Information Handling Methodology
The system databases are encrypted and only the local government personnel have access to the crypto keys. Subsequently, the government sets new crypto keys in order to prevent unauthorized access, even from our personnel.
All Data Belongs to the Government
The encrypted databases safeguard immigration and watch-list records, profiling data, and confidential materials.