that message to the LEA.The above fiscal argument is misleading and should fail both in 2010 and in 2013. First, participation in Secure Communities does not require the states or LEAs to receive the returnIAR message. In fact, Secure Communities has consistently informed LEAs that they may“opt out” of receiving the return IAR message if they so choose or if the SIB does not have thetechnological capability to receive that message or relay that message to the LEA. Second, as per the aforementioned agreement between Mr. Venturella and the CJIS Director for 2013,the 2013 process by which CJIS will send ICE all fingerprint requests from any non- participating LEA will not include the component of the current IDENT/IAFIS Interoperability process where the SIB and LEA receive the automatic return IAR message. Therefore, the2013 process would not require the state to expend any funds in order for IDENT/IAFISInteroperability to be deployed.

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

Page 47: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 47/160

9

Certain Statutes Relation to the Sharing of Immigration Information Do Not Lend Support to the Argument that Secure Communities Will Become Mandatory in 2013Last, please note that 8 U.S.C. §§ 137312and 1644,13which relate to voluntary sharing of immigration information by government employees, do not support mandatory participation inSecure Communities, but lack of support by these statutes is essentially irrelevant becausestatutory support exists elsewhere. We include them because the notoriety of the legal casesassociated with these statutes has potential to become a “red herring” in discussions about themandatory nature of Secure Communities participation. In City of New York v. United States,179 F.3d 29 (2d Cir. 1999), the Mayor of New York City issued a 1989 order prohibiting cityemployees from voluntarily sending immigration status information about an individual to theimmigration authorities. Following passage of IIRIRA and PRWORA in 1996, the City brought suit against the federal government, claiming, in relevant part, that 8 U.S.C. § 1373and 8 U.S.C. § 1644 violated the Tenth Amendment by directly compelling states to enact and enforce a federal regulatory program. The Second Circuit held that 8 U.S.C. § § 1373 and 1644 “do not directly compel states or localities to require or prohibit anything. Rather, they prohibit state and local government entities or officials only from directly restricting thevoluntary exchange of immigration information with the INS.” City of New York , 179 F. 3d at

35.ConclusionBased on applicable statutory authority, legislative history, and case law, we conclude thatthere is ample support for the argument that participation in Secure Communities will bemandatory in 2013, and that the procedures by which state and local information will be shared with ICE at that time does not create legitimate Tenth Amendment concerns of unconstitutionalcompulsion by states in a mandatory federal program.

128 U.S.C. § 1373 provides, in relevant part:

(a) In general Notwithstanding any other provision of Federal, State or local law, a Federal, State or local government entity or official may not prohibit, or in any way restrict, any governmental entity or official from sending to, or receivingfrom, the Immigration and Naturalization Service information regarding the citizenship or immigration status,lawful or unlawful, of any individual.(b) Additional authority of government entities

 Notwithstanding any other provision of Federal, State, or local law, no person or agency may prohibit, or in anyway restrict, a Federal, State, or local government entity from doing any of the following with respect toinformation regarding the immigration status, lawful or unlawful, of any individual:

(1) Sending such information to, or requesting or receiving such information from, the Immigration and  Naturalization Service.(2) Maintaining such information.(3) Exchanging such information with any other Federal, State, or local governmental entity.

138 U.S.C. § 1644 provides “Notwithstanding any other provision of Federal, State, or local law, no State or local

government entity may be prohibited, or in any way restricted, from sending to or receiving from theImmigration and Naturalization Service information regarding the immigration status, lawful or unlawful, of analien in the United States.”

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

Page 48: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 48/160

10

cument ID: 0.7.98.73213.1 CLEAN ICE FOIA 10-2674.000

Page 49: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 49/160

Microsoft OutlookFrom: Vincent, Peter SSent: Monday, October 04, 2010 8:02 AMTo: Perry, Carl E; Ramlogan, RiahSubject: RE: SC Memo

1/3/2011

Carl:Remind me: Did this memorandum (or a similar one) ever go to Beth last week?Best regards,Peter Peter S. VincentPrincipal Legal Advisor Office of the Principal Legal Advisor U.S. Immigration and Customs EnforcementU.S. Department of Homeland Security

From: Perry, Carl ESent: Friday, October 01, 2010 1:31 PMTo: Vincent, Peter S; Ramlogan, RiahSubject: SC MemoImportance: HighPeter- suggested that I paste this into the B’berry so you can read. I have read it once and think itsgood. I would like to furnish to Beth – along with the simple draft changes to SCAAP she aske toprovide—along with the caveat that this is a draft neither you nor Riah have reviewed. Please let meknow.

MEMORANDUM FOR: Peter S. VincentPrincipal Legal Advisor 

THROUGH:

Chief, Enforcement Law SectionFROM:

Associate Legal Advisor, Enforcement Law SectionSUBJECT: Secure Communities – Mandatory in 2013

cument ID: 0.7.98.73211 CLEAN ICE FOIA 10-2674.000

b 6 , b

(

 

(b)(6),

(b)(6), (b)(7)

(b)(6), (b)(7)(C)

Page 50: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 50/160

Executive SummaryWe present the arguments supporting a position that participation in the Secure Communities will bemandatory in 2013. Based on applicable statutory authority, legislative history, and case-law, weconclude that participation in the Secure Communities will be mandatory in 2013 without violating theTenth Amendment.

Background 

Secure Communities’ Use of IDENT/IAFIS Interoperability [1] 

In Fiscal Year 2008, Congress appropriated $200 million for ICE to “improve and modernize efforts toidentify aliens convicted of a crime, sentenced to imprisonment, and who may be deportable, and removethem from the United States, once they are judged deportable….”[2]

In response, ICE launched theSecure Communities initiative to transform the way ICE identifies and removes criminal aliens from theUnited States. In this initiative, Secure Communities utilizes existing technology, i.e. the ability of IDENT and IAFIS to share information, not only to accomplish its goal of identifying criminal aliens, butalso to share immigration status information with state and local law enforcement agencies (LEAs). TheSecure Communities “Program Management Office” provides the planning and outreach support for ongoing efforts to activate IDENT/IAFIS Interoperability in jurisdictions nationwide. See generallySecure Communities: Quarterly Report, Fiscal Year Quarterly Report to Congress Third Quarter, at iv,20. (Aug 11, 2010).The following is a description of the full IDENT/IAFIS Interoperability process:

1. When a subject is arrested and booked into custody, the arresting LEA sends the subject’sfingerprints and associated biographical information to IAFIS via the appropriate StateIdentification Bureau (SIB).

2. CJIS[3]electronically routes the subject’s biometric and biographic information to US-VISIT/IDENT to determine if there is a fingerprint match with records in its system.

3. As a result of a fingerprint match with data in IDENT, CJIS generates an Immigration AlienQuery (IAQ) to the ICE Law Enforcement Support Center (LESC).

4. The LESC queries law enforcement and immigration databases to make an initial immigrationstatus determination and generates an Immigration Alien Response (IAR) to prioritizeenforcement actions.

5. The LESC sends the IAR to CJIS, which routes it to the appropriate State SIB to send to theoriginating LEA. The LESC also sends the IAR to the local ICE field office, which prioritizesenforcement actions based on level of offense.

There are two types of participation in Secure Communities by which IDENT/IAFIS Interoperability is

deployed. First, participation may involve “full-cycle” information-sharing in which the SIB and LEAreceive the return message from the IDENT/IAFIS Interoperability process informing about the subject’simmigration status (See Step 5, first sentence). Second, a state or LEA may choose to participate butelect not to receive the return message or the state may not have the technological ability to receive thereturn message from CJIS or relay the message to the LEA.

 IDENT/IAFIS Interoperability in 2013According to Secure Communities, Assistant Director David Venturella and the CJIS Director reached an

1/3/2011

cument ID: 0.7.98.73211 CLEAN ICE FOIA 10-2674.000

Page 51: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 51/160

agreement by which CJIS will send ICE, starting in 2013, all fingerprint requests from any LEAs that arenot participating in Secure Communities. This future information sharing will not include the componentof the current IDENT/IAFIS Interoperability process where the SIB and LEA receive (if technicallyfeasible) the automatic return message from ICE regarding the subject’s immigration status. Accordingto Secure Communities, this process is technologically available now; however for policy reasons and toensure adequate resources are in place, CJIS and Secure Communities have currently chosen to wait until2013, when all planned deployments should be completed, until instituting this process.

Current CJIS-Required Tasks In Order to Physically Deploy IDENT/IAFIS Interoperability to an LEA

According to Secure Communities, there are two ministerial-related IT tasks that, pursuant to currentCJIS policy, must be performed in order to physically deploy IDENT/IAFIS Interoperability to a LEA.The LEA must “validate” its “unique identifier” (called an “ORI”) that is attached to its terminal (i.e, astate or local official contacts CJIS to inform CJIS that the ORI pertains to the LEA’s terminal). Once thisvalidation occurs, CJIS must note within IAFIS the LEA’s ORI so that IAFIS will be informed to relayfingerprints to IDENT that originate from the LEA.

   

DiscussionThe FBI’s Authority To Share Fingerprint Submission Information with DHS Via IDENT/IAFIS  Interoperability

It is unquestioned that the FBI may share fingerprint information with DHS. 28 U.S.C. § 534 providesthat the Attorney General shall “acquire, collect, classify, and preserve identification, criminalidentification, crime, and other records.” 28 U.S.C. § 534(a)(1). That law also provides for the sharing of the information, by requiring that the Attorney General “exchange such records and information with,and for the official use of, authorized officials of the Federal Government. . . .” 28 U.S.C. § 534(a)(4); see 8 U.S.C. § 1105 (FBI must provide ICE access to criminal history record information contained within National Crime Information Center files). Further, the applicable System of Records Notice for the FBI’s Fingerprint Identification Records System (FIRS), which are maintained within IAFIS, provides that identification and criminal history record information ( i.e., fingerprints and rap sheets) may be disclosed, in relevant part, to a federal law enforcement agency directly engaged in criminal justiceactivity “where such disclosure may assist the recipient in the performance of a law enforcementfunction” or to a federal agency for “a compatible civil law enforcement function; or where suchdisclosure may promote, assist, or otherwise serve the mutual law enforcement efforts of the lawenforcement community.” Notice of Modified Systems of Records, 64 Fed. Reg. 52343, 52348(September 28, 1999).The FBI has further authority to share the fingerprint information with DHS via IDENT/IAFISInteroperability. Specifically, Congress required the establishment of an interoperable electronic datasystem to provide current and immediate access to information in databases of Federal law enforcement

1/3/2011

cument ID: 0.7.98.73211 CLEAN ICE FOIA 10-2674.000

(b) (5)

Page 52: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 52/160

agencies and the intelligence community that is relevant to determine the admissibility or deportability of an alien. See 8 U.S.C. § 1722.[5]

IDENT/IAFIS Interoperability is the technological mechanism that wasdeveloped pursuant to this information-sharing requirement by which the FBI automates the sharing of current fingerprint submissions by LEAs to IAFIS[6]

with DHS so that DHS may, in part, determine theadmissibility or deportability of an alien based on the alien’s criminal history.From the early stages of the IDENT/IAFIS integration efforts, Congress fully intended thatIDENT/IAFIS Interoperability involve both the sharing of information between the FBI and DHS, butalso the sharing of the relevant immigration information between the federal agencies and state and locallaw enforcement. Specifically, Congress described the early IDENT/IAFIS integration project asfollows:

This project was established to integrate the separate identification systems operated by theDepartment of Homeland Security (DHS) with the Federal Bureau of Investigation (FBI). TheIDENT/IAFIS project was designed to support the apprehension and prosecution of criminalaliens and to provide State and local law enforcement personnel with direct access to DHS datathrough IAFIS. With realtime connection between the two systems, DHS would have thecapability to determine whether an apprehended person is subject to a currently posted Want/Warrant or has a record in the FBI's Criminal Master File. Collaterally, the integration of IDENT and IAFIS would enable cognizant law enforcement agencies to obtain all relevantimmigration information as part of a criminal history response from a single FBI search.

H.R. Rep. No. 109-118 (2005). Congress similarly explained that it was not only crucial that DHS and the Department of Justice ensure that IDENT “is able to retrieve, in real time, the existing biometricinformation contained in the IAFIS database[7]

…[but] it is equally essential for the FBI, and State and local law enforcement to have the ability to retrieve the proper level of information out of theIDENT/USVISIT database.”[8]

S. Rep. No. 108-280, at 15 (2004) (emphasis added). BecauseIDENT/IAFIS Interoperability accomplishes the Congressionally-intended information-sharing

objectives, Congress has explicitly supported expansion of Secure Communities. See H.R. Rep. No. 111-57 (2009).42 U.S.C. §14616 also supports the mandatory nature of Secure Communities, at least for twenty-ninestates. This statute establishes a Compact for the organization of an electronic information sharing system among the Federal Government and the States to exchange

criminal history records for noncriminal justice purposes authorized by Federal or State law, includingimmigration and naturalization matters. See 42 U.S.C. § 14616. Under this Compact, the FBI and theratifying states agree to maintain detailed databases of their respective criminal history records, includingarrests and dispositions, and to make them available to the Federal Government and to other ratifyingStates for authorized purposes. See 42 U.S.C. 14616(b). According to the FBI website, twenty-ninestates have ratified the Compact as of July 1, 2010.

[9]For these twenty-nine states, a court may find 

 participation in Secure Communities mandatory since they are already required by the above statute tomake their criminal history records available for immigration matters.

Case Law Supports a Position that Compelling Participation in Secure Communities in2013 Does Not Violate the 10thAmendment 

Although LEAs may argue that the Tenth Amendment prohibits ICE from compelling participation inSecure Communities, applicable case-law supports a position that Tenth Amendment protections are not

1/3/2011

cument ID: 0.7.98.73211 CLEAN ICE FOIA 10-2674.000

Page 53: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 53/160

at issue. Under the Tenth Amendment, “[t]he Federal Government may not compel the States toimplement, by legislation or executive action, federal regulatory programs.”[10]

 Printz v. United States,521 U.S. 898, 925 (1997). Similarly, “[t]he Federal Government may neither issue directives requiringthe States to address particular problems, nor command the States’ officers, or those of their politicalsubdivisions, to administer or enforce a federal regulatory program.”  Id. at 935. In Printz, the SupremeCourt found unconstitutional Brady Handgun Violence Prevention Act provisions requiring the chief law

enforcement officer of each jurisdiction to conduct background checks on prospective handgun purchasers and to perform certain related ministerial tasks. See id. at 933-34. The Supreme Court held that such provisions constituted the forced participation of the States' executive in the actualadministration of a federal program. See id. at 935.The Printz court, however, also held that that “federal laws which require only the provision of information to the Federal Government” do not raise the Tenth Amendment prohibition of “the forced  participation of the States' executive in the actual administration of a federal program.”  Id. at 918. Under this rationale, the United States District Court for the Southern District of New York found no TenthAmendment issue in a federal act that required “state officials to provide information regarding sexualoffenders-information that the state officials will typically already have through their own state registries-to the federal government.” U.S. v. Brown, No. 07-Cr. 485(HB), 2007 WL 4372829, at * 5 (S.D.N.Y.

Dec. 12, 2007). The District Court explained that “because the individuals subject to the Act are alreadyrequired to register pursuant to state registration laws, and because the Act only requires states to provideinformation rather than administer or enforce a federal program, the Act does not violate the TenthAmendment.”  Id. at * 6. Similarly, the United States Court of Appeals for the Fourth Circuit upheld aDistrict Court’s conclusion that a federal reporting requirement does not violate the Tenth Amendment because the federal law only requires the state to forward information and “does not require the state todo anything that the state itself has not already required, authorized, or provided by its own legislativecommand.” Frielich v Upper Chesapeake Health, Inc., 313 F.3d 205, 214 (4thCir. 2002) (citing Frielichv. Board of Directors of Upper Chesapeake Health, Inc., 142 F.Supp.2d 679, 696 (D.Md. 2001)); seeUnited States v. Keleher , No. 1:07-cr-00332-OWW, 2008 WL 5054116, at * 12 (E.D.Cal. Nov. 19, 2008)(rejecting a Tenth Amendment challenge to the provisions of the same federal law as in  Brown thatrequired a state to accept registration information from a sex offender, holding that, unlike the state

officers in Printz, the federal law “does not require states, or their state officials, to do anything they donot already do under their own laws.”) (citing United States v. Pitts, No. 07-157-A, 2007 WL 3353423(M.D.La. Nov. 7, 2007)); cf. Reno v. Condon, 528 U.S. 141, 150-51 (2000) (holding a federal act whichrestricts the nonconsensual sale or release by a state of a driver's personal information does not violate theTenth Amendment, as the Act does not require the states in their sovereign capacity to regulate their owncitizens, but regulates the states as the owners of databases).A court following the above reasoning would similarly recognize that an LEA’s participation in SecureCommunities (i.e. accepting deployment of IDENT/IAFIS Interoperability) does not violate the TenthAmendment. Specifically, participation in Secure Communities does not alter the normal booking process and only requires the same provision of information to the FBI that the LEAs currently provide asregular practice[11]

or as required by state law. See, e.g ., Cal. Penal Code § 13150 (requiring LEAs to provide fingerprint submissions along with arrest data to the Department of Justice for each arrest made) .Therefore, unlike in Printz where the federal law forced the state officials to perform added duties, participation in Secure Communities does not require local officials “to do anything they do not alreadydo.”Despite the above reasoning, a challenger to Secure Communities may argue that the current task tovalidate the LEA’s ORI prior to activating IDENT/IAFIS Interoperability extends participation in SecureCommunities beyond mere information-sharing and constitutes the same prohibited conscription of state

1/3/2011

cument ID: 0.7.98.73211 CLEAN ICE FOIA 10-2674.000

Page 54: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 54/160

or local officials as in Printz. The Supreme Court in Printz held that Congress cannot force state officialsto even perform “discrete, ministerial tasks” to implement a federal regulatory program.  Printz, 521 U.S.at 929-30. The Printz court explained “even when the States are not forced to absorb the costs of implementing a federal program, they are still put in the position of taking the blame for its burdensomeness and for its defects.”  Id. at 930. A court following this Printz reasoning could recognize that certain jurisdictions do not want to be blamed for the immigration consequences of itsconstituents resulting from its participation in Secure Communities.ICE has several defenses to the above claim. First, as discussed  supra, Secure Communities, CJIS, and US-VISIT are currently discussing the necessity of this ministerial requirement; therefore, it is possiblethat this additional pre-activation requirement may not exist by 2013, if not sooner. Second, state and local officials already validate the ORIs bi-annually with the FBI; therefore, like in Frielich, Keleher , and  Pitts, this validation task does not force state and local officials “to do anything they do not already do.”Last, ICE may argue that, despite this ministerial task, participation in Secure Communities does notcompel state or local officials to enact a legislative program, administer regulations, or perform anyfunctions enforcing immigration law, but rather only involves the same sharing of information to theFederal Government as currently practiced. See New York v. United States, 505 U.S. 144, 175-76 (1992)(holding a federal law violated the Tenth Amendment by requiring States either to enact legislation providing for the disposal of radioactive waste generated within their borders or to implement anadministrative solution for taking title to, and possession of, the waste).A challenger to Secure Communities may also argue, in reliance on Printz, that 2013 participation inSecure Communities violates the Tenth Amendment because it may require the State to expend significant funds in order to implement the program. The Printz Court held that Congress cannot forcestate governments to absorb the financial burden of implementing a federal regulatory program. See Printz, 518 U.S. at 930. Currently, according to Secure Communities, an SIB may need to pay for itsown technological upgrades in order to have the capability to receive the return IAR message from CJISin the IDENT/IAFIS Interoperability process or relay that message to the LEA.The above fiscal argument is misleading and should fail both in 2010 and in 2013. First, participation inSecure Communities does not require the states or LEAs to receive the return IAR message. In fact,Secure Communities has consistently informed LEAs that they may “opt out” of receiving the return IAR message if they so choose or if the SIB does not have the technological capability to receive that messageor relay that message to the LEA. Second, as per the aforementioned agreement between Mr. Venturellaand the CJIS Director for 2013, the 2013 process by which CJIS will send ICE all fingerprint requestsfrom any non-participating LEA will not include the component of the current IDENT/IAFISInteroperability process where the SIB and LEA receive the automatic return IAR message. Therefore,the 2013 process would not require the state to expend any funds in order for IDENT/IAFISInteroperability to be deployed.Last, please note that 8 U.S.C. §§ 1373[12]

and 1644[13]do not support mandatory participation in

Secure Communities. In City of New York v. United States, 179 F.3d 29 (2d Cir. 1999), the Mayor of  New York City issued a 1989 order prohibiting city employees from voluntarily sending immigrationstatus information about an individual to the immigration authorities. Following passage of IIRIRA and PRWORA in 1996, the City brought suit against the federal government, claiming, in relevant part, that 8U.S.C. § 1373 and 8 U.S.C. § 1644 violated the Tenth Amendment by directly compelling states to enactand enforce a federal regulatory program. The Second Circuit held that 8 U.S.C. § § 1373 and 1644 “donot directly compel states or localities to require or prohibit anything. Rather, they prohibit state and localgovernment entities or officials only from directly restricting the voluntary exchange of immigrationinformation with the INS.” City of New York , 179 F. 3d at 35.

1/3/2011

cument ID: 0.7.98.73211 CLEAN ICE FOIA 10-2674.000

Page 55: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 55/160

Carl E. PerryDirector of Enforcement and LitigationOffice of the Principal Legal Advisor U.S. Immigration and Customs Enforcement

[1]“Interoperability” was previously defined as the “sharing of alien immigration history, criminal history, and terrorist

information based on positive identification and the interoperable capabilities of IDENT and IAFIS.” DHS IDENT/IAFISInteroperability Report, at p. 2 (May, 2005). Currently, Secure Communities officially refers to the process as “IDENT/IAFISInteroperability.”[2]

Consolidated Appropriations Act, 2008, Pub. L. No. 110-161, 121 Stat 1844, 2050 (2007).[3]

“CJIS,” which stands for the FBI’s Criminal Justice Information Services Division, manages IAFIS.[4]

According to Secure Communities, the agencies discussed this issue at a September 21, 2010 meeting, but did not come to aresolution.[5]

8 U.S.C. § 1722 provides, in relevant part:(2) Requirement for interoperable data systemUpon the date of commencement of implementation of the plan required by section 1721(c), the President shall develop and implement an interoperable electronic data system to provide current and immediate access to information in databases of Federal law enforcement agencies and the intelligence community that is relevant to determine whether to issue a visa or todetermine the admissibility or deportability of an alien (also known as the “Chimera system”).

8 U.S.C. 1721, referred to above, provides, in relevant part:(a) Interim directiveUntil the plan required by subsection (c) of this section is implemented, Federal law enforcement agencies and the intelligencecommunity shall, to the maximum extent practicable, share any information with the Department of State and the Immigrationand Naturalization Service relevant to the admissibility and deportability of aliens, consistent with the plan described insubsection (c) of this section.(b) Report identifying law enforcement and intelligence information(1) In general Not later than 120 days after May 14, 2002, the President shall submit to the appropriate committees of Congress a reportidentifying Federal law enforcement and the intelligence community information needed by the Department of State to screenvisa applicants, or by the Immigration and Naturalization Service to screen applicants for admission to the United States, and to identify those aliens inadmissible or deportable under the Immigration and Nationality Act [8 U.S.C.A. § 1101 et seq.](2) Omitted (c) Coordination plan(1) Requirement for plan

 Not later than one year after October 26, 2001, the President shall develop and implement a plan based on the findings of thereport under subsection (b) of this section that requires Federal law enforcement agencies and the intelligence community to

 provide to the Department of State and the Immigration and Naturalization Service all information identified in that report asexpeditiously as practicable.[6]

The States, whose record repositories are the primary source of criminal history records maintained at the FBI, are notrequired to provide fingerprint information to the FBI, but do so voluntarily in order to gain the mutual benefit of receivingaccess to criminal history information on individuals who have resided in other States. See Privacy Impact Assessment for theFederal Bureau of Investigation Fingerprint Identification Records System (FIRS) Integrated Automated FingerprintIdentification System (IAFIS) Outsourcing for Noncriminal Justice Purposes – Channeling (May 5, 2008) (available on FBI’swebsite). State law, however, may require LEAs to send the fingerprints to IAFIS upon each arrest. See, e.g ., Cal. Penal Code§ 13150.[7]

Similarly, Congress later reiterated “it is essential that. . . IDENT and US-VISIT can retrieve, in real time, biometricinformation contained in the IAFIS database, and that the IAFIS database can retrieve, in real time, biometric informationcontained in IDENT and US-VISIT.” H.R. Rep. No. 108-792 (2004).

1/3/2011

cument ID: 0.7.98.73211 CLEAN ICE FOIA 10-2674.000

(b)(6), (b)(7)

Page 56: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 56/160

[8]The Senate Committee for Appropriations further stated, with respect to early IDENT/IAFIS integration efforts, that “in

order for Federal, State and local law enforcement agencies to effectively fight crime, they need to be able to access fingerprintrecords of visitors and immigration law violators.” S. Rep. No. 108-344 (2004).[9]

See Compact Council, National Crime Prevention and Privacy Compact (2010), http://www.fbi.gov/hq/cjisd/web%20page/pdf/compact_history_pamphlet.pdf (containing a listing of Compact states).[10]

Both DHS and ICE officials have described Secure Communities as a “program.” See e.g., Fiscal 2011 Appropriations:Homeland Security, Committee on House Appropriations Subcommittee on Homeland Security (2010) (statement of ICEDirector Morton) (thanking Subcommittee and the Committee for “providing vital resources to establish the SecureCommunities program”); DHS Office of Inspector General, The Performance of 287(g) Agreements, at 82 (2010). Moreover,Secure Communities’ staff is located in the “Program Management Office.” Thus, ICE would likely not prevail in anyargument that Secure Communities is not a federal “program.”[11]

See FN 6, supra.[12]

8 U.S.C. § 1373 provides, in relevant part:(a) In general

 Notwithstanding any other provision of Federal, State or local law, a Federal, State or local government entity or official maynot prohibit, or in any way restrict, any governmental entity or official from sending to, or receiving from, the Immigration and 

 Naturalization Service information regarding the citizenship or immigration status, lawful or unlawful, of any individual.(b) Additional authority of government entities

 Notwithstanding any other provision of Federal, State, or local law, no person or agency may prohibit, or in any way restrict, aFederal, State, or local government entity from doing any of the following with respect to information regarding theimmigration status, lawful or unlawful, of any individual:

(1) Sending such information to, or requesting or receiving such information from, the Immigration and  Naturalization Service.

(2) Maintaining such information.(3) Exchanging such information with any other Federal, State, or local governmental entity.

[13]8 U.S.C. § 1644 provides “Notwithstanding any other provision of Federal, State, or local law, no State or local

government entity may be prohibited, or in any way restricted, from sending to or receiving from the Immigration and  Naturalization Service information regarding the immigration status, lawful or unlawful, of an alien in the United States.”

1/3/2011

cument ID: 0.7.98.73211 CLEAN ICE FOIA 10-2674.000

Page 57: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 57/160

Office of the Principal Legal Advisor U.S. Department of Homeland Security500 12thStreet, SWWashington, DC 20024

A Department of Homeland Security Attorney prepared this document for INTERNAL GOVERNMENT USEONLY. This document is pre-decisional in nature and qualifies as an intra-agency document containingdeliberative process material. This document contains confidential attorney-client communications relating tolegal matter for which the client has sought professional advice. Under exemption 5 of section (b) of 5 U.S.C. §552 (Freedom of Information Act), this material is EXEMPT FROM RELEASE TO THE PUBLIC.

October 2, 2010

MEMORANDUM FOR: Beth N. GibsonAssistant Deputy Director 

FROM: Riah RamloganDeputy Principal Legal Advisor 

SUBJECT: Secure Communities – Mandatory in 2013

Executive SummaryWe present the arguments supporting a position that participation in Secure Communities will be mandatory in 2013. Based on applicable statutory authority, legislative history, and caselaw, we conclude that participation in Secure Communities will be mandatory in 2013 withoutviolating the Tenth Amendment.Because the contemplated 2013 information-sharing technology change forms the factual basisfor the legal analysis, we have included that background here. Readers familiar with thetechnology and the 2013 deployment may proceed directly to the Discussion section.

In the Discussion section, we review the three statutes from which the mandatory nature of the

2013 Secure Communities deployment derives: 28 U.S.C § 534, relating to Attorney Generalsharing of criminal records with other government officials; 8 U.S.C. § 1722, which mandatesa data-sharing system to enable intelligence and law enforcement agencies to determine theinadmissibility or deportability of an alien; and 42 U.S.C. §14616, which establishes aninformation-sharing compact between the federal government and ratifying states.Congressional history further underscores the argument that the 2013 Secure Communitiesdeployment fulfills a Congressional mandate.Our analysis of case law concentrates on  Printz v. United States, 521 U.S. 898, 925 (1997), theseminal case on unconstitutional state participation in mandatory government programs.Significantly, Printz holds that that “federal laws which require only the provision of information to the Federal Government” do not raise the Tenth Amendment prohibition of “theforced participation of the States’ executive in the actual administration of a federal program.” Id. at 918. We examine several potential legal challenges and arguments that law enforcementagencies may make to avoid the reach of Secure Communities in 2013, and conclude that eachseems rather weak in the face of  Printz and its progeny.

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

Page 58: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 58/160

2

Finally, we note that certain statutes relating to immigration information collected by states donot provide a legal basis for characterizing participation in Secure Communities in 2013 asmandatory, but as these are essentially irrelevant given other statutory support, we addressthem only briefly.Background A review of the Secure Communities information-sharing technology, which is admittedlycomplicated, aids the understanding of the applicable law and the corresponding conclusionthat participation will become mandatory in 2013. The process by which fingerprint and other information is relayed will change in 2013 to create a more direct me thod for ICE to receivethat information from DOJ. Consequently, choices available to law enforcement agencies whohave thus far decided to decline or limit their participation in current information-sharing processes will be streamlined and aspects eliminated. In that way, the process, in essence, becomes “mandatory” in 2013, when the more direct method will be in place. The year 2013was chosen by ICE and DOJ for policy and resource feasibility reasons.

Secure Communities’ Use of IDENT/IAFIS Interoperability1

In Fiscal Year 2008, Congress appropriated $200 million for ICE to “improve and modernizeefforts to identify aliens convicted of a crime, sentenced to imprisonment, and who may bedeportable, and remove them from the United States, once they are judged deportable….”2Inresponse, ICE launched the Secure Communities initiative to transform the way ICE identifiesand removes criminal aliens from the United States. In this initiative, Secure Communitiesutilizes existing technology, i.e. the ability of IDENT and IAFIS to share information, not onlyto accomplish its goal of identifying criminal aliens, but also to share immigration statusinformation with state and local law enforcement agencies (LEAs). The Secure Communities“Program Management Office” provides the planning and outreach support for ongoing effortsto activate IDENT/IAFIS Interoperability in jurisdictions nationwide. See generally SecureCommunities: Quarterly Report, Fiscal Year Quarterly Report to Congress Third Quarter, at iv,20. (Aug 11, 2010).The following is a description of the full IDENT/IAFIS Interoperability process:

1. When a subject is arrested and booked into custody, the arresting LEA sends thesubject’s fingerprints and associated biographical information to IAFIS via theappropriate State Identification Bureau (SIB).

2. CJIS3electronically routes the subject’s biometric and biographic information to US-VISIT/IDENT to determine if there is a fingerprint match with records in its system.

3. As a result of a fingerprint match with data in IDENT, CJIS generates an ImmigrationAlien Query (IAQ) to the ICE Law Enforcement Support Center (LESC).

1“Interoperability” was previously defined as the “sharing of alien immigration history, criminal history, and 

terrorist information based on positive identification and the interoperable capabilities of IDENT and IAFIS.”DHS IDENT/IAFIS Interoperability Report, at p. 2 (May, 2005). Currently, Secure Communities officially refersto the process as “IDENT/IAFIS Interoperability.”2

Consolidated Appropriations Act, 2008, Pub. L. No. 110-161, 121 Stat 1844, 2050 (2007).3

“CJIS,” which stands for the FBI’s Criminal Justice Information Services Division, manages IAFIS.

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

Page 59: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 59/160

3

4. The LESC queries law enforcement and immigration databases to make an initialimmigration status determination and generates an Immigration Alien Response (IAR)to prioritize enforcement actions.

5. The LESC sends the IAR to CJIS, which routes it to the appropriate State SIB to send to the originating LEA. The LESC also sends the IAR to the local ICE field office,which prioritizes enforcement actions based on level of offense.

There are two types of participation in Secure Communities by which IDENT/IAFISInteroperability is deployed. First, participation may involve “full-cycle” information-sharingin which the SIB and LEA choose to participate and receive the return message from theIDENT/IAFIS Interoperability process informing about the subject’s immigration status (SeeStep 5, first sentence). Second, a state or LEA may choose to participate but elect not toreceive the return message or the state may not have the technological ability to receive thereturn message from CJIS or relay the message to the LEA.

 IDENT/IAFIS Interoperability in 2013According to Secure Communities, Assistant Director David Venturella and the CJIS Director reached an agreement by which CJIS will send ICE, starting in 2013, all fingerprint requestsfrom any LEAs that are not participating in Secure Communities. This future informationsharing will not include the component of the current IDENT/IAFIS Interoperability processwhere the SIB and LEA receive (if technically feasible) the automatic return message fromICE regarding the subject’s immigration status. According to Secure Communities, this process is technologically available now; however for policy reasons and to ensure adequateresources are in place, CJIS and Secure Communities have currently chosen to wait until 2013,when all planned deployments should be completed, until instituting this process.

Current CJIS-Required Tasks In Order to Physically Deploy IDENT/IAFIS  Interoperability to an LEA

According to Secure Communities, there are two ministerial-related IT tasks that, pursuant tocurrent CJIS policy, must be performed in order to physically deploy IDENT/IAFISInteroperability to a LEA. The LEA must “validate” its “unique identifier” (called an “ORI”)that is attached to its terminal (i.e, a state or local official contacts CJIS to inform CJIS that theORI pertains to the LEA’s terminal). Once this validation occurs, CJIS must note within IAFISthe LEA’s ORI so that IAFIS will be informed to relay fingerprints to IDENT that originatefrom the LEA.

4  

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

(b) (5)

(b) (5)

Page 60: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 60/160

4

Discussion

The FBI has Statutory Authority To Share Fingerprint Submission Information with DHS/ICE Via IDENT/IAFIS Interoperability, and this Authority Supports theMandatory Nature of Anticipated 2013 Secure Communities Information-Sharing  Deployment 

It is unquestioned that the FBI has authority to share fingerprint information with DHS, and,therefore, ICE. This authority derives from three distinct statutes: 28 U.S.C § 534, relating toAttorney General sharing of criminal records with other government officials: 8 U.S.C. § 1722,which mandates a data-sharing system to enable intelligence and law enforcement agencies todetermine the inadmissibility or deportability of an alien; and 42 U.S.C. §14616, whichestablishes an information-sharing compact between the federal government and ratifyingstates. Federal register notices and the legislative history of these provisions make plain that asystem such as the 2013 Secure Communities deployment is mandatory in nature.

28 U.S.C. § 534Specifically, 28 U.S.C. § 534 provides that the Attorney General shall “acquire, collect,classify, and preserve identification, criminal identification, crime, and other records.” 28U.S.C. § 534(a)(1). That law also provides for the sharing of the information, by requiring thatthe Attorney General “exchange such records and information with, and for the official use of,authorized officials of the Federal Government. . . .” 28 U.S.C. § 534(a)(4); see 8 U.S.C. §1105 (FBI must provide ICE access to criminal history record information contained within National Crime Information Center files). Further, the applicable System of Records Noticefor the FBI’s Fingerprint Identification Records System (FIRS), which are maintained withinIAFIS, provides that identification and criminal history record information (i.e., fingerprintsand rap sheets) may be disclosed, in relevant part, to a federal law enforcement agency directlyengaged in criminal justice activity “where such disclosure may assist the recipient in the performance of a law enforcement function” or to a federal agency for “a compatible civil lawenforcement function; or where such disclosure may promote, assist, or otherwise serve themutual law enforcement efforts of the law enforcement community.” Notice of Modified Systems of Records, 64 Fed. Reg. 52343, 52348 (September 28, 1999).

8 U.S.C. § 1722The FBI has further authority to share the fingerprint information with DHS via IDENT/IAFISInteroperability. Specifically, Congress required the establishment of an interoperableelectronic data system to provide current and immediate access to information in databases of Federal law enforcement agencies and the intelligence community that is relevant to determinethe admissibility or deportability of an alien. See 8 U.S.C. § 1722.5IDENT/IAFIS5

8 U.S.C. § 1722 provides, in relevant part:(2) Requirement for interoperable data systemUpon the date of commencement of implementation of the plan required by section 1721(c), the President shall

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

(b) (5)

Page 61: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 61/160

5

Interoperability is the technological mechanism that was developed pursuant to thisinformation-sharing requirement by which the FBI automates the sharing of current fingerprintsubmissions by LEAs to IAFIS6with DHS so that DHS may, in part, determine theadmissibility or deportability of an alien based on the alien’s criminal history.From the early stages of the IDENT/IAFIS integration efforts, Congress fully intended thatIDENT/IAFIS Interoperability involve both the sharing of information between the FBI and DHS, but also the sharing of the relevant immigration information between the federalagencies and state and local law enforcement. Specifically, Congress described the earlyIDENT/IAFIS integration project as follows:

This project was established to integrate the separate identification systems operated bythe Department of Homeland Security (DHS) with the Federal Bureau of Investigation(FBI). The IDENT/IAFIS project was designed to support the apprehension and 

 prosecution of criminal aliens and to provide State and local law enforcement personnelwith direct access to DHS data through IAFIS. With realtime connection between thetwo systems, DHS would have the capability to determine whether an apprehended  person is subject to a currently posted Want/Warrant or has a record in the FBI'sCriminal Master File. Collaterally, the integration of IDENT and IAFIS would enablecognizant law enforcement agencies to obtain all relevant immigration information as part of a criminal history response from a single FBI search.

develop and implement an interoperable electronic data system to provide current and immediate access toinformation in databases of Federal law enforcement agencies and the intelligence community that is relevant todetermine whether to issue a visa or to determine the admissibility or deportability of an alien (also known as the“Chimera system”).

8 U.S.C. 1721, referred to above, provides, in relevant part:(a) Interim directiveUntil the plan required by subsection (c) of this section is implemented, Federal law enforcement agencies and theintelligence community shall, to the maximum extent practicable, share any information with the Department of State and the Immigration and Naturalization Service relevant to the admissibility and deportability of aliens,consistent with the plan described in subsection (c) of this section.(b) Report identifying law enforcement and intelligence information(1) In general

 Not later than 120 days after May 14, 2002, the President shall submit to the appropriate committees of Congressa report identifying Federal law enforcement and the intelligence community information needed by theDepartment of State to screen visa applicants, or by the Immigration and Naturalization Service to screenapplicants for admission to the United States, and to identify those aliens inadmissible or deportable under theImmigration and Nationality Act [8 U.S.C.A. § 1101 et seq.](2) Omitted (c) Coordination plan(1) Requirement for plan

 Not later than one year after October 26, 2001, the President shall develop and implement a plan based on thefindings of the report under subsection (b) of this section that requires Federal law enforcement agencies and theintelligence community to provide to the Department of State and the Immigration and Naturalization Service allinformation identified in that report as expeditiously as practicable.6

The States, whose record repositories are the primary source of criminal history records maintained at the FBI,are not required to provide fingerprint information to the FBI, but do so voluntarily in order to gain the mutual

 benefit of receiving access to criminal history information on individuals who have resided in other States. SeePrivacy Impact Assessment for the Federal Bureau of Investigation Fingerprint Identification Records System(FIRS) Integrated Automated Fingerprint Identification System (IAFIS) Outsourcing for Noncriminal JusticePurposes – Channeling (May 5, 2008) (available on FBI’s website). State law, however, may require LEAs tosend the fingerprints to IAFIS upon each arrest. See, e.g ., Cal. Penal Code § 13150.

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

Page 62: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 62/160

6

H.R. Rep. No. 109-118 (2005). Congress similarly explained that it was not only crucial thatDHS and the Department of Justice ensure that IDENT “is able to retrieve, in real time, theexisting biometric information contained in the IAFIS database7…[but] it is equally essentialfor the FBI, and State and local law enforcement to have the ability to retrieve the proper levelof information out of the IDENT/USVISIT database.”8S. Rep. No. 108-280, at 15 (2004)(emphasis added). Because IDENT/IAFIS Interoperability accomplishes the Congressionally-intended information-sharing objectives, Congress has explicitly supported expansion of Secure Communities. See H.R. Rep. No. 111-157 (2009).

42 U.S.C. § 14616

42 U.S.C. §14616 also supports the mandatory nature of Secure Communities, at least for twenty-nine states. This statute establishes a compact for the organization of an electronicinformation sharing system among the federal government and the states to exchange criminalhistory records for non-criminal justice purposes authorized by Federal or State law, includingimmigration and naturalization matters. See 42 U.S.C. § 14616. Under this compact, the FBIand the ratifying states agree to maintain detailed databases of their respective criminal historyrecords, including arrests and dispositions, and to make them available to the federalgovernment and to other ratifying states for authorized purposes. See 42 U.S.C. 14616(b).According to the FBI website, twenty-nine states have ratified the compact as of July 1, 2010.9For these twenty-nine states, a court may find participation in Secure Communities mandatorysince they are already required by the above statute to make their criminal history recordsavailable for immigration matters.

Compelling Participation in Secure Communities in 2013 Does Not RaiseConstitutional Concerns

Although LEAs may argue that the Tenth Amendment of the U.S. Constitution prohibits ICEfrom compelling participation in Secure Communities, applicable case law supports a position

that Tenth Amendment protections are not at issue. Under the Tenth Amendment, “[t]heFederal Government may not compel the States to implement, by legislation or executiveaction, federal regulatory programs.”10

 Printz v. United States, 521 U.S. 898, 925 (1997).Similarly, “[t]he Federal Government may neither issue directives requiring the States to7

Similarly, Congress later reiterated “it is essential that. . . IDENT and US-VISIT can retrieve, in real time, biometric information contained in the IAFIS database, and that the IAFIS database can retrieve, in real time, biometric information contained in IDENT and US-VISIT.” H.R. Rep. No. 108-792 (2004).8The Senate Committee for Appropriations further stated, with respect to early IDENT/IAFIS integration efforts,that “in order for Federal, State and local law enforcement agencies to effectively fight crime, they need to be ableto access fingerprint records of visitors and immigration law violators.” S. Rep. No. 108-344 (2004).9See Compact Council, National Crime Prevention and Privacy Compact (2010),http://www.fbi.gov/hq/cjisd/web%20page/pdf/compact_history_pamphlet.pdf (containing a listing of Compactstates).10

Both DHS and ICE officials have described Secure Communities as a “program.” See e.g., Fiscal 2011Appropriations: Homeland Security, Committee on House Appropriations Subcommittee on Homeland Security(2010) (statement of ICE Director Morton) (thanking Subcommittee and the Committee for “providing vitalresources to establish the Secure Communities program”); DHS Office of Inspector General, The Performance of 287(g) Agreements, at 82 (2010). Moreover, Secure Communities’ staff is located in the “Program ManagementOffice.” Thus, ICE would likely not prevail in any argument that Secure Communities is not a federal “program.”

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

Page 63: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 63/160

7

address particular problems, nor command the States’ officers, or those of their politicalsubdivisions, to administer or enforce a federal regulatory program.”  Id. at 935. In Printz , theSupreme Court found unconstitutional Brady Handgun Violence Prevention Act provisionsrequiring the chief law enforcement officer of each jurisdiction to conduct background checkson prospective handgun purchasers and to perform certain related ministerial tasks. See id. at933-34. The Supreme Court held that such provisions constituted the forced participation of the States’ executive in the actual administration of a federal program. See id. at 935.Significantly, however, the Printz court also held that that “federal laws which require onlythe provision of information to the Federal Government” do not raise the TenthAmendment prohibition of “the forced participation of the States' executive in the actualadministration of a federal program.”  Id. at 918 (emphasis added).Applying this holding, the United States District Court for the Southern District of New York found no Tenth Amendment issue in a federal act that required “state officials to provideinformation regarding sexual offenders-information that the state officials will typicallyalready have through their own state registries-to the federal government.” U.S. v. Brown, No.07-Cr. 485(HB), 2007 WL 4372829, at * 5 (S.D.N.Y. Dec. 12, 2007). The District Courtexplained that “because the individuals subject to the Act are already required to register  pursuant to state registration laws, and because the Act only requires states to provideinformation rather than administer or enforce a federal program, the Act does not violate theTenth Amendment.”  Id. at * 6.Similarly, the United States Court of Appeals for the Fourth Circuit upheld a District Court’sconclusion that a federal reporting requirement does not violate the Tenth Amendment becausethe federal law only requires the state to forward information and “does not require the state todo anything that the state itself has not already required, authorized, or provided by its ownlegislative command.” Frielich v Upper Chesapeake Health, Inc., 313 F.3d 205, 214 (4th Cir.2002) (citing Frielich v. Board of Directors of Upper Chesapeake Health, Inc., 142 F.Supp.2d 679, 696 (D.Md. 2001)); see United States v. Keleher , No. 1:07-cr-00332-OWW, 2008 WL5054116, at * 12 (E.D.Cal. Nov. 19, 2008) (rejecting a Tenth Amendment challenge to the provisions of the same federal law as in Brown that required a state to accept registrationinformation from a sex offender, holding that, unlike the state officers in  Printz , the federal law“does not require states, or their state officials, to do anything they do not already do under their own laws.”) (citing United States v. Pitts, No. 07-157-A, 2007 WL 3353423 (M.D.La. Nov. 7, 2007)); cf. Reno v. Condon, 528 U.S. 141, 150-51 (2000) (holding a federal act whichrestricts the nonconsensual sale or release by a state of a driver’s personal information does notviolate the Tenth Amendment, as the Act does not require the states in their sovereign capacityto regulate their own citizens, but regulates the states as the owners of databases).A court following the above reasoning would similarly recognize that an LEA’s participationin Secure Communities (i.e. accepting deployment of IDENT/IAFIS Interoperability) does notviolate the Tenth Amendment. Specifically, participation in Secure Communities does notalter the normal booking process and only requires the same provision of information to theFBI that the LEAs currently provide as regular practice11or as required by state law. See, e.g .,Cal. Penal Code § 13150 (requiring LEAs to provide fingerprint submissions along with arrestdata to the Department of Justice for each arrest made) . Therefore, unlike in Printz where the

11See FN 6, supra.

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

Page 64: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 64/160

8

federal law forced the state officials to perform added duties, participation in SecureCommunities does not require local officials “to do anything they do not already do.”Despite the above reasoning, a challenger to Secure Communities may argue that the currenttask to validate the LEA’s ORI prior to activating IDENT/IAFIS Interoperability extends participation in Secure Communities beyond mere information-sharing and constitutes thesame prohibited conscription of state or local officials as in  Printz . The Supreme Court in Printz held that Congress cannot force state officials to even perform “discrete, ministerialtasks” to implement a federal regulatory program.  Printz , 521 U.S. at 929-30. The Printz court explained “even when the States are not forced to absorb the costs of implementing afederal program, they are still put in the position of taking the blame for its burdensomenessand for its defects.”  Id. at 930. A court following this Printz reasoning could recognize thatcertain jurisdictions do not want to be blamed for the immigration consequences of itsconstituents resulting from its participation in Secure Communities.ICE has several defenses to the above claim. First, Secure Communities, CJIS, and US-VISITare currently discussing the necessity of this ministerial requirement; therefore, it is possiblethat this additional pre-activation requirement may not exist by 2013, and may be eliminated sooner. Second, state and local officials already validate the ORIs bi-annually with the FBI;

therefore, like in Frielich, Keleher , and  Pitts, this validation task does not force state and localofficials “to do anything they do not already do.” Last, ICE may argue that, despite thisministerial task, participation in Secure Communities does not compel state or local officials toenact a legislative program, administer regulations, or perform any functions enforcingimmigration law, but rather only involves the same sharing of information to the federalgovernment as currently practiced. See New York v. United States, 505 U.S. 144, 175-76(1992) (holding a federal law violated the Tenth Amendment by requiring states either to enactlegislation providing for the disposal of radioactive waste generated within their borders or toimplement an administrative solution for taking title to, and possession of, the waste).A challenger to Secure Communities may also argue, in reliance on Printz , that 2013 participation in Secure Communities violates the Tenth Amendment because it may require theState to expend significant funds in order to implement the program. The Printz Court held that Congress cannot force state governments to absorb the financial burden of implementing afederal regulatory program. See Printz , 518 U.S. at 930. Currently, according to SecureCommunities, an SIB may need to pay for its own technological upgrades in order to have thecapability to receive the return IAR message from CJIS in the IDENT/IAFIS Interoperability process or relay that message to the LEA.The above fiscal argument is misleading and should fail both in 2010 and in 2013. First, participation in Secure Communities does not require the states or LEAs to receive the returnIAR message. In fact, Secure Communities has consistently informed LEAs that they may“opt out” of receiving the return IAR message if they so choose or if the SIB does not have thetechnological capability to receive that message or relay that message to the LEA. Second, as per the aforementioned agreement between Mr. Venturella and the CJIS Director for 2013,the 2013 process by which CJIS will send ICE all fingerprint requests from any non- participating LEA will not include the component of the current IDENT/IAFIS Interoperability process where the SIB and LEA receive the automatic return IAR message. Therefore, the2013 process would not require the state to expend any funds in order for IDENT/IAFISInteroperability to be deployed.

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

Page 65: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 65/160

9

Certain Statutes Relation to the Sharing of Immigration Information Do Not Lend Support to the Argument that Secure Communities Will Become Mandatory in 2013Last, please note that 8 U.S.C. §§ 137312and 1644,13which relate to voluntary sharing of immigration information by government employees, do not support mandatory participation inSecure Communities, but lack of support by these statutes is essentially irrelevant becausestatutory support exists elsewhere. We include them because the notoriety of the legal casesassociated with these statutes has potential to become a “red herring” in discussions about themandatory nature of Secure Communities participation. In City of New York v. United States,179 F.3d 29 (2d Cir. 1999), the Mayor of New York City issued a 1989 order prohibiting cityemployees from voluntarily sending immigration status information about an individual to theimmigration authorities. Following passage of IIRIRA and PRWORA in 1996, the City brought suit against the federal government, claiming, in relevant part, that 8 U.S.C. § 1373and 8 U.S.C. § 1644 violated the Tenth Amendment by directly compelling states to enact and enforce a federal regulatory program. The Second Circuit held that 8 U.S.C. § § 1373 and 1644 “do not directly compel states or localities to require or prohibit anything. Rather, they prohibit state and local government entities or officials only from directly restricting thevoluntary exchange of immigration information with the INS.” City of New York , 179 F. 3d at

35.ConclusionBased on applicable statutory authority, legislative history, and case law, we conclude thatthere is ample support for the argument that participation in Secure Communities will bemandatory in 2013, and that the procedures by which state and local information will be shared with ICE at that time does not create legitimate Tenth Amendment concerns of unconstitutionalcompulsion by states in a mandatory federal program.

128 U.S.C. § 1373 provides, in relevant part:

(a) In general Notwithstanding any other provision of Federal, State or local law, a Federal, State or local government entity or official may not prohibit, or in any way restrict, any governmental entity or official from sending to, or receivingfrom, the Immigration and Naturalization Service information regarding the citizenship or immigration status,lawful or unlawful, of any individual.(b) Additional authority of government entities

 Notwithstanding any other provision of Federal, State, or local law, no person or agency may prohibit, or in anyway restrict, a Federal, State, or local government entity from doing any of the following with respect toinformation regarding the immigration status, lawful or unlawful, of any individual:

(1) Sending such information to, or requesting or receiving such information from, the Immigration and  Naturalization Service.(2) Maintaining such information.(3) Exchanging such information with any other Federal, State, or local governmental entity.

138 U.S.C. § 1644 provides “Notwithstanding any other provision of Federal, State, or local law, no State or local

government entity may be prohibited, or in any way restricted, from sending to or receiving from theImmigration and Naturalization Service information regarding the immigration status, lawful or unlawful, of analien in the United States.”

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

Page 66: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 66/160

10

cument ID: 0.7.98.12318 CLEAN ICE FOIA 10-2674.000

Page 67: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 67/160

Page 68: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 68/160

Page 69: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 69/160

Page 70: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 70/160

Page 71: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 71/160

Page 72: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 72/160

Page 73: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 73/160

Page 74: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 74/160

Page 75: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 75/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

Page 76: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 76/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

Page 77: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 77/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

(b) (5)

(b) (5)

Page 78: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 78/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

(b) (5)

Page 79: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 79/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

Page 80: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 80/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

Page 81: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 81/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

Page 82: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 82/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

Page 83: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 83/160

cument ID: 0.7.98.18004 CLEAN ICE FOIA 10-2674.000

Page 84: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 84/160

Office of the Principal Legal Advisor U.S. Department of Homeland Security500 12thStreet, SWWashington, DC 20024

A Department of Homeland Security Attorney prepared this document for INTERNAL GOVERNMENT USEONLY. This document is pre-decisional in nature and qualifies as an intra-agency document containingdeliberative process material. This document contains confidential attorney-client communications relating tolegal matter for which the client has sought professional advice. Under exemption 5 of section (b) of 5 U.S.C. §552 (Freedom of Information Act), this material is EXEMPT FROM RELEASE TO THE PUBLIC.

October 2, 2010

MEMORANDUM FOR: Beth N. GibsonAssistant Deputy Director 

FROM: Riah RamloganDeputy Principal Legal Advisor 

SUBJECT: Secure Communities – Mandatory in 2013

Executive SummaryWe present the arguments supporting a position that participation in Secure Communities will be mandatory in 2013. Based on applicable statutory authority, legislative history, and caselaw, we conclude that participation in Secure Communities will be mandatory in 2013 withoutviolating the Tenth Amendment.Because the contemplated 2013 information-sharing technology change forms the factual basisfor the legal analysis, we have included that background here. Readers familiar with thetechnology and the 2013 deployment may proceed directly to the Discussion section.

In the Discussion section, we review the three statutes from which the mandatory nature of the

2013 Secure Communities deployment derives: 28 U.S.C § 534, relating to Attorney Generalsharing of criminal records with other government officials; 8 U.S.C. § 1722, which mandatesa data-sharing system to enable intelligence and law enforcement agencies to determine theinadmissibility or deportability of an alien; and 42 U.S.C. §14616, which establishes aninformation-sharing compact between the federal government and ratifying states.Congressional history further underscores the argument that the 2013 Secure Communitiesdeployment fulfills a Congressional mandate.Our analysis of case law concentrates on  Printz v. United States, 521 U.S. 898, 925 (1997), theseminal case on unconstitutional state participation in mandatory government programs.Significantly, Printz holds that that “federal laws which require only the provision of information to the Federal Government” do not raise the Tenth Amendment prohibition of “theforced participation of the States’ executive in the actual administration of a federal program.” Id. at 918. We examine several potential legal challenges and arguments that law enforcementagencies may make to avoid the reach of Secure Communities in 2013, and conclude that eachseems rather weak in the face of  Printz and its progeny.

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

Page 85: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 85/160

2

Finally, we note that certain statutes relating to immigration information collected by states donot provide a legal basis for characterizing participation in Secure Communities in 2013 asmandatory, but as these are essentially irrelevant given other statutory support, we addressthem only briefly.Background A review of the Secure Communities information-sharing technology, which is admittedlycomplicated, aids the understanding of the applicable law and the corresponding conclusionthat participation will become mandatory in 2013. The process by which fingerprint and other information is relayed will change in 2013 to create a more direct me thod for ICE to receivethat information from DOJ. Consequently, choices available to law enforcement agencies whohave thus far decided to decline or limit their participation in current information-sharing processes will be streamlined and aspects eliminated. In that way, the process, in essence, becomes “mandatory” in 2013, when the more direct method will be in place. The year 2013was chosen by ICE and DOJ for policy and resource feasibility reasons.

Secure Communities’ Use of IDENT/IAFIS Interoperability1

In Fiscal Year 2008, Congress appropriated $200 million for ICE to “improve and modernizeefforts to identify aliens convicted of a crime, sentenced to imprisonment, and who may bedeportable, and remove them from the United States, once they are judged deportable….”2Inresponse, ICE launched the Secure Communities initiative to transform the way ICE identifiesand removes criminal aliens from the United States. In this initiative, Secure Communitiesutilizes existing technology, i.e. the ability of IDENT and IAFIS to share information, not onlyto accomplish its goal of identifying criminal aliens, but also to share immigration statusinformation with state and local law enforcement agencies (LEAs). The Secure Communities“Program Management Office” provides the planning and outreach support for ongoing effortsto activate IDENT/IAFIS Interoperability in jurisdictions nationwide. See generally SecureCommunities: Quarterly Report, Fiscal Year Quarterly Report to Congress Third Quarter, at iv,20. (Aug 11, 2010).The following is a description of the full IDENT/IAFIS Interoperability process:

1. When a subject is arrested and booked into custody, the arresting LEA sends thesubject’s fingerprints and associated biographical information to IAFIS via theappropriate State Identification Bureau (SIB).

2. CJIS3electronically routes the subject’s biometric and biographic information to US-VISIT/IDENT to determine if there is a fingerprint match with records in its system.

3. As a result of a fingerprint match with data in IDENT, CJIS generates an ImmigrationAlien Query (IAQ) to the ICE Law Enforcement Support Center (LESC).

1“Interoperability” was previously defined as the “sharing of alien immigration history, criminal history, and 

terrorist information based on positive identification and the interoperable capabilities of IDENT and IAFIS.”DHS IDENT/IAFIS Interoperability Report, at p. 2 (May, 2005). Currently, Secure Communities officially refersto the process as “IDENT/IAFIS Interoperability.”2

Consolidated Appropriations Act, 2008, Pub. L. No. 110-161, 121 Stat 1844, 2050 (2007).3

“CJIS,” which stands for the FBI’s Criminal Justice Information Services Division, manages IAFIS.

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

Page 86: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 86/160

3

4. The LESC queries law enforcement and immigration databases to make an initialimmigration status determination and generates an Immigration Alien Response (IAR)to prioritize enforcement actions.

5. The LESC sends the IAR to CJIS, which routes it to the appropriate State SIB to send to the originating LEA. The LESC also sends the IAR to the local ICE field office,which prioritizes enforcement actions based on level of offense.

There are two types of participation in Secure Communities by which IDENT/IAFISInteroperability is deployed. First, participation may involve “full-cycle” information-sharingin which the SIB and LEA choose to participate and receive the return message from theIDENT/IAFIS Interoperability process informing about the subject’s immigration status (SeeStep 5, first sentence). Second, a state or LEA may choose to participate but elect not toreceive the return message or the state may not have the technological ability to receive thereturn message from CJIS or relay the message to the LEA.

 IDENT/IAFIS Interoperability in 2013According to Secure Communities, Assistant Director David Venturella and the CJIS Director reached an agreement by which CJIS will send ICE, starting in 2013, all fingerprint requestsfrom any LEAs that are not participating in Secure Communities. This future informationsharing will not include the component of the current IDENT/IAFIS Interoperability processwhere the SIB and LEA receive (if technically feasible) the automatic return message fromICE regarding the subject’s immigration status. According to Secure Communities, this process is technologically available now; however for policy reasons and to ensure adequateresources are in place, CJIS and Secure Communities have currently chosen to wait until 2013,when all planned deployments should be completed, until instituting this process.

Current CJIS-Required Tasks In Order to Physically Deploy IDENT/IAFIS  Interoperability to an LEA

According to Secure Communities, there are two ministerial-related IT tasks that, pursuant tocurrent CJIS policy, must be performed in order to physically deploy IDENT/IAFISInteroperability to a LEA. The LEA must “validate” its “unique identifier” (called an “ORI”)that is attached to its terminal (i.e, a state or local official contacts CJIS to inform CJIS that theORI pertains to the LEA’s terminal). Once this validation occurs, CJIS must note within IAFISthe LEA’s ORI so that IAFIS will be informed to relay fingerprints to IDENT that originatefrom the LEA.

 

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

(b) (5)

(

b

 

Page 87: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 87/160

4

Discussion

The FBI has Statutory Authority To Share Fingerprint Submission Information with DHS/ICE Via IDENT/IAFIS Interoperability, and this Authority Supports theMandatory Nature of Anticipated 2013 Secure Communities Information-Sharing  Deployment 

It is unquestioned that the FBI has authority to share fingerprint information with DHS, and,therefore, ICE. This authority derives from three distinct statutes: 28 U.S.C § 534, relating toAttorney General sharing of criminal records with other government officials: 8 U.S.C. § 1722,which mandates a data-sharing system to enable intelligence and law enforcement agencies todetermine the inadmissibility or deportability of an alien; and 42 U.S.C. §14616, whichestablishes an information-sharing compact between the federal government and ratifyingstates. Federal register notices and the legislative history of these provisions make plain that asystem such as the 2013 Secure Communities deployment is mandatory in nature.

28 U.S.C. § 534Specifically, 28 U.S.C. § 534 provides that the Attorney General shall “acquire, collect,classify, and preserve identification, criminal identification, crime, and other records.” 28U.S.C. § 534(a)(1). That law also provides for the sharing of the information, by requiring thatthe Attorney General “exchange such records and information with, and for the official use of,authorized officials of the Federal Government. . . .” 28 U.S.C. § 534(a)(4); see 8 U.S.C. §1105 (FBI must provide ICE access to criminal history record information contained within National Crime Information Center files). Further, the applicable System of Records Noticefor the FBI’s Fingerprint Identification Records System (FIRS), which are maintained withinIAFIS, provides that identification and criminal history record information (i.e., fingerprintsand rap sheets) may be disclosed, in relevant part, to a federal law enforcement agency directlyengaged in criminal justice activity “where such disclosure may assist the recipient in the performance of a law enforcement function” or to a federal agency for “a compatible civil lawenforcement function; or where such disclosure may promote, assist, or otherwise serve themutual law enforcement efforts of the law enforcement community.” Notice of Modified Systems of Records, 64 Fed. Reg. 52343, 52348 (September 28, 1999).

8 U.S.C. § 1722The FBI has further authority to share the fingerprint information with DHS via IDENT/IAFISInteroperability. Specifically, Congress required the establishment of an interoperableelectronic data system to provide current and immediate access to information in databases of Federal law enforcement agencies and the intelligence community that is relevant to determinethe admissibility or deportability of an alien. See 8 U.S.C. § 1722.5IDENT/IAFIS5

8 U.S.C. § 1722 provides, in relevant part:(2) Requirement for interoperable data systemUpon the date of commencement of implementation of the plan required by section 1721(c), the President shall

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

(b) (5)

Page 88: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 88/160

5

Interoperability is the technological mechanism that was developed pursuant to thisinformation-sharing requirement by which the FBI automates the sharing of current fingerprintsubmissions by LEAs to IAFIS6with DHS so that DHS may, in part, determine theadmissibility or deportability of an alien based on the alien’s criminal history.From the early stages of the IDENT/IAFIS integration efforts, Congress fully intended thatIDENT/IAFIS Interoperability involve both the sharing of information between the FBI and DHS, but also the sharing of the relevant immigration information between the federalagencies and state and local law enforcement. Specifically, Congress described the earlyIDENT/IAFIS integration project as follows:

This project was established to integrate the separate identification systems operated bythe Department of Homeland Security (DHS) with the Federal Bureau of Investigation(FBI). The IDENT/IAFIS project was designed to support the apprehension and 

 prosecution of criminal aliens and to provide State and local law enforcement personnelwith direct access to DHS data through IAFIS. With realtime connection between thetwo systems, DHS would have the capability to determine whether an apprehended  person is subject to a currently posted Want/Warrant or has a record in the FBI'sCriminal Master File. Collaterally, the integration of IDENT and IAFIS would enablecognizant law enforcement agencies to obtain all relevant immigration information as part of a criminal history response from a single FBI search.

develop and implement an interoperable electronic data system to provide current and immediate access toinformation in databases of Federal law enforcement agencies and the intelligence community that is relevant todetermine whether to issue a visa or to determine the admissibility or deportability of an alien (also known as the“Chimera system”).

8 U.S.C. 1721, referred to above, provides, in relevant part:(a) Interim directiveUntil the plan required by subsection (c) of this section is implemented, Federal law enforcement agencies and theintelligence community shall, to the maximum extent practicable, share any information with the Department of State and the Immigration and Naturalization Service relevant to the admissibility and deportability of aliens,consistent with the plan described in subsection (c) of this section.(b) Report identifying law enforcement and intelligence information(1) In general

 Not later than 120 days after May 14, 2002, the President shall submit to the appropriate committees of Congressa report identifying Federal law enforcement and the intelligence community information needed by theDepartment of State to screen visa applicants, or by the Immigration and Naturalization Service to screenapplicants for admission to the United States, and to identify those aliens inadmissible or deportable under theImmigration and Nationality Act [8 U.S.C.A. § 1101 et seq.](2) Omitted (c) Coordination plan(1) Requirement for plan

 Not later than one year after October 26, 2001, the President shall develop and implement a plan based on thefindings of the report under subsection (b) of this section that requires Federal law enforcement agencies and theintelligence community to provide to the Department of State and the Immigration and Naturalization Service allinformation identified in that report as expeditiously as practicable.6

The States, whose record repositories are the primary source of criminal history records maintained at the FBI,are not required to provide fingerprint information to the FBI, but do so voluntarily in order to gain the mutual

 benefit of receiving access to criminal history information on individuals who have resided in other States. SeePrivacy Impact Assessment for the Federal Bureau of Investigation Fingerprint Identification Records System(FIRS) Integrated Automated Fingerprint Identification System (IAFIS) Outsourcing for Noncriminal JusticePurposes – Channeling (May 5, 2008) (available on FBI’s website). State law, however, may require LEAs tosend the fingerprints to IAFIS upon each arrest. See, e.g ., Cal. Penal Code § 13150.

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

Page 89: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 89/160

6

H.R. Rep. No. 109-118 (2005). Congress similarly explained that it was not only crucial thatDHS and the Department of Justice ensure that IDENT “is able to retrieve, in real time, theexisting biometric information contained in the IAFIS database7…[but] it is equally essentialfor the FBI, and State and local law enforcement to have the ability to retrieve the proper levelof information out of the IDENT/USVISIT database.”8S. Rep. No. 108-280, at 15 (2004)(emphasis added). Because IDENT/IAFIS Interoperability accomplishes the Congressionally-intended information-sharing objectives, Congress has explicitly supported expansion of Secure Communities. See H.R. Rep. No. 111-157 (2009).

42 U.S.C. § 14616

42 U.S.C. §14616 also supports the mandatory nature of Secure Communities, at least for twenty-nine states. This statute establishes a compact for the organization of an electronicinformation sharing system among the federal government and the states to exchange criminalhistory records for non-criminal justice purposes authorized by Federal or State law, includingimmigration and naturalization matters. See 42 U.S.C. § 14616. Under this compact, the FBIand the ratifying states agree to maintain detailed databases of their respective criminal historyrecords, including arrests and dispositions, and to make them available to the federalgovernment and to other ratifying states for authorized purposes. See 42 U.S.C. 14616(b).According to the FBI website, twenty-nine states have ratified the compact as of July 1, 2010.9For these twenty-nine states, a court may find participation in Secure Communities mandatorysince they are already required by the above statute to make their criminal history recordsavailable for immigration matters.

Compelling Participation in Secure Communities in 2013 Does Not RaiseConstitutional Concerns

Although LEAs may argue that the Tenth Amendment of the U.S. Constitution prohibits ICEfrom compelling participation in Secure Communities, applicable case law supports a position

that Tenth Amendment protections are not at issue. Under the Tenth Amendment, “[t]heFederal Government may not compel the States to implement, by legislation or executiveaction, federal regulatory programs.”10

 Printz v. United States, 521 U.S. 898, 925 (1997).Similarly, “[t]he Federal Government may neither issue directives requiring the States to7

Similarly, Congress later reiterated “it is essential that. . . IDENT and US-VISIT can retrieve, in real time, biometric information contained in the IAFIS database, and that the IAFIS database can retrieve, in real time, biometric information contained in IDENT and US-VISIT.” H.R. Rep. No. 108-792 (2004).8The Senate Committee for Appropriations further stated, with respect to early IDENT/IAFIS integration efforts,that “in order for Federal, State and local law enforcement agencies to effectively fight crime, they need to be ableto access fingerprint records of visitors and immigration law violators.” S. Rep. No. 108-344 (2004).9See Compact Council, National Crime Prevention and Privacy Compact (2010),http://www.fbi.gov/hq/cjisd/web%20page/pdf/compact_history_pamphlet.pdf (containing a listing of Compactstates).10

Both DHS and ICE officials have described Secure Communities as a “program.” See e.g., Fiscal 2011Appropriations: Homeland Security, Committee on House Appropriations Subcommittee on Homeland Security(2010) (statement of ICE Director Morton) (thanking Subcommittee and the Committee for “providing vitalresources to establish the Secure Communities program”); DHS Office of Inspector General, The Performance of 287(g) Agreements, at 82 (2010). Moreover, Secure Communities’ staff is located in the “Program ManagementOffice.” Thus, ICE would likely not prevail in any argument that Secure Communities is not a federal “program.”

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

Page 90: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 90/160

7

address particular problems, nor command the States’ officers, or those of their politicalsubdivisions, to administer or enforce a federal regulatory program.”  Id. at 935. In Printz , theSupreme Court found unconstitutional Brady Handgun Violence Prevention Act provisionsrequiring the chief law enforcement officer of each jurisdiction to conduct background checkson prospective handgun purchasers and to perform certain related ministerial tasks. See id. at933-34. The Supreme Court held that such provisions constituted the forced participation of the States’ executive in the actual administration of a federal program. See id. at 935.Significantly, however, the Printz court also held that that “federal laws which require onlythe provision of information to the Federal Government” do not raise the TenthAmendment prohibition of “the forced participation of the States' executive in the actualadministration of a federal program.”  Id. at 918 (emphasis added).Applying this holding, the United States District Court for the Southern District of New York found no Tenth Amendment issue in a federal act that required “state officials to provideinformation regarding sexual offenders-information that the state officials will typicallyalready have through their own state registries-to the federal government.” U.S. v. Brown, No.07-Cr. 485(HB), 2007 WL 4372829, at * 5 (S.D.N.Y. Dec. 12, 2007). The District Courtexplained that “because the individuals subject to the Act are already required to register  pursuant to state registration laws, and because the Act only requires states to provideinformation rather than administer or enforce a federal program, the Act does not violate theTenth Amendment.”  Id. at * 6.Similarly, the United States Court of Appeals for the Fourth Circuit upheld a District Court’sconclusion that a federal reporting requirement does not violate the Tenth Amendment becausethe federal law only requires the state to forward information and “does not require the state todo anything that the state itself has not already required, authorized, or provided by its ownlegislative command.” Frielich v Upper Chesapeake Health, Inc., 313 F.3d 205, 214 (4th Cir.2002) (citing Frielich v. Board of Directors of Upper Chesapeake Health, Inc., 142 F.Supp.2d 679, 696 (D.Md. 2001)); see United States v. Keleher , No. 1:07-cr-00332-OWW, 2008 WL5054116, at * 12 (E.D.Cal. Nov. 19, 2008) (rejecting a Tenth Amendment challenge to the provisions of the same federal law as in Brown that required a state to accept registrationinformation from a sex offender, holding that, unlike the state officers in  Printz , the federal law“does not require states, or their state officials, to do anything they do not already do under their own laws.”) (citing United States v. Pitts, No. 07-157-A, 2007 WL 3353423 (M.D.La. Nov. 7, 2007)); cf. Reno v. Condon, 528 U.S. 141, 150-51 (2000) (holding a federal act whichrestricts the nonconsensual sale or release by a state of a driver’s personal information does notviolate the Tenth Amendment, as the Act does not require the states in their sovereign capacityto regulate their own citizens, but regulates the states as the owners of databases).A court following the above reasoning would similarly recognize that an LEA’s participationin Secure Communities (i.e. accepting deployment of IDENT/IAFIS Interoperability) does notviolate the Tenth Amendment. Specifically, participation in Secure Communities does notalter the normal booking process and only requires the same provision of information to theFBI that the LEAs currently provide as regular practice11or as required by state law. See, e.g .,Cal. Penal Code § 13150 (requiring LEAs to provide fingerprint submissions along with arrestdata to the Department of Justice for each arrest made) . Therefore, unlike in Printz where the

11See FN 6, supra.

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

Page 91: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 91/160

8

federal law forced the state officials to perform added duties, participation in SecureCommunities does not require local officials “to do anything they do not already do.”Despite the above reasoning, a challenger to Secure Communities may argue that the currenttask to validate the LEA’s ORI prior to activating IDENT/IAFIS Interoperability extends participation in Secure Communities beyond mere information-sharing and constitutes thesame prohibited conscription of state or local officials as in  Printz . The Supreme Court in Printz held that Congress cannot force state officials to even perform “discrete, ministerialtasks” to implement a federal regulatory program.  Printz , 521 U.S. at 929-30. The Printz court explained “even when the States are not forced to absorb the costs of implementing afederal program, they are still put in the position of taking the blame for its burdensomenessand for its defects.”  Id. at 930. A court following this Printz reasoning could recognize thatcertain jurisdictions do not want to be blamed for the immigration consequences of itsconstituents resulting from its participation in Secure Communities.ICE has several defenses to the above claim. First, Secure Communities, CJIS, and US-VISITare currently discussing the necessity of this ministerial requirement; therefore, it is possiblethat this additional pre-activation requirement may not exist by 2013, and may be eliminated sooner. Second, state and local officials already validate the ORIs bi-annually with the FBI;

therefore, like in Frielich, Keleher , and  Pitts, this validation task does not force state and localofficials “to do anything they do not already do.” Last, ICE may argue that, despite thisministerial task, participation in Secure Communities does not compel state or local officials toenact a legislative program, administer regulations, or perform any functions enforcingimmigration law, but rather only involves the same sharing of information to the federalgovernment as currently practiced. See New York v. United States, 505 U.S. 144, 175-76(1992) (holding a federal law violated the Tenth Amendment by requiring states either to enactlegislation providing for the disposal of radioactive waste generated within their borders or toimplement an administrative solution for taking title to, and possession of, the waste).A challenger to Secure Communities may also argue, in reliance on Printz , that 2013 participation in Secure Communities violates the Tenth Amendment because it may require theState to expend significant funds in order to implement the program. The Printz Court held that Congress cannot force state governments to absorb the financial burden of implementing afederal regulatory program. See Printz , 518 U.S. at 930. Currently, according to SecureCommunities, an SIB may need to pay for its own technological upgrades in order to have thecapability to receive the return IAR message from CJIS in the IDENT/IAFIS Interoperability process or relay that message to the LEA.The above fiscal argument is misleading and should fail both in 2010 and in 2013. First, participation in Secure Communities does not require the states or LEAs to receive the returnIAR message. In fact, Secure Communities has consistently informed LEAs that they may“opt out” of receiving the return IAR message if they so choose or if the SIB does not have thetechnological capability to receive that message or relay that message to the LEA. Second, as per the aforementioned agreement between Mr. Venturella and the CJIS Director for 2013,the 2013 process by which CJIS will send ICE all fingerprint requests from any non- participating LEA will not include the component of the current IDENT/IAFIS Interoperability process where the SIB and LEA receive the automatic return IAR message. Therefore, the2013 process would not require the state to expend any funds in order for IDENT/IAFISInteroperability to be deployed.

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

Page 92: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 92/160

9

Certain Statutes Relation to the Sharing of Immigration Information Do Not Lend Support to the Argument that Secure Communities Will Become Mandatory in 2013Last, please note that 8 U.S.C. §§ 137312and 1644,13which relate to voluntary sharing of immigration information by government employees, do not support mandatory participation inSecure Communities, but lack of support by these statutes is essentially irrelevant becausestatutory support exists elsewhere. We include them because the notoriety of the legal casesassociated with these statutes has potential to become a “red herring” in discussions about themandatory nature of Secure Communities participation. In City of New York v. United States,179 F.3d 29 (2d Cir. 1999), the Mayor of New York City issued a 1989 order prohibiting cityemployees from voluntarily sending immigration status information about an individual to theimmigration authorities. Following passage of IIRIRA and PRWORA in 1996, the City brought suit against the federal government, claiming, in relevant part, that 8 U.S.C. § 1373and 8 U.S.C. § 1644 violated the Tenth Amendment by directly compelling states to enact and enforce a federal regulatory program. The Second Circuit held that 8 U.S.C. § § 1373 and 1644 “do not directly compel states or localities to require or prohibit anything. Rather, they prohibit state and local government entities or officials only from directly restricting thevoluntary exchange of immigration information with the INS.” City of New York , 179 F. 3d at

35.ConclusionBased on applicable statutory authority, legislative history, and case law, we conclude thatthere is ample support for the argument that participation in Secure Communities will bemandatory in 2013, and that the procedures by which state and local information will be shared with ICE at that time does not create legitimate Tenth Amendment concerns of unconstitutionalcompulsion by states in a mandatory federal program.

128 U.S.C. § 1373 provides, in relevant part:

(a) In general Notwithstanding any other provision of Federal, State or local law, a Federal, State or local government entity or official may not prohibit, or in any way restrict, any governmental entity or official from sending to, or receivingfrom, the Immigration and Naturalization Service information regarding the citizenship or immigration status,lawful or unlawful, of any individual.(b) Additional authority of government entities

 Notwithstanding any other provision of Federal, State, or local law, no person or agency may prohibit, or in anyway restrict, a Federal, State, or local government entity from doing any of the following with respect toinformation regarding the immigration status, lawful or unlawful, of any individual:

(1) Sending such information to, or requesting or receiving such information from, the Immigration and  Naturalization Service.(2) Maintaining such information.(3) Exchanging such information with any other Federal, State, or local governmental entity.

138 U.S.C. § 1644 provides “Notwithstanding any other provision of Federal, State, or local law, no State or local

government entity may be prohibited, or in any way restricted, from sending to or receiving from theImmigration and Naturalization Service information regarding the immigration status, lawful or unlawful, of analien in the United States.”

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

Page 93: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 93/160

10

cument ID: 0.7.98.17447.1 CLEAN ICE FOIA 10-2674.000

Page 94: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 94/160

Page 95: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 95/160

Page 96: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 96/160

Page 97: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 97/160

Page 98: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 98/160

Page 99: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 99/160

Page 100: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 100/160

Page 101: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 101/160

Page 102: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 102/160

Page 103: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 103/160

Page 104: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 104/160

Page 105: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 105/160

Page 106: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 106/160

Page 107: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 107/160

Page 108: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 108/160

Page 109: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 109/160

Page 110: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 110/160

Page 111: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 111/160

Page 112: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 112/160

Page 113: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 113/160

Page 114: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 114/160

ICE FOIA 10-2674.0009137

Page 115: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 115/160

Page 116: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 116/160

ICE FOIA 10-2674.0009139

(b) (5)

(b) (5)

Page 117: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 117/160

ICE FOIA 10-2674.0009140

(b) (5)

Page 118: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 118/160

ICE FOIA 10-2674.0009141

Page 119: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 119/160

ICE FOIA 10-2674.0009142

Page 120: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 120/160

ICE FOIA 10-2674.0009143

Page 121: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 121/160

ICE FOIA 10-2674.0009144

Page 122: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 122/160

ICE FOIA 10-2674.0009145

Page 123: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 123/160

ICE FOIA 10-2674.0009146

Page 124: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 124/160

Page 125: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 125/160

ICE FOIA 10-2674.0010796

Page 126: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 126/160

ICE FOIA 10-2674.0010797

(b) (5)

(b) (5)

Page 127: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 127/160

ICE FOIA 10-2674.0010798

(b) (5)

Page 128: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 128/160

ICE FOIA 10-2674.0010799

Page 129: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 129/160

ICE FOIA 10-2674.0010800

Page 130: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 130/160

ICE FOIA 10-2674.0010842

(b)(6); (b)(7)(C)

(b)(6); (b)(7)(C)

Page 131: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 131/160

ICE FOIA 10-2674.0010843

(b) (5)

Page 132: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 132/160

ICE FOIA 10-2674.0010844

(b) (5)

(b) (5)

Page 133: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 133/160

ICE FOIA 10-2674.0010845

Page 134: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 134/160

ICE FOIA 10-2674.0010846

Page 135: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 135/160

ICE FOIA 10-2674.0010847

Page 136: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 136/160

Page 137: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 137/160

ICE FOIA 10-2674.0010849

Page 138: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 138/160

Page 139: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 139/160

Page 140: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 140/160

Page 141: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 141/160

Page 142: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 142/160

Page 143: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 143/160

Page 144: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 144/160

Office of the Principal Legal Advisor U.S. Department of Homeland Security500 12thStreet, SWWashington, DC 20024

A Department of Homeland Security Attorney prepared this document for INTERNAL GOVERNMENT USEONLY. This document is pre-decisional in nature and qualifies as an intra-agency document containingdeliberative process material. This document contains confidential attorney-client communications relating tolegal matter for which the client has sought professional advice. Under exemption 5 of section (b) of 5 U.S.C. §552 (Freedom of Information Act), this material is EXEMPT FROM RELEASE TO THE PUBLIC.

October 2, 2010

MEMORANDUM FOR: Beth N. GibsonAssistant Deputy Director 

FROM: Riah RamloganDeputy Principal Legal Advisor 

SUBJECT: Secure Communities – Mandatory in 2013

Executive SummaryWe present the arguments supporting a position that participation in Secure Communities will be mandatory in 2013. Based on applicable statutory authority, legislative history, and caselaw, we conclude that participation in Secure Communities will be mandatory in 2013 withoutviolating the Tenth Amendment.Because the contemplated 2013 information-sharing technology change forms the factual basisfor the legal analysis, we have included that background here. Readers familiar with thetechnology and the 2013 deployment may proceed directly to the Discussion section.

In the Discussion section, we review the three statutes from which the mandatory nature of the

2013 Secure Communities deployment derives: 28 U.S.C § 534, relating to Attorney Generalsharing of criminal records with other government officials; 8 U.S.C. § 1722, which mandatesa data-sharing system to enable intelligence and law enforcement agencies to determine theinadmissibility or deportability of an alien; and 42 U.S.C. §14616, which establishes aninformation-sharing compact between the federal government and ratifying states.Congressional history further underscores the argument that the 2013 Secure Communitiesdeployment fulfills a Congressional mandate.Our analysis of case law concentrates on  Printz v. United States, 521 U.S. 898, 925 (1997), theseminal case on unconstitutional state participation in mandatory government programs.Significantly, Printz holds that that “federal laws which require only the provision of information to the Federal Government” do not raise the Tenth Amendment prohibition of “theforced participation of the States’ executive in the actual administration of a federal program.” Id. at 918. We examine several potential legal challenges and arguments that law enforcementagencies may make to avoid the reach of Secure Communities in 2013, and conclude that eachseems rather weak in the face of  Printz and its progeny.

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

Page 145: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 145/160

2

Finally, we note that certain statutes relating to immigration information collected by states donot provide a legal basis for characterizing participation in Secure Communities in 2013 asmandatory, but as these are essentially irrelevant given other statutory support, we addressthem only briefly.Background A review of the Secure Communities information-sharing technology, which is admittedlycomplicated, aids the understanding of the applicable law and the corresponding conclusionthat participation will become mandatory in 2013. The process by which fingerprint and other information is relayed will change in 2013 to create a more direct me thod for ICE to receivethat information from DOJ. Consequently, choices available to law enforcement agencies whohave thus far decided to decline or limit their participation in current information-sharing processes will be streamlined and aspects eliminated. In that way, the process, in essence, becomes “mandatory” in 2013, when the more direct method will be in place. The year 2013was chosen by ICE and DOJ for policy and resource feasibility reasons.

Secure Communities’ Use of IDENT/IAFIS Interoperability1

In Fiscal Year 2008, Congress appropriated $200 million for ICE to “improve and modernizeefforts to identify aliens convicted of a crime, sentenced to imprisonment, and who may bedeportable, and remove them from the United States, once they are judged deportable….”2Inresponse, ICE launched the Secure Communities initiative to transform the way ICE identifiesand removes criminal aliens from the United States. In this initiative, Secure Communitiesutilizes existing technology, i.e. the ability of IDENT and IAFIS to share information, not onlyto accomplish its goal of identifying criminal aliens, but also to share immigration statusinformation with state and local law enforcement agencies (LEAs). The Secure Communities“Program Management Office” provides the planning and outreach support for ongoing effortsto activate IDENT/IAFIS Interoperability in jurisdictions nationwide. See generally SecureCommunities: Quarterly Report, Fiscal Year Quarterly Report to Congress Third Quarter, at iv,20. (Aug 11, 2010).The following is a description of the full IDENT/IAFIS Interoperability process:

1. When a subject is arrested and booked into custody, the arresting LEA sends thesubject’s fingerprints and associated biographical information to IAFIS via theappropriate State Identification Bureau (SIB).

2. CJIS3electronically routes the subject’s biometric and biographic information to US-VISIT/IDENT to determine if there is a fingerprint match with records in its system.

3. As a result of a fingerprint match with data in IDENT, CJIS generates an ImmigrationAlien Query (IAQ) to the ICE Law Enforcement Support Center (LESC).

1“Interoperability” was previously defined as the “sharing of alien immigration history, criminal history, and 

terrorist information based on positive identification and the interoperable capabilities of IDENT and IAFIS.”DHS IDENT/IAFIS Interoperability Report, at p. 2 (May, 2005). Currently, Secure Communities officially refersto the process as “IDENT/IAFIS Interoperability.”2

Consolidated Appropriations Act, 2008, Pub. L. No. 110-161, 121 Stat 1844, 2050 (2007).3

“CJIS,” which stands for the FBI’s Criminal Justice Information Services Division, manages IAFIS.

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

Page 146: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 146/160

3

4. The LESC queries law enforcement and immigration databases to make an initialimmigration status determination and generates an Immigration Alien Response (IAR)to prioritize enforcement actions.

5. The LESC sends the IAR to CJIS, which routes it to the appropriate State SIB to send to the originating LEA. The LESC also sends the IAR to the local ICE field office,which prioritizes enforcement actions based on level of offense.

There are two types of participation in Secure Communities by which IDENT/IAFISInteroperability is deployed. First, participation may involve “full-cycle” information-sharingin which the SIB and LEA choose to participate and receive the return message from theIDENT/IAFIS Interoperability process informing about the subject’s immigration status (SeeStep 5, first sentence). Second, a state or LEA may choose to participate but elect not toreceive the return message or the state may not have the technological ability to receive thereturn message from CJIS or relay the message to the LEA.

 IDENT/IAFIS Interoperability in 2013According to Secure Communities, Assistant Director David Venturella and the CJIS Director reached an agreement by which CJIS will send ICE, starting in 2013, all fingerprint requestsfrom any LEAs that are not participating in Secure Communities. This future informationsharing will not include the component of the current IDENT/IAFIS Interoperability processwhere the SIB and LEA receive (if technically feasible) the automatic return message fromICE regarding the subject’s immigration status. According to Secure Communities, this process is technologically available now; however for policy reasons and to ensure adequateresources are in place, CJIS and Secure Communities have currently chosen to wait until 2013,when all planned deployments should be completed, until instituting this process.

Current CJIS-Required Tasks In Order to Physically Deploy IDENT/IAFIS  Interoperability to an LEA

According to Secure Communities, there are two ministerial-related IT tasks that, pursuant tocurrent CJIS policy, must be performed in order to physically deploy IDENT/IAFISInteroperability to a LEA. The LEA must “validate” its “unique identifier” (called an “ORI”)that is attached to its terminal (i.e, a state or local official contacts CJIS to inform CJIS that theORI pertains to the LEA’s terminal). Once this validation occurs, CJIS must note within IAFISthe LEA’s ORI so that IAFIS will be informed to relay fingerprints to IDENT that originatefrom the LEA.

4  

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

(b) (5)

(b) (5)

Page 147: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 147/160

4

Discussion

The FBI has Statutory Authority To Share Fingerprint Submission Information with DHS/ICE Via IDENT/IAFIS Interoperability, and this Authority Supports theMandatory Nature of Anticipated 2013 Secure Communities Information-Sharing  Deployment 

It is unquestioned that the FBI has authority to share fingerprint information with DHS, and,therefore, ICE. This authority derives from three distinct statutes: 28 U.S.C § 534, relating toAttorney General sharing of criminal records with other government officials: 8 U.S.C. § 1722,which mandates a data-sharing system to enable intelligence and law enforcement agencies todetermine the inadmissibility or deportability of an alien; and 42 U.S.C. §14616, whichestablishes an information-sharing compact between the federal government and ratifyingstates. Federal register notices and the legislative history of these provisions make plain that asystem such as the 2013 Secure Communities deployment is mandatory in nature.

28 U.S.C. § 534Specifically, 28 U.S.C. § 534 provides that the Attorney General shall “acquire, collect,classify, and preserve identification, criminal identification, crime, and other records.” 28U.S.C. § 534(a)(1). That law also provides for the sharing of the information, by requiring thatthe Attorney General “exchange such records and information with, and for the official use of,authorized officials of the Federal Government. . . .” 28 U.S.C. § 534(a)(4); see 8 U.S.C. §1105 (FBI must provide ICE access to criminal history record information contained within National Crime Information Center files). Further, the applicable System of Records Noticefor the FBI’s Fingerprint Identification Records System (FIRS), which are maintained withinIAFIS, provides that identification and criminal history record information (i.e., fingerprintsand rap sheets) may be disclosed, in relevant part, to a federal law enforcement agency directlyengaged in criminal justice activity “where such disclosure may assist the recipient in the performance of a law enforcement function” or to a federal agency for “a compatible civil lawenforcement function; or where such disclosure may promote, assist, or otherwise serve themutual law enforcement efforts of the law enforcement community.” Notice of Modified Systems of Records, 64 Fed. Reg. 52343, 52348 (September 28, 1999).

8 U.S.C. § 1722The FBI has further authority to share the fingerprint information with DHS via IDENT/IAFISInteroperability. Specifically, Congress required the establishment of an interoperableelectronic data system to provide current and immediate access to information in databases of Federal law enforcement agencies and the intelligence community that is relevant to determinethe admissibility or deportability of an alien. See 8 U.S.C. § 1722.5IDENT/IAFIS5

8 U.S.C. § 1722 provides, in relevant part:(2) Requirement for interoperable data systemUpon the date of commencement of implementation of the plan required by section 1721(c), the President shall

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

(b) (5)

Page 148: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 148/160

5

Interoperability is the technological mechanism that was developed pursuant to thisinformation-sharing requirement by which the FBI automates the sharing of current fingerprintsubmissions by LEAs to IAFIS6with DHS so that DHS may, in part, determine theadmissibility or deportability of an alien based on the alien’s criminal history.From the early stages of the IDENT/IAFIS integration efforts, Congress fully intended thatIDENT/IAFIS Interoperability involve both the sharing of information between the FBI and DHS, but also the sharing of the relevant immigration information between the federalagencies and state and local law enforcement. Specifically, Congress described the earlyIDENT/IAFIS integration project as follows:

This project was established to integrate the separate identification systems operated bythe Department of Homeland Security (DHS) with the Federal Bureau of Investigation(FBI). The IDENT/IAFIS project was designed to support the apprehension and 

 prosecution of criminal aliens and to provide State and local law enforcement personnelwith direct access to DHS data through IAFIS. With realtime connection between thetwo systems, DHS would have the capability to determine whether an apprehended  person is subject to a currently posted Want/Warrant or has a record in the FBI'sCriminal Master File. Collaterally, the integration of IDENT and IAFIS would enablecognizant law enforcement agencies to obtain all relevant immigration information as part of a criminal history response from a single FBI search.

develop and implement an interoperable electronic data system to provide current and immediate access toinformation in databases of Federal law enforcement agencies and the intelligence community that is relevant todetermine whether to issue a visa or to determine the admissibility or deportability of an alien (also known as the“Chimera system”).

8 U.S.C. 1721, referred to above, provides, in relevant part:(a) Interim directiveUntil the plan required by subsection (c) of this section is implemented, Federal law enforcement agencies and theintelligence community shall, to the maximum extent practicable, share any information with the Department of State and the Immigration and Naturalization Service relevant to the admissibility and deportability of aliens,consistent with the plan described in subsection (c) of this section.(b) Report identifying law enforcement and intelligence information(1) In general

 Not later than 120 days after May 14, 2002, the President shall submit to the appropriate committees of Congressa report identifying Federal law enforcement and the intelligence community information needed by theDepartment of State to screen visa applicants, or by the Immigration and Naturalization Service to screenapplicants for admission to the United States, and to identify those aliens inadmissible or deportable under theImmigration and Nationality Act [8 U.S.C.A. § 1101 et seq.](2) Omitted (c) Coordination plan(1) Requirement for plan

 Not later than one year after October 26, 2001, the President shall develop and implement a plan based on thefindings of the report under subsection (b) of this section that requires Federal law enforcement agencies and theintelligence community to provide to the Department of State and the Immigration and Naturalization Service allinformation identified in that report as expeditiously as practicable.6

The States, whose record repositories are the primary source of criminal history records maintained at the FBI,are not required to provide fingerprint information to the FBI, but do so voluntarily in order to gain the mutual

 benefit of receiving access to criminal history information on individuals who have resided in other States. SeePrivacy Impact Assessment for the Federal Bureau of Investigation Fingerprint Identification Records System(FIRS) Integrated Automated Fingerprint Identification System (IAFIS) Outsourcing for Noncriminal JusticePurposes – Channeling (May 5, 2008) (available on FBI’s website). State law, however, may require LEAs tosend the fingerprints to IAFIS upon each arrest. See, e.g ., Cal. Penal Code § 13150.

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

Page 149: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 149/160

6

H.R. Rep. No. 109-118 (2005). Congress similarly explained that it was not only crucial thatDHS and the Department of Justice ensure that IDENT “is able to retrieve, in real time, theexisting biometric information contained in the IAFIS database7…[but] it is equally essentialfor the FBI, and State and local law enforcement to have the ability to retrieve the proper levelof information out of the IDENT/USVISIT database.”8S. Rep. No. 108-280, at 15 (2004)(emphasis added). Because IDENT/IAFIS Interoperability accomplishes the Congressionally-intended information-sharing objectives, Congress has explicitly supported expansion of Secure Communities. See H.R. Rep. No. 111-157 (2009).

42 U.S.C. § 14616

42 U.S.C. §14616 also supports the mandatory nature of Secure Communities, at least for twenty-nine states. This statute establishes a compact for the organization of an electronicinformation sharing system among the federal government and the states to exchange criminalhistory records for non-criminal justice purposes authorized by Federal or State law, includingimmigration and naturalization matters. See 42 U.S.C. § 14616. Under this compact, the FBIand the ratifying states agree to maintain detailed databases of their respective criminal historyrecords, including arrests and dispositions, and to make them available to the federalgovernment and to other ratifying states for authorized purposes. See 42 U.S.C. 14616(b).According to the FBI website, twenty-nine states have ratified the compact as of July 1, 2010.9For these twenty-nine states, a court may find participation in Secure Communities mandatorysince they are already required by the above statute to make their criminal history recordsavailable for immigration matters.

Compelling Participation in Secure Communities in 2013 Does Not RaiseConstitutional Concerns

Although LEAs may argue that the Tenth Amendment of the U.S. Constitution prohibits ICEfrom compelling participation in Secure Communities, applicable case law supports a position

that Tenth Amendment protections are not at issue. Under the Tenth Amendment, “[t]heFederal Government may not compel the States to implement, by legislation or executiveaction, federal regulatory programs.”10

 Printz v. United States, 521 U.S. 898, 925 (1997).Similarly, “[t]he Federal Government may neither issue directives requiring the States to7

Similarly, Congress later reiterated “it is essential that. . . IDENT and US-VISIT can retrieve, in real time, biometric information contained in the IAFIS database, and that the IAFIS database can retrieve, in real time, biometric information contained in IDENT and US-VISIT.” H.R. Rep. No. 108-792 (2004).8The Senate Committee for Appropriations further stated, with respect to early IDENT/IAFIS integration efforts,that “in order for Federal, State and local law enforcement agencies to effectively fight crime, they need to be ableto access fingerprint records of visitors and immigration law violators.” S. Rep. No. 108-344 (2004).9See Compact Council, National Crime Prevention and Privacy Compact (2010),http://www.fbi.gov/hq/cjisd/web%20page/pdf/compact_history_pamphlet.pdf (containing a listing of Compactstates).10

Both DHS and ICE officials have described Secure Communities as a “program.” See e.g., Fiscal 2011Appropriations: Homeland Security, Committee on House Appropriations Subcommittee on Homeland Security(2010) (statement of ICE Director Morton) (thanking Subcommittee and the Committee for “providing vitalresources to establish the Secure Communities program”); DHS Office of Inspector General, The Performance of 287(g) Agreements, at 82 (2010). Moreover, Secure Communities’ staff is located in the “Program ManagementOffice.” Thus, ICE would likely not prevail in any argument that Secure Communities is not a federal “program.”

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

Page 150: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 150/160

7

address particular problems, nor command the States’ officers, or those of their politicalsubdivisions, to administer or enforce a federal regulatory program.”  Id. at 935. In Printz , theSupreme Court found unconstitutional Brady Handgun Violence Prevention Act provisionsrequiring the chief law enforcement officer of each jurisdiction to conduct background checkson prospective handgun purchasers and to perform certain related ministerial tasks. See id. at933-34. The Supreme Court held that such provisions constituted the forced participation of the States’ executive in the actual administration of a federal program. See id. at 935.Significantly, however, the Printz court also held that that “federal laws which require onlythe provision of information to the Federal Government” do not raise the TenthAmendment prohibition of “the forced participation of the States' executive in the actualadministration of a federal program.”  Id. at 918 (emphasis added).Applying this holding, the United States District Court for the Southern District of New York found no Tenth Amendment issue in a federal act that required “state officials to provideinformation regarding sexual offenders-information that the state officials will typicallyalready have through their own state registries-to the federal government.” U.S. v. Brown, No.07-Cr. 485(HB), 2007 WL 4372829, at * 5 (S.D.N.Y. Dec. 12, 2007). The District Courtexplained that “because the individuals subject to the Act are already required to register  pursuant to state registration laws, and because the Act only requires states to provideinformation rather than administer or enforce a federal program, the Act does not violate theTenth Amendment.”  Id. at * 6.Similarly, the United States Court of Appeals for the Fourth Circuit upheld a District Court’sconclusion that a federal reporting requirement does not violate the Tenth Amendment becausethe federal law only requires the state to forward information and “does not require the state todo anything that the state itself has not already required, authorized, or provided by its ownlegislative command.” Frielich v Upper Chesapeake Health, Inc., 313 F.3d 205, 214 (4th Cir.2002) (citing Frielich v. Board of Directors of Upper Chesapeake Health, Inc., 142 F.Supp.2d 679, 696 (D.Md. 2001)); see United States v. Keleher , No. 1:07-cr-00332-OWW, 2008 WL5054116, at * 12 (E.D.Cal. Nov. 19, 2008) (rejecting a Tenth Amendment challenge to the provisions of the same federal law as in Brown that required a state to accept registrationinformation from a sex offender, holding that, unlike the state officers in  Printz , the federal law“does not require states, or their state officials, to do anything they do not already do under their own laws.”) (citing United States v. Pitts, No. 07-157-A, 2007 WL 3353423 (M.D.La. Nov. 7, 2007)); cf. Reno v. Condon, 528 U.S. 141, 150-51 (2000) (holding a federal act whichrestricts the nonconsensual sale or release by a state of a driver’s personal information does notviolate the Tenth Amendment, as the Act does not require the states in their sovereign capacityto regulate their own citizens, but regulates the states as the owners of databases).A court following the above reasoning would similarly recognize that an LEA’s participationin Secure Communities (i.e. accepting deployment of IDENT/IAFIS Interoperability) does notviolate the Tenth Amendment. Specifically, participation in Secure Communities does notalter the normal booking process and only requires the same provision of information to theFBI that the LEAs currently provide as regular practice11or as required by state law. See, e.g .,Cal. Penal Code § 13150 (requiring LEAs to provide fingerprint submissions along with arrestdata to the Department of Justice for each arrest made) . Therefore, unlike in Printz where the

11See FN 6, supra.

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

Page 151: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 151/160

8

federal law forced the state officials to perform added duties, participation in SecureCommunities does not require local officials “to do anything they do not already do.”Despite the above reasoning, a challenger to Secure Communities may argue that the currenttask to validate the LEA’s ORI prior to activating IDENT/IAFIS Interoperability extends participation in Secure Communities beyond mere information-sharing and constitutes thesame prohibited conscription of state or local officials as in  Printz . The Supreme Court in Printz held that Congress cannot force state officials to even perform “discrete, ministerialtasks” to implement a federal regulatory program.  Printz , 521 U.S. at 929-30. The Printz court explained “even when the States are not forced to absorb the costs of implementing afederal program, they are still put in the position of taking the blame for its burdensomenessand for its defects.”  Id. at 930. A court following this Printz reasoning could recognize thatcertain jurisdictions do not want to be blamed for the immigration consequences of itsconstituents resulting from its participation in Secure Communities.ICE has several defenses to the above claim. First, Secure Communities, CJIS, and US-VISITare currently discussing the necessity of this ministerial requirement; therefore, it is possiblethat this additional pre-activation requirement may not exist by 2013, and may be eliminated sooner. Second, state and local officials already validate the ORIs bi-annually with the FBI;

therefore, like in Frielich, Keleher , and  Pitts, this validation task does not force state and localofficials “to do anything they do not already do.” Last, ICE may argue that, despite thisministerial task, participation in Secure Communities does not compel state or local officials toenact a legislative program, administer regulations, or perform any functions enforcingimmigration law, but rather only involves the same sharing of information to the federalgovernment as currently practiced. See New York v. United States, 505 U.S. 144, 175-76(1992) (holding a federal law violated the Tenth Amendment by requiring states either to enactlegislation providing for the disposal of radioactive waste generated within their borders or toimplement an administrative solution for taking title to, and possession of, the waste).A challenger to Secure Communities may also argue, in reliance on Printz , that 2013 participation in Secure Communities violates the Tenth Amendment because it may require theState to expend significant funds in order to implement the program. The Printz Court held that Congress cannot force state governments to absorb the financial burden of implementing afederal regulatory program. See Printz , 518 U.S. at 930. Currently, according to SecureCommunities, an SIB may need to pay for its own technological upgrades in order to have thecapability to receive the return IAR message from CJIS in the IDENT/IAFIS Interoperability process or relay that message to the LEA.The above fiscal argument is misleading and should fail both in 2010 and in 2013. First, participation in Secure Communities does not require the states or LEAs to receive the returnIAR message. In fact, Secure Communities has consistently informed LEAs that they may“opt out” of receiving the return IAR message if they so choose or if the SIB does not have thetechnological capability to receive that message or relay that message to the LEA. Second, as per the aforementioned agreement between Mr. Venturella and the CJIS Director for 2013,the 2013 process by which CJIS will send ICE all fingerprint requests from any non- participating LEA will not include the component of the current IDENT/IAFIS Interoperability process where the SIB and LEA receive the automatic return IAR message. Therefore, the2013 process would not require the state to expend any funds in order for IDENT/IAFISInteroperability to be deployed.

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

Page 152: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 152/160

9

Certain Statutes Relation to the Sharing of Immigration Information Do Not Lend Support to the Argument that Secure Communities Will Become Mandatory in 2013Last, please note that 8 U.S.C. §§ 137312and 1644,13which relate to voluntary sharing of immigration information by government employees, do not support mandatory participation inSecure Communities, but lack of support by these statutes is essentially irrelevant becausestatutory support exists elsewhere. We include them because the notoriety of the legal casesassociated with these statutes has potential to become a “red herring” in discussions about themandatory nature of Secure Communities participation. In City of New York v. United States,179 F.3d 29 (2d Cir. 1999), the Mayor of New York City issued a 1989 order prohibiting cityemployees from voluntarily sending immigration status information about an individual to theimmigration authorities. Following passage of IIRIRA and PRWORA in 1996, the City brought suit against the federal government, claiming, in relevant part, that 8 U.S.C. § 1373and 8 U.S.C. § 1644 violated the Tenth Amendment by directly compelling states to enact and enforce a federal regulatory program. The Second Circuit held that 8 U.S.C. § § 1373 and 1644 “do not directly compel states or localities to require or prohibit anything. Rather, they prohibit state and local government entities or officials only from directly restricting thevoluntary exchange of immigration information with the INS.” City of New York , 179 F. 3d at

35.ConclusionBased on applicable statutory authority, legislative history, and case law, we conclude thatthere is ample support for the argument that participation in Secure Communities will bemandatory in 2013, and that the procedures by which state and local information will be shared with ICE at that time does not create legitimate Tenth Amendment concerns of unconstitutionalcompulsion by states in a mandatory federal program.

128 U.S.C. § 1373 provides, in relevant part:

(a) In general Notwithstanding any other provision of Federal, State or local law, a Federal, State or local government entity or official may not prohibit, or in any way restrict, any governmental entity or official from sending to, or receivingfrom, the Immigration and Naturalization Service information regarding the citizenship or immigration status,lawful or unlawful, of any individual.(b) Additional authority of government entities

 Notwithstanding any other provision of Federal, State, or local law, no person or agency may prohibit, or in anyway restrict, a Federal, State, or local government entity from doing any of the following with respect toinformation regarding the immigration status, lawful or unlawful, of any individual:

(1) Sending such information to, or requesting or receiving such information from, the Immigration and  Naturalization Service.(2) Maintaining such information.(3) Exchanging such information with any other Federal, State, or local governmental entity.

138 U.S.C. § 1644 provides “Notwithstanding any other provision of Federal, State, or local law, no State or local

government entity may be prohibited, or in any way restricted, from sending to or receiving from theImmigration and Naturalization Service information regarding the immigration status, lawful or unlawful, of analien in the United States.”

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

Page 153: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 153/160

10

cument ID: 0.7.98.23287 CLEAN ICE FOIA 10-2674.001

Page 154: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 154/160

Page 155: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 155/160

Page 156: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 156/160

Page 157: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 157/160

Page 158: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 158/160

Page 159: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 159/160

Page 160: Ice Secure Communities Memo

8/3/2019 Ice Secure Communities Memo

http://slidepdf.com/reader/full/ice-secure-communities-memo 160/160