PDF版本

国土安全情报和边境安全部门:提供作战情报=======================================================================小组委员会情报,信息共享和恐怖主义风险评估委员会的听证会之前ON HOMELAND SECURITY U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION __________ JUNE 28, 2006 __________ Serial No. 109-89 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC] [TIFF OMITTED] TONGRESS.#13 Available via the World Wide Web: http://www.gpoaccess.gov/congress/ index.html __________ U.S. GOVERNMENT PRINTING OFFICE WASHINGTON : 2007 34-854 For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Peter T. King, New York, Chairman Don Young, Alaska Bennie G. Thompson, Mississippi Lamar S. Smith, Texas Loretta Sanchez, California Curt Weldon, Pennsylvania Edward J. Markey, Massachusetts Christopher Shays, Connecticut Norman D. Dicks, Washington John Linder, Georgia Jane Harman, California Mark E. Souder, Indiana Peter A. DeFazio, Oregon Tom Davis, Virginia Nita M. Lowey, New York Daniel E. Lungren, California Eleanor Holmes Norton, District of Jim Gibbons, Nevada Columbia Rob Simmons, Connecticut Zoe Lofgren, California Mike Rogers, Alabama Sheila Jackson-Lee, Texas Stevan Pearce, New Mexico Bill Pascrell, Jr., New Jersey Katherine Harris, Florida Donna M. Christensen, U.S. Virgin Bobby Jindal, Louisiana Islands Dave G. Reichert, Washington Bob Etheridge, North Carolina Michael T. McCaul, Texas James R. Langevin, Rhode Island Charlie Dent, Pennsylvania Kendrick B. Meek, Florida Ginny Brown-Waite, Florida ______ SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT Rob Simmons, Connecticut, Chairman Curt Weldon, Pennsylvania Zoe Lofgren, California Mark E. Souder, Indiana Loretta Sanchez, California Daniel E. Lungren, California Jane Harman, California Jim Gibbons, Nevada Nita M. Lowey, New York Stevan Pearce, New Mexico Sheila Jackson-Lee, Texas Bobby Jindal, Louisiana James R. Langevin, Rhode Island Charlie Dent, Pennsylvania Kendrick B. Meek, Florida Ginny Brown-Waite, Florida Bennie G. Thompson, Mississippi Peter T. King, New York (Ex (Ex Officio) Officio) (II) C O N T E N T S ---------- Page STATEMENT The Honorable Rob Simmons, a Representative in Congress For the State of Connecticut, and Chairman, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment..................................................... 1 The Honorable Zoe Lofgren, a Representative in Congress For the State of California and Ranking Member, Subcommittee on Intelligence, Informaton Sharing, and Terrorism Risk Assessment 2 The Honorable Bennie G. Thompson, a Representative in Congress For the State of Mississippi, (ex officio)..................... 4 The Honorable Mark E. Souder, a Representative in Congress For the State of Indiana........................................... 12 The Honorable Jim Gibbons, a Representative in Congress For the State of Nevada................................................ 16 The Honorable Jane Harman, a Representative in Congress For the State of California............................................ 20 The Honorable Nita M. Lowey, a Representative in Congress For the State of New York.............................................. 38 WITNESSES Panel I Mr. Charles E. Allen, Chief Intelligence Officer, Office of Intelligence and Analysis, U.S. Department of Homeland Security: Oral Statement................................................. 6 Prepared Statement............................................. 7 Panel II Mr. L. Thomas Bortmes, Director, Office of Intelligence, Customs and Border Protection, U.S. Department of Homeland Security: Oral Statement................................................. 31 Prepared Statement............................................. 33 Ms. Cynthia O'Connell, Acting Director, Office of Intelligence, Immigration and Customs Enforcement, U.S. Department of Homeland Security: Oral Statement................................................. 27 Prepared Statement............................................. 29 Mr. James Sloan, Assistant Commandant for Intelligence, U.S. Coast Guard, U.S. Department of Homeland Security: Oral Statement................................................. 22 Prepared Statement............................................. 23 Panel III Mr. Michael W. Cutler, Fellow Center for Immigration Studies: Oral Staement.................................................. 44 Prepared Statement............................................. 46 Mr. Michael O'Hanlon, Senior in Foreign Policy Studies, Brookings Institution: Oral Statement................................................. 48 Prepared Statement............................................. 49 Questions for the Record Questions from Representative Rob Simmons for Assistant Secretary Charles Allen.................................................. 60 DHS INTELLIGENCE AND BORDER SECURITY: DELIVERING OPERATIONAL INTELLIGENCE ---------- Wednesday, June 28, 2006 House of Representatives, Committee on Homeland Security, Subcommittee on Intelligence, Information . Sharing, and Terrorism Risk Assessment, Washington, DC. The subcommittee met, pursuant to call, at 10:05 a.m., in Room 311, Cannon House Office Building, Hon. Rob Simmons [chairman of the subcommittee] presiding. Present: Representatives Simmons, Souder, Gibbons, Dent, Lofgren, Harman, Lowey and Thompson (ex officio). Mr. Simmons. A quorum being present, the Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment will come to order. Today the subcommittee meets to hear testimony on the Department of Homeland Security's border security intelligence operations. One of the Department's primary jobs is to secure the homeland against the illegal entry of people, goods and illicit materials. The 9/11 Commission wrote in their comprehensive study, and I quote, targeting travel is at least as powerful a weapon against terrorists as targeting their money. The United States should combine terrorist travel intelligence, operations and law enforcement in a strategy to intercept terrorists, fine terrorist travel facilitators and constrain terrorist mobility. DHS works to do this through the hard work of people, through U.S. Customs and Border Protection, Immigration and Customs Enforcement and the United States Coast Guard, among others in the intelligence and law enforcement communities. But as we all know, thousands of people illegally stream across our international borders. The 9/11 Commission estimated that annually approximately 500,000 people enter this country illegally, without inspection, and overstay their legal welcome. Many come for opportunities that America provides, and we understand that, but others have a more sinister intent. In order to better protect our borders, we need to know who is attempting to cross, and what are they bringing into this country, and why. Our border immigration and Coast Guard officials protect more than 5,000 miles of the border with Canada, 1,900 miles of border with Mexico, and approximately 12,400 miles of shoreline east and west. To protect this vast international border, intelligence-driven operations will be the key to targeting and interdicting these threats before their arrival. On a typical day Federal officials will apprehend over 3,000 people trying to cross between ports of entry, and on a typical day will intercept one person for terrorism or national security-related reasons. These apprehensions net fraudulent documents and seemingly innocuous pocket litter, both of which can have tremendous intelligence value. Therefore, DES frontline operators must have the tools, the training, capability and processes in place to weave the information from these everyday encounters into a comprehensive intelligence picture. In addition to those who try to cross our borders illegally, on a typical day approximately 1,200,000 people and passengers arrive at our ports of entry, and approximately 80,000 shipments of goods arrive for approved entry. Nothing wrong with this, we want to encourage this. And we must make sure that this lawful travel and lawful commercial activity proceeds efficiently, without undue delay, while focusing again on those who deserve additional scrutiny. It is a daunting but necessary task. Today we will hear from Charlie Allen, the Chief Intelligence Officer of the Department of Homeland Security, who will give an overall perspective of the Department's strategic intelligence efforts and his support to DHS operational components. Again, welcome, Mr. Allen. This task is a huge task and a new task for United States as Americans. Next we will hear from the Coast Guard, the Customs and Border Patrol and the ICE on how they incorporate intelligence into their operations, and on how the Office of Intelligence and Analysis is supporting their efforts. And then finally, our third panel will consistent of Mr. Michael W. Cutler from the Center for Immigration Studies, and Mr. Michael O'Hanlon from the Brookings Institute, who will provide the subcommittee with their perspective on how intelligence can best be used to secure and control America's borders. Mr. Simmons. The Chair is now happy to recognize the Ranking Member of the subcommittee, the gentlelady from California, Ms. Lofgren for her opening statement. Ms. Lofgren. Thank you, Mr. Chairman. While I am pleased that we are finally turning our attention today to the question of intelligence and border security, I must say, Mr. Chairman, this hearing and other hearings the Republican leadership has scheduled in the next few months are a day late and dollar short--correction, we are 6 years late and millions of dollars short. President Bush took office in 2001, and this Congress has been controlled by Republicans since 1995. The Senate, with one exception, has had a majority of Republicans since 1995. The Federal Government, charged with making and enforcing the laws of this Nation, have been under the sole control of Republicans for the last 6 years. With complete control of legislation and enforcement of the law for 6 years, you would think that a party that now calls so vigor [[Page 3]] ously for border security and enforcement of immigration law could have solved the problem of illegal immigration by now, but, Mr. Chairman, the Republican Party seems to be all talk on this subject. Here is just a partial list of the failures presided over by the Republican majority on illegal immigration. Since 1996, when the Senate and the House were taken over by the Republican Party, 5.3 million undocumented immigrants came to the United States. Since 2003, when President Bush came to power, over 2 million undocumented immigrants have entered the United States. In 2004, Congress enacted the Intelligence Reform Act, or the 9/11 Act, which mandated an additional 2,000 Border Patrol agents being hired over each of the next 5 years. But the President's subsequent budgets and Congress have failed to include adequate resources to implement the act. Indeed, the President's fiscal year 2006 budget called for only 210 additional Border Patrol agents. In fiscal year 2006, the Congress, with both House and Senate controlled by Republicans, eventually funded only 1,000 additional agents. The 9/11 Act also mandated an additional 800 immigration enforcement agents over each of the next 5 years, and yet for fiscal year 2006, the Congress funded only 350 additional agents. The act also mandated an additional 8,000 detention beds, but for fiscal year 2006, the Congress funded only 1,800 additional detention beds. President Bush and the House Republicans continue to underfund the Border Patrol. The President's fiscal year 2007 budget does not fully fund the authorized levels for the Border Patrol. During the Bush administration, Catch and Release has been rampant, a program under which 12,000 undocumented immigrants each month are apprehended from countries other than Mexico and are released and allowed to live in the United States while awaiting a deportation hearing, yet the Federal Government, which is completely controlled by Republicans, 70 percent of the OTMs are released into the interior with notices to appear at a later date and are never heard from again. According to the Washington Post, between 1999 and 2003, work-site enforcement operations were scaled back 95 percent by the Immigration and Naturalization Service. The number of employers prosecuted for unlawfully employing immigrants dropped from 182 in 1999 to only 4 in 2003. And fines collected declined from $3.6 million to 212,000. In 1999, the United States initiated fines against 417 companies; in 2004, it issued fine notices to only three. Next to nothing has been done to secure our northern border at a time when 17 suspected terrorists were arrested in Toronto, and there are reportedly 50 terrorist groups in Canada. The millennium bomber was arrested as he attempted to cross the northern border with explosives, and the Congressional Research Service says that Canada is, quote, ``a favored destination for terrorist groups as a safe haven, transit point and place to raise funds.'' While the Republican leadership in Congress focuses on the southern border, with 10,000 Border Patrol agents stationed along a 2,000-mile border with Mexico, only one-tenth of that amount is on the Canadian border, a border that is 2.5 times as long as the Mexican border. Recent news stories state that people drive, walk, sail, ski and sled across the northern border all the time. On December 16, 2005, all 219 House Republicans voting that day opposed a proposal, the Democratic motion to approve border security and immigration enforcement by fulfilling the 9/11 Commission's border security recommendations. The proposal would have hired more border guards; ended the Catch and Release practice by authorizing 100,000 additional detention beds; and incorporated state-of-the art technology, including cameras, sensors, radar satellites and unmanned aerial vehicles in order to ensure 100 percent border coverage. In 2005, all but one Republican voted against a comprehensive Homeland Security proposal that would commit 41 billion to securing the Nation from terrorists, 6.9 million more than the President's budget. In 2005, all but two Republicans voted against an effort to add $284 million to an emergency spending bill for securing the Nation's borders. Mr. Chairman, there has been a lot of talk about immigration these days, tough talk, but the pattern is talk and not action. And I say this because I have been made aware that there is a schedule--and this hearing, I think, is on that schedule, and I was on a hearing last week that was part of this schedule--to raise the issue of immigration, and I think the Republican leadership has made it a political issue. There was the hearing in the House Administration Committee last week; this hearing today; on July 5th, the hearing from the House International Relations subcommittee in San Diego, the Senate Majority is on it; July-h, another hearing in Laredo, Texas; mid-July a hearing, House Education and Workforce; August 14th, Government Reform and the like. So I am quite skeptical that this hearing on border intelligence is more than talk. It seems to me this is just another long list of the hearings held and planned by the Republican-led Congress that does not lead to solutions to a problem that the American public cares about, and I thank the gentleman for recognizing me. Mr. Simmons. Yes. And I think some of the items that you have listed in your opening statement are just the reason why we are having this hearing today, so that we can hear from our Chief Intelligence Officer how he is working to incorporate the various components of the Department of Homeland Security intelligence to better address this important issue. And I think we understand it is an important issue, and we look forward to their testimony, and hopefully their statement of progress in these difficult issues. And now the Chair would like to recognize the distinguished Ranking Member of the full committee Mr. Thompson of Mississippi for any statement he would like to make. Mr. Thompson. Thank you very much, Mr. Chairman and Ranking Member. I appreciate the opportunity to participate in this hearing. [[Page 5]] Always nice to see my friend Charlie Allen. First day of work he came by, and it has been a good relationship so far. I appreciate you, Mr. Allen. But for the sake of this hearing today, Mr. Chairman, we really should have been talking about border intelligence 5 years ago after 9/11. If we had conducted oversight and border intelligence during that time, we could focus legislation more adequately on what our problems are now. More importantly, it would have given us some meaningful starting point when taking up border security legislation. Essentially we have a bill pending now that is not informed by what is known at the border. This Republican Congress passes bill after bill--and I have five different bills that we have passed on border security, Mr. Chairman--and nothing has happened with them. If we are going to do top-notch border intelligence, it is essential that we develop a risk-based approach to border security. The United States has 216 airports, 143 seaports, and 115 land border crossings that are official ports of entry. Screening all the people and goods coming through these busy ports is already an enormous resource challenge for the men and women of the Department of Homeland Security. I have serious concerns that they lack the resources necessary to obtain true situational awareness at these locations, not to mention among the many hundreds of miles of unguarded rural and remote border locations. As we know, the threat to our northern border was thrown into sharp relief with the arrest of an apparent terrorist sailor in Toronto. This administration has failed to adequately secure our northern border by the fact that the northern border is more than twice the length of the southern border, with only one-tenth of the agents. State, local and tribal law enforcement is uniquely situated to help out with border intelligence where resources are stretched thin. What I am hearing from police and sheriffs' offices, however, worries me. When it comes to border security, the Department should have an all-hands-on-deck attitude. Instead, I hear CBP holds back information from local law enforcement because they view locals as competitors. Some local officers tell me that if they arrest someone coming over the border illegally, CBP headquarters sees it as a black eye for them. Making matters worse, officers in northern border communities have told me that they often receive more specific and actionable information from their Canadian colleagues than they do from the Department. Add to this the fact that border security is a Federal responsibility, Mr. Chairman, and yet this administration has passed the buck to State and local authorities in some areas, relying on them to do its job, without providing adequate support. Whether it is a turf issue, a resource issue or something else, this is unacceptable. CBP, ICE and the Coast Guard need to adopt common and consistent practices to share information with all their border security partners. While I had high hopes for the Homeland Security information network as a key way to communicate with State and locals, moreover, I am troubled about a Department report yesterday that found that most officers either don't trust it or don't think it contains much useful information. [[Page 6]] This hearing, therefore, is both important and timely, Mr. Chairman. This administration has dropped the ball on border security by underfunding critical programs for recruiting Border Patrol agents, leaving large planks of our border vulnerable in not procuring sufficient detention beds. Constructive and thoughtful Democratic amendments that seek to fill these critical gaps have been rejected time and again, and now we face a possible intelligence breakdown on our borders. How we proceed from here will have a big impact both on how we go about securing our border, and ensuring that our immigration laws are fully enforced. I welcome all the witnesses and look forward to your thoughts on these critical issues. I yield back. Mr. Simmons. I thank the Ranking Member for his comments, and I agree with him completely. I think this hearing is important, and I think it is timely. Other Members who are present know that they can submit opening statements for the record. Mr. Simmons. We will move now to the first panel. The Chairman calls the first panel, which is assembled; recognizes Mr.Allen as our Chief Intelligence Officer of the Department-- of the Office of Intelligence and Analysis, who reports directly to Secretary Chertoff. In this role, he is responsible for coordinating with the Intelligence Community and providing guidance on Homeland Security intelligence issues. Mr. Allen has a long and distinguished career in the U.S. Intelligence Community, beginning in 1958, when he joined the Central Intelligence Agency. He has subsequently held assignments of increasing responsibility within that organization, within the Office of Secretary of Defense, and he has served his country in a variety of other capacities. Mr. Allen, welcome. It is good to see you again. We look forward to your testimony. STATEMENT OF CHARLES E. ALLEN, ASSISTANT SECRETARY FOR INTELLIGENCE AND ANALYSIS, CHIEF INTELLIGENCE OFFICER, DEPARTMENT OF HOMELAND SECURITY Mr. Allen. Thank you, Mr. Chairman, Ranking Member Lofgren and members of the committee. I am very grateful for the invitation to speak to you today. I am also gratified to appear alongside my colleagues from the United States Coast Guard; Customs and Border Protection; and Immigration and Customs Enforcement. As members of the Homeland Security Intelligence Council, which I chair, they have been invaluable partners in realizing the Secretary's vision of an integrated Department of Homeland Security intelligence enterprise. I have a very brief statement, and I would request that my full statement be submitted for the record. Providing intelligence support to border security is a subject that I have devoted considerable time and energy during my relatively short time as Chief Intelligence Officer of the Department. One of my first actions was to launch an intelligence campaign [[Page 7]] plan for border security. We began this process last October by holding a border security intelligence conference that enabled us to gain inputs from a wide range of Department of Homeland Security and Intelligence Community partners. Since then we have worked on two tracks. On one track, we have taken concrete measures to deliver discrete, actionable intelligence to the men and women securing our borders. And although the need to protect sensitive sources and methods precludes my discussing these measures in detail today, I can tell you that members of my office have drawn on the extensive experience in the Intelligence Community to help the Department get full benefit from national collection assets, and that is a process that was not evident before I came. We have changed that substantially. On the other track, we have been developing a phased framework for sustainable intelligence support to border security. Our overall approach is to bring national intelligence to bear on the border, while at the same time fusing intelligence from border and immigration activities into an integrated threat picture, at first within individual sectors, but eventually across the length of the borders. The approach is consistent with ongoing operational efforts to push the border outward and to build a layered defense extending into the U.S. Interior. As befits an office with department-wide responsibilities, my office has focused its own staff resources on strategic efforts, including the development of a department-wide intelligence, surveillance and reconnaissance architecture; establishing a border security analysis branch; and working with interagency partners to coordinate and streamline Federal intelligence efforts on the border. Some of our efforts have had an indirect but strong effect on the delivery of operational intelligence in support of border security. Our plan for supporting State and local fusion centers envisions deploying DHS personnel, including intelligence officers, in a way that is most responsive to each center's particular need, including augmenting border security intelligence capabilities, if required. Our work on enhancing the Homeland Security Information Network, which will invigorate an important channel for sending intelligence to and receiving information from the State and local authorities. Finally, my office's development of an information architecture for the Department's intelligence enterprise will promote faster information sharing and greater interoperability, improving the delivery of operational intelligence in support of border security. In summary, my office has been an active and effective advocate of intelligence support to border security, deploying our department-wide perspective and authorities and the particular skills of our officers on behalf of the entire DHS intelligence enterprise. Mr. Chairman, I look forward to your questions. Mr. Simmons. Thank you for that testimony. [The statement of Mr. Allen follows:] Prepared Statement of Charles E. Allen Chairman Simmons, Ranking Member Lofgren, Members of the Subcommittee, Thank you for inviting me to speak with you about my role in providing intelligence support to border security. The subject of today's hearing is one to which I have devoted considerable time and energy during my tenure as Assistant Secretary for Intelligence and Analysis and Chief Intelligence Officer of the Department. I am gratified to appear alongside my esteemed colleagues from the Coast Guard, Customs and Border Protection, and Immigration and Customs Enforcement. As members of the Homeland Security Intelligence Council, which I chair, they have been invaluable partners in realizing the Secretary's vision of an integrated DHS intelligence enterprise. When I arrived last September, the Office of Intelligence and Analysis already was leading a working group on intelligence initiatives in support of the Secretary's Secure Borders Initiative, or SBI. One of my first acts was to launch an Intelligence Campaign Plan for Border Security, or ICP, which Deputy Secretary Jackson introduced to General Michael Hayden, then the Deputy Director for National Intelligence, on Sept. 27, 2005. We kicked off our planning efforts by holding a DHS Border Security Intelligence Conference on 24-25 October, 2005. This conference, held in a secure facility, enabled us to gather inputs from a wide range of DHS and Intelligence Community partners. It proved highly valuable to our subsequent planning. Among the needed improvements we identified as a result of the conference were greater focus on strategic analysis; coordination and integration of analytic efforts at both the tactical and strategic levels; inclusion of DHS agent and inspector insight in collection and exploitation activities; better-defined areas of responsibility for information sharing; and dissemination of-and identified repositories for-relevant information. Since then, we have worked on two tracks. On one track, we have taken concrete measures to deliver discrete, actionable intelligence to the men and women securing our borders. I would be pleased to describe some of these measures in a closed hearing, but the need to protect sensitive sources and methods precludes my discussing them in detail in this setting. What I can tell you is that my officers have drawn on their extensive experience in the Intelligence Community to help ensure that DHS gets full benefit from national collection assets. On the other track, we have been developing a phased framework for sustainable intelligence support to border security. Our overall approach is to bring national intelligence resources to bear on the border while at the same time fusing intelligence from DHS border and immigration activities into an integrated threat picture-at first within individual sectors, but eventually across the length of the border. This approach is consistent with ongoing operational efforts to push the border outward and build a layered defense extending into the US interior. In addition we are maintaining focus on all of our borders to include the Northern Border and maritime domain. In the first phase of the ICP, covering fiscal years 2006 and 2007, we will develop and implement a comprehensive strategy for collection and analysis of border security intelligence. During this phase, we will apply our intelligence resources and analytic focus in areas of immediate need. Our research will be comprehensive covering a broad range of topics associated with cross border violence with subcategories of human, drug, weapons, contraband smuggling and trafficking, transnational gangs, documentation fraud, and the violence these topics spawn on the border. The research and assessments we produce will include all agencies with responsibilities in these areas of interest. We will start with the southwest border, progressing to all borders based on threat assessments. We will review lessons learned from the first phase and make any programmatic investments and structural changes that flow from these findings. Finally, we will be on a sustainable footing, allowing us to push the borders outward while supporting interior enforcement. I should point out that even though our planning efforts pre-date the President's decision to deploy the National Guard to the border, we are taking this deployment into account. We plan to collaborate with the National Guard to ensure its intelligence capabilities are integrated with the overall intelligence enterprise at the border, filling in shortfalls and laying the foundation for the post-deployment period. As befits an office with Department-wide responsibilities, my office has focused its own staff resources on strategic efforts. In the area of collection and requirements, we are leading the development of a Department-wide intelligence, surveillance, and reconnaissance (ISR) architecture that will serve as the central nervous system of DHS intelligence. In the area of analysis and production, we have created a border security branch that is focusing research and analysis on a number of topics relevant to the border, including alien smuggling, counter-narcotics, money laundering, transnational criminal gangs, and identity theft and benefit fraud using travel documents. Finally, we are deeply deeply engaged in efforts to coordinate and streamline interagency intelligence efforts on the border, notably in El Paso, where three valuable intelligence centers, run by elements of three different Cabinet agencies, are exploring new ways to work together on their common mission of securing the border. I wish to highlight several efforts of the Office of Intelligence and Analysis that will have an indirect, but powerful, effect on the delivery of operational intelligence in support of border security. First, my office has led the Department's development of a plan to support state and local fusion centers across the country. Our plan envisions deploying DHS personnel, including intelligence officers, in a way that is most responsive to each center's particular need. If the fusion centers in states along the border tell us they want particular support in partnering with the federal government on border security, we stand ready to deliver. Second, we have taken on the responsibility for enhancing the Homeland Security Information Network, an important channel for sending intelligence to, and receiving information from, state and local authorities. Third, we are developing an information architecture for the DHS intelligence enterprise in order to promote faster information sharing and greater interoperability-characteristics that undoubtedly will improve the delivery of operational intelligence in support of border security. In conclusion, I believe we have been an active and effective advocate of intelligence support to border security, deploying our Department-wide perspective and authorities and the particular skills of our officers on behalf of the entire DHS intelligence enterprise. I look forward to answering your questions. Mr. Simmons. And in my opening statement I made reference to the fact that we have a 5,000-mile border with Canada, an undefended or demilitarized border with Canada; 1,900 miles of border with Mexico, again, a demilitarized or undefended, in some [[Page 8]] respects, border with Mexico; 12,400 miles of shoreline. This geography presents a vast challenge. I think back to my experience, my service in Asia, working on the Great Wall of China, thinking about the logistics and expense of creating such a great wall and then reflecting on the fact for all that effort, it actually did not work; it did not keep, if you will, the barbarian hordes from penetrating that country. So my point of view has always been very simply stated. We need to be intelligent about how we control our border. We need to focus and target our intelligence assets so we are at the right place at the right time, doing the right things against the right people. Some of my colleagues, as you have heard from their opening statements, give the impression that nothing has been done. Of course, in the Intelligence Community it is often best not to be on the front pages of the New York Times; I think we understand that. But from your perspective, how have we been focusing our intelligence assets to this problem, and what successes do you feel that we have had over the last several years--or at least since you have been in office, which is a relatively short time? Mr. Allen. Yes, Mr. Chairman. That is an excellent question because this is a very difficult, multifaceted, multidimensional threat, and trying to secure all those lengthy borders is a very large challenge. But I think we have to do it in a couple of ways. And my colleagues, who will speak later, will speak on specific operational successes and programs on which they are engaged. What I see has been lacking is a good intelligence analytic baseline to understand the threat thoroughly, to look at the border holistically. We cannot break it into simply the legal movement of goods and people, narcotics, human smuggling, trafficking, contraband, potential of WMD being smuggled across the border, terrorism, and illegal immigration. We have to look at a secure border process. Under the Homeland Security Act, the Secretary of Homeland Security is charged with developing secure borders, and I think we have to look at it in a way that we have not looked before. One of the things that I have done since we have arrived is establish a border security branch that is going to be quite substantial in order to understand the threat, the drug smuggling, the alien smuggling, and the financial transactions, including money laundering. So we are going to have to take a very strategic look at this problem that we have not done previously. The other issues that we have to bring to bear is all of the capabilities of the national Intelligence Community on to this problem. And there is a lot that can be done through the various intelligence collection capabilities. I don't have the power to collect intelligence, as the Chief Intelligence Officer, although the DHS operating components can collect information as part of their operational and law enforcement duties. But I do have the right to develop the collection requirements and priorities, which we are doing, and for the first time we have a set of priorities which we would be happy to talk about in a closed session. We also are developing new capabilities within the GEOINT. General Clapper, who just left NGA; there are things we have done that are totally unprecedented within the area of other intelligence collection capabilities. As I said in my opening comments, we are developing an intelligence, surveillance, and reconnaissance plan to deal with border security, and working very closely with General Maples over in the Department of Defense, and General Cartwright at the Strategic Air Command. All of these things we have done in the last 3 or 4 months. And as I said, when I came in, we did not have an intelligence campaign plan against the border. The Secretary and Deputy Secretary of Homeland Security directed me to do so. And I think we are in the opening stages of developing that overall strategic picture and landscape. My colleagues will talk to you in specific terms of successful operations. I agree with you that we should have done more earlier, but we are not at this vigorously. I have a weekly stand-up, and believe me, those are rough stand-ups. Of all of my people-- Mr. Simmons. Mr. Allen, before my time runs out, in all of these activities are you preserving and protecting civil liberties and rights of people across our borders? Mr. Allen. Absolutely. This is something of which we are very concerned. Civil liberties and civil rights, privacies are all taken carefully into account. Everything we are doing were done under the careful scrutiny of my legal staff as well as-- and my colleagues can talk about their lawful activities. But everything we do is absolutely lawful. And we certainly are looking at special interest aliens from certain countries that could have not only just alien smuggling, but perhaps terrorism connections. Mr. Simmons. The Chair now recognizes the Ranking Member. Ms. Lofgren. Thank you, Mr. Chairman. And it is good to see you, Mr. Allen. Certainly your reputation in the Intelligence Community is a sterling one, and I am glad that you are in the job that you have. However, as you have only been there a short period of time, as we all know, so would it be accurate to say that you have--obviously no plan is ever completely done. Even when the plan is done, it must be continuously updated, but would it be accurate to say that you have completed the comprehensive DHS border intelligence plan, including CBP, ICE and the Coast Guard, or is that in progress still? Mr. Allen. Congresswoman, that is still in progress. We are still--in my view, we are only in midstream in getting that overall plan together. I have seen a lot of vigor on the part of the individual operating components, but we have to work this as an integrated process. As you know, there are a number of initiatives. There is a Southwest Counternarcotics Border Strategy in which we are participating. It is a very layered approach. One of the things we are looking at is the information flows and trying to ensure that as we acquire information, we provide the information to the border--to the Customs and Border Protection. And we obviously have to improve those connectivities and the flow of information. We have a good deal to do, but I have some good ideas on how to get this done. Ms. Lofgren. I am sure that you do. Can you tell us, if you know, why this wasn't done before you got here? Mr. Allen. Well, I think the real issue is bringing the Department together, bringing all these various agencies and operating components together, many of which have somewhat overlapping roles, but never ensuring there is a close collaboration, integration. [[Page 10]] I meet every week with the gentlemen and ladies who will be speaking later from the operating components, and we have 2 hours of just talking about how we can integrate our efforts toward the borders and towards training together, developing our analytic expertise together. And these are very tough sessions, but we are getting things done. Ms. Lofgren. As you know, 17 suspected terrorists were recently arrested in Toronto, and there are reported--I don't know if it is accurate--at least 50 terrorist groups in Canada. And we know that the only reported terrorist caught at the border was the millennium bomber arrested at the northern border as he was--with explosives, and a Congressional Research Service says that Canada is the favored destination for terrorist groups as a safe haven, transit point and place to raise funds. Now, we have gone over that there are 10,000 Border Patrol agents stationed along the 2,000-mile border with Mexico, and we still have problems with illegal immigration with that level of patrol, but only one-tenth of that amount is on the Canadian border. That border is 2.5 times as long as the Mexican border. And I know it would be incorrect to assume that those 1,000 agents are really on the job because it is a post position. If you look at 24 hours a day, at any given time you have got between 200 and 300 people on that whole border. And we have had reports that people drive, walk, sail, ski, sled, crawl-- and probably a few other things--across the border with impunity. Does the comprehensive border plan that you are putting together address that gaping hole in border and national security? Mr. Allen. Yes. Our intelligence campaign plan would also include our northern border. We are very much concerned about our northern border. I believe that Ambassador Negroponte spoke indirectly to it in his hearing in front of the Senate Select Committee on Intelligence when he did his worldwide threat. I just met with Ambassador Negroponte and Stockwell Day, the Minister of Public Safety up in Canada. We certainly have some common interests. We are very impressed with what the Canadians have done in dealing with extremism. But this is an issue, and any nexus with the United States is of great concern to us. We obviously need to ensure that we work at this much harder. I just met with the head of the Border Patrol of Canada. We and--the head of the Border Patrol is a woman. We have agreed that we will work harder to look at issues where we should do common cause to better secure our border. The northern border is very different from the southern border, and we need new tools, techniques and methods to help make the border more secure. Ms. Lofgren. Just before my time is up, do you think 200 Border Patrol agents on a 5,000-mile-long border is sufficient? Mr. Allen. I think we need substantial resources on all our land borders. And I am very impressed with what our U.S. Coast Guards have done with our maritime borders. We obviously have to spend a great deal of time and attention with our northern border as well as our southern border. I have spent time with our southern borders. I have just made a very good trip to Mexico City where we had some very strong dis [[Page 11]] cussions on how to work harder on particularly special-interest aliens, people who might be involved in terrorism, and we are getting good cooperation in the south. Ms. Lofgren. Thank you, Mr. Chairman. My time is up. Mr. Simmons. The Chair recognizes the gentleman from Indiana Mr. Souder. Mr. Souder. First I would like to make a couple of brief comments on the northern border. Clearly, coming from the Midwest, I am concerned about the northern border, but it is a little bit different than the southern border. One thing is we work with the Canadians on harmonization of immigrationwise. I have met teams along the border. They are taking down groups in Canada, the millennium bomber himself, and working with the RCMP. We have had open testimony in this committee from Mr. Garcia about the 10- to 12,000 that it usually takes to smuggle a Hispanic across the southern border, and that there are areas along the southern border where it is 30--to 35,000 to smuggle a Middle Easterner. But since we have no real knowledge of what is coming into Mexico, east, west or from the south, and they don't have functional control of their country, and we don't have functional control of our south border, that is partly why we focus so much on the south border. We do need attention in the north border, in fact, because so many Middle Eastern natives in Canada and citizens of the U.S. live in Detroit and Buffalo, Toronto and Montreal. That is clearly a pressure zone, but it is not exactly the same as the south border. I had a couple of questions. One is kind of simplistic, but it has been an increasing frustration of mine. It seems like often our agencies are spending more time meeting with each other to try to coordinate their intelligence than trying to figure out who the bad guys are. I have a very simple question: Given that we will probably never eliminate all stovepiping, and given the fact that so many of the different intelligence subgroups have somewhat different goals, in addition to terrorism they have a multiplicity of goals and focusing on different things, what I am wondering is if you are a border agent at any of the official border crossings, and you have an ID and the name comes up, is there a pop-up, just a signal? If the Department of Defense doesn't want to share certain intelligence, if the CIA doesn't want to share certain intelligence, if different parts of DHS have different intelligence in all this that pops up and says this is a person of interest, do we have enough harmonization of our intelligence agencies that even if they don't want to share the information, that if a name hits the border system, a pop-up occurs? Mr. Allen. I think--and I will let Customs and Border Protection, Captain Bortmes, speak to that later, but I, having visited the Border Patrol and spent time with it in two sectors and traveled with Congressman Reyes to El Paso, I am convinced that databases, as names are checked, those are done very quickly and very efficiently. And believe me, having come from the Central Intelligence Agency, there is no information if it involves the security of the United States that can be withheld by CIA or anyone else in getting that information. If it needs to be sanitized and declas [[Page 12]] sified, that can be done if it deals with personalities of interest to the Border Patrol. Mr. Souder. So you are saying that you are confident that-- because I ran into a case in my area that we have. It was a new category of people we are watching as opposed to our watch list; in other words, they haven't done anything wrong, they are not even a suspect, but they are doing certain behaviors. You are confident that each branch of the government, that if they have someone that they have some interest in, they may not have an arrest warrant out, they may just be trying to trap them, that all those names are in a system, in a computer system, that if that person crosses a border entry, that some warning will come up to say hold this person, here is the agency you contact. Mr. Allen. I am not confident that every database that has a potential person of interest would be immediately available to the Border Patrol. But the Border Patrol does have an ability to check to see if there is a potential record that would indicate that individual has engaged in something nefarious or has connections with terrorism. I think they do a good job. There are people turned away every day at our borders. I am sure Mr. Bortmes can speak more directly about this, but I do believe that this is improving. Database management is a very hard problem for the U.S. Government, and particularly for the U.S. Intelligence Community. Mr. Souder. Because this isn't a question of whether the Border Patrol is doing their job, or CBP, this is a question about is the information getting to them with which to do this job, which I know we are pushing towards, but it is really hard to get all these agencies to share complete information, and if they won't share it, if they would at least share the name so that people can get back to them. I have one other question. How do you see AMO fitting in Riverside? The maritime center. Mr. Allen. Out in California? Mr. Souder. Yes. Mr. Allen. Well, we are working closely with AMOC, that is a center there. We are providing them with strategic information. Through our initiatives and building requirements, we have provided them with data that they have never received in the last 2 months. In fact, they say they are inundated with some of the information that using national NTM systems that they never had access before. So we are starting to make progress. We are not where we should be, sir, but I am pushing it every week. Mr. Souder. Thank you. Because it is clear that the area you are working in is the underpinnings of everything else we do, because good intelligence and actionable intelligence is how we are going to prevent things. Thank you for your work. Mr. Simmons. I believe I just got a call for a vote, but we have time for an additional--a couple of sets of questions, I believe. The Chair recognizes the Ranking Member Mr. Thompson. Mr. Thompson. Thank you very much, Mr. Chairman. Mr. Allen, are you aware of CBP being accused of holding back information to local law enforcement agencies? [[Page 13]] Mr. Allen. No, sir, I am not. And I would--I will let Mr. Bortmes answer that question when he appears on the second panel. Unless it is for some reason sensitive law enforcement case--investigative case information, one would think that information would not necessarily be held back in ways that would not be effective. Mr. Thompson. So you would agree that the sharing of information between agencies is a must, from an intelligence standpoint. Mr. Allen. It absolutely is. That is where I am--as you know, Congressman Thompson, that is where I am spending a lot of my time. We are putting people--Secretary Chertoff has just approved my implementation plan for putting my officers out with State fusion centers--and, in fact, I want to put them out in every fusion center--in order to help both the sharing of information from the national Intelligence Community down at the lowest possible level to the local level. Mr. Thompson. Can you give me our analysis of where CBP, ICE and the Coast Guard is with regard to the common sharing of intelligence with other State and local partners? Mr. Allen. Well, I would defer to them, but we have become--for State and local fusion centers, we have become--my own office has become sort of the centerpiece, the executive agent for the Department for the flow of information down to State and local level. I am sure there is information shared at the local level by all the operating components, and I should let them speak directly to that. Mr. Thompson. So your job will be to manage the fusion center? Mr. Allen. To ensure that there is a flow of information down to the State fusion centers and to the major city fusion centers. We are in the process of doing that and in the process of deploying officers to those centers. We have deployed them to Los Angeles, New York, Louisiana, Maryland, and we are sending an officer to Georgia and to Virginia in the near future. Mr. Thompson. And the goal of those centers is to have some common thread of intelligence available to all parties? Mr. Allen. Yes, sir. Those are under State or city control. And our job is to coordinate the flow of Federal information down to those centers and to ensure that they have all the information that they need in case there is some risk or danger to that particular State or that particular city. Mr. Thompson. Well, with respect to border intelligence, will we have CBP and ICE agents in those fusion centers also? Mr. Allen. That is a decision I think that the head of the operating component must make. We certainly will have officers from DHS there. They obviously, and JTTS, the Joint Terrorism Task Force, that is managed by the FBI, and they are there in many places, and they do a tremendous job in working and sharing of information. Mr. Thompson. If it was left up to you, would you have one there? Mr. Allen. I am not sure. I think that if we have the right small number of officers there--and certainly officers from ICE or CBP could come down to a fusion center working for the Chief Intelligence Officers as part of his outreach to State and local governments. I would like that very much. The Secretary has designated [[Page 14]] me and my office as executive agent for the Department in the flow of information to State and local governments. Mr. Thompson. Well, since we are talking about border intelligence--I will have some other questions, Mr. Chairman, I will submit for the record. Mr. Thompson. But, Mr. Allen, the only other question I have for you is, are you aware of the IG report that came out yesterday with respect to the Homeland Security Information Network? Mr. Allen. Yes, sir, I am aware of it. I have not read it. I have asked my information management officer to send it to me. The Homeland Security security network is run by the operations director at the Department. Mr. Thompson. But you also--there was some--well, you have not seen it, but there are some weaknesses. Mr. Allen. Yes. And one of the things that we have been doing--and let me just say on the classified side we are doing three things. One, on the Homeland Security Information Network I have put in an intelligence portal for sensitive but unclassified information to go to State and local governments. We have run some experiments, and we have gotten good reception on that. Two, I took over a very broken Homeland Security Information Network system. We have fixed that to almost every State and fusion center. And three, we are forming a Homeland Security data network, which will be a more robust--a more robust classified network. We are in the early stages of doing a pilot test on that. We have every intention of doing that. Very candidly, Mr. Thompson, we have been behind in our information management, and I am not happy with it, and I know that the Secretary isn't either. Mr. Thompson. I yield back, Mr. Chairman. Mr. Simmons. I thank the gentleman. For the record, we have a motion to adjourn on the floor. I will keep the hearing going. Ms. Harman is going to go vote and return. I think there is adequate time for the gentlelady from New York to ask her questions of Mr. Allen, and we will try to keep this moving along. Mrs. Lowey. Thank you very much, Mr. Chairman. And I thank you, sir, for your presentation. And I particularly appreciate your focus on fusion centers. I met with the head of the New York State Department of Homeland Security just last week, and one of the points he unfortunately shared with me is that the communication between the Federal Government and the local officials in New York is mediocre at best. So, number one, I would appreciate if you would comment on that and what is being done to improve upon it. And secondly, there are three fusion centers, as you know, in New York. There is one in Albany, there is New York City Police Department, and there is one in Rockland County. I know Westchester is in the process of putting one together, but there isn't one now. [[Page 15]] I am very pleased that you talked about placing your people in these fusion centers. Perhaps you can continue to expand on that. How fast is this moving? Are you getting support for doing that? Perhaps you can focus specifically on New York. I happen to have an interest in it; it happens to be my district. What is happening there? And if the New York State Department of Homeland Security said there is inadequate communication, what are you doing; what can you do; what will you do to improve upon it? Mr. Allen. Well, I thank you for the question because New York City--New York State, and New York City in particular, has been a focus right from the moment I arrived. I will soon have three officers in New York City working with the Intelligence Division and with the Counterterrorism Division. I have a general liaison officer there now full time. We are going to send up two very experienced all-sourc intelligence officers to help in mentoring and teaching in New York City. Mr. David Cohen and Larry Sanchez are very strong on this. Mrs. Lowey. Didn't David originally come from New York? Mr. Allen. Well, his wife is from Brooklyn. He came from Boston. He still has a Bostonian accent. But he is a New Yorker, he truly is. And up in Albany we have a UNYRIC where we work very closely. And I have a team in UNYRIC this week. I intend to put a full-time officer in UNYRIC, there is no question about that. My principal deputy, I have an outsider, Jack DiMaggio, who spends his full time working to get our officers out to the various fusion centers. Albany--at this stage we do not have plans to put anyone in Rockland County, but we do have--we will put people in Albany. And I respect that Homeland Security advisor. We are going to improve our communications flows. When we have a threat into New York, we always call the Homeland Security advisor. We call him on the unclassified line if it is an open issue, but if it is classified, we have secure communications. And Homeland Security has made certain that the UNYRIC as well as New York City has classified capabilities. I have substantially augmented cryptographic capabilities for New York City so that they can communicate with the Federal Government. And on top of that, I am going to put in a secure video for Commissioner Kelly up in New York City so that he can dial in if he has a problem or a worry about something, we can just sit and secure a video conference and discuss the threat. Mrs. Lowey. Well, I personally, before I go and vote, want to thank you for that, because Chairman King and I--I am not sure, Chairman Simmons, whether you were with us at the time, it was shortly after 9/11, and we went down there and met with Commissioner Kelly, and it was clearly, good luck from the Federal Government, he was on his own. And as you know, he has established a counterterrorism network around the world. And I have been with David Cohen and others visiting their system and their various offices, and it really is impressive. They really follow up on every single lead. I just wonder, how many leads do you get from the Federal-- just on average, from the Federal Government coming down to them, or [[Page 16]] are they really picking them up themselves through their own networks? Mr. Allen. Well, I think we get quite a number of threats that relate to this country that flow in from overseas, and obviously from the extraordinary capabilities of the FBI. Many of these are not valid; we have to look at their credibility. And this is something that goes on every day. New York City also picks up suspicious activity, and they are very good at informing us. New York City is a model for doing counterterrorism, and we learn from working with New York City it is a two-way street. I have learned a great deal from working with Dave Cohen, a man with whom I worked with at the CIA, as well as Mr. Sanchez. So I think it is a mutual sharing of information. And Commissioner Kelly has made it clear that he wants to work very closely with the Department and with the operations that I direct. Mrs. Lowey. I gather I have to vote, but let me just say thank you very much. You have been on the job for how long now? Mr. Allen. I have just arrived 9 months ago. Mrs. Lowey. Well, I appreciate it. I remember on our other committee it took 2-1/2 years out of 9/11 for an inspector general to set up a computer system. So all these questions that we have, why hasn't it been done, that is past, and I hope that you can move as expeditiously as possible. And I know that New York City will be grateful for your efforts. One thing really impressed me as I visited these centers. They follow up on every single lead, no matter how minor, because you never know how minor it really is. So I thank you very much for your important work, and I guess I had better vote. Mr. Allen. Thank you, Congresswoman. Believe me, New York City is on my thoughts all the time. They ask me what worries me always, and I am always worried about New York City. And I am always sure to tell David Cohen I worry about it before I go to sleep. Mrs. Lowey. You keep worrying about it, because I have five of my seven grandchildren living in New York City, plus two of my three kids. So I worry about it morning, noon and night. And hopefully we will continue to put all the appropriate procedures in place. Continue to worry because that is the only way we can make sure we are covered. And I thank you very much. Mr. Allen. Thank you, ma'am. Mr. Souder. [Presiding.] I assume this is done--and I am not trying to get into specifics that would be classified, but I assume that on a daily basis there is attempts to see where our vulnerabilities are, where we are testing our border crossings, where we are testing our ports, where we are testing our airports, and you are checking to see where our holes are. Is that a correct assumption? Mr. Allen. That is correct. Whether it is terrorism from abroad, al-Qa'ida, whether it is sort of global--inspired homegrown terrorists that are looking for weaknesses. We see alien smuggling networks and narcotraffickers always trying to find new ways of getting across our borders, yes. Mr. Souder. One of the concerns that I have is historically--I chair the narcotics oversight committee directly and have spent [[Page 17]] most of my career working with narcotics as well as the Speaker's Drug Task Force, and came on here because, having worked narcotics issues, it was a logical thing to move to Homeland Security and border because they are so interconnected, and their functions are interconnected--is that often we are better at figuring out after some things happened in explaining patterns rather than being able to prevent. And it is much more difficult to try to put the little pieces of the alphabet in the connection until you have actually had the action. And yet the risk is so much higher even in Homeland Security on one big tragic thing than kind of the daily pounding we take on narcotics and other types of illegal activity. My question is, how much of the focus in the intelligence gathering--is it the National Targeting Center? Who is primarily trying to figure out when we do this, this is how they may change? In other words, let's say we put a fence over parts of the border. Where are they going to move next? Are we going to squeeze them into the Caribbean, are we going to move into the--if we control the Florida area, are they going to move in where we don't have as much air surveillance between, say, Galveston and the center of Florida? What if we do this will move them more to the Canadian border? What will move them to North Dakota as opposed to through the main border crossings? Is that type of discussion occurring? Is it interagency? How does it interrelate with the NORTHCOM and SOUTHCOM and the JATFs? Mr. Allen. And it is a very good question because--and I will let my colleagues--again, Mr. Bortmes, Mr. Sloan and Ms. O'Connell--talk particularly about the daily looking at changing patterns. My job--and I have here my Chief Threat Assessment Officer--is to look at how these patterns change, working with all sources of information from the traditional Intelligence Community as well as from the operational components of Homeland Security to try to focus very clearly on where things have shifted because--and I am sure Mr. Sloan can tell you about maritime patterns and how, as the Coast Guard increases pressure in one area, the roots move to another. I think we have to do this very, very systemically. I have talked to Mr. John Walters, who heads their Office of Drug Enforcement Policy, and he believes that we have to look at this very holistically, and we have to stand back and get strategic intelligence. If we simply follow the latest lead, the latest tip, and just do tactical intelligence, we won't understand it. And your question is very much on target. We have to do both; we have to do tactical operations, and we have to do strategical analysis, otherwise we will never win this--and I don't know if win is the right word--otherwise we will never be successful in this struggle to secure our borders. Mr. Souder. One of the challenges, when there was a lot of focus on the Arizona border, we took resources from California and Texas and moved them over. It is not clear that the groups who are moving any kind of illegal traffic, whether it be human, narcotics, terrorists or anything else, behave in zones like we behave. While they may have certain syndicates that control certain parts of those zones, they don't match up to our sectors. And what clearly hap [[Page 18]] pened is we had an increase in activity in areas where we had pulled out, and so the net reduction wasn't anything like consolidating in one zone. If we put the Guard on the border, if we fence certain sections, I presume that as we are making those decisions, much like--I mean, anybody knows who goes to San Ysidro, you can see all the watchers. You can see the watchers on their side and our side going back and forth, and the lane movements, and both sides are watching that. And I would like to think that we are increasingly doing that anticipation of what, if we do this, the next move is going to be. And a lot of that is intelligence-driven: Are we doing preventative intelligence as well as reactive intelligence? And that is kind of the biggest challenge that you have in the services. One other question on NORTHCOM. They have been talking about standing up more intelligence and coordination, whether it is down at El Paso or up in Colorado. Do you know what the status of that is? And do you have an opinion as far as how-- whether the Defense Department needs to get into more aggressive intelligence on the border? Mr. Allen. Well, let's just go back to proactive intelligence activities and ways to do prevention. I think Mr. Bortmes may talk about intelligence-driven activities or operations on how we have tried to anticipate, if there is a threat, to preempt people from entering and crossing our borders who could have very nefarious plans. The one thing that we are working on right now broadly within the Intelligence Community as well as the Department of Homeland Security is the issue of radicalization. We are also working with State and local governments because we are finding that the States are studying radicalization. What causes a person to move from, say, a fundamentalist view of the world to one of extreme, say, solipsism and where violence might be created? How can you prevent that deterrence? How can you engage in a policy of deterrence or a policy of preemption? So we are working at that. And my deputy for intelligence, who is not here, has formed a Radicalization Working Group, and we work across the community and across the Department. On the NORTHCOM issue, that is very important. I'm getting a NORTHCOM officer assigned directly to my office so we can coordinate more. I met with Admiral Keating. I have met with retired Captain Mike Knoll, who is a J-2 out there. It is clear that they do wish to expand their energies and efforts to work secure borders. They have had some issues getting all the activities in which they want to undertake, but we are working very closely with them, and they are expanding their energy on border security. Ms. Lofgren. Just real quickly. All of the terrorists who attacked the World Trade Tower, the first attack and the second, actually came in with visas through airports, not across the land borders. Does your plan that you are working on address that element? Mr. Allen. The intelligence campaign plan is more focused on securing the land borders in particular, both north and south. We have come leaps and bounds since September 11th in being able to control particularly the movement through the air and our airports of entry. I believe the kind of programs that are in place now and which are being improved is much greater. I know that Mr. Sloan could talk about security at ports as well as maritime and border intrusions. But what we have since September 11 is a much harder country to enter illegally. However, I am very concerned about the potential for "clean skins" getting breeder documents, getting genuine documents, say, in Western Europe and being able--as Director Mueller might say--to be only an e-ticket away from entering the United States. So we do worry about that. Ms. Lofgren. Thank you, Mr. Chairman. And I would yield back so that my colleague from California can begin her questions. Mr. Simmons. The Chair recognizes the gentlelady from California, the distinguished Ranking Member of the Intelligence Committee. Thank you. Ms. Harman. Thank you for holding this hearing. Welcome, Charlie. I just voted not to adjourn Congress. I actually think there are some important things to do, and one of them is to enact a comprehensive immigration reform strategy. I realize you are not here testifying on that, but I thought I would, until I collect myself, make a point, which is that we do need stronger border enforcement at all of our borders and not just our southern border. We surely need an intelligence strategy to fit with border enforcement, because most folks coming here are just looking for a better way of life, they are not potential terrorists or criminals. But we also need the rest of it, which is some fair and reasonable suggestion for how to deal with 11--or 12 million people who are already here. And I hope we will do both, and I think it would be a huge mistake if some folks in this Congress prevent us from doing both. So that is my rant. Now I have collected myself. And I know you have been asked that question about fusion centers and some of the other issues that I care about, too. I sort of want to approach this more philosophically, if I can, and that is to get your sense, and I know you can give us your sense because this is your background in what you do for a living, of how critical the intelligence piece is to border enforcement. If you get this right, and if the intelligence--if the fusion centers work, and if information sharing actually happens, what could we begin to see? And if you get it wrong and there isn't information sharing, and the fusion centers implode, and the intelligence products are bad, what could we see? Mr. Allen. I think a strong intelligence integrated capability with law enforcement along with good policies and good cooperation with our neighboring countries will make a world of difference. I think intelligence can and should be a major driver because, to me, to be able to understand the threat, to focus in on those threats that are most worrisome to us--and, as you said, it is not just the illegal workers. What really worries us are the narcotraffickers, the alien smugglers and, above all, special interest aliens, some of whom may be coming here from Asia, the Middle East, South Asia, or Africa as part of an extremist group. If we get this right--and this is something that we are working with Ambassador Negroponte. As you know, Ambassador Negroponte served in Honduras, he served in Mexico City, he knows some of the border issues very well, and we discussed it. He looks to the intelligence-driven efforts that we are conducting as very much part and parcel of the overall national intelligence effort. Ambassador Negroponte, and I saw him last night, is very determined to work with us on this issue. Ms. Harman. Well, I agree with that. We call him Director Negroponte, by the way, in the Intelligence Committee because we think he has got to lead this endeavor and not just be an ambassador. But that is a comment for the winds. At any rate, I agree. And if we get it wrong, conversely, the highest fences in the world, 3 million Border Patrol folks I doubt will prevent us from being harmed by either the criminal element or terrorist element because there is no such thing--and I am asking a rhetorical question, but I assume you agree with me, Charlie. But there is no such thing as 100 percent security anyway; is that correct? Mr. Allen. That is absolutely correct. I talk about stabilizing our borders. The term ``seal our borders'' is not a phrase I use. I want stability on the borders so we can then be able to focus on those real threats. And they are real threats, and some that I see every day that give us great concern. Ms. Harman. Well, I thank you for that. And, Mr. Chairman, let me conclude by saying if we don't get the intelligence piece right, we will never get border enforcement right, period. And border enforcement obviously is more than the Mexican and the Canadian borders. It is port security; it is airport security; it is those folks who come in on cruise ships to Catalina off the coast of California where there are no border controls, and then take the ferry boat into San Pedro or Long Beach, or pick another island in another location. None of this will work if Charlie Allen doesn't succeed. So, no pressure, Charlie, but please succeed. Thank you, Mr. Chairman. Mr. Simmons. I thank the gentlelady for her questions and her comments. And I share with her that I could not agree with her more, that what we do intelligencewise on the border, how we focus our intelligence assets is going to determine whether or not we succeed; that we simply cannot put a policeman or a soldier in every place for 12,000 miles. It simply won't work. And in excusing our first panel, I would like to comment again where he says ongoing operational efforts to push the border outward and build a layered defense extending within the United States. We talk about the border as a line in the sand, but from an intelligence standpoint we are talking about someone who may appear on the radar in Afghanistan, transit Europe, show up on a ship or in Canada or in Mexico, and at some point in that process we try to get a line on them so when they hit the border, we can grab them, or when they cross the border, they set off a trigger mechanism and ring a bell so that subsequently we can get them within the United States. So it is not a question of intelligence just at that point; it is a question of intelligence in depth overseas and intelligence follow-up within the continental United States, again, within the framework of our civil liberties and our rights. [[Page 21]] Thank you, Mr. Allen, for your testimony. And I would ask the second panel to quickly gather. I know our Coast Guard friends have some time constraints, but we want to pick their brains. Thank you very much. The second panel will be made up of what you might call the operational components of intelligence at the border. We have Mr. James Sloan, Assistant Commandant For Intelligence of the U.S. Coast Guard, charged primarily with port security and offshore security activities; Ms. Cynthia O'Connell, Acting Director, Office of Intelligence, Immigration and Customs Enforcement. And I think we all have an understanding of what our Immigration and Customs folks are doing intelligencewise at the border. And then lastly Mr. L. Thomas Bortmes, Director, Office of Intelligence, Customs and Border Protection. I welcome the three witnesses. I know they all have prepared statements. We would appreciate it if they could summarize the high points of their statements for no more than 5 minutes, allowing the Members to ask questions. And why don't we start with the Coast Guard. Mr. Sloan, the motto is Semper Paratus. Are you prepared? STATEMENTS OF JAMES SLOAN, ASSISTANT COMMANDANT FOR INTELLIGENCE, U.S. COAST GUARD, U.S. DEPARTMENT OF HOMELAND SECURITY. Mr. Sloan. Yes, I am, Mr. Chairman. And thank you. And thanks also to Ranking Member Lofgren. I am Jim Sloan. I am the Coast Guard's Assistant Commandant For Intelligence and Criminal Investigations. And I do have a prepared statement that I would ask be inserted into the record. Mr. Simmons. Without objection. Mr. Sloan. Thank you, sir. I would like to thank each of the members of the committee for the opportunity to discuss the Coast Guard's intelligence and criminal investigations program and its role in support to Coast Guard missions regarding border security. Bounded by the oceans, America always has been a maritime Nation. The oceans are a resource that we have to protect, a path for global commerce, and, unfortunately in today's world, a route for potential terrorists and other threats to our national security. Mr. Chairman, you commented on the 12,500-mile border that is the maritime border, but in addition to that, the Coast Guard is responsible for 95,000 miles of coastline when you consider the laws that the Coast Guard has to enforce within 3.4 million square miles of Exclusive Economic Zones extending 200 miles from the United States and its territories and possessions. This places us in a position to push our borders out and react to the threats far at sea. [[Page 22]] It is through the Coast Guard's Intelligence and Criminal Investigation Program, that includes not only those personnel serving in Coast Guard headquarters, but those serving as liaison officers at various agencies, the intelligence analysts, the COASTWATCH personnel at the Intelligence Coordination Center, as part of and partnered with the Office of Naval Intelligence at the National Maritime Intelligence Center, the intelligence specialists at the Area Maritime Intelligence Fusion Centers, the field intelligence support teams at U.S. ports, and our criminal investigators are all involved in accomplishing the objectives to provide immediate actionable warning intelligence on terrorists and other threats to the Coast Guard's operational commanders, the Commandant, the Department of Homeland Security, and our other consumers. Many Coast Guard missions are cued by intelligence such as counterdrug initiatives, alien smuggling, migration, fisheries enforcement, and other law enforcement functions. It is the personnel at the Department's Office of Intelligence and Analysis that Charlie Allen represents, the Area Maritime Intelligence Fusion Centers, and the Intelligence Coordination Center that blends the information and places it into the appropriate channels. As part of the Department of Homeland Security's intelligence architecture, I am committed to integrating the Coast Guard intelligence capabilities with other components in the Department to support a unified DHS intelligence enterprise. Significant challenges remain, and many of them have been discussed in the last hour, and more work needs to be done, but the Coast Guard and the organizations represented here today are dedicated to ensuring the safety and security of the American people. Thanks for this opportunity, and I am prepared to answer any questions. Mr. Simmons. I thank you very much. [The statement of Mr. Sloan follows:] Prepared Statement of James Sloan Good morning Mr. Chairman and distinguished members. It is my pleasure to be here today, alongside Ms. Cynthia O'Connell, Intelligence Director of ICE and Mr. Tom Bortmes, the Intelligence Director of CBP, appearing before you today to discuss the Coast Guard Intelligence Program's role in border security. The security of the U.S. borders is a top priority for the Coast Guard and the Department of Homeland Security (DHS). This hearing is a testament to the continued importance placed on border security and recognition of the Coast Guard's vital role in port and border security. Border security conveys the thought of land masses converging together. The reality is our maritime borders are the longest front in this battle. The Coast Guard's authority focuses not on land-to-land borders but land-to-water borders that include the Pacific and Atlantic Oceans as well as the Gulf of Mexico and the Great Lakes. These shores involve key border security issues that must be included in any border security discussions and decisions. [GRAPHIC] [TIFF OMITTED] T4854.001 As the Nation's primary maritime law enforcement agency, an armed force, and lead Department of Homeland Security (DHS) agency for maritime security, the Coast Guard has significant authorities and capabilities with regard to maritime security. Still, success in achieving maritime border security requires the full and complete cooperation of our interagency, state, local, tribal and private sector partners. The maritime domain is an avenue for those wishing to smuggle people and illicit drugs into our communities - and an avenue that could be exploited as a means to smuggle weapons of mass destruction and/or terrorists into our country. In 2005 alone, the Coast Guard pted 9,500 undocumented migrants attempting to enter the United States illegally by sea, a 100 percent increase over 2001; and Prevented more than 338,000 pounds of cocaine (an all-time maritime record) and more than 10,000 pounds of marijuana from reaching the United States. While the 9/11 Commission noted the continuing threat against our aviation system, it also stated that "opportunities to do harm are as a great, or greater, in maritime or surface transportation." There has been a great deal of focus on container security, which is appropriate; however, a container is only as secure as the ship and crew that carries it. In fact, the most often observed U.S. maritime threat remains smuggling. As on land, we know that there are numerous professional migrant smuggling rings that operate in the maritime realm. The proximity of U.S. population centers to the maritime domain and the diversity of maritime users present significant and wide ranging vulnerabilities. Effective intelligence support can address these vulnerabilities to detect and defeat threats along our maritime borders. Many of the Coast Guard's mission successes are cued by intelligence. In addition to supporting our focus on preventing terrorist attacks, timely intelligence is critical in our efforts to stop international maritime drug trafficking, maritime alien smuggling, illegal high-seas driftnet fishing encroachment of U.S. natural resources in the Exclusive Economic Zone, and damage to the marine environment. Intelligence is a needed force multiplier given our limited assets and expanding mission requirements, it is the value added to enhancing maritime domain awareness. Leveraging our longstanding partnerships and unique maritime authorities, access and capabilities the Coast Guard has significantly enhanced nationwide maritime security. The role of intelligence is to provide timely, accurate and actionable information so that decisions can be made and actions taken that support the operational commanders. Significant challenges remain and much more work needs to be done, but we are focused on the right priorities. The Coast Guard Intelligence and Criminal Investigations Program has established and actively participates in several partnerships to enhance border security and other Homeland Security initiatives, such as: The Coast Guard works in close partnership with DHS Office of Intelligence and Analysis (I&A) and other elements of the Department to provide intelligence support to homeland security. We are providing strong support for the standup of the intelligence functions within OI&A by detailing intelligence analysts and assisting in building relationships with other Intelligence Community partners. The Coast Guard Intelligence Program and the Office of Naval Intelligence continue to build an effective joint intelligence partnership to enhance maritime domain awareness. The Coast Guard's Intelligence Coordination Center is co-located with the Office of Naval Intelligence, which comprises the National Maritime Intelligence Center (NMIC); The NMIC has been designated as the core element for the Global Maritime Intelligence Integration (GMII) Plan. The GMII Plan is one of the eight support plans that make up the National Strategy for Maritime Security (NSMS). The Coast Guard's Intelligence Coordination Center (ICC) and the Office of Naval Intelligence (ONI) have been the foci of the GMII effort thus far. Achieving Final Operating Capability (FOC) is dependent upon strong representation from the other core elements, including: DHS - CBP and ICE, DOJ - FBI and DEA, Treasury - OFAC and FINCEN, NSA, and NGA. The overarching GMII requirement is to identify, locate, and track potential threats to U.S. maritime interests and subsequently transfer accurate, relevant, and collaborated information to those operational entities. Within the Coast Guard's Intelligence Coordination Center (ICC), the Coast Guard and CBP have exchanged personnel to enhance data sharing between the ICC's COASTWATCH program (which gathers and analyzes information based on the ship's 96-Hour Notice of Arrival (NOA) report on vessels and people approaching U.S. ports) and CBP's National Targeting Center (cargo tracking) process. COASTWATCH has improved processing of NOAs by more than 600 percent since FY05. This COASTWATCH mission has detected and provided advance warning about numerous arriving individuals identified in federal law enforcement and immigration databases as criminal or security concerns, including active warrants and "deny entry" orders for previous border crossing violations. In addition, several individuals wanted for questioning by federal agencies about possible extremist associations have been identified in advance of arrival and referred to the relevant agency for investigation. The Coast Guard provides access, where authorized and appropriate, to its intelligence and criminal investigations databases, as well as advice to others developing intelligence sharing architectures. The Service has also provided intelligence analysts, exchange personnel, and liaison officers to other agencies active in the maritime arena; The Coast Guard's Intelligence and Criminal Investigations Program provides a permanent presence on the FBI's National Joint Terrorism Task Force (JTTF) and select regional JTTFs; "Operation Drydock", which began in December 2002, is a joint Coast Guard and FBI criminal and counterterrorism investigation into national security threats and document fraud associated with U.S. merchant mariner credentials. Currently, the databases compiled are managed by the Coast Guard Investigative Services (CGIS) and are used by El Paso Intelligence Center (EPIC), Coast Guard ICC, and Coast Guard Sector Commands nationwide. The "Operation Drydock" databases are also used by Coast Guard Regional Examination Centers (REC) to vet applicants seeking merchant mariner documents and licenses; and "Operation Panama Express" is a multi-agency Organized Crime Drug Enforcement Task Force (OCDETF) investigation that began in the mid 1990s to help stem the flow of illegal narcotics flowing from Central and South America via maritime means. The Coast Guard Investigative Service is a partner in Panama Express. The CGIS agents assigned to Panama Express speak fluent Spanish and have a wealth of practical hands-on experience in Coast Guard maritime law enforcement operations and CGIS narcotics investigations. The Coast Guard has also increased its efforts to share law enforcement and intelligence information collected by the Coast Guard with other DHS components and other federal government agencies. In addition, the Coast Guard's Intelligence Program activities have been enhanced to assist in countering potential maritime threats there Establishment of Field Intelligence Support Teams (FIST) in various key U.S. ports. FISTs gather local law enforcement information, establishes contacts, interviews masters and crewmembers to better understand maritime threats; Enhanced intelligence capability at the theater-level with the standup of the Maritime Intelligence Fusion Centers (MIFCs) Atlantic and Pacific. The MIFCs increase collection and analytical capabilities, enhance all-source intelligence and information fusion, improve the timeliness and quality of intelligence support to Coast Guard operational forces. The MIFCs also ensure the rapid reporting of information gathered by Coast Guard forces into the Department of Homeland Security and Intelligence Community at the national level; Conducting Port Threat Assessments as a complement to the MTSA-mandated Port Security Assessment, to provide analyses of threats for specific ports, inclusive of both terrorism and crime - foreign and domestic - using law enforcement and intelligence information; Fielding of Sector Intelligence Officers put intelligence support at the tactical level; and, the Coast Guard's membership in the Intelligence Community; our wide-range of missions, and our expertise in the maritime domain allows us to interface in numerous and diverse forums at various levels within the DoD components, law enforcement agencies, intelligence community, state and local stakeholders, and private industry. Analysis of the maritime threat to U.S. ports is challenging. Characterization of incidents and trend analysis is complicated by the convergence of large volumes of cargo, alien smuggling networks, the narcotics trade, terrorism, regional conflict, maritime criminal enterprises, and some activities that fall into multiple categories but fall short of being a direct security threat to U.S. ports. It is the Coast Guard's overarching strategy, through layered security architecture, to "push out our borders." Our unambiguous goal is to meet threats far offshore in order to prevent hostile persons, vessels, or cargoes from entering our ports or coastal regions. Our ability to push the borders out is an essential element in protecting our homeland.The Coast Guard faces challenges in the maritime domain similar to those of our colleagues in securing the land border - with a limited set of resources, located amid vast geographic areas and huge amounts of legitimate activity - stop those seeking to do us harm. The foundation of the Coast Guard's maritime strategy relies on three key priorities: Achieve Maritime Domain Awareness; Establish and Lead a Maritime Security Regime; and Deploy effective and integrated Operational Capability. These are not stand-alone goals, but rather part of an active system of layered maritime security. For example, the Maritime Transportation Security Act (MTSA) led to the establishment of domestic and international AIS carriage requirements for certain commercial vessels. But without investment in systems to collect, analyze and disseminate the AIS signals we lose the opportunity to assess threats early. Similarly, the detection, identification and interdiction of small vessels (that certainly do not advertise their position) used by smugglers throughout the Caribbean and Eastern Pacific requires persistent surveillance capabilities. In the end, Coast Guard assets must be capable of mounting a dependable response to identified threats lest we have information but not the capability to act. Coast Guard assets and systems are required to operate across a diverse operating area including within our ports, in the littoral region, and far offshore. Thanks to the strong support of the administration and Congress, a number of initiatives are underway to transform Coast Guard capabilities. I would like to highlight a few of these initiatives as each will have a broad and substantial influence on our intelligence capabilities to mitigate current and future maritime risks. Integrated Deepwater System. The centerpiece of the Coast Guard's future capability is the Integrated Deepwater System, recently revised to reflect post-9/11 mission requirements such as enhanced intelligence gathering and handling capabilities. The Integrated Deepwater System was designed to secure the nation's maritime borders. The vessels delivered by the Deepwater program will serve as the Coast Guard's "eyes and ears" and allow the nation to see, hear and communicate activity occurring within the maritime domain. The Coast Guard's sustained presence along our maritime borders is unique. More capable Deepwater assets, linked to each other and multiple agencies through Deepwater's net-centric command-and-control system will significantly improve information sharing, collaboration, and interoperability in the maritime domain. Vessel tracking. Securing our vast maritime borders requires improved awareness of the people, vessels and cargo approaching and moving throughout U.S. ports, coasts and inland waterways. The most pressing challenges we now face involve tracking the vast population of vessels operating in and around the approaches to the United States. In support of this requirement, the Coast Guard has: Established the Automatic Identification System (AIS) to provide continuous, real-time information on the identity, location, speed and course of vessels in ports that are equipped with AIS receivers. AIS is currently operational in several major U.S. ports, and the Coast Guard's Nationwide Automatic Identification (NAIS) project will expand AIS capabilities to ports nationwide; and Under U.S. leadership the International Maritime Organization recently unanimously adopted a global long Range Identification and Tracking scheme that will provide information about all commercial ships of 300 gross tons and above operating within a 1,000 nautical miles of our coast whether the ship is bound for a U.S. port or is on innocent passage. Additionally, we will have tracking information out to 2,000 nautical miles when ships have declared its intent to arrive in a U.S. port. Maritime C4ISR Enhancement. Existing Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) systems and operational concepts must be reoriented and integrated with current and emerging sensor capabilities and applicable procedures. Similar to the nation's air space security regime, the maritime security regime must integrate existing C4ISR systems with new technologies and national command-and-control systems and processes. For example: The Common Operating Picture (COP) and corresponding Command Intelligence Picture (CIP) must continue to grow and expand to federal, state, and local agencies with maritime interests and responsibilities. The COP provides a shared display of friendly, enemy/suspect and neutral tracks on a map with applicable geographically referenced overlays and data enhancements. The COP is also a central element of the Deepwater solution tying Deepwater assets and operational commanders together with dynamic, real-time maritime domain information. This link is essential to ensure effective command and control of all available Coast Guard assets responding to a myriad of border security threats. An expansive and interoperable communications network is critical for maritime security operations and safety of life at sea. In the coastal environment, the Coast Guard's Rescue 21 system will provide the United States with an advanced maritime distress and response communications system that bridges interoperability gaps, saves lives and improves maritime security.There is no single solution to maritime border security. It requires a layered system of capabilities, established competencies, clear authorities, and strong partnerships. The cost of allowing blind spots in our awareness, security regimes or operational capabilities is too high.This is the mandate for the Coast Guard Intelligence and Criminal Investigations Directorate to support those priorities, which ultimately supports the overall strategic and national level objectives of the Nation.Thank you for the opportunity to testify before you today. I will be happy to answer any questions you may have. Mr. Simmons. And we will now go to the second witness Ms.O'Connell. Welcome. CYNTHIA O'CONNELL, ACTING DIRECTOR, OFFICE OF INTELLIGENCE, IMMIGRATION AND CUSTOMS ENFORCEMENT, U.S. DEPARTMENT OF HOMELAND SECURITY Ms. O'Connell. Good morning. Thank you, Chairman Simmons. I will have just a few brief statements. I respectfully request that my full statement be submitted for the record. Mr. Simmons. Without objection. Ms. O'Connell. Chairman Simmons, Ranking Member Lofgren, members of the subcommittee, I am Cynthia O'Connell, Acting Director of the Office of Intelligence for Immigration and Customs Enforcement. I sincerely appreciate this opportunity to share with you how the men of women of ICE Intelligence employ our capabilities to help secure our Nation's borders. I am also honored to testify alongside my colleagues from Customs and Border Protection and the U.S. Coast Guard, as well as Mr. Charles Allen from the Department of Homeland Security. As the DHS Chief Intelligence Officer, as you know, Mr. Allen has been instrumental in coordinating with the Intelligence Community and providing guidance on Homeland Security-specific issues. The ICE Office of Intelligence supports ICE and DHS intelligence requirements and priorities. We have made significant progress [[Page 23]] and continue in expanding our responsibilities to support the needs of ICE, DHS, and the Intelligence Community. With the unique Immigration and Customs authorities and intelligence tools, ICE Intelligence has also enhanced its detection, collection, and analysis capabilities. In addition to ICE Intelligence headquarters in Washington, D.C., we have six field intelligence units located in New York, Long Beach, Chicago, Houston, Tucson, and Miami; two technical collection facilities, the Tactical Intelligence Center, and a Special Operations Center; and intelligence assets at the El Paso Intelligence Center. ICE Intelligence headquarters supports ICE management and DHS intelligence and analysis efforts and coordinates ICE Intelligence programs and operations nationwide. The field intelligence units provide intelligence expertise to field investigative offices and detention facilities and to DHS intelligence as a whole. Our technical collection facilities act in concert for the Intelligence Community, the military, and other Federal agencies to safeguard the border that extends beyond our borders outward. These are powerful capabilities, and we have moved to organize them in a coherent and effective support system both to advance the ICE investigative mission and to support and integrate ICE into the DHS intelligence functions. Our specific intent is to integrate our intelligence capabilities with other components in the Department to support a unified DHS intelligence enterprise. ICE Intelligence takes advantage of currently operating effective projects and programs, and combines them with proposed new programs and capabilities, and unites the whole under a common strategic purpose, the protection of our country against threats that could arise from our borders. Our Special Operations Center detects and locates smugglers moving contraband and aliens across the borders by collecting intelligence through real-time technical means. Its methodologies not only interdict the incursion, but also helps identify smuggling organizations for investigation and dismantling. We coordinate Customs and Border Protection air and marine operations in the Office of Border Patrol and Office of Border Patrol assets to stop illegal activity. This year they have supported the interdiction of about 35 tons of marijuana with the seizure of associated vehicles and weapons and the arrest of countless smuggled aliens. ICE is integrating its Special Operations with geospatial intelligence capabilities sponsored by DHS and the analytical functions of our Southwest Field Intelligence Unit. We are working with DHS Intelligence, Surveillance and Reconnaissance to leverage available Department of Defense and DHS science and technology resources for upgrades to this dedicated border protection unit. What I have just described to you is true border-focused intelligence support. However, our protective effort is not devoted to just the land borders; we are also heavily involved in maritime and air transportation environments. Operation Last Call exploits the intelligence value of hundreds of thousands of individuals who enter the detention system annually. [[Page 24]] This highly effective operation collects, evaluates, analyzes, and disseminates information derived from detainees in ICE custody. Project Aegis supports the ICE visa security program which places ICE personnel in foreign countries to work with State Department consular officials in vetting these applicants. The Border Enforcement Security Task Force is a DHS- inspired initiative that responds to the increase in border violence. It is actively supported by analytical resources from our field intelligence units. ICE Intelligence is also working with DHS I&A on its intelligence campaign plan, a borderwide security effort aimed at more efficient consolidation of relevant field intelligence information. Operation Capistrano is a cooperative initiative with Department of State Consular Affairs where we train password examiners to recognize indicators that may point to potential narcotics and currency smugglers. This initiative has led to over 1,300 seizures and 1,300 arrests with more than 1,700 pounds of heroin and 2,600 pounds of cocaine seized. Operation Roswell uses similar techniques to identify alien smugglers, immigration fraud violators, and child sex tourism suspects. In the past 2 years, Operation Roswell resulted in 26 aliens removed, produced evidence of over 60 marriage fraud schemes, and in one significant case yielded analysis that led to eight arrests, ten removals, and the dismantling of an organization that smuggled 37 foreign nationals into the United States. In spite of all these successful initiatives, we are not content to rest on present production and current capabilities. Business plans and performance metrics based on objective customer evaluations must support all our work. From these markers, ICE Intelligence proposes the development and acquisition of advanced technologies, new techniques and new processes, and additional integration into multiagency and multinational operations. This is our future path to a safer and more secure border and homeland. I thank you for the opportunity to describe some of our initiatives that support border security. I would be happy to answer any questions at this time. Mr. Simmons. Thank you very much. [The statement of Ms. O'Connell follows:] Prepared Statement of Cynthia O'Connell Chairman Simmons, Ranking Member Lofgren, Members of the Subcommittee, I am Cynthia O'Connell, Acting Director of the Office of Intelligence for U.S. Immigration and Customs Enforcement (ICE). I sincerely appreciate this opportunity to share with you how the men and women of ICE Intelligence employ our capabilities to help secure our nation's borders. The ICE Office of Intelligence supports ICE and Department of Homeland Security (DHS) intelligence requirements and priorities. We have made significant progress in continuing and expanding our responsibilities to support the needs of ICE, DHS, and the Intelligence Community (IC). With unique Immigration and Customs authorities and intelligence tools, ICE Intelligence has also enhanced its detection, collection and analysis capabilities. In addition to ICE Intelligence Headquarters in Washington DC, we have six Field Intelligence Units located in New York, Long Beach, Chicago, Houston, Tucson, and Miami; two technical collection facilities - the Tactical Intelligence Center (TIC) and a Special Operations Center; and intelligence assets at the El Paso Intelligence Center (EPIC). ICE Intelligence Headquarters supports ICE management and DHS Intelligence and Analysis (I&A) efforts, and coordinates ICE intelligence programs and operations nationwide. The Field Intelligence Units provide intelligence expertise to investigative offices and detention facilities in the field and to the DHS Intelligence as a whole. Our technical collection facilities act in concert with the Intelligence Community, the military, and other Federal agencies to safeguard the southern border and to extend coverage of our borders outward even to the shores of South America. In intelligence terms, these are very powerful capabilities, and we have moved aggressively to organize them into a coherent and effective support system, both to advance the ICE investigative and operational missions, and to support and integrate ICE in the DHS intelligence functions. We have accomplished this through the ICE Intelligence Strategic Plan, which was constructed with the specific intent to integrate our intelligence capabilities with other components in the Department, to support a unified DHS Intelligence Enterprise. The ICE Intelligence plan takes advantage of currently operating, demonstrably effective projects, programs, and activities; combines them with proposed new programs and capabilities; and unites the whole under a common strategic purpose - the protection of our country against threats that could arise from our borders. It is more than just a plan. It reflects real, effective action on the front lines. Special Operations Center The Special Operations Center detects and locates smugglers moving contraband and aliens across our borders by collecting intelligence through real-time technical means, primarily signals and imagery intelligence. It supports ICE investigations with methodologies that not only interdict the incursion, but also helps identify smuggling organizations for investigation and dismantling. This kind of intelligence has real long-term benefits. The unit's emphasis to date has been on the U.S. and Mexico border. We coordinate with Customs and Border Protection (CBP) Air and Marine Operations and Office of Border Patrol assets to stop illegal activity. The information we collect is disseminated to ICE and Border Patrol agents in affected areas along the border from California to Texas. ICE is currently integrating its intelligence program with the Special Operations Center geospatial intelligence capabilities, sponsored by DHS, and the analytical functions of our Southwest Field Intelligence Unit. We are working with DHS Intelligence, Surveillance, and Reconnaissance (ISR) to leverage available Department of Defense and DHS Science and Technology resources for upgrades to this dedicated border protection unit. What I have just described to you is true, border-focused intelligence support; however, our protective effort is not devoted to just the land borders. We are also heavily involved in maritime and air transportation environments. We view border security as a continuum - it starts in various foreign countries, proceeds internationally to our borders, seaports, and airports, and extends into the interior of the United States, where support structures exist for criminal organizations as well as illegal immigrants. ICE provides intelligence at all points along this continuum. ICE Intelligence Projects and Programs The Port Intelligence Center (PIC) was created in response to Secretary Michael Chertoff's directive to develop a task force that addresses New York and New Jersey seaport vulnerabilities. The ICE Northeast Field Intelligence Unit (NEFIU), in coordination with the ICE Special Agent in Charge/New York (SAC/NY) and SAC/Newark, CBP, USCG, the New York City Police Department (NYCPD), and other state and local law enforcement groups, have established the NY/NJ Metropolitan Area Port Intelligence Center. The PIC will develop a seaport intelligence collection strategy aimed primarily at cultivating human intelligence in the maritime environment. It utilizes the intelligence resources of its members to prioritize vulnerabilities and pursue entities and individuals for potential source cultivation. The National Security Integration Center (NSIC) is an Office of Investigations and Office of Intelligence joint center that assesses information, targets suspects, and supports national security investigations conducted by ICE. Operation Ardent Guardian targets the illicit use of legitimate immigration channels, seeking the indicators of asylum fraud, marriage fraud, false documents, and other fraudulent mean of entry. Extraterritorial Criminal Travel Strike Force (ECT) is a new cooperative initiative by the ICE Office of Investigations and the Criminal Division of the Justice Department. Supported by ICE Intelligence, the targeting capabilities of ECT are designed to leverage extraterritorial investigative and prosecutorial expertise to attack foreign-based criminal networks. Operation Last Call exploits the intelligence value of hundreds of thousands of individuals who enter our detention and removal system annually. This highly effective operation collects, evaluates, analyzes, and disseminates information derived from detainees in ICE custody. Customers for Operation Last Call intelligence are ICE operational units, DHS I&A, the Intelligence Community, the Federal Bureau of Investigation (FBI), and other Federal agencies. This program focuses on relevant collection in the areas of force protection, anti- terrorism, on-going criminal enterprises, human trafficking and smuggling, contraband smuggling (weapons of mass destruction, drugs, etc.), threats to critical infrastructure, and the movement of money that support illicit activities. Project Aegis (Domestic Visa Security) supports the ICE Visa Security program, which places ICE personnel in sensitive foreign countries to work with State Department consular officials in vetting visa applicants. The ICE Intelligence domestic program performs detailed research on the resident U.S. sponsors and contacts listed in visa applications and reports on the background and potentially suspect activities of those individuals. This program provided substantial intelligence on the Lodi, California, Pakistani community that has recently figured prominently in terrorist investigations and action. Border Enforcement Security Task Force (BEST), the DHS-inspired initiative that responds to the increase in border violence, is actively supported by the analytic resources of the Houston and Tucson Field Intelligence Units. In addition to the BEST program, ICE Intelligence is working with DHS I&A on its Intelligence Campaign Plan (ICP), a border-wide security effort aimed at more efficient consolidation of relevant field-generated information. Operation Crystal Ball, a joint operation involving ICE, the Office of Naval Intelligence, the U.S. Coast Guard (USCG), and CBP, tracks suspect vessels and crewmembers and maintains historical databases to respond to queries from investigators and officers working in the maritime environment. ICE Crystal Ball analysts use electronic collection techniques and perform both classified and unclassified research to derive movement and position information. They also populate Naval Intelligence databases with large volumes of current vessel tracking data. Crystal Ball support has repeatedly resulted in drug seizures from merchant vessels and crewmembers, and continually contributes to the strategic goal of awareness in the maritime and seaport environment. Operation Capistrano, a cooperative initiative with the State Department's Office of Consular Affairs, trains passport examiners to recognize indicators that may point to potential narcotics and currency smugglers. This initiative has led to 1,366 seizures and 1,300 arrests. Operation Roswell, an outgrowth of Operation Capistrano, uses similar techniques to identify alien smugglers, immigration fraud violators and child sex tourism suspects. In the past two years, Operation Roswell has led to the removal of 26 aliens, provided evidence of over 60 incidences of marriage fraud schemes, and in one significant case, yielded analysis that led to 8 arrests, 10 removals, and the dismantling of an organization that had successfully smuggled 37 foreign nationals into the United States. Operation Watchtower, working in coordination with USCG and CBP, analyzes the international movements of vessels and cargoes to provide timely intelligence and risk assessment for investigative and threat detection support. These examples are all actual ongoing activities, presently producing valuable intelligence that protects our borders. Many of these activities also directly support the Department's Secure Border Initiative. We also maintain a full-time senior liaison officer posted permanently to DHS I&A, which serves as an open conduit between ICE Intelligence and I&A. In spite of such successful initiatives, we are not content to rest on present production and current capabilities. Business plans and performance metrics based on objective customer evaluations must support all our work. From these markers, the ICE Intelligence strategic plan proposes the development and acquisition of advanced technologies, new techniques, new processes, and additional integration into multi-agency and multi-national operations. This is our future path to a safer and more secure border and Homeland. Thank you for the opportunity to describe some of our initiatives that support border security. I would be happy to answer any questions at this time. Mr. Simmons. And our third witness is from U.S. Customs and Border Protection, Mr. Bortmes. Welcome. We have your testimony, so if you summarize in 5 minutes, that would be great. L. THOMAS BORTMES, DIRECTOR, OFFICE OF INTELLIGENCE, CUSTOMS AND BORDER PROTECTION, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Bortmes. Will do, sir. Thank you, Chairman Simmons, Ranking Member Lofgren, distinguished members of the subcommittee. I thank you for the opportunity to join my Department of Homeland Security intelligence colleagues, Assistant Secretary Allen, Director O'Connell, and Assistant Commandant Sloan, to discuss with you the role intelligence plays within the United States Customs and Border Protection to help secure our Nation's borders. I have submitted, as you stated, sir, a formal statement, and would request that it be accepted for the record. I want to begin this very brief oral statement by saying that I am privileged to serve as the Executive Director of Customs and Border Protection's Office of Intelligence, which is charged with three primary responsibilities. The first is to directly support the Commissioner and Customs and Border Protection's headquarters and field leadership with the acquisition, analysis, and timely dissemination of intelligence information critical to CBP's primary mission of detecting, identifying, and preventing terrorists and terrorist weapons from entering the United States. The second is to efficiently manage a developing integrated Customs and Border Protection intelligence capability that ensures frontline CBP officers and decisionmakers have the value-added intelligence required to sustain border situational awareness, drive operations, and support policy. This larger CBP intelligence enterprise consists of the intelligence capabilities within the Office of Intelligence, the Office of Border Patrol, CBP Air and Marine, the Office of International Affairs, and the Office of Antiterrorism, and works very closely with the National Targeting Center and operational field analysis capabilities of the Office of Field Operations. And, finally, as a member of the Department's Homeland Security Intelligence Council, it is the responsibility of the Office of Intelligence to represent CBP's intelligence requirements and equities to the DHS Chief Intelligence Officer and assist him in directing an integrated DHS intelligence enterprise. Customs and Border Protection intelligence exists to support an agency that, in addition to facilitating international trade critical to the United States economy, is responsible for border security. As you stated earlier, Mr. Chairman, and I won't repeat the numbers, it is responsible for protecting more than 5,000 miles of border with Canada, 1,900 miles of border with Mexico, and operating 325 official ports of entry. An average day in Customs and Border Protection, from the statements you have already made this morning, is a demanding day. We process well over 1.1 million passengers and pedestrians; 69,000 containers; 333,000 incoming privately owned vehicles; $81 million, almost $82 million, in fees, duties, and tariffs; execute 62 arrests at ports of entry; over 3,200 apprehensions between the ports for illegal entry; seized over 5,500 pounds of narcotics; and not to forget over 1,100 prohibitive meat and plant materials, animal products at and between the ports of entry; refuse entry to 868 noncitizens at the ports of entry; and intercept 146 smuggled aliens, and over 200 fraudulent documents, while rescuing 7 illegal immigrants in distress or dangerous conditions between the ports of entry. And I remind you, again, that is every day. As the figures demonstrate, CBP addresses a variety of threats to U.S. borders that include illegal immigration, illegal drugs, border violence, illegal incursions, pests and diseases, and a host of trade violations running from smuggling to international property rights. While all of these threats to our borders are demanding in their own right, everyone at Customs and Border Protection understands that their priority mission is to prevent terrorists and terrorist weaponry from entering the United States. While the Office of Intelligence and the broader CBP intelligence enterprise directly support operations aimed at addressing all border threat categories, they also remain focused on supporting CBP's priority mission of preventing terrorists and their weaponry from entering the United States. Our first priority is to operationalize intelligence reporting on terrorist threats. In my formal written statement I discuss how CBP intelligence supports border security by supporting CBP's layered defense strategy, a strategy that, in partnership with an array of countries, international organizations, private businesses, trade entities, as well as State and local governments, has developed a host of programs and initiatives aimed at pushing our zone of defense as far outward as responsible to identify people and cargo long before they have the opportunity to board or enter the United States. I look forward, sir, to answering yours and the committee's questions and working with my colleagues here today, and appreciate the opportunity to speak on these matters. [The statement of Mr. Bortmes follows:] Prepared Statement of Mr. L. Thomas Bortmes Introduction Chairman Simmons, Ranking Member Lofgren, distinguished Members of the Subcommittee. I thank you for this opportunity to join my Department of Homeland Security colleagues - Assistant Secretary for Intelligence and Analysis, Mr. Charles Allen, Ms. Cynthia O'Connell the Director of ICE's Office of Intelligence and Mr. Jim Sloan, the Coast Guard's Assistant Commandant for Intelligence and Criminal Investigations - to discuss with you the role intelligence plays within U.S. Customs and Border Protection (CBP) to help secure our Nation's borders. I am privileged to serve as the Executive Director of the CBP Office of Intelligence (OINT), a critical element of the Office of the Commissioner, charged with three primary responsibilities. The first is to directly support the Commissioner and CBP headquarters and field leadership with the acquisition, analysis and timely dissemination of intelligence information critical to CBP's primary mission of detecting, identifying and preventing terrorists and terrorist weapons from entering the United States. The second is to efficiently manage an integrated CBP intelligence capability that ensures front-line CBP officers and decision makers have the value-added intelligence required to sustain border situational awareness, drive operations and support policy. And finally, as a member of the Department's Homeland Security Intelligence Council (HSIC), it is the responsibility of the OINT to represent CBP's intelligence requirements and equities to the DHS Chief Intelligence Officer/Assistant Secretary for Intelligence and Analysis, and assist him in directing an integrated DHS intelligence enterprise that provides one DHS face to the National Intelligence Community. I will address each of these responsibilities from the perspective of intelligence support to border security. U.S. Customs and Border Protection Overview In addition to facilitating the international trade critical to the United States economy, CBP is responsible for protecting more than 5,000 miles of border with Canada, 1,900 miles of border with Mexico and operating 325 official Ports of Entry. On an average day in 2005, CBP personnel: processed 1,181,605 passengers and pedestrians, 69,370 containers, 333,226 incoming privately owned vehicles and $81,834,298 in fees, duties and tariffs; executed 62 arrests at ports of entry and over 3,257 apprehensions between the ports for illegal entry; seized over 5,541 pounds of narcotics and 1,145 prohibited meat, plant materials or animal products at and between the ports of entry; refused entry to 868 non-citizens at the ports of entry; and intercepted 146 smuggled aliens and 206 fraudulent documents while rescuing 7 illegal immigrants in distress or dangerous conditions between the ports of entry. As these figures demonstrate, CBP, the nation's unified border agency, addresses a variety of threats to U.S. borders that includes illegal immigration, illegal drugs, border violence, illegal incursions, pests/diseases and a host of trade violations ranging from smuggling to intellectual property rights. Countering Terrorists While these threats to our borders are addressed each day, all CBP personnel understand that their priority mission is to prevent terrorists and their weaponry from entering the United States. While OINT directly supports operations aimed at addressing all border threat categories, it also remains focused on supporting CBP's priority mission of preventing terrorists and their weaponry from entering the United States. The first priority of CBP's Office of Intelligence is to operationalize intelligence reporting on terrorist threats. Each day, OINT watch standers and analysts review over 1000 intelligence community products, engage with CBP liaison officers and analysts embedded in DHS and the national intelligence community, and leverage long-standing partnerships with federal, state, local and international law enforcement and intelligence organizations to ensure early awareness of all potential terrorist travel or movement of materials to the United States. Working closely with their operational counterparts, OINT analysts meld this intelligence with information, trends and patterns identified in CBP operational reporting to properly assess and place in context these threats, discern vulnerabilities, evaluate potential consequences and ultimately calculate the risk these threats may pose to the borders of the United States. The results of this daily all-source analysis and risk assessment process is disseminated via over a dozen intelligence product lines and services including intelligence reports and alerts to CBP's operational and field elements on the border that provide situational awareness, address officer safety and/or assist in developing targeting criteria against specific terrorist threats to the United States. Operations and Intelligence Briefings/Intelligence Driven Operations Regular, all-source, intelligence briefings are provided to the Commissioner and CBP operational Assistant Commissioners from the Offices of Field Operations, Border Patrol, Anti-Terrorism, Air and Marine and International Affairs. During these briefings, CBP's senior leadership review the most current threat developments, maintain continuity on existing terrorist threat streams and utilize the latest intelligence available to formulate appropriate operational actions required to counter those threats. CBP's senior leadership has a number of operational courses of action available to operationalize threat intelligence, to include directing intelligence driven operations. Once CBP's senior leadership concurs that there is viable intelligence indicating a threat to our borders, an operational response plan is quickly formulated to address the specific threat modus, timeframe and geographic locations. These threat-based operations are put together by CBP's affected headquarters and field elements, formally vetted through the DHS Chief Intelligence Officer, then promulgated to the appropriate CBP operational field components for implementation. Additionally, OINT will regularly report the results of these operations via Homeland Security Intelligence Reports, and the CBP Office of Field Operations or Office of Border Patrol will formally assess the operational results upon their conclusion. Supporting Forward Operations To meet its priority mission, CBP has implemented a layered, defense in-depth strategy that thoroughly addresses people and cargo for linkages to terrorism prior to entering the United States. In partnership with an array of countries, international organizations, private businesses, and trade entities, CBP is involved with a host of programs and initiatives aimed at pushing our "zone of defense" outward. A key example of this is the Container Security Initiative (CSI), which places CBP personnel teams in key overseas ports to assist in identifying high-risk cargo. OINT has selected and trained intelligence research specialists to work as members of these CSI teams. Embedded with their host country, CSI intelligence personnel are supported daily by OINT which routinely provides them overviews of the latest intelligence threat reporting and vets their individual and company names of interest against U.S. intelligence terrorist data bases for derogatory information, etc.Another example of CBP pushing its "zone of defense" outward is the Customs and Trade Partnership Against Terrorism (C-TPAT) which has CBP partnering with over 9,000 private businesses to ensure the security of the international supply chain to prevent terrorists from exploiting legitimate trade. Membership in C-TPAT requires the CBP to regularly certify partner company due diligence, and OINT plays a significant role in supporting CBP with intelligence research, entity searches, and the verification of information. Supporting Operations at the Border In addition to OINT's regular products and support to intelligence driven operations, OINT provides daily support to, the operational offices charged with maintaining CBP's border presence and security. These operational offices have placed subject matter experts within secure OINT facilities in order to increase information sharing and agency cooperation. Furthermore, OINT maintains a permanent detachment at CBP's National Targeting Center (NTC) with secure connectivity to national intelligence community reporting and data bases. This detachment supports the NTC's mission to assess all cargo and passengers enroute to the U.S. for potential links to terrorism and to directly support CBP Officers and Agents when they encounter individuals or cargo linked to terrorism.Q02 Managing the Integrated CBP Intelligence Enterprise It is the responsibility of the Office of Intelligence to functionally manage the larger CBP intelligence enterprise. A number of CBP components have formally designated intelligence organizations, while others, such as the Office of Field Operations, have robust operational information analysis capabilities that work closely with these intelligence organizations. The Office of the Border Patrol has a significant intelligence organization that includes a national headquarters division, a Border Field Intelligence Center in El Paso, Texas and intelligence units at each of the 20 Border Patrol Sectors, all responsible for directly supporting front line Border Patrol Agents. CBP Air and Marine has a formal intelligence capability with designated intelligence personnel at their national headquarters, Air and Marine Operations Center in Riverside, California and with their Directors of Air Operations and Branches around the United States. These intelligence organizations are staffed with a combination of intelligence research specialists as well as Border Patrol Agents and CBP Air and Marine officers filling intelligence positions. As you can imagine, each of these organizations generate standing and ad hoc information needs, intelligence requirements, requests for information, collection requirements, as well as a host of personnel, training, connectivity, equipment and policy needs. OINT aggregates, validates and prioritizes these requirements and brokers them through the DHS Office of Intelligence and Analysis to the national intelligence community for satisfaction. Leveraging the DHS Intelligence Enterprise CBP leverages the DHS Intelligence Enterprise largely by OINT's membership in the larger DHS intelligence enterprise. Working with the Chief Intelligence Officer, Assistant Secretary Charles Allen, the Department of Homeland Security is putting into place a rapidly expanding capability to support its agencies' intelligence components. As CBP's Key Intelligence Official, I am a member of Assistant Secretary Allen's Homeland Security Intelligence Council (HSIC) - the primary DHS intelligence decision-making body. Personnel from my office represent CBP's intelligence requirements on over a dozen HSIC- established panels, boards and working groups that address issues ranging from analytical production coordination to collection, training, and information systems. It is through this maturing DHS intelligence enterprise management architecture that OINT is addressing critical intelligence concerns such as supporting Operation Jumpstart's deployment of National Guard Bureau intelligence personnel to the Southwest Border and supporting implementation of the Southwest Border Counter-Narcotics Strategy. Additionally, by leveraging the developing DHS report writers and intelligence training programs, CBP is gaining personnel and training necessary to ensure that it can translate its significant operational information flow into a steady supply of timely, intelligence reports. These reports are earning acclaim for their relevancy from national, state and local intelligence and law enforcement customers, and make CBP a leading producer of intelligence reporting among DHS components. OINT will continue to play a leading role in developing this DHS intelligence enterprise and leverage it to facilitate its own developing intelligence integration plans and meet its intelligence needs. Closing I would like to thank you again for the opportunity to testify today with my Department of Homeland Security intelligence colleagues. I will be happy to answer any questions you may have. Mr. Simmons. I thank all three witnesses for their testimony. We have learned there is another procedural motion and vote on the floor. We will do our best to keep this dialogue moving forward. My colleague has gone to vote. I will keep the mike open, and we will do our questions. Mr. Sloan, in your testimony on page 4 you make reference to information collected by the Coast Guard. Ms. O'Connell, in your testimony you also make reference to the collection capabilities of your organization. And, Mr. Bortmes, you just referred to what I called surveillance and depth. The Coast Guard is now a full members of the U.S. Intelligence Community. The other entities I don't believe are. But the Coast Guard does not have a history and tradition of collection in an intelligence sense. But since 9/11 and in the new environment, the issue of collection of these assets to me is critically important. I don't want to know that you are acquiring information; in other words, that somebody hands you something and you take it. I do want to know that you are engaged in collection, because that seems to me to be a very worthwhile addition to our capabilities in a post-9/11 environment. Could each of you talk a little bit about how you operate in the field and what opportunities you have to collect information that others don't have? In other words, what is your value added from that standpoint to the overall intelligence efforts of our country? Mr. Sloan. Sir, I will begin. First of all, as you probably know, in addition to being a member of the Intelligence Community, the Coast Guard is also one of the largest law enforcement agencies in the United States Government, particularly in DHS, and our law enforcement activity principally revolving around the maritime domain also includes information at ports, and we have over 360 ports for which we are responsible in addition to those miles of coastline. In each of the ports& and I will focus first, if I may, on the law enforcement intelligence collection activity. In most of the strategi [[Page 27]] cally and economically important ports of the United States, we have what are known as field intelligence support teams. These are law enforcement information collectors who work with not only the Federal counterparts, but the State and local counterparts in each of these ports. New York, for instance, they work with the New York City police and the police authorities. Mr. Simmons. If I could interrupt for just 1 minute. But when you collect for law enforcement, is that shared with your intelligence folks? Mr. Sloan. Yes, sir. That is the point I was going to get at. All of this information that is collected, to include, I might add, the interview of the masters of ships who come from overseas who can give us essentially the lay of the land in the port that they just departed from, this information is then put into field intelligence reports, which not only go to-in a law enforcement capacity not only go to Coast Guard Intelligence Fusion Centers, but also to the Homeland Security Department. When they arrive at our fusion centers--and as you might recall, I indicated we have one on each coast as well as a production center out in Suitland with the Office of Naval Intelligence--the information, where appropriate and authorized, bumps up against validated requirements that the Intelligence Community has to answer. And that is where the nexus occurs, and then, of course, published into the larger community if it would answer an intelligence--validated intelligence requirement. Mr. Simmons. I appreciate that. I know my time is going to run out. Ms. O'Connell, you collect, you provide new information to the community; is that correct? Ms. O'Connell. We do. We have got the six field intelligence units and the tactical intelligence centers out in the field where we collect information and then analyze it and put it back out into the operational components. For instance, in Operation Watchtower we work jointly with Coast Guard, Customs and Border Protection in order to get information and identify individuals that may be a threat coming in. Also on Operations Capistrano and Roswell, we are looking at those individuals who are coming in to the airports, getting, collecting information, and analyzing that, and then identifying individuals that pose a vulnerability. The field intelligence units work with State and local& Federal, State, and local and tribal authorities collecting intelligence, put it in Homeland Security intelligence reports, which we then bring into--some of them are brought into headquarters. Some of them are developed into intelligence information reports that go to the Intelligence Community. Other information is pumped out through the law enforcement components. Mr. Simmons. Mr. Bortmes. Mr. Bortmes. Again, all the information that we are able to put in the Intelligence Community channels is derived from our law enforcement authorities and done in the normal process of our duties in carrying out those authorities. For instance, at our ports of entry each day, as individuals are encountered, and, in fact, we realize that they might have, for instance, a record, a tied record or something along those lines, they are taken to a secondary examination. [[Page 28]] We are able to sit down with our colleagues from ICE, from the FBI or the JTTFs, go into a more in-depth interview to determine their admissibility. That information and what might be obtained from those interviews will then be forwarded out to our National Targeting Center and to the Office of Intelligence. We ensure that gets captured in Homeland Security information reports, intelligence reports, and sent down to the community through the Department. So that occurs. And it gets posted, regularly sent to the National Counterterrorism Center, et cetera. The value added there, again, is that granularity, the ability to look at an individual up close. If they are denied admissibility into the United States and returned back, we have them for that time frame. So that is a unique piece of value added. Mr. Simmons. Thank you very much. The Chair recognizes the Ranking Member. Ms. Lofgren. I will be quick so that my colleague will also have a chance to ask her questions. Last year there was an effort made to add an additional 550 Border Patrol agents and additional 200 immigration investigators, and again, in December, an effort to authorize 3,000 additional Border Patrol agents, for a total of 12,000 by 2010, along with a new training facility to expand capacity. As the Executive Director of Intelligence Office at CBP, would you find these resources helpful to you when you are doing your job? Mr. Bortmes. Border Patrol agents all represent to me a collector, a conduit of information. Ms. Lofgren. Thank you very much. We have, we know, on the northern border, our 5,000-mile- plus northern border, at any given time we have between 200 and 300 Border Patrol agents. Do you believe this is an adequate force at the northern border? Mr. Bortmes. I believe that the number of Border Patrol agents on the border is closer to 1,000. But-- Ms. Lofgren. But they are post positions. So we have only got at any given time 200 or 300 physically there. So do you think that is adequate? Mr. Bortmes. I don't believe anyone thinks it is adequate right now. Ms. Lofgren. Thank you very much. The 9/11 Act mandated an additional 800 immigration enforcement agents over the next 5 years, but we have only actually funded 350. The 9/11 Act also mandated an additional 800 detention beds, but we have only funded, Congress has only funded, an additional 1,800. Do you think that this is adequate to deal with the flow that you have seen? Mr. Bortmes. The question is again directed at me? Ms. Lofgren. Yes. Mr. Bortmes. These are questions again, ma'am, that I believe are best answered by our operational folks, and I would like to take it for the record and have them respond to you and the previous question about adequate numbers on the northern border. Ms. Lofgren. That would be fine. Ms. Lofgren. And I think I will stop my questioning at this point and yield back so that my colleague Mrs. Lowey may ask her questions, and we can all get our votes in. Mr. Simmons. The Chair recognizes the distinguished gentlelady from New York. Mrs. Lowey. Thank you. And I will ask it quickly because the bells are still going off. I would like to direct it to Mr. Bortmes. You have heard us talk frequently about the fact that only about 2 percent of our cargo is being inspected while Hong Kong inspects 100 percent. I am sure you are going to say you are not satisfied with 2 percent, but can you tell me what is actually being done to remedy that? And why can't we move more quickly? Mr. Bortmes. Ma'am, I believe you are really addressing the issue of physically inspecting all of the cargo. As you know, a great deal of the cargo from our perspective, CBP's perspective, is inspected. The records are looked at long before it is loaded aboard--the manifests. Ms. Lowey. Do you think it is adequate? Mr. Bortmes. The efforts that I have seen so far& and, again, it is our operational elements as opposed to our intel pieces. From what I have seen, the automated targeting system that is in place is working extremely well at identifying those suspect cargos that I have to worry about as the Executive Director for Intelligence. Mrs. Lowey. If you had your way, would you move in more physical inspection, as you call it, or are you including a more advanced technology in that description as well? Mr. Bortmes. Again, this is a question that if--I think if we bring our operational folks back to talk with you about in more detail, they can address it far better. But from all the discussions I have been part of, it is a combination of the reviewing them, the manifest information, better material, information arriving quicker, the nonintrusive inspection capabilities that are being developed. And there are plans for far more robust abilities to do that, and then actually devanning or having to inspect cargo, physically inspect the cargo. If you are doing all those things up front adequately and robustly, then the necessity for that latter part would not be there. Mrs. Lowey. But as I understand it, you just said you do have plans for more robustly inspecting the cargo. So, Mr. Chairman, I would like to certainly request from the gentleman more detailed information, if you can follow up with us on that, because it is very disturbing to the average American when we continually read that Hong Kong is doing it, and we are not doing it, and we are all living at the edge these days. So I would appreciate that information. Mrs. Lowey. And I thank the panel again. I am sorry we have to run, but I thank you for your important work. Thank you, Mr. Chairman. Mr. Souder. [Presiding.] Thank you. I have--let me first--you heard me ask the first panel that as I visited the many border crossings north and south, and fast pass lanes or whatever it is called in different places, when they put their scan card in, if there is a question, a little pop-up occurs, and the person then has run a check. And what my question is is in the different intelligence agencies, are you confident that, first, within DHS, all the information is getting there with an individual name? And then, secondly, is the entire system getting into that? Now, the danger of having every single piece of intelligence available to everybody, if there is one leak, you compromise the entire system. But the question is why can't at least a pop-up occur if anywhere in any of our intelligence systems there is a question about this name, even if it is just wanting to know where they are moving? Are you confident that that information is getting into our systems at this point? Could each of you briefly comment on that? Because you each deal with slightly different types of things. Maybe start with CBP, and whether the Coast Guard is getting it if they have a boat, and then ICE if you are doing an investigation. Mr. Bortmes. Sir, I am very confident that the information that is within the Intelligence Community on particular names, identifying data, the plus one data, et cetera, on those that we know are linked particularly to terror and then to criminal activity as well, that it is there. It is popping up. We have done, I think, efforts and strides have been made to make sure that it actually pops up in front of the CBP officer or the Border Patrol agent when they do run that information check. So I am confident that every effort--that great strides have been made. Clearly there leaves this hole of what you do as you are developing information, names that are being investigated, operations that are under way by the Intelligence Community. There are other names there that are not quite yet definitive or authoritative. We always worry about that. We take great strides within CBP that as we are associating or linking individuals with terrorist backgrounds to others to make sure that that information gets in the appropriate law enforcement and terrorist databases so that it is there, with the caveat that, hey, we are now looking at this individual linked to another in this particular way. So great strides, I believe, have been made, and I am comfortable that the information the community has is getting there. You clearly always want it faster; you always want it better, clearer. And I know there are a number of initiatives throughout the community to make that happen. Mr. Souder. Because you have seconds. Your agent at the line at San Ysidro is going to be backed up hours at almost any time of the day, so there is huge pressure in seconds. That is why it has to--even a 6-hour delay, if it is not instantaneous, we could miss somebody going through the border. Before I follow up, let me clarify here, because you had some other--you had a question I want to follow up briefly. Is it CBP or ICE at our embassies that would have a DHS person doing a check, a background check? Is it ICE? Ms. O'Connell. ICE has. We have attaches and assets overseas. Mr. Souder. I just want to make sure. I couldn't remember which one it was. In Pakistan, when I was there recently, that is, [[Page 31]] at the front desk--this isn't just about whether we have agents at the border, this is an interrelated system inside the United States and externally. And the ICE agent had identified somebody on one of the lists, but the list of this person's name had like 12 variations, because it isn't just like Mark Edward Souder. Often they will have six names, will have an A and E turned around, will have two or three of the names here. Are you confident that at our borders, at the CBP or at the Coast Guard, or as we are doing the investigations, that all the different variations of the name are getting into the system as well? Ms. O'Connell. If we have an ongoing investigation, and with the focus on antiterrorism national security issues, I am confident that the names are in the system. It may be the main name and then AKAs, also known as, attached to that. Many instances when individuals coming into the port of entry& Mr. Bortmes can speak on this also--an inspector will look at that name, and it will possibly highlight it, and in instances would identify that person who would go into secondary, and then you would work out different names and other uses. Mr. Souder. Let us say it is not an ongoing investigation, but a person on a watch list. We have a potential latent cell. Part of the way they move from just kind of casual watch to an aggressive watch to whether it is an ongoing, or whatever information you put together, so, for example, if we think that they are located in someplace in Indiana and haven't moved, but then we see this person who we really were--just casually had on the list because of his relationship to, say, several individuals, all of a sudden we see them move at a border place in Texas, then we see them move up by Buffalo, then we see him at an embassy, it suggests that there may be a pattern. But without kind of core information, you can't even get to the point. And so I understand if there is an active investigation, I have seen them pull into secondary on that. I am just wondering how far we are moving on this, and are we getting enough information in the system to be proactive other than an ongoing investigation? Ms. O'Connell. If they are identified as a lookout, yes, I am confident that they are in the system. Now, when you mentioned about movement between States, keep in mind that the identification of an individual in the system would be when they are coming in through the border. So there is obviously no checks going from State to State. But I am confident that that individual, if they rise to the level of putting them in as a lookout, that they would be in there, yes. Mr. Souder. That is assuming that they are a citizen of the United States. We would have no way of seeing whether a person who has either overstayed their visa or is on a visa is moving inside the United States? Ms. O'Connell. It is not just individuals that are U.S. citizens that would be put in the record that inspectors would identify coming through the border. It is also other individuals, lawfully admitted permanent residents, visitors, students. Mr. Souder. In the Coast Guard is there adequate technology now on--in most of our vessels to be able to read it if they pick somebody up or detain somebody? [[Page 32]] Mr. Sloan. Well, sir, if I could just back up 1 second. The Coast Guard obviously doesn't have a border check, if you will, but we do have a responsibility to vet the names of all crew members of certain vessels over a certain tonnage that must be supplied to us 96 hours prior to the arrival in the United States; otherwise, the ship can't enter. And we vet those names not only against the law enforcement database, but intelligence database that you can imagine we have available to us, to include the Terrorist Screening Center. The names, if they provide a hit, clearly the ship will be boarded before it arrives in the United States and the individuals be dealt with appropriately to the degree that it is a law enforcement matter or somebody who shouldn't be coming into the country. But also, we provide some degree of check and balance. We want to make certain that the names that are being supplied to us and the passport information and the last port of call information and the origin of the particular crew, we will actually inspect vessels to verify before the vessel arrives to make certain that the information that was provided is, in fact, accurate. Mr. Souder. Two of the biggest potential areas for terrorists to hide are in Detroit and also crossing in upstate New York. I am from Fort Wayne, Indiana. I have been to Michigan many times, been at the border crossing many times there as well as other reasons, certainly the St. Clair River, Lake St. Clair. The islands there are such&at you can swim in 5 minutes between them, and the Coast Guard does, in fact, have primary responsibility at that point if a boat is coming into our waterway. The same thing in the St. Lawrence Seaway, that-- and what I am wondering is, if the--do you, if--do you have the capability if you find that, or do you then if you have a suspect take them into another agency, have to run them to shore? Are we moving towards having some sort of onboard vessels? I know for narcotics we do in the Caribbean, but I am trying to think as we look at some of the Great Lakes areas and the St. Lawrence River, too, as well as the area coming into Seattle where the Coast Guard has a huge waterway with lots of San Juan Islands and everything. Mr. Sloan. Yes, sir. The San Juan Islands are a perfect example as are the Great Lakes. But I would point out that although the appearance of Coast Guard efforts in the Great Lakes and the San Juan Islands would not look like what is going on in the Florida straits and the eastern Pacific and the Caribbean, the same amount of attention is being paid to it. And I recall from some of the discussion that occurred in the prior panel, the relationship with Canada is particularly important. We do have representatives of the Coast Guard who operate out of Ottawa, we have law enforcement agreements with the Canadian authorities, and we actually have a Canadian representative in our National Maritime Intelligence Center. So the link and the exchange of information with the Canadians is as important to cue our activities relative to those issues as anything else. Mr. Souder. I have one additional question, if I may, Mr. Chairman, that one of the things as we have looked at the border challenge is that--is the networks that work in between the borders. Particularly we have looked at OTMs as a higher risk, theoretically at least, in terrorism, other than Mexicans, but it could be any [[Page 33]] number of smuggling organizations. And the question is are we proactive? We have tried to increase legislation on coyotes, for example. In San Diego, Congressman Issa said that the penalty was 6 months, and it took 9 months to get to trial, so nobody was investigating that. Yet, in fact, for major smuggling organizations it is much going to be like Panama Express. In other words, when somebody--we don't believe at this point that the Veterans Administration files were stolen for that purpose; it appears to be some college kids, and we are watching that very closely. But much of identity theft in the United States is related to trying to get the Social Security numbers and IDs; that when somebody does a package to come across the border, whether it be an other than Mexican or a Mexican coming across, and they purchase this, often somebody is providing a map, providing a van to pick them up, providing a false green card, that with the Social Security number, and obviously work sites. As they come into Indiana, in my district, which is the number one manufacturing--and the bottom line is we have a number of people there or we wouldn't be making it in manufacturing. I am not taking immediate sides on that question. I am asking, do we have a systematic way? Because we clearly have an ``interterior'' smuggling organization that has places they rent the vans, buy the vans, markets. We had three green card manufacturers taken down in 30 days in my district. Is this being investigated [[Page 43]] in holistic? Because this is a gaping hole in our system over the last couple of years. Ms. O'Connell. I can speak a little bit about that on the operational side of ICE. The investigations program has just identified identity and benefit fraud units that will actively work within the interior of the United States. I don't want to state a number. I have got one in my head, but I don't know it 100 percent. So anyway, identity and benefit fraud units. Then, on the intelligence front, I have got a unit at headquarters that specifically specializes in human smuggling, in trafficking, immigration fraud types of things that have identified a number of areas. As a matter of fact, we had a case related to the vans that are moving people from the southern border up into the northwest or the northeast coast. Also, the field intelligence units that are out there on the ground work daily with the SAC offices, the special agent in charge offices, and get information in and work on and analyze different organizations and try to pull those details together, add the classified information, and try to identify target packages for those smuggling organizations. Mr. Sloan. Sir, may I comment on that? Clearly asymmetrical immigration is a concern to the Coast Guard. This is where SIAs or people who might have a terrorist link or associations would come in by absconding or deserting or being a stowaway on a vessel. But your point relative to identification, I think, is an important one for the Coast Guard. We issue merchant mariner licenses for hundreds of thousands of individuals, and I think it is important for me to testify to the fact that over the last 2 years, actually over [[Page 34]] 2 years, the Coast Guard Investigative Service along with the Federal Bureau of Investigation and the cooperation that we get from our partners in Homeland Security, Defense Department, and the Intelligence Community, has been vetting close to a quarter of a million merchant mariner documents to make certain that they are in the hands of the correct people. In fact, I couldn't even tell you in an open session that we have associated nine individuals--it doesn't seem like a lot out of a quarter million, but it is significant--who actually have associations with terrorism over the course of that period of time. It is an effort that continues, ongoing, and actually our regional centers that issue mariner documents are now trained to go through that program before mariner documents are actually allowed to be issued. Mr. Simmons. [Presiding.] I want to thank this panel for their testimony. It has been extremely interesting and thought- provoking. I realize that some of our panelists have stayed beyond their anticipated time of testimony, and particularly you, Mr. Sloan. So we thank you very much. It has been very informative. And at this point I will excuse the second panel and invite our third panel to come forward. The third panel is made up of two individuals, Mr. Michael W. Cutler from the Center for Immigration Studies, and Mr. Michael O'Hanlon of the Brookings Institute. I welcome both of you gentlemen to testify. I think you have already determined that we have your written statements in our notebooks, we have reviewed those [[Page 44]] written statements prior to today's hearing, so feel free to cherry-pick the most cogent points to present to us so that we can get into the questions and answers, which is often very informative for the subcommittee. And, again, I thank you for being here. And I would ask the staff to secure the door so that we can hear the testimony. Thank you, gentlemen. C comes before O. Why don't we proceed on that basis. Mr. Cutler. STATEMENT OF MICHAEL W. CUTLER, FELLOW, CENTER FOR IMMIGRATION STUDIES Mr. Cutler. Thank you, sir. Chairman Simmons, Ranking Member Lofgren, Members of Congress, ladies and gentlemen, I welcome this invitation to appear before you today at a hearing that I believe is of critical importance to the safety of our citizens and indeed to the very survival of our Nation. The gathering of effective intelligence is essential for effective law enforcement and for issues relating to national security. Nothing can be of greater significance than the issue of developing effective intelligence; that is to say, the culling of accurate information and understanding its place in the overall picture. Intelligence should be thought of as being comparable to the way that a digital photograph is made. A digital photograph is comprised of a huge number of elements or pixels which are placed in the proper location to paint the clear picture. As the number of pixels increases, the clarity of the photo increases proportionately. So, too, the clarity of the picture painted by effective intelligence is proportionate to the quantity and quality of the intelligence nuggets or bits of information that can be gathered and placed into [[Page 35]] their proper position in the mosaic that makes up the overall pictures. And the ability to understand the significance of each kernel of information also contributes to the clarity of the picture that the intelligence will create. But effective intelligence also requires that it be disseminated quickly to the ultimate users of the intelligence. It has a short shelf life, and, therefore, where critical intelligence is concerned, time is of essence. Pixels do not lose their value over time, but intelligence does. Additionally, it is important to understand that human nature often creates additional hurdles. Approximately 400 years ago, Sir Francis Bacon said, knowledge is power. That statement is as true today as it was when he first said it. Various Federal agencies realize that intelligence that they possess provides them with a certain amount of power, and therefore their members have been reluctant to share their knowledge with other agencies. However, to the point that intelligence is to protect our Nation, intelligence is critical today that will become worthless in a very short period of time if it is not freely and expeditiously shared with those who possess the need to know. Rather than to continue to read my prepared statement, what I do want to do is point to something that I did talk about in my prepared statement that I would like to paraphrase. You know, I have heard today members of the subcommittee talk about the idea of allowing people in to work because we are con [[Page 45]] cerned about terrorists and we are concerned about the border. But the point of fact, the border alone won't solve our problems. I have often spoken about the need to think of immigration law enforcement as a tripod, with the inspectors who enforce the immigration laws at ports of entry, the Border Patrol between ports of entry, but you need to have enough special agents to enforce the immigration laws from within the interior of the United States so that we have a seamless coordinated effort. I share Ms. Lofgren's concern about the numbers of people that have been proposed to be hired. In fact, in May of last year I testified at the Immigration Subcommittee about the fact that while Congress had authorized the hiring of 800 new special agents, the administration only hired 143, or wanted to hire 143. The number was eventually increased. But this has been going on for the longest time. There was no response to the first attack on the World Trade Center from an immigration perspective, and today we are in a situation where we are not even giving foreign language training to the special agents who are supposed to be investigating illegal aliens operating within our country. And, quite frankly, if you can't communicate with people, then you are unable to investigate those people. And the day-to-day routine enforcement of the immigration laws is critical to our security because it is during the routine enforcement of the laws that you will encounter potential terrorists and develop information. Twenty years ago--and this is also my prepared testimony--I was doing a rather mundane and routine job. I was assigned to the squad that was responsible for investigating locations that were knowingly hiring illegal aliens, and we arrested a bunch of people [[Page 36]] working illegal in the United States in a diner at Staten Island. One of the individuals whom we arrested turned out to be a citizen of Egypt; and we went back to his apartment in order to get his passport, which was the standard procedure. What we found were bags filled to the brim with food coupons and dog food coupons and detergent coupons. And we could not understand why he had this, and he had no adequate explanation. Mr. Cutler. We had no place to go with that information and no place to make inquiries. We ultimately deported that guy. And months later I was shocked to listen to a television news report about how the PLO had sent some of their folks into our country to commit coupon fraud to fund terrorism in the Middle East. It is important that if we are going to secure our country and protect our people, that we have enough agents and that we understand who we are really dealing with. And quite frankly, I am very much concerned when I hear stories about guest worker programs that would provide official documentation to illegal aliens whose true identities we don't know. There is no way that we can develop a system that will deal with millions of people who have no way of proving who they are, where we would wind up giving people official identity documents without knowing whether or not these are bad guys, because I would like to remind you that the job of a terrorist, just like a spy, is to hide in plain sight, and if we give identity documents to people without knowing their true identities, we make it that much easier for them to hide in plain sight. [[Page 46]] And finally, I want to make one point, if I may. I have heard some of the folks today talk about interior enforcement, and they are right, but they have limited it to people who have been identified on the border who fail to show up, the so- called OTMs who failed to appear, and employer sanctions. A big issue is immigration benefit fraud. Janice Kephart was the counsel to the 9/11 Commission, and I provided testimony to her, and she did a little bit of a study and found that there were over 90 terrorists that were identified in our country operating during the decade leading up to 9/11. Of those 90-odd aliens, some 59, or about two-thirds, had used immigration benefit fraud either to enter into the United States or to embed themselves in the United States once they got here. If we don't address immigration from all aspects, then I think we are going to have a very serious problem. And intelligence is only a part of the metrics; we also need to look at the visa waiver program as well. I know my time is up. I thank you for your indulgence, and I look forward to your questions. Mr. Simmons. Thank you for that insightful statement. We appreciate the breadth of experience you bring to the issue. [The statement of Mr. Cutler follows:] Prepared Statement of Michael W. Cutler Chairman Simmons, ranking member Lofgren, members of Congress, ladies and gentlemen, I welcome this invitation to appear before you today at a hearing that I believe is of critical importance to the safety of our citizens and indeed to the very survival of our nation. The gathering of effective intelligence is essential for effective law enforcement and for issues relating to national security. Nothing can be of greater significance than the issue of developing effective intelligence, that is to say, the culling of accurate information and understanding its place in the overall picture. Intelligence should be thought of as being comparable to the way that a digital photograph is made. A digital photograph is comprised of a huge number of elements or pixels, which are placed in the proper location to paint a clear picture. As the number of pixels increases, the clarity of the photo increases proportionately. So too, the clarity of the picture painted by effective intelligence is proportionate to the quantity and quality of the intelligence or nuggets of information that can be gathered and placed in the proper position in the mosaic that makes up the overall picture. The ability to understand the significance of each kernel of information, also contributes to the clarity of the picture that the intelligence will create. Effective intelligence also requires that it be disseminated quickly to the ultimate users of the intelligence. It has a short "shelf life" and therefore where critical intelligence is concerned, time is of the essence. Pixels do not lose their value over time, intelligence does. Additionally, it is important to understand human nature. Approximately 400 years ago Sir Francis Bacon said, "Knowledge is power." That statement is as true today as it was when he first said it. Various federal agencies realize that intelligence that they possess provides them with a certain amount of power and therefore their members have been reluctant to share their knowledge with other agencies. However the point to intelligence is to protect our nation and intelligence that is critical today will become worthless in a very short period of time. That is why it must be freely and expeditiously shared with those who truly possess the "Need to know." It is also worth noting that intelligence comes from many sources. It comes from electronic surveillance and other high-tech means and also comes from low-tech sources; informants who are willing to talk and field personnel who make observations in the field when they find documents and other materials that yield valuable information. That is why it is essential that field agents understand that they have a vital role to play in the development of intelligence. They are our government's eyes and ears on the ground and their discoveries and insights are invaluable. Because of this, not only must they be provided with accurate intelligence to help them do their jobs, they must also be provided with an opportunity to share their observations with intelligence analysts who may be able to take seemingly unconnected observations and even "hunches" and weave them into a tapestry of effective intelligence. I would like to share with you an experience I had approximately 20 years ago which is as relevant today as it was when it occurred. Back then I was assigned to a unit of the former INS in New York that was charged with finding illegal aliens who were working illegally in the United States. My colleagues and I were in the process of arresting a number of illegal aliens who were working in a diner in Staten Island, New York when one of the illegal alien employees, a citizen of Egypt, fled the restaurant when he realized we were present. He made an exhaustive although ultimately futile effort to evade us and we succeeded in taking him into custody. We took him back to his apartment to attempt to retrieve his passport, a standard procedure, since his passport would be helpful in positively identifying him and determining his date place and manner of entry into the United States. His passport would also be useful in arranging for his deportation should the immigration judge order him deported. With his consent, we entered his apartment and were surprised to find that there were numerous department store shopping bags lining one of the walls in his sparsely furnished apartment. These bags were filled to the very top with hundreds upon hundreds of coupons for all sorts of merchandise ranging from dog food to detergent to cereal. He had no meaningful explanation for this but we had no way of making any inquiries to understand the possible significance of those coupons. We retrieved his passport and he was ultimately deported. Several months later I was shocked to learn from a televised news program that the PLO had sent a number of their people to the United States to engage in coupon fraud in order to fund terrorism in the Middle East. Purportedly this tactic netted the PLO millions of dollars in ill-gotten funds. This young man who was seemingly engaged in nothing more sinister than washing dishes in a diner was apparently an operative of a terrorist organization. We had him in custody and we deported him, losing a potential treasure trove of intelligence from a terrorist operative or at least terrorist sympathizer. To this day I wonder what intelligence we might have gained had we understood the significance of the shopping bags filled with coupons on the day we arrested him. I also wonder where he is now and what efforts he might be engaged in that pose a threat to our nation or our allies today. If the news media understood the significance of coupon fraud, why did not the former INS make certain that their field agents were aware of such activities? Keeping our law enforcement personnel in the dark not only keeps them from being as effective as possible at carrying out their day to day duties, it also keeps them from recognizing situations that may make their jobs more hazardous and also prevents them from pressing an investigation further, where the results might yield highly critical information. This is also the reason that I am greatly concerned when I hear members of the administration talk about the need to conduct field investigations where critical infrastructure facilities are concerned such as airports and nuclear power plants but where limited resources make routine immigration law enforcement a non-priority. Certainly it is vital that we make certain that we make vital infrastructure facilities as secure as possible and not only where hiring illegal aliens is concerned, but from other perspectives as well. However, as we have seen in a number of terrorism investigations over the past several years, many of the suspected terrorists who have been identified and arrested have not worked as such sensitive locations as airports and nuclear power plants, but had relatively "pedestrian" jobs driving taxi cabs and ice cream trucks as well as teaching in schools and working in used car lots. The goal of terrorists is to "hide in plain sight" or in the parlance of the 911 Commission, to "embed" themselves in our nation. The routine enforcement of immigration laws can provide our government with the opportunity to cultivate informants and provide essential insight if our agents are properly briefed and properly debriefed. They need to be encouraged to come forward whenever they make observations that arouse their suspicions or curiosity and need to have an easy way to report on their findings in the field. Finally, we also need to provide our field personnel at ICE with appropriate training, including foreign language training. When I attended the Border Patrol Academy in 1972 I was required to successfully complete a Spanish language training program as were all enforcement personnel who were hired by the INS. Today, incredibly, that foreign language training is not only not required, it is not even offered for newly hired special agents of ICE. As I have stated at previous Congressional hearings at which I have testified, you simply cannot investigate people you are unable to communicate with. It is absolutely essential that our ICE personnel be given Spanish language training and they also need to be trained in various strategic languages such as Arabic, Farsi and Urdu to name a few. They also need to be given on-going training to properly identify fraudulent and/or altered identity documents, since these documents are the linchpins that hold the immigration system together. From what I have been told, this training is far from adequate at present, and this is not in our nation's best interest. I would remind you that the terrorists who attacked our nation on September 11, 2001 used multiple identities and false documents as well as documents that were improperly issued to them, in order to embed themselves in our country as they prepared for the horrific attacks that they launched against our nation and our people on that terrible day. I look forward to your questions. Mr. Simmons. Mr. O'Hanlon. STATEMENT OF MICHAEL O'HANLON, SENIOR FELLOW IN FOREIGN POLICY STUDIES, BROOKINGS INSTITUTION Mr. O'Hanlon. Thank you, Mr. Chairman and Congresswoman. It is an honor to be here. I will try to be very quick. I just want [[Page 37]] to make one broad comment. Having listened to the great expertise this morning and learned a lot myself, I think it highlights, if you put it all together, one broad observation, which is that intelligence is very important clearly at land border crossings, but we are never going to have good enough intelligence to find individuals and be able to target Border Patrol assets accurately. Our only hope using intelligence really is at the places where people come through official points of entry. That is where we spotlight attention. So this leads me to a couple of broad conclusions. While I think we do need to keep working on intelligence capability for land crossings, we are never going to know enough about coyotes and about preferred points of entry and so forth to have that be a reliable way to stop people. It takes very good luck to find someone, it is going to always take very good luck, which leads me to think we need to continue to increase capacity first to seal those borders to the extent possible, even though we all know it is not theoretically truly possible. Secondly, to be able to do a very good job at official points of entry in certain areas where we are not doing very well right now, I think we need to be making inquiries of a lot more passengers inside of cars at official points of entry and not simply hoping that the driver's identity gives us a sufficient tip as to whether that car is suspicious. And I also think that, in keeping with some of the comments that have just been made, we do need to think hard about better forms of identification for American citizens, standards for driver's licenses, possibly even national ID cards. The 9/11 Commission, I think, was quite convincing on these points. Americans have a very strong civil liberties concept on our Nation's history and in our thinking, and therefore, there is always pushback against this sort of idea. But I think tougher standards on driver's licenses and other forms of identification are critical, because we have to always be looking inside the country, too, because we are going to have people keep crossing across the land borders. That is never going to be sealed enough, and we can't assume that intelligence is going to ever get good enough to solve that problem. So, official points of entry, whether it is people coming through or cargo coming through, we need more capacity, more capacity for land borders to reduce the likelihood of people getting through because intelligence is not going to help us pinpoint to know exactly when and where to look for whom. We are going to have to try to increase general capability across that land border. And in general, on sort of a broad unfocused note, but more, more, more. We need more capacity in general because intelligence is never going to be smart enough to tell us when and where to look for whom. And I will stop with that simple point. [The statement of Mr. O'Hanlon follows:] Statement of Mr. Michael O'Hanlon Border protection is a critical pillar of homeland security. It keeps dangerous people and materials out of the country before terrorists can even get into a position to attack. In other words, it is preventive in nature-and thus represents an optimal approach to homeland security policy, as my coauthors and I argue in our new Brookings book, Protecting the Homeland 2006/2007. Border protection should not be principally viewed as a literal defense of the nation's perimeter. It is not tantamount to the creation of a moat around American borders. Rather, it is a set of efforts that exploits the fact that people and goods are relatively easily monitored when they arrive at checkpoints. In other words, movement across borders allows spotlighting to occur. To be sure, some border protection functions represent something closer to the direct physical protection of borders-most notably, the efforts of the border patrol along the long perimeters of the United States, as well as some activities of the Coast Guard and the Department of Defense. But the spotlighting role is even more critical. Its failure is what allowed the 19 September 11 hijackers to enter the country. Similarly, the nation's inability to know accurately what goods are coming across its borders have much more to do with holes in the official inspection process-that is, with the spotlighting function-than with the weaknesses of our national walls. Done right, border security activities can offer additional benefits beyond the homeland security sphere, meeting another one of our four recommended guidelines. Digitized and computerized borders can allow more dependable and rapid movement of people and goods in and out of the United States. They can also provide better knowledge of where ships and goods are when in transit. That in turn translates into, among other things, a greater ability to prevent or respond quickly to other dangers such as piracy and ship accidents that can afflict trade and travel. This should be the goal of tighter border protection; we must avoid the risk of borders turning into chokepoints. Homeland security efforts should reinforce, not compete with, economic competitiveness. America's geography generally helps in the effort to monitor borders and to use them as a means of funneling goods and routing people through places where spotlighting is possible. But the country has two long land borders that remain very difficult to guard. And they are far from the only main challenge facing this domain of homeland security. This testimony considers a number of relevant problems, as well as the general matter of aviation security, which is in part a matter of border protection. Its conclusions, in short, are that there is no magic bullet for keeping illicit goods and people out of the country, and no easy analytical way to deduce what level of increased inspection or monitoring capacity would be sufficient for national security. Ongoing efforts since 9/11 have been headed in the right direction, however, and the gradual increase in capacity for monitoring borders as well as goods should continue. In addition, some additional policy steps such as much more uniform standards for drivers' licenses are called for. Monitoring of People There has been progress in regulating and monitoring the movement of people into the United States. It is much harder for individuals to gain access to this country while disguising their true identities, particularly for those on terror watch lists. Notably, someone trying to fly into an airport from abroad is unlikely to get through under their own name if on a terrorist watch list, and indeed is unlikely to be allowed entry even under a false name if his or her fingerprints are already on file. This is a major step forward since 9/11. Other useful measures have also been adopted. For example, the Student and Exchange Visitor Information System (SEVIS) now appears to be functioning quite well in helping track those foreigners in the United States on student visas. Those who overstay visas can be more quickly identified and located. Biometric indicators are used increasingly to control foreign travel. The U.S.-VISIT program requires foreign visitors from all countries except Canada to submit to fingerprinting (of right and left index fingers) and digital photography upon arrival in the United States. A complementary program, the State Department's Biometric Visa Program, requires that fingerprints be taken of visa applicants before travel to the United States and compared to those in a DHS database (known as IDENT) consisting of some five million individuals, some of whom are ineligible for American visas. Upon arrival in the United States, visitors' fingerprints taken by DHS under the U.S.-VISIT program are also checked against those on the visas to confirm that the individual in question is indeed the one to whom the visa was granted. To reduce the chances that individuals planning terror attacks will find a legal way into the country and then overstay their visas, it would be useful to record exits in real time from the United States. Those remaining longer than they should could then be more easily identified and pursued (as the 9/11 Commission recommended). A remaining problem in air travel security arises from what is known as the Visa Waiver Program. Until digitized passports with biometric indicators are widely used by qualifying countries, the visa waiver program (VWP) will continue to constitute a substantial loophole in U.S. border security, given the prevalence of stolen and forged passports around the world. While individuals entering under VWP are still checked upon entry, there is less ability to interview them thoroughly when required if such activities must be carried out at the actual border. This circumstance argues for some other level of screening of individuals from VWP countries before they can board flights for the United States. For example, DHS security personnel could be deployed at foreign airline check-in counters in certain VWP countries (as Israel does with El Al flights). Terrorist watch lists also need to be improved. The United States is presently consolidating some dozen watchlists into a single terrorist screening database (TSDB) using more extensive data in the terrorist identities database (TID) that is also now being constructed. (The effort to construct the TID began with the previous gold standard of terrorist watch lists, the State Department's TIPOFF list. The list was subsequently scrubbed and expanded by consolidating it with other databases.) Some new specialized watchlists with limited information (easier to share with people not possessing security clearances) are being created as well, such as the Secure Flight database to assist in monitoring aircraft passengers and improve the accuracy with which their names are matched against those of suspected terrorists. Thankfully none of the watchlist consolidations have turned into complete fiascos, as the FBI's attempts to computerize its case files unfortunately has. But the consolidation and integration process remains slow. For example, Secure Flight had not yet been tested as of September 2005. Even digitized passports with biometric indicators cannot track new recruits with no known ties to terrorist organizations. It is therefore important to recall that there are inherent limitations to these sorts of terrorist tracking efforts. This is one clear example of the reason why a multi-tiered strategy for homeland security is imperative. The problem with screening people also works in the opposite direction--keeping good people out while they wait for security reviews to be completed. This is true for example for foreign students, who when screened through the so-called Visas Mantis program have had to wait months for their visas in many cases. Improvements have been underway in these programs, including allowing students to get a single visa for an entire period of study (rather than requiring annual renewal). But there are still long delays. This problem also applies to individuals trying to enter the country to conduct business, seek medical care, or pursue other important matters. The student problem has not truly become severe. While the 2003/ 2004 academic year did register a 2.4 percent decline in foreign students relative to the year before, the number of foreign students remained greater than in 2000 or any year before. Moreover, numbers of applications from the Middle East to U.S. graduate schools actually increased in both the 2003-2004 and 2004-2005 academic years (while numbers from China, India, and Korea continued to fall). Indeed, the overall number of foreign students in the United States was 4.5 percent greater in 2004/2005 than just before the September 11, 2001 attacks, though there was a decline of 14 percent in Middle Eastern students. And the U.S. figures were not notably worse than those witnessed in the United Kingdom. That said, the problem could again intensify--and could affect some of the most talented individuals in the broader foreign student pool, convincing disproportionate numbers of them to go elsewhere. Further measures to address this problem, such as increases in government capacity for processing such paperwork, are therefore warranted. In situations involving certain non-western countries, American technical and financial help may be needed to ensure good border security and travel controls. The simple fact of the matter is that the United States has a greater interest in tracking the movement of many terrorists than do developing countries. Even when that is not the case, many countries will not have the resources to do all they should given the urgency of the threat. Seen in this light, President Bush's June 2003 East Africa Counterterrorism Initiative (EACTI) is a good step in the right direction. It provides $100 million to improve border control, police, airline security, and related homeland security operations in a region that has been hit hard by terrorist violence. The latter includes the 1998 U.S. embassy bombings in Kenya and Tanzania and the 2002 attacks on a hotel and airline in Kenya (the latter thankfully not successful), not to mention ongoing civil strife in places such as Somalia. This is enough money to make a real difference in a region of relatively low incomes. But these funds were apparently taken in large part out of existing programs, meaning that their net beneficial effect is difficult to ascertain. And similar programs are probably needed in other regions such as Central Asia. Ensuring adequate capacity to screen individuals and issue visas, as well as proper means for verifying their identities, helps the United States beyond the homeland security arena. It can expedite the movement of people into the country who can contribute to the economy, and who can ideally become goodwill ambassadors as well as important contact points for the United States once they return home. Whenever a homeland security program can have additional benefits beyond that immediate objective, it is especially worthy of serious consideration and serious support. The Special Problem of Land Borders The preceding discussion pertains generally to the movement of individuals to and from the United States. But monitoring the movements of people at land borders poses special problems. It also offers unique opportunities, underscoring our theme about the need for greater international cooperation in the "homeland" security effort. To the extent Canada and Mexico make it hard for terrorists to use their countries as staging bases or waystations, the United States benefits from an added line of defense of its own country. That does not make its own border enforcement job unimportant, but it does allow a somewhat greater (and more realistic) margin for error at that inherently difficult line of defense. If Canada and Mexico improve their own monitoring of persons traveling into and out of the country, only modest additional improvements may be needed in border security along the U.S.-Canada frontier, and other lines of protection in the broader homeland security arena may become more effective. The United States has 216 airports, 143 seaports, and 115 land facilities that are official ports of entry, at a total of 317 places. Those land facilities generally involve car and truck traffic that is especially difficult to regulate. In addition, of course, land borders are very hard to control in between official points of entry. At many official checkpoints, passengers in cars are not checked as long as they are in vehicles with legitimate license plates. This policy should be changed. Care must be taken to do it in a way that does not seriously slow movement at checkpoints, with resulting consequences for commerce as well as convenience of travel. That suggests that the change in policy will have to be gradual to allow time for more inspectors to be hired and new procedures to be developed (such as adding lanes at checkpoints). Given typical car passenger loads, it may be necessary to increase staffing by as much as 100 percent. Open land borders are also a serious problem. For example, U.S. land management agencies are responsible for the 30 percent of the borders owned by the federal government. Yet they have only 200 full- time law enforcement officers, a number increased by just 20 percent in the first two years after September 11. Such numbers cannot begin to credibly monitor or prevent off-road border crossings. Such limited vigilance of U.S. land borders is a mistake. It can deprive the country of the opportunity to "spotlight" people effectively at official points of entry, thereby blunting one of the very best homeland security tools that the United States and the international community in general possess. There are relatively few dependable ways to search for terrorists among the huge throngs of individuals on the planet; this needle-in-haystack effort requires some means of rendering people visible, and official border crossings can do that. So it is especially important to ensure that individuals pass through such locations when traveling. Take for instance the sparsely guarded Canadian border, which can be an important means of entry. The Patriot Act led to a tripling of the number of U.S. agents along that border, but the total remains just under 1,000 for an enormously long and porous border, and there is little reason to think the number adequate. The United States also needs an integrated plan involving increased, random patrols and better equipment for surveillance and mobility for the U.S.-Canada border, as well as better cooperation with Ottawa in this effort. There is movement in the right direction. DHS is developing a way to have response capability anywhere within an hour of notice of a problem, and to improve monitoring as well. This might not help with the "lone wolf" terrorist sneaking through the woods, but could pick up illicit vehicle movements or groups of individuals. Five DHS bases near the Canadian border are being created to help in the effort. Overall, this border is better protected than before, and will soon be monitored even more effectively. But the absolute numbers of U.S. capabilities are still extremely modest, suggesting an enduring problem. Although few Canadians would pose major terrorism-related concerns, Canada's efforts to monitor its own borders against terrorist infiltration are wanting in a number of areas. For example, its coast guard does little to monitor Canada's long shorelines and cruise ships coming ashore do not have passenger manifests examined. This underscores the importance of Canada improving its own regulations on individuals visiting the country, but also means the United States must assume that foreign terrorists may try to reach this country via our northern neighbor. A greater worry is the Mexican border, where despite the presence of almost 10,000 border agents, an estimated 4,000 illegal aliens cross per day. They are mostly Latinos, but also include individuals from countries such as Afghanistan, Egypt, Iran and Iraq with a greater corresponding risk of possible terrorist infiltration. Intelligence reports express concern that al Qaeda may indeed try to exploit the porosity of this border and infiltrate operatives through it. A rough benchmark for the above proposals to increase monitors at borders is that adding 1,000 employees costs the government $100 million. So the costs associated with the above proposals might be roughly $1 billion a year, if the doubling of inspectors recommended to monitor passengers in vehicles crossing the border were matched by comparable increases in other aspects of the border protection effort. Accurately estimating the appropriate number of additional inspectors is beyond the scope of this analysis, but the above number gives a reasonable ballpark. The number of inspectors has grown by 5,000 over the last decade, with some beneficial effect on estimated infiltration rates. Indeed, it possibly reduced them by one-third, though it is admittedly difficult to be sure of the exact numbers as well as the true causes of any decline. It makes sense therefore to continue on the same trajectory while also introducing new operational procedures and new technologies--such as UAV patrols, the sea wall near San Diego, and America's Shield Initiative involving multispectral sensors and cameras as well as magnetic and seismic detectors. The Bush administration's idea of using National Guard forces as a temporary means of supplementing DHS personnel at the borders seems in this light to be a good idea. The right policy is to start increasing border patrol personnel year by year in significant numbers and then attempt to modify procedures to improve border monitoring. As experience is gained, it can then be determined more accurately how many will be enough. Unfortunately, the Bush administration's request for additional border agents in 2006 totaled just 210 individuals, a far cry from the scale of increase that would be appropriate, given the present porous nature of the country's perimeter. But Congress wisely added $600 million to the president's request in this area, enough for 1,000 additional agents. The database used by DHS's Border Patrol, IDENT, is not fully integrated on a national scale with other databases. IDENT uses a photo and two fingerprints, whereas the FBI's IAFIS (or Integrated Automated Fingerprint Identification System) uses all ten fingerprints. Reportedly, all U.S. Border Patrol stations now have interoperable systems capable of accessing IAFIS records and cross-checking the Border Patrol's IDENT entries against those records. But Border Patrol agents cannot access the consolidated name-based terrorist watchlist maintained by the Terrorist Screening Center at their stations. Another problem is that the consular identification cards issued to their own citizens by some foreign governments, including Mexico, can be fraudulently obtained fairly easily. They are often used for identification in the United States. Lax standards for such cards cannot be tolerated. The United States may need to consider contributing seed money to encourage Mexico in particular to develop more rigorous and real-time databases of possible terrorists as well as better ID technology of its own. At present, the United States has a plan to require visitors crossing the Canadian or Mexican borders to present a passport or one of four other hard-to-counterfeit documents. But that plan is not due to be implemented before December 31, 2007. Summing up, the land border security problem poses three special challenges. One, making sure that smaller border crossing posts receive up-to-date technology to become full participants in new efforts such as U.S.-VISIT, is mostly a matter of taking the problem seriously and providing adequate funds. A second, improving screening of individuals in cars--and working toward a standard by which all who pass through a land border are checked-is more demanding conceptually, though surely doable. It will take new procedures not yet developed. They could slow crossings dramatically, however, so considerable work is needed to add inspectors and increase the numbers of lanes at key crossings. Third is a problem for which solutions have not yet been successfully conceptualized, even in theory--closing down U.S. land borders to illegal infiltration, which is of course linked to broader U.S. immigration policy. More technical and human resources to monitor borders are generally well-advised to mitigate the problem, but are unlikely to solve it--again underscoring the need for a multi-tier approach to homeland security that begins by pushing America's own borders "outward" and improving cooperation with other countries' parallel homeland security efforts. There is clearly also a major benefit to improving border monitoring outside the homeland security domain. It is an important means of reducing illegal immigration, with all of its associated economic and political repercussions. Thus, focusing on land border controls within a homeland security strategy is consistent with the principle, as presented in the introduction, that the United States should be especially keen to pursue programs with multiple benefits. Indeed, the United States and Canada might push this logic one step further and consider another crossing point in the Detroit/Windsor area (where more than $100 billion of trade occurs annually between the two countries). If built outside of the immediate urban areas, it would not only provide backup in case a major bridge were destroyed, but reduce traffic congestion under normal conditions. Mr. Simmons. I thank you both for your comments. My recollection--and I couldn't find it right away in the book--is somewhere in the 9/11 Commission report it made some interesting statements about who is to blame and what went wrong. And the Commission stated that our aim has not been to assign individual blame, which is a position that I also agree with. If anyone [[Page 38]] is to blame, we are all to blame. We are all to blame because after the Cold War ended, we felt that there were no threats, no real threats, that were presented against us, and certainly in those days not the threat of terrorism, which was a nonsovereign nation, nongovernmental-sponsored activity. But somewhere else it says that some of our failures were a failure of imagination; a failure of imagination. I have used the image of the Great Wall of China to try to illustrate what I consider to be the fundamental problem. We have such extensive borders. We are engaged economically, socially, politically with the rest of the world on an hourly basis, much less a daily basis. We have a set of standards and values with regard to rights and liberties that make us the most open and free country in the history of the world, and yet that very freedom allows those who hate us to attack us. I mean, this is a huge problem. And I guess you can take pieces of it, like language training, pieces of it like who is on a certain port of entry and how are they trained and how many are there, but I think we have to apply imagination as well. And I guess that, to me, is where intelligence does come in. We don't have perfect security, we never will, but how--you work for the Congressional Budget Office, I believe-- Mr. O'Hanlon. I do. Mr. Simmons. How do we apply those resources intelligently? If we have 200 on the border, is 1,000 going to solve the problem; or should we have 800 at the border and the money for 200 go to mandatory language training? How can we apply our imagination to this problem for which we don't have unlimited resources, Mr. Cutler? Mr. Cutler. Well, one of the things that we seem to have developed a fixation is high technology, and sometimes that can be very good. But there was a story not long ago about--I think it was 220--or $230 million that was spent on cameras on the border. Cameras don't make arrests. Half the cameras, as it turned out, didn't work. You know, I am a New Yorker. The ashes of 9/11 actually landed on my house. And I have been working as a volunteer with 9/11 Families for a Secure America who lost their family members. I can't tell you how many yellow ribbons are tied to my neighbors' trees. It is a constant reminder to me about our failings. And I have arrested terrorists in my career. And sometimes you get to play a hunch, and when I was a new agent, I had a guy come in at the airport, and he had an altered visa. And he kept calling Israel Palestine. He had an Israeli passport. We dug a little deeper. Long story short, he had a diagram in his possession, and the diagram was of their oil refinery. He was here to get the money to blow it up. We eventually prevented it from happening, and that was in my first year as a special agent. I had 30 years in with the INS. But what it taught me is playing hunches and freeing people up to sometimes follow that wild idea, but not with technology as much as with human resources. Mr. Simmons. If I could interrupt for just that point. When Commissioner Kelly and Mayor Bloomberg say we need the Federal Government to give us dollars for human beings, there is a lot of value in that. [[Page 39]] Mr. Cutler. There is absolutely a lot of value. And I like that comparison because I want you to think about something. It is estimated that right now there is about 15--, 20 million illegal aliens in the United States, depending on whose statistics you want to read. New York has 8 million residents. We are the safest big city in the United States because we have 37,000 cops. We have less than 10 percent the number of Special Agents to enforce the immigration laws with double the number of people as there are residents in the city of New York, and they are scattered across a third of the North American continent. That is not a workable situation. When I hear about these so-called successes that ICE broke up a ring that brought in 50 or 60 or 80 people, and we are dealing with millions of illegal aliens, I am sorry, it leaves me not feeling very confident. We need to make the effort to do a far better job and dedicate the resources. We can't do it on the cheap, but look at what 9/11 cost us, besides the precious human lives which no money can replace. Mr. Simmons. Mr. O'Hanlon. Mr. O'Hanlon. Congressman, just a very brief point. I am glad you pushed me on the issue of priorities. We do need to establish priorities, and there are proposals in Homeland Security that I think are excessive, but not usually on the prevention end of things. Most of what I think you are considering in this committee today and in general are border protection problems, intelligence. These are on the front end, the preventive end, and that is where we should be emphasizing in general. So I know I gave a bit of a broad-brush comment that most of the things we touched on today require more resources, and in one sense that can never be a good enough answer. But I would prioritize preventive areas of activity over consequence management. We need some capacity for consequence management, but some of the ideas I have heard in the homeland security debate in the last 5 years to equip most first responders in the country with state-of-the-art chem gear or interoperable radios, or have them drill several times per month in terms of response to incidents that have already occurred that we didn't stop, some of these are excessive, and that is where you can spend too much. More of the money should be spent on preventative efforts, on intelligence and on border protection. Mr. Simmons. I really am glad to hear you say that. And for you, Mr. Cutler, my daughter's apartment was so close to Ground Zero that she never reoccupied it after 9/11. She now lives in Brooklyn and works in Manhattan. So, like you, this is a daily-- Mr. Cutler. I hope she is going okay today. Mr. Simmons. She is physically-- Mr. Cutler. I don't think any New Yorker has been the same after that. Mr. Simmons. No. Well, two of her four roommates went down with the building. Mr. Cutler. I am so sorry. Mr. Simmons. The gentlelady from California. Ms. Lofgren. Thank you, Mr. Chairman. [[Page 40]] All of us, even those of us in California, were touched in some way by 9/11. The valedictorian of my high school class, Naomi Solomon, was on the Windows on the World that morning, and we lost her. So this is something that touched the whole country, and something that we are committed to preventing again. I don't have a lot of questions because both witnesses have been very clear. I would note just for the record, a little parochialism here, that although San Jose may not seem like a big city to New York, it is the 10th largest city in the United States and has the lowest crime rate of any major city in the United States, just for the record. Mr. O'Hanlon, thank you for the book that you coauthored. The Chairman has suggested that I get your autograph on it, which maybe we will do after the hearing. But I did want to talk a little bit about your comments on page 103 about IDENT, the database used by the Border Patrol, and that it is not fully integrated on a national scale with other databases. And this is something that bothered me from the very beginning, and I asked about this both in the Homeland Security Committee, the Science Committee and the Judiciary Committee on why we were not going to have interoperability, and even asked NIST how long and how much would it take to integrate this. And for reasons I cannot understand, we never took care of that. And as you point out, the FBI now has an integrated automated fingerprint identification system using all 10 prints, and the Border Patrol now have interoperable systems capable of accessing IDENT and the IAFIS records, but they are not interoperable, and they don't have access to the consolidated name base terrorism watch list. What do you think needs to be done here? I mean, it is heart-breaking actually that we didn't plan at the beginning, and now we have this proliferation? What should we do? How much is it going to cost? Mr. O'Hanlon. Thank you for the question. I am glad you are pursuing it, because, speaking honestly, from the point of view of an analyst, it is hard to keep track of this for two reasons: One, some of this is classified. Secondly, when you are doing a book, there is a lag time between when you write and when it is published. This has to be followed up in real time continually, and they are making progress, as I understand things, at integrating these two different systems. So I think the broad story of integrating the terrorism watch list in the last 5 years, thanks in large part to the scrutiny of committees like this, is that we have a progress. Ms. Lofgren. The sad thing is they could have been the same system at virtually no additional cost to the country. Mr. O'Hanlon. But the reassuring news, despite that, is that we are essentially sharing names in one way or another at this point, even though there are these inefficiencies, and it took us too long, and thank God we weren't attacked in the meantime. Ms. Lofgren. But the names yield false positives all the time. It is the biometrics that really give you--I mean, you can do one false identification, but only one; I mean, once you have got their biometrics. Mr. O'Hanlon. Well, you summarized it as least as well as I could. I will just make one additional point, if I could, which is on the visa waiver program and visa issues, we typically give our European friends a hard time, as we should, for being too slow in some of their upgrades, but they have, I think, one thing right that we need to reconsider, which is they realize fingerprints are the way to go, or something better, with IRIS for example. We are still relying too much in visas on photographs; not a good way to do biometric-reliable identification. Ms. Lofgren. Well, I would just note that the other concern that I have--and then I actually am supposed to chair a meeting over in the Capitol 20 minutes ago--but the US-VISIT is not interoperable in terms of the algorithms and the biometrics with the other systems. So we are building up data that ultimately I think we are going to have to go back in and redo. And did you have an opportunity to examine that, along with the IDENT, the other issue here that you mention in this chapter? Mr. O'Hanlon. My broad sense is that, to the extent we can understand this problem, we have had a lot of inefficiencies and delays, but ultimately we are working towards systems that, however inefficient, however much different from one another where they don't need to be, at least now you do have the ultimate information, which is the names of the individuals, being shared in much better real-time ways. It has taken too long, it has been too slow, and thank God we haven't been attacked-- Ms. Lofgren. Well, I appreciate it. My time is just about up. I would like to ask unanimous consent to put in the record an editorial from the San Jose Mercury News in yesterday's paper about immigration hearings, if I could, Mr. Chairman-- Mr. Simmons. Without objection. Ms. Lofgren.--as well as thank the witnesses and give my opinion that in the end it is going to cost us billions to go back and redo these biometrics. And we could have done it for a couple of million if we had done it at the beginning. And I yield back and thank the gentlemen. Mr. O'Hanlon. I think you are right on cost, by the way. Mr. Simmons. And I would ask unanimous consent that the chapter you referred to in the book be copied and entered into the record, if that doesn't violate your copyright rules. Mr. Cutler. Could I make one fast point? Mr. Simmons. Please. Mr. Cutler. In 1997, I testified at my first congressional hearing, and the advice I gave them was the need to use biometrics. And after everything that I heard and saw afterwards, the fact that here we are almost 5 years after 9/11 and we are still banging our head against the wall. You know, World War II ended in less than 4 years. And what frustrates me is we are not hitting the ground running, we haven't been, and we need to be, and that is something that concerns me tremendously. Mr. Simmons. I appreciate the comment. And I think that those of us who have been involved with the terror issue for any period of time--and for me it goes back pretty much to my service to the Central Intelligence Agency back in the mid 1970s, certainly in 1979 when colleagues were seized in the embassy in Iran, and when my roommate was killed in the Beirut Embassy in 1983--we have always felt--or I have always felt that we need a consolidated database on terrorists just as we needed it for counterespionage, and if we had moved aggressively in the early 1980s to create those databases, we wouldn't have the problem that we have today. But unfortunately, there are several libertarian issues that arose at the time, and people felt that the focus on the Cold War was more important than a focus on this kind of unconventional war. Sadly, we have learned the hard way that you cannot ignore multiple threats, that the world is dangerous in multiple ways; that our democracy is threatened and our values are threatened, our people and resources are threatened in multiple ways. We can't pay for it all, so we have to be smart. And in the past mistakes have been made. Mr. Cutler. I just wanted to respond quickly. I know we are running long on time. The administration has been doing these operations to target airports and nuclear power plants, and I think we need to. I mean, that should be a given if it is a secure facility. But the idea of hiding in plain sight--you know, there was a terrorist suspect who was arrested in Lodi, California, who was driving an ice cream truck. That ice cream truck kept me awake for a couple of weeks. I spent half my career doing drug and terrorism investigations, and much of what I did also involved surveillance. When a bad guy gets into a car and drives for a half hour to a parking lot and meets somebody else, you know he has had a meeting. How many people approach an ice cream truck on a hot afternoon? How hard would it be to slip a memory card from a little PDA device into a $5 bill, pay for ice cream and get another one in return? And those things can hold over a gigabyte of data. There have been terrorist suspects driving taxi cabs. The guy that was involved with terrorism in Canada that drove a school bus, which gave him easy access to easily persuadable children, young men. So the problem is that if we focus on secure facilities, two things have happened, in my judgment: Number one, we are leaving out the broader potential that the bad guys are hiding in plain sight. Somebody once said that a spy is somebody that wouldn't attract the attention of a waitress in a greasy spoon diner. The point of fact is it might well be that the waitress or the waiter is the spy or the terrorist. But the other thing is we have also given the other side a playbook. Don't get a job in a nuclear power plant if you want to stay under the radar, get a job selling hot dogs right outside the gates of the nuclear power plant, and nobody will pay attention to you. The reality is that we need to have an immigration system that has integrity. For far too long this has been a fragmented effort. And one of the things I have testified at a few prior hearings was about the structure of ICE versus CBP. And literally it has been versus, where there have been barriers erected, noncooperation and [[Page 43]] so forth. We need a seamless operation. And this needs to be seen as a continuum, not simply if you get past the Border Patrol, you are home free. It is kind of like trying to play baseball and telling your outfielders not to bother showing up in the outfield, hit the ball over the second baseman's head, and you have got an in-the-park home run. And that is the way immigration has been enforced and administered for far too long. And I would also ask, I don't know if procedurally this can be done, but the GAO did a report that was issued on March 10th of this year that addressed the issue of immigration benefit fraud. And if we do everything possible on the border and made the border completely impermeable, if we don't get to the issue about how we give out residency and citizenship and do those other things that constitute the benefits program, it would be the same thing as a homeowner securing his house and putting strong doors and locks on his windows and doors, and then handing out the keys to anybody who walks by. So all the efforts on the border will mean nothing if the immigration system itself lacks integrity, in my judgment. Mr. Simmons. I agree with you completely. Just again referring back historically to the Soviet Union, Colonel Abel, who was one of the KGB's most successful spies, came through Canada, established himself as a photographer in Brooklyn, I believe, for 7 years, and only after 7 years was activated, and by that time he had established his bona fides. He was a member of the community, et cetera, et cetera. You know, sleepers commit espionage, sleepers commit terrorist acts, and we need to be imaginative in how we go about targeting these problems, because if we are not imaginative, we will simply build that Great Wall of China, take a look at it, say, well, you know, we have emptied the Treasury, so therefore we have done everything we can do because the Treasury is empty, we haven't spared a dollar, the taxpayers have been decimated, and we have got this big wall, but it doesn't work. Maginot Line bankrupted the French. Didn't work. So the challenge is to apply economics and imagination, as you have described, to the problem. And I thank you both for your testimony. It has been very insightful. And I would say that members of the committee who have additional questions for the witnesses, we will ask them to respond to these in writing. The hearing record will be held open for 10 days. Mr. Simmons. There being no further business, and without objection, I thank the members of the third panel for their excellent testimony, and the committee stands adjourned. [Whereupon, at 12:26 p.m., the subcommittee was adjourned. Questions for the Record [The information follows]: [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED] [GRAPHIC] [TIFF OMITTED]