Secure Communities: A Fact Sheet |
Updated 11/04/10 - While the implementation by Immigration and Customs Enforcement (ICE) of the state/local partnership agreements known as the 287(g) program has been a source of great controversy, it is far from the only tool ICE uses to engage state and local law enforcement in immigration control. Most notably, the Secure Communities Program, which launched in March 2008, has been held out as a simplified model for state and local cooperation with federal immigration enforcement. This fact sheet lays out the basics of Secure Communities program, how it works, key areas of concern and recommendations on how to improve the program.
What is Secure Communities?
Secure Communities is a DHS program designed to identify immigrants in U.S. jails who are deportable under immigration law. Under Secure Communities, participating jails submit arrestees’ fingerprints not only to criminal databases, but to immigration databases as well; allowing ICE access to information on individuals held in jails. Unlike other ICE-local partnerships, Secure Communities gives ICE a technological, not physical, presence in prisons and jails. No Memoranda of Agreement (MOAs) with local law-enforcement agencies are required, and no local law-enforcement agents are deputized to enforce immigration laws through Secure Communities.
As of October 2010, Secure Communities is available in 686 jurisdictions in 33 states. ICE plans to have a Secure Communities presence in every state by 2011, and plans to implement Secure Communities in each of the 3,100 state and local jails across the country by 2013.
How does Secure Communities work?
When an individual is booked into a jail, his or her fingerprints are checked against the U.S. Visitor and Immigrant Status Indicator Technology Program (US-VISIT), and the Automated Biometric Identification System (IDENT), in addition to the other databases that are generally checked following an arrest. This fingerprint check allows state and local law enforcement and ICE automatically and immediately to search the databases for an individual’s criminal and immigration history.
If there is a database “hit,” meaning that the arrested person is matched to a record indicating an immigration violation, ICE and the local law-enforcement authorities are automatically notified. ICE then evaluates each case to determine the individual’s immigration status and take appropriate enforcement action. In most cases, ICE will issue a detainer against the jailed individual. A detainer is a request from ICE to the arresting agency to notify ICE before it releases the noncitizen so that ICE has the opportunity to decide whether the individual should be transferred to federal custody rather than released.
ICE reported that as of September 30, 2010, 4,204,862 fingerprint submissions resulted in 343,829 database matches. As a result of Secure Communities, ICE had removed 64,072 persons.
What are the concerns about Secure Communities?
Identification and prioritization. ICE claims to base action on an individual hit on the following priority order:
- Level 1 offenders: aliens convicted of “aggravated felonies,” as defined in section 101(a)(43) of the Immigration and Nationality Act, or two or more crimes each punishable by more than one year, commonly referred to as “felonies.”
- Level 2 offenders: aliens convicted of any felony or three or more crimes each punishable by less than one year, commonly referred to as “misdemeanors;” and
- Level 3 offenders: aliens convicted of crimes punishable by less than one year.
ICE has stated that Secure Communities is focused on dangerous “Level 1” criminals, but there is concern about whether or not such prioritization is taking place. In Fiscal Year 2010 there were more than 248,000 database hits, compared to 95,000 in FY2009. Fifteen percent of all database matches identified immigrants charged or convicted of a Level 1 offense, and 85% were charged or convicted of a Level 2 or 3 offense.
Obstacles to community policing. Unlike the 287(g) program, Secure Communities does not require an MOA between ICE and the local jail, sheriff, or police department. Nonetheless, there are still concerns about local police being seen as immigration agents. If ICE maintains a presence—even a technological presence—in a local jail, the public will likely associate the local law-enforcement agency with immigration enforcement.
Unnecessary or Prolonged Detention. The existence of a Secure Community detainer may limit an individual’s ability to access a lawyer, fight criminal charges, or get out of jail on bail.
Profiling and pretextual arrests. While Secure Communities is a technological identification program through which all persons arrested are fingerprinted and checked against the various databases, there is a concern that police officers working in areas that have Secure Communities in their local jails may have an incentive, or at least the ability, to make arrests based on race or ethnicity, or to make pretextual arrests of persons they suspect to be in violation of immigration laws, in order to have them run through immigration databases once they are jailed.
Lack of complaint mechanisms. Given the wide range of concerns about Secure Communities, it is essential that there be a complaint or redress procedure for individuals who believe they have been erroneously identified by DHS databases or who believe a DHS detainer has been issued in error. Currently there is no clear complaint procedure for persons who believe they have been victims of an error.
Lack of Oversight and Transparency. Various reports have found that ICE has an uneven track record in terms of supervising its local partnerships. As with other programs, there are concerns about the level of oversight and transparency associated with Secure Communities.
Lack of Data. Much more data about Secure Communities and the individuals it identifies is necessary. Without accurate data, it is difficult, if not impossible, to determine how Secure Communities is being implemented or how effective it is.
Published On: Thu, Nov 04, 2010 | Download File