Compliance Enforcement Investigations Handbook, U.S. Department of Homeland Security, U.S. Immigration and Customs Enforcement, 2010
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
Department of Homeland Security Office of Investigations Compliance Enforcement Investigations Handbook OI HB 10-01 January 25, 2010 OFFICIAL USE ONLY Foreword The Compliance Enforcement Invest igat ions Handbook provides a si ngle source of national policies, procedures, responsibili ties, gui deli nes, and controls to be followed by U.S. Immigration and Customs Enforcement (ICE) Office of Investigations (01) Special Agents when conduct ing investigations relat ing to compliance enforcement. This Handbook contains instructions and guidance to help ensure uniformity and operational consistency among all 0 1 field offices. Ove rsight over the national Compliance En fo rcement Program resides with the Uni t Chief: Compliance Enforcement Uni t, National Security Investigations Division, 0 1. The Co mpliance Enforcement Handbook is the orig inating and estab li sh ing Handbook on Compliance Enforcement. (See Appendix A for a detailed li st of the documents superseded by this Handbook.) The Com pl iance Enforcement Investigations Handbook is an internal policy of 01 and docs not confer any right or benefit on any pri vate person or party. If disclosure of this Handbook or any portion of it is demanded in any judicial or admi nistrative proceed ing, the 0 1 Informat ion Disclosure Unit, Mi ss ion Support Di vision, and the appropriate ICE Counsel andlor U.S. Attorney should be consulted so that appropriate measures can be taken to invoke privi leges against disclosure. This Handbook contains informat ion whic h may be exempt from discl osure to the pub li c. Any further request fo r disclosure o f this Hand book or information contained herein should be re ferred to the 01 Info rmation Disclosure Uni t. The 0 1 Policy Unit is responsible for coordilHlIing Ihe dcvc lopme11l and issuance of 0 1 policy. All suggested changes or updates to thi s Handbook should bc submitted to the Of Policy Unit whic h will coordinale all nceded revisions with the Co mpliance Enforcement Unit. D· ec tor, Office of In vestigations COJllp/UIIICf! f:llj orCt' mr lll 1""f!,tIIKWW"S I/""t/book OFF1ClM. USE ONl. Y COMPLIANCE ENFORCEMENT INVESTIGATIONS HANDBOOK Table of Contents Chapter 1. PURPOSE AND SCOPE........................................................................................1 Chapter 2. BACKGROUND .....................................................................................................1 Chapter 3. DEFINITIONS........................................................................................................2 • 3.1 • • • • • • • • • • • • • • • • • • • • • • • • • • • • 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 3.14 3.15 3.16 3.17 3.18 3.19 3.20 3.21 3.22 3.23 3.24 3.25 3.26 3.27 3.28 3.29 Advanced Visual Abstracted Links and Name Collection Handler Engine .......................................................................................................2 Alien Change of Address Request Database .............................................3 Alien Flight Student Program....................................................................4 Alternate Responsible Official ..................................................................4 Arrival Departure Information System......................................................4 Automated Biometric Identification System .............................................4 Central Index System ................................................................................4 Computer Linked Automated Information Management System .............4 Consular Consolidated Database...............................................................4 Deportable Alien Control System (Historical) ..........................................5 Designated School Official .......................................................................5 Enforcement Case Tracking System Database..........................................5 ENFORCE Alien Removal Module ..........................................................5 Enforcement Integrated Database..............................................................5 Fingerprint Identification Number ............................................................5 I-94 Subject Query in TECS .....................................................................6 LeadTrac Database ....................................................................................6 National Security Entry-Exit Registration System....................................6 Principal Designated School Official ........................................................6 Refugee and Asylee Processing System....................................................6 Responsible Official ..................................................................................6 Secondary Inspection Tool........................................................................6 Significant Event Notification...................................................................7 Significant Incident Report .......................................................................7 Student and Exchange Visitor Information System ..................................7 Student and Exchange Visitor Program ....................................................7 TECS .........................................................................................................7 United States Visitor and Immigrant Status Indicator Technology ..........7 Web-Based Commercial Databases ..........................................................7 _____________________________________________________________________________________________________________________ Compliance Enforcement Investigations Handbook OFFICIAL USE ONLY i January 25, 2010 Chapter 4. RESPONSIBILITIES.............................................................................................8 • • • • 4.1 4.2 4.3 4.4 Director, Office of Investigations..............................................................8 Unit Chief, Compliance Enforcement Unit ...............................................8 Special Agents in Charge ..........................................................................9 Special Agents...........................................................................................9 Chapter 5. AUTHORITIES ......................................................................................................9 • 5.1 • 5.2 • 5.3 NSEERS ....................................................................................................9 SEVIS......................................................................................................10 US-VISIT ................................................................................................11 Chapter 6. COMPLIANCE ENFORCEMENT PROGRAMS AND PROCEDURES .....11 • • • • • • • • • • 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 NSEERS ..................................................................................................11 Student and Exchange Visitor Information System ................................15 US-VISIT ................................................................................................18 Automated Biometric Identification System ...........................................20 International Criminal Police Organization ............................................20 Visa Revocation ......................................................................................21 Retroactive Visa Revocation Request .....................................................22 Lost and Stolen Passport .........................................................................22 Alien Flight Student Program..................................................................23 Visa Waiver Enforcement Program ........................................................23 Chapter 7. COMPLIANCE ENFORCEMENT INVESTIGATIONS ................................24 • • • • • • • • • • • 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 7.11 Violator Identification ..............................................................................24 Database Analysis ....................................................................................24 LeadTrac Database ...................................................................................25 Investigative Lead Referral ......................................................................25 Case Categories ........................................................................................25 Collateral Request Assignment ................................................................25 Timely Assignment and Reporting Requirement.....................................26 Database Review ......................................................................................26 Field Investigation and Interview.............................................................26 Removability Determination ....................................................................28 Database Reporting/Management Notification ........................................29 APPENDIX Appendix A Acronyms ............................................................................................... A-i _____________________________________________________________________________________________________________________ Compliance Enforcement Investigations Handbook OFFICIAL USE ONLY ii January 25, 2010 COMPLIANCE ENFORCEMENT INVESTIGATIONS HANDBOOK Chapter 1. PURPOSE AND SCOPE The Compliance Enforcement Investigations Handbook establishes policy and procedures for U.S. Immigration and Customs Enforcement (ICE) Office of Investigations (OI) Special Agents (SAs) when they conduct investigations relating to compliance enforcement. Specifically, this Handbook: 1) Explains the components of the Compliance Enforcement Program; 2) Provides information related to the research, identification, and assignment of immigration status violator investigations; 3) Explains specified programs established to facilitate entry, tracks nonimmigrant status changes, and identifies nonimmigrants who fail to comply with immigration laws and regulations; and 4) Establishes uniform standards and procedures for accurate case development and the coordination of investigative lead referrals, as well as management accountability and proper tracking and control. Chapter 2. BACKGROUND Prior to the events of September 11, 2001, there was no effective system in place to accurately monitor the status of foreign students and other visitors in the United States, with disastrous consequences. The 9/11 Commission wrote in its report: “We also found that had the immigration system set a higher bar for determining whether individuals are who or what they claim to be – and ensuring routine consequences for violations – it could potentially have excluded, removed, or come into further contact with several hijackers who did not appear to meet the terms of admitting short-term visitors.” (The 9/11 Commission Report, July 22, 2004, page 401.) In June 2003, OI established the Compliance Enforcement Unit (CEU) within the National Security Investigations Division, the first national program dedicated to the enforcement of nonimmigrant visa violations. The pursuit of these visa violators provides significant support to the “disrupt and deter” counterterrorism strategy of the United States. Compliance Enforcement Investigations Handbook January 25, 2010 1 OFFICIAL USE ONLY Chapter 3. DEFINITIONS The following definitions are provided for the purposes of this Handbook: 3.1 Advanced Visual Abstracted Links and Name Collection Handler Engine A. AVALANCHE The Advanced Visual Abstracted Links and Name Collection Handler Engine (AVALANCHE) is a database developed by the ICE Office of Intelligence that enables users to perform key-word and biographic searches of 15 Department of Homeland Security (DHS) systems simultaneously. B. DHS systems that can be accessed through AVALANCHE The 15 DHS systems that can be accessed through AVALANCHE searches are as follows: 1) Central Index System (CIS) Computer Linked Automated Information Management System (CLAIMS) (Partial): The U.S. Citizenship and Immigration Services (USCIS) Service Center CLAIMS database. (Note: This is not to be confused with a search of the CIS mainframe system.) 2) Criminal Investigative Reporting System (CIRS) Subject Data: Subject data from archived CIRS databases; the legacy Immigration and Naturalization Service (INS) Investigations case management system. 3) Deportable Alien Control System (DACS) (Partial): All historical DACS cases as of April 14, 2005. (Note: The Enforcement Case Tracking System (ENFORCE) Alien Removal Module (EARM) replaced DACS in August 2008.) 4) Documents: Searches against ICE, U.S. Customs and Border Protection (CBP), and DHS unclassified intelligence reports. Access to these reports is also available from the DHS Operations Intelligence Fusion website (https://intel.ice.dhs.gov). 5) Enforcement Integrated Database (EID): Searches civilian records from EID. EID is the data warehouse for information entered in ENFORCE and the National Security Entry/Exit Registration System (NSEERS). This data is updated on a daily basis. 6) LeadTrac: Data from the LeadTrac system of visa overstays and absconders. LeadTrac is an OI database used by CEU that contains Compliance Enforcement Investigations Handbook January 25, 2010 2 OFFICIAL USE ONLY violator leads from NSEERS, Student and Exchange Visitor Information System (SEVIS), and the United States Visitor and Immigrant Status Indicator Technology (US-VISIT). This data is updated on a weekly basis. 7) National Targeting Center (NTC): Searches names of interest against CBP’s NTC daily operation reports. 8) No Fly List: Searches names on the Transportation Security Administration (TSA) No Fly List. Subjects on the No Fly List have been deemed a threat to commercial aviation. This data is updated on a daily basis. 9) Selectee List: Searches names on the TSA Selectee List. Subjects on the Selectee List have been deemed potential threats to commercial aviation. This data is updated on a daily basis. 10) SEVIS Exchange Visitor: Searches information within the SEVIS database of persons with exchange visitor visas. 11) SEVIS Exchange Visitor Dependents: Searches against information on dependents of exchange visitors found in SEVIS. 12) SEVIS Students: Searches the SEVIS database. 13) SEVIS Student Dependents: Searches dependents of students available in SEVIS. 14) Social Security Non-Authorized Worker Data: Searches information on individuals known to the Social Security Administration as authorized to work only with approval from USCIS. 15) Students and Schools (STSC): Searches student names from an archive of the STSC database, which preceded SEVIS. This data is not updated. AVALANCHE is located on the DHS Operations Intelligence Fusion website and is available to all SAs. The web address is https://intel.ice.dhs.gov. 3.2 Alien Change of Address Request Database The Alien Change of Address Request (Form AR-11) database is available through Teleview and contains change of address information filed by aliens via Form AR-11. Compliance Enforcement Investigations Handbook January 25, 2010 3 OFFICIAL USE ONLY 3.3 Alien Flight Student Program The Alien Flight Student Program (AFSP) is the TSA program utilized to vet and approve individuals for flight training. Section 113 of the U.S. Air Transportation Security Act amended Title 49, United States Code (U.S.C.) by adding a new section: Section 44939 (the authority granted by Section 113 of the act is codified as 49 U.S.C. § 44939). 3.4 Alternate Responsible Official The Alternate Responsible Official (ARO) is the official designated by the exchange visitor program to assist the Responsible Official (RO) in performing responsibilities and duties pertaining to SEVIS. 3.5 Arrival Departure Information System The Arrival Departure Information System (ADIS) generates reports by gathering and matching arrival and departure information. Information contained within ADIS is submitted to SEVIS, which notifies the appropriate school that the foreign student entered the United States and should report to school within 30 days. 3.6 Automated Biometric Identification System The Automated Biometric Identification System (IDENT) is a part of the DHS biometric database. It collects biometric, biographic, and encounter-related data for operations environments. Biometric data includes, but is not limited to, fingerprints and photographs. Biographical data includes, but is not limited to, name, date of birth, nationality, and other personal descriptive data. 3.7 Central Index System CIS is a master records management system that displays biographical information on certain classes of aliens and certain U.S. citizens. CIS contains information on the status of an alien, as well as the physical location of the alien’s file (A-file). 3.8 Computer Linked Automated Information Management System CLAIMS contains information on aliens who have filed applications for immigration benefits. It supports the processing and maintenance of applications and petitions for immigration benefits by providing an information systems infrastructure. 3.9 Consular Consolidated Database The Consular Consolidated Database (CCD) is a U.S. Department of State (DOS), Bureau of Consular Affairs, database that contains information on all immigrant and nonimmigrant visa applications submitted to U.S. consulate offices. Compliance Enforcement Investigations Handbook January 25, 2010 4 OFFICIAL USE ONLY 3.10 Deportable Alien Control System (Historical) DACS was a mainframe system that contained information regarding the status of illegal aliens under removal proceedings, including detention status and location. DACS also contained information regarding the alien’s entry and departure status until the alien was deported or relief was granted. (Note: As stated in Section 3.1(B)(3) above, EARM replaced DACS in August 2008.) 3.11 Designated School Official The Designated School Official (DSO) is the official designated by the academic institution to assist the Principal Designated School Official (PDSO) in performing responsibilities and duties pertaining to SEVIS. 3.12 Enforcement Case Tracking System Database ENFORCE is an event-based case management system that documents, tracks, and manages the reporting of enforcement cases. Its functions include subject processing, biometric identification, allegations and charges, preparation and printing of appropriate forms, data repository, and interface with the national database of enforcement events. ENFORCE supports alien apprehension processing for both “Voluntary Return” and “Notice to Appear” actions. ENFORCE also contains the NSEERS module through which all NSEERS registrations are performed. ENFORCE is the principal user interface with EID. 3.13 ENFORCE Alien Removal Module EARM is a web-based application that supports case management activities for the ICE Office of Detention and Removal Operations. EARM is integrated with other enforcement applications through the use of EID which makes it possible to collect, track, manage, and store data in a secure centralized location. EARM is ICE’s replacement for DACS, the legacy INS application, and is the official system of record for removal operations. 3.14 Enforcement Integrated Database EID is the data warehouse of information entered in ENFORCE and is the DHS common database repository for enforcement applications. 3.15 Fingerprint Identification Number The Fingerprint Identification Number (FIN) is the primary unique subject fingerprint reference used by DHS. FIN is generated by IDENT and US-VISIT. Compliance Enforcement Investigations Handbook January 25, 2010 5 OFFICIAL USE ONLY 3.16 I-94 Subject Query in TECS The I-94 Subject Query (SQ 94) in TECS provides the user with the ability to query for information regarding the entry of a nonimmigrant and includes information on entry classification, intended address, and departure. (Note: TECS is the former acronym of the Treasury Enforcement Communications System; it is now used as a stand-alone name.) 3.17 LeadTrac Database The LeadTrac database is a stand-alone compliance enforcement database utilized to store, track, and manage nonimmigrant status violator information for use in field investigations. 3.18 National Security Entry-Exit Registration System NSEERS provides detailed information about a nonimmigrant, including background, purpose of the nonimmigrant’s visit to the United States, and departure confirmation. 3.19 Principal Designated School Official The PDSO is the principal SEVIS point of contact for ICE at academic institutions, as well as the official designated by the academic institution to perform the responsibilities and duties pertaining to SEVIS. 3.20 Refugee and Asylee Processing System The Refugee and Asylee Processing System (RAPS) is a database that contains information related to asylum applicants and related asylee casework. The database maintains updates regarding application status and progress. 3.21 Responsible Official The RO is the primary SEVIS point of contact for ICE and DOS for exchange visitor programs, as well as the official designated by the exchange visitor program to perform the responsibilities and duties pertaining to SEVIS. 3.22 Secondary Inspection Tool The Secondary Inspection Tool (SIT) is a web-based tool that functions within a suite of integrated applications. SIT relies on external data and applications to help identify comprehensively a subject’s identity, to corroborate the subject’s identity, and to assess the risk that the subject’s presence in the United States may pose. While SIT does not gather biographical and biometric data, it is the conduit for the use of that information to Compliance Enforcement Investigations Handbook January 25, 2010 6 OFFICIAL USE ONLY help confirm a subject’s identity. Exit information is being captured in SIT at 12 airports and two seaports. 3.23 Significant Event Notification The Significant Event Notification (SEN) system is a transactional Intranet application and reporting system designed to facilitate the seamless entry, query, and modification of reports such as the Significant Incident Reports (SIRs). 3.24 Significant Incident Report The SIR is a report submitted through the SEN system and is the vehicle for reporting high-interest incidents, significant events, and other emerging or sensitive matters. 3.25 Student and Exchange Visitor Information System SEVIS is an Internet-based system that maintains accurate and current information on nonimmigrant students (F and M visa), exchange visitors (J visa), and their dependents (F-2, M-2, and J-2). SEVIS enables schools and program sponsors to transmit mandatory information and event notifications, via the Internet, to DHS and DOS throughout a student’s or exchange visitor’s stay in the United States. 3.26 Student and Exchange Visitor Program The Student and Exchange Visitor Program (SEVP) is the ICE program that administers SEVIS and conducts outreach with the educational community. SEVP also approves schools for certification to enroll F and M nonimmigrant students and withdraws such certification when the school is determined to be no longer eligible. 3.27 TECS TECS is an automated enforcement and inspection system designed to support DHS and other federal users. 3.28 United States Visitor and Immigrant Status Indicator Technology US-VISIT is part of a continuum of biometrically-enhanced security measures that begin outside U.S. borders and continue through a visitor’s arrival in, and departure from, the United States. Registration in US-VISIT currently applies to all visitors (with limited exemptions) entering the United States, regardless of country of origin or whether they are traveling on a visa by air, sea, or land. 3.29 Web-Based Commercial Databases Web-based commercial databases, such as Accurint, AutoTrack XP, and the Consolidated Lead Evaluation and Reporting database, store millions of public source Compliance Enforcement Investigations Handbook January 25, 2010 7 OFFICIAL USE ONLY records such as state and local government records, information from public utilities, driver’s license and vehicle registration records. These commercial databases are available to the U.S. Government and the public sector, and special access to the information is available to law enforcement. Chapter 4. RESPONSIBILITIES 4.1 Director, Office of Investigations The Director of OI has the responsibility for the oversight and implementation of the policies and procedures set forth in this Handbook. 4.2 Unit Chief, Compliance Enforcement Unit A. Responsibilities of the Unit Chief, CEU The Unit Chief, CEU, is responsible for the implementation of the policies and procedures set forth in this Handbook. The Unit Chief, CEU, is also responsible for coordinating with OI Headquarters (HQ) management on all aspects of the Compliance Enforcement Program, including, but not limited to, operational, investigative, policy, personnel, budget, and logistical issues. B. Delegation of Authority to the Unit Chief, CEU The following authorities established by Title 8, Code of Federal Regulations (C.F.R.), Part 264.1(f), as amended by 68 Federal Register (FR) 67578 (Dec. 22, 2003) (see Note below) are delegated to the Unit Chief, CEU: 1) The authority to issue notice to an alien of NSEERS registration or reregistration interview requirements. 2) The authority, to the extent permitted by law and subject to the availability of appropriations, to provide administrative services, funds, facilities, staff and other support services as may be necessary for the performance of functions as set forth in 8 C.F.R. § 264.1(f). 3) The authority to monitor department compliance with policies and recommendations of the Assistant Secretary of ICE as set forth in 8 C.F.R. § 264.1(f). 4) The authority to carry out such acts on behalf of the Assistant Secretary of ICE that are necessary to perform the duties and responsibilities entailed in exercising said authority. Compliance Enforcement Investigations Handbook January 25, 2010 8 OFFICIAL USE ONLY These authorities may not be redelegated. (Note: DHS’ interim rule, 68 FR 67578, suspended both the automatic annual and 30-day re-registration requirements. Aliens who previously registered at a port of entry at the time of admission or as part of a domestic call-in program continued to have an obligation to register their departure. NSEERS registered aliens remained subject to continuing registration interviews at the discretion of the Assistant Secretary of ICE or designee.) 4.3 Special Agents in Charge OI Special Agents in Charge (SACs) are responsible for implementing the provisions of this Handbook within their area of responsibility (AOR). 4.4 Special Agents OI SAs are responsible for complying with the provisions of this Handbook. Chapter 5. AUTHORITIES 5.1 NSEERS A. 8 C.F.R. Part 214.1(f), Registration and false information. Nonimmigrant aliens’ admission and continued stay in the United States are conditioned on compliance with any registration, fingerprinting, and photographing requirements upon arrival in the United States as described in section 264.1(f) of the regulations. B. 8 C.F.R. § 264.1(f), Registration, fingerprinting, and photographing of certain nonimmigrant aliens. Nonimmigrants may be required to register, submit fingerprints, and be photographed upon arrival to the United States if they are, or are believed to be, citizens or nationals of a designated country, or are believed to meet designated criteria. (Paragraph (f) was revised effective September 11, 2002, through notice in the Federal Register, 67 FR 52584.) (Note: DHS’ final rule, 67 FR 52584, originally established the NSEERS program, imposing the 30-day and annual special registration requirements for aliens coming from certain designated countries.) Compliance Enforcement Investigations Handbook January 25, 2010 9 OFFICIAL USE ONLY 5.2 SEVIS A. Illegal Immigration Reform and Immigrant Responsibility Act of 1996, Section 641 Required the creation of a program to collect student and exchange visitor information and to monitor student and exchange visitors. B. 8 U.S.C. § 1372, Program to collect information relating to nonimmigrant foreign students and other exchange program participants 8 U.S.C. § 1372 is the statutory authority for SEVIS. C. 8 C.F.R. § 214.2(f),(m), and (j) 8 C.F.R. § 214.2(f),(m), and (j) set forth the rules for admission, extension, and maintenance of status for F, M, and J visa holders, respectively. D. 8 C.F.R. § 214.3 8 C.F.R. § 214.3 sets rules for approval of schools seeking to enroll F and M nonimmigrant students, and for compliance post-approval. E. 8 C.F.R. § 214.4 8 C.F.R. § 214.4 sets rules for denial of certifications, denial of recertification, and withdrawal of SEVP certification. F. 22 C.F.R. § 62, Exchange Visitor Program 22 C.F.R. § 62 sets rules for the administration of the exchange visitor program (J visa holders – oversight for the program falls under DOS). G. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Section 416 The USA PATRIOT Act of 2001 mandates the full implementation and expansion of SEVIS as set forth in 8 U.S.C. § 1372. H. The Homeland Security Act of 2002 The Homeland Security Act of 2002 delegated responsibility of SEVIS to the Assistant Secretary of the Bureau of Border Security (BBS). Pursuant to section 1502 of the Homeland Security Act, the BBS was renamed the Bureau of “Immigration and Customs Enforcement (ICE)” through the Compliance Enforcement Investigations Handbook January 25, 2010 10 OFFICIAL USE ONLY President’s “Reorganization Plan Modification for the Department of Homeland Security,” effective March 1, 2003. I. The Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security and Visa Entry Reform Act (EBSVERA) of 2002 sets specific time frames for the implementation of SEVIS, strengthens the SEVIS requirements, and sets standards for the certification of schools and the designation of exchange visitor programs. The EBSVERA of 2002 also provides for DHS to recertify schools approved for attendance by F and/or M students every 2 years to confirm the schools’ continuing eligibility for certification and compliance with recordkeeping and reporting requirements. 5.3 US-VISIT DHS and DOS instituted US-VISIT (see Section 3.28) as part of their authority to ensure eligibility of nonimmigrants for immigration benefits. Chapter 6. COMPLIANCE ENFORCEMENT PROGRAMS AND PROCEDURES 6.1 NSEERS In September 2002, as the result of a Congressional mandate, the Department of Justice (DOJ) developed and implemented NSEERS. Also known as “special registration,” NSEERS verifies compliance with U.S. immigration laws through the implementation of a national registry for the entry and exit of nonimmigrants. NSEERS provides detailed information about the nonimmigrant, including background, purpose of an individual’s visit to the United States, and departure confirmation. A. Port of Entry Encounter There are four different methods by which a nonimmigrant is identified as being subject to special registration at a port of entry. The four methods are: 1) identification of citizens or nationals of countries designated through publication of a notice in the Federal Register; 2) notification through the Interagency Border Inspection System; 3) identification of pre-existing criteria as defined by the Secretary of Homeland Security; and 4) exercise of officer discretion. Compliance Enforcement Investigations Handbook January 25, 2010 11 OFFICIAL USE ONLY If a nonimmigrant is identified as being subject to NSEERS registration, he or she is referred to secondary inspection for enrollment in NSEERS. During the secondary inspection process, the nonimmigrant is questioned under oath by CBP regarding employment, education, intended address in the United States, points of contact, and credit card information. Additionally, a digital photograph is captured and biometric information is obtained from the nonimmigrant’s two index fingers. The fingerprints are compared to fingerprints stored in law enforcement databases, which include convicted aggravated felons, known or suspected terrorists, criminal wants and warrants, and criminal alien recidivists. The biometric and biographic data are stored in EID and are accessible through the NSEERS module in ENFORCE. Absent any derogatory information, the nonimmigrant will be enrolled in NSEERS and will be admitted to the United States. The registrant will be provided with “walk-away materials” which direct the registrant to report to a designated port of departure for a departure interview on the date he or she intends to depart from the United States. B. Domestic Call-In Registration The domestic call-in registration period began on November 15, 2002, and ended on April 25, 2003. Four call-in notices were announced through publication in the Federal Register. The call-in notices defined the countries and conditions under which certain nonimmigrants were required to register. Male citizens and/or nationals 16 years of age or older from Afghanistan, Algeria, Bahrain, Bangladesh, Egypt, Eritrea, Indonesia, Iran, Iraq, Jordan, Kuwait, Lebanon, Libya, Morocco, North Korea, Oman, Pakistan, Qatar, Saudi Arabia, Somalia, Sudan, Syria, Tunisia, Unites Arab Emirates, and Yemen who were admitted as nonimmigrants on or before September 30, 2002, and who remained in the United States after the termination of the specified call-in period were directed to register for NSEERS. The notices also defined the effective period for call-in registration. Ultimately, four additional notices were published in the Federal Register reopening and/or extending the call-in period. The nonimmigrant would have been interviewed, under oath, to obtain the information needed to complete the registration data fields in the NSEERS module in ENFORCE. These data fields include simple but detailed biographic information relating to each registrant. The Federal Register Notice required call-in registrants to bring documentation relating to their stay in the United States, such as travel documents and proof of where they were staying. Compliance Enforcement Investigations Handbook January 25, 2010 12 OFFICIAL USE ONLY C. Amendment of NSEERS Regulation Requiring 30-Day and Annual Interview On December 2, 2003, an interim rule published in the Federal Register became effective that substantially modified 8 C.F.R. § 264.1(f), the section that authorizes NSEERS. The rule suspended the automatic 30-day and annual re-registration requirements and provided DHS with greater flexibility for notifying aliens of future registration requirements. DHS retains the authority to call in an NSEERS-registered alien for a compliance interview. All NSEERS-registered aliens, with the exception of crewmen, are required to register their departure at a designated port. An alien who willfully failed to appear for the call-in registration and/or comply with the applicable special registration requirements after appearing for the call-in is deportable under section 237(a)(1)(C)(i) of the Immigration and Nationality Act (INA) for failure to maintain nonimmigrant status. In addition, an alien who failed to appear for the call-in registration prescribed by the Federal Register Notice is deportable pursuant to section 237(a)(3)(A) of the INA. An alien who has been registered in NSEERS and fails (without good cause) to comply with the departure registration requirement is subject to a presumption of future inadmissibility to the United States under section 212(a)(3)(A)(ii) of the INA. D. Departure NSEERS registrants are required to depart from the United States at designated ports of departure. Prior to departure, the registrants must submit to a departure interview conducted by a CBP Officer. The registrant’s identity is confirmed through biometrics, and the registrant is required to present evidence that the alien will depart on that date. Failure to register a departure could result in the alien being found inadmissible at the next application for admission to the United States. E. U.S. Citizenship and Immigration Services Referrals Aliens subject to NSEERS registration and applying for an immigration benefit must provide USCIS satisfactory evidence of NSEERS compliance or qualification for exemption. If the alien does not satisfy USCIS standards, the alien will be referred to ICE for an interview. ICE has the responsibility for making the final determination of whether the alien is subject to NSEERS and whether or not the failure to register was willful or not reasonably excusable. (See the memorandum entitled, “NSEERS Referrals from Citizenship and Immigration Services,” signed by John P. Clark, Director of OI (April 22, 2004).) Compliance Enforcement Investigations Handbook January 25, 2010 13 OFFICIAL USE ONLY F. Special Registration Interview A Special Registration Interview is for individuals who appear to be complying with the terms of their admission, but have been determined that a special registration interview is warranted. NSEERS registrants identified as requiring such an interview will be sent a Notice of Special Registration Interview by the Unit Chief, CEU. Special Registration Interviews are based on specific factors indicating that the individual requires additional scrutiny and should be conducted accordingly. These interviews allow interaction with individuals from special interest countries, some of which are areas where terrorist groups are known to recruit and operate. Also, the potential for community outreach, intelligence, and/or source recruitment should not be overlooked. Prior to the interview, the alien’s identity should be confirmed by conducting a Special Alien Registration search in IDENT/ENFORCE. After the initial interview, if it is determined that the individual has maintained status and no additional derogatory information is discovered, the individual’s NSEERS record must be updated. Investigative Assistants are authorized to complete the process of updating NSEERS records. The location and date of the special registration should be entered in the “Interview” screen, and additional comments may be entered as a narrative on the biographical screen. A properly completed interview disposition in NSEERS is essential for the accurate capture of statistics related to the Special Registration program. A Notice to Appear (NTA) (DHS Form I-862) should be issued if evidence is uncovered during the interview which would indicate that the individual violated the terms of admission. If an NTA is issued, the decision to issue a warrant of arrest or to set bond conditions shall be determined utilizing the same local office criteria as is used for other immigration violators. If a national security charge under either INA § 212(a)(3) or 237(a)(4) seems applicable, a local Office of the Chief Counsel (OCC) must be contacted so that the National Security Law Division (NSLD) in the Office of the Principal Legal Advisor can be consulted in the matter. Similarly, if a national security bar under 212(a)(3) or 237(a)(4) seems applicable, SAs should make every effort to coordinate matters with the local OCC so that NSLD may be consulted if necessary. G. CEU NSEERS Enforcement Process CEU receives a weekly list of nonimmigrants who were enrolled upon entry and who do not have a registered departure, indicating that they potentially overstayed their period of admission. The information is reviewed by CEU to determine if any individuals are in violation of their status and are still Compliance Enforcement Investigations Handbook January 25, 2010 14 OFFICIAL USE ONLY present in the United States. Viable leads are referred to OI field offices for enforcement action. SAs are reminded that the decision of whether an alien’s failure to register was not willful or was reasonably excusable must be made with supervisory concurrence. 6.2 Student and Exchange Visitor Information System SEVIS provides ICE and educational institutions with detailed information regarding nonimmigrant entry into the United States, the arrival at the designated educational institution, and the registration of the nonimmigrant for the intended program. Additionally, SEVIS is continually updated by the DSO who is responsible for monitoring the status of nonimmigrants as they progress through their course of study. CEU extracts from SEVIS a weekly list of nonimmigrant students and exchange visitors who have been terminated (i.e., failure to enroll, unauthorized early withdrawal, failure to maintain full course load, etc.). However, not all terminated records are for adverse reasons; therefore, a few termination reasons (such as change of status) are excluded from further review. This information, as well as the nonimmigrant’s potential threat to national security or public safety, is incorporated into the lead generation process. A. Student and Exchange Visitor Program SEVP is responsible for the physical maintenance of SEVIS, the coordination of policy and regulations concerning foreign students, and outreach and liaison with the academic community. CEU works closely with SEVP to establish policy and guidance related to ICE enforcement matters. SEVP maintains information on schools that apply for certification and are currently certified by SEVP. This information includes the Petition for Approval of School for Attendance by Nonimmigrant Student (ICE Form I-17) and supporting documentation. Accordingly, SEVP can be a valuable investigative resource, especially in cases where an academic institution is engaged in criminal activity such as visa fraud or alien smuggling. Any requests for information or assistance from SEVP will be coordinated through the CEU SEVIS Program Manager. B. Certification/Recertification of Schools All academic institutions must be certified by SEVP in order to access SEVIS and issue the Certificate of Eligibility for Nonimmigrant F1 or M1 Student Status (ICE Forms I-20 A-B and I-20 M-N). Additionally, SEVPcertified institutions must recertify biannually. CEU assists SEVP in the review process to approve academic institutions for certification and recertification. This review includes an investigation into reports of suspected illegal activity, an assessment of any regulatory non-compliance, and consideration of a school’s level of cooperation with field agents. CEU Compliance Enforcement Investigations Handbook January 25, 2010 15 OFFICIAL USE ONLY also conducts a review of the DSOs to ensure that they meet the eligibility requirements to access SEVIS as set forth by regulations. C. Procedure for Obtaining Information from SEVP-Certified Schools ICE’s requests for information from schools for SEVP enforcement purposes are exempt from the requirements under the Family Educational Rights and Privacy Act (FERPA) of 1974. Schools are legally bound to provide information requested by ICE. Statutory authority for requesting information from schools for SEVP purposes is found in 8 U.S.C. § 1372(c)(2). Regulatory authority for school reporting requirements is found in 8 C.F.R. § 214.3(g). OI SAs may obtain information needed for enforcement purposes from institutions by directly requesting the information from the DSOs. Many institutions will provide information informally without written requests (orally, by email, or via facsimile). If such a relationship exists with an institution, a formal written request does not need to be submitted. ICE has the authority to obtain the information without a subpoena; therefore, SAs shall not request information for SEVP enforcement purposes using an Immigration Enforcement Subpoena. Upon receiving a notice in writing, regulations require an institution to provide the information requested on an individual student within 3 workdays, and within 10 workdays for a class of students (i.e., all students in a particular major or of a certain nationality). For individuals in custody, the institution must provide the information orally on the same day when the request is made. The oral request will then be followed by a written notification if requested by the institution. Written requests, on ICE letterhead, will be made by certified mail, courier, or by other means so that receipt of the notification can be documented. D. Failure to Provide Information If an institution has failed to provide the information requested within the specified time frame, SAs will contact the institution’s PDSO to determine why the request was not addressed. If the failure to respond was due to an oversight by the school, SAs will make a second request and will notify the CEU SEVIS Program Manager via email. The second request may be made orally or informally since the first written request meets the standard set forth in the regulation. If an institution fails to provide the requested information a second time or refuses to comply with the official ICE request, the SA will notify the CEU SEVIS Program Manager for further action. Compliance Enforcement Investigations Handbook January 25, 2010 16 OFFICIAL USE ONLY E. Decertification of Schools SAC offices may request the withdrawal of a school’s SEVP certification by contacting the CEU SEVIS Program Manager. This request must be accompanied by supporting documentation outlining the justification for the withdrawal. Final authority for the withdrawal of a school’s certification is vested with the SEVP School Certification Branch (SCB). 8 C.F.R. § 214.4 sets forth the regulations concerning the withdrawal of a school’s certification. CEU and SAC field offices will work closely with the SEVP SCB to provide information concerning schools that are subject to the withdrawal of SEVP certification. This will include timely reports of violations, documentation of incidents, and collection of evidence needed to support the withdrawal of certification. F. Rejection of PDSO/DSO ICE has the authority to certify who has access to SEVIS and may reject the submission of any DSO nominee or withdraw a previous appointment. Should a SAC office suspect that a PDSO/DSO is not eligible to access SEVIS, it should contact the CEU SEVIS Program Manager for guidance. G. Contact with SEVP-Certified Institutions 8 C.F.R. § 214.3(I)(1)(ii) requires schools to designate one PDSO and 8 C.F.R. § 214.3(I)(1)(iii) authorizes each school to designate up to ten DSOs at any one time, including the PDSO. DSOs are responsible for updating SEVIS and issuing Forms I-20 A-B or I-20 M-N to prospective and current students, as appropriate. PDSOs also serve as the principal points of contact for ICE. These functions may not be delegated to any other person. If additional information is required to verify the nonimmigrant student status, SAs can contact the DSOs directly. For issues concerning contact with DSOs, SAs should contact the CEU SEVIS Program Manager. H. Requests for Data and Other Information SAs will use the current SEVIS reporting module to obtain the information needed for their investigations. SEVIS enforcement guidance or requests for support of special projects or investigations should be referred to the CEU SEVIS Program Manager. I. Use of SEVIS Project Codes in TECS SAs will use the appropriate TECS project codes relating to SEVIS (YR2) for all criminal and administrative investigations involving SEVP-certified Compliance Enforcement Investigations Handbook January 25, 2010 17 OFFICIAL USE ONLY schools or school officials. This includes, but is not limited to, immigration fraud and alien smuggling occurring at SEVP-certified schools. J. Exchange Visitor Programs Exchange visitor programs are those programs designated by DOS to facilitate exchange visitors (J1 nonimmigrant visa holders and their dependents) via a Certificate of Eligibility for Exchange Visitor Status (DS 2019) through SEVIS. The policies that apply to academic institutions and F and M nonimmigrant students in this section also apply to exchange visitors. The equivalent of the PDSO/DSO is the RO and ARO, and the equivalent of the academic institution is the exchange visitor program. The equivalent of Form I-20 is Form DS-2019. Exchange visitor regulations are found in 22 C.F.R. § 62. 6.3 US-VISIT The US-VISIT Program (see Section 3.28) is the centerpiece of the U.S. Government’s efforts to transform our nation’s border management and immigration systems in a way that meets the needs and challenges of the 21st century. Most visitors experience US-VISIT’s biometric procedures – digital, inkless finger scans and digital photograph – upon entry to the United States. DHS continues to work closely with DOS, building on the biographic and biometric collection underway at U.S. consulates around the world. In those cases where a visitor requires a visa, DOS collects the visitor’s biometric and biographic information through the BioVisa program. The BioVisa program is checked against various U.S. Government watch lists, thereby improving the ability of DOS to make a visa determination. When a visitor arrives in the United States, US-VISIT procedures allow DHS to determine whether the person applying for entry is the same person who was issued the visa by DOS. Additionally, US-VISIT’s watch list checks improve the ability of DHS to make admissibility decisions. US-VISIT entry procedures are currently in place at airports and seaports with international arrivals and in the secondary inspection areas of all U.S. land border ports of entry. A. US-VISIT Biometric Watch List An integral part of the US-VISIT process is a fingerprint comparison of foreign visitors’ fingerprints to the fingerprint records of individuals identified via the US-VISIT Biometric Watch List. Biometric comparisons of a foreign visitor’s fingerprints to the US-VISIT Biometric Watch List can occur up to four times during the US-VISIT lifecycle of a foreign visitor: Compliance Enforcement Investigations Handbook January 25, 2010 18 OFFICIAL USE ONLY 1) during the visa issuance process; 2) upon entry during primary inspection; 3) subsequent to entry when new records are received outside the US-VISIT enrollment process (i.e., extracts from the Federal Bureau of Investigation’s (FBI) Integrated Automated Fingerprint Identification System’s (IAFIS) Criminal Master File) and enrolled; or 4) upon exit from the United States. All potential fingerprint matches to the various IDENT databases, including the US-VISIT Biometric Watch List, are referred to the DHS Biometric Support Centers (BSCs) for comparison and matching by certified fingerprint examiners. B. US-VISIT Biometric Support Center In cases involving comparisons against IDENT watch list records, BSC fingerprint examiners immediately communicate all findings to the submitter. The US-VISIT BSCs are staffed 365 days per year, 24 hours a day by expert fingerprint examiners. (Note: The results of fingerprint matches received from BSCs are very accurate, as matches are completed by expert fingerprint examiners. Although these results can be used as an articulable fact to establish probable cause for an arrest, results should be confirmed through a certified laboratory prior to the beginning of an adversarial process. If the BSCs are later converted into certified fingerprint laboratories, the results may be used as court room evidence.) CEU and US-VISIT are collaborating to utilize fingerprint data contained in IDENT to identify the fingerprints of unidentified suspects, victims, and witnesses and are obtaining investigative assistance from ICE. IDENT contains the fingerprints of millions of foreign nationals encountered by DHS and, during visa issuance, by DOS that are not accessible to state and local law enforcement agencies by any other means. The US-VISIT BSCs have access to millions of biometric and biographic records that are collected and maintained by DHS. C. US-VISIT Biometric Exit In 2006, US-VISIT piloted its deployment of an automated biometric exit process to record the departure of foreign visitors. Exit procedures were in place in 12 airports: Atlanta, Baltimore-Washington (BWI), Chicago, Dallas-Fort Worth (DFW), Denver, Detroit, Ft. Lauderdale, Newark, Compliance Enforcement Investigations Handbook January 25, 2010 19 OFFICIAL USE ONLY Philadelphia, San Francisco, San Juan, and Seattle; and 2 seaports: Miami, Florida, and Los Angeles (Long Beach/San Pedro), California. Most foreign visitors, including nationals from Visa Waiver countries, must comply where exit procedures are established. Canadian citizens are not required to participate unless they fall under current US-VISIT enrollment criteria. Effective May 6, 2007, international visitors are no longer required to check out at a US-VISIT exit kiosk when they leave the United States. DHS is now prepared to begin implementing exit procedures in the commercial air environment, where the significant majority of those subject to US-VISIT depart the United States. DHS recently began discussing the air exit strategy with the airline industry and will be collaborating with air carriers to implement it. DHS will publish a regulation in the future outlining its plans for implementing an integrated air exit strategy. 6.4 Automated Biometric Identification System IDENT is a fingerprint matching system for rapid biometric identification of subjects. IDENT was developed in 1995 to assist the U.S. Border Patrol in identifying illegal aliens with multiple attempted illegal entries (recidivists). Since then, IDENT has grown from 5,000 subjects to over 50 million subjects. IDENT currently supports a variety of users for both enforcement and immigration business processes. IDENT users submit fingerprint transactions that search multiple databases depending on the user’s specific business requirements. The response times from IDENT back to the user submitting fingerprints range from a few seconds to up to 24 hours, depending on the type of submission and the relevant IDENT databases that are searched. CBP Officers submitting the fingerprints of foreign visitors attempting to enter the United States who are subject to the US-VISIT provisions would be provided the results of the search of the US-VISIT Biometric Watch List database within 10 seconds. DOS Consular Officers submitting a fingerprint of a visa applicant requesting a Border Crossing Card to IDENT would be provided search results within 24 hours. User applications such as the ICE Enforcement Automated Booking Module within ENFORCE and the USCIS Application Support Centers are equipped to capture 10-print records for submission to both IDENT and the FBI’s IAFIS. OI field offices have 10print scanners; as a result, 2-print scanners should no longer be used. 6.5 International Criminal Police Organization In cooperation with the U.S. National Central Bureau (USNCB) of the International Criminal Police Organization (INTERPOL) and US-VISIT, CEU has developed a biometric-based program to identify foreign fugitives and criminals who have entered the United States. The program’s goal is to identify and to locate foreign fugitives and career criminals and to take the appropriate law enforcement action(s), including administrative and/or criminal arrest, removal, or extradition. Compliance Enforcement Investigations Handbook January 25, 2010 20 OFFICIAL USE ONLY The USNCB provides fingerprints related to the Red, Blue, and Green Notices to US-VISIT, which are then uploaded and/or checked against IDENT. Subsequently, US-VISIT creates lookout records to provide notification to IDENT users if there is a fingerprint match related to the INTERPOL notices. Confirmed match information is forwarded to CEU for further analysis and potential field assignment. Explanations of these notices, as provided by INTERPOL, are as follows: A. Red Notices Red Notices seek the arrest of subjects for whom an arrest warrant has been issued and where extradition will be requested. B. Blue Notices Blue Notices seek information (identity or criminal records) for subjects who have committed a criminal offense, and are used to trace and locate a subject whose extradition may be sought (unidentified offenders or witnesses). C. Green Notices Green Notices provide information on career criminals who have committed or are likely to commit offenses in several countries (e.g., habitual offenders, child molesters, or pornographers). U.S. law does not allow for the arrest of an individual based solely on the existence of a Red Notice from INTERPOL. U.S. law enforcement officers are required to obtain a provisional arrest warrant or develop probable cause for another violation that is a violation of U.S. law. Provisional arrest warrants are obtained after the country requesting extradition from the United States submits a provisional arrest warrant package to DOJ’s Office of International Affairs, and the provisional arrest warrant is issued by the appropriate U.S. court. In circumstances where obtaining a provisional arrest warrant is necessary to take an individual into custody, the field agent assigned to the case should work closely with CEU at ICE OI HQ, INTERPOL, and/or the U.S. Marshals Service. 6.6 Visa Revocation DOS is responsible for the issuance and revocation of nonimmigrant visas. DOS regularly revokes nonimmigrant visas for a variety of reasons, including national security concerns. In coordination with DOS, the Terrorist Screening Center, the FBI, and CBP, CEU ensures that all nonimmigrant aliens currently in the United States who have had their visas revoked on national security grounds are thoroughly investigated and, if possible, removed from the United States. Visa revocation does not strip subjects of their legal status in the United States. Compliance Enforcement Investigations Handbook January 25, 2010 21 OFFICIAL USE ONLY When DOS revokes a visa because of terrorism concerns, OI ensures that the proper investigative actions are taken. CEU is notified when DOS revokes a visa for national security concerns. OI SAs are encouraged to liaison with the local OCC (so that NSLD can be consulted if necessary) as early in the process as feasible, as soon as the applicability of either a national security bar or a charge under INA § 212(a)(3) or 237(a)(4) becomes a possibility. CEU fully reviews the lead and, if the subject of the revocation is found to be present in the United States, a collateral investigative request is forwarded to the appropriate field office. As mentioned above, since the revocation does not become effective until the alien departs the United States, visa revocation does not strip subjects of their legal status in the United States. In many visa revocation cases, classified derogatory information related to the subject exists. Should SAs require access to classified information regarding the individual, HQ contact information is contained in the initial Report of Investigation (ROI). The ICE Reporting and Operations Center is a secure contact available to SAs on a 24/7 basis and allows updated classified derogatory information relating to the target to be provided in a timely manner to requesting SAs. Additionally, the SAC Joint Terrorism Task Force (JTTF) representative has access to classified derogatory information. The Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004 granted explicit authority to DHS to remove an alien whose nonimmigrant visa is revoked by DOS. 8 U.S.C. § 1227(a)(1)(B). DOS has long had the authority to revoke an alien’s visa at any time as a matter of discretion pursuant to INA § 221(i). Generally, revocations by DOS are not reviewed by courts under the doctrine of consular nonreviewability. This protection from judicial review gives DOS great flexibility to revoke visas on a low threshold of information. While IRTPA § 5304 grants explicit authority to DHS to remove aliens based on a DOS revocation, that revocation is subject to judicial review when a visa revocation is the sole basis for DHS removing an alien. This judicial review provision has significantly, if not completely, defused the new authority gained from making revocations a ground for removal. 6.7 Retroactive Visa Revocation Request It is important to note that visa revocation does not strip the subject of his or her legal status in the United States. DHS and DOS implemented a program that allows for the retroactive revocation of nonimmigrant visas. In certain exceptional cases, DHS may request DOS to retroactively revoke an individual’s visa to the date it was issued, rendering the subject inadmissible and, if present in the United States, with no valid immigration status. This places the alien in the same position as an alien who has not been admitted. ICE may then initiate removal proceedings. 6.8 Lost and Stolen Passport Since November 2004, CEU has been responsible for initiating lost and stolen passport investigations for ICE. The CBP NTC generates investigative lead information related to nonimmigrants who have entered the United States using a lost or stolen foreign passport. CEU thoroughly reviews each lead and assigns field investigations on those individuals it Compliance Enforcement Investigations Handbook January 25, 2010 22 OFFICIAL USE ONLY determines to be present in the United States. If, during the review, CEU identifies a nexus to terrorism or national security, the investigation is forwarded to the National Security Integration Center for further review and dissemination to OI JTTF SAs. 6.9 Alien Flight Student Program TSA is responsible for vetting nonimmigrants who seek to attend flight training within the United States and for conducting a threat assessment. As a result of the September 11, 2001, terrorist attacks, TSA implemented the AFSP. Beginning in April 2005, CEU assumed responsibility for evaluating the immigration status of certain applicants. Nonimmigrants who wish to attend flight training that will lead to a Federal Aviation Administration certification type or rating must submit a request to TSA. Candidates use the TSA website on the Internet and submit their background information and flight training requests. TSA reviews the applications and conducts a threat assessment to determine if the alien is eligible for flight training. In support of the TSA threat assessment, CEU performs database research and provides TSA with a determination as to the immigration eligibility of applicants for flight training. If the CEU determines that the nonimmigrant is in violation of his or her status or is amenable to removal, it will forward a lead to the appropriate OI field office for further investigation. 6.10 Visa Waiver Enforcement Program CEU developed the Visa Waiver Enforcement Program (VWEP) to address inherent vulnerabilities in the Visa Waiver Program (VWP) by identifying and targeting high-risk overstay and status violators who entered the United States under the VWP. The potential exists that an individual who seeks to do harm to the United States could obtain a passport from one of the VWP countries as a way of circumventing the scrutiny of the visa application process. The VWEP identifies potentially high-risk participants who overstay their term of admission in the United States and assigns investigations to OI field offices. VWP non-immigrant overstays are not entitled to a hearing before an immigration judge and the removal process at the SAC office unless the alien applies for asylum, in which situation the case must be referred to the immigration judge. While aliens who enter, or attempt to enter the United States under the VWP have extremely limited forms of relief available, it is not accurate to state that they are not entitled to any due process. See McGuire v. INS, 804 F. Supp. 1229 (N.D. Cal. 1992) (waiver of hearing was knowing and intelligent; VWP does not violate due process or equal protection). Compliance Enforcement Investigations Handbook January 25, 2010 23 OFFICIAL USE ONLY Chapter 7. COMPLIANCE ENFORCEMENT INVESTIGATIONS 7.1 Violator Identification CEU receives nonimmigrant compliance information from various immigration databases. The information identifies nonimmigrants who have entered or are attempting to enter the United States through an established immigration entry process and have failed to comply with immigration regulations. CEU prioritizes the information based on the potential threat to national security or public safety and forwards the information to research analysts for further review. A. System Leads CEU obtains leads on potential status violators on a weekly basis from SEVIS, NSEERS, and US-VISIT. NSEERS and US-VISIT provide information on overstays, while SEVIS provides information on terminated students. B. Specialized Leads Visa Revocations, Lost and Stolen Passports, TSA AFSP, INTERPOL, and Biometric Watch List investigative leads are a result of the cross reference of information among various law enforcement entities and their respective databases. Although the subject of a lead may have entered and appears to be present in the United States legally, additional investigative information could indicate that further scrutiny is required. 7.2 Database Analysis Research analysts use both general investigative and immigration-specific databases to verify the current status and residential location of nonimmigrant status violators. While assessing the viability of a nonimmigrant status violator lead, research analysts determine if the nonimmigrant is in violation, if the nonimmigrant is present in the United States, and if the information obtained identifies the current location of the nonimmigrant and a valid U.S. address by using information contained in the databases below: A. B. C. D. E. F. G. H. I. ADIS AR-11 AutoTrac AVALANCHE CCD CIS (Note: CIS does not always reflect the proper status of an alien; only a review of the individual’s A-file can determine his or her actual status.) CLAIMS EARM ENFORCE Compliance Enforcement Investigations Handbook January 25, 2010 24 OFFICIAL USE ONLY J. K. L. M. N. O. P. Law Enforcement Analysis Data System (NETLeads) National Crime Information Center RAPS SIT SEVIS TECS U.S. Postal Service Throughout the process, all relevant information pertaining to an identified nonimmigrant status violator is documented in the LeadTrac database. 7.3 LeadTrac Database Information collected relating to nonimmigrant status violators is consolidated, categorized, and entered into a CEU-specific internal database known as LeadTrac, which is maintained at HQ. LeadTrac information is entered, tracked, verified, and managed by research analysts and CEU Program Managers at HQ. 7.4 Investigative Lead Referral CEU works closely with the Intelligence Community to maintain a risk-based matrix with which to prioritize the hundreds of thousands of potential status violators that CEU reviews annually. All nonimmigrant status violators identified as viable for further field investigation are reviewed by HQ CEU Program Managers. HQ CEU Program Managers initiate a TECS case for each nonimmigrant status violator and prepare the case for dissemination to the appropriate OI field office. 7.5 Case Categories Case numbers are assigned to CEU cases in TECS based on the following criteria: 18D 19B 19C 19D 19E 19F 19H 7.6 Lost and Stolen Passport NSEERS SEVIS/TSA AFSP INTERPOL/Biometric Watch list Visa Revocation US-VISIT Overstay VWEP Collateral Request Assignment All information located by CEU is consolidated and uploaded into a TECS ROI by a CEU Program Manager. The TECS ROI initiates a collateral request for the designated field office. Field CEU coordinators review, assign, and ensure that all CEU collateral requests are investigated in a timely manner. In compliance with the OI Case Management Handbook (OI HB 08-02, dated February 1, 2008), an ROI must be posted Compliance Enforcement Investigations Handbook January 25, 2010 25 OFFICIAL USE ONLY by the case agent to an opened investigation within 20 days of the initiation of the investigation. If the receiving office determines that the nonimmigrant is located in another AOR, the SA will write a closing ROI to summarize the information and will report it to CEU via TECS. CEU will then initiate the collateral request to the responsible field office for the identified AOR. 7.7 Timely Assignment and Reporting Requirement CEU coordinators ensure the completion of collateral investigation requests in a timely manner. Should a CEU investigation contain time sensitive information, a HQ CEU Program Manager will notify the responsible field office and will provide further clarification and guidance. If the nonimmigrant status violator is or may be of national security interest and subject to removal from the United States, SAs shall prioritize these investigations accordingly. After conducting the preliminary background investigation, SAs will better understand the amount of attention that one case may require as opposed to another. 7.8 Database Review SAs shall review the information provided in the collateral ROI and conduct independent database queries as necessary. SAs may be able to develop additional information that would aid in the identification, location, or confirmation of the status of the nonimmigrant. SAs are authorized access to essential compliance-related databases. 7.9 Field Investigation and Interview Upon location of the nonimmigrant, SAs will conduct a field interview, locate and review nonimmigrant documentation, and determine the immigration status. SAs will also question the nonimmigrant as to financial status, employment history, contacts and associates, and recent travels. If the nonimmigrant is out of status, SAs will take appropriate action and document the results in an ROI. If the interview results in the discovery of additional criminal violations, SAs will contact the U.S. Attorney’s Office. As with any investigation, there will be times when SAs are unable to locate the target of the investigation and have exhausted all investigative leads. Prior to closing this case and reporting that “all leads have been exhausted,” CEU recommends that the minimum measures described below be taken to ensure that full attention has been given to the investigation. Within 90 days of receiving a collateral investigation request from CEU, the assigned case agent should: A. Contact any listed points of contact, relatives, petitioners or sponsors, if available; B. If investigating a student violator, contact the DSO in an attempt to identify additional locator information or known associates; Compliance Enforcement Investigations Handbook January 25, 2010 26 OFFICIAL USE ONLY C. Perform a physical check of any known addresses, including inquiries with neighbors; if the property appears inhabited, return until contact is established with the resident; D. Utilize CCD photograph(s) during related interviews to assist in investigative efforts; E. Contact other law enforcement agencies for any additional leads; F. Check open source web searches via Google, Myspace, Facebook, etc. for possible leads; G. Re-run subject queries through any available government and public databases for updated information regarding the subject; H. Subpoena subscriber information on any telephone numbers associated with the target; I. Subpoena subscriber information on any known email accounts associated with the target; and J. Provide CEU with any additional addresses and email addresses identified, including addresses that are located outside the SAC’s AOR. Using the above measures will ensure that the appropriate investigative resources are applied to all CEU investigations. If the subject of the investigation remains un-located after exhausting all the above measures, the case agent shall fully articulate in the closing ROI all investigative measures taken. Use of anonymous (“anonymized”) and/or undercover computers is suggested for open source web searches. A. Consent Searches In cases relating to terrorist or criminal activity, SAs should make every effort to obtain search warrants. If there is insufficient evidence available for a search warrant, SAs should attempt to gain consent to search the premises. After access to the premises is granted, SAs will request consent to search the residence and attempt to identify any items of evidentiary value, including, but not limited to, contraband, evidence of criminal activity, electronic media devices, and items that could indicate a potential threat to national security. SAs should document the consent to search appropriately and attempt to identify both items of evidentiary value and/or those that may indicate a threat to national security. Compliance Enforcement Investigations Handbook January 25, 2010 27 OFFICIAL USE ONLY B. Intelligence Collection SAs should be mindful of the potential for terrorist conspiracies and/or criminal activity associated with, or known by, the subject of the CEU collateral investigation. If the individual maintains significant information related to other criminal activities, a consideration should be made, in accordance with OI policy on informants, to recruit the individual as a source of information. During the investigation, SAs should make every effort to recruit sources of information from the targets of the CEU collateral, as well as from others interviewed during the course of the investigation. C. Terrorist Nexus Indications SAs should be mindful of terrorist indicators such as, but not limited to, precursor chemicals, anti-government literature, and maps of high interest areas. Specifically, items and indicators identified in previous JTTF investigations included: 1) Uniforms, badges, or other items inconsistent with an individual’s stated occupation; 2) Possession of extremist or anti-American literature or media; 3) Books or materials on law enforcement procedures; 4) Presence of chemical stains or burns and rusted metal items within a dwelling; 5) Evidence of storage rental units; 6) Indications of extensive research into mass transit systems and airports; and 7) Possession of large numbers of calling cards or cellular telephones. SAs working Compliance Enforcement investigations with a terrorist nexus should consult with their local ICE OI JTTF coordinator prior to taking enforcement action. SAs should also consult with their local OCC prior to taking enforcement action in these cases so that NSLD can be put on notice as well as consulted, when appropriate. 7.10 Removability Determination After a review of the nonimmigrant’s status, SAs should determine removability and should process the nonimmigrant in ENFORCE, if removable. Compliance Enforcement Investigations Handbook January 25, 2010 28 OFFICIAL USE ONLY A. Criminal Prosecution Relevant criminal violations should be identified and prosecuted with the assistance of the U.S. Attorney’s Office. Criminal arrests must be documented in TECS via a Seized Asset and Case Tracking System (SEACATS) Report. B. Administrative Proceedings SAs should initiate administrative removal proceedings. Administrative arrests must be documented in ENFORCE and in TECS via a SEACATS Incident Report. Prior to making administrative arrests or initiating administrative removal proceedings on any case where a national security charge or a bar under INA § 212(a)(3) or 237(a)(4) may be applicable, SAs must contact their local OCC so that NSLD may be alerted and/or consulted by the OCC where appropriate. 7.11 Database Reporting/Management Notification Should a CEU-generated lead result in a significant arrest (i.e., criminal alien, subject of a lookout, or INTERPOL subject), SAs should utilize the SEN system to create a SIR. Should a field investigation result in the arrest of an individual not identified as the subject of the investigation, SAs should include all qualifying information related to the incidental arrest. SAs should contact the appropriate CEU Program Manager if the investigation identifies additional criminal violations or when proposed enforcement activities are forthcoming. At the conclusion of the investigation, SAs must document the results in a TECS ROI and annotate any arrests, including collateral arrests, that resulted from the investigation. The closing ROI in TECS should document the alien registration number for the primary subject and/or any collateral subjects encountered in the course of the investigation. Compliance Enforcement Investigations Handbook January 25, 2010 29 OFFICIAL USE ONLY Appendix A SUPERSEDED DOCUMENTS The Compliance Enforcement Handbook supersedes the following policy documents. This list is not all-inclusive: - OI Memorandum, “Delegation to the Chief of the Compliance Enforcement Unit of the Immigration and Customs Enforcement Office of Investigations to Issue Registration Interview Notification” (May 2004) - OI Memorandum, “Deployment of ENFORCE - IDENT Equipment” (June 1, 2004) - U.S. Immigration and Customs Enforcement Standard Operating Procedures for the US-VISIT Exit Pilot Program (November 5, 2004) - OI Memorandum, “Utilization of ENFORCE by ICE Investigations” (January 25, 2005) - OI Memorandum, “Operation United Front” (August 21, 2006) - OI Memorandum, “Operation United Front” (September 29, 2006) - OI Memorandum, “Minimum Standards on Compliance Enforcement Case Closures” (April 18, 2008) - OI Memorandum, “Visa Waiver Enforcement Program Implementation” (April 3, 2009) ___________________________________________________________________________________________________________ Compliance Enforcement Handbook A-i OFFICIAL USE ONLY January 25, 2010 Appendix B ACRONYMS A ADIS AFSP AOR AR ARO AVALANCHE Arrival Departure Information System Alien Flight Student Program Area of Responsibility Address Request Alternate Responsible Official Advanced Visual Abstracted Links and Name Collection Handler Engine B BBS BSC Bureau of Border Security Biometric Support Center C CBP CCD CEU CFR CIRS CIS CLAIMS U.S. Customs and Border Protection Consular Consolidated Database Compliance Enforcement Unit Code of Federal Regulations Criminal Investigative Reporting System Central Index System Computer Linked Automated Information Management System D DACS DHS DOJ DOS DSO Deportable Alien Control System Department of Homeland Security Department of Justice Department of State Designated School Official E EARM EBSVERA EID ENFORCE ENFORCE Alien Removal Module Enhanced Border Security and Visa Entry Reform Act Enforcement Integrated Database Enforcement Case Tracking System __________________________________________________________________________________________________________ Compliance Enforcement Investigations Handbook B-i OFFICIAL USE ONLY January 25, 2010 F FBI FIN FR Federal Bureau of Investigation Fingerprint Identification Number Federal Register G H HQ Headquarters I IAFIS ICE IDENT INA INS INTERPOL IRTPA Integrated Automated Fingerprint Identification System U.S. Immigration and Customs Enforcement Automated Biometric Identification System Immigration and Nationality Act Immigration and Naturalization Service International Criminal Police Organization Intelligence Reform and Terrorism Prevention Act of 2004 J JTTF Joint Terrorism Task Force K-M N NSEERS NSLD NTA NTC National Security Entry-Exit Registration System National Security Law Division Notice to Appear National Targeting Center O OCC OI Office of the Chief Counsel Office of Investigations P PDSO Principal Designated School Official Q __________________________________________________________________________________________________________ Compliance Enforcement Investigations Handbook B-ii OFFICIAL USE ONLY January 25, 2010 R RAPS RO ROI Refugee and Asylee Processing System Responsible Official Report of Investigation S SA SAC SCB SEACATS SEN SEVIS SEVP SIR SIT STSC Special Agent Special Agent in Charge School Certification Branch Seized Asset and Case Tracking System Significant Event Notification Student and Exchange Visitor Information System Student and Exchange Visitor Program Significant Incident Report Secondary Inspection Tool Students and Schools T TECS TSA (former acronym of) Treasury Enforcement Communications System Transportation Security Administration U USC USCIS USNCB US-VISIT USA PATRIOT Act United States Code U.S. Citizenship and Immigration Services U.S. National Central Bureau United States Visitor and Immigrant Status Indicator Technology Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act V VWEP VWP Visa Waiver Enforcement Program Visa Waiver Program W-Z __________________________________________________________________________________________________________ Compliance Enforcement Investigations Handbook B-iii OFFICIAL USE ONLY January 25, 2010