The Government anticipates requiring continuation of the following tasks:

Similar documents
STATEMENT JOHN COHEN DEPUTY COUNTERTERRORISM COORDINATOR DEPARTMENT OF HOMELAND SECUIRTY AND PETER T. EDGE

Todd Bleckicki National Program Manager HSI Headquarters

Arrival and Departure Information System Information Sharing Update

a GAO GAO BORDER SECURITY Additional Actions Needed to Eliminate Weaknesses in the Visa Revocation Process

GAO. VISA SECURITY Additional Actions Needed to Strengthen Overstay Enforcement and Address Risks in the Visa Process

Refugee Security Screening

Member Statements Chuck Grassley, Chairman, Senate Judiciary Committee [view pdf]

STATEMENT OF JOHN MORTON DIRECTOR U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT DEPARTMENT OF HOMELAND SECURITY

8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

TESTIMONY OF. JOHN WAGNER Acting Deputy Assistant Commissioner Office of Field Operations

Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border

ADMINISTRATION OF JUSTICE HOMELAND SECURITY

GAO. HOMELAND SECURITY Challenges to Implementing the Immigration Interior Enforcement Strategy


Homeland Security Investigations, a Directorate within U.S. Immigration and Customs Enforcement: In Brief

Approximately eight months after the terrorist

The President s Budget Request: Fiscal Year (FY) 2019

ICE. I.C.E. Under D.H.S. Customs and INS Investigations DRO

AUGUST Introduction:

Q&A: Protecting The Nation From Foreign Terrorist Entry To The United States

Special Report - House FY 2013 Department of Homeland Security Appropriations and California Implications - June 2012

IMMIGRATION UPDATES. Presented by Rose Mary Valencia Executive Director Office of International Affairs

GAO BORDER SECURITY. Strengthened Visa Process Would Benefit from Improvements in Staffing and Information Sharing. Report to Congressional Committees

Current Immigration Issues in Higher Education under the New Administration

Keeping Pace with the Immigration Security Measures Implemented by the Departments of State and Homeland Security

Executive Actions Relating to Immigration

Case 2:17-cv Document 1-1 Filed 01/30/17 Page 1 of 10 EXHIBIT A

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003

STATEMENT JAMES W. ZIGLAR COMMISSIONER IMMIGRATION AND NATURALIZATION SERVICE BEFORE THE

Q&A: Protecting the Nation From Foreign Terrorist Entry To The United States

Trump Executive Order Travel Ban. CUNY Citizenship Now! Graduate Center March 16, 2017

CRS Report for Congress

DHS Biometrics Strategic Framework

Immigration: Globalization. Immigration Practice Group Lex Mundi March 4-7, Rome, Italy

CRS Report for Congress

E-Verify Solutions effective January 2015 page 1

Subtitle G--W Nonimmigrant Visas SEC BUREAU OF IMMIGRATION AND LABOR MARKET RESEARCH.

a GAO GAO HOMELAND SECURITY Performance of Information System to Monitor Foreign Students and Exchange Visitors Has Improved, but Issues Remain

Fax: pennstatelaw.psu.edu

Privacy Impact Assessment. April 25, 2006

Running Head: How National Security Influences Immigration Policy 1

Testimony for Indian Law and Order Commission Public Hearing. June 14, Joe LaPorte Senior Tribal Advisor, PM-ISE

CRS Report for Congress

INFORMATION FOR INITIAL I-20 APPLICANTS. Requirements

U.S. Customs and Border Protection

Office of Inspector General

CRS Report for Congress

8 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

ADM-9-03 OT:RR:RD:BS H JLB DEPARTMENT OF HOMELAND SECURITY. 8 CFR Part 212. [Docket No: USCBP ] CBP Decision No.

60-Day Notice of Proposed Information Collection: Application for Nonimmigrant

NATIONAL SOUTHWEST BORDER COUNTERNARCOTICS STRATEGY Unclassified Summary

Questions and Answers November 21, 2008

UNCLASSIFIED (U) U.S. Department of State Foreign Affairs Manual Volume 9 Visas 9 FAM NOTES

CYBER CRIMES CENTER U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT DEPARTMENT OF HOMELAND SECURITY BEFORE THE U.S. HELSINKI COMMISSION.

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

INFORMATION FOR INITIAL I-20 APPLICANTS. Requirements

ICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT. (Extract)

STATEMENT SARAH R. SALDAÑA DIRECTOR U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT DEPARTMENT OF HOMELAND SECURITY

Iraqi Refugee Processing Fact Sheet

Visa Entry to the United Kingdom The Entry Clearance Operation

GAO. HOMELAND SECURITY DHS Has Taken Actions to Strengthen Border Security Programs and Operations, but Challenges Remain

Achieving Interoperability

Presidential Documents

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records

e-borders: Friends of Presidency Group meeting Brussels

Policy Memorandum. U.S. Citizenship and Immigration Services. May 10,2018 PM Accrual of Unlawful Presence and F, J, and M Nonimmigrants

Executive Actions on Immigration

TESTIMONY OF MICHAEL J. FISHER CHIEF UNITED STATES BORDER PATROL U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY BEFORE

As published in The Texas Lawyer, May 26, Changes in the Practice of Immigration Law under the Department of Homeland Security

Nonimmigrant Overstays: Brief Synthesis of the Issue

Office of Inspector General

H.R.3162 SEC EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE. Chapter 10 of title 18, United States Code, is amended-- (1) in section 175--

PRESIDENT TRUMP S EXECUTIVE ORDERS ON IMMIGRATION

Immigration Reform: Brief Synthesis of Issue

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed

DEPARTMENT OF HOMELAND SECURITY BUREAU OF CUSTOMS AND BORDER PROTECTION. 8 CFR PARTS 212, 214, 231 and 233 (CBP DEC ) RIN 1515-AD36

Immigration Law Basics

Introduction. and crimes in worksite enforcement and critical infrastructure

MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY U.S. CUSTOMS AND BORDER PROTECTION

Report of Inspection. Nonimmigrant Visa Adjudication: Standards for Refusing Applicants SENSITIVE BUT UNCLASSIFIED SENSITIVE BUT UNCLASSIFIED

US-VISIT Program, Increment 2 Privacy Impact Assessment

Case 3:19-cv SK Document 1 Filed 01/17/19 Page 1 of 11

IMMIGRATION ENFORCEMENT

Executive Order Suspends the Admission of Certain Immigrants and Nonimmigrants from Seven Countries and the U.S. Refugee Admissions Program

CHAPTER 1 INTRODUCTION. 1.1 Introduction to Citizenship

Immigration Reform: Brief Synthesis of Issue

Deportation of Parents of U.S.-Born Citizens

Delegation ofauthority to the Assistant Secretary for u.s. Immigration and Customs Enforcement

Department of Homeland Security Delegation Number: Issue Date: 06/05/2003 DELEGATION TO THE BUREAU OF CITIZENSHIP AND IMMIGRATION SERVICES

The emotional reaction to 490 Tamil

A Guide to Immigration Regulations

Fact Sheet: Electronic System for Travel Authorization (ESTA)

GAO REGISTERED SEX OFFENDERS. Sharing More Information Will Enable Federal Agencies to Improve Notifications of Sex Offenders International Travel

DEPARTMENT OF HOMELAND SECURITY. 8 CFR Part 217. Docket Nos. USCBP and USCBP CBP Dec. No RIN 1651-AA72 and RIN 1651-AA83

Introduction of Immigration Liaison Officer Projects

Toward More Effective Immigration Policies: Selected Organizational Issues

Office of Inspector General

LOCAL ENFORCEMENT RESPONSE TO ILLEGAL IMMIGRATION : GENERAL GUIDELINES

Backlogs in Immigration Processing Persist

Transcription:

Background: The Homeland Security Investigations (HSI) National Security Investigations Division (NSID) Counterterrorism and Criminal Exploitation Unit (CTCEU) combats national security vulnerabilities and prevents terrorists and other criminals from exploiting the nation's immigration system. The pursuit of these violators provides significant support to the disrupt and deter counterterrorism strategy of the U.S. CTCEU accomplishes its mission by reviewing the immigration status of known and suspected terrorists, by combating criminal exploitations of the Student and Exchange Visitor Program (SEVP), and by leveraging HSI s expertise with partnering agencies in identifying national security threats. CTCEU is the only national program dedicated to the enforcement of nonimmigrant visa violations. CTCEU focuses its efforts on identifying and prioritizing, for enforcement action, foreign nationals who overstayed their period of admission or otherwise violated the terms or conditions of their admission to the U.S. CTCEU receives nonimmigrant compliance information from various investigative databases and Department of Homeland Security (DHS) entry/exit registration systems. The information identifies nonimmigrants who have entered the U.S. through an established immigration entry process and may have failed to comply with immigration regulations. Using a comprehensive prioritization scheme, CTCEU identifies nonimmigrant overstays, conducts in-depth analyses, locates targets, and initiates field investigations by referring high priority information to HSI Special Agents nationwide. CTCEU reviews over 1,000,000 violator leads for derogatory information annually and sends approximately 8,400 cases to HSI field offices for investigation. DESCRIPTION OF REQUIREMENTS The objective of this task order is to collect, research, analyze, and populate data in various law enforcement databases, as well as work with other government agencies at off-site locations. The Contractor shall be expected to meet operational demands and ensure timely responses to projects, daily requirements such as lead development and completion of weekly lead imports to ensure no backlogs develop, support operational components and timely submissions of deliverables. The Government anticipates requiring continuation of the following tasks: Task 1: Vetting and Screening. The Contractor shall conduct searches of designated ICE systems, other government agency computer systems, and open source sites in order to identify violations and lead viability. The Contractor shall ensure that Contractor employees have or develop knowledge in the following: Terrorist organizations, history, operations, and tactics to include an understanding of how the various terrorist organizations operate. Illicit cross-border movement of people, cargo, vehicles, drugs, etc. and/or trade industry, to include identifying suspect trends and patterns. International criminal organizations (or international smuggling) and how the organizations operate and their areas of operation.

The Contractor shall perform analytical research and data analysis that includes, but is not limited to: Performing assessments on individuals, groups, financial institutions, commodities, and travel patterns on targets of interest. Having the ability to ingest and screen large volumes of Visa electronic applications efficiently and at high speed in regard DHS holdings in development of pre-adjudication information, derogatory and threat information assessment, adjudication recommendation to the Department of State and notification to other government equites when warranted. Providing case identification and tracking of IV and NIV applications at post through the application and adjudication process and provide electronic mechanism to push Provide mechanism for scraping Visa issuance information to records and provide electronic mechanism to push information to relevant partner programs systems and subsystems. Provide multiple Metric solution capabilities in regard visa applicant, applications, VSPTS cases, ICM cases and trend analyses functions; provide external mechanism to validate the same information remotely. Provide electronic mechanism to push Task 2: Lead Generation. The Contractor shall establish a team of highly trained analysts to perform case initiations, case reroutes, and case closures. These analysts shall be responsible for ensuring that each lead to the field is accurate and thorough. Additionally, these analysts shall provide investigative support to the field as needed. The Contractor shall generate a minimum of 10,000 investigative leads annually to the appropriate HSI field offices. To accomplish this, the Contractor shall provide: Automated lead review to determine lead viability. Process leads timely to ensure no backlogs occur on a monthly basis. Append viable leads daily to the case management database for further processing. Close non-viable leads daily in the LeadTrac Mod database management system. Develop strategies to exploit the various internal and external data sources to refine the intelligence analysis process. Implement process improvements and reengineer methodologies for modernization of systems and projects. Conduct bulk data extractions and insertions as required in LeadTrac Mod and Mongodb environment or other systems. Task 3: Social Media Exploitation. The Contractor shall leverage open source/social media to expand upon CTCEU s established abilities to utilize government and law enforcement databases in the investigation of national security and public safety concerns that exploit vulnerabilities in the U.S. immigration system by applying social media analytic capabilities, derived only from free and publicly available sources through unattributed computers, in numerous ways, including: 3.1 The Contractor shall use the open source information to identify actionable intelligence in addition to enhancing investigative findings, which includes, but is not limited to: Identification of recent valid addresses

Investigation of cold cases Enhancement of subject identification Performing trend analysis Identification of criminal activity and derogatory information Identification of terrorist links and recruitment efforts displayed online The Contractor shall analyze and apply techniques to exploit publically available information, such as media, blogs, public hearings, conferences, academic websites, social media websites such as Twitter, Facebook, and LinkedIn, radio, television, press, geospatial sources, internet sites, and specialized publications with intent to extract pertinent information regarding targets, including criminals, fugitives, nonimmigrant violators, and targeted national security threats and their location. 3.2 The National Security Investigations Division (NSID) seeks to develop a system to encompass the entire lifecycle of visa applicants from application through visa issuance, entry, departure, overstay or otherwise violation of the terms of admission into the United States. Through the Visa Overstay Lifecycle pilot program, launched in August 2016, NSID visa screening operations are currently bifurcated and supported by two systems: the Visa Security Program s (VSP) Pre-Adjudicated Threat Recognition and Intelligence Operations Team (PATRIOT), and CTCEU s overstay enforcement system. PATRIOT identifies national security, public safety, and other visa eligibility concerns at the earliest point of an individual s visa application lifecycle. Upon entry to the United States, CTCEU then tracks the visa for the remaining validity and lifecycle. The pilot project is designed to track the online activity of nonimmigrant visa holders that were issued in particular countries of concern from the time of application, through visa issuance, and entry into the United States. The project will conduct initial screening for social media presence and ongoing monitoring of social media activity, to continue during travel in the United States, until subsequent departure. This ongoing monitoring is focused on certain key indicators of emergent concerns, such as threats to public safety or affiliation with known or suspected terrorists or terror groups. Any derogatory information developed is then evaluated and referred for investigation and other actions as appropriate. In the event that the individual violates the terms and conditions of their admission to the United States or overstays their period of admission, the system allows HSI to leverage social media activity to locate and detain the individual. To enhance the Visa Overstay Lifecycle pilot program, the Contractor shall: Have the ability to ingest and screen against large volumes of visa electronic applications efficiently and at high speed in regard worldwide social media and open source holdings and domains relevant to person centric derogatory and threat information assessment information, adjudication recommendation to the Department of State and notification to other government equites when warranted. And, provide electronic mechanism to push Develop a robust, overarching vetting process that would streamline the process to encompass the entire lifecycle of visa applicants from application through visa issuance, entry, departure, overstay, or otherwise violation of their terms of admission.

Identify ways to more fully leverage social media as a tool to identify the whereabouts and activity of status violators, and provide enhanced knowledge about a nonimmigrant visitors social media postings, from the adjudication of the visa application, through admission to the United States, and during their time in the United States. Take action to bridge the gap between what is done by VSP screening on the front end and what CTCEU systems do on the back-end. Task 4: Government and/or Contractor Provided Training. The Contractor shall provide a dedicated training team that will be responsible for all initial system and database training. The Government, on occasion, shall provide subsequent training, but not specific to lead generation. The Government will also provide occasional advanced training to contract staff. This may include, but is not limited to: FALCON Student and Exchange Visitor Information System (SEVIS) United States Visitor Immigrant Status Indicator Technology Registration System (US- VISIT) Central Index System (CIS) Computer Linked Automated Information Management System (CLAIMS) Refugee, Asylum & Parole System (RAPS) Consular Consolidated Database (CCDI) ENFORCE Alien Removal Module (EARM) Treasury Enforcement Communications System (TECS II) National Crime Information Center (NCIC) Consolidated Lead Evaluation and Reporting System (CLEAR) Automatic Targeting System Passenger (ATS-P) Enterprise Document Management System (EDMS) Interim Case Management Solution (ICMS) Open Source Analysis (OS) Standard Operating Procedures for LeadTrac Mod and supporting systems, protocols, and tasks. Task 5: Statistical / Data Review Support. The Contractor shall provide statistical and data review support that includes, but is not limited to, the following: Analyze data integrity and consistency to obtain a quantitative basis for decision making and resource allocation. Provide intelligence and threat analysis of the information that is tailored to the government s requirements. Provide written reports and populate DHS databases or any other designated database as required. Provide specialized analysis related to data integrity, content of information, and production support in the Mongodb environment. Evaluate new technological capabilities to enhance productivity and efficiency. Conduct trend analyses and advanced technical research techniques to develop products based on the government s requirements.

Extract data and develop reports from the LeadTrac Mod system as required. Create whitepapers and update Standard Operating Procedures as required. Task 6: Ad Hoc Reporting. The Contractor shall develop and produce qualitative intelligence reports, referred to as CTCEU reports, utilizing government databases and open source analysis for a comprehensive product. The Contractor shall provide an assessment package of the targets of interests to include; briefings, presentations, discussion panel participation, supporting documents and reports. The Contractor shall conduct research, generate reports, and assist with classified projects, as requested.