[House Hearing, 108 Congress]
[From the U.S. Government Publishing Office]
DISRUPTING TERRORIST TRAVEL:
SAFEGUARDING AMERICA'S BORDERS
THROUGH INFORMATION SHARING
=======================================================================
JOINT HEARING
before the
SUBCOMMITTEE ON INFRASTRUCTURE AND BORDER SECURITY
and the
SUBCOMMITTEE ON INTELLIGENCE AND COUNTERRORISM
of the
SELECT COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED EIGHTH CONGRESS
SECOND SESSION
__________
SEPTEMBER 30, 2004
__________
Serial No. 108-60
__________
Printed for the use of the Select Committee on Homeland Security
Available via the World Wide Web: http://www.gpoaccess.gov/congress/
index.html
__________
_____
U.S. GOVERNMENT PRINTING OFFICE
25-777 WASHINGTON : 2006
_________________________________________________________________
For sale by the Superintendent of Documents, U.S. Government
Printing Office Internet: bookstore.gpo.gov Phone: toll free
(866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail:
Stop SSOP, Washington, DC 20402-0001
SELECT COMMITTEE ON HOMELAND SECURITY
Christopher Cox, California, Chairman
Jennifer Dunn, Washington Jim Turner, Texas, Ranking Member
C.W. Bill Young, Florida Bennie G. Thompson, Mississippi
Don Young, Alaska Loretta Sanchez, California
F. James Sensenbrenner, Jr., Edward J. Markey, Massachusetts
Wisconsin Norman D. Dicks, Washington
David Dreier, California Barney Frank, Massachusetts
Duncan Hunter, California Jane Harman, California
Harold Rogers, Kentucky Benjamin L. Cardin, Maryland
Sherwood Boehlert, New York Louise McIntosh Slaughter, New
Joe Barton, Texas York
Lamar S. Smith, Texas Peter A. DeFazio, Oregon
Curt Weldon, Pennsylvania Nita M. Lowey, New York
Christopher Shays, Connecticut Robert E. Andrews, New Jersey
Porter J. Goss, Florida Eleanor Holmes Norton, District of
Dave Camp, Michigan Columbia
Lincoln Diaz-Balart, Florida Zoe Lofgren, California
Bob Goodlatte, Virginia Karen McCarthy, Missouri
Ernest J. Istook, Jr., Oklahoma Sheila Jackson-Lee, Texas
Peter T. King, New York Bill Pascrell, Jr., New Jersey
John Linder, Georgia Donna M. Christensen, U.S. Virgin
John B. Shadegg, Arizona Islands
Mark E. Souder, Indiana Bob Etheridge, North Carolina
Mac Thornberry, Texas Ken Lucas, Kentucky
Jim Gibbons, Nevada James R. Langevin, Rhode Island
Kay Granger, Texas Kendrick B. Meek, Florida
Pete Sessions, Texas Ben Chandler, Kentucky
John E. Sweeney, New York
John Gannon, Chief of Staff
Stephen DeVine, Deputy Staff Director and General Counsel
Thomas Dilenge, Chief Counsel and Policy Director
David H. Schanzer, Democrat Staff Director
Mark T. Magee, Democrat Deputy Staff Director
Michael S. Twinchek, Chief Clerk
______
Subcommittee on Infrastructure and Border Security
Dave Camp, Michigan, Chairman
Kay Granger, Texas, Loretta Sanchez, California,
Jennifer Dunn, Washington Ranking Member
Don Young, Alaska Edward J. Markey, Massachusetts
Duncan Hunter, California Norman D. Dicks, Washington
Lamar Smith, Texas Barney Frank, Massachusetts
Lincoln Diaz-Balart, Florida Benjamin L. Cardin, Maryland
Robert W. Goodlatte, Virginia Louise McIntosh Slaughter, New
Ernest Istook, Oklahoma York
John Shadegg, Arizona Peter A. DeFazio, Oregon
Mark Souder, Indiana Sheila Jackson-Lee, Texas
John Sweeney, New York Bill Pascrell, Jr., New Jersey
Christopher Cox, California, Ex Kendrick B. Meek, Florida
Officio Jim Turner, Texas, Ex Officio
(II)
Subcommittee on Intelligence and Counterterrorism
Jim Gibbons, Nevada, Chairman
John Sweeney, New York Karen McCarthy, Missouri, Ranking
Jennifer Dunn, Washington Member
C.W. Bill Young, Florida Edward J. Markey, Massachusetts
Harold Rogers, Kentucky Norman D. Dicks, Washington
Christopher Shays, Connecticut Barney Frank, Massachusetts
Lamar Smith, Texas Jane Harman, California
Porter Goss, Florida Nita M. Lowey, New York
Peter King, New York Robert E. Andrews, New Jersey
John Linder, Georgia Eleanor Holmes Norton, District of
John Shadegg, Arizona Columbia
Mac Thornberry, Texas James R. Langevin, Rhode Island
Christopher Cox, California, Ex Kendrick B. Meek, Florida
Officio Jim Turner, Texas, Ex Officio
(III)
C O N T E N T S
----------
Page
STATEMENTS
The Honorable Dave Camp, a Representative in Congress From the
State of Michigan, and Chairman, Subcommittee on Infrastructure
and Border Security:
Oral Statement................................................. 1
Prepared Statement............................................. 4
The Honorable Loretta Sanchez, a Representative in Congress From
the State of California, and Subcommittee on Infrastructure and
Border Security................................................ 20
The Honorable Jim Gibbons, a Representative in Congress From the
State of Nevada, and Chairman, Subcommittee on Intelligence and
Counterterrorism............................................... 4
The Honorable Karen McCarthy, a Representative in Congress From
the State of Missouri, and Ranking Member, Subcommittee on
Intelligence and Counterterrorism.............................. 24
The Honorable Christopher Cox, a Representative in Congress From
the State of California, and Chairman, Select Committee on
Homeland Security: Prepared Statement.......................... 2
The Honorable Jim Turner, a Representative in Congress From the
State of Texas, and Ranking Member, Select Committee on
Homeland Security.............................................. 36
The Honorable Robert E. Andrews, a Representative in Congress
From the State of New Jersey................................... 26
The Norman D. Dicks, a Representative in Congress From the State
of Washington.................................................. 42
The Honorable James R. Langevin, a Representative in Congress
From the State of Rhode Island................................. 34
The Honorable Nita M. Lowey, a Representative in Congress From
the State of New York.......................................... 31
The Honorable Bill Pascrell, Jr., a Representative in Congress
From the State of North Carolina............................... 28
WITNESSES
Lieutenant General Patrick Hughes, Assistant Secretary for
Information Analysis, Department of Homeland Security:
Oral Statement................................................. 5
Prepared Statement............................................. 6
The Honorable C. Stewart Verdery, Jr., Assistant Secretary,
Border and Transportation Security Policy and Planning,
Department of Homeland Security:
Oral Statement................................................. 9
Prepared Statement............................................. 11
Professor Lawrence M. Wein, Graduate School of Business, Stanford
University:
Oral Statement................................................. 38
Prepared Statement............................................. 40
FOR THE RECORD
The Honorable C. Stewart Verdery, Jr. and Lieutenant General
Partrick Hughes Responses:
Questions from the Honorable Christopher Cox................... 49
Questions from the Honorable Dave Camp and the Honorable Jim
Gibbons...................................................... 52
Professor Lawrence M. Wein Responses to Questions:
Questions from the Honorable Dave Camp and Chairman Gibbons.... 68
DISRUPTING TERRORIST TRAVEL:
SAFEGUARDING AMERICA'S BORDERS THROUGH INFORMATION SHARING
----------
Thursday, September 30, 2004
House of Representatives,
Select Committee on Homeland Security,
Subcommittee on Infrastructure
and Border Security,
and the
Subcommittee on Intelligence
and Counterterrorism,
Washington, DC.
The subcommittees met, pursuant to call, at 1:05 p.m., in
Room 210, Cannon House Office Building, Hon. Dave Camp
[chairman of the Subcommittee on Infrastructure and Border
Security] Presiding.
Present from Subcommittee on Infrastructure and Border
Security: Representatives Camp, Dunn, Sanchez, Dicks and
Pascrell.
Present from Subcommittee on Intelligence and
Counterterrorism: Gibbons, Dunn, McCarthy, Langevin, Dicks,
Lowey and Andrews.
Mr. Camp. The joint hearing of the Subcommittee on
Infrastructure and Border Security and the Subcommittee on
Intelligence and Counterterrorism will come to order. The
subcommittees are meeting jointly today to hear testimony on
the Department of Homeland Security's efforts regarding
terrorists' disruption of travel. The purpose of this hearing
is to look at the recommendations made by the 9/11 Commission
report and examine DHS's efforts to obtain, analyze and
disseminate terrorist travel information.
On the first panel we have General Patrick Hughes, who is
the Assistant Secretary for Information Analysis, and Assistant
Secretary Stewart Verdery from the Border and Transportation
Security Policy Office. And on the second panel we will hear
from Professor Lawrence Wein from Stanford University, who will
provide an overview of research he has done regarding the US-
VISIT program. And I would like to officially welcome all of
our witnesses.
I ask unanimous consent that Member opening statements be
included in the hearing record, and encourage members of both
subcommittees to submit their opening statements for the
record.
[The information follows:]
Prepared Opening Statement of the Honorable Christopher Cox, a
Representative in Congress From the State of California, and Chairman,
Select Committee on Homeland Security
Let me begin by commending Chairman Camp and Chairman Gibbons for
working collaboratively to address the critical issue of terrorist
travel and information sharing. I also would like to welcome and thank
Assistant Secretary Hughes and Assistant Secretary Verdery for
appearing before the panel today.
Over the past 18 months, DHS has implemented several reforms to
strengthen our Nation's borders and improve information sharing--from
enhancing the National Targeting Center to strengthening relationships
with state and local law enforcement. Further, President Bush continues
to provide strong leadership to strengthen our collective security,
with the creation of the Terrorist Screening Center (TSC) and the
Terrorist Threat Integration Center (TTIC), and now the National
Counterterrorism Center. Although these reforms have made us safer,
there is still more work to be done. Currently, Congress is considering
a wide range of legislative proposals and will soon deliver a set of
reforms designed to further facilitate information sharing between our
intelligence and homeland security agencies, and to strengthen our
security here at home.
The 9/11 Commission report helped to energize the current debate in
these chambers about homeland security and information sharing within
our intelligence communities. The Commission's report focused
significant attention on the issue now commonly referred to as
``terrorist travel.'' The 9/11 Commission Report urges us to address
the issue of terrorist travel with the same vigor and focus that we are
brining to terrorist financing.
I wholeheartedly agree and am glad to see that Speaker Hastert's 9/
11 Commission recommendations implementation bill incorporates many
significant provisions relating to terrorist travel, some of which were
proposed by this Committee.
While limiting access to money hinders terrorists' ability to carry
out a mission, combating terrorist travel, especially into the United
States, will significantly disrupt our enemy's ability to move
operatives into position to launch an attack. Today, we will examine
how DHS currently is organized to address this critical issue, and
discuss how the Department should move towards further implementation
of the Commission's recommendation in this area.
In discussing the issue of terrorist travel, the Commission stated,
``For terrorists, travel documents are as important as weapons.
Terrorist must travel clandestinely to meet, train, plan, case targets,
and gain access to attack. To [terrorists], international travel
presents great danger, because they must surface to pass through
regulated channels, present themselves to border security officials, or
attempt to circumvent inspection points. In their travels, terrorists
use evasive methods, such as altered and counterfeit passports and
visas, specific travel methods and routes, liaisons with corrupt
government officials, human smuggling networks, supportive travel
agencies, and immigration and identity fraud.''
Combating terrorist travel will require a multi-faceted approach
that will reach across several DHS components and agencies. Potential
terrorists may interact with the U.S. Government at an embassy or
consular office overseas, a Border Patrol agent if they cross between
ports-of-entry or are stopped at an interior checkpoint, a U.S. Customs
and Border Protection inspector at our land and air ports-of-entry, and
the U.S. Coast Guard on our waters and at our sea ports-of-entry.
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
Every encounter presents an opportunity for our front-line DHS
personnel to disrupt terrorist travel. The ever-changing and developing
intelligence and information related to terrorist travel techniques,
documents, and trends needs to be effectively incorporated into the
daily activities of our front-line DHS personnel, and we will discuss
today how to make that happen as effectively as possible.
In addition, international efforts also are required to effectively
combat terrorist travel, and will involve our DHS personnel located
overseas, working hand in hand with their State Department
counterparts. If a terrorist's ability to travel is limited before
reaching our borders, our homeland security will be strengthened and we
will move closer to winning the War on Terrorism.
We need to continue to tear down the walls and improve sharing of
information in order to make continued progress in homeland security.
Success in this struggle depends upon good information getting to the
right people at the right time.
I look forward to your testimony this afternoon, and thank you for
your appearance today.
Mr. Camp. And because this is a joint hearing, Members will
be recognized based on order of appearance. And having said
that, I will submit my opening statement for the record.
[The information follows:]
Prepared Opening Statement of the Honorable Dave Camp, a Representative
in Congress From the State of Michigan, and Chairman, Subcommittee on
Infrastructure and Border Security
Disrupting terrorists in their efforts to enter into and freely
travel within the United States is a critical part of fighting the War
on Terrorism. The 9/11 Commission Report highlighted the flaws in U.S
border and immigration laws that the 9/11 hijackers exploited. Many of
these gaps have been addressed since September 11th, yet the Commission
stressed that terrorist travel must remain a specific focus of security
efforts.
I hope to stress with this hearing that DHS must continue to
develop and expand its ability to analyze terrorist techniques,
patterns, indicators, and trends to enable front line personnel to
identify, intercept, and disrupt terrorist seeking to travel to the
United States.
One thing that is very apparent is that DHS has a very wide range
of resources and capabilities to disrupt terrorist travel. However, it
is unclear to me how well all of these resources are utilized and
coordinated. There is the National Targeting Center, the Fraudulent
Documents Lab, Benefit Fraud Units, various BTS and Coast Guard
intelligence offices, and Information Analysis Division. And that's
just to name a few. With resources spread across the department, one of
the concerns I have is making sure that there is a dedicated focus to
ensure that terrorist travel detection remains a priority and that
there is Department-wide coordination effort.
There is no doubt that combating terrorist travel will require a
multi-faceted approach across all DHS components and several other
Federal agencies. Potential terrorists may interact with the U.S.
Government at an embassy or consular office overseas, a border and
immigration inspector, or a TSA screener as they seek to travel within
the U.S.
Each of these encounters presents an opportunity to detect
terrorist travel. In addition, numerous pieces of information are used
throughout this process, including visas, passports, travel plans, and
intelligence reports. Given these various pieces of information and
encounters with potential terrorists, this information needs to be
integrated across the Federal government to create a current threat
picture that can be used to identify and stop terrorist travel.
I look forward to hearing from our witnesses today as they seek to
address these very important issues.
Mr. Camp. And at this time I would recognize Mr. Gibbons.
Chairman of the Intelligence and Counterterrorism Subcommittee
is now recognized for any opening statement he may have.
Mr. Gibbons. Thank you very much, Chairman Camp. And to our
guests today, welcome. General Hughes, it is great to see you
back before us. And, Assistant Secretary Verdery, thanks very
much for your presence here as well today. It is an important
hearing we are going to have today and I know that your
testimony is very valuable, and I, like Chairman Camp, am going
to follow his lead and put my opening statement into the record
so that we can move along quickly and expeditiously so that we
don't take more of your time.
I know that you are both facing immense challenges right
now, and it is an exceedingly important job, and we look
forward to hearing your testimony today.
And with that, Mr. Chairman, I will submit my testimony for
the record.
Mr. Camp. All right. I think at this point--are there any
other opening statements?
All right. I think at this point we will go to our
witnesses, and I again like to thank them for being here.
General Hughes, we will begin with you. We have received your
written testimony, and we will ask that you briefly summarize
in 5 minutes your statement. Thank you.
STATEMENT OF LIEUTENANT GENERAL PATRICK HUGHES, ASSISTANT
SECRETARY, INFORMATION ANALYSIS, DEPARTMENT OF HOMELAND
SECURITY
General Hughes. Thank you very much, and good day, Chairman
Camp and Chairman Gibbons and distinguished members of the
committee, joint committees I guess.
As you know, the Department of Homeland Security was
envisioned, formed and is now in operation. President Bush's
decision to establish the Department has enabled us to unify
our diverse resources into one team to prevent terrorism in the
whole land, to ready ourselves against our enemy, and to ensure
the highest level of protection for our country and the
citizens we serve.
Through the Homeland Security Act of 2002, among other
things, we are charged with integrating relevant information,
intelligence analysis and vulnerability assessments to identify
threats, to inform preventive priorities and to support
protective measures. We are doing this in partnership primarily
with Federal partners and State and local governments,
agencies, and other organizations that we find at the State and
below level, and with our partners in the private sector.
The Office of Information Analysis, which I represent, is
the heart of intelligence at the Department of Homeland
Security. It is responsible for accessing and analyzing the
entire array of intelligence related to threats against the
homeland and making that information useful to our Federal
partners, first responders, and anyone in the United States who
can use that information and has the right to receive it. IA
provides a full range of intelligence support to the Secretary
and DHS leadership and to all of our components. Additionally,
IA assures that the best intelligence information available
informs the administration of the Homeland Security Advisory
System.
In order to perform these duties, we must receive
intelligence from a number of sources, including not only the
United States Intelligence Community and our State, local,
territorial, tribal and private sector partners, but also from
Department of Homeland Security entities with intelligence
capabilities. The large amount of information we coordinate
includes reporting from the United States Secret Service, the
United States Coast Guard; the Border and Transportation
Security Directorate; Immigration and Customs Enforcement,
including the Federal Protective Service and the Federal Air
Marshal Service; Customs and Border Protection; the
Transportation Security Administration; the Office of
Citizenship and Immigration Services; and the Federal Emergency
Management Agency; 180,000 plus persons on the ground
throughout the country acting as eyes and ears, enforcers, and
workers, and policymakers in some cases in order to protect the
country.
We represent a primary element of the United States
Intelligence Community, a powerful source of information and a
powerful capability in order to use the information we have to
protect our citizens. We have a sense of purpose, and we have
embarked on what has likely never been done before with regard
to information fusion: to fully understand the threat and the
conditions that make that information useful at a utilitarian
level for such a broad range of officials from city mayors to
Border Patrol agents, to airport screeners, to critical
infrastructure operators, to the cop on the beat.
This concludes my oral statement. I would be happy to
answer any questions you have today, and I am looking forward
to our interaction. Thank you.
Mr. Camp. Thank you very much.
[The statement of General Hughes follows:]
Prepared Statement of Patrick M. Hughes
Good morning Chairman Camp, Chairman Gibbons, and distinguished
members of the Committee. I am privileged to appear before you today to
discuss information sharing and collaboration, and the role of the
Office of Information Analysis (IA), within the Information Analysis
and Infrastructure Protection Directorate (IAIP) of the Department of
Homeland Security (DHS).
In the aftermath of 9/11, the Department of Homeland Security was
envisioned, formed, and is now in operation. Standing up the
Department, the largest reorganization of government in fifty years,
has been a great undertaking. Many employees of DHS have assumed new
responsibilities, and all have put in long hours to ensure that while
our strategies may change to meet the terrorist threat, our course as a
nation will remain constant. President Bush's decision to establish the
Department has enabled us to unify our diverse resources into one team,
to ready ourselves against our enemy, and to ensure the highest level
of protection for our country and the citizens we serve.
Through the Homeland Security Act of 2002, IAIP, and consequently
IA, is charged with ``integrating relevant information, intelligence
analyses, and vulnerability assessments (whether such information,
analyses, or assessments are provided or produced by the Department or
others) to identify protective priorities and support protective
measures by the Department, by other executive agencies, by State and
local government personnel, agencies, and authorities, by the private
sector, and by other entities.'' In addition, Section 892 of the
Homeland Security Act and Executive Order 13311 establish the Secretary
of Homeland Security as responsible for information sharing across the
Federal government and with State, Tribal, and local government, as
well as private sector security responsible for protecting the nations
critical infrastructure. The Secretary has delegated this to the Under
Secretary for IAIP.
IA is the heart of the intelligence effort at DHS. It is
responsible for accessing and analyzing the entire array of
intelligence relating to threats against the homeland, operational
reporting from across DHS and State and local law enforcement, and
assimilating disparate operational and intelligence information, making
that information useful to federal partners, first responders, State,
territorial, tribal, local, and major city governments, and the private
sector. IA provides the full-range of intelligence support to the
Secretary, DHS leadership, the Undersecretary for IAIP, and DHS
components. Additionally, IA ensures that the best intelligence
available informs the administration of the Homeland Security Advisory
System.
In order to perform these duties, IA must receive intelligence from
a number of sources, including the United States Intelligence Community
(IC), particularly the Federal Bureau of Investigation- the primary
interface with law enforcement entities around the country, and our
afore mentioned State, territorial, tribal, local and private sector
partners, but also from all DHS entities with intelligence capabilities
as well as DHS operational entities. The large amount of information IA
coordinates includes reporting from the United States Secret Service
(USSS), the United States Coast Guard (USCG), the Border and
Transportation Security Directorate (BTS), Immigration and Customs
Enforcement (ICE) including the Federal Protective Service (FPS) and
the Federal Air Marshal Service (FAMS), Customs and Border Protection
(CBP), the Transportation Security Administration (TSA), the U.S.
Citizenship and Immigration Services (CIS), and the Federal Emergency
Management Agency (FEMA). In addition, IA interfaces with our
colleagues in the Infrastructure Protection (IP) Office of the IAIP
Directorate to achieve one the cornerstones of the Department of
Homeland Security, to deliver threat-informed vulnerability and risk
assessments regarding our critical infrastructure, to our constituents
and customers--notably the private sector that holds most of our
nation's critical national infrastructure. We are an integral part of
the Homeland Security Operations Center (HSOC) effort to monitor and
communicate on all matters of homeland security interest 24X7. We also
relate directly to the Integrated Staff element of DHS, the operations
directorate that is responsible for planning and developing operations
concepts and orders to DHS components and to our partner organizations.
We attend all IC and White House collaboration and coordination
meetings, including many that are accomplished by secure video
teleconference. Our involvement in information sharing and
collaboration includes all of this and more.
Information sharing and collaboration is not a one-way street. In
addition to receiving information from these entities, IA delivers the
intelligence it coordinates to our partners as appropriate. This
requires IA to share information and collaborate at all levels, from
the Federal Government and IC members to local officials and DHS
entities that in turn provide threat information to their associates on
the front line. DHS component organizations not only provide support to
IA and to their associates, they also serve as a conduit through which
relevant information can pass to DHS and the rest of government and
information and warnings can be shared with stakeholders within their
areas of responsibility--thereby increasing the practical benefits
derived from intelligence analysis.
IA analysts have access to the most classified and highly sensitive
national intelligence from the Terrorist Threat Integration Center
(TTIC) (whose responsibilities will eventually be assumed by the
National Counterterrorism Center--NCTC), the Central Intelligence
Agency (CIA), the Federal Bureau of Investigation (FBI), the National
Security Agency (NSA), the Defense Intelligence Agency (DIA), the
Department of State (DoS), and other national-level agencies regarding
international and domestic terrorist threats. This information is
received formally through IA analysts' connections to the Joint
Worldwide Intelligence Communications Systems (JWICS), TTIC Online, the
IA Automated Message Handling System (AMHS), the Homeland Security
Information Network (HSIN), and a variety of other formal and informal
(i.e., analyst-to-analyst) mechanisms that contain such intelligence.
This information from other agencies is augmented by our own internal
reporting from DHS components.
From Border and Transportation Security (BTS) reports regarding
individuals of interest trying to enter the United States illegally, to
USCG reports regarding suspicious activity near critical infrastructure
points, intelligence from DHS components that IA analyzes provides
invaluable perspective and insight for the entire Federal Government.
Such reports are provided to IA through the same methods the IC uses-
the physical presence of DHS component liaison officers within both IA
and the Homeland Security Operations Center (HSOC) and communication
between analysts and leadership. In fact, the presence of
representatives of 26 separate Federal and local representatives within
HSOC provides a perspective and collaboration capability which is very
valuable. Additionally, coordination within DHS is aided by regular
meetings of the intelligence chiefs of each entity, lead by the
Assistant Secretary for Information Analysis (ASIA).
Information moves into and out of IA in the form of a number of
different documents. Many are familiar with the Homeland Security
warning products that communicate valuable threat information to such
varied audiences as the public, first responders, and infrastructure
owners. Homeland Security Information Bulletins provide a means to
communicate information of interest to the nation's critical
infrastructures that does not meet the timeliness, specifics, or
significant thresholds of warning messages. They are designed to
provide updates on the training, tactics, or strategies of terrorists.
Similarly, Homeland Security Threat Advisories identify a threat
targeting critical national networks or key infrastructure assets and
provide a means for DHS to communicate threat information to all DHS
customers ranging from the IC to the general public. This information
stream is augmented by other products, such as Special Assessments and
Studies, Homeland Security Intelligence Articles, and Red Cell reports,
which offer alternative or conceptual analysis. Additionally, Homeland
Security Information Messages (HSIMs) are a valuable tool used to
expeditiously communicate newly acquired, uncorroborated threat
information to U.S. government agencies, state and local Homeland
Security Advisors, and the private and public sectors. The HSIM
contains a preliminary analysis of threat information received by DHS
from the intelligence community, law enforcement community, private or
public sector and have information that has not been fully evaluated.
In addition to these products, IA employs a variety of reporting
mechanisms to communicate with both IC members and the intelligence
offices of DHS operational components. Intelligence goes to DHS
component entities and the IC primarily through DHS Intelligence
Information Reports (IIRs) and Homeland Security Intelligence Reports
(HSIRs). The IIR quickly releases select raw intelligence reporting
from DHS components to the IC, Federal Law Enforcement, and others as
appropriate in a unified and recognizable format via the Automated
Message Handling System (AMHS). Similarly, a HSIR provides DHS
operational elements a vehicle to report case and potential terrorist
information to DHS headquarters. It is a final report, containing a
compilation of information where some processing or analysis has
occurred and should stand alone as a semi-finished product. Lastly,
information is shared and coordination occurs through the IA Executive
Morning Brief (IAEMB), which is shared at the daily morning
intelligence update and through the twice-daily Secure Video
Teleconference (SVTC), as well as through direct analyst-to-analyst and
leadership communication.
It is IA's singular focus on the protection of the American
homeland against terrorist attack that is unique among its IC partners.
This focus provides invaluable information and assistance not only to
State, territorial, tribal, local, and private sector officials that
receive accumulated threat information, but also to DHS components that
use the information, trends, and indicators to inform and prepare
operators and decision makers on the front line. The relationship IA
has with the HSOC, BTS and other DHS entities translates into
continuous information sharing and collaboration that provides a unique
threat picture to those who are vital to protecting the homeland.
The Department of Homeland Security is a prime example of how
changes have been made within the Intelligence Community, the
counterterrorism community, and the law enforcement community to work
more cohesively as well as more collaboratively, to assure information
is shared as fully and completely as possible. This represents a
dramatic change from conditions as they existed before September 11th,
2001. DHS plays a central role in the counter-terrorism and homeland
security effort as we continue the work of communicating intelligence
and information to our partners in the federal government as well as
with the State, territorial, tribal, local, and private sector
officials charged with protecting the people and infrastructure of this
country.
Building up IA, increasing our information capabilities, and
coordinating intelligence information sharing and collaboration across
the entire federal government are monumental tasks. We have
accomplished much in a short period of time and we continue to press
forward to strengthen our capabilities and our ability to support the
overall DHS mission set. In order to better facilitate this effort the
Department of Homeland Security has formed the DHS Information Sharing
and Collaboration (ISC) Program, appointed a Director, and formed a
staff including representation from all internal components. We are a
participating member of the larger national effort to improve and
enhance information sharing and collaboration and to integrate ISC
concepts and capabilities into the changing intelligence community (IC)
environment under the various transformation efforts brought forth by
the 9-11 Commission and by earlier and subsequent Administration and
Congressional action. The DHS ISC Program has already begun the work of
assessing the ``here and now,'' of envisioning and forming a future
Information Sharing Architecture, and is engaged in building the
business plan which will guide and govern efforts to construct the
appropriate enterprise architecture to empower full and complete
sharing throughout the entire Homeland Security environment. One of the
major DHS programs the ISC Program now collaborates on is the Homeland
Security Information Network (HSIN)-an overarching network for the
Department to provide information exchange and real time collaboration
between federal, state, local, tribal, and major city authorities.
Using this network, federal, state, and urban area homeland security
advisors are able to communicate with each other and with DHS. As a
direct result of ISC Program efforts to cooperate and work jointly with
other Federal partners, DHS and the Department of Justice (DOJ)/FBI
have established the first ever capability to share information between
the HSIN/Joint Regional Information Exchange System (HSIN/JRIES), the
Regional Information Sharing System (RISSNet), Law Enforcement Online
(LEO), and will soon be joined by the Criminal Information Sharing
Alliance Network (CISANet). Through this technology demonstration
project, Sensitive But Unclassified products of each department and
network are posted to other networks thereby allowing users on any of
the systems to see and use the products from the other organizations.
Many of the efforts we are undertaking are technical in nature, but
the primary effort is not merely technical but rather one of changing
policy and procedure to motivate and empower necessary technical change
in order to achieve our goals of functional interoperability and
information transparency in order to accomplish the information sharing
and collaboration mission. However, it must be noted that intelligence
analytic tools such as link and nodal analysis tools, very dynamic
search engines tailored for the intelligence data base environment,
analytic workstations configured to empower the analysts in their work,
and numerous other technical aids and capabilities. . .are key to our
information sharing and collaboration success.
We have accomplished much at DHS and in IA since our inception and
we are on course with our partners and colleagues to continue to
achieve. I firmly believe the American people are more secure and
better prepared than before September 11, 2001 directly because of the
advent of the Department of Homeland Security. We are fully connected
to the U.S. Intelligence Community and well informed. We are more fully
integrated into the workings of the domestic security structure. We are
connected with law enforcement. We have working analysts poring over
the detail of intelligence and law enforcement reporting to discover
the hidden patterns and concealed threads of terrorist activity and the
manifestation of other threats to America from crime with national
security implications and from other disasters and threatening
conditions that come our way. We have a sense of purpose and we have
embarked on what has likely never been done before with regard to
information fusion. . .to fully understand the threat and the
conditions to make that information useful at a utilitarian level for a
broad range of officials from city mayors to border patrol agents to
airport screeners to critical infrastructure operators to the cop on
the beat.
Chairman Camp, Chairman Gibbons, and Members of the Committee, this
concludes my prepared statement. I would be happy to answer any
questions you may have at this time.
Mr. Camp. Mr. Verdery, you have 5 minutes. We have your
written statement, and if you could summarize it, that would be
helpful.
STATEMENT OF C. STEWART VERDERY, JR., ASSISTANT SECRETARY,
BORDER AND TRANSPORTATION SECURITY POLICY AND PLANNING,
DEPARTMENT OF HOMELAND SECURITY
Mr. Verdery. Of course.
Chairman Camp, Chairman Gibbons and other members of the
committee, thank you for the chance to be here today to join
with General Hughes to testify about the efforts of the
Department of Homeland Security to analyze and disrupt the
travel of potential terrorists.
The 9/11 Commission noted that, and I quote, ``targeting
travel is at least as powerful a weapon against terrorists as
targeting their money. The United States should combine
terrorist travel intelligence operations and law enforcement in
a strategy to intercept terrorists, find terrorist travel
facilitators and constrain terrorist mobility''. The
administration and this Department concur with this
observation, and we have implemented a number of successful
programs to deny terrorists the ability to travel freely into
the U.S., identify potential travel facilitators, and constrain
their mobility.
This is a complex multiagency undertaking, and we are
working in close collaboration with our interagency partners on
this important task. We are reviewing how travel documents are
produced and reviewed so we can better detect altered and
fraudulent ones; improving and expanding watch-lists; and
exploring ways to share data with our foreign counterparts that
can help identify and thwart terrorists, and, of course, these
efforts are designed to protect and respect the civil liberties
and privacy of U.S. Citizens and residents, and of our
visitors.
I believe General Hughes in his written testimony ably
described the role of Information Analysis Section of DHS in
participating in the Intelligence Community. It is absolutely
critical that actionable intelligence and actual information be
provided to the front-line components of DHS, whether it is an
inspector at a port of entry, a Federal air marshal, an
aviation screener or a criminal investigator, and that
capability is robust and improving.
The BTS Directorate is current operations unit is
responsible for ensuring a continuing productive relationship
between the intelligence arms of BTS--Customs and Border
Protection, Immigration and Customs Enforcement, and TSA--and
IAIP. BTS analysts are assigned to IA, and there is a daily
exchange of information between BTS agencies, IA and, of
course, the Coast Guard. BTS analysts conduct follow-up
research involving BTS incidents of interest and the
Intelligence Community, and we have essentially set up a two-
way street of information sharing where our components receive
information immediately through IA, and IA is immediately
alerted to significant operational activity.
Let me focus briefly on some of the programs we think are
really disrupting the patterns of terrorist travel. And I will
focus on the National Targeting Center, US-VISIT and our
efforts to find fraudulent travel documents.
The National Targeting Center, operated by DHS's U.S.
Customs and Border Protection, working with numerous Federal
agencies, provides tactical targeting and analytical research
support for passenger and cargo targeting in the air, sea and
land operations in inbound and outbound environments.
NTC develops tactical targets, potentially high-risk people
or shipments that should be subjected to additional scrutiny by
CBP personnel, from raw intelligence, trade, travel and law
enforcement data via the Automated Targeting System (ATS). The
NTC supports DHS field elements including our container
security personnel in 25 countries around the world, our visa
security officers in Saudi Arabia, the CBP officers at ports of
entry, and the Border Patrol, and is also working to support
the pilot Immigration Security Initiative (ISI) operating in
two airports in Europe to work on vetting passengers before
they leave for international flights.
During the heightened threat period last December and
throughout the winter, NTC played a pivotal role in analyzing
advance passenger manifest information related to several
international flights of interest that were deemed to be at
risk in order to secure those flights. DHS is committed to
improving the current collection of manifest information over
the coming months by standardizing formats, requiring departure
information for outbound flights and finalizing crew manifest
requirements, and these requirements will build on the
passenger name record, or so-called PNR, data used for
screening passengers. I personally served as the lead
negotiator for the U.S. in our successful negotiations with the
European Union that now allow that data to be transferred from
Europe to DHS for analyzing incoming passengers.
The US-VISIT program is a continuum of identity
verification measures beginning overseas with the visa issuance
process operating at 206 nonimmigrant posts, 115 airports and
seaports of entry. Secretary Ridge deserves great credit for
moving ahead with biometric components of this system ahead of
schedule.
And just to briefly summarize, as of the first 9 months of
operation, we have now detected 838 individuals identified by
the biometrics alone at ports of entry as subject to a watch-
list information or other lookout, and about a third of those
have had adverse action taken against them, being refused entry
or being arrested. In addition, today, September 30th, is the
first day the travelers in the Visa Waiver Program are being
enrolled in US-VISIT.
The Commission's report noted that terrorists use altered
and counterfeit travel documents to evade detection. Just
yesterday I toured the ICE forensic document lab in northern
Virginia. We have accumulated 130,000 legitimate and forged
travel identification documents. They are accessible in
seconds. The analysts at FDL develop hundreds of document
alerts. They are sent to border inspectors, have the capability
for front-line inspectors to have real-time review of suspect
documents, and provides forensic investigation support and
training. And I would encourage all Members interested in this
issue to travel to northern Virginia to take a look at the FDL.
It is truly a unique resource.
Hopefully during the question-and-answer period we can talk
a little bit about lost and stolen passport issues. We are
addressing those through Interpol, through technology
development and through our review of the Visa Waiver
countries. This is a critical, critical program to secure those
documents.
Terrorism attacks in Asia, Europe and elsewhere are vivid
reminders to us that terrorism is an international threat that
cannot be conquered alone. We understand we must engage in a
global effort each day through collaboration, information
sharing and ongoing dialogue to bring the weight of our
collective law enforcement intelligence capabilities to bear
against those who seek to do us harm.
Thank you for the opportunity to be here. I will look
forward to your questions.
Mr. Camp. Thank you very much.
[The statement of Mr. Verdery follows:]
Prepared Statement of C. Stewart Verdery, Jr.
Chairman Camp, Chairman Gibbons, Ranking Members Sanchez and
McCarthy, and other distinguished members, I am pleased to be here
today to testify about the efforts of the Department of Homeland
Security (DHS) to analyze and disrupt the travel of potential
terrorists. I am especially pleased to be joined by my colleague,
Assistant Secretary Patrick Hughes, from DHS's Information Analysis and
Infrastructure Protection Directorate (IAIP).
The 9/11 Commission noted that ``[t]argeting travel is at least as
powerful a weapon against terrorists as targeting their money. The
United States should combine terrorist travel intelligence, operations,
and law enforcement in a strategy to intercept terrorists, find
terrorist travel facilitators, and constrain terrorist mobility.'' The
Administration and DHS concur with this observation and have
implemented a number of successful programs to deny terrorists the
ability to travel freely into the U.S., identify potential travel
facilitators, and constrain the mobility of known and suspected
terrorists.
This is a complex multi-agency undertaking, and DHS works in close
cooperation with its interagency partners on this important task. DHS
works cooperatively with our colleagues at the Departments of State and
Justice and the intelligence community to improve our ability to
identify terrorists without impeding legitimate trade and travel.
We are reviewing how travel documents are produced and reviewed so
that we can better detect altered and counterfeit documents, improving
and expanding watch lists and how they are vetted, and exploring ways
to share data with our counterparts that can help identify and thwart
terrorists. These efforts are also designed to protect and respect the
civil liberties and individual privacy of U.S. citizens, residents, and
visitors.
I would like to focus today on our creation and use of the National
Targeting Center (NTC) to identify both potential terrorists and
patterns of terrorist travel, our US-VISIT biometric screening system
which helps to fix the identities of individuals entering and departing
the U.S., and our efforts to detect fraudulent travel documents. As
described more fully in Assistant Secretary Hughes's testimony, I will
also briefly address how we analyze and pass intelligence information
to and from our border officers.
National Targeting Center
The NTC began around-the-clock operations on November 10, 2001,
providing tactical targeting and analytical research support for anti-
terrorism efforts. The NTC is primarily staffed by DHS's Customs and
Border Protection (CBP). The NTC staff consists of CBP Officers and
field analysis specialists who are experts in passenger and cargo
targeting for air, sea, and land operations in the inbound and outbound
environments. The NTC develops tactical targets--potentially high-risk
people and shipments that should be subject to additional scrutiny by
CBP personnel--and it develops these targets from raw intelligence,
trade, travel, and law enforcement data.
The NTC has access to over 20 critical anti-terrorism and law
enforcement databases, including the Terrorist Screening Data Base
(TSDB) maintained by the Terrorist Screening Center (TSC), and receives
strategic intelligence daily from CBP's Office of Intelligence, our
IAIP Directorate, and other law enforcement and intelligence entities.
The NTC includes representatives from ICE, the FBI, the intelligence
community, the Transportation Security Administration (TSA), US-VISIT,
the Department of Energy, the Department of Agriculture, the Food and
Drug Administration, and the United States Coast Guard.
NTC supports DHS field elements, here and overseas, including
Container Security Initiative (CSI) personnel stationed in 25 countries
throughout the world, the Visa Security Program, and CBP Officers at
all of our ports of entry, as well as between the ports through support
to CBP's Office of Border Patrol. NTC also supports the Immigration
Security Initiative, currently operating at Schiphol Airport in
Amsterdam and Warsaw, Poland, where teams of CBP officers are deployed
to work with local authorities in preventing the onward movement of
people identified as presenting a security threat to the carrier or
passengers on international flights destined to the U.S.
During the period of heightened alert last December, the NTC played
a pivotal role in analyzing advanced passenger information system
(APIS) manifests related to several international flights that were
determined to be at risk, in order to ensure that passengers on board
did not pose risks to the flights.
The NTC uses the Automated Targeting System (ATS) to identify and
target high-risk passengers and cargo entering the United States. ATS
permits the NTC's trained personnel to process advance passenger
information, to recognize anomalies and ``red flags'' and to determine
which individuals and shipments should be given greater scrutiny at our
ports of entry.
DHS is committed to improving the current collection of passenger
manifest information over the coming months by standardizing entry
information formats, requiring departure information, and finalizing
crew manifest requirements.
The United States and the European Commission signed an
international agreement on May 28, 2004 permitting CBP to access
passenger name record (PNR) data to be used for screening passengers. I
personally served as the lead for the U.S. interagency team which
negotiated for over one year until we succeeded in establishing a
mutually acceptable legal framework to allow CBP to receive PNR data
from the airlines that carry passengers between Europe and the United
States. In 1996, the European Parliament and Council issued a ``Data
Protection Directive'' that set forth detailed requirements for the
utilization and sharing of personal data. Prior to our resolution of
these issues with the Commission, airlines found themselves in a
position where they could be subject to fines from EU member states if
they provided PNR data to the United States.
PNR information is just one of many tools used by CBP to fulfill
its mission. PNR data is an essential tool allowing CBP to accomplish
its key goals: (1) PNR data helps us make a determination of whether a
passenger may pose a significant risk to the safety and security of the
United States and to fellow passengers on a plane; (2) PNR data
submitted prior to a flight's arrival enables CBP to facilitate and
expedite the entry of the vast majority of visitors to the United
States by providing CBP with an advance and electronic means to collect
information that CBP would otherwise be forced to collect upon arrival;
and (3) PNR data is essential to terrorism and criminal investigations
by allowing us to link information about known terrorists and serious
criminals to co-conspirators and others involved in their plots, as
well as to potential victims. Sometimes these links may be developed
before a person's travel, but at other times these leads only become
available days or weeks or months later. In short, PNR data helps CBP
fulfill its anti-terrorism and law enforcement missions and allows for
more efficient and timely facilitation of travel for the vast majority
of legitimate travelers to and through the United States. At this time,
CBP is receiving PNR data, which is enabling us to link information
about known terrorists.
Over the course of our negotiations, both sides worked together to
reach a workable solution that outlines the type of data that may be
transferred, the period of time it can be retained, and the purposes
for which it may be used. Additionally, the final arrangement includes
requirements for aggressive and important passenger redress mechanisms,
including a channel for direct access by European Data Protection
Authorities to the Chief Privacy Officer at the Department of Homeland
Security on behalf of European citizens.
While this agreement was signed by the EU and the Secretary of
Homeland Security in May, matters related to the agreement are
currently being challenged by the European Parliament before the
European Court of Justice. We are, nevertheless, confident that the
agreement is legally sufficient and will improve the safety of air
passengers.
In addition, CBP continues to work on a version of ATS that, for
the first time, will be able to identify potentially high-risk
passenger vehicles and travelers at our land border ports of entry. The
new version of ATS will also increase the amount of government data
that the system can access and analyze and enable us to train more
people on the use of the system.
These, and many other U.S. intelligence analysis capabilities, are
being used to help exploit terrorists' vulnerabilities as they travel
and to learn more about their activities and methods. In addition to
our ongoing efforts to target terrorist travel to, from, and within the
United States, the Administration is seeking, on both a bilateral and
multilateral basis, to promote similar efforts by other responsible
governments, and to provide those governments with relevant terrorist-
related information.
US-VISIT
Prior to the terrorist attack on September 11, Congress twice
mandated the creation of an electronic entry-exit system. Following the
events of September 11, Congress added the requirement that the entry-
exit system focus on biometric technology as a means to verify the
identity of foreign travelers. DHS established the US-VISIT program,
and began implementing US-VISIT, as required, at 115 airports and 14
seaports of entry on January 5, 2004. In accordance with direction from
the Secretary, US-VISIT incorporated biometric technology into US-VISIT
even though biometrics were not statutorily mandated by that date.
US-VISIT enhances the security of our citizens and visitors;
facilitates legitimate travel and trade; ensures the integrity of our
immigration system; and protects the privacy of our visitors.
In addition to developing an integrated system that records the
arrivals and departures of travelers and uses biometric technology to
combat fraud, DHS is designing US-VISIT to: (1) provide information to
CBP Officers and consular officers for decision making purposes; (2)
reflect any pending or completed immigration applications or actions;
(3) identify nonimmigrant overstays; and (4) provide accurate and
timely data to appropriate enforcement authorities. US-VISIT is working
to accomplish these objectives.
US-VISIT represents a major milestone in enhancing our nation's
security and our efforts to reform our borders. It is a significant
step towards bringing integrity back to our immigration and border
enforcement systems. It is also leading the way for incorporating
biometrics into international travel security systems.
US-VISIT is a continuum of security measures that begins before
individuals enter the United States and continues through their arrival
and departure from the country. Enrolling travelers in US-VISIT using
biometric identifiers allows DHS to:
Conduct appropriate security checks: We conduct checks
of visitors against appropriate lookout databases, including
the TSDB, and selected criminal data available to consular
officers and CBP Officers at the ports of entry, including
biometric-based checks, to identify criminals, security
threats, and immigration violators.
Freeze identity of traveler: We biometrically enroll
visitors in US-VISIT--freezing the identity of the traveler and
tying that identity to the travel document presented.
Match traveler identity and document: We biometrically
match that identity and document, enabling the CBP Officer at
the port of entry to determine whether the traveler complied
with the terms of her/his previous admission and is using the
same identity.
Determine overstays: We will use collected information
to determine whether individuals have overstayed the terms of
their admission. This information will be used to determine
whether an individual should be apprehended or whether the
individual should be allowed to enter the U.S. upon her/his
next visit.
The DHS and Department of State (DOS) together have created a
continuum of identity verification measures that begins overseas, when
a traveler applies for a visa, and continues upon entry and exit from
this country. The system stores biometric and biographic data in a
secure, centralized database and uses travel and identity documents to
access that information for identity verification and database checks.
206 nonimmigrant visa-issuing posts and 118 immigrant visa issuing
posts capture finger scans and digital photographs of foreign nationals
when they apply for visas, regardless of their country of origin. This
process will be implemented at all 207 visa-issuing posts worldwide by
October 26. In addition, today is the first day that nationals from
Visa Waiver Program (VWP) countries will be enrolled in US-VISIT when
they travel to the United States.
At assigned U.S. border points of entry, designated visitors are
required to provide biometric data, biographic data, and/or other
documentation. This data is checked against various databases, which
US-VISIT has successfully integrated and which contain visa issuance
information, terrorist (through the TSDB) and criminal watchlists, and
immigration status information. That information allows a CBP Officer
at the border to verify the identity of the traveler and to determine
whether the foreign national is a public threat or is otherwise
inadmissible. In its first 9 months of operation, DHS processed over
8.9 million foreign national applicants for admission through US-VISIT
at its air and sea ports of entry. During that period, 838 individuals
were identified by biometrics alone as being the subject of a watchlist
lookout. After a careful examination of all the relevant facts, DHS
elected to take adverse action in approximately 33 percent of those
cases where an individual was identified--such action included arrest
or refusal of entry into the United States.
Examples of US-VISIT Success
For example, At Newark international airport, an international
traveler appeared for inspection. Standard biographic record checks
using a name and date of birth cleared the system without incident.
However, a scan of the traveler's index fingers, checked against the
US-VISIT biometric database, revealed that the traveler was using an
alias and was, in fact, a convicted rapist. Additionally, he had
previously been deported from the United States. US-VISIT's search
disclosed that the individual used at least nine different aliases and
four dates of birth. He had previously been convicted of criminal
possession of a weapon, assault, making terrorist threats, and rape.
CBP Officers at JFK International Airport processing a passenger
through the US-VISIT procedures found that the individual was using an
alias. Further information uncovered two arrests for aggravated
trafficking of drugs, a subsequent failure to appear, and visa fraud.
The traveler had used this fraudulent visa to enter the United States
over 60 times without being detected by standard biographic record
checks, the last time only 11 days earlier.
Recently, a traveler with four aliases, three social security
numbers, and a criminal history going back to 1990, tried to enter the
United States. He was not admitted because a comparison of his
fingerscans against the US-VISIT biometric watch list determined that
he had previously been deported from the United States.
US-VISIT, as well as the student tracking system SEVIS, has
developed mechanisms to facilitate the lawful and appropriate use of
entry-exit data by law enforcement agencies such as the Federal Bureau
of Investigation to enhance their ability to investigate terrorist
travel patterns.
Secure Flight
On August 26, DHS unveiled the concepts underlying our new Secure
Flight program designed to improve security for domestic flights by
improving the use of terrorist screening information. Under Secure
Flight, TSA will take over responsibility for comparing PNR information
of domestic air passengers to a greatly expanded list of individuals
known or suspected to be engaged in terrorist activity--a function
currently administered by each airline individually. The move will help
reduce the number of false alerts caused by the current outdated
system.
When in place, following the completion of a pilot program and
consideration of any issues that arise, and after the completion of a
rulemaking, Secure Flight will help move passengers through airport
screening more quickly and decrease the number of individuals selected
for secondary screening--while fully protecting passengers' privacy and
civil liberties.
This new system will implement a key recommendation of the 9/11
Commission for the government to continue improving the use of `no-fly'
and `automatic selectee' lists by using the terrorist screening
database maintained by the Terrorist Screening Center.
Significant progress has already been made by the U.S. Government
by providing greatly expanded No-Fly and Selectee lists to airlines to
conduct checks on their own computer systems under the current
prescreening program. New names are being added every day as
intelligence and law enforcement agencies submit persons for
consideration. As Secure Flight is phased in, TSA will be able to check
passenger records against sensitive watch list information not
previously available to airlines.
Secure Flight differs from earlier enhanced prescreening systems by
focusing screening efforts on identifying individuals known or
suspected to be engaged in terrorist activity, rather than using it for
other law enforcement purposes. As with previous proposals, the new
program will also include a redress mechanism through which people can
resolve questions if they believe they have been unfairly or
incorrectly selected for additional screening.
The development of the program will be as publicly transparent as
possible without compromising national security. Testing and eventual
implementation will be governed by strict privacy protections including
passenger redress procedures, data security mechanisms, and limitations
on use.
Privacy-related documents and a proposed order compelling the
submission of historical PNR data from the airlines to TSA for testing
the Secure Flight program were released for public comment and
published in the Federal Register on September 24. The notice addressed
the purpose of the testing and set forth the limited purposes for which
the information collected will be used in Secure Flight.
Alien Flight Students
On October 5, 2004, TSA will assume the responsibility from the
Department of Justice for the Alien Flight Student Program (AFSP)
program and conduct security threat assessments on all non-U.S.
citizens who apply to receive flight training from an U.S. flight
school.
Flight schools are required to submit training information, such as
the type of training the candidate is requesting, and biographical
information, including full name, passport and visa information.
Applicants must also provide their fingerprints.
All non-U.S. citizens who apply to U.S. flight schools will now
have to undergo a security threat assessment regardless of the size of
aircraft in which they wish to train. Previously, only students wishing
to fly aircraft of 12,500 pounds or more underwent threat assessments.
Another significant change is that flight schools will be required to
submit a candidate's photograph to TSA when the candidate arrives at
the flight school to help ensure the person who was cleared by TSA is
the person who actually receives the flight training.
Human Smuggling and Trafficking Center
In July, DHS and the Departments of State and Justice established
the Human Smuggling and Trafficking Center. The center is housed at the
State Department and includes the participation of intelligence
agencies.
The Center analyzes and disseminates information, and provides
related support to law enforcement, intelligence, diplomatic, foreign
assistance, and other entities that take action against the threats of
human smuggling and trafficking and against criminal support for
terrorist travel.
The Center is another measure that the Administration has taken to
improve our ability to analyze and disrupt terrorist travel, and we are
optimistic about its possibilities.
Deterring the Use of Fraudulent Documents
The Commission's report noted that terrorists use altered and
counterfeit travel documents to evade detection. In the border and
immigration enforcement arenas, biometric identifiers are tools that
help prevent the use of fraudulent identities and travel documents. The
purpose of the biometric identifier is to verify a person's identity in
order to run criminal history checks and to ensure that an individual
cannot apply and/or be granted benefits under different names.
Biometric visas issued by the DOS to travelers to the United States
allow one-to-one matches, to verify that the person presenting the visa
is the person who was issued the visa, and one-to-many matches, to
ensure that the bearer is not the subject of a biometric lookout or
enrolled in the system under another name. Like the biometric visa
process, US-VISIT enrollment fixes a person's identity. When a VWP
traveler enrolls in US-VISIT, the person's fingerprints will be
electronically linked to the passport, thus preventing another person
from using that passport by freezing identities at the border and
ensuring that the person is not enrolled under another name.
CBP Officers must use their expertise to recognize and block the
fraudulent use of many types of identification documents presented by
applicants for admission at our ports of entry. For example, there are
more than 240 different types of valid driver's licenses issued within
the United States, and more than 50,000 different versions of birth
certificates issued by U.S. States, counties, and municipalities.
While advances in technology allow our dedicated and hardworking
CBP Officers to examine and validate documents presented for reentry,
that same technology also enables the perpetrators of fraud to produce,
relatively inexpensively, high-quality fraudulent documents. Forgers
and counterfeiters can produce high-quality fake birth certificates and
driver's licenses with off-the-shelf software programs and materials
that are difficult to detect without sensitive instruments and
sufficient time to examine them.
Our CBP Officers are also charged with detecting look-a-likes or
impostors who attempt to use valid documents which belong to another
person. This is one of the fastest growing phenomena in travel document
abuse. Document vendors solicit genuine, unaltered documents and match
them up with ``look-a-likes.'' DHS's Immigration and Customs
Enforcement (ICE) has developed a training program to detect impostor
documents, which it has conducted for both U.S. and foreign immigration
and border officers around the world.
Equipment costs money, and taking the time to examine thoroughly
and in-depth every one of the approximately 460 million identity
documents presented at our over 300 land, sea, and air ports of entry
would be an enormous undertaking with potentially serious secondary
effects. And, even were we to do this, this effort would only permit us
to detect fraudulent documents, not, legitimately issued documents that
are based on fraudulent identity.
The Administration continues to improve efforts in the area of
identification security. Last month, the President signed Homeland
Security Presidential Directive-12 (HSPD-12) to set a common
identification standard for Federal employees and contractors. HSPD-12
mandates the expedited, public, and open development of a uniform
standard for Federal employee and contractor identification that
ensures security, reliability, and interoperability; closes security
gaps and improves our ability to stop terrorists and others from
accessing or attacking critical Federal facilities and information
systems; and improves efficiency among Federal agencies through more
consistent systems and practices.
Secure identification is a priority for the United States. As noted
by the 9/11 Commission, birth certificates, drivers' licenses, and most
other forms of identification have traditionally been issued by State
and local governments, not the Federal Government.
At the Federal level, we are working closely with our State and
local partners to find ways to strengthen the standards used to issue
documents that people use to establish their identity without creating
a national identity card. DHS has supported the efforts of the American
Association of Motor Vehicle Administrators (AAMVA) in looking at the
security of drivers' licenses and strongly supports the States in their
endeavors to improve the security of these documents.
Lost and Stolen Passport Data
DHS is addressing security challenges posed by lost and stolen
passports together with our colleagues in the Department of State, who
are responsible for the U.S. passport system, and our foreign
counterparts.
CBP complies with the section of the Enhanced Border Security and
Visa Entry Reform Act of 2002 which requires that lost and stolen
passport data be entered into lookout systems within 72 hours. CBP
incorporates lost and stolen passport information into its systems to
aid in the detection and interception of persons using lost and stolen
documents.
Across the globe, international border control authorities continue
to seek timely and accurate information concerning the validity of
travel documents presented at consular posts and their borders. In most
cases, countries are able to recognize the misuse of their own
documents, but because of concerns about the use of personal data, many
nations remain reluctant to share data on lost or stolen travel
documents with other governments or international agencies.
We are making progress in our efforts to encourage international
cooperation in this area. For example through the efforts of the
Departments of State and Justice, the U.S. has provided over 300,000
records of lost and stolen passports to the Interpol's lost and stolen
document database, which is available to border authorities worldwide.
We hope that many more of our international partners will join us in
this effort.
We are working with our colleagues at the Department of State to
exchange of information with the Government of Australia on lost and
stolen passports. We expect that an agreement--the first of its kind
will be concluded shortly. Efforts are also under way internationally
to enhance such exchanges of information. At the June 2004 G8 Summit in
Sea Island, G8 partners agreed to a U.S. proposal to start providing
information on lost and stolen passports to the Interpol database by
December 2004. This will allow participants access to real-time
information on lost and stolen international travel documents. We want
to advance this effort beyond the G8 and encourage all countries to
submit relevant information to the Interpol database. We are promoting
a comparable initiative among the APEC countries to
developRegional Movement Alert System.
Additionally, the U.S. is initiating a study to assess a technology
concept that could further address this concern. The Enhanced
International Travel Security (EITS) concept would use distributed
databases as a mechanism to allow real-time exchange of the basic
information needed--i.e., a ``yes'' or ``no'' response--to assess the
validity of a document without requiring visibility into the actual
data used for that determination. The approach would be similar to the
one already used worldwide by the banking industry to support ATMs.
Developing better systems for international sharing of information, and
expanding participation to more countries will improve our ability to
identify and screen travelers before they enter our country.
In addition, as DHS conducts the required reviews of countries
participating in the Visa Waiver Program, each country has provided
detailed information about lost and stolen passports, their law
enforcement response to such incidents, and efforts made to tighten
distribution and document security processes. How a country handles
this key issue will be an important factor in how DHS, working with
interagency teams, determines whether VWP countries shall remain
eligible for the program. These reviews are due to be completed in
October.
Integrating Intelligence Information
DHS has developed sophisticated methods for identifying and
targeting potentially high-risk cargo and passengers through the
effective use of strategic intelligence. This intelligence is gained
through a close relationship between our bureaus, ICE, CBP, and the
Transportation Security Administration (TSA), our IAIP Directorate, the
U.S. Coast Guard's intelligence program, and the intelligence
community. As a result of these relationships, we are able to review,
analyze, and integrate information that resides in multiple government
databases, various watch lists, and advance information received
directly from travelers, airlines, and shippers.
BTS's Director of Current Operations is responsible for ensuring a
continuing productive relationship between the intelligence arms of our
BTS agencies--CBP, ICE, and TSA and IAIP. BTS analysts are assigned to
IA and there is a daily exchange of information between the BTS
agencies and IA. BTS and the Coast Guard have also exchanged personnel
to enhance data sharing.
The BTS analysts primarily conduct follow-up research concerning
BTS incidents of interest to IA and the intelligence community. This
relationship provides a two-way street of information sharing, where
the component representatives are immediately alerted to significant
information received through IA channels and IA is immediately alerted
to significant operational activity.
BTS intelligence representatives attend multiple, daily, meetings
with IA where significant intelligence information is discussed. This
includes intelligence derived from other elements of the intelligence
community and law enforcement entities.
BTS agencies send daily reports to IA about significant incidents
encountered by BTS agencies. These incidents are usually associated
with a watch listed individual intercepted at the border, a subject on
the no-fly list attempting to board an aircraft, or information
alleging potential terrorist-related activity gained from an
investigation.
BTS also works with IA to vet intelligence bulletins, reports, and
assessments and to jointly assess relevant information. BTS ensures
that intelligence is shared between intelligence analysts and
operational personnel. BTS seeks to ``operationalize'' the intelligence
we receive to ensure that the intelligence is incorporated into
targeting and other decisions on an ongoing basis. For example, we may
institute more targeted secondary inspections of travelers from regions
that intelligence suggests warrant additional scrutiny, send priority
leads based on intelligence to investigators in the field, or reassign
Federal Air Marshals.
ICE has created a Threat Analysis Section (TAS) to identify and
address potential vulnerabilities relative to the national security of
the United States. The TAS establishes associations between individuals
or groups linked to potential national security threats, develops
profiles based upon relevant investigative and intelligence reporting,
and produces actionable leads for field offices.
In addition, TSA's Transportation Security Intelligence Service
(TSIS) produces a daily intelligence summary and a weekly suspicious
incidents report that is shared with Federal Security Directors Federal
Air Marshals, and state, local, and industry transportation
stakeholders.
Conclusion
We have made much progress to deny terrorists the ability to travel
freely into the U.S., identify potential travel facilitators, and
constrain the mobility of known and suspected terrorists. In addition
to the initiatives described above, we are working aggressively with
our international partners to improve standards for travel documents,
enhance aviation safety and port security, and speed the exchange of
terrorist identifying information. The bombings in Madrid, the recent
hostage crisis in Beslan, Russia and the Australian Embassy bombing in
Jakarta also serve as vivid reminders to us that terrorism is an
international threat that cannot be conquered alone. DHS understands
that we must engage in a global effort each day, through collaboration,
information sharing and ongoing dialogue to bring the weight of our
collective law enforcement and intelligence capabilities to bear
against those who seek to do us harm.
I would be happy to answer any questions you have at this time.
Mr. Camp. Thank you both for your testimony.
General Hughes, given your extensive experience in
intelligence and your understanding of this threat to our
homeland, which, since 9/11, we have been focused on very
intensely, how do you characterize our efforts to track
potential terrorists attempting to enter the United States? How
would you particularly--you know, in comparison to pre-9/11?
Mr. Hughes. Well, I think it is much improved; for one
thing, the fact that we have standing watch-lists as a tool
which we did not have before. The fact that we have a variety
of registration techniques and much better overwatch on travel
documentation, the issuance of passports and visas and certain
knowledge provided by the travelers in many cases about who
they are and what they intend to do in their travel is a big
change. That does allow us to begin to have knowledge of them
earlier in the process than we used to. I think the Department
of State may have had that information, but it wasn't
integrated into the intelligence and law enforcement and
security communities in a way that it is now.
When they reach our borders, of course, as Stewart was
discussing here, the U.S. visa--excuse me--the US-VISIT
program, the enhanced Customs and Border Protection mechanisms
at the border when they seek passage into our country, and the
knowledge that we have about them combined is a very powerful
tool, and indeed we are--as opposed to tracking them, in many
cases we are interdicting them earlier. We are interdicting
them in some cases before they get on an airplane. Occasionally
that system fails. When they reach our border, generally we
know who they are, and we are finding them.
I will say that we have some additional capability from the
past in the illegal border-crossing context. We know quite a
lot about activities to our Southwest border and Mexico, and
some information concerning along the Canadian border, perhaps
a little bit less in the case of Canada because of the
construct between our two countries. But that is a very
powerful tool. We can in many cases anticipate movement, and we
often do interdict persons on those two borders because we knew
something about them. We knew they were staging or a group was
planning to travel or something like that. It is not perfect,
and I don't wish to communicate to you it is by any means, but
it is better than it used to be.
And the last thing I would like to mention to you is the
term "tracking" is very interesting. We have not only this
foreknowledge or preknowledge of their activities in many
cases, but we are then able to amass this knowledge in a
cumulative way in databases that did not exist before. This is
an invaluable tool and critical to our future success in this
regard. The identification and registration in these databases
of these people is vital, and we weren't doing that in the
robust way that we are now doing it.
Mr. Camp. I appreciate that, and I think we all agree that
we have been working toward putting together a really strong
system in place to apprehend terrorists trying to enter the
United States. But it seems to me the more we strengthen our
policy at ports of entry, it is also more likely that
terrorists may try to infiltrate the country simply by walking
across our border. You know, Time Magazine recently had a
fairly chilling article on this issue and the human smuggling
operations and the efforts like that.
What is the Department doing--and this may be something the
Assistant Secretary would like to comment on as well. What is
the Department doing to strengthen our capabilities to prevent
illegal crossings, and how can we use intelligence information
to target and detect potential terrorists who may be trying to
enter our country in that fashion?
Mr. Verdery. Well, the short answer is a lot. And at some
point I would like to follow on to what General Hughes talked
about in terms of our overseas efforts, and especially on the
visa side and US-VISIT.
In terms of the southern border, the enforcement
capabilities are growing by leaps and bounds, but it is
obviously a very difficult problem. In recent years, we have
increased the number of Border Patrol agents. We have increased
the use of advanced technology, UAVs, sensors, lighting, motion
detection and the like. We have put the necessary number of
prosecutors and asylum adjudicators and the like on the ground,
as well as advanced aircraft deployment. All this, though, does
demonstrate this is a difficult issue with the amount of
traffic across the border.
Under Secretary Hutchinson has launched the Arizona Border
Control Initiative, ABC, which is really trying to bring
operational control to certain sectors in Arizona and has
resulted in huge increases in the number of apprehensions in
that sector. But that, of course, has then put pressure on
other sectors who have had to respond with efforts such as the
Los Angeles Airport Initiative to try to keep migrants from
being moved into LAX and then flown into other parts of the
country.
We also have to look at our legal authorities, and that is
why we put into place the expedited removal program to turn
around third-country nationals quickly who don't have asylum
claims; and the interior repatriation program, to fly Mexicans
back into the interior of the country to try to break the cycle
of people being just returned across the border. But over the
long haul, we, of course, need to improve the entire spectrum
of apprehension capability, detention capability, removal
capability. It is a long-term project that we all have to
concentrate on.
General Hughes. May I just comment on the intelligence
piece of this answer? In this open environment, it is important
for me to tell you that especially with Canada and Mexico, but
also with some other countries that are involved, not in
crossing the border illegally as in walking across, but the
illegal border crossing activity can be facilitated from afar
through the use of illegal documentation and false identity.
And we do have better and growing cooperation with both Canada
and Mexico and with other countries in that regard. Once again,
in an open environment I probably wouldn't like to get into the
details, but I can look you directly in the eye and tell you
that it is better than it was. It needs to get better than it
is, and we are working on that part of this activity.
Mr. Camp. All right. Thank you. Thank you both very much.
And at this time the Chair would recognize the Ranking
Member of the Border and Infrastructure Subcommittee Ms.
Sanchez to inquire.
Ms. Sanchez. Thank you, Mr. Chairman. And thank you
gentlemen for being before us.
I think the last few weeks in particular, the Department of
Homeland Security has had some pretty negative press with
respect to borders and air; borders, I think, because Time
Magazine, I believe, was one that has that little picture of
something being pulled apart and talked about, how much we
really do need to do with respect to our borders. And it really
did highlight the northern border, which, of course, we all
know is much more open than even the southern border. But I
think the other incident that happened was the incident of
Yusuf Islam, who everybody in this room probably knows as Cat
Stevens. He had--you guys returned him to England after he
arrived in the United States because his name was on the watch-
list.
I think this episode highlights several problems with our
current policy, and I sort of want to go through them so I
understand what happened. I think America wants to know what
happened and what we are going to do to fix this.
First of all, he was allowed to board the plane, and I
guess while he was en route, you guys found his name on a
watch-list. I guess the question is why would you--why wouldn't
we be checking it before we got a supposed dangerous person on
the plane, because maybe he could have blown it up as we were
trying to figure out who he was? So the question is why do we
have such a huge security gap in the Visa Waiver Program that
allows travelers participating in the Visa Waiver Program to
get on a plane without first being run through the watch-list
check? And why doesn't DHS check the names of passengers on
international flight against the terrorist watch-lists before
the flights take off? And if you can't do it to all passengers,
can you at least do it for the vast majority of passengers who
buy international tickets at least an hour in advance?
Mr. Verdery. I think I will take that one, Congresswoman.
The Cat Stevens episode does exemplify a current weakness in
the way international travelers come to this country. As you
know, we do not have people stationed overseas except for a
couple of selected airports, as I mentioned, and or the
Immigration Security Initiative. And essentially the airlines
are currently our response overseas to enforce the watch-lists.
And so when a person such as this individual is on a watch-
list, it is the airlines' responsibility to compare the
manifest against the watch-list and make those no board
determinations.
In this case there was an error made. We recognize this
weakness and have announced as part of the Secure Flight
Initiative For Domestic Travel that the international realm
will be enhanced by a proposed rule to be announced later this
year to require that manifest information be supplied to us in
advance of wheels up, so before the plane takes off. Now, this
would be a very complicated endeavor. It will not only change
the way booking patterns are made, especially connecting
flights from overseas travel, but it would provide much greater
security for us to be able to run those watches ourselves
through the National Targeting Center before the plane takes
off, and hopefully these types of situations will be much less
likely to occur.
You asked about the Visa Waiver Program. Again, the watch-
list check that is done now is no different whether you are
from a visa waiver or non-visa waiver country. This same error
could occur with the airlines enforcing the system. So that is
not the issue in this case. There is a visa waiver issue we can
discuss at another time.
We do have the ability, and this happened during the
heightened threat period in the winter, if there is a plane
under a certain threat, we can essentially hold the plane on
the tarmac and run the checks, and that is what was going on.
But that is not a tenable solution for all international
travel, and that is why we were going to move with this
proposed rule to try to get this information ahead of time. It
is also why we went to such great lengths to get the PNR, kind
of back-up information about your travel agent, the people you
are flying with, your bags, and your frequent flyer number from
the Europeans under this agreement, so we could use that
investigative tool both to find people and also to clear people
if there is a potential hit.
Ms. Sanchez. You held him for 33 hours. You held his
daughter for 33 hours also, because they ended up going off
together. After 33 hours you sent him back to England. In 33
hours you couldn't figure out who this guy was? I mean, such a
famous person? I am trying to figure out what kind of a system
are we using to figure out what is going on here. And did you
tell the British authorities? Why would you put him on a plane
if he was such a dangerous person? Did you put him on chained;
you know, shackled? I mean, what is the process?
Mr. Verdery. Well, there is a lot of different issues
involved in the situation. I mean, there is the `should he have
been allowed on the plane' issue. There, is the `what should
the plane have done while it was in midair'; and then there is
`how was the individual who actually makes it to our country
who is on a no-fly list or a watch-list treated'? They are all
separate issues, and all need separate analysis.
But in this case, we feel that he was treated
appropriately. He should not have been allowed on the plane,
and we had to return him when he arrived in our country after
the appropriate booking.
So we need to continue to work on these processes, but we
feel that proper procedures were followed once we recognized
that he had been allowed to board. And again, that demonstrates
all the more why we need to make these decisions ahead of time
before the person boards the plane.
Mr. Camp. All right. Thank you very much.
Ms. Sanchez. Thank you Mr. Chairman.
Mr. Camp. Thank you.
At this time the Chairman of the Intelligence and
Counterterrorism Subcommittee Mr. Gibbons may inquire.
Mr. Gibbons. Thank you very much, Mr. Chairman.
And, General Hughes, again, welcome. And I have read your
testimony and wanted to ask a series of questions, if I may,
because I think it will sort of hone itself down to or distill
itself down to a point where I think we are going to get to the
heart of the issue here, which is information analysis.
As you stated in your testimony, information analysis is
really at the heart, I think, of good intelligence efforts, and
absolutely, if you don't have good analysis, no matter how good
the collection is, the result is going to be flawed. So my
question is, is when you have several other Department--or
components within the Department of human--or homeland defense
that maintain distinct intelligence units, what kinds of
control do you have as the head of the information analysis
over these other intelligence offices? Is there a need for a
structured relationship between IA and these offices? If there
isn't one, should there be one? And tasking; describe for me
the tasking ability of IA to these other offices in order that
you get the right information to make a decision, from your
standpoint.
General Hughes. Well, the answer, sir, I think, is--I will
start from the back and go forward here. The capabilities
resident in all of organizations that I enumerate in my oral
statement are impressive. They all produce what I would call
organizational intelligence. They are focused on their
organizations. The Secret Service, as an example, is
exclusively focused on the missions and matters at hand for the
Secret Service, and they are very closely held and are not
broadly applied for very good reasons. Conversely, perhaps the
United States Coast Guard, a member of the U.S. Intelligence
Community in its own right, it is a bona fide member and has
its own budgetary line and its own identity, has a very broad
set of capabilities akin to any other armed force. And I will
just describe one more example, Immigration and Customs
Enforcement, which is--in large measure operates in a
clandestine manner and is a very capable organization in the
human intelligence context, all of those and others that I
won't take the time to enumerate, together, taken together,
find their way into the national Intelligence Community through
their own conduits and through the Department of Homeland
Security. Depends on the circumstances, the nature of the
reporting, but virtually everything of departmental and
national interest comes to us at some point.
I believe we have a value added in regard to the analysis
of all of that information. We are able to put it together,
assemble it in one place, cause it to become synergistic in
nature.
The answer to the last part of your question, sir, we can
task anyone inside the Department of Homeland Security in the
name of the Secretary, and we do.
Mr. Gibbons. Is there a structured relationship between you
and these other intelligence agencies?
General Hughes. Yes, there is. We have an agreement among
us which has been verified by the Secretary and by their
individual organizational leaders that IA is the departmental
organization that gives some form to the structure. We meet
every 2 weeks formally in the Homeland Security Intelligence
Group context, and we exchange information among us and between
us. We also have coparticipation in many meetings, and
interaction every day exists between us in automated form, like
telephone and, in many cases, face-to-face meetings that occur
because we interact.
Mr. Verdery. Congressman, if I could just add on this from
the BTS perspective. And that is one of the points of having
the Border and Transportation Security Directorate as an
umbrella over these large operational components, CBP, ICE,
TSA, which have their own headquarters. They are operating
around the country, around the world. BTS is at headquarters
with IA, so there is constant interaction between General
Hughes' operation and the BTS headquarters operation; and also
to coordinate, because we recognize that the activities,
intelligence or otherwise, between the BTS components are so
linked, especially between ICE and CBP, because essentially
Congress broke INS and Customs in half and stuck the
investigators with the investigators and the inspectors with
the inspectors. But those links between the two to bring front-
line activity back to the investigative realm has to be
maintained. And that is one of the large purposes of the BTS
Directorate is to make sure that link continues, along with
getting the intelligence from headquarters out to the field.
Mr. Gibbons. Well, Secretary Verdery, let me ask you this:
You just talked about having 838 apparent hits on your watch-
list, with one-third receiving some sort of adverse action,
either arrested or rejected for entry due to the biometrics
program that you have got. What are you doing today to enhance
the current capability of biometrics? In other words, are you
looking at new technologies that are out there so that we don't
get, as Ms. Sanchez said, an inadvertent hit because of the
inability either to not have the information that was properly
there, or to have a poor biometric system that doesn't do what
we expect it to do? What programs, what pilot efforts have you
got going? What research and development--are you reaching out
to the private sector to do this?
Mr. Verdery. Well, sir, the VISIT system which you
referenced is obviously a fingerprint-, finger-scan-based
system. Secretary Ridge, the Attorney General, and the
Secretary of State made the decision to base it on fingerprints
largely because that is how we have people listed in criminal
databases, and also in terrorist watch-lists in many cases.
That is what makes us able to find people, and it has worked
extremely well. I think the turnaround time is running about 6
seconds from a systems perspective.
Mr. Gibbons. There are also other systems out there that
could be supplemental to the fingerprint systems that could be
very helpful.
Mr. Verdery. There are. VISIT is always looking at trying
to find repetitive or back-up systems that would enhance the
biometrics, such as the facial recognition. Part of the
biometric passport which will be coming on line throughout next
year will be part of the VISIT system. We have to deploy
readers to read those biometric facial recognition parts of the
passport and build that into the database. We are looking at
other biometrics, whether it is iris or the like, and that can
be built in on top of that.
Now, a very important thing, the President issued HSPD 11,
Homeland Security President's Directive 11, last month, which
requires our Department to go through a screening review of all
things across the government, including biometric screening
processes, to harmonize them to come up with the best
biometrics, the best screening procedures to make them
consistent. That review is ongoing right now with a biometric
subgroup.
Again, the other thing I should mention, our Science and
Technology Directorate, not represented here, is putting in an
incredible amount of effort on next-generation biometrics,
working with our operational entities like US-VISIT.
Mr. Gibbons. Well, at some point I would like to talk to
you personally about these systems and look forward to that.
Thank you, Mr. Chairman.
Mr. Camp. Thank you.
And at this time the Chair recognizes the Ranking Member of
the Intelligence and Counterterrorism Subcommittee Ms. McCarthy
to inquire.
Ms. McCarthy. Thank you, Mr. Chairman.
I have a question for each one of you. I will take Mr.
Verdery first. I appreciate that you said that we are not under
the practice of holding planes when we are checking watch-
lists. I happen to agree with you on that. But in a journey I
made during the recess period, I learned that Australia has a
system now where they do that investigation when the individual
buys the ticket. And I wonder if we are moving in that
direction on this legislation in the House, sponsored by our
Ranking Member, to encourage that. Would you give us your
thoughts?
Mr. Verdery. Yes, ma'am. As I mentioned, we have announced
that we are planning to promulgate a draft rule that would
require that advance manifest information be supplied before
the plane takes off so that we can do the vetting at the
National Targeting Center before the plane gets into the air.
And so that is something that will be coming down the pike.
And I will say, to be candid, it is not an easy solution,
because if you talk to airports, airlines, the way that the
changes have had to be made to how people book flights, the way
people connect on flights will be immense. There will be costs
here both in terms of inconvenience to passengers, the way
airports are structured and the like. We support it, we think
it is the right way to go, but it is something that has to be
managed very carefully to make sure we don't kill off the
travel industry in the process.
Ms. McCarthy. Well, it hasn't killed off the travel
industry in Australia, so I think there is probably a good
model for you out there. And people who are bargain shopping
are generally buying their tickets ahead of time, and that
should be of assistance in your efforts as well. I think it is
only Members of Congress that don't know when they are getting
on a plane.
Mr. Verdery. It is of assistance, but, of course, when you
are talking about millions of incoming travelers, even if you
have a 1 percent error rate where you know you are talking to
the travel agent on the phone and you say your name or an
address or a phone number, and they mistype a key or a number,
that then ends up with the kind of false hits that you try to
avoid. So that is why the system right now is based on the
information on your passport that is swiped electronically at
the desk at the check-in counter so there aren't errors, or
very rarely, in that kind of information taking. You take it
off the phone, off the Internet, you end up with more errors.
Ms. McCarthy. Well, I have every faith that you will figure
this out and will do an even better job than Australia.
General, does DHS or TTIC or any of the other intelligence
agencies have an office devoted specifically to terrorist
travel? The information sharing that is going on in other
countries, I was on a trip with Member Dunn, who chaired the
trip to Ireland, to Northern Ireland, the Republic of Ireland
and England, and one of the examples we learned there was that
a--of a police officer in Northern Ireland investigating an
incident uncovered information that, when shared with others in
the Republic of Ireland, in the South, and with Great Britain
led to the discovery of the cell that funded the Bali tragedy
and others. So they, albeit they are all in one compact series
of islands, are doing that information sharing.
How are we doing on information sharing not just within our
own country, but within those other strategic countries that
are so important to our mutual success?
General Hughes. That is a good question, but it is broader
than the Department of Homeland Security. I will go ahead and
answer it on behalf of the many other colleagues.
The U.S. Intelligence Community, at a variety of levels,
especially the Central Intelligence Agency, the Department of
State's intelligence organs, the Federal Bureau of
Investigation, and the Defense Intelligence Agency, and the
Department of Homeland Security, we all exchange information
with other countries. It is not perfect in some cases. And the
reasons are we have to go forward with information that can be
released and placed at risk in the other countries' realm. We
do have mechanisms to do that, such as tear lines and
sanitization, where you take out the source's methods that we
use to get the information. But it is a very robust activity
and ongoing.
I think there was kind of an interior question there that
you asked, and that is how are we doing with regard to the
travel, terrorist travel focus? The Transportation Security
Administrations intelligence organisms, there are two or three
different pieces to that, do overwatch terrorist travel in a
professional sense. And in my organization, as part of our
Strategic Intelligence Division, we have a culmination of
liaison officers and devoted analysts who work part time or
whole time on the issue of terrorist travel. Indeed, I would
probably say each and every day, my time is devoted in some
measure to the issue of persons who we have encountered in the
travel process who are connected in some way with terrorism. It
is of vital importance to us.
Ms. McCarthy. Mr. Chairman, if I might pursue very, very
briefly.
Mr. Camp. Very briefly. The gentlewoman's time has expired.
Ms. McCarthy. Yes, sir.
Are you sharing this--is there a clear sharing with other
countries?
General Hughes. Yes.
Ms. McCarthy. Thank you.
Mr. Camp. The gentleman from New Jersey, Mr. Andrews may
inquire.
Mr. Andrews. Thank you, Mr. Chairman. I appreciate the
testimony of the witnesses.
Our goal, our policy, is to reach a day when every person
attempting to gain entry in the country can be affirmatively
identified so we know who they say they are. When will we reach
the day where every port of entry into the country has
biometric reading capability?
Mr. Verdery. Well, if you are talking about the US-VISIT
biometric reading capability, that has been deployed to the
major seaports. There are some smaller ones that have not been
brought on line. That will be coming down the pike throughout
the coming months and years. In addition to that gap, we are
deploying at the land borders, at the 50 largest land borders,
at the end of this year and the smaller ports of entry
throughout next year. So US-VISIT is not a complete system by
any means, but the Secretary, I think, took the bold step of
deploying it in stages, because no one had been able to do this
because no one--
Mr. Andrews. I understand. You want to do it right rather
than fast. But we want to do it right and fast. So what
percentage of people coming into the country today do not have
their IDs biometrically read?
Mr. Verdery. Well, I am trying to remember. The
overwhelming number people who come in this country are coming
via the land border, and the larger percent of that from
Mexico. Now, most people coming from Mexico are Border Crossing
Card holders. I would have to get the numbers for you, but my
sense of it is at least probably a third of the individuals
coming in are coming in as Border Crossing Cardholders, coming
back and forth all the time. Those people have gone through a
background check similar to a visa, so they have been checked.
Anybody who has gone through a visa has been checked. And now
starting today--
Mr. Andrews. When you say checked, you mean read through a
biometric reading?
Mr. Verdery. If you apply for a visa now, you will go
through a biometric check at the time of the visa interview and
then again with US-VISIT at the port of entry to see if
derogatory information has been received in the meantime or if
you forged your document. And again, as of today, literally
today, Visa Waiver travelers who don't have a visa are now
being checked biometrically at the port of entry, at the
airports and seaports.
Mr. Andrews. I know that it is not a totally knowable fact
to know when the day will come when every port of entry has
biometric reading capability, but when do you think the day
will come?
Mr. Verdery. Well, again, the most difficult one will be
the smaller land ports of entry, which is by statute required
by the end of 2005. These are the outposts in the middle of
nowhere, so to speak. So that is the backdrop of the last date
where things would be fully employed.
Mr. Andrews. And is that going to happen?
Mr. Verdery. I believe it will, yes. We are committed to
have the big ports of entry with that capability in secondary
at the end of this year, building out in the primary lanes of
entry throughout next year.
Mr. Andrews. So this will include by sea, by air, by land?
Mr. Verdery. Air is complete right now for entry, and the
seaports largely complete. There are a few gaps. Land this year
and next.
Mr. Andrews. Now, let's talk a bit about biometric quality.
Dr. Wein, or Wein--I am sorry if I mispronounce his name--is
going to testify later this afternoon that he has concluded
that a very, very small number of the readings are reliable,
and he has made a suggestion that if we shift the technology
for the fingerprint reading to read 10 fingers instead of what
we read now, we can dramatically increase reliability, I
believe, to over 90 percent from in the forties or fifties
where it is now.
A, do you agree with his assessment? And B, if you do--if
you don't, what is wrong with his assessment? And if you do
agree with his assessment, do you think that we should make the
rather modest technological change that is proposed to try to
plug the hole?
Mr. Verdery. All I have seen is his testimony for this
hearing, which doesn't have the technical back-up that you
might expect. I understand he has a study that will be released
in the coming days, which I would expect that our team,
especially the US-VISIT Office, would want to look at very
carefully.
As I understand it, it is not that the majority are
unreliable. It is that a small minority are unreliable if they
have certain characteristics of their fingerprint. I honestly
feel a little uncomfortable talking about in open session as to
how to defeat the system, to be honest. But--
Mr. Andrews. But certainly we could generically say that
there are people trying to beat the system, and there are ways
to do it, right? So do you agree with his conclusion that those
of--a significant plurality, I guess, of those who try to beat
the system can do so now.
Mr. Verdery. I don't agree with that, and I don't believe
our US-VISIT biometric experts do either. I don't pretend to be
a biometric expert, but I don't believe they would agree with
that in the way it has been presented.
Now, to go to your question you asked earlier about the 10-
print. I think we do agree that in a perfect world, a 10-print
solution, if it didn't take any more time and any more costs,
would be preferable. But at a port of entry, at a visa issuance
window, there is a big difference between putting a 10-print
reader and a 2-print reader out in a primary lane or at a very
crowded consular office. And so the marginal gain between 10-
print and 2-print we have decided to date is not worth it
because it would have held up deployment of a system that is
working every day, as we speak, to find people you would not
want coming into this country.
Mr. Andrews. I have to say I am concerned about that answer
because it is my understanding that NIST looked at this study
and believes that his--the professor's conclusions were
conservative; that, in fact, the error rate may be higher. And
remember that although the vast majority of people trying to
get entrance do not in any way try to alter their fingerprint,
I would assume that it is a pretty fair conclusion that a
significant number of people that we are actively trying to
keep out might want to alter their fingerprint. So it is a
small part of the universe, but a very crucial part of the
universe.
Let me also ask you this. It follows up with Mr. Gibbon's
question. What mechanism is in place to move forward in
biometric technology for things other than fingerprint, like
eye scan? Do we have the flexibility to test those
technologies, and, if so, what are we doing?
Mr. Verdery. Well, we are actually testing the iris scan,
if that is what you mean, right now in a different program, the
Registered Traveler Program that TSA is operating at five
airports around the country, including Reagan National, both
fingerprints and iris scans, as a way to verify people who have
been preenrolled in a Registered Traveler Program. And so we
are working on the iris scan from that end.
As I mentioned, the facial recognition technology that will
be built into international passports, will be required of Visa
Waiver travelers next year. We are building in the capability
to read that into our document readers at ports of entry. And
so we are looking at the systems to provide redundancy and the
like.
But again, the backbone of the system, from our point of
view, has to be the fingerprint because that is the way our
criminal records are characterized; that is how we are able to
find people very quickly with very low error rates, people who
should not be admitted to this country.
Mr. Andrews. Thank you very much.
Mr. Camp. Thank you.
Mr. Pascrell may inquire.
Mr. Pascrell. Thank you, Mr. Chairman.
Mr. Chairman, 98 percent of over 281 million visitors
annually enter our country and are inspected. That means that
millions of travelers entering the country are entering without
being checked against any intelligence database that could help
identify a potential terrorist or even a convicted criminal.
I am interested--when we talk about terror, General, and I
want to know if you agree with me, I am talking not only about
those people who wish to bring explosives into this country or
to come into this country to wreak havoc on our citizens and
our property, and I am talking about those people who are
transporting drugs across our border. I see that terror every
day in my district, throughout this Nation. And I know that
drug trafficking in the United States has a lot to do with the
funding and the assisting of terrorist groups and
organizations. What do you see and what do you do about drug
interdiction? And how do you see they are both connected?
General Hughes. Well, thank you very much for the question.
Perhaps Assistant Secretary Verdery would like to comment after
I do.
Personally, I am not positive about the figures you quoted,
but I grant you that there are people who successfully get into
the country with drugs and who are terrorists who may come in
with some capability. That certainly is true. I think it is a
very small percentage compared to what it was.
We have actually been extremely successful in interdicting
drug shipments, and indeed in the past 2 weeks, we have
interdicted huge multiton, ship-borne movements of cocaine in
the Pacific, which you may have read about in the newspapers.
Aside from that, on our land borders and in air crossings,
it is pretty common for us to now interdict any kind of
carrying of such material, either terrorist-related material or
drug materials, through the air bridge.
The land bridge, as we mentioned, poses a significant
problem for us. We are trying to do our best to control that,
and there are a lot of issues there I can talk to you about,
but I think we are making progress. We are on the right track.
But I don't know whether that is a good answer for you, but
I will summarize it. Maritime is a huge problem, but we are
being successful at interdicting, and that is often based on
good intelligence. The air bridge is pretty secure
comparatively for both terrorist activity involving material
and narcotics trafficking. Small amounts probably arrive here
and there. The land borders are an issue, and we are working
hard to secure them.
Mr. Pascrell. Mr. Verdery, would you respond to that
question, please?
Mr. Verdery. Sure. I think, as General Hughes mentioned,
the numbers on drug seizures are up quite dramatically, whether
it is by sea with the Coast Guard or over land at our ports of
entry or the Border Patrol. We have seen no degradation of the
drug mission in this Department. In fact, it has been enhanced
by the additional capabilities being brought to bear. I would
be happy to get you those figures on that.
We do recognize, of course, that the means by which people
are able to enter the country on the land border could
facilitate a terrorist looking for the same type of entry. That
makes it all the more important--
Mr. Pascrell. Well, my point--excuse me for interrupting.
My point is that there is no difference in the terrorists. What
is the difference? If you are bringing drugs into this country
to kill our children and our citizens who are stupid enough to
use it, you are--what is the difference between that kind of
terrorism and the terrorism that the President has been talking
about over the last 3 years? What is the difference?
Mr. Verdery. I take the point. We want to do both. We want
to fight the counternarcotics mission and also what I was
referring to as more of international terrorism, which I think
is a term of art.
Mr. Pascrell. Well, would you agree with my statement that
the terror of drugs in this country is just as horrible, just
as terrible as the terror which is brought into this country of
those who wish to bring explosives or to kill our citizens or
to damage our property?
Mr. Verdery. I wouldn't want to rank two horrible outcomes.
They are both horrific.
Mr. Pascrell. We both agree then.
Mr. Verdery. Yes. But I think the capabilities that are
being brought to bear against the terrorism threat as I define
it, kind of international terrorism, Al-Qa'ida and the like, is
having significant impact on the drug enforcement mission also,
whether it is the One Face at the Border Initiative, getting
our Customs inspectors and immigration inspectors cross-
trained, enhanced Border Patrol missions, advanced technology
on the border. We are seeing increases in picking up people,
picking up drugs, all those kinds of things on the border.
The last point I have to make is that this demonstrates all
the more reason for the President's Guest Worker Initiative,
because we have got to figure out a way to get the overwhelming
majority of people who are crossing the border legally, who are
not criminals, who are not trafficking drugs, who are not
terrorists, who want to work, we have to be able to have a way
for them to walk, to come back and forth to those jobs through
the ports of entry where they can be vetted for security
reasons and essentially pull the wheat and the chaff, separate
them. Terrorists are not going to be able to walk into a port
of entry. And so if we can get the guest workers who are here
to work coming back and forth through ports of entry,
regularize that, it would make our border enforcement mission
much better.
Mr. Pascrell. Let me make myself clear. I didn't make
myself clear then. There are 22,000 Americans that are killed
every year in the United States due to illicit drugs. It would
seem to me, just an observation, a perception, that we do not
have the commitment to interdicting those drugs and ending this
horror on the streets of our communities. And we know the
tragedy of 9/11. The Commission spelled it out, made some
recommendations. Some we have included in legislation
conveniently, and some we have left out.
You don't have enough people to do your job. I don't care
what you tell us today. You don't have enough people to do your
job. So you are the messenger. I understand that. It is not you
personally that I am--
Mr. Verdery. If I could just--I mean, there is a commitment
from the Department, from the Secretary, from Asa Hutchinson,
the Under Secretary, former head of the DEA, our Deputy
Secretary, our operational heads such as Commissioner Bonner
and our Counternarcotics Office to see this mission forward.
And as General Hughes mentions, the numbers bear out that we
are doing it. Are drugs getting in? Of course. This is never a
100 percent solution. But we have seen a robust increase in the
amount of drugs that are interdicted in the source zone, at the
ports of entry and the like, and we need to ramp it up. But we
are doing the job.
Mr. Pascrell. I just wanted to bring something to your
attention, that is, on the Border Patrol. We are talking about,
in 2011, there were 9,700, almost 9,800 Border Patrol. There
are 10,839 today. How can you sit there and tell this
committee--being the messengers, how can you sit there and tell
this committee that by adding the small amount of Border
Patrol, that you are even touching the surface of this serious
problem.
You know that there are more drugs coming into this country
than ever in the history of the Nation. You don't have enough
people to do the job. We are doing this on the cheap, and we
are doing this for what the reason?
I don't know why we are holding this hearing today, I
really don't. We need to act and we need to act yesterday. And
that was the whole message of the 9/11 Commission, we need to
act yesterday. And we need to do it in a very tangible way,
rather than simply having committee upon committee, everybody
gets a piece of this, and nothing is being done.
There is terror in our streets, and there is terror from
drugs in this country that are moving freely. You know it and I
know it. Just as serious as the lunatics that are out to try to
kill us--just as serious.
Mr. Camp. Thank you. The gentleman's time has expired.
And before I recognize Mrs. Lowey, the purpose of this
hearing is to look at terrorist travel. We have separate
committees in this House that deal with narcotics, and there
are some Members that are on both committees, like Chairman
Souder who has done a great deal of work in this area.
So I appreciate the gentleman's line of questioning, but
this hearing, in fairness to our witnesses, is about terrorist
travel. And I realize--
Mr. Pascrell. I am talking about terrorist travel, Mr.
Chairman.
Mr. Camp. I realize, by your definition, but we have
separate committees--
Mr. Pascrell. That is why I asked the question.
Mr. Camp. But we have separate areas that are also working
on this.
So, with that, I would recognize the gentlewoman from New
York, Mrs. Lowey, to inquire.
Mrs. Lowey. Thank you, Mr. Chairman.
Gentlemen, good to see you again. Tuesday's New York Times
reported, based on the findings of an FBI inspector general
report, that 3 years after the September 11th attacks, more
than 120,000 hours of potentially valuable terrorism-related
recordings have not yet been translated by linguists at the
FBI.
My judgment, this is absolutely outrageous, not to mention
dangerous, particularly for the residents of my home State of
New York which is referenced in intelligence reports time and
time again.
In my judgment, we can collect all of the intelligence we
want, but if we let it sit on a shelf and collect dust for 3
years, it won't do us any good. We are here today, in part, to
review the progress being made by the Department in the area of
information sharing.
And perhaps, Secretary Hughes, could you just tell me what
this report indicates to you, and what you are doing about it?
General Hughes. It indicates to me that we--and actually I
guess I will use a little bit of history here--we haven't
solved the problem we have had for many years, where similar
kind of records have been found throughout the intelligence
community, not just at the FBI, but at the National Security
Agency, the Central Intelligence Agency and the former office
that I held, the Defense Intelligence Agency. We are
overwhelmed, in fact, many times by the volume of material.
We do have some screening mechanisms to go through this
material and highlight to us the issues of interest that are in
them, rapidly, key word search, as an example of anything that
can be digitized. That is not the only--
Mrs. Lowey. Secretary Hughes, if I may, but I know that my
time is fast disappearing. You are the Assistant Secretary,
Information and Analysis. I may not get to my next question
about border security. But it is 3 years after 9/11.
I have three children, I have seven grandchildren; I want
to know what you or others who have similar responsibilities
are doing about this now? This is an embarrassment. It should
be an embarrassment to you, to Secretary Ridge, to the FBI.
What are we doing about it now?
General Hughes. I don't think I can answer your question. I
don't know what we are doing about it now, outside of being
equally outraged, as you are, about the report. I don't
actually know if the report is completely accurate.
But let's assume that it is for a minute. What I intend to
do is to ask questions about it in the appropriate forum and to
seek full detail, and then search for ways to solve this
problem. I am sorry if it seems like I was talking on anything
something that wasn't related. But, indeed, it is related,
ma'am.
We have had these problems for 20 years or more. And we are
likely to have them in the future. The volume of information
and the number of people to deal with it is in great imbalance.
I apologize for giving you that answer.
Mrs. Lowey. No, I appreciate your honesty, sir. But I just
want to say, as someone who sits on Appropriations, I know
the--in addition to this committee, I know the billions that we
are spending. We spent billions organizing this Department of
Homeland Security.
I had real concerns that instead of dealing with issues
like this and replacing incompetent people with competent
people, we have been moving chairs around. Some people aren't
even in their offices yet. So I just wanted to send a very
strong message that if my first responders--my police, my fire
fighters--are going to be getting plans in place to deal with
emergencies and the FBI doesn't even have all of these urgent
messages interpreted--as you know, before 9/11, part of the
problem was they couldn't get the messages to the right people;
and I am not even talking about other issues that our first
responders have. But if we can't get these messages interpreted
in a timely way, we might as well just all say, Give up, save
the money, put it into our schools, put it into our health
care, the Department of Homeland Security is just not doing
what it should.
And I hate to be so strong, because I know you are working
so hard. But I just hope that if I am sending my strong message
to you, it is gotten, and you can report back to me and to the
committee as soon as possible with a plan that is going to
address this.
Mrs. Lowey. I don't know if we are going to have a chance
to ask other questions, but Solomon Ortiz, my colleague, has
been asking a lot of question about the gangs, the illegal
immigrants that have been coming over the border.
Unfortunately, the head of counterintelligence at the CIA,
never heard about that.
So I hope, Mr. Chairman, you all have heard about it. He
didn't know about it, and so there seems to be a real problem
of people in one office not communicating with people in other
offices. And I hope, Mr. Chairman, if we have another round, we
can deal with that, because that is truly a major issue in
border security. Thank you.
General Hughes. May I give one brief answer?
One of our--
Mrs. Lowey. I am talking about the catch-and-release issue.
General Hughes. I understand--and the gangs. My point that
I was going to make is, one of our primary databases is called
VGTOF it is the Violent Gangs and Terrorist Activities or
Terrorist Organizations Database.
We combine the two in at least one database and look at
them with equal vigor for lots of reasons. And part of the
reason is, we believe, I strongly believe, there is a
connection. So MS13 from El Salvador or Honduras here in the
United States and Al-Qa'ida somewhere else, I believe does have
a relationship that is important for us to understand.
May I just close by saying, I share your passion, and I
will do my best, ma'am.
Mrs. Lowey. Mr. Chairman, I think it is just important to
remember, and I know if we get to another round, that the
problem here is that these illegal immigrants are released
under their own recognizance.
And I have a feeling that they might not all be home just
knitting with their families or cooking dinner. And I think it
is an amazing issue that many of my colleagues have spent a lot
more time focusing on, and I was just going to bring it up
today.
Thank you, Mr. Chairman.
Mr. Camp. Thank you.
Mr. Langevin.
Mr. Verdery. If I can have a brief minute to respond. But
you mentioned that there were catch and release. That is
obviously a concern of ours, because there is an imbalance
between the number of people who are picked up, who are
scheduled for deportation, and the amount of beds we have.
Now, within that imbalance, ICE has gone to great lengths
to prioritize people who have been found to be involved with
criminal activity, violent criminal activity, or are non-
Mexican. So we are trying to prioritize amongst our bed space
to keep the violent felons in custody until they are deported,
as well as trying to improve the deportation system itself to
get more people through the system, whether it is through
repatriation, getting people back to countries that won't take
them.
We are trying to move more people through so we have less
catch and release.
Mrs. Lowey. Maybe you should have more bed space.
But, Mr. Chairman, I won't take any more time.
Mr. Camp. Thank you.
Mr. Langevin may inquire.
Mr. Langevin. Thank you, Mr. Chairman.
Gentlemen, thank you for being here today. Andrews, who is
clearly on the same wavelength addressed my question in large
part, but I do want to follow on, if I could, and just explore
a little further where we are, how close we are in terms of
having a robust system that is as close as possible to 100
percent effective when it comes to biometric scanning of
fingerprints.
What are you doing to get us to that 100 percent level, and
in terms of a time frame, at what point can you give assurance
to the public that we are as close as we are going to get, that
it is a 100 percent accurate scanning system?
Mr. Verdery. Well, if you think of--
Mr. Langevin. If I could, in addition to that, are we
giving equal attention in terms of the technology that is
deployed to airports, ports of entry and land border crossings,
particularly in light of the fact that there are some that
suggest that Al-Qa'ida would prefer a port of entry as opposed
to some of the other methods coming in?
Mr. Verdery. Well, thank you for that question, sir.
Again, VISIT is being deployed in fairly well-identified,
discrete increments: Increment 1, January 5 of this year,
airports and seaports. It is now 100 percent at airports, so
every international traveler, with the exception of diplomats
and a couple of other minor categories, basically 100 percent
are vetted biometrically at the port of entry, at airports.
Seaports are close to 100 percent for entry. Land borders,
we will put US-VISIT capabilities in secondary processing by
the end of this year at the 50 biggest ports, the very heavily
trafficked ones, and at the smaller ports of entry by the end
of next year, by 12/31/05.
The VISIT capability on primary, because essentially when
your cars are driving through you are talking about primary,
will be deployed throughout 2005 at the big ports of entry and
2006 for the smaller ports of entry.
In terms of how are we deploying it, we recognize there is
no way to make everyone get out of a car at primary, with
literally millions of people coming through. So we are going to
be going with a radio frequency technology solution, so that
the biometric information is pulled off your travel document as
you are going through the port of entry ahead of time, so that
the inspector can see the information, see if there is a
potential problem while there is still time for a law
enforcement response or other necessary action. And that same
solution will be deployed on exit, so there is an exit at the
port of entry, as well as for land.
I think I mentioned the airport exit solutions will be
deployed this year, and throughout next year there will be a
universal airport and seaport exit.
So I think the bottom line for airports and seaports, you
are looking at near 100 percent coverage by the end of next
year; land ports, 2006.
Mr. Langevin. What about the accuracy of the technology
itself? As Mr. Andrews was--brought up, Dr. Professor Wein's
findings indicate that the technology itself in some cases may
be as low as 52 or -3 percent in terms of its accuracy. You
feel it is higher.
But, clearly, it is not at 100 percent. So what steps are
you taking to get us as close to 100 percent accuracy as
possible? And how long before you have confidence that it is
100 percent accurate when the technology is used?
Mr. Verdery. Well, what we found in the 9 million or so
people who have been enrolled in US-VISIT this year is that the
accuracy is quite high. The false positive rate is less than 1
percent. And those people are resolved usually very quickly, in
a couple of minutes in secondary, where a fingerprint appears
to be a match against a watch-list, but is not. There also are
small numbers of individuals whose fingerprints cannot be taken
for medical reasons or other reasons.
The issue that was raised by the witness in the second
panel is, I think, a little bit different than that. It is a
question of, if you are trying to defeat it, how easy is it to
essentially try to rig the system. And again I don't feel real
comfortable talking about that in open session. I would be
happy to come in and talk to you privately about that.
But in terms of the overwhelming majority of individuals,
it is working extremely well, in the 99 percent range.
Mr. Langevin. My time is almost up, so quickly I would like
to ask this.
I still am constantly baffled by the sheer number of
different databases and lists available for determining who
requires extra screening and who should or should not be
flying. And I can't believe that we still don't have one
complete and integrated list that can be effectively used for
our Border and Transportation Security infrastructure to thwart
terrorist travel.
So can you provide some more detail as to what your goal is
in terms of streamlining those lists and ensuring that they are
used effectively? And can you tell me exactly when that goal
will be met?
Mr. Verdery. Well, the watch-listing effort is being led by
the Terrorist Screening Center established by the President
last year. The terror screening database is what is accessed by
our frontline people, whether it is the TSA screener or an
airline in terms of enforcing the "no-fly" list. So essentially
we do have a common set of watch-lists that are now used,
depending on the program.
So the problem we have, and the reason you see these
stories in the paper of people being flagged inappropriately,
and the like, is not so much a problem with the list, it is a
problem with the implementation of the list. Right now, it is
being run by each of 77 different airlines differently.
Essentially, your person that is checking you in is essentially
acting as the watch-list enforcement person.
We recognize that is not a tenable solution. That is why we
have proposed a Secure Flight program to bring that
responsibility within the government's sphere, within the TSA.
But to do that, we have to get information from the passenger,
via the airlines, in time to make that determination.
So we have issued an order to compel data for testing of
the system. That will be followed on by an order compelling
data to make the system go live, so that we can handle this and
leave airlines with the responsibility of trying to enforce
these lists. It will be based on the Terrorist Screening
Center's coordinated watch-list.
Mr. Langevin. Can you give a time frame? Can you assure the
public out there that we are not going to see these kinds of
stories in the paper where we have got different lists that
don't pick up accurately the people that should not be flying?
Mr. Verdery. Secure Flight, I believe, is due to become
operational in the spring, post-testing; that is when you will
see the transition from the airline-based system to the
government-based system.
Will it be 100 percent? No. Because there are so many air
travelers, there will be false hits. If we have somebody on our
watch-list whose name is Bill Jones, there will be other people
named Bill Jones who are flying, and we have to resolve those
types of potential hits.
I am always amazed at how many similar names there are,
when they sound like a common name; but you put the entire
American people and our international travelers out there
flying, you are going to have those types of hits that have to
be resolved. That is why we are working on Secure Flight.
Mr. Camp. Thank you.
The ranking member of the full committee, Mr. Turner, is
recognized, if he would like to inquire.
Mr. Turner. Thank you, Mr. Chairman.
I think the first thing I would like to talk about is this
problem we have on the border with the catch-and-release
practice that is ongoing. Do we have a figure available,
Secretary Verdery, that would tell us what it would cost us to
end that practice?
Mr. Verdery. A figure on how much it would cost to detain
every person who is apprehended until they are deported?
Mr. Turner. Yes.
Mr. Verdery. I do not have that in front of me. It would be
quite large.
Mr. Turner. Has there been any consideration of some
temporary detention facilities that would enable us to halt
that practice?
Mr. Verdery. Well, there are temporary facilities used on
occasion. That is what we have done in Arizona where we have
gone in and enhanced the resources.
We recognize there has to always be a balance of the
prosecutorial resources, the detention resources, the removal
resources. And if you end up with an imbalance, you essentially
haven't done any good, because you can't get people through the
system appropriately.
So there has to be essentially a continuum. So, in that
case, we have put more temporary space in Arizona.
Mr. Turner. I am told by some of the Border Patrol people
that I visit with that the catch-and-release practice fairly
quickly has become well known among those who are engaged in
human smuggling. And so we are likely to have seen an increase
in efforts to come across our unprotected borders as a result
of the fact that it has become known that if you are from a
place other than Mexico, you have about a 50 percent chance of
being released on your own personal bond if you come into our
country.
And I would suspect that we could at least make some impact
upon the movement of illegal immigrants from places other than
Mexico if we had some effort--made some effort to try to stop
that practice.
Mr. Verdery. Well, regarding the announcement that we had
recently of the new use of expedited removal, it points out the
need for that. It essentially is going to say, if you are from
a country other than Mexico and picked up between a port of
entry and you do not have an asylum claim, you are going to be
held, whether it is a couple of days, a short period of time.
You are going to be flown back, you are not going to be put
into the system taking up a bed for months, even years. We can
move people through more quickly.
Again, I have our detention numbers: 108,000 in 2001,
113,000 in 2002, 145,000 in 2003. We had 130,000 in 2004
through June, so I think we are on track to have quite a bit of
increase from last year. But, again, there is no shortage of
people in this regard.
Mr. Turner. The Border Patrol people that I visit with say
that they have received no instruction from the Department
regarding how this new expedited deportation process is going
to work, no indication of what kind of training the Border
Patrol agents will be receiving, no indication of when this is
going to be implemented.
We have a program here that you have announced, but there
doesn't seem to be much understanding among the rank and file
about how it is going to work or where you are getting the
money to pay for it. Could you help enlighten us on that?
Mr. Verdery. Well, it is operational in two sectors, in
Tucson in Arizona and Laredo in Texas. So if you are not a
Border Patrol agent in those two sectors, then you probably
wouldn't have been trained, because it is not being applied. In
these sectors, training has been completed. I have to get back
to you on exactly how many people, but the training has been
provided.
There was a month lag time between the announcement and
when it became operational, so they can get their proper
training, to make sure we are abiding by our asylum
requirements under international law.
In terms of the funding, this is a money saver in the long
haul. It is going to move more people through, and will be a
deterrent effect against the migrant flow that you mentioned.
And if I might just mention one other thing while I have
the floor, a very important announcement from last week is that
we have now integrated at the Border Patrol stations the IDENT
and IAFIS fingerprint systems, which were formerly separate
systems developed by the Justice Department. We have integrated
work stations available at all Border Patrol stations so that
if Border Patrol picks somebody up, they can not only check it
in IDENT, which has information about prior illegal crossings
and immigration information, but also against IAFIS, which has
all of the criminal database from FBI and other sources.
So we will have an end to that situation where people were
picked up for a crime in one State, and then Border Patrol
didn't know about it. We have already had a number of successes
of violent criminals being found. Of course, that means those
are the types of people we are going to detain. They are not
going to be part of a catch-and-release policy, so to speak,
but will be the priority people that will take up those beds.
Mr. Turner. Do you have the capability to access the FBI
database to know who they may have on their database when
people come to Border Patrol stations?
Mr. Verdery. That is exactly what I was just talking about;
the IAFIS system is what FBI operates. So, yes, if Border
Patrol picks somebody up, they are now run against IAFIS to see
if there is a prior criminal record. we had promised that was
going to be deployed in 70 percent of the Border Patrol
stations by the end of this year, and we will have beaten that
by going to 100 percent as of last week.
Mr. Turner. Do you feed information back to the FBI
regarding people that you picked up? do you feed records into
the same database that you receive information from?
Mr. Verdery. They have access to IDENT through the US-VISIT
program. And we have actually just announced an enhanced access
by FBI to do searching through IDENT, whether it is the Border
Patrol information you mentioned, or the entry-exit information
through US-VISIT. They do have access to that. We are enhancing
that.
Mr. Camp. Thank you. The gentleman's time has expired.
We have another panelist that we would like to hear from.
I want to thank both General Hughes and Assistant Secretary
Verdery for being here this afternoon. And this would conclude
your testimony before this subcommittee today. Thanks again for
being here.
Mr. Camp. The next panel will include Professor Wein. I
want to thank Professor Wein for coming all of the way from
California to testify at this hearing. Professor Wein can come
and take a seat at the table. Thank you.
We have your written testimony. If you could briefly
summarize your statement in 5 minutes.
STATEMENT OF PROFESSOR LAWRENCE M. WEIN, GRADUATE SCHOOL OF
BUSINESS, STANFORD UNIVERSITY
Mr. Wein. Good afternoon, Chairmen Camp and Gibbons,
Ranking Member Turner and members of the House Select Committee
on Homeland Security. I am honored to appear before you today
to discuss a serious but repairable vulnerability in the
biometric identification performance of the US-VISIT program.
The implications of our findings are disturbing enough that
last week I briefed members of the Homeland Security Committee,
staff from the Office of the Vice President, and analysts at
the General Accounting Office, and program managers at the US-
VISIT program.
On the surface, the biometric identification of the US-
VISIT program appears to be highly effective. A NIST May 2004
report estimates that the chances that a terrorist who is on
the watch-list--when entering a port of entry, the chances that
we catch them and have a watch-list hit is 96 percent, while
maintaining a false positive rate, that is the probability that
someone like you or me would nonetheless set off a watch-list
hit, maintaining that probability at a mere 3 in 1,000.
So what is the problem? Well, the devil is in the details.
It turns out that the software systems also report and
determine the quality of each image. And the software has a
very difficult time in accurately matching images that have
poor quality.
And the premise of our study is that terrorist
organizations, such as Al-Qa'ida, will exploit this
vulnerability by choosing U.S.-bound terrorists who have
inherently poor image quality, such as worn-out fingers or
deliberately reduced image quality. Why is this?
First, all of the information is public; it is on the NIST
database; two, Al-Qa'ida has a large pool of terrorists from
which to choose; and three, we know they are sophisticated
enough. Indeed, given the intricacies of the planning of the 9/
11 attacks, I think our assumption is not only prudent but
realistic.
So using publicly available information from the NIST Web
site, we developed and analyzed a new mathematical model that
includes red-teaming. First, the U.S. Government chooses a
biometric strategy, essentially the rules that decide how you
determine if a watch-list hit happens. So they choose a
strategy to maximize the chances of catching a terrorist,
subject to maintaining moderate congestion at the ports of
entry under current staffing levels.
Then the terrorist tries to defeat this system by choosing
his or her own image quality to minimize his or her chances of
getting caught. And the results are sobering. The currently
implemented strategy has only a 53 percent chance of detecting
a terrorist at U.S. points of entry, compared to the overall
level reported in the NIST report of 96 percent.
Again, the deterioration, down to a coin flip here, is due
to the fact that the terrorist is allowed to exploit the
vulnerability in the biometric system.
We have two main results. The first result is that instead
of using a one-size-fits-all decision rule for who gets a
watch-list hit, we derived different rules for different image
qualities. And by doing so, we were able to increase the
detection probability from 53 percent to 73 percent. So from
essentially a coin flip, up to almost three-quarters. This is a
minor software fix.
Over the next few days, I will give a detailed mathematical
paper to people at NIST, to people at the US-VISIT office, and
this should be implemented as soon as possible.
Now, even if we increased inspector staffing levels
significantly, we can't really get over the three-quarters
level, over the 75 percent chance. But now here is our second
result. If we take 10 fingers at visa enrollment, and then have
the opportunity at ports of entry to use more than two fingers
for the people with the poor image quality, then we can
increase our detection probability all of the way up to 95
percent without increasing the false positive rate.
Although switching from a two-fingerprint to a 10-
fingerprint system may be costly and certainly would be
disruptive, there is simply no excuse for a $10 billion program
to not achieve a 95 percent performance level, particularly
given the potentially grave consequences of allowing a
detection--allowing someone, a terrorist, to cross the border.
If slower two-finger matching algorithms cannot in the
immediate future approach this 95 percent detection probability
for poor quality images, then the US-VISIT program should be
reconfigured with 10-fingerprint scanners as soon as possible.
Thank you. And I look forward to taking your questions.
[The statement of Mr. Wein follows:]
Prepared Statement of Lawrence M. Wein
Good afternoon, Chairman Cox, Ranking Member Turner, and the
Members of the House Select Committee on Homeland Security. I am
honored to appear before you today.
I am the Paul E. Holden Professor of Management Science at the
Graduate School of Business, Stanford University. I teach operations
management to MBA students, and perform research in the areas of
operations management, medicine and biology. At their essence, many
homeland security problems are service operations problems: Just as
McDonalds needs to deliver hamburgers in a rapid and defect-free
manner, the US Government needs to quickly deliver vaccines and
antibiotics after an attack and to safely prevent nuclear weapons and
terrorists crossing our borders.
Since September 11, 2001, I have used mathematics to analyze a
variety of homeland security problems in bioterrorism (effective
responses to terrorist attacks using smallpox, anthrax or botulinum
toxin) and in border security (evaluating ways to detect nuclear
weapons coming through ports). These analyses have led to policy
recommendations, several of which the U.S. Government has adopted.
Today, I am here to discuss the results of a study I conducted at
Stanford University with Ph.D. student Manas Baveja that examined the
ability of the US-VISIT program to accurately match the fingerprints of
visitors at ports of entry against a watchlist that contains the stored
fingerprint images of suspected terrorists. The implications of our
findings are disturbing, so much so that last week I briefed members of
the Homeland Security Council, staff members from the Office of the
Vice President, analysts from the Government Accounting Office (GAO)
and officials from the Department of Homeland Security.
On the surface, biometric identification of the US-VISIT Program
appears to be highly effective. A May 2004 NIST study, entitled
``Matching Performance for the US-VISIT IDENT System Using Flat
Fingerprints,'' predicted that the likelihood that US-VISIT would flag
a terrorist whose fingerprints are stored on the biometric watchlist is
96%, while simultaneously limiting the false positive probability,
i.e., the likelihood that a visitor not on the watchlist would
nonetheless generate a watchlist hit, to 3 in 1,000.
So what's the problem? It turns out that the devil is in the
details: The biometric software also computes the quality of each
fingerprint image, and it is very difficult to accurately match poor-
quality images. Our study stems from the belief that terrorist
organizations can exploit this observation by choosing US-bound
terrorists that have either poor image quality (e.g., worn out fingers)
or deliberately reduced image quality (e.g., surgery, chemicals,
sandpaper). The relevant data is publicly available on the NIST web
site, and we know Al-Qa'ida has the sophistication to understand this
and has a large pool of potential terrorists to draw from.
Using publicly available biometric data from NIST, we developed and
analyzed a novel mathematical model that allows red-teaming: First, the
government develops a biometric strategy to maximize terrorist
detection for a given inspector staffing level, and then the visiting
terrorist attempts to defeat the biometric system by choosing the image
quality to minimize his chances of getting caught.
The results are sobering: the currently implemented strategy has
only a 53% chance of detecting a terrorist during US entry, compared to
the overall value of 96% mentioned earlier. The detection probability
is reduced to essentially a coin-flip because the terrorist is allowed
to exploit the vulnerability in the biometric system.
The good news is that our study pointed to possible solutions that
our nation can implement. Rather than using the current one-size-fits-
all rule for generating watchlist hits, we derived different rules for
different levels of image quality and improved the likelihood of
detecting a terrorist from 53% to 73% without increasing the false
positive rate.
Unfortunately, our study predicts that increasing staffing levels
of US Custom and Border Protection inspectors would offer only modest
benefits, and could increase the 73% detection by only an additional
5%. Given that US-VISIT runs millions of watchlist checks each year,
this is an unacceptable security risk.
Fortunately, our nation has a second solution it can rely upon.
Instead of using a software system that scans two index fingers, we
found that that allowing additional fingers to be tested from people
with worse image qualities achieves a 95% detection probability,
without increasing the primary plus secondary inspection workload
associated with legal visitors.
Finally, the government's investment in biometrics at ports of
entry for detecting terrorists should be assessed in light of the
detection probability required to deter terrorists from crossing at an
official port of entry. The deterrence value of a fingerprint system
depends on the terrorists' perceived likelihood of successfully
entering the US between the ports of entry, e.g., along the US-Mexico
border. While this detection rate has been estimated to be
approximately 25% in a recent Time Magazine article, it appears that
Al-Qa'ida prefers to enter the US at ports of entry.
To summarize, there is a serious but reparable vulnerability in the
biometric identification system of the US-VISIT Program, which is our
last line of defense for keeping terrorists off U.S. soil. A minor
software modification that allows the watchlist rule to vary with image
quality can increase detection from 53% to 73%. I have provided details
to officials who oversee the US-VISIT operations, and this should be
implemented as soon as possible. The use of more than 2 fingers for
low-quality images can achieve a detection probability of 95%. Although
switching from a 2-fingerprint to a 10-fingerprint system may be costly
and disruptive, there is no excuse for a 10-billion dollar program to
settle for performance below this level. Indeed, our results are not
inconsistent with the warning in the November, 2002 NIST report that a
2-finger search was not sufficient for identification from a large
watchlist. If slower 2-finger matching algorithms cannot approach 95%
detection for poor-quality images, then the US-VISIT Program should be
reconfigured with 10-fingerprint scanners as soon as possible.
Our recommendations hinge on the assumption that terrorist
organizations as sophisticated as Al-Qa'ida will eventually attempt to
defeat the US-VISIT system by employing terrorists with poor-quality
fingerprints. In light of the meticulous planning that went into the 9/
11 attacks, I believe this assumption is not only prudent, but
realistic.
Thank you, and I look forward to responding to your questions.
Mr. Camp. Thank you very much. We just had, last week, a
demonstration of some of the technology available in
biometrics, and they didn't have exactly the same rates.
I think the way you look at your data is a little different
than theirs. But I understand your concern is that people
intentionally deface their fingerprints and then--on a two-
finger scan system, that is not that hard to do, and they will
circumvent.
Now, in theory, if there is a bad read or an inability to
read a fingerprint, there should be diversion to secondary
screening at that point under the system. But my question is
more about alternative biometrics.
I have seen some demonstrations on facial scans. I am not
sure that 10 fingers is really the best direction that we
should go. It is almost landline versus wireless in terms of
telecommunications. But it seems to me that this facial reading
has a much higher rate of accuracy, which is in sort of the
development stage.
As you referred to, there are other biometrics, such as eye
scans. Can you comment on those and give us some information on
what you--
Mr. Wein. Yes. The operative word you bring up is
``development.'' These are in the development phases. I have
worked on port security also with Stephen Flynn on some of
these issues. It is a hard problem, because you have all of
this technology that may provide a silver bullet, but it may
take 5 or 6 years. But the terrorists aren't going to wait 5 or
6 years to sneak a nuclear weapon into the country.
NIST has done quite a bit of analysis on face biometrics,
and they claim for large-scale identification of the size we
are talking about here, it simply is not a feasible option. The
iris and eyes--I have read up on all of these, and some of them
sound promising; they may be ready in several years, they are
not ready for prime time. Either they have too many false
positives, people don't like to have various parts of their eye
scanned and so forth. So, whereas, it may not be viewed as
wireless technology, taking 10 fingers clearly will help a lot.
Indeed, my recommendations are not inconsistent with what
is reported from the NIST way back to November of 2002, that
two-finger methodology is simply not adequate to do large-scale
identification.
Mr. Camp. Well, it seems if you could deface--
Mr. Dicks. Would you yield just for a second?
I think you were here. We had a meeting here, and they came
up and told us that two fingers gave us 95 percent reliability.
And you are saying that is not true, because there are
quality problems associated with two fingers or any fingers,
and that is why you should do 10, in order to get the higher
reliability; is that not correct?
Mr. Wein. The 95 percent is averaged over the entire
population. The overwhelming amount of the average population,
like you and me, we are not attempting to defeat the system.
Part of the reason we are putting this program in place is
to stop terrorists from coming into the country. It would be
naive to think that these people are not trying to defeat the
system.
An insignificant fraction of people have naturally worn-out
fingers, have naturally poor image quality. It is on the order
of 5 to 10 percent.
Mr. Camp. If I could reclaim my time, my point was, we did
have a higher number. I think he is looking at it a little
differently.
But, second, if you can deface two fingers, you can deface
10, and we ought to be looking at other means--my point is
that.
US-VISIT is just one of the items that we have to try to
disrupt terrorist travel. We also have, you know, this other
biometric capability. We have the watch-lists that we just had
an extensive discussion on. There are inspectorinterviews.
There is secondary screening. There is actual real intelligence
that has helped disrupt this.
So this is just one of the many items that we are looking
at in terms of how we disrupt terrorist travel.
Mr. Wein. I think it is important on many of these homeland
security problems to move forward in two ways. One is,
operationally we need to get things in place that are
effective, and get them in there quickly, because Al-Qa'ida and
other terrorist organizations are not going to wait.
And second, we need to keep an eye towards the future of
trying to find better technologies, be they biosensors, be they
radiation detectors, be they biometrics, to help us on the 5-
to-10-year time line.
Mr. Camp. The last point is that the additional
fingerprints, from what we understand now, would take a great
deal of additional time. To get in this 45-second or 50-second
window at the booth is very important in terms of not
disrupting travel for those citizens who are not trying to do
us harm. So it is a balance there.
Mr. Wein. My analysis is conservative. I am assuming each
finger takes 5 seconds. So if you did 10 fingers, it is going
to take you 50 seconds rather than 10 seconds that it currently
does.
Mr. Camp. Well, it takes longer than 10 seconds with two
fingers, because of the entire process. But I understand your
point.
Mr. Wein. Right.
Mr. Camp. We are not there yet in terms of speed.
Mr. Wein. Right. But, MITRETEK and NIST and have proposed
the four-finger slap. And, indeed, they think they can do this
quite quickly, more like doing it in 10 seconds rather than in
50 seconds. And, indeed, I have been told ergonomically that
you can actually get better prints from the slap, because your
fingers are more stable.
Mr. Camp. Thank you. My time has expired.
And I would at this time recognize the ranking member of
the Border and Infrastructure Subcommittee, Ms. Sanchez, to
inquire.
Ms. Sanchez. Thank you, Mr. Chairman.
And thank you, Professor. I am trying to understand what
you were telling us.
Are you saying that over a large range of people, an end
sample being almost infinite, or 200 million, or whatever we
have in the United States, that if we look at all of our
fingerprints, we have a 95 percent good match, but if we are
taking a look at a much smaller number, these people who we
think are terrorists or would happen to be on a list, that
because we think that they might deform their fingers in some
way or something, that the percentage would therefore be lower?
I am trying to understand how you get down to the 50
percent.
Mr. Wein. Right. The 95 percent that they give us is over
everyone. But it turns out, on the order of 5 percent, let's
just say, people have poor image quality.
For the most part, this is naturally poor image quality,
people who have worn-out fingers either genetically, or they
have scrubbed floors all of their life or whatever. Al-Qa'ida
has a large pool of terrorists to choose from to come into this
country. There are pictures on the NIST Web site of what a low-
image-quality finger looked like.
Ms. Sanchez. So they can select those people who they think
are low-image people to put into the pool of people we would be
concerned about?
Mr. Wein. Right. So they don't even have to deliberately
deface their fingers with sandpaper or chemicals or surgery or
whatnot. They can simply choose people for their U.S.-bound
missions who have poor image quality.
Ms. Sanchez. You said, if we took these 10 fingers at the
visa processing--when we were processing the visa, that it
would take about a minute a person?
Mr. Wein. Well, we would take the 10 fingers at enrollment,
so we have the 10 fingers. We wouldn't need to use all 10
fingers, except for the people with bad image quality. We would
have that information when they show up at port of entry, Oh,
this is a person who has bad image quality. We are going to use
8 or 10 fingers here at the port of entry.
What you can do at port of entry is take 10 fingers from
everyone, so that everything else can be blind to both the
operator and to the visitor of how many fingers you use to
actually try to figure out if they are on the watch-list.
Ms. Sanchez. OK. I just wanted that clear for my own
information. Thank you, Professor.
I will yield back my time.
Mr. Camp. Thank you.
Mr. Gibbons may inquire.
Mr. Gibbons. Thank you, Mr. Chairman.
Mr. Wein, thank you for being here. Appreciate your
testimony. As you know, the State of Nevada for many years has
had biometrics within their gaming industry that uses massive,
large-scale recognition of large crowds to be able to single
out a selected individual based on facial recognition features.
And I am sure that their system, while not perfect, could be an
ancillary or additional check for a person coming through
either the screening at a port or, at the same time--
But let me ask a completely different question that goes to
this quality image that we talked about. How much of the
quality is outside of the control of the Department of Homeland
Security? I mean, you talked about the characteristics of the
fingerprint,but is there a quality issue with the machine, a
quality issue with the training, a quality issue with the
software?
How much of it is outside of their control, and therefore,
what portion could be corrected by going back and doing, like
you said, software versus the quality image of having a bad
series of fingerprints?
Mr. Wein. That is a very good question. We asked ourselves
that in the process of this research.
Unfortunately, the available data from NIST doesn't exactly
answer that question. But we do have an analysis that is quite
technical--I won't go into it now--but it suggests that the
great majority of this is inherent in the fingers and is not
operational noise due to sweat and dirt and finger pressure and
things like that.
I do think it is important to train the operators to keep
the operational noise or environmental noise as small as
possible by, you know, cleaning the fingers and cleaning the
surfaces where they are putting the fingers and making sure
they are holding their fingers steady and things like that.
In talking with the US-VISIT people last week, it sounds as
if good operations processes are in place. So I think US-VISIT
is doing all they can on the image quality problem--I mean on--
in reducing, on getting rid of the operational noise. And most
of it is simply inherent in the people; that is why we really
need to make these fixes I recommended.
Mr. Gibbons. OK. Let me go back to the issue of other
biometrics, particularly facial recognition. Is facial
recognition enhanceable by increasing the number of points on a
face from today's standard--I guess what is it, 14 or something
like that?
What if the facial recognition capability were 200 points
on a given picture of a given face? Is the likelihood or
accuracy of that biometric far greater?
Mr. Wein. I can just tell you that my analysis, and what I
will distribute in the next few days to the government, cites a
paper from NIST that says for large-scale identifications, that
is, one-to-many matching for a large watch-list, facial
biometrics is inadequate to even help on the problem. It just
isn't feasible at this point in time.
Mr. Gibbons. Do you know why they say that?
Mr. Wein. The data is there. I would have to go back and
look at the paper to give the reasons. They mostly do a
statistical analysis, look at this, and conclude that the
facial recognition cannot help. It certainly is great for
verification one-on-one, are you who you say you are, but when
you are comparing it to all of the millions of people on a
watch-list, it is simply--
Mr. Gibbons. Is it because of the computer technology where
we have to sort through a large, massive database in order to
have sufficient evidence, or time or recognition features that
would allow for a more accurate determination of who the
individual is with something like that?
Mr. Wein. As I understand it from reading, there is a lot
more noise involved in taking someone's picture, the lighting,
the shadows, the angle, things like that, than there is on a
finger. That is why there are many more false positives.
And when you start thinking about a false positive, when
you are comparing against hundreds of millions of people, you
are getting back to the John Doe that the assistant secretary
was talking about. There are just too many John Doe's on the
watch-list.
Mr. Gibbons. It just seems to me that if we can control the
quality of the fingerprint, we can control the quality of the
photograph.
Mr. Camp. Would the gentleman yield?
With the new facial recognition, the lighting is not as
important as in past times. So there is some new technology
there that really gets around that problem.
Mr. Gibbons. Mr. Chairman, my time is up.
Mr. Wein. NIST has decided--has said that facial
recognition has gotten much better in the last few years, but
it still cannot help on the problem of large-scale
identification. Maybe in 5 years, hopefully, but not now.
Mr. Camp. The gentleman from Texas, the ranking member of
the full committee may inquire.
Mr. Turner. Thank you, Mr. Chairman.
Professor, the NIST scientists that our staff has talked to
say that, if anything, your numbers are very conservative, that
the quality of the fingerprint images in the terrorist watch-
list is even worse than what you are talking about.
So it seems to me that you are telling us something that is
very, very troublesome. And I don't know how much worse they
think it can be than your 50 or 52 percent number.
Did they give you any indication? Have you talked to them
about what they think about this?
Mr. Wein. I only talked to one person from NIST who was
present when I briefed the program managers from US-VISIT last
week.
It is true that NIST has said over and over again in their
papers, which are publicly available on the Web site, that the
test databases they use, in some sense are much cleaner than
the true operational databases that we are using to try to
catch terrorists. And, indeed, there is going to be lower image
quality in general on the real databases than there is on these
test databases.
Obviously, at this point in time, they are not sharing
those numbers with me, so I can't say what the magnitude of
that is. But I would agree with their assessment that my
numbers are conservative and are painting, if anything, an
optimistic view of the current operation.
Mr. Turner. I mean, this is quite disturbing. We are
talking about a program that was announced and estimated to
potentially cost the taxpayers $10 billion to put in place. And
you are saying, even by your numbers, the chances of catching a
determined terrorist may be only 52 percent.
Mr. Wein. Yes. And, you know, one good thing is that a
chunk of that, you can get maybe from 50 to, 70 or in real
terms, maybe 40 to 60 or whatever by just a few lines of
software code. So that is part of the silver lining here.
But, yes, I do want to just reiterate that a program this
expensive and this important with the implications of allowing
terrorists into this country, given that there is an existing
fix that we can do that doesn't involve--well, it does involve
some retrofit--I realize there are space constraints at the
ports of entry. But this seems like a no-brainer, that we have
the 10 fingers available, we can get it, and let's do it.
Mr. Turner. And so that fix, moving to 10 fingers and
changing the software, would move it up to where we might have
a 75 percent chance of catching a terrorist that was
determined--
Mr. Wein. Yeah. I think that is conservative. I would think
it would be higher than that.
But, again, one would really have to almost, you know, look
at the true database, and probably people with security
clearances--and I don't know if it is NIST or people at the US-
VISIT--would have to run the final numbers. But I think we
would get in the 90's.
Mr. Turner. You know, we have had a large number of Members
of Congress raise this question about why US-VISIT is based on
a two-fingerprint system, rather than a 10. Some have suggested
that even going to four would be a substantial improvement.
Do you understand and could you shed any light on why it is
that the Department chose to stay with its two-fingerprint
system, which apparently is much less effective in
accomplishing our objective?
Mr. Wein. To be honest, the last few years I have focused
on other catastrophic terrorist events, namely, smallpox,
anthrax, botulinum toxin and port security. So I have only been
working on this problem for the last few months. I was not
engaged in this problem at the time these decisions were going
on. So I would guess other people in this room would have
better answers to that.
I would--I think I will stop there.
Mr. Turner. All right. My time may be up.
Mr. Camp. Thank you.
Mr. Dicks may inquire.
Mr. Dicks. Thank you very much.
We have pointed this out to them, going all the way back to
the time when they were selecting contractors. And I don't know
why this--for some reason, they went for two, because it was
easier and faster, I think.
This is something we pointed out to them; and I think they
misled the committee, Mr. Chairman. I think the witnesses that
were here misled our committee by not pointing out this problem
with the unrecognizable or poorly done fingerprints.
I agree with you, I think terrorists are going to pick that
up and understand that. So, I think we have to go to a 10-
fingerprint system.
I have checked with some of the best experts in the world
on this, and they all agree. In fact, NIST recommends a 10-slap
fingerprint image stored in type 14.
You know, I think Congress--I think we have put in the
reports recommending to them that they do this, that they
compete it and have a competitive system. They didn't do it. I
think it has something to do with the contractor, frankly.
But having said that, we have only got 3 minutes and 40
seconds. Tell us a little bit about these other issues. We know
about this one. We know this is a mistake.
Tell us--you mentioned port security. Give us a couple of
seconds on that.
Mr. Wein. I have worked on the port security problem with
Steve Flynn. I think, A, that is a much more important problem
in the sense--it is one thing to let a terrorist into the
country; it is another to let highly enriched uranium or a
nuclear weapon into the country.
B, to their credit, I think it is a lot more difficult
problem, the technology isn't all there.
C, I think they have been dropping the ball on this
problem, and Steve Flynn and I have briefed Commissioner
Bonner's entire staff. They have put all of their eggs in the
ATS basket, and we are currently testing 5 percent of the
containers; the other ones can waltz through the system.
It is easy for a terrorist to bypass one layer of security,
particularly given the manifest rules that are in place. And we
really need to do-100 percent passive radiation testing, and we
need to do a fair amount of active testing in the sense of an
x-ray or gamma ray imaging to look for shielding.
And we also need to spend money now to to find a way to
detect highly enriched uranium, which is very difficult to
catch with existing equipment.
Mr. Dicks. You mentioned a few others, anthrax and some
other ones.
Mr. Wein. For anthrax, I have an op-ed in the Washington
Post, a paper in the Proceedings of the National Academy of
Sciences. As a result of that, your area here, Washington,
D.C., if a big attack occurs, the postal workers will help
distribute antibiotics throughout the area. Hopefully, this
program will go nationwide.
That was a direct result of our op-ed. I am currently
funded by HHS to help them decide how, if and when to deploy
the next-generation anthrax vaccine. My work on smallpox was
instrumental in affecting the Bush administration's post-attack
strategy for vaccination.
Mr. Dicks. We still don't have enough people vaccinated,
though, do we? The caregivers, isn't that still a problem?
Mr. Wein. Yes. The implementation of the front-line worker
vaccination had a number of problems with it. And, you know--
Mr. Dicks. They still haven't been corrected, have they?
They still don't have enough people vaccinated, do they?
Mr. Wein. I think this--I think it is dead in the water at
this point, until we have another terrorist attack, to be
honest.
Mr. Dicks. In other words, to get more people vaccinated,
the caregivers, we are going have to have a catastrophic event
in order to convince everybody to do that? Is that what you are
saying?
Mr. Wein. It may not have to be catastrophic, but I think
we need another event.
Mr. Dicks. Because nobody is paying attention? Is that what
you are saying?
Mr. Wein. No, it is not because no one is paying attention.
It is because--it is several reasons. It is the risk
communication, about what is the risk of--if I give the vaccine
to the frontline worker, what are the chances of them dying or
having a serious incident?
It is the perception of, is there really smallpox out
there--the whole weapons of mass destruction in Iraq, issue.
And it is a complicated problem.
Mr. Dicks. Well, again, I am troubled by this, Mr.
Chairman, that we have had a series of these hearings. I
commend the majority for having these hearings, but I think it
is pointed out again and again and again, the deficiencies in
this homeland security program.
And I don't know how we can, in the Congress, get people's
attention in the executive branch that we have got to do more
on these issues from port security, anthrax, the fingerprints
for the US-VISIT program. I mean, there are all of these
problem areas that haven't been addressed.
It is one of the things that has shocked me, frankly, in my
service here in this Congress for 28 years. I have never seen
something of this importance treated this way by the executive
branch.
I commend the committee for having the hearings, because at
least we have a chance to present the information to the
American people. But we can't seem to get anybody to do
anything about it.
Mr. Wein, I appreciate your going around and meeting with
all of the officials. I hope that they will respond to your
very lucid presentation of this gap in the fingerprinting
program. I commend you for your good efforts, and please keep
them up.
Mr. Camp. Thank you.
That concludes our questioning. There being no further
business, again I want to thank the subcommittee members and
our witnesses for being here today.
The Chair notes that some members may have additional
questions for this panel, which they may wish to submit in
writing. Without objection, the hearing record will remain open
for 10 days--
Mr. Turner. Mr. Chairman.
Mr. Camp. --for Members to submit written questions to
these witnesses and to place their responses in the record.
[The information follows:]
FOR THE RECORD
Please note: Assistant Secretaries Verdery and Hughes have departed
DHS. Deputy Assistant Secretary for Policy and Planning Elaine Dezenski
submits on behalf of A/S Verdery, Matthew Broderick, of the Homeland
Security Operations Center, submits on behalf of A/S Hughes.
Questions for the Record from Chairman Christopher Cox
1. Although the interagency charter for the Human Smuggling and
Trafficking Center between the Departments of Homeland Security, State
and Justice was just signed this past July, the 9/11 Commission's
report itself referred to this center as having produced,
``disproportionately useful results.'' The Commission staff believes
that the collective interagency effort of the Center holds great
promise to become one of the most important resources to combat
terrorism and terrorist travel.
Q02133: Please describe for the Committee how the Department is
currently working with the Human Smuggling and Trafficking Center and
more importantly, what formal plans does the Department have and what
steps has it taken to ensure that DHS does its part in ensuring this
center reaches its full potential?
Answer: The Department of Homeland Security (DHS) supports the
Human Smuggling and Trafficking Center (HSTC) in a variety of ways to
enhance border security efforts:
DHS has signed an interconnectivity agreement that
provides HSTC personnel with access to critical DHS data
systems to facilitate efficient information sharing;
DHS procured necessary equipment to provide the HSTC
with secure communications capabilities and provides the
necessary systems support;
Immigration and Customs Enforcement has assigned full-
time staff to the HSTC that serve as subject matter experts in
the areas of human trafficking, terrorist mobility and human
smuggling. DHS is also committed to providing full time
participation in the HSTC from other DHS components such as the
United States Coast Guard (USCG), Customs and Border Protection
(CBP), and Information Analysis.
DHS utilizes the HSTC to convene important interagency
coordination meetings, and to coordinate select initiatives.
DHS also utilizes the products produced by the HSTC to inform
the policymaking decision process.
DHS' commitment to the HSTC is long-term. DHS holds three seats on
the HSTC Steering Group; Acting Under Secretary Randy Beardsworth is
the DHS co-chair representative for the Steering Group, Elaine
Dezenski, Acting Assistant Secretary BTS Policy and Planning, and
Michael Garcia, Assistant Secretary of Immigration and Customs
Enforcement, serve as members on the Steering Group for the HSTC. This
group oversees and provides policy and administrative oversight of the
HSTC, and to make sure that it is operating in a manner consistent with
Constitutional liberties and national security requirements. Through
this interagency Steering Group, DHS works with our partner agencies to
ensure that the HSTC is fully supported by DHS, including personnel,
fiscal resources, and information.
(B) Q02134: What specific budget authority and personnel resources
does DHS plan to provide the HSTC?
Answer: In effecting the HSTC, DHS is more fully utilizing existing
governmental facilities that have been associated with monitoring the
flow of illegal persons, cargo and conveyances into the country. DHS is
currently reviewing the resource requirements for the HSTC and
anticipates that it will finalize both the operations funding and
personnel requirements in the very near future. Currently there are 6
ICE agents/analysts staffing the Center full time and the USCG has 3
individuals on a part-time basis.
Additionally, the Director of the HSTC is a Department of Homeland
Security (DHS) Immigrations and Customs Enforcement (ICE) Supervisory
Special Agent.
(C) Q02135: How is the DHS Office of Information Analysis sharing
information with the HSTC? And how is DHS as a whole going to share
information with the Center?
Answer: Department of Homeland Security (DHS) Office of Information
Analysis (IA) analysts have daily or near daily interaction with the
management and staff members of the HSTC during which they discuss
cables of mutual interest and collaborate on tasking and production.
Cable traffic flagged by IA personnel is sent to the HSTC via SIPRNET
(Secret Internet Protocol Router Network; the DoD-operated SECRET level
network), as are all products classified SECRET and below that contain
references to alien smuggling and terrorist mobility. If there are
documents at a higher classification, IA will share hard copies with
properly cleared HSTC members, and/or encourage HSTC to obtain the
documents by other means. Once the HSTC is equipped with JWICS (Joint
Worldwide Intelligence Communications System; the DoD-run TOP SECRET/
Sensitive Compartmented Information system), all appropriate documents
will be shared electronically. Information identified by HSTC staff is
shared with IA in a similar fashion. Similar procedures are followed
for information sharing between the HSTC and other enforcement and
intelligence entities within DHS. HSTC personnel are able to access
message traffic and finished production via connectivity to their
parent organization systems and other online data repositories.
2. My staff had several meetings with the 9/11 Commission staff
responsible for writing the terrorist travel portion of its report. And
although not specifically articulated in the 9/11 Commission Report,
its staff has pointed out in discussions with this Committee's staff
combating terrorist travel will require ``specialists'' who are located
at all ports-of-entry and that these specialists must have the ability
to contact the intelligence community directly to obtain up-to-the
minute classified information that could be used to combat terrorist
travel.
Q02136: Please comment on this recommendation of Commission staff
and indicate what concerns and roadblocks you see which might prevent
this from occurring.
Answer: CBP worked diligently after release of the 9/11 Report to
examine their findings and recommendations and make use of the report
within CBP. Some of those recommendations will be incorporated into CBP
practices and enforcement posture. By example, CBP is devoting
extensive resources to training to make frontline officers more
cognizant of the threat posed by terrorists and their weapons. To
further this field level training, CBP's Office of Intelligence has
placed an intelligence analyst at the Terrorist Mobility Group at the
Terrorist Threat Integration Center (TTIC) to be aware of the trends
and techniques and assist CBP with knowledge of these trends and
methods to identify and defeat them. \1\ We are participating in Joint
Terrorism Task Force (JTTF) squads. We are nearly completing
installation of a Special Compartmented Information Facility (SCIF) at
the CBP National Targeting Center, with access to classified materials,
to be able to support field enforcement--first and foremost,
identification of terrorists and their weapons. Moreover, we work each
day to apply whatever intelligence is derived from the Intelligence
community into appropriate actions by field officers, in a manner
consistent with the classification and sensitivity of the information.
Our concerns would be more pedestrian--the length of time to obtain
clearances for employees, which are needed to help work through the
ever-growing volume of intelligence and classified material and the
need for training employees to think and work as intelligence analysts
do.
---------------------------------------------------------------------------
\1\ On December 6, 2004, the NCTC undertook all responsibilities
assigned to the TTIC.
---------------------------------------------------------------------------
When CBP officer encounters a possible terrorist, they are required
to contact the CBP National Targeting Center (NTC) and relay all the
specifics of the individual for further review. In all cases where the
NTC cannot discount the individual is a match to the terrorist, the
Terrorist Screening Center (TSC) is contacted. The TSC has complete and
full access to all of the derogatory information associated to the
record and passes it back to the NTC when appropriate. The passing of
information is only limited to the clearance level of the NTC officer
and the security level of the communications into the NTC. The NTC, in
turn, will relay enough information back to the port of entry (POE) for
the front line officer to make appropriate decisions. The TSC will also
contact the FBI Counter Terrorism Watch (CTW) with information on the
encounter. The CTW acts as the operational arm for the TSC and will
relay operational instructions to CBP. They can also dispatch the local
Joint Terrorism Task Force (JTTF) and have the ability to pass
classified information to the cleared JTTF members.
There are two limitations to getting classified information to the
POE. The first issue is the clearance level of CBP personnel in the
field is rarely above the SECRET level and most derogatory information
today is at the Top Secret and Code Word levels. The other issue is the
lack of a secure communications path to the ports and how to get
classified information to a non-SCIF environment. Two possible
solutions are to make the NTC SCIF operational and/or to rely on the
clearance levels of the JTTF teams. The JTTF approach is already in
place and appears to be working.
3. As you are already aware, ICE's Forensic Document Lab is the
only Federal crime lab dedicated almost entirely to the forensic
examination of documents and has been doing so since 1978-and
specializes in the identification of fraudulent visas and passports.
Besides the FDL's role as the leading resource on fraudulent passports
and visas to other Federal agencies, including the FBI and Department
of State, the FDL's Library houses the largest known repository of
known genuine travel documents. I have two questions related to the
FDL,
(A) Q02137: Since the FDL is the leader in such documents, what
concerns do you have that both the Department of State and the
Department of Justice, both consumers of the expertise and resources
available through the efforts of the FDL, may be planning to set up
their own capabilities in the identification of fraudulent documents?
Answer: At present, we are not aware of any initiatives by either
the Department of State (DOS) or Justice to develop their own
capabilities in the identification of fraudulent documents. Several
years ago, however, the DOS expressed an interest in establishing such
a capability. When the Forensic Document Lab (FDL) learned of this, FDL
representatives initiated a meeting with DOS officials to express their
concern over the potential duplication of effort and unnecessary
expenditure of resources. The FDL reiterated its willingness to provide
forensic and operational support to all DOS entities. Subsequently, the
DOS decided that its plan represented duplication of effort, and rather
to continue to utilize the FDL's unique resources and expertise.
Central to the FDL's forensic and field operations support
functions is its exemplar library, which presently contains more than
120,000 known genuine travel and identity documents and other resource
materials from every country of the world. The library, the largest
known collection of its kind and continually growing, represents a 25-
year effort by FDL staff which would take enormous time and resources
for another agency to replicate. A far more feasible and cost effective
approach would be to dedicate additional resources to expand the FDL
library and extend its availability to more federal, state, and local
user agencies.
Q02138: And do you think that instead of duplicating efforts in
other Federal agencies that instead more resources should be dedicated
to the FDL and it expanded in light of the new importance being placed
upon the disrupting of terrorist travel?
Answer: DHS agrees with the view of the 9/11 Commission Report that
``targeting travel is at least as powerful a weapon against terrorists
as targeting their money.'' DHS has devoted additional attention and
resources to the analysis and disruption of terrorist travel. CBP has
created the Fraudulent Document Analytical Unit (FDAU) to analyze the
travel of suspected terrorists and the documents they use. CBP
coordinates closely with ICE and the FDL so that the unparalleled
experts at the FDL can forensically examine suspect documents, issue
any necessary alerts, and modify the training in fraudulent document
recognition that FDL offers accordingly. DHS believes that the FDL is
the leading government entity in the identification of fraudulent
travel documents and it would not be a prudent use of resources for
other government agencies to seek to replicate the expertise that FDL
already provides so well.
(B) Even with the FDLs limited resources and current staff of only
51, it impressively provides training to not only the agencies within
DHS, (ICE, CBP, CIS, and the USCG), but also to other Federal agencies
(State, Justice, IRS, SS Administration) and to state and local law
enforcement and they can barely keep up with the requests for training
currently.
Q02139: Please describe for the Committee how the Department plans
to build upon the expertise of this office and enhance its ability to
provide necessary training-including ongoing training-to DHS and other
Federal agency personnel?
Answer: ICE is working to develop a strategy to establish an
operational entity within the FDL to provide proactive, high quality
training in fraudulent document recognition, specifically tailored to
the needs of students from a wide variety of domestic and foreign law
enforcement organizations, intelligence agencies, and private sector
employers. In addition, the FDL would provide training courses and
material to formally certify Document Instructors for DHS and other
federal, state, and local agency personnel. The FDL would also develop
training modules and presentations for use by ICE offices overseas in
implementing outreach programs to educate and liaison with foreign
enforcement agencies. The outreach materials would focus on document
fraud and threat awareness training, and acquaint foreign officials
with FDL capabilities and access protocols.
Questions from Chairman Dave Camp and Chairman Jim Gibbons
1. Q02140 How is classified information disseminated to front line
border and consular officials?
Answer: In the U.S. Customs and Border Protection, classified
information is reviewed by a team of intelligence analysts for
information pertaining to terrorists attempting to enter the country or
smuggle weapons of mass destruction into the United States. When
appropriate, the analysts request a downgrade of information from the
originating agency to put into the Sensitive but Unclassified (SBU)
system that is available to the front line officers. This information
could be as simple as the name of a person or as complex as performing
analysis of various pieces of information to put into an intelligence
alert or report, a trend analysis, or a threat assessment which again
is entered into the SBU system.
Currently if classified information needs to be sent to the field,
it is secure faxed or, if possible, verbally conveyed by way of STU/
STE. CBP completed installation of the Homeland Secure Data Network
(HSDN) in 24 offices in Calendar Year (CY) 04 for secure communications
up to the Secret level.
The National Targeting Center (NTC) and Terrorist Screening Center
(TSC) work together to identify and vet potential terrorists intending
to travel to, or ship cargo to the U.S. and prevent them from entering
or endangering the U.S. The NTC is a resource to CBP field officers for
coordination and communication. It is also one of the TSC's largest
customers for requesting additional identification of internationally
traveling personnel or cargo that may have terrorist ties.
The NTC has the unique mission to provide a centralized
communication point for all CBP field officers and a coordination
center for all CBP Office of Field Operations anti-terrorism
activities. This presents other agencies with the benefit of having a
single point of contact (the NTC) for communicating anti-terrorism
information and it ensures a coordinated, managed approach toward
focusing CBP resources that is accountable across all levels of CBP.
2. The National Targeting Center (NTC), located in U.S. Customs and
Border Protection (CBP), and the Terrorist Screening Center (TSC) both
screen people and cargo using multiple databases.
Q02141: How do these centers work together and how do they
distinguish their unique missions?
Answer: The NTC and TSC work together to identify and vet potential
terrorists intending to travel to, or ship cargo to the U.S. and
prevent them from entering or endangering the U.S. The NTC is a
resource to CBP field officers for coordination and communication. It
is also one of the TSC's largest customers for requesting additional
identification of internationally traveling personnel or cargo that may
have terrorist ties.
The NTC has the unique mission to provide a centralized
communication point for all CBP field officers and a coordination
center for all CBP Office of Field Operations anti-terrorism
activities. This presents other agencies with the benefit of having a
single point of contact (the NTC) for communicating anti-terrorism
information and it ensures a coordinated, managed approach toward
focusing CBP resources that is accountable across all levels of CBP.
It also has the added benefit of having entities knowledgeable
about CBP operations conveying specific information regarding anti-
terrorism efforts that is specific and germane to the operating
environment.
The TSC is the clearinghouse for all encounters with known or
suspected terrorists and as such is a significant resource for the
National Targeting Center. Additionally, the NTC is the research center
for CBP field officers for all potential terrorist or terrorism
identifications. The NTC researches all terrorist field alerts and will
contact the TSC for any additional classified derogatory information
that may not be readily available to CBP field officers. By
centralizing this capacity, clean, secure lines of communication and
roles can be established between the TSC and NTC. Through this process
the TSC can contact the FBI Counter Terrorism Watch (CTW). The CTW, in
turn, can dispatch the local Joint Terrorism Task Force (JTTF) and
ensure an FBI case exists on the individual. In cases where an FBI case
does not already exist, the National Joint Terrorism Task Force is
contacted and they initiate a threat assessment on the subject. All
information collected from the encounter is pushed back to DHS, FBI,
NCTC and member of Intelligence Community (IC) for further analysis.
The CTW coordinates the appropriate response through the NTC and they
serve as the conduit for getting the appropriate information directly
to the CBP field officers.
a. Q02142: Do these centers work with the Human Smuggling and
Trafficking Center (HSTC)?
Answer: DHS can not speak for the TSC; however, the National
Targeting Center is CBP's centralized anti-terrorism communication and
coordination center for CBP's Office of Field Operations. As such, they
routinely exchange available information with other agencies and their
operations centers.
b. Q02143: How does the Department of Homeland Security envision
these centers roles and responsibilities changing once the National
Counterterrorism Center (NCTC) is created?
Answer: CBP sees the role of the NTC becoming even more significant
once the NCTC is created. There will continue to be a need for CBP to
centralize its anti-terrorism communication and coordination with its
field assets. The need for the NTC will continue to be vital for
managing effective and efficient communications from external sources
and passing it down to CBP field officers, as well as, collecting
information internally from CBP field officers and passing it up to
external sources. A side benefit from this accountability process is
that the NCTC or other centers are not responsible for knowing how to
best communicate information to CBP field officers in and between over
300 ports, or have telephone lists.
3. Homeland Security requires a strong international security
policy. The Department of State is the face of the U.S. Government
overseas and is our first line of defense, through the visa review
process, against potential terrorists entering the United States.
Q02144: How does DHS share information with State Department?
Answer: State's Consular Lookout and Support System (CLASS)
receives over 3 million watch-listings from DHS systems, including the
Treasury Enforcement Communications System (TECS).
In the context of visa security specifically, State Department
shares visa applicant and adjudication data with the Visa Security
Program, and the Visa Security Program shares the results of its
reviews with State. State also provides watch-listings and lost and
stolen passport information to TECS (over 850,000 records).
USCIS' Office of Fraud Detection and National Security (FDNS) meets
on a monthly basis with DOS' Office of Fraud Prevention Programs to
discuss cross cutting issues. In addition, FDNS is drafting a
Memorandum of Understanding (MOU) with DOS's Visa Office (VO) on data
sharing. Pursuant to the MOU, USCIS will obtain access to DOS'
Consolidated Consular Database (CCD) and certain reports and systems
accessible through the CCD and DOS will be granted access to certain
USCIS databases.
During the visa application process, biometric and biographic
information collected by consular offices is queried against selected
databases via an electronic interface with US-VISIT. At the POE, the
inspecting office can verify biometric and biographic information
provided by the travel against the DOS visa information through US-
VISIT.
Q02145: Are there common training programs regarding terrorist
indicators and fraudulent documents?
Answer: In the context of visa security specifically, the Visa
Security Program is developing a training program for consular officers
that will address numerous issues relevant to effective consular
adjudication of visa applications, including terrorist indicators and
fraudulent documents. These trainings will leverage training material
that is included in the Program's training curriculum for Visa Security
Officers. The FDL does provide fraudulent document training to State
and other agencies and will continue to do so.
4. Is the following available to DHS personnel including front line
agents? If it is, what agency provides this information?
(A) Q02146: The number and type of fraudulent documents used broken
down by country over the past month, quarter, or year?
Answer: CBP collects information on fraudulent documents in several
ways. One source is through its statistical collection Form G-22
Inspections Workload Report provided by the ports of entry. The Form G-
22 data provides only the number of various types of fraudulent
documents intercepted, but does not provide the country of origin. In
January 2005, CBP established the Fraudulent Document Analysis Unit
(FDAU), now the collection point for fraudulent documents confiscated
at the ports. The FDAU collects additional categories of statistics, to
include the number of passports, country of origin, and the nationality
of the person who presented the document, and conducts regular analysis
of fraud trends and significant interceptions which will be
disseminated to DHS front line agents. The FDAU expects to have data
ready in these categories by July for the first six months of this
calendar year. The United States also intercepts other fraudulent
travel documents in addition to passports, including Mexican border
crossing cards and U.S. permanent resident cards. The FDAU expects to
disseminate statistical information on fraudulent travel documents to
the ports and others every six months.
(B) Q02147: Information regarding stolen and fraudulent passports
and documents acquired from collection activities abroad?
Answer: It is crucial that component frontline CBP officials
receive information regarding lost, stolen and fraudulent passports (or
other travel documents). CBP systematically receives reporting from the
Department of State and other federal agencies regarding lost and
stolen passports and fraudulent documents. This information migrates to
CBP Inspectors via electronic interface through the Treasury
Enforcement Communications System (TECS) and the Consular Lookout and
Support System (CLASS). Additionally, the DHS Office of Information
Analysis (IA) and other Intelligence Community (IC) members
periodically produce and disseminate lengthier pieces of unclassified
finished intelligence for line agents. Such products may address
trends, such those pertaining to lost and stolen passports, or may be
crafted as specific hands-on guides. There are ongoing initiatives to
improve the speed at which classified data is made available to line
agents at the UNCLASSIFIED level. For example, IA is working with the
IC to establish a standard whereby the pertinent portions of classified
information concerning lost and stolen passport information will be
automatically downgraded so that the information can immediately be
sent to CBP's National Targeting Center. This would allow the frontline
officers to more quickly query the Interagency Border Inspection System
(IBIS) database to ascertain if the passport is from a lost/stolen
batch or known fraudulent document. The FDL's Operational staff
provides seven day a week (and Holidays) assistance to CBP field
personnel regarding fraudulent documents. The Operations staff has
access to the largest collection of foreign and domestic travel and
identity documents in the world. They also have access to the Image
Storage and Retrieval System (ISRS--photos, fingerprints and signatures
from tens of millions of ``green cards'' and Employment Authorization
cards), DOS's DataShare (database of photos and biographical data from
millions of U.S. non-immigrant visas and U.S. passports), EDISON (image
database of passports of every country in the world and other DHS
databases. The FDL officers themselves have many years experience in
examining travel and identity documents. The operations staff develops
and disseminates Document Intelligence Alerts, Document Reference
Guides and Fraudulent Document Briefs. They also develop and conduct
fraudulent document training for CBP officers. As part of the
Department's work in this area, the DHS Privacy Office is working
collaboratively with other program offices to research the pragmatic,
policy and privacy protection issues related to a distributed model for
the exchange of passport-related data (lost, stolen, identity
verification) where participating governments would control access to
the personal information of their travelers and be able to verify
travelers and travel documents of others in real time.
(C) Q02148: On site resources at high traffic ports of entries to
assist agents in identifying fraudulent documents or terrorist
indicators on documents?
Answer: Most high traffic ports of entry have the EDISON system on
site. This is a computerized database containing images of travel
documents and their security features from all countries. The system is
used for comparative purposes when examining questioned documents.
Altered and counterfeit documents are also contained in the database
for reference.
Ports have on site training staff and reference documents to assist
Officers in identifying fraudulent documents or terrorist indicators.
Immigration and Customs Enforcement (ICE) Forensic Document Laboratory
(FDL) provides all ports with immediate assistance in document
verification through their Intelligence Officers. The FDL produces and
distributes Document Alerts to the ports illustrating recent fraudulent
document interceptions.
The Customs and Border Protection (CBP) Fraudulent Document
Analysis Unit (FDAU), as it comes on line, will provide both strategic
and tactical information to ports of entry regarding recent trends of
document abuse identified through an analysis of document interceptions
at ports of entry. This information will enable CBP officers to be on
the alert for new patterns of fraud.
5. Q02149: What is the Department doing to deal with the problem of
altered and counterfeit passports and visas?
Answer: The FDL's Operational staff provides seven day a week (and
Holidays) assistance to all DHS personnel, other federal agencies,
foreign immigration/border control authorities, State and local police
and DMV and Social Security personnel in all matters relating to
fraudulent documents. The Operations staff has access to the largest
collection of foreign and domestic travel and identity documents in the
world. They also have access to the Image Storage and Retrieval System
(ISRS--photos, fingerprints and signatures from tens of millions of
``green cards'' and Employment Authorization cards), DOS's DataShare
(database of photos and biographical data from millions of U.S. non-
immigrant visas and U.S. passports), EDISON (image database of
passports of every country in the world and other DHS databases. The
FDL officers themselves have many years experience in examining travel
and identity documents. The operations staff develops and disseminates
Document Intelligence Alerts, Document Reference Guides and Fraudulent
Document Briefs. They also develop and conduct fraudulent document
training for all DHS personnel, other federal agencies, foreign
immigration/border control authorities, State and local police and DMV
and Social Security personnel (FDL's longstanding relationships) The
FDL has continually participated in international working groups and
conferences for over 20 years. The FDL was instrumental in the creation
of the International Immigration Fraud Conference (IFC) which is
comprised of 20 Western European and North American countries) that
meet annually to exchange information on document fraud, fraudulent
document training and document examination equipment. The FDL has also
participated in Interpol's Fraudulent Document Working Group that
develop minimum standards for passports. The FDL chaired the Security
Working Group to develop minimum standards for U.S. driver's licenses
and identification cards mandated by the Intelligence Reform Act of
2004.
We are working well with our international and interagency partners
on improving standards for travel documents, aviation safety, port
security and the exchange of watchlist information. The appropriate and
secure use of biometric identifiers will assist in all these efforts.
We use biometric identifiers as tools to help prevent the use of
fraudulent travel documents and identities so that we can be more
confident and secure about our admissions and screening decisions. DHS
has conducted a review of the use of biometrics to ensure that we are
coordinating the implementation of biometric technology across the
Department. In the international arena, we are working closely with our
European counterparts in the G-8, the International Civil Aviation
Organization (ICAO) and other international fora to discuss how to
advance biometric methodologies, both in chip technology and electronic
readers, by establishing standards to ensure global interoperability.
The most notable success in our efforts is the creation of US-
VISIT, a biometric entry-exit system. This system not only allows the
Department to know who has entered the United States, but also captures
a photograph and scans of index fingers to prevent the use of
fraudulent identities to circumvent detection and employs biometric
visa data shared by the US Department of State. In addition, the US-
VISIT data is shared with law enforcement and intelligence agencies as
appropriate. Other initiatives undertaken by the Department include the
promulgation of regulations to ensure that passenger data is collected
and provided to law enforcement agencies for screening purposes,
including efforts to target terrorists through the National Targeting
Center; participation in the G8 Lyon Roma group focusing on terrorism;
setting passport issuance standards and fraud prevention.
Q02150: How is the Department working with other federal agencies
to deal with this problem?
Answer: The Department utilizes the resources of the Forensic
Document Laboratory to ensure that information about fraudulent
documents is disseminated to appropriate agencies within and outside
the Department. Distribution of ``Document Alerts'' based on
information obtained from intercepted fraudulent documents will be the
major ports of entry throughout the United States, ICE, CBP, and CIS
offices, Federal law enforcement training centers, various law
enforcement intelligence services, the US Department of State, the US
Secret Service, and the US Federal Protective Service. When
appropriate, alerts will also be sent to the Social Security
Administration, relevant Department of Motor Vehicles, and several
transportation trade organizations such as the International Civil
Aviation Organization, National Maritime Organization and International
Council of Cruise Lines. The widest distribution of information on
altered/fraudulent travel document is essential to addressing the
problem.
6. Q02151: Describe in detail the technologies and training methods
the Department is using to detect terrorist indicators on travel
documents.
Answer: In the context of visa security specifically, the Visa
Security Program is training its officers in terrorist indicators and
document evaluation. The Program is leveraging the resources of ICE
Forensic Document Laboratory (FDL). CBP and the FDL have created a
train the trainer session that has brought in more than 300 CBP
Officers into the FDL for a 3-day intensive training session. They stay
another day and are given the material they will take back to the port
in order to teach an 8-hour course. This course is currently a
prerequisite to some of our cross training efforts, such as our Anti-
Terrorism Passenger course and Unified Primary. As of November 5, 2004,
more than 4566 Officers have participated in this 8-hour course. In
addition, using advance passenger information, the National Targeting
Center accesses a variety of databases to identify travel and document
patterns which might indicate terrorist connections.
Q02152: Again, how is the Department coordinating its efforts with
other federal agencies?
Answer: In the context of visa security specifically, the Visa
Security Program coordinates closely with State. At posts where Visa
Security Officers are deployed, the VSOs work closely with consular
officers; share information about fraud documents, fraud schemes, and
terrorist activity and indicators; and provide training to enhance
consular officers? ability to recognize those during the consular
adjudication process. The VSOs also work with the law enforcement and
intelligence communities at post and share information to support their
efforts.
The HSTC is utilized by DHS to convene important interagency
coordination meetings, and to coordinate select initiatives and has
signed an interconnectivity agreement with the HSTC that allows HSTC
personnel, including non-DHS personnel, to access DHS information
systems. DHS has also provided information technology resources to
provide secure communications capabilities to HSTC personnel. Equally
important, however, numerous agencies are able to communicate directly
with the HSTC's staff on a daily basis on a wide range of policy,
intelligence, and operational issues that impact our efforts to secure
the homeland.
7. Q02153: Is the training provided to our front line border
personnel sufficient?
Answer: Together with the FDL, we have created a train the trainer
session that has brought in more than 300 CBP Officers into the FDL for
a 3-day intensive training session. They stay another day and are given
the material they will take back to the port in order to teach an 8-
hour course. This course is currently a prerequisite to some of our
cross training efforts, such as our Anti-Terrorism Passenger course and
Unified Primary. As of November 5, 2004, more than 4566 Officers have
participated in this 8-hour course.
Q02154: Or do we need a terrorist travel specialist at our ports-
of-entry who can provide this information but also protect classified
information?
Answer: The trainers described above, however, are not only
equipped to teach this single course, but now have the materials and
technical experience to teach additional port specific material. These
are the technical experts and this pool of personnel will continue to
expand, with the continued help of the FDL.
As noted, CBP will establish a complementary function at selected
field locations to ensure that there will be a specialist available to
ports of entry at all times. This unit, and the field specialist, will
work closely with the CBP Office of Intelligence and the intelligence
community as a whole to ensure our front line border officers have the
best and most up-to-date information available to safeguard the United
States.
Q02155: Do all the front-line personnel who need clearances to
utilize current threat information in their activities have the
appropriate clearances?
Answer: All appropriate front-line personnel who need clearances
have them or are in the process of obtaining the required clearances.
8. Q02156: What is the Department doing to uncover clandestine
travel among terrorists?
Answer: The Department has instituted a number of initiatives
designed to target clandestine travel by terrorists. As noted in the 9/
11 Commission Report, targeting terrorist travel is a powerful weapon,
and constraining terrorist travel is part of the Department's overall
strategy. As part of this effort, we are working well with our
international and interagency partners on improving standards for
travel documents, aviation safety, port security and the exchange of
watchlist information. The appropriate and secure use of biometric
identifiers will assist in all these efforts. We use biometric
identifiers as tools to help prevent the use of fraudulent travel
documents and identities so that we can be more confident and secure
about our admissions and screening decisions. DHS has conducted a
review of the use of biometrics to ensure that we are coordinating the
implementation of biometric technology across the Department. In the
international arena, we are working closely with our European
counterparts in the G-8, the International Civil Aviation Organization
(ICAO) and other international fora to discuss how to advance biometric
methodologies, both in chip technology and electronic readers, by
establishing standards to ensure global interoperability.
The 9/11 Commission Report also advised that the Department needed
to look even more closely at our aviation security initiatives and give
special attention to improving each of the layers of the security
system. The improvements in the layered approach include using
biometric identifiers as well as using airline passenger data
appropriately--both passenger name record (PNR) data and advanced
passenger information system (APIS) data, which are screened against
law enforcement databases by the National Targeting Center.
The most notable success in our efforts is the creation of US-
VISIT, a biometric entry-exit system. This system not only allows the
Department to know who has entered the United States, but also captures
a photograph and scans of index fingers to prevent the use of
fraudulent identities to circumvent detection employs biometric visa
data from US Department of State. In addition, the data is shared with
law enforcement and intelligence agencies as appropriate. Other
initiatives undertaken by the Department include the promulgation of
regulations to ensure that passenger data is collected and provided to
law enforcement agencies for screening purposes, including efforts to
target terrorists through the National Targeting Center; participation
in the G8 Lyon Roma group focusing on terrorism; setting passport
issuance standards and fraud prevention; continuation of the National
Security Entry Exit Registration System (NSEERS) for special interest
travelers; and the use of the Student and Exchange Visitor Information
System or SEVIS to monitor the activities of foreign students.
Additionally, the Department is actively working with the FBI and the
Department of Justice, which already provides terrorist and criminal
fingerprint data to US-VISIT to allow FBI access to data collected by
US-VISIT at the ports of entry. Through these and other efforts, and
the sharing of data with the appropriate agencies, the Department is
working diligently to uncover clandestine travel by terrorists.
DHS has coordinated improvements to security in the maritime arena
by its implementation of a layered system of screening vessel arrivals
to the U.S. Since 9/11, the USCG has been added as formal member of the
Intelligence Community, created Maritime Intelligence Fusion Centers on
the Atlantic and Pacific coasts, begun fielding Field Intelligence
Support Teams in major U. S. ports, created the National Vessel
Movement Center, and created the Coastwatch Program at the Intelligence
Coordination Center in Suitland, MD. All of the programs are
interagency coordinated efforts to bring together federal, state, and
local agencies with a role on the protection of maritime assets an
infrastructure. They all play significant roles in screening and
collecting intelligence information on arriving ships, crew, and
passengers that enter the U.S.
In addition, the services and unique expertise of HSTC personnel
directly supports the Commission's call for enhanced connectivity
amongst law enforcement and intelligence entities. This enhanced
connectivity will improve the U.S. Government's effectiveness in
combating terrorism, as well as supporting an enhanced worldwide focus
on travel and identity document fraud. Furthermore, the HSTC's
interagency environment provides the opportunity to apply this approach
to the serious problems of human trafficking and human smuggling.
For the first time, the HSTC brings together federal agency
representatives from the policy, law enforcement, intelligence, and
diplomatic arenas to work together on a full-time basis to achieve
increased progress in addressing the problems of human smuggling, human
trafficking and clandestine terrorist mobility. Additionally, the HSTC
has access to several interagency, national, and international
databases that contain information relative to human smuggling and
human trafficking that may not be readily available through other
sources. This combination of on-site expertise and accessibility to
sensitive information provides the U.S. Government and foreign allies
with a unique opportunity to more effectively identify and dismantle
smuggling and trafficking organizations, and terrorist travel
facilitators by working together to attack these threats on multiple
fronts.
9. Q02157: How is the Department developing techniques to counter
the evasive methods terrorists use to travel?
Answer: The Department is actively involved in developing
techniques to counter evasive methods used by terrorists to travel.
Through the use of biometrics and the US-VISIT program, the use of
fraudulent identities to enter the United States can be effectively
countered. Through US-VISIT, and in conjunction with the Department of
State's Biometric Visa Program, the Department has created a ``virtual
border'' as a line of defense against entry by terrorists. Travelers
seeking visas are screened against biometric and biographic watchlist
to identify criminals, terrorists, and immigration violators. DHS is
also working internationally to counter terrorist travel by
participation in the G8 Lyon Roma group targeting terrorism and the use
of fraudulent identification documents. In addition, the Department is
in the process of implementing the legislative mandate of Section 428
of the Homeland Security Act. The Department will deploy experienced
DHS law enforcement officers to U.S. embassies and consulates. These
officers will perform in-depth investigative reviews of high risk visa
applicants, conduct training programs for Department of State consular
officers, initiate investigations, conduct homeland security law
enforcement liaison, and research and disseminate intelligence.
The Department is also home to the Forensic Document Laboratory,
the premiere fraudulent document laboratory in the world. It maintains
an extensive library of travel documents, as well as trained forensic
experts and intelligence officers who provide expertise throughout the
Department.
For aviation travelers, the department collects advance passenger
information system data (APIS) otherwise known as manifest data, which
is screened against law enforcement data bases and watch-lists. For
specific flights, the Department also collects and vets passenger name
record (PNR) data which may contain more detailed information about the
passenger's itinerary. In addition to using passenger date, DHS has
also piloted the Immigration Advisory Program (IAP) through which small
teams of CBP Immigration Advisory Officers with strong immigration
backgrounds are assigned to foreign airports to work with host country
officials to identify potentially high-risk or inadmissible passengers
before they board planes bound for the United States.
DHS recognizes that there is no single solution to prevent
airplanes from being used as weapons of terrorism. The improvements in
the layered approach include using biometric identifiers to deter visa
fraud, sharing lost and stolen passport information through Interpol,
promoting a global standard for machine readable passports, using
airline passenger data appropriately, expanding no-fly lists, screening
domestic and international passengers against no-fly lists, including
more travelers in US-VISIT, boosting airline security utilizing Federal
Air Marshals on international flights of concern, hardening cockpit
doors, and offering voluntary programs for arming pilots on passenger
and cargo planes for domestic flights.
Through the collection and dissemination of information, through
the use of biometrics, and new approaches and technology such as US-
VISIT, the Department is constantly seeking out ways to detect and
counter the evasive methods used by terrorists to travel.
In addition, the HSTC staff is collecting, correlating, analyzing
and disseminating domestic and international information on clandestine
terrorist travel on a continual basis. These activities include:
Daily SECRET cables from select U.S. government
sources via DOS Cable Xpress.
Daily notices of activities, items of interest, and
intelligence from domestic, overseas and foreign sources.
National and foreign fraudulent document alerts.
Consular fraud notices and intelligence alert
bulletins.
Foreign law enforcement reports, notices and alerts.
Foreign government periodic reports on:
Immigration
Identity and travel document fraud
Terrorism
National Security
The HSTC will support and exchange information with the NCTC and
other U.S. agencies and organizations active in the war on terrorism,
trafficking in persons and human smuggling. It will also coordinate
feedback amongst the various diplomatic, law enforcement, and
intelligence agencies.
10. International coordination is essential to prevent terrorists
from traveling into our country.
Q02158: What is the Department doing to coordinate with the
international community to prevent terrorist travel?
Answer: The 9-11 Commission Report stated: ``The U.S. government
cannot meet its own obligations to the American people to prevent the
entry of terrorists without a major effort to collaborate with other
governments. We should do more to exchange terrorist information with
trusted allies, and raise U.S. and global border security standards for
travel and border crossing over the medium and long term through
extensive international cooperation.'' The bombings in Madrid, the more
recent hostage crisis in Beslan, Russia and the Australian Embassy
bombing in Jakarta also serve as vivid reminders to us that terrorism
is an international threat that cannot be conquered alone. DHS
understands that we must engage in a global effort each day, through
collaboration, information sharing and ongoing dialogue to ensure that
our efforts are informed, coordinated, and effective.
As part of this effort, we are working well with our partners
bilaterally and within multilateral organizations to improve standards
for travel documents, aviation safety, port security and the exchange
of watchlist information.
The Department is working closely with our the international
partners in the EU as well as with Canada, Mexico and other foreign
governments to ensure that developments and initiatives in border and
transport security are discussed, coordinated, and clarified before
they are implemented.
We are taking such steps every day. For example, together with our
colleagues in the Department of State, DHS is addressing security
challenges posed by lost and stolen passports. Through the efforts of
the Departments of State and Justice, the U.S. has provided over
300,000 records of Lost and Stolen passports to the Interpol's lost and
stolen document database, which is available to border authorities
worldwide. We continue to encourage our international partners to join
us in this effort. Additionally, the US is initiating a scoping study
to assess a technology concept that helps address this concern. The
Enhanced International Travel Security (EITS) concept, which has been
addressed in the G-8 context, uses distributed databases as a mechanism
to allow real-time exchange of to the basic information needed- i.e., a
``yes'' or ``no'' response--concerning the validity of a document
without requiring visibility into the data that allows that
determination. The approach would be very similar to that already used
worldwide by the banking industry to support ATMs. Developing better
systems for international sharing of information, and expanding
participation to more countries will improve our ability to identify
and screen travelers before they enter our country.
Another area on which we are working to make significant
enhancements involves the Visa Waiver Program and US-VISIT. DHS, with
the assistance of Department of State, is in the process of completing
the country evaluations required under the Visa Waiver Program statute.
These reviews involve site visits to each of the participant countries.
Overall, the cooperation of the VWP countries' governments has been
exceptional. Additionally, on September 30, 2004, we began processing
nationals from VWP countries through in US-VISIT. The Department
engaged in multiple forms of outreach to ensure the countries and their
citizens were prepared for the expansion of the program.
To address possible risks, prior to flight departure, the
Department has piloted the Immigration Advisory Program (IAP) in Poland
and the Netherlands and is exploring other locations to expand this
program. Host countries have shown support for this reciprocal program
that has CBP officers assisting in examining travel documents and
screening the flight manifests to make determination of whether
passengers are adequately documented or likely to be found inadmissible
upon arrival in the United States. Such efforts save the air carriers
from penalties and providing an extra layer of security prior to
departure.
Since the establishment of the Department, the leadership of DHS
has worked to establish and enhance the critical international
relationships and partnerships with foreign counterparts. Coordinated
efforts and continuous dialogue have proven vital to pursuing the DHS
mission, whether it be through well-established legacy agency dialogues
with Mexican and Canadian neighbors, the new Joint Contact Group
meetings with United Kingdom officials that examine issues relating to
all aspects of Homeland Security, the continuous discussions with
European Union (EU) and the EU Member States. In addition, Department
officials engage with foreign partners within the various international
fora such as ICAO, World Customs Organization (WCO), International
Maritime Organization (IMO), the G-8, Organization for Security and
Cooperation in Europe and many others.
DHS has also connected the Canadian Government Operations Center,
the United Kingdom's Civil Continingincies Secretariat, National
Security Advice Center, to the Homeland Security Information Network.
This network provides 24/7 connectivity, at the SBU level, from each of
these locations to the Homeland Security Operations Center.
Q02159: How is the Department working with our neighbors, in Canada
and Mexico in particular, to devise a coordinated anti-terrorist travel
strategy?
ANSWER: The Department values the strong partnership of the
Governments of Canada and Mexico in securing international travel.
While the work plans with our neighbors are similar in many respects,
they are also tailored to the specific capacities and realities of each
government. We are proceeding on two bilateral tracks rather than a
trilateral track at this time although there is strong potential for
convergenceSec. the future.
On December 11, 2001, the U.S. and Canada signed a Smart Border
Plan originally containing 30 concrete initiatives to secure the
infrastructure, flow of people, and flow of goods and to share
information. A few short months later in March 2002, the U.S. and
Mexico signed a 22-point Border Partnership Action Plan organized under
the pillars of secure movement of goods, secure movement of people, and
secure infrastructure. Together with our neighbors we recognized that
our current and future prosperity--and security--depend on borders that
operate efficiently and effectively under any circumstance.
General
Progress is steady and many of the initiatives have already been
implemented or are near completion. In other cases, on-going processes
are required. Others, like our cooperation on human smuggling and
trafficking, are ongoing activities that continue to be strengthened as
we deepen our relationships. Some goals will require many years and
extensive investment before they are in place. In some cases, such as
the electronic sharing of information, the process is itself the goal.
Still in other cases, long-term investment, political will and effort
will be necessary to achieve the goal.
APIS
Of particular note is the progress in sharing advanced passenger
information. Currently, Canada and Mexico require international air
carriers to send electronically manifest information for commercial
flights destined to their countries. We are vetting the APIS data
against relevant databases and have already developed with Canada a
means to exchange bulk and individual records. Additionally, Customs
and Border Protection (CBP) has developed common risk-scoring
algorithms with its Canadian colleagues as well as a mechanism to
resolve hits. Under the U.S.--Mexico Smart Border Action Plan, the GOM
transmits APIS data to CBP. Commercial air carriers transmit API data
to the GOM as required by law. The Mexican API data is retransmitted by
the GOM to CBP via the existing CBP APIS infrastructure. In May 2004,
the GOM designated Centro de Investigacion y Seguridad Nacional (CISEN)
as the lead point of contact for the Mexican APIS program.
Integrated Border Enforcement Teams (IBET)
In support of the Canada-United States Smart Border Declaration and
Action Plan for creating a secure and smart border, Integrated Border
Enforcement Teams (IBETs) seek to identify mutual national security
threats and combat illicit cross border activity. IBETs are multi-
agency field level groups of law enforcement officials dedicated to
securing the integrity of the Canada/United States border while
respecting the laws and jurisdictions of each nation. The IBET mission
is to enhance border integrity and security at our shared border by
identifying, investigating and interdicting persons and organizations
that pose a threat to national security or are engaged in other
organized criminal activity.
Across the northern border, 15 regional IBET locations have been
established and are currently active. Each IBET has a local Joint
Management Team (JMT) to incorporate national policies and formulate
local investigative priorities of the regional team. The JMT is
predicated on the needs and involvement of its participating agencies.
IBETs are not ``firehouses'' waiting for something to occur but
rather operate as intelligence driven enforcement teams comprised of
federal, state/provincial and local law enforcement personnel to
address terrorism and other forms of criminality in the context of the
border. The teams are multidisciplinary in nature and work in an
integrated land, air, and marine environment along or near the
Canadian/United States border while respecting the jurisdiction of each
nation.
The IBETs were developed to be ``intelligence driven'' units. The
concept of the Joint Intelligence Teams is to develop an inter-
connectivity of intelligence by co-locating ICE Intelligence Analysts/
Intelligence Research Specialists and Special Agents with Intelligence
Analysts/Officers representing the other participating core member
agencies. The intelligence officers will be responsible for the
collection and collation of information and its dissemination to the
field, other IBETs, as well as to their respective Headquarters
entities.
Cargo Screening
Tremendous progress has been made in securing commercial traffic--
both rail and truck. By 2005, it is expected that 100% of rail cargo
entering the U.S. from Canada and Mexico will be screened using Vehicle
and Cargo Inspection Systems (VACIS) and other appropriate
technologies. The benefits derived from our northern and southern
border FAST programs speak for themselves. For example, 92% of
commercial traffic on the US-Mexico border is via the FAST lanes at the
seven largest ports. We have aggressive expansion plans for FAST along
the southern border and are studying additional dedicated FAST lanes at
some of the busiest crossings between the U.S. and Canada.
The Department, through CBP, has developed with Canada a Joint
Targeting Initiative to review and research bills of lading and
manifests necessary to target high-risk containers destined for North
America. Additionally, CBP and Canada will embark on a common Container
Security Initiative, leveraging resources at select locations abroad.
Passenger Enrollment Systems
Low-risk, pre-enrolled travel programs for visitors and other non-
commercial travelers are another example of ways to leverage technology
and bilateral cooperation to achieve the mutual goals of enhanced
security and facilitated through-flow of known border crossers. We
continue to expand and upgrade the NEXUS and SENTRI programs at our
land borders while ensuring continuous compliance monitoring. Further,
we will test a NEXUS Air program with Canada at the Vancouver
International Airport.
Visa Policy
Visa policy plays an essential role in our layered defense strategy
that prevents known high-risk travelers from entering North America. To
this end, we are working with Canada and Mexico to identify
commonalities, gaps and areas. For example, since September 11, Canada
has imposed a visa requirement on nationals of 12 countries, including
Saudi Arabia and Malaysia. We are studying ways to converge visa-
screening procedures and to exchange visa information.
Information Sharing
Both before and since the terrorist attacks of September 11, 2001,
the State Department, with DHS and other interagency partners, has
spearheaded efforts to coordinate the exchange of biographic terrorist
screening information. With the specific authority granted to the
Secretary of State by the USA PATRIOT Act of 2001 to establish
agreements with foreign governments on exchange of visa screening
information, we are seeking to negotiate more robust information
exchange agreements.
On June 12, 2003, the Secretary of State authorized negotiations on
an agreement for the systematic exchange of broader visa screening
database information with Canada and approved a draft executive-level
agreement to do so. At the same time, he gave blanket authorization to
pursue such an agreement with any other willing country, using the
effort with Canada as a model. In accordance with the new guidelines of
the Homeland Security Act, the State Department sought the cooperation
of DHS and subsequently the newly formed TSC. In January 2004, the
State Department opened negotiations with Canada aimed at reaching such
an agreement. The negotiating team, which includes representatives of
State, DHS and the TSC, is addressing the policy, legal and technical
issues involved.
The HSPD-6 Memorandum of Understanding (MOU) on the Integration and
Use of Screening Information to Protect Against Terrorism of September
16, 2003 was signed by the Departments of State, Justice, and Homeland
Security and the DCI. The MOU requires the obtaining of terrorist
screening information from our foreign partners ``in a manner
consistent with each government's laws,'' and, as necessary, ``to
provide operational support to the participating governments.'' It also
established the guidelines for operation of the TSC and the transfer of
State's TIPOFF database to the TTIC. The TIPOFF Program, founded in
1987, was the first federal program focused on the identification of
known and suspected terrorists to prevent their entry into the United
States. On November 17, 2003 the TTIC,\2\ under the authority of the
DCI, assumed responsibility for TIPOFF and for collecting all
information the U.S. Government possesses related to known or suspected
terrorists, with the exception of information on purely domestic
terrorists. TIPOFF contains more than 175,000 records on terrorist
identities as of mid-August 2004 and serves as a screening and analytic
resource to the U.S. Government. On December 1, 2003 the Terrorist
Screening Center (TSC) was established, under the administration of the
FBI, to consolidate the U.S. government's approach to screening for
terrorism.
---------------------------------------------------------------------------
\2\ On December 6, 2004, the NCTC undertook all responsibilities
assigned to the TTIC.
---------------------------------------------------------------------------
The TSC facilitates terrorist screening exchange arrangements with
two trusted partners--Canada and Australia. An agreement with Canada
was established and implemented on May 23, 1997, and with Australia on
April 12, 2000, through which sensitive but unclassified biographic
screening data elements derived from the Terrorist Screening Data Base
(TSDB), were made available to both countries. Terrorist screening data
provided to TIPOFF by Canada and Australia is included in the Consular
Lookout and Support System (CLASS) used by the State Department to
screen visa applicants in the Integrated Border Inspection System
(IBIS) used by DHS to screen travelers seeking admission into the
United States, and by other federal, state, and local law enforcement
through the National Crime Information Center (NCIC). HSPD-6 also
tasked the Department of State, in conjunction with the TSC, to expand
the sharing of terrorist identifying information with other countries
and to begin with our partners in the Visa Waiver Program. This effort
has been initiated and significant progress is being accomplished.
Similarly, we are working within the Administration to determine
the appropriate bilateral exchange of the No Fly and Selectee Lists
currently used by domestic and international airlines transporting
passengers in, to, or from the United States to conduct passenger
prescreening. We continue to monitor the status of domestic legislation
in Canada that would further enhance aviation security including the
exchange of passenger information on domestic flights that may fly over
U.S. airspace.
Transportation Security
Member States in the International Civil Aeronautics Organization
must meet the 100% hold-baggage screening standard by January 2006.
This standard will make the global aviation system even more secure and
will help reduce the possibility of acts of terrorism on our air
carriers. The Department is pleased that our neighboring governments
are sharing information to help meet this goal.
US-VISIT
DHS implemented US VISIT at 115 airports and 14 seaports starting
on January 5, 2004. The land border solution is being designed to be
fast and easy, but also secure. The Department is committed to the dual
goals of enhanced security and facilitated legitimate travel. Through
US-VISIT, and in conjunction with the Department of State's Biometric
Visa Program, the Department has created a ``virtual border'' as a line
of defense against entry by terrorists. Travelers seeking visas have
their fingerprints vetted against a biometric watchlist to identify
criminals, terrorists, and immigration violators We have worked closely
with officials from Canada and Mexico to develop an effective and open
communication mechanism to exchange ideas and address concerns about
how US-VISIT utilizes technology, how it may affect border communities,
and how to manage public relations. Shared infrastructure, biometrics,
data privacy and protection are all issues of common interest. The
Department looks forward to continued bilateral dialogue as US-VISIT
expands to the 50 largest land border ports by December 2004 and all
land ports by December 31, 2005, and as we assess and build upon
technologies and management concepts being tested or already deployed
from the various departure pilots.
11. Constraining terrorist mobility should be a broad, long-term
DHS goal.
Q02160: What initiatives does DHS have underway and what have you
identified as future goals or developing capabilities?
Answer: CBP has a number of initiatives underway in support of
DHS's long-term goal of constraining terrorist mobility. To highlight a
few:
Deploying Immigration Advisory Officers
The Immigration Advisory Program (IAP) is a CBP effort to prevent
terrorists from entering the United States. Under IAP, small teams of
CBP Immigration Advisory Officers with strong immigration backgrounds
would be assigned to the major ``hub'' airports around the world to
identify potentially high-risk or inadmissible passengers before they
board aircraft bound for the United States. Through these efforts, CBP
is better positioned to address the worldwide threat of terrorism.
CBP initiated an IAP pilot at Amsterdam's Schiphol airport on June
26, 2004 and a second effort began at Warsaw's Chopin Airport on
September 15, 2004. The IAP teams in both foreign locations have
established similar passenger processing methods. Typically, airline
security officers or government border guards review passenger
documents and if there are any anomalies with the document or the
passenger, they request assistance from the IAP Officer. IAP officers,
based on targeting information or observation, may ask to see a
particular passenger. Based on the review of the passenger's documents
and responses to questions, the IAP officer may recommend to carriers
not to board individuals who have documentary deficiencies or who may
be otherwise inadmissible.
Additional sites will be identified based on intelligence
information, funding, and approval by the Department of Homeland
Security and host countries.
Deploying Integrated IDENT/IAFIS
The Automated Biometric Identification System and the Integrated
Automated Fingerprint Identification System (IDENT/IAFIS) program was
established to integrate the IDENT database with the Federal Bureau of
Investigation's (FBI) Integrated Automated Fingerprint Identification
System (IAFIS). The Integrated IDENT/IAFIS terminal provides
simultaneous access to biometric-based criminal and immigration
violator information for DHS agents in the field. In FY2004, DHS
assumed the responsibility for funding and completion of phase 1 of the
project--the nationwide deployment of IDENT-IAFIS workstations was
transferred from the Department of Justice to the Department of
Homeland Security (DHS). DHS immediately began accelerating the
deployment of the integrated capability and has now completed
deployment of the integrated system to all 140 operational Border
Patrol stations, and 216 Port of Entry and ICE locations. DHS will
complete deployment to all remaining Ports of Entry and ICE locations
by December, 2005.
Numerous other initiatives being pursued by CBP include continuing
to enhance the automated targeting system, continuing to aggressively
pursue smart box container technology, increasing Container Security
Initiative (CSI) participation, Free And Secure Trade (FAST), internal
law enforcement partnerships, deploying radiation portal monitors, and
deploying additional imaging technologies to the ports. Future goals
and developing capabilities include our Automated Commercial
Environment system (ACE) which is currently restructuring what
information is required for international transactions, how that
information is processed, and employing technology and business
partnerships with other agencies to identify their international data
requirements, and how to best integrate these requirements through an
international trade data system (ITDS).
Questions for the Record from Chairman Dave Camp and Chairman Jim
Gibbons
(1) Q02161: What is the current process for DHS agencies to share
information and intelligence they gather in their day-to-day activities
with the DHS Office of Information Analysis?
Answer: Each Department of Homeland Security (DHS) component
employs several methods to share information with the DHS Office of
Information Analysis (IA). Standardized, daily reporting is the
principal method for sharing information. This regular reporting is
supplemented by spot reports, alerts, and informal notifications via
email, phone or fax to provide timely notice to IA, and to DHS in
general, of emergent threats and other events of interest. The Homeland
Security Operations Center (HSOC) is the focal point for this
information exchange. IA personnel staff the HSOC on a 24X7X365 basis.
This team, under the leadership of the Senior Intelligence Analyst,
reviews all component reporting and works directly with both the Senior
HSOC Watch Officer and all parts of the IA organization to ensure
timely distribution of information throughout IA and to provide front
line, first phase intelligence analysis to the HSOC.
Most DHS components provide their reports to the HSOC via email at
all classification levels (Sensitive but Unclassified (SBU), Secret
(S), and Top Secret/Special Compartmented Information (TS/SCI)). These
reports are automatically filed in designated folders accessible across
DHS Headquarters for easy access and archival management. The U.S.
Coast Guard submits reports in the form of Information Intelligence
Report messages to the DoD's Automated Message Handling System (AMHS)
and Web Intelligence Search Engine which are both guarded at DHS. In
addition, the Coast Guard develops and displays a wealth of information
on its Common Operational Picture (COP), and which provides real-time
information to the HSOC. That information available through HSOC and
through the COP is provided to DHS Office of Internal Affairs (OIA).
The following is a listing of reports by agency:
BTS
Daily Operations Report
* BTS components ICE, CBP, and TSA also provide their own reports:
ICE
Homeland Security Intelligence Report
Significant Activity Reports
ICE daily operational summary
ICE Spot Reports
Daily Intelligence Summary
CBP
Homeland Security Intelligence Report
CBP Spot Reports
CBP daily operational summary
Intelligence Assessment
Intelligence Alert
Weekly Matrix
TSA
Daily intelligence Summary
Homeland Security Intelligence Report
Transportation Security Operations Center Spot Reports
Suspicious Incident Report
FAMS
Daily Intelligence Brief
Weekly Assessment
USCG
Coast Guard Incident Reports
Spot Reports
Field Intelligence Reports (via AMHS)
Intelligence Information Reports (via AMHS)
Common Operational Picture
Daily Intelligence Summaries
Routine and ad hoc Intelligence Production
USSS
USSS Intelligence Division/Operations Branch-Daily Operations Report
Federal Protective Service
Daily Operations Log
Spot Reports
Information Bulletins
Incident Reporting via the FPS Portal
This system also supports reporting from DHS affiliates in the
National Infrastructure Coordinating Center (NICC). NICC participants
are given reporting criteria and email addresses to provide information
to the HSOC for further distribution to IA analysts.
The IA staff in the HSOC distributes information through several
methods. The report is captured in a running log with the source of the
report, the facts as reported, derivation of information gaps, and
actions taken to exploit the information against all available
databases and subject matter experts to determine terrorism nexus /
emergence of threat. External watch officers are often contacted as the
information is received, and queried for support in evaluating the
threat against their resources. The text of the report is also sent to
the HSOC Senior Watch Officer and IA analytic staff via email. If the
nature of the information suggests an imminent threat, key IA leaders
are notified by phone / pager.
While this process is the primary path of information from
components to IA analysts, the same email storage and DoD message
systems are available directly to analysts and desk officers with
appropriate security clearance. The SIA serves as the primary conduit
of information into IA, providing global coverage of all of the over
1500 messages received by DHS daily and ensuring broad distribution of
that information on a 24X7 basis, but IA analysts have identical access
to the source information for their topic areas to support easy access
and rapid analytical response. This process is depicted in the example
diagram below:
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
Additionally, the DHS Request for Information (RFI) and Tearline
process facilitates the sharing of information not only within DHS, but
also with members of the Intelligence Community (IC). DHS's Web-based
Pantheon system will help expedite and streamline the information
sharing process. DHS IA also manages the DHS tearline program that
currently helps facilitate information sharing within the IC, DHS,
State & Local Government, and the private sector. In response to DCID
8/1, DHS IA has developed a four phased tearline reporting
implementation plan which will greatly enhance the ability to share
information.
(2) Q02162: Does IA currently have specific personnel devoted to
developing a complete threat picture based on information it receives
from BTS agencies and the Intelligence Community?
Answer: The Department of Homeland Security (DHS) Office of
Information Analysis (IA) currently has two analytical units. One
focuses on current intelligence and the other on broader trends and
developments. Within the analytic unit focused on current intelligence,
there is a branch focused on fusing current intelligence and homeland
security reporting, to include DHS Border and Transportation Security
(BTS) reporting, with the contextual picture provided by the unit
analyzing broader trends and developments. The product of this fusion,
along with the near real time input from the Senior Intelligence
Analyst in the Homeland Security Operations Center, is a complete
threat picture. Additionally, BTS component intelligence activities, as
well as representatives from the U.S. Intelligence Community (IC)
maintain a presence in IA to facilitate sharing their respective
understanding of the current threat picture.
It is the responsibility of IA analysts to be cognizant of and
apply knowledge of the broader threat context as derived from all
sources of Homeland-related threat information to analyses of their
specific accounts or programs. Specific divisions within IA that are
focused on information derived from or pertaining to BTS naturally
possess a greater macro and micro understanding of this information. It
is also the responsibility of senior analysts and managers within IA to
ensure all-source fusion is taking place.
Q02163: Is this information integrated with intelligence and
reporting from other agencies?
Answer: Yes. Please refer to the above (Q02162) and Q02166.
(3) In addition to the Office of Information Analysis (IA) within
the Department of Homeland Security (DHS), several other components
within the Department maintain distinct intelligence units. These units
located within the Border and Transportation Security Directorate (BTS)
and the U.S. Coast Guard serve the demands of their respective offices.
Q02164: How does IA work with their respective DHS intelligence
components to share border reports?
Answer: Please refer to Q02161.
Q02165: How is this information shared across the Department, with
IA, and with the larger Intelligence Community?
Answer: The Department of Homeland Security (DHS) Office of
Information Analysis (IA) utilizes both formal and informal processes
to share information across the Department, within IA, and with the
larger Intelligence Community. IA conducts and or participates in
several daily and weekly meetings/teleconferences. The primary purpose
of these events is to discuss and disseminate information/intelligence
and assign taskings for further analysis.
The following meetings are of significant importance in the IA
information sharing process:
Information Analysis Morning Executive Brief (IAMEB)--
daily Monday through Friday brief that is attended by numerous
agencies from DHS to include IA, IP, HSOC, USSS, BTS,CBP,ICE,
TSA, State & Local as well as the FBI, State Department and the
Intelligence Community.
Daily Secure Video Teleconference--IA participates in
the daily secure meeting hosted by the National Counter
Terrorism Threat Center.
Homeland Security Terrorist Threat Intel Group
(HSTTIG)--Bi-monthly meeting of the DHS Intelligence component
leaders.
Formal products are produced in a variety of formats to accommodate
the different security handling and information requirements of our
diverse audience, which ranges from private sector firms and
institutions to members of the Intelligence Community.
The department produces a wide variety of formal products
including:
Homeland Security Information Advisories;
Homeland Security Information Bulletins;
Homeland Security Assessments and Studies;
Homeland Security Intelligence Articles (HSIA);
Homeland Security IAIP Red Cell Session Reports;
Homeland Security Intelligence Reports;
Daily briefings such as the Information Analysis
Morning Executive Brief;
Intelligence Information Reports (via DoD message
handling system).
Information Advisories (IAs) provide a means for DHS to communicate
threat information to all DHS customers ranging from the intelligence
community and law enforcement to the general public at large.
Advisories incorporate intelligence or information identifying a threat
targeting critical national networks or key infrastructure assets that
contains actionable incident information. The Advisory may suggest a
change in readiness posture, protective actions, or response, as well
as, relaying newly developed procedures that, when implemented, would
significantly improve security or protection.
Information Bulletins (IBs) report information of interest to the
nation's critical infrastructures that does not meet the timeliness,
specificity, or significance thresholds of Information Advisories. IBs
are designed to provide updates on the training, tactics, or strategies
of terrorists and may include: statistical reports, monthly, quarterly,
or semi-annual summaries, incident responses or reporting guidelines,
common vulnerabilities and patches, and configuration standards or
tools. In addition, preliminary requests for information on symptoms,
events, or social engineering being observed by constituents may also
be communicated through a bulletin.
Homeland Security Assessments and Studies provide an assessment or
study for a specific event or location and are directed at a specific
audience. Assessments are typically 25 pages, while Studies offer a
more in-depth coverage of the subject and are typically 1020 pages in
length. These come in various forms including: Threat--particular event
related; Special--study of threats to infrastructure / security;
Executive--summary assessments; and Joint--author sponsorship by DHS
and another concerned organization.
Homeland Security Information Articles (HSIAs) are classified,
timely, all-source intelligence products that assess, clarify or
consolidate new intelligence with previously reported information.
HSIAs are an analytic production process that begins with new
intelligence or threat information often expanding upon previously
reported intelligence and threat assessments. The information is not
limited to raw reporting and may contain finished analysis. The HSIA is
authored by IA-C and/or IA-D analysts on an as-needed basis and is
intended for various internal DHS audiences and the Intelligence
Community.
IAIP Red Cell Reports provide alternative assessments intended to
provoke thought and stimulate discussion. Red Cell products enhance DHS
analysis by engaging a community of outside experts from government,
industry, and academia to provide an alternative perspective on
threats/vulnerabilities facing the homeland. Emphasis will be is on
examining issues from a terrorist mindset, focusing on innovative and
unconventional targets and tactics. The analytic Red Cell program
brings together DHS and outside experts on a regularly scheduled basis,
and can also stand up ad-hoc red cells in response to immediate needs.
Distribution is generally limited based on topic.
Homeland Security Intelligence Reports (HSIRs) allow DHS
operational components a vehicle to report case and potential terrorist
information to DHS Headquarters. The final report contains a
compilation of information with preliminary processing or analysis by
the reporting agency supported by research using locally available
databases and domain expertise of the component analysts.
Information Analysis Morning Executive Brief (IAMEB) provides daily
situational awareness on homeland security issues. The brief is a daily
compilation of preliminary/ in-depth analytical perspectives on
significant recent and developing issues affecting homeland security
and DHS. The IA-C briefing team develops the IAMEB with input from IA-D
as warranted, and briefs it to key IAIP personnel each weekday morning.
The IAMEB is then modified as appropriate and disseminated. Appropriate
versions of the IAMEB are sent internally throughout DHS and the
Intelligence Community.
DHS Intelligence Information Reports (IIRs) are produced by IA to
publish information gathered by DHS components in the format most
familiar to IC and DoD consumers. IA has partnered with DIA to allow
direct publication of DHS IIRs into the standard DoD message handling
system. Currently, DHS authors' component reporting in this format,
however, components will begin production on their own to directly
inject the information into the IC in the near future.
Homeland Security Information Message (HSIM): Designed to
communicate uncorroborated threat information to U.S. Government
agencies, State and Local Homeland Security Advisors, and/or the
private/public sector, in an expeditious manner. Information has not
been fully evaluated. No specific actions are recommended. Should
further information become available, it will be disseminated as a more
comprehensive Information Bulletin, Advisory or Memorandum.
This information is provided as directed in Section 201, Homeland
Security Act of 2002. Additionally, IA is in constant informal
communication with other Intelligence agencies and other non-
intelligence organizations, directly communicating information via
liaison, phone, fax or e-mail. We rely heavily on representatives of
the various agencies, both inside and outside DHS, to facilitate
communication with their parent organizations. These experts provide
not only a conduit for information, but also are valuable resources
during the development and vetting of products.
(4) Q02166: Does IA have the ability to analyze imagery and other
forms ofSec. telligence that is gathered on our borders?
Answer: Analyzing and consuming all-source intelligence analysis is
at the core of the Department of Homeland Security (DHS) Office of
Information Analysis (IA) mission. However, IA does not literally
analyze imagery, with the exception of a small contingent of imagery
analysts working within the Coast Guard who provide analysis of
maritime events that impact a wide variety of USCG missions. However,
for the most part, IA relies on the analysis of the National Geospatial
Intelligence Agency (NGA) and other organizations that possess literal
imagery analysts. This analysis is incorporated into IA evaluations and
assessments pertaining to border issues. As a member of the U.S.
Intelligence Community, NGA maintains multiple representatives within
IA who very ably assist with various imagery requirements. Most
notably, NGA has played a key role supporting DHS Information Analysis
and Infrastructure Protection (IAIP) Directorate efforts relating to
critical infrastructure protection, and has supported IAIP's mission to
National Security Special Events and other significant functions. Other
border-related information derived from the IC or BTS is funneled to
DHS via established electronic systems and incorporated into IA's
assessments.
(5) Terrorist travel intelligence runs across broad federal, state,
and local agency lines.
Q02167: How is the Department leveraging its assets to best utilize
current terrorist travel information from within DHS and other partners
in the Intelligence Community?
Q02168: What is it doing to improve the exchange of information?
Answer: One of IA's OMB Milestones is to ``Establish and resource a
DHS reports officer capability to report information from field and
component organizations on potential threats to the Homeland.'' IA is
staffing positions, developing procedures and training, and
implementing a plan to deploy reports officers to the field. These
reports officers' primary responsibility is to write and disseminate
reports of intelligence value based on DHS component operational
information. IA's intent is to model this effort on successful reports
officer programs of long standing in the Intelligence Community and to
review the newly developed program at the FBI for lessons learned in a
start-up enterprise.
Lawrence M. Wein Responses to Questions from Chairman Dave Camp and
Chairman Jim Gibbons
Thank you for the opportunity to testify before the Select
Committee on Homeland Security Subcommittees on Infrastructure and
Border Security and Intelligence and Counterterrorism hearing on
September 30, 2004, entitled ``Disrupting Terrorist Travel:
Safeguarding America's Borders through Information Sharing.'' I am
pleased to answer your questions.
Question 1: You make the point in your testimony that the more
fingerprints captured, the less important image quality is. However, if
I'm a terrorist I can just as easily ruin or impair all 10 of my
fingerprints as I can just two. How do you make the assumption that 10
prints are essential?
Answer 1: First, approximately 5-10% of terrorists have poor image
quality in the absence of any deliberate impairment. Given Al-Qa'ida's
large pool of terrorists, it can simply choose US-bound terrorists that
have inherently poor image quality. Second, approximately five times as
much work, pain, etc. is required to impair 10 fingers rather than two
fingers, although your point is well taken that terrorists who are
capable of deliberately impairing two fingers can certainly
deliberately impair 10 fingers. Regarding your main question, the
bottom line here is that you get a limited amount of information out of
a fingerprint with poor image quality, and you get approximately five
times as much information from 10 poor-quality fingerprints as you do
from two poor-quality fingerprints. We do not assume that 10
fingerprints are essential. Rather, we solve an optimization problem
that allows for the possible use of up to 10 fingerprints, and find
that it is optimal to employ 10 fingerprints from visitors with poor-
quality fingerprint images. That is, the use of 10 fingerprints for
visitors with poor image quality is not an assumption of our analysis,
but rather a product of our analysis. Returning to the earlier issue,
using 10 fingerprints allows five times as much information to be
captured from visitors with inherently, or deliberately, poor image
quality, which leads to a much higher detection probability.
Question 2: What factors are involved in order to capture a quality
image? (i.e., capabilities of the machine, software, screener training,
and physical characteristics of the fingers).
Question 3: It seems that if US VISIT is capturing quality images,
the matching problems you outline in your testimony will largely be
addressed. In your estimate, how much of the ability to capture a
quality image is outside of DHS's control?
Answers 2 and 3: While all the factors you mention in Question 2--
along with environmental factors such as humidity and dirt--impact
image quality, our analysis of the data in Figure 11 of the NISTIR 7110
report (this analysis appears in Appendix I of a report we distributed
to various parts of the US Government, including analysts at NIST and
managers of the US-VISIT Program) suggests that most of the image
quality is inherent in the physical characteristics of the person
(i.e., some people have inherently worn-out fingers), and hence is
outside of DHS's control. However, a definitive answer to this question
requires an analysis of NIST data that is more detailed than the
summary statistics in Figure 11 of NISTIR 7110; I requested this
additional data from NIST analysts on June 2, 2004, but they never
responded to my request.
Question 4: You concluded in your testimony that capturing
additional fingerprints would not take additional time because you
average the screening time between primary and secondary. Your findings
combine the time in primary and secondary into a mean time. I am
concerned that your findings don't fully weigh the cost of delaying
travelers at a port of entry. What are you recommending exactly--that
10 fingerprints are captured during primary inspection at the port of
entry or at some other point in the screening process?
Answer 4: We are also concerned with traveler delay at ports of
entry. Unlike most previous biometric research, our analysis includes a
constraint that the total mean (primary plus secondary) screening time
per visitor be fixed at its current value. Queueing theory, which is
the field of mathematics that analyzes waiting lines (see our report
for a reference to a specific paper) implies that mean delay at ports
of entry will not increase if the mean (primary plus secondary)
screening time per visitor is not increased, under the assumption that
there is some flexibility in the workforce (i.e., a small fraction of
the inspectors are trained in both primary and secondary screening).
Hence, we are taking traveler delay into full consideration. Regarding
your final question, our recommendation is that 10 fingerprints be
captured during visa enrollment from all during their next visit to a
port of entry, and these 10 prints could replace the 2 fingerprints
that were originally captured during enrollment. Our exact
recommendation at the ports of entry is to take 10 fingerprints from
enrollees with poor image quality, but only two fingers from the
enrollees with good image quality. Using this information to match
against the watchlist, we predict a detection probability of 95% with
no increase in mean traveler delay. Of course, if different numbers of
fingerprints are captured from different people, there is the issue of
managing the perception of differential treatment (i.e., different
numbers of fingers for different people). However, image quality is an
objective measure that does not explicitly take into account age,
gender, race, country of origin, etc., which may mitigate this concern.
Question 5: I am concerned about the additional burden and time
delay of taking 10 fingers from all travelers. Did you assess what the
added value would be of taking 10 prints from all enrollees with poor
image quality, as a subgroup of all visitors?
Answer 5: This question was essentially answered in Answer 4, but I
will repeat the answer here. We are also concerned with the time delay
of taking 10 fingers from all travelers. In fact, in our analysis, 95%
detection probability at the port of entry (with no increase in
traveler delay) is achieved by taking 10 fingerprints from enrollees
with poor image quality, but only two fingers from the enrollees with
good image quality; note that we would know an enrollee's image quality
from their prints taken at the time of enrollment. Of course, if
different numbers of fingerprints are captured from different people,
there is the issue of managing the perception of differential treatment
(i.e., different numbers of fingers for different people). However,
image quality is an objective measure that does not explicitly take
into account age, gender, race, country of origin, etc., which may
mitigate this concern.
Thank you for your interest. Please let me know if I can be of any
further help.
Mr. Camp. The gentleman from Texas.
Mr. Turner. Mr. Chairman, I just wanted to ask the chairman
if he would allow me to place in the record a NIST 2002 report,
which concluded that the addition of the additional fingerprint
slap system that I believe you were referring to, Professor,
the time required to capture those fingerprints would be
insignificant.
It goes to the heart of the issue that Mr. Dicks raised,
because I think we all have the impression that we didn't use
the 10-print system because it takes too much time. And I would
like for this report to be placed as part of the record of this
hearing.
Mr. Camp. Without objection, the NIST report may be placed
in the record.
[Retained in the committee file.]
Mr. Camp. There being no further business, the hearing is
now adjourned.
[Whereupon, at 3 p.m., the subcommittee was adjourned.]