[House Hearing, 111 Congress]
[From the U.S. Government Printing Office]
FLIGHT 253: LEARNING LESSONS FROM AN AVERTED TRAGEDY
=======================================================================
HEARING
before the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED ELEVENTH CONGRESS
SECOND SESSION
__________
JANUARY 27, 2010
__________
Serial No. 111-51
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
56-189 PDF WASHINGTON : 2011
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Bennie G. Thompson, Mississippi, Chairman
Loretta Sanchez, California Peter T. King, New York
Jane Harman, California Lamar Smith, Texas
Peter A. DeFazio, Oregon Mark E. Souder, Indiana
Eleanor Holmes Norton, District of Daniel E. Lungren, California
Columbia Mike Rogers, Alabama
Zoe Lofgren, California Michael T. McCaul, Texas
Sheila Jackson Lee, Texas Charles W. Dent, Pennsylvania
Henry Cuellar, Texas Gus M. Bilirakis, Florida
Christopher P. Carney, Pennsylvania Paul C. Broun, Georgia
Yvette D. Clarke, New York Candice S. Miller, Michigan
Laura Richardson, California Pete Olson, Texas
Ann Kirkpatrick, Arizona Anh ``Joseph'' Cao, Louisiana
Ben Ray Lujan, New Mexico Steve Austria, Ohio
William L. Owens, New York
Bill Pascrell, Jr., New Jersey
Emanuel Cleaver, Missouri
Al Green, Texas
James A. Himes, Connecticut
Mary Jo Kilroy, Ohio
Eric J.J. Massa, New York
Dina Titus, Nevada
I. Lanier Avant, Staff Director
Rosaline Cohen, Chief Counsel
Michael Twinchek, Chief Clerk
Robert O'Connor, Minority Staff Director
C O N T E N T S
----------
Page
Statements
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Chairman, Committee on
Homeland Security.............................................. 1
The Honorable Peter T. King, a Representative in Congress From
the State of New York, and Ranking Member, Committee on
Homeland Security.............................................. 2
The Honorable Laura Richardson, a Representative in Congress From
the State of California:
Oral Statement................................................. 5
Witnesses
Ms. Jane Holl Lute, Deputy Secretary, Department of Homeland
Security:
Oral Statement................................................. 24
Prepared Statement............................................. 26
Mr. Patrick F. Kennedy, Under Secretary, Management, Department
of State:
Oral Statement................................................. 31
Prepared Statement............................................. 33
Mr. Michael E. Leiter, Director, National Counterterrorism
Center:
Oral Statement................................................. 36
Prepared Statement............................................. 38
For the Record
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Chairman, Committee on
Homeland Security:
Statement Submitted by Eileen R. Larence, Director, Homeland
Security and Justice Issues, and Stephen M. Lord, Director,
Homeland Security and Justice Issues, Government
Accountability Office........................................ 6
Statement Submitted by the American Civil Liberties Union...... 17
Appendix
Questions Submitted by Honorable Sheila Jackson Lee for Jane Holl
Lute, Deputy Secretary, Department of Homeland Security........ 81
Questions Submitted by Chairman Bennie G. Thompson for Michael E.
Leiter, Director, National Counterterrorism Center............. 84
Questions Submitted by Honorable Christopher P. Carney for
Michael E. Leiter, Director, National Counterterrorism Center.. 84
FLIGHT 253: LEARNING LESSONS FROM AN AVERTED TRAGEDY
----------
Wednesday, January 27, 2010
U.S. House of Representatives,
Committee on Homeland Security,
Washington, DC.
The committee met, pursuant to call, at 10:03 a.m., in Room
311, Cannon House Office Building, Hon. Bennie G. Thompson
[Chairman of the committee] presiding.
Present: Representatives Thompson, Harman, DeFazio, Jackson
Lee, Carney, Clarke, Richardson, Kirkpatrick, Lujan, Owens,
Pascrell, Cleaver, Green, Himes, Kilroy, Titus, King, Souder,
Lungren, Rogers, McCaul, Dent, Bilirakis, Broun, Miller, Olson,
and Austria.
Chairman Thompson [presiding]. The Committee on Homeland
Security will come to order. The committee is meeting today to
receive testimony on ``Flight 253: Learning Lessons from an
Averted Tragedy.''
Good morning. I would like to thank our witnesses for being
here today. Today's hearing will examine the circumstances
surrounding the attempted Christmas day bombing of Northwest
Flight 253. This committee will examine what happened, why it
happened, and what this Nation can do to make sure it does not
happen again.
We all know the facts. Abdulmutallab boarded Northwest
Flight 253 in Amsterdam bound for Detroit. As the plane entered
Detroit's airspace, he removed chemicals concealed in his
clothing and mixed them together with the intention of causing
an explosion. Thankfully, he failed. Courageous passengers and
crew subdued and restrained him until the plane landed, and he
was taken into custody.
Since September 11, this Nation has spent billions of
dollars to fix the aviation security system, yet 9 years later
it is clear that the safeguards put in place during the last
administration did not prevent another terrorist from boarding
a plane and trying to do harm to Americans.
This single failed terrorist act has brought those unsolved
security vulnerabilities into sharp focus. Security weaknesses
in the process of gaining legal admission to this country, gaps
in the collection and dissemination of information, a confusing
plethora of lists used to identify dangerous individuals,
stovepipes that impede the progress of information analysis and
sharing, and inconsistencies in the use of screening technology
all combine to create the situation faced by the passengers on
Flight 253.
The 9/11 Commission identified many of these problems, and
while the previous administration engaged in much movement to
solve these problems, it appears that movement and progress are
not the same. Within 2 weeks of this incident, President Obama
issued his preliminary report. The President's report found
incoherent, systematic weaknesses, and human errors were the
root cause of the intelligence failures that led to this
incident.
To any reasonable observer, one fact was certain. The
system did not work. In fact, the President ordered a series of
corrective actions, a clear and unflinching assessment followed
by quick action designed to address this long-known
vulnerability must be commended.
But it is important for all of us to realize that we will
not address our problems with terrorism in a blink of an eye
with a single technology. This Nation must begin to adopt a
layered approach to achieve a secure environment. We must not
begin our security assessment at the airport gate.
I want to thank our witnesses, and I look forward to their
testimony.
The Chairman now recognizes the Ranking Member of the full
committee, the gentleman from New York, Mr. King, for an
opening statement.
Mr. King. Thank you, Mr. Chairman. Like you, I want to
thank the witnesses for their testimony here today.
I think this is an especially critical hearing. Everyone
knows mistakes are made. Mistakes do happen. I think what
concerns us and what should concern us as we go forward is how
those mistakes are addressed and what is being done to protect
our Nation in the future and to protect those types of mistakes
from happening again.
Mr. Chairman, one of the concerns I have is what appears to
me an uncoordinated response from the intelligence community. I
say that not just based on what we have learned over the past
month, but also from watching the Senate hearings last week,
from looking at the testimony, listening to what former
Congressman Hamilton had to say yesterday.
I say that is I still can't determine who is in charge, who
makes the decisions. If we go back to the 2006 event, the
liquid explosives from London, clearly, the Department of
Homeland Security was in charge. It was Secretary Chertoff who
was out front. It was Kip Hawley, head of TSA, who was out in
front.
This time there was really no one in front. Secretary
Napolitano made several appearances. Mr. Brennan made several
appearances. But it appears that there was no one who was
coordinating this from beginning to end. There was no one who
was going to be out in front.
I am concerned what the role--I asked Deputy Secretary Lute
just during her testimony what DHS sees as its role as being,
and I know in your statement, I have heard Secretary Napolitano
say this, that the Department is a consumer of intelligence. I
thought when the Department was created, we expected more of an
affirmative role by the Department, again, as what did occur, I
thought, in the last several years of the previous
administration.
I am not making this a political issue, but if this
administration is deciding to change emphasis, then I think we
should know that, as to who is going to be the main coordinator
here.
Also, I think it is important for the President to come
forward and to establish some order in the intelligence
community. I saw Lee Hamilton said yesterday, ``I do not
believe the President yet has a firm grasp of the intelligence
community.''
All of us are aware that in the past 6 or 8 months, there
has been an open dispute between Admiral Blair and Director
Panetta. That has not been resolved, and if it is resolved, it
is resolved at the margins. That feud, if you will, is still
there.
We find out that the main decisions, some of the key
decisions that were made on December 25 were not made by anyone
in the intelligence community, but apparently by the Justice
Department, and then after that it appears the main player was
the White House itself, John Brennan, neither of whom is part
of the intelligence community.
If we are going to have an effective response and effective
defense set up, I believe that the professionals in the
intelligence field should have more to say. The departments and
agencies that have been created for that purpose should be in
the forefront.
So the whole issue of the Miranda warning--currently, no
one--no one here today, nor Director Blair nor Director Panetta
were consulted when that decision was made. It was made by the
Justice Department, apparently.
Similarly, let me add on that, when it comes to the Justice
Department being involved, it was the attorney general, who we
have learned, and some of us have known it for a while, but it
has now become public, when he made the decision to bring the
9/11 trials to New York, he never consulted with one person,
not one person in New York--police commissioner, anyone of the
State police, anyone of the U.S. Marshals.
No one was consulted about the security implications of
that, which appears to be what was repeated on Christmas day
when the Justice Department made this decision without getting
any input from anyone else in the intelligence community.
Let me also make a point here, and I want to make this very
clearly. I hope this will be a bipartisan point. I am outraged
by the lack of information we have gotten from this
administration since Christmas day. The previous
administration--I will ask the Chairman to vouch for me on
this--again, using the liquid explosive incident in London,
from the night before and for every day and every hour after
that, we received any information we asked for, that we
requested. It was given to us. We were told what was
classified, what was not to be made public.
In this case on Christmas night, the White House--and I
have heard this from a number of people--told other agencies
and departments not to give information out. We could not get
anything. Whatever we got was on our own. We were not given any
information. I believe John Brennan has set up an iron curtain
of secrecy in the White House and wants to control the
intelligence community. He wants to control the information.
I ask the Chairman, again, to back me on this, and he can
disagree if he wishes. I don't know one item in the last--when
I was Chairman or he was Chairman or either of us was Ranking
Member, one bit of information that was given to us that was
ever leaked out if it was classified. We never got one
complaint from the Department of Homeland Security or from NCTC
or CIA or anyone.
But now going back to September, but especially this
Christmas day, I believe that the White House is trying to
control intelligence, is trying to control counterterrorism,
and it is doing it in a way which is highly restricting the
powers of the departments here involved and is cutting off the
Congress from the information we have to have.
We have constituents, we have responsibilities. This cannot
be something where the White House gets all the information,
massages it, manages it, and then puts out the facts later on.
So I am putting that at the foot of John Brennan.
I am putting it also at the foot of Attorney General Holder
the fact that decisions are being made by him almost
unilaterally that should be made by the professionals in the
field, certainly in consultation with people who can agree or
disagree on these decisions. But to have them unilaterally made
by someone who is outside what I believe is the intelligence
world is wrong. I think the President should address that.
I also believe that as far as Congress, we have a different
role of that information. We have time and time again have had
to bring resolutions frequently to get information. On this in
particular, I know that an iron curtain came down on Christmas
night. That was wrong.
It doesn't matter who is in power, whether Republican or
Democrat, we need information as Members of Congress to get the
job done. We are not getting it done, and I fault this
administration. It is disgraceful and outrageous, and I put
that at John Brennan.
I yield back.
Chairman Thompson. Thank you very much.
Ranking Member King is partially correct in terms of the
committee's need to know with respect to any of this. I
absolutely support his premise that this committee has a
function. It cannot function without information in real time.
That information should not be gleaned from the news media, but
it should be gleaned from the proper source. It should not be
screened.
But I would also say that the Secretary Lute, Deputy
Secretary Lute, did contact me the night of Christmas on this
event, and I think she probably reached out to you. But now, I
am not aware of anybody else who tried to get in touch with us.
Mr. King. Deputy Secretary Lute reached out to me,
discussed what was going to be done as far as the future, as
far as airline precautions, but nothing about the facts of this
case.
Chairman Thompson. Okay, well----
Mr. King. We were told by other agencies they could not
give us any information.
Chairman Thompson. Well, no question the committee has the
right to know, and others have a responsibility to provide it,
and we will pursue that also.
Other Members of the committee are reminded that under
committee rules, opening statements may be submitted for the
record.
[The statement of Hon. Richardson follows:]
Prepared Statement of Honorable Laura Richardson
January 27, 2010
Mr. Chairman, thank you for convening this very important hearing
today focusing on the circumstances surrounding the attempted terrorist
bombing of Northwest Flight 253 on December 25, 2009. It is important
for the House to get answers regarding the events of that day. I thank
our distinguished panel of witnesses for appearing before us today to
share with us the lessons learned from this averted tragedy.
Like millions of Americans, I am a frequent air traveler, which
makes the events of December 25 particularly personal to us all. While
air travel still ranks as one of the safest ways to travel, this is an
industry where a single incident can become an enormous tragedy. Beyond
the lives lost and the damage to our economy, both the air travel
industry and the Nation suffers as the public loses confidence in the
integrity of our homeland security system.
It is disturbing to think what could have happened without the
brave actions of the passengers aboard Flight 253. Those passengers are
heroes and we cannot thank them enough for what they did. But what the
committee is focusing on today is what should have happened, what
systems should have worked, before we reached that point.
There are several questions to be explored today: (1) Why our
intelligence agencies did not connect the dots regarding the suspect,
(2) the efficiency of our visa and watch lists systems, (3) the
expanding nature of al-Quaeda, and (4) what technology we use, or
should be using, that would have prevented the events of December 25.
Also, I think we need to address why all the Members of this
committee were not notified and briefed in a timely fashion.
In the days and hours immediately after Christmas day, Members of
this committee were not briefed by the administration or TSA. As
Members of the committee tasked with jurisdiction over the agencies
responsible for security, that cannot be allowed to happen again. I
look forward to working with the Chairman, my colleagues, and the
administration to ensure that timely and meaningful consultation and
information sharing takes place.
I look forward to the testimony of our distinguished panel of
witnesses. We need to know exactly what went wrong and what we can do
to prevent these repeated mistakes from happening again.
Thank you again, Mr. Chairman, for convening this hearing. I yield
back the balance of my time.
Chairman Thompson. Before I welcome our witnesses, I want
to indicate that Secretary Napolitano was invited to this
hearing. We were told that she would be out of the country. I
now understand she is no longer out of the country, but she is
not here, so maybe Deputy Secretary Lute, you can pull us in on
where the Secretary is.
Our first witness is Dr. Jane Holl Lute, the Deputy
Secretary for the Department of Homeland Security. Dr. Lute has
been before the committee a number of times and has been very
straightforward in her presentations, and we appreciate that.
Our second witness is Mr. Patrick Kennedy, Under Secretary
of Management at the Department of State. Our final witness is
Mr. Michael Leiter, Director of the National Counterterrorism
Center.
Without objection, the witnesses' full statement and a
statement provided by GAO and a statement by the ACLU will be
inserted into the record. I now ask each witness to summarize
their statement for 5 minutes, beginning with Deputy Secretary
Lute.
[The statements of the Government Accountability Office and
the American Civil Liberties Union follow:]
Statement of Eileen R. Larence, Director, Homeland Security and Justice
Issues, and Stephen M. Lord, Director, Homeland Security and Justice
Issues, Government Accountability Office
January 27, 2010
gao highlights
Highlights of GAO-10-401T, a statement for the record to the
Committee on Homeland Security, House of Representatives.
Why GAO Did This Study
The December 25, 2009, attempted bombing of Flight 253 raised
questions about the Federal Government's ability to protect the
homeland and secure the commercial aviation system. This statement
focuses on the Government's efforts to use the terrorist watch list to
screen individuals and determine if they pose a threat, and how
failures in this process contributed to the December 25 attempted
attack. This statement also addresses the Transportation Security
Administration's (TSA) planned deployment of technologies for enhanced
explosive detection and the challenges associated with this deployment.
GAO's comments are based on products issued from September 2006 through
October 2009 and selected updates in January 2010. For these updates,
GAO reviewed Government reports related to the December 25 attempted
attack and obtained information from the Department of Homeland
Security (DHS) and TSA on use of the watch list and new technologies
for screening airline passengers.
What GAO Recommends
GAO is not making new recommendations, but has made recommendations
in prior reports to DHS, the Federal Bureau of Investigation (FBI), and
the White House Homeland Security Council to enhance the use of the
watch list and to TSA related to checkpoint technologies. The agencies
generally agreed and are making some progress, but full implementation
is needed.
homeland security.--better use of terrorist watch list information and
improvements in deployment of passenger checkpoint technologies could
further strengthen security
What GAO Found
The intelligence community uses standards of reasonableness to
evaluate individuals for nomination to the consolidated terrorist watch
list. In making these determinations, agencies are to consider
information from all available sources. However, for the December 25
subject, the intelligence community did not effectively complete these
steps and link available information to the subject before the
incident. Therefore, agencies did not nominate the individual to the
watch list or any of the subset lists that are used during agency
screening processes, such as the ``No-Fly'' list. Weighing and
responding to the potential impacts that changes to the nomination
criteria would have on the traveling public will be an important
consideration in determining what changes may be needed. Also,
screening agencies stated that they do not check against all records in
the watch list, partly because screening against certain records may
not be needed to support a respective agency's mission or may not be
possible because of the requirements of computer programs used to check
individuals against watch list records. In October 2007, GAO reported
that not checking against all records may pose a security risk and
recommended that DHS and the FBI assess potential vulnerabilities, but
they have not completed these assessments. TSA is implementing an
advanced airline passenger prescreening program--known as Secure
Flight--that could potentially result in the Federal Government
checking passengers against the entire watch list under certain
security conditions. Further, the Government lacks an up-to-date
strategy and implementation plan--supported by a clearly defined
leadership or governance structure--which are needed to enhance the
effectiveness of terrorist-related screening and ensure accountability
for the process. In the 2007 report, GAO recommended that the Homeland
Security Council ensure that a governance structure exists that has the
requisite authority over the watch list process. The council did not
comment on this recommendation.
As GAO reported in October 2009, since TSA's creation, 10 passenger
screening technologies have been in various phases of research,
development, procurement, and deployment, including the Advanced
Imaging Technology (AIT)--formerly known as the Whole Body Imager. TSA
expects to have installed almost 200 AITs in airports by the end of
calendar year 2010 and plans to install a total of 878 units by the end
of fiscal year 2014. In October 2009, GAO reported that TSA had not yet
conducted an assessment of the technology's vulnerabilities to
determine the extent to which a terrorist could employ tactics that
would evade detection by the AIT. Thus, it is unclear whether the AIT
or other technologies would have detected the weapon used in the
December 25 attempted attack. GAO's report also noted the problems TSA
experienced in deploying another checkpoint technology that had not
been tested in the operational environment. Since GAO's October report,
TSA stated that it has completed the testing as of the end of 2009. We
are currently verifying that all functional requirements of the AIT
were tested in an operational environment. Completing these steps
should better position TSA to ensure that moving ahead with a costly
deployment of AIT machines will enhance passenger checkpoint security.
Mr. Chairman and Members of the committee: We are pleased to submit
this statement on the progress Federal agencies have made and the
challenges they face in key areas of terrorism information sharing and
the deployment of checkpoint technologies. The December 25, 2009,
attempted bombing of Flight 253 has led to increased scrutiny of how
the Government creates and uses the consolidated terrorist screening
database (the watch list) to screen individuals and determine if they
pose a security threat, and highlighted the importance of detecting
improvised explosive devices and other prohibited items on passengers
before they board a commercial aircraft. The White House's initial
review of these events exposed gaps in how intelligence agencies
collected, shared, and analyzed terrorism-related information to
determine if the subject--Umar Farouk Abdulmutallab--posed enough of a
threat to warrant placing him on the watch list, which could have
altered the course of events that day. To enhance its ability to detect
explosive devices and other prohibited items on passengers, the
Transportation Security Administration (TSA) is evaluating the use of
Advanced Imaging Technology (AIT)--formerly called the Whole Body
Imager--as an improvement over current screening capabilities.
In October 2007, we released a report on the results of our
review--conducted at your request--of how the watch list is created and
maintained, and how Federal, State, and local security partners use the
list to screen individuals for potential threats to the homeland.\1\ As
a result of that review, we identified potential vulnerabilities,
including ones created because agencies were not screening against all
records in the watch list. We made a number of recommendations aimed at
addressing these potential vulnerabilities and helping to enhance the
effectiveness of the watch list process, which the agencies have not
yet fully addressed. These recommendations--which we discuss later in
this statement--are still important to address and can inform on-going
reviews of the December 25 attempted terrorist attack.
---------------------------------------------------------------------------
\1\ GAO, Terrorist Watchlist Screening: Opportunities Exist to
Enhance Management Oversight, Reduce Vulnerabilities in Agency
Screening Processes, and Expand Use of the List, GAO-08-110
(Washington, DC: Oct. 11, 2007).
---------------------------------------------------------------------------
Also, in January 2005, we designated information sharing for
homeland security a high-risk area because the Government faced
formidable challenges in analyzing and disseminating this information
in a timely, accurate, and useful manner.\2\ Since then, we have been
monitoring and making recommendations to improve the Government's
efforts to share terrorism-related information, not only among Federal
agencies but also with their State, local, Tribal, and private sector
security partners.\3\ Addressing this high-risk area is important to
help remove barriers that lead to agencies maintaining information in
stove-piped systems, and to hold them accountable to the Congress and
the public for ensuring terrorism information is shared, is used, and
makes a difference. We are continuing to review Federal agencies'
efforts to share terrorism-related information and expect to report the
results of this work later this year.\4\
---------------------------------------------------------------------------
\2\ See GAO, High-Risk Series: An Update, GAO-09-271 (Washington,
DC: January 2009), for our most recent update.
\3\ See, for example, GAO, Information Sharing: The Federal
Government Needs to Establish Policies and Processes for Sharing
Terrorism-Related and Sensitive but Unclassified Information, GAO-06-
385 (Washington, DC: Mar. 17, 2006); Information Sharing Environment:
Definition of the Results to Be Achieved in Improving Terrorism-Related
Information Sharing Is Needed to Guide Implementation and Assess
Progress, GAO-08-492 (Washington, DC: June 25, 2008); and Information
Sharing: Federal Agencies Are Sharing Border and Terrorism Information
with Local and Tribal Law Enforcement Agencies, but Additional Efforts
Are Needed, GAO-10-41 (Washington, DC: Dec. 18, 2009).
\4\ We have three on-going reviews of terrorism-related information
sharing that are being conducted based on separate requests from your
committee, the House Committee on Oversight and Government Reform, and
the Senate Committee on Homeland Security and Governmental Affairs.
---------------------------------------------------------------------------
In addition, in October 2009, we released a report on TSA's efforts
to deploy checkpoint technologies and the challenges the agency faces
in these efforts.\5\ We made eight recommendations related to the
research, development, and deployment of these technologies. The
Department of Homeland Security (DHS) agreed with our recommendations
and identified actions planned or under way to implement them. While
DHS is taking steps to address our recommendations related to
conducting risk assessments, the actions DHS reported that TSA had
taken or plans to take do not fully address the intent of the majority
of our recommendations.
---------------------------------------------------------------------------
\5\ GAO, Aviation Security: DHS and TSA Have Researched, Developed,
and Begun Deploying Passenger Checkpoint Screening Technologies, but
Continue to Face Challenges, GAO-10-128 (Washington, DC: Oct. 7, 2009).
---------------------------------------------------------------------------
This statement for the record discusses: (1) The Government's
efforts to use the terrorist watch list to screen individuals and
determine if they pose a threat, as well as how aspects of this process
contributed to the December 25 attempted terrorist attack and (2) TSA's
planned deployment of the AIT for enhanced explosive detection and the
challenges associated with this deployment.
This statement is based on products GAO issued from September 2006
through October 2009.\6\ In conducting our prior work, we reviewed
documentation obtained from and interviewed officials at the various
departments and agencies with responsibilities for compiling and using
watch list records. We also reviewed documentation and obtained
information on current checkpoint screening technologies being
researched, developed, and deployed. Our previously published reports
contain additional details on the scope and methodology for those
reviews. In addition, this statement contains selected updates
conducted in December 2009 and January 2010. For the updates, GAO
reviewed Government reports and other information related to the
December 25 attempted attack, obtained information from DHS and TSA on
the use of watch list records and new technologies for screening
airline passengers, and interviewed a senior TSA official. We conducted
our updated work in December 2009 and January 2010 in accordance with
generally accepted Government auditing standards.
---------------------------------------------------------------------------
\6\ See GAO, Terrorist Watch List Screening: Efforts to Help Reduce
Adverse Effects on the Public, GAO-06-1031 (Washington, DC: Sept. 29,
2006); GAO-08-110; Aviation Security: TSA Has Completed Key Activities
Associated with Implementing Secure Flight, but Additional Actions Are
Needed to Mitigate Risks, GAO-09-292 (Washington, DC: May 13, 2009);
and GAO-10-128.
---------------------------------------------------------------------------
in summary
Because the subject of the December 25 attempted terrorist attack
was not nominated for inclusion on the Government's consolidated
terrorist screening database, Federal agencies responsible for
screening activities missed several opportunities to identify him and
possibly take action. We have previously reported on a number of issues
related to the compilation and use of watch list records, such as the
potential security risk posed by not checking against all records on
the watch list. We also identified the need for an up-to-date strategy
and implementation plan--one that describes the scope, governance,
outcomes, milestones, and metrics, among other things--for managing the
watch list process across the Federal Government. Such a strategy and
plan, supported by a clearly defined leadership or governance
structure, can be helpful in removing cultural, technological, and
other barriers--such as those problems that the December 25 attempted
terrorist attack exposed--that inhibit the effective use of watch list
information.
With regard to the deployment of technology to detect explosives on
passengers, TSA expects to have installed almost 200 AITs in airports
by the end of calendar year 2010, and plans to procure and install a
total of 878 units by the end of fiscal year 2014. While recently
providing GAO with updated information to our October 2009 report, TSA
stated that operational testing for the AIT was completed as of the end
of calendar year 2009. We are in the process of verifying that TSA
tested all of the AIT functional requirements in an operational
environment. Moreover, we previously reported that TSA had not yet
conducted an assessment of the technology's vulnerabilities to
determine the extent to which a terrorist could employ tactics that
would evade detection by the AIT. While we recognize that the AIT could
provide an enhanced detection capability, completing these steps should
better position TSA to have the information necessary to ensure that
moving ahead with a costly deployment of AIT machines will enhance
passenger checkpoint security.
background
Terrorist Watch List Process
The Terrorist Screening Center (TSC)--administered by the Federal
Bureau of Investigation (FBI)--is responsible for maintaining the U.S.
Government's consolidated watch list and providing it to Federal
agencies as well as State, local, and selected foreign partners for
their use in screening individuals. TSC receives the vast majority of
its watch list nominations and information from the National
Counterterrorism Center (NCTC), which compiles information on known or
suspected international terrorists from Executive branch departments
and agencies.\7\ In addition, the FBI provides TSC with information on
known or suspected domestic terrorists who operate primarily within the
United States. To support agency screening processes, TSC first
determines if each nomination contains specific minimum derogatory
information for inclusion in its terrorist screening database. TSC then
sends applicable records from the terrorist watch list to screening
agency systems for use in efforts to deter or detect the movements of
known or suspected terrorists. For instance, applicable TSC records are
provided to TSA for use in prescreening airline passengers; to a U.S.
Customs and Border Protection (CBP) system for use in screening
travelers entering the United States; to a Department of State system
for use in screening visa applicants; and to an FBI system for use by
State and local law enforcement agencies pursuant to arrests,
detentions, and other criminal justice purposes.\8\
---------------------------------------------------------------------------
\7\ By law, NCTC, which is within the Office of the Director of
National Intelligence, serves as the primary organization in the U.S.
Government for analyzing and integrating all intelligence pertaining to
terrorism and counterterrorism, except for intelligence pertaining
exclusively to domestic terrorists and domestic counterterrorism. See
50 U.S.C. 404o(d)(1).
\8\ See GAO-08-110 for additional details on the compilation and
use of terrorist watch list records.
---------------------------------------------------------------------------
Airline Passenger Screening Using Checkpoint Screening Technology
Passenger screening is a process by which screeners inspect
individuals and their property to deter and prevent an act of violence
or air piracy, such as the carrying of any unauthorized explosive,
incendiary, weapon, or other prohibited item on board an aircraft or
into a sterile area.\9\ Screeners inspect individuals for prohibited
items at designated screening locations. TSA developed standard
operating procedures for screening passengers at airport checkpoints.
Primary screening is conducted on all airline passengers before they
enter the sterile area of an airport and involves passengers walking
through a metal detector and carry-on items being subjected to X-ray
screening. Passengers who alarm the walkthrough metal detector or are
designated as selectees--that is, passengers selected for additional
screening--must then undergo secondary screening, as well as passengers
whose carry-on items have been identified by the X-ray machine as
potentially containing prohibited items.\10\ Secondary screening
involves additional means for screening passengers, such as by hand-
wand; physical pat-down; or, at certain airport locations, an
explosives trace portal (ETP), which is used to detect traces of
explosives on passengers by using puffs of air to dislodge particles
from their bodies and clothing into an analyzer. Selectees' carry-on
items are also physically searched or screened for explosives, such as
by using explosives trace detection machines.
---------------------------------------------------------------------------
\9\ Sterile areas are generally located within the terminal where
passengers are provided access to boarding aircraft, and access is
controlled in accordance with TSA requirements.
\10\ A nonselectee passenger who alarms the walk-through metal
detector on the first pass is offered a second pass. If the passenger
declines the second pass, the passenger must proceed to additional
screening. If the nonselectee passenger accepts the second pass and the
machine does not alarm, the passenger may generally proceed without
further screening.
---------------------------------------------------------------------------
assessing potential vulnerabilities related to not screening against
all watch list records and ensuring clear lines of authority over the
watch list process would provide for its more effective use
Agencies Rely Upon Standards of Reasonableness in Assessing Individuals
for Nomination to TSC's Watch List, but Did Not Connect
Available Information on Mr. Abdulmutallab to Determine Whether
a Reasonable Suspicion Existed
Federal agencies--particularly NCTC and the FBI--submit to TSC
nominations of individuals to be included on the consolidated watch
list. For example, NCTC receives terrorist-related information from
Executive branch departments and agencies, such as the Department of
State, the Central Intelligence Agency, and the FBI, and catalogs this
information in its Terrorist Identities Datamart Environment database,
commonly known as the TIDE database. This database serves as the U.S.
Government's central classified database with information on known or
suspected international terrorists. According to NCTC, agencies submit
watch list nomination reports to the center, but are not required to
specify individual screening systems that they believe should receive
the watch list record, such as the No-Fly list of individuals who are
to be denied boarding an aircraft.\11\ NCTC is to presume that agency
nominations are valid unless it has other information in its possession
to rebut that position.
---------------------------------------------------------------------------
\11\ As discussed later in this statement, agencies generally do
not use the full terrorist watch list to screen individuals. Rather,
they generally use subsets of the full list based on each agency's
mission and other factors.
---------------------------------------------------------------------------
To decide if a person poses enough of a threat to be placed on the
watch list, agencies are to follow Homeland Security Presidential
Directive (HSPD) 6, which states that the watch list is to contain
information about individuals ``known or appropriately suspected to be
or have been engaged in conduct constituting, in preparation for, in
aid of, or related to terrorism.''\12\ HSPD-24 definitively established
the ``reasonable suspicion'' standard for watchlisting by providing
that agencies are to make available to other agencies all biometric
information associated with ``persons for whom there is an articulable
and reasonable basis for suspicion that they pose a threat to national
security.''\13\ NCTC is to consider information from all available
sources and databases to determine if there is a reasonable suspicion
of links to terrorism that warrants a nomination, which can involve
some level of subjectivity. The guidance on determining reasonable
suspicion, which TSC most recently updated in February 2009, contains
specific examples of the types of terrorism-related conduct that may
make an individual appropriate for inclusion on the watch list.
---------------------------------------------------------------------------
\12\ The White House, Homeland Security Presidential Directive/
HSPD-6, Subject: Integration and Use of Screening Information
(Washington, DC, Sept. 16, 2003).
\13\ The White House, Homeland Security Presidential Directive/
HSPD-24, Subject: Biometrics for Identification and Screening to
Enhance National Security (Washington, DC, June 5, 2008).
---------------------------------------------------------------------------
The White House's review of the December 25 attempted terrorist
attack noted that Mr. Abdulmutallab's father met with U.S. Embassy
officers in Abuja, Nigeria, to discuss his concerns that his son may
have come under the influence of unidentified extremists and had
planned to travel to Yemen.\14\ However, according to NCTC, the
information in the State Department's nomination report did not meet
the criteria for watchlisting in TSC's consolidated terrorist screening
database per the Government's established and approved nomination
standards. NCTC also noted that the State Department cable nominating
Mr. Abdulmutallab had no indication that the father was the source of
the information. According to the White House review of the December 25
attempted attack, the U.S. Government had sufficient information to
have uncovered and potentially disrupted the attack--including by
placing Mr. Abdulmutallab on the No-Fly list--but analysts within the
intelligence community failed to connect the dots that could have
identified and warned of the specific threat.
---------------------------------------------------------------------------
\14\ The White House, Summary of the White House Review of the
December 25, 2009, Attempted Terrorist Attack (Washington, DC, Jan. 7,
2010).
---------------------------------------------------------------------------
After receiving the results of the White House's review of the
December 25 attempted attack, the President called for members of the
intelligence community to undertake a number of corrective actions--
such as clarifying intelligence agency roles, responsibilities, and
accountabilities to document, share, and analyze all sources of
intelligence and threat threads related to terrorism, and accelerating
information technology enhancements that will help with information
correlation and analysis. The House Committee on Oversight and
Government Reform has asked us, among other things, to assess
Government efforts to revise the watch list process, including actions
taken related to the December 25 attempted attack.
As part of our monitoring of high-risk issues, we also have on-
going work--at the request of the Senate Committee on Homeland Security
and Governmental Affairs--that is assessing agency efforts to create
the Information Sharing Environment, which is intended to break down
barriers to sharing terrorism-related information, especially across
Federal agencies.\15\ Our work is designed to help ensure that Federal
agencies have a road map that defines roles, responsibilities, actions,
and time frames for removing barriers, as well as a system to hold
agencies accountable to the Congress and the public for making progress
on these efforts. Among other things, this road map can be helpful in
removing cultural, technological, and other barriers that lead to
agencies maintaining information in stove-piped systems so that it is
not easily accessible, similar to those problems that the December 25
attempted attack exposed. We expect to issue the results of this work
later this year.
---------------------------------------------------------------------------
\15\ The Intelligence Reform and Terrorism Prevention Act of 2004,
as amended, defines the Information Sharing Environment as ``an
approach that facilitates the sharing of terrorism and homeland
security information, which may include any method determined necessary
and appropriate for carrying out [section 1016].'' See Pub. L. No. 108-
458, 1016(a)(2), 118 Stat. 3638, 3665 (codified as amended at 6
U.S.C. 485(a)(3)). See also Homeland Security Act of 2002, 6 U.S.C.
482 (requiring the establishment of procedures for the sharing of
homeland security information, as defined by this section).
---------------------------------------------------------------------------
By Not Placing Mr. Abdulmutallab on the Consolidated Watch List or Its
Subsets, the Government Missed Opportunities to Use These
Counterterrorism Tools
Following the December 25 attempted terrorist attack, questions
were raised as to what could have happened if Mr. Abdulmutallab had
been on TSC's consolidated terrorist screening database. We created
several scenarios to help explain how the watch list process is
intended to work and what opportunities agencies could have had to
identify him if he was on the watch list. For example, according to
TSC, if a record from the terrorist screening database is sent to the
State Department's system and the individual in that record holds a
valid visa, TSC would compare the identifying information in the watch
list record against identifying information in the visa and forward
positive matches to the State Department for possible visa revocation.
If an individual's visa is revoked, under existing procedures, this
information is to be entered into the database CBP uses to screen
airline passengers prior to their boarding, which we describe below.
According to CBP, when the individual checks in for a flight, the on-
site CBP Immigration Advisory Program officers already would have been
apprised of the visa revocation by CBP and they would have checked the
person's travel documents to verify that the individual was a match to
the visa revocation record. Once the positive match was established,
the officers would have recommended that he not be allowed to board the
flight.
Under another scenario, if an individual is on TSC's terrorist
screening database, existing processes provide CBP with the opportunity
to identify the subject of a watch list record as part of the checks
CBP is to conduct to see if airline passengers are eligible to be
admitted into the country. Specifically, for international flights
departing to or from the United States (but not for domestic flights),
CBP is to receive information on passengers obtained, for example, when
their travel document is swiped. CBP is to check this passenger
information against a number of databases to see if there are any
persons who have immigration violations, criminal histories, or any
other reason for being denied entry to the country, in accordance with
the agency's mission. According to CBP, when it identifies a U.S.-bound
passenger who is on the watch list, it coordinates with other Federal
agencies to evaluate the totality of available information to see what
action is appropriate. In foreign airports where there is a CBP
Immigration Advisory Program presence, the information on a watchlisted
subject is forwarded by CBP to program officers on-site. The officers
would then intercept the subject prior to boarding the aircraft and
confirm that the individual is watchlisted, and when appropriate based
on the derogatory information, request that the passenger be denied
boarding.
In a third scenario, if an individual is on the watch list and is
also placed on the No-Fly or Selectee list, when the person checks in
for a flight, the individual's identifying information is to be checked
against these lists. Individuals matched to the No-Fly list are to be
denied boarding. If the individual is matched to the Selectee list, the
person is to be subject to further screening, which could include
physical screening, such as a pat-down. The criteria in general that
are used to place someone on either of these two lists include the
following:
Persons who are deemed to be a threat to civil aviation or
National security and should be precluded from boarding an
aircraft are put on the No-Fly list.
Persons who are deemed to be a threat to civil aviation or
National security but do not meet the criteria of the No-Fly
list are placed on the Selectee list and are to receive
additional security screening prior to being permitted to board
an aircraft.\16\
---------------------------------------------------------------------------
\16\ Of all of the screening databases that accept watch list
records, only the No-Fly and Selectee lists require certain nomination
criteria or inclusion standards that are narrower than the ``known or
appropriately suspected'' standard of HSPD-6. The most recent guidance
related to the No-Fly and Selectee list criteria was issued in February
2009.
---------------------------------------------------------------------------
The White House Homeland Security Council devised these more
stringent sets of criteria for the No-Fly and Selectee lists in part
because these lists are not intended as investigative or information-
gathering tools or tracking mechanisms, and TSA is a screening but not
an intelligence agency.\17\ Rather, the lists are intended to help
ensure the safe transport of passengers and facilitate the flow of
commerce. However, the White House's review of the December 25
attempted terrorist attack raised questions about the effectiveness of
the criteria, and the President tasked the FBI and TSC with developing
recommendations for any needed changes to the nominations guidance and
criteria.
---------------------------------------------------------------------------
\17\ The Homeland Security Council originally was established in
2001 by Executive Order and subsequently codified into law by the
Homeland Security Act of 2002 for the purpose of more effectively
coordinating the policies and functions of the Federal Government
relating to homeland security. See Exec. Order No. 13,228; Pub. L. No.
107-296, tit. IX, 116 Stat. 2135, 2258-59 (codified at 6 U.S.C. 491-
496). On May 26, 2009, the President announced the full integration of
White House staff supporting National security and homeland security
into a new ``National Security Staff'' supporting all White House
policy-making activities relating to international, transnational, and
homeland security matters. The Homeland Security Council was maintained
as the principle venue for interagency deliberations on issues that
affect the security of the homeland, such as terrorism, weapons of mass
destruction, natural disasters, and pandemic influenza.
---------------------------------------------------------------------------
Weighing and responding to the potential impacts that changes to
the nominations guidance and criteria could have on the traveling
public and the airlines will be important considerations in developing
such recommendations. In September 2006, we reported that tens of
thousands of individuals who had similar names to persons on the watch
list were being misidentified and subjected to additional screening,
and in some cases delayed so long as to miss their flights.\18\ We also
reported that resolving these misidentifications can take time and,
therefore, affect air carriers and commerce. If changes in criteria
result in more individuals being added to the lists, this could also
increase the number of individuals who are misidentified, exacerbating
these negative effects. In addition, we explained that individuals who
believe that they have been inappropriately matched to the watch list
can petition the Government for action and the relevant agencies must
conduct research and work to resolve these issues. If more people are
misidentified, more people may trigger this redress process, increasing
the need for resources. Finally, any changes to the criteria or process
would have to ensure that watch list records are used in a manner that
safeguards legal rights, including freedoms, civil liberties, and
information privacy guaranteed by Federal law.
---------------------------------------------------------------------------
\18\ GAO-06-1031.
---------------------------------------------------------------------------
Agencies Do Not Screen Individuals Against All Records in the Watch
List, Which Creates Potential Security Vulnerabilities; GAO
Continues to Recommend That Agencies Assess and Address These
Gaps
In reacting to the December 25 attempted terrorist attack,
determining whether there were potential vulnerabilities related to the
use of watch list records when screening--not only individuals who fly
into the country but also, for example, those who cross land borders--
are important considerations. Screening agencies whose missions most
frequently and directly involve interactions with travelers generally
do not check against all records in the consolidated terrorist watch
list. In our October 2007 report, we noted that this is because
screening against certain records may not be needed to support a
respective agency's mission or may not be possible because of computer
system limitations, among other things.\19\
---------------------------------------------------------------------------
\19\ GAO-08-110.
---------------------------------------------------------------------------
For example, CBP's mission is to determine if any traveler is
eligible to enter the country or is to be denied entry because of
immigration or criminal violations. As such, CBP's computer system
accepts all records from the consolidated watch list database that have
either a first name or a last name and one other identifier, such as a
date of birth. Therefore, TSC sends CBP the greatest number of records
from the consolidated watch list database for its screening. In
contrast, one of the State Department's missions is to approve requests
for visas. Since only non-U.S. citizens and nonlawful permanent
residents apply for visas, TSC does not send the department records on
citizens or lawful permanent residents for screening visa applicants.
Also, the FBI database that State and local law enforcement
agencies use for their missions in checking individuals for criminal
histories, for example, also receives a smaller portion of the watch
list. According to the FBI, its computer system requires a full first
name, last name, and other identifier, typically a date of birth. The
FBI noted that this is because having these identifiers helps to reduce
the number of times an individual is misidentified as being someone on
the list, and the computer system would not be effective in making
matches without this information. Finally, the No-Fly and Selectee
lists collectively contain the lowest percentage of watch list records
because the remaining ones either do not meet the nominating criteria,
as described above, or do not meet system requirements--that is,
include full names and dates of birth, which TSA stated are required to
minimize misidentifications.
TSA is implementing a new screening program that the agency states
will have the capability to screen an individual against the entire
watch list.\20\ Under this program, called Secure Flight, TSA will
assume from air carriers the responsibility of comparing passenger
information against the No-Fly and Selectee lists.\21\ According to the
program's final rule, in general, Secure Flight is to compare passenger
information only to the No-Fly and Selectee lists.\22\ The
supplementary information accompanying the rule notes that this will be
satisfactory to counter the security threat during normal security
circumstances. However, the rule provides that TSA may use the larger
set of watch list records when warranted by security considerations,
such as if TSA learns that flights on a particular route may pose
increased risks. TSA emphasized that use of the full terrorist
screening database is not routine. Rather, TSA noted that its use is
limited to circumstances in which there is information concerning an
increased risk to transportation security, and the decision to use the
full watch list database will be based on circumstances at the time.
According to TSA, as of January 2010, the agency was developing
administrative procedures for utilizing the full watch list when
warranted.
---------------------------------------------------------------------------
\20\ GAO-09-292.
\21\ Pub. L. No. 108-458, 4012(a), 118 Stat. 3638, 3714-15
(codified at 49 U.S.C. 44903(j)(2)(C)).
\22\ See 73 Fed. Reg. 64,018 (Oct. 28, 2008) (codified at 49 C.F.R.
pt. 1560).
---------------------------------------------------------------------------
In late January 2009, TSA began to assume from airlines the watch
list matching function for a limited number of domestic flights, and
has since phased in additional flights and airlines. TSA expects to
assume the watch list matching function for all domestic and
international flights departing to and from the United States by
December 2010. It is important to note that under the Secure Flight
program, TSA requires airlines to provide the agency with each
passenger's full name and date of birth to facilitate the watch list
matching process, which should reduce the number of individuals who are
misidentified as the subject of a watch list record. We continue to
monitor the Secure Flight program at the Congress's request.
In our October 2007 watch list report, we recommended that the FBI
and DHS assess the extent to which security risks exist by not
screening against certain watch list records and what actions, if any,
should be taken in response.\23\ The agencies generally agreed with our
recommendations but noted that the risks related to not screening
against all watch list records needs to be balanced with the impact of
screening against all records, especially those records without a full
name and other identifiers. For example, more individuals could be
misidentified, law enforcement would be put in the position of
detaining more individuals until their identities could be resolved,
and administrative costs could increase, without knowing what
measurable increase in security is achieved. While we acknowledge these
tradeoffs and potential impacts, we maintain that assessing whether
vulnerabilities exist by not screening against all watch list records--
and if there are ways to limit impacts--is critical and could be a
relevant component of the Government's on-going review of the watch
list process. Therefore, we believe that our recommendation continues
to have merit.
---------------------------------------------------------------------------
\23\ GAO-08-110.
---------------------------------------------------------------------------
Identifying Additional Screening Opportunities and Determining Whether
There Are Clear Lines of Authority for and Accountability Over
the Watch List Process Would Help Ensure Its Effective Use
As we reported in October 2007, the Federal Government has made
progress in using the consolidated terrorist watch list for screening
purposes, but has additional opportunities to use the list. For
example, DHS uses the list to screen employees in some critical
infrastructure components of the private sector, including certain
individuals who have access to vital areas of nuclear power plants or
transport hazardous materials. However, many critical infrastructure
components are not using watch list records, and DHS has not finalized
guidelines to support such private sector screening, as HSPD-6 mandated
and we previously recommended.\24\
---------------------------------------------------------------------------
\24\ The identification of critical infrastructure components that
are not using watch list records for screening is considered Sensitive
Security Information that cannot be disclosed in a public statement.
---------------------------------------------------------------------------
In that same report, we noted that HSPD-11 tasked the Secretary of
Homeland Security with coordinating across other Federal departments to
develop: (1) A strategy for a comprehensive and coordinated
watchlisting and screening approach and (2) a prioritized
implementation and investment plan that describes the scope,
governance, principles, outcomes, milestones, training objectives,
metrics, costs, and schedule of necessary activities.\25\ We reported
that without such a strategy, the Government could not provide
accountability and a basis for monitoring to ensure that: (1) The
intended goals for, and expected results of, terrorist screening are
being achieved and (2) use of the watch list is consistent with privacy
and civil liberties. We recommended that DHS develop a current
interagency strategy and related plans.
---------------------------------------------------------------------------
\25\ The White House, Homeland Security Presidential Directive/
HSPD-11, Subject: Comprehensive Terrorist-Related Screening Procedures
(Washington, DC, Aug. 27, 2004).
---------------------------------------------------------------------------
According to DHS's Screening Coordination Office, during the fall
of 2007, the office led an interagency effort to provide the President
with an updated report, entitled, HSPD-11, An Updated Strategy for
Comprehensive Terrorist-Related Screening Procedures.\26\ The office
noted that the report was formally submitted to the Executive Office of
the President through the Homeland Security Council and reviewed by the
President on January 25, 2008. Further, the office noted that it also
provided a sensitive version of the report to the Congress in October
2008. DHS provided us an excerpt of that report to review, stating that
it did not have the authority to share excerpts provided by other
agencies, and we were unable to obtain a copy of the full report. The
information we reviewed only discussed DHS's own efforts for
coordinating watch list screening across the Department. Therefore, we
were not able to determine whether the HSPD-11 report submitted to the
President addressed all of the components called for in the directive
or what action, if any, was taken as a result. We maintain that a
comprehensive strategy, as well as related implementation and
investment plans, as called for by HSPD-11, continue to be important to
ensure effective Government-wide use of the watch list process.
---------------------------------------------------------------------------
\26\ DHS established the Screening Coordination Office in July 2006
to enhance security measures by integrating the Department's terrorist-
and immigration-related screening efforts, creating unified screening
standards and policies, and developing a single redress process for
travelers.
---------------------------------------------------------------------------
In addition, in our October 2007 report, we noted that establishing
an effective governance structure as part of this strategic approach is
particularly vital since numerous agencies and components are involved
in the development, maintenance, and use of the watch list process,
both within and outside of the Federal Government. Also, establishing a
governance structure with clearly-defined responsibility and authority
would help to ensure that agency efforts are coordinated, and that the
Federal Government has the means to monitor and analyze the outcomes of
such efforts and to address common problems efficiently and
effectively. We determined at the time that no such structure was in
place and that no existing entity clearly had the requisite authority
for addressing interagency issues. We recommended that the Homeland
Security Council ensure that a governance structure was in place, but
the council did not comment on our recommendation.
At the time of our report, TSC stated that it had a governance
board in place, comprised of senior-level agency representatives from
numerous departments and agencies. However, we also noted that the
board provided guidance concerning issues within TSC's mission and
authority. We also stated that while this governance board could be
suited to assume more of a leadership role, its authority at that time
was limited to TSC-specific issues, and it would need additional
authority to provide effective coordination of terrorist-related
screening activities and interagency issues Government-wide. In January
2010, the FBI stated that TSC has a Policy Board in place, with
representatives from relevant departments and agencies, that reviews
and provides input to the Government's watch list policy. The FBI also
stated that the policies developed are then sent to the National
Security Council Deputies Committee (formerly the Homeland Security
Council) for ratification. The FBI noted that this process was used for
making the most recent additions and changes to watch list standards
and criteria. We have not yet been able to determine, however, whether
the Policy Board has the jurisdiction and authority to resolve issues
beyond TSC's purview, such as issues within the intelligence community
and in regard to the nominations process, similar to the types of
interagency issues the December 25 attempted attack identified. We
maintain that a governance structure with the authority for and
accountability over the entire watch list process, from nominations
through screening, and across the Government is important.
On January 7, 2010, the President tasked the National Security
Staff with initiating an interagency review of the watch list process--
including the business processes, procedures, and criteria--and the
interoperability and sufficiency of supporting information technology
systems. This review offers the Government an opportunity to develop an
updated strategy, related plans, and governance structure that would
provide accountability to the administration, the Congress, and the
American public that the watch list process is effective at helping to
secure the homeland.
recent work highlights the importance of conducting vulnerability
assessments and operational testing prior to deployment of new
checkpoint technologies
While TSA Has Not Yet Deployed Any New Checkpoint Technologies
Nationwide, It Plans to Have Installed Almost 200 AITs by the
End of 2010
As we reported in October 2009, in an effort to improve the
capability to detect explosives at aviation passenger checkpoints, TSA
has 10 passenger screening technologies in various phases of research,
development, procurement, and deployment, including the AIT (formerly
Whole Body Imager).\27\ TSA is evaluating the AIT as an improvement
over current screening capabilities of the metal detector and pat-downs
specifically to identify nonmetallic threat objects and liquids. The
AITs produce an image of a passenger's body that a screener interprets.
The image identifies objects, or anomalies, on the outside of the
physical body but does not reveal items beneath the surface of the
skin, such as implants. TSA plans to procure two types of AIT units:
One type uses millimeter wave and the other type uses backscatter X-ray
technology. Millimeter wave technology beams millimeter wave radio
frequency energy over the body's surface at high speed from two
antennas simultaneously as they rotate around the body.\28\ The energy
reflected back from the body or other objects on the body is used to
construct a three-dimensional image. Millimeter wave technology
produces an image that resembles a fuzzy photo negative. Backscatter X-
ray technology uses a low-level X-ray to create a two-sided image of
the person. Backscatter technology produces an image that resembles a
chalk etching.\29\
---------------------------------------------------------------------------
\27\ GAO-10-128.
\28\ According to TSA, this description of the millimeter wave
technology applies only to the machine manufactured by L3 and does not
apply to other millimeter wave technologies that TSA is evaluating,
such as the Smiths millimeter wave AIT.
\29\ Research and development of the AIT technology is continuing,
specifically, to develop passive terahertz (THz) and active gigahertz
(GHz) technologies to improve detection performance and reduce
operational costs of commercially available systems.
---------------------------------------------------------------------------
As we reported in October 2009, TSA has not yet deployed any new
technologies Nation-wide. However, as of December 31, 2009, according
to a senior TSA official, the agency has deployed 40 of the millimeter
wave AITs, and has procured 150 backscatter X-ray units in fiscal year
2009 and estimates that these units will be installed at airports by
the end of calendar year 2010. In addition, TSA plans to procure an
additional 300 AIT units in fiscal year 2010, some of which will be
purchased with funds from the American Recovery and Reinvestment Act of
2009.\30\ TSA plans to procure and deploy a total of 878 units at all
category X through category IV airports.\31\ Full operating capability
is expected in fiscal year 2014. TSA officials stated that the cost of
the AIT is about $130,000 to $170,000 per unit, excluding installation
costs. In addition, the estimated training costs are $50,000 per unit.
---------------------------------------------------------------------------
\30\ According to TSA, some of the 300 AIT units to be procured in
fiscal year 2010 will begin to be deployed to airports in the latter
half of fiscal year 2010.
\31\ TSA classifies the commercial airports in the United States
into one of five security risk categories (X, I, II, III, and IV). In
general, category X airports have the largest number of passenger
boardings, and category IV airports have the smallest. Categories X, I,
II, and III airports account for more than 90 percent of the Nation's
air traffic.
---------------------------------------------------------------------------
While TSA stated that the AIT will enhance its explosives detection
capability, because the AIT presents a full body image of a person
during the screening process, concerns have been expressed that the
image is an invasion of privacy. According to TSA, to protect passenger
privacy and ensure anonymity, strict privacy safeguards are built into
the procedures for use of the AIT. For example, the officer who assists
the passenger never sees the image that the technology produces, and
the officer who views the image is remotely located in a secure
resolution room and never sees the passenger. Officers evaluating
images are not permitted to take cameras, cell phones, or photo-enabled
devices into the resolution room. To further protect passengers'
privacy, ways have been introduced to blur the passengers' images. The
millimeter wave technology blurs all facial features, and the
backscatter X-ray technology has an algorithm applied to the entire
image to protect privacy. Further, TSA has stated that the AIT's
capability to store, print, transmit, or save the image will be
disabled at the factory before the machines are delivered to airports,
and each image is automatically deleted from the system after it is
cleared by the remotely located security officer. Once the remotely
located officer determines that threat items are not present, that
officer communicates wirelessly to the officer assisting the passenger.
The passenger may then continue through the security process. Potential
threat items are resolved through a direct physical pat-down before the
passenger is cleared to enter the sterile area.\32\ In addition to
privacy concerns, the AITs are large machines, and adding them to the
checkpoint areas will require additional space, especially since the
operators are segregated from the checkpoint to help ensure passenger
privacy.
---------------------------------------------------------------------------
\32\ TSA stated that it continues to evaluate possible display
options that include a ``stick figure'' or ``cartoonlike'' form to
provide greater privacy protection to the individual being screened
while still allowing the unit operator or automated detection
algorithms to detect possible threats.
---------------------------------------------------------------------------
TSA Reports That It Is Taking Steps to Operationally Test AITs but Has
Not Conducted Vulnerability Assessments
We previously reported on several challenges TSA faces related to
the research, development, and deployment of passenger checkpoint
screening technologies and made a number of recommendations to improve
this process.\33\ Two of these recommendations are particularly
relevant today, as TSA moves forward with plans to install a total of
878 additional AITs--completing operational testing of technologies in
airports prior to using them in day-to-day operations and assessing
whether technologies such as the AIT are vulnerable to terrorist
countermeasures, such as hiding threat items on various parts of the
body to evade detection.
---------------------------------------------------------------------------
\33\ GAO-10-128.
---------------------------------------------------------------------------
First, in October 2009, we reported that TSA had relied on
technologies in day-to-day airport operations that had not been proven
to meet their functional requirements through operational testing and
evaluation, contrary to TSA's acquisition guidance and a knowledge-
based acquisition approach. We also reported that TSA had not
operationally tested the AITs at the time of our review, and we
recommended that TSA operationally test and evaluate technologies prior
to deploying them.\34\ In commenting on our report, TSA agreed with
this recommendation. A senior TSA official stated that although TSA
does not yet have a written policy requiring operational testing prior
to deployment, TSA is now including in its contracts with vendors that
checkpoint screening machines are required to successfully complete
laboratory tests as well as operational tests. The test results are
then incorporated in the source selection plan. The official also
stated that the test results are now required at key decision points by
DHS's Investment Review Board. While recently providing GAO with
updated information to our October 2009 report, TSA stated that
operational testing for the AIT was completed as of the end of calendar
year 2009. We are in the process of verifying that TSA has tested all
of the AIT's functional requirements in an operational environment.
---------------------------------------------------------------------------
\34\ Operational testing refers to testing in an operational
environment in order to verify that new systems are operationally
effective, supportable, and suitable.
---------------------------------------------------------------------------
Deploying technologies that have not successfully completed
operational testing and evaluation can lead to cost overruns and
underperformance. TSA's procurement guidance provides that testing
should be conducted in an operational environment to validate that the
system meets all functional requirements before deployment. In
addition, our reviews have shown that leading commercial firms follow a
knowledge-based approach to major acquisitions and do not proceed with
large investments unless the product's design demonstrates its ability
to meet functional requirements and be stable.\35\ The developer must
show that the product can be manufactured within cost, schedule, and
quality targets and is reliable before production begins and the system
is used in day-to-day operations.
---------------------------------------------------------------------------
\35\ GAO, Best Practices: Using a Knowledge-Based Approach to
Improve Weapon Acquisition, GAO-04-386SP (Washington, DC: January
2004).
---------------------------------------------------------------------------
TSA's experience with the ETPs, which the agency uses for secondary
screening, demonstrates the importance of testing and evaluation in an
operational environment. The ETP detects traces of explosives on a
passenger by using puffs of air to dislodge particles from the
passenger's body and clothing that the machine analyzes for traces of
explosives. TSA procured 207 ETPs and in 2006 deployed 101 ETPs to 36
airports, the first deployment of a checkpoint technology initiated by
the agency.\36\ TSA deployed the ETPs even though agency officials were
aware that tests conducted during 2004 and 2005 on earlier ETP models
suggested that they did not demonstrate reliable performance.
Furthermore, the ETP models that were subsequently deployed were not
first tested to prove their effective performance in an operational
environment, contrary to TSA's acquisition guidance, which recommends
such testing. As a result, TSA procured and deployed ETPs without
assurance that they would perform as intended in an operational
environment. TSA officials stated that they deployed the machines
without resolving these issues to respond quickly to the threat of
suicide bombers. In June 2006, TSA halted further deployment of the ETP
because of performance, maintenance, and installation issues. According
to a senior TSA official, as of December 31, 2009, all but 9 ETPs have
been withdrawn from airports and 18 ETPs remain in inventory. TSA
estimates that the 9 remaining ETPs will be removed from airports by
the end of calendar year 2010. In the future, using validated
technologies would enhance TSA's efforts to improve checkpoint
security. Furthermore, retaining existing screening procedures until
the effectiveness of future technologies has been validated could
provide assurances that use of checkpoint technologies improves
aviation security.
---------------------------------------------------------------------------
\36\ TSA deployed the ETPs from January to June 2006. Since June
2006, TSA removed all but 9 ETPs from airports because of maintenance
issues.
---------------------------------------------------------------------------
Second, as we reported in October 2009, TSA does not know whether
its explosives detection technologies, such as the AITs, are
susceptible to terrorist tactics. Although TSA has obtained information
on vulnerabilities at the screening checkpoint, the agency has not
assessed vulnerabilities--that is, weaknesses in the system that
terrorists could exploit in order to carry out an attack--related to
passenger screening technologies, such as AITs, that are currently
deployed. According to TSA's threat assessment, terrorists have various
techniques for concealing explosives on their persons, as was evident
in Mr. Abdulmutallab's attempted attack on December 25, where he
concealed an explosive in his underwear. However, TSA has not assessed
whether these and other tactics that terrorists could use to evade
detection by screening technologies, such as AIT, increase the
likelihood that the screening equipment would not detect the hidden
weapons or explosives. Thus, without an assessment of the
vulnerabilities of checkpoint technologies, it is unclear whether the
AIT or other technologies would have been able to detect the weapon Mr.
Abdulmutallab used in his attempted attack. TSA is in the process of
developing a risk assessment for the airport checkpoints, but the
agency has not yet completed this effort or clarified the extent to
which this effort addresses any specific vulnerabilities in checkpoint
technology.
TSA officials stated that to identify vulnerabilities at airport
checkpoints, the agency analyzes information such as the results from
its covert testing program. TSA conducts National and local covert
tests, whereby individuals attempt to enter the secure area of an
airport through the passenger checkpoint with prohibited items in their
carry-on bags or hidden on their persons. However, TSA's covert testing
programs do not systematically test passenger and baggage screening
technologies Nation-wide to ensure that they identify the threat
objects and materials the technologies are designed to detect, nor do
the covert testing programs identify vulnerabilities related to these
technologies. We reported in August 2008 that while TSA's local covert
testing program attempts to identify test failures that may be caused
by screening equipment not working properly or caused by screeners and
the screening procedures they follow, the agency's National testing
program does not attribute a specific cause of a test failure.\37\ We
recommended, among other things, that TSA require the documentation of
specific causes of all National covert testing failures, including
documenting failures related to equipment, in the covert testing
database to help TSA better identify areas for improvement. TSA
concurred with this recommendation and stated that the agency will
expand the covert testing database to document test failures related to
screening equipment.
---------------------------------------------------------------------------
\37\ See GAO, Transportation Security: TSA Has Developed a Risk-
Based Covert Testing Program, but Could Better Mitigate Aviation
Security Vulnerabilities Identified Through Covert Tests, GAO-08-958
(Washington, DC: Aug. 8, 2008).
---------------------------------------------------------------------------
In our 2009 report, we also recommended that the Assistant
Secretary for TSA, among other actions, conduct a complete risk
assessment--including threat, vulnerability, and consequence
assessment--for the passenger screening program and incorporate the
results into TSA's program strategy, as appropriate. TSA and DHS
concurred with our recommendation, but have not completed these risk
assessments or provided documentation to show how they have addressed
the concerns raised in our 2009 report regarding the susceptibility of
the technology to terrorist tactics.
Mr. Chairman, this concludes our statement for the record.
______
Statement of the American Civil Liberties Union
January 27, 2010
Chairman Thompson, Ranking Member King, and Members of the
committee: The American Civil Liberties Union (ACLU) has more than half
a million members, countless additional activists and supporters, and
53 affiliates Nation-wide. We are one of the Nation's oldest and
largest organizations advocating in support of individual rights in the
courts and before the Executive and Legislative branches of Government.
In particular, throughout our history, we have been one of the Nation's
pre-eminent advocates in support of privacy and equality. We write
today to express our strong concern over the three substantive policy
changes that are being considered in the wake of the attempted terror
attack on Christmas day: the wider deployment of whole body imaging
(WBI) devices, the expanded use of terror watch lists and increased
screening of individuals from fourteen so-called nations of interest.
The ACLU believes that each of these changes greatly infringe on civil
liberties and face serious questions regarding their efficacy in
protecting airline travelers.
The President has already identified a failure of intelligence as
the chief cause of the inability to detect the attempted terror attack
on Christmas day. As such, the Government's response must be directed
to that end. These invasive and unjust airline security techniques
represent a dangerous diversion of resources from the real problem.
This diversion of resources promises serious harm to American's privacy
and civil liberties while failing to deliver significant safety
improvements.
i. introduction
WBI uses millimeter wave or X-ray technology to produce graphic
images of passengers' bodies, essentially taking a naked picture of air
passengers as they pass through security checkpoints. This technology
is currently deployed at 19 airports and the Department of Homeland
Security (DHS) recently announced the roll-out of 300 more machines by
year end.\1\ While initially described as a secondary screening
mechanism, DHS is now stating that WBI will be used for primary
screening of passengers.\2\
---------------------------------------------------------------------------
\1\ Harriet Baskas, Air security: Protection at privacy's expense?
Msnbc.com, January 14, 2010. http://www.msnbc.msn.com/id/34846903/ns/
travel-tips/.
\2\ Paul Giblin and Eric Lipton, New Airport X-Rays Scan Bodies,
Not Just Bags, New York Times, February 24, 2007.
---------------------------------------------------------------------------
Another way of screening passengers is through terror watch lists.
The terror watch lists are a series of lists of names of individuals
suspected of planning or executing terrorist attacks. The master list
is maintained by the Terrorist Screening Center (TSC) and contains more
than one million names.\3\ Subsets of this list include the No-Fly list
(barring individuals from air travel) and the Automatic Selectee list
(requiring a secondary screening). The names on this list and the
criteria for placement on these lists are secret.\4\ There is no
process allowing individuals to challenge their placement on a list or
seek removal from a list.
---------------------------------------------------------------------------
\3\ The Federal Bureau of Investigation's Terrorist Watchlist
Nomination Practices, Justice Department, Office of the Inspector
General, Audit Report 09-25, May 2009, pg 3. http://www.justice.gov/
oig/reports/FBI/a0925/final.pdf.
\4\ Id at 70.
---------------------------------------------------------------------------
Finally, individuals who were born in, are citizens of, or are
traveling from fourteen nations will receive additional scrutiny under
a policy announced by the U.S. Government after the attempted terror
attack. As of January 19, 2010 these nations are Afghanistan, Algeria,
Cuba, Iran, Lebanon, Libya, Iraq, Nigeria, Pakistan, Saudi Arabia,
Somalia, Sudan, Syria and Yemen.
The ACLU believes that Congress should apply the following two
principles in evaluating any airline security measure:
Efficacy. New security technologies must be genuinely
effective, rather than creating a false sense of security. The
wisdom supporting this principle is obvious: Funds to increase
aviation security are limited, and any technique or technology
must work and be substantially better than other alternatives
to deserve some of the limited funds available. It therefore
follows that before Congress invests in technologies or employs
new screening methods, it must demand evidence and testing from
neutral parties that these techniques have a likelihood of
success.
Impact on Civil Liberties. The degree to which a proposed
measure invades privacy should be weighed in the evaluation of
any technology. If there are multiple effective techniques for
safeguarding air travel, the least intrusive technology or
technique should always trump the more invasive technology.
ii. screening techniques and technologies must be effective, or they
should not be utilized or funded
The wider deployment of whole body imaging (WBI) devices, expanded
use of terror watch lists and increased screening of individuals from
fourteen so-called nations of interest each face significant questions
regarding their efficacy in protecting air travelers and combating
terrorism.
Whole Body Imaging
There are no magic solutions or technologies for protecting air
travelers. Ben Wallace, a current member of the British parliament who
advised a research team at QinetiQ, a manufacturer of body screening
devices, has stated that their testing demonstrated that these
screening devices would not have discovered a bomb of the type used on
Christmas day, as they failed to detect low density materials like
powders, liquids and thin plastics.\5\ A current QinetiQ product
manager admitted that even their newest body scan technology probably
would not have detected the underwear bomb.\6\ The British press has
also reported that the British Department for Transport (DfT) and the
British Home Office have already tested the scanners and were not
convinced they would work comprehensively against terrorist threats to
aviation.\7\
---------------------------------------------------------------------------
\5\ Jane Merrick, Are planned airport scanners just a scam? The
Independent, January 3, 2010.
\6\ Id.
\7\ Id.
---------------------------------------------------------------------------
In addition we know that al-Qaeda has already discovered a way to
work around this technology. In September a suicide bomber stowed a
full pound of high explosives and a detonator inside his rectum, and
attempted to assassinate a Saudi prince by blowing himself up.\8\ While
the attack only slightly wounded the prince, it fully defeated an array
of security measures including metal detectors and palace security. The
bomber spent 30 hours in the close company of the prince's own secret
service agents--all without anyone suspecting a thing. WBI devices--
which do not penetrate the body--would not have detected this device.
---------------------------------------------------------------------------
\8\ Sheila MacVicar, Al Qaeda Bombers Learn from Drug Smugglers,
CBSnews.com, September 28, 2009
---------------------------------------------------------------------------
The practical obstacles to effective deployment of body scanners
are also considerable. In the United States alone, 43,000 TSA officers
staff numerous security gates at over 450 airports and over 2 million
passengers a day.\9\ To avoid being an ineffective ``Maginot line,''
these $170,000 machines will need to be put in place at all gates in
all airports; otherwise a terrorist could just use an airport gate that
does not have them. Scanner operators struggle constantly with boredom
and inattention when tasked with the monotonous job of scanning
thousands of harmless individuals when day after day, year after year,
no terrorists come through their gate. In addition to the expense of
buying, installing, and maintaining these machines, additional
personnel will have to be hired to run them (unless they are shifted
from other security functions, which will degrade those functions).
---------------------------------------------------------------------------
\9\ http://www.tsa.gov/what_we_do/screening/
security_checkpoints.shtm.
---------------------------------------------------------------------------
The efficacy of WBI devices must be weighed against not only their
impact on civil liberties (discussed further below) but also their
impact on the U.S. ability to implement other security measures. Every
dollar spent on these technologies is a dollar that is not spent on
intelligence analysis or other law enforcement activity. The President
has already acknowledged that it was deficiencies in those areas--not
aviation screening--that allowed Umar Farouk Abdulmutallab to board an
airplane.
Watch Lists
The events leading up to the attempted Christmas attack are a
telling indictment of the entire watch list system. In spite of damning
information, including the direct plea of Abdulmutallab's father, and
other intelligence gathered about terrorist activity in Yemen,
Abdulmutallab was not placed into the main Terrorist Screening
Database. We believe that fact can be directly attributed to the
bloated and overbroad nature of the list--now at more than a million
names.\10\ The size of the list creates numerous false positives,
wastes resources, and hides the real threats to aviation security. As
we discuss below it also sweeps up many innocent Americans--falsely
labeling them terrorists and providing them with no mechanism for
removing themselves from the list.
---------------------------------------------------------------------------
\10\ DOJ OIG Audit Report 09-25, pg 3. http://www.justice.gov/oig/
reports/FBI/a0925/final.pdf.
---------------------------------------------------------------------------
These problems are not hypothetical. They have real consequences
for law enforcement and safety. An April 2009 report from the Virginia
Fusion Center states
``According to 2008 Terrorism Screening Center ground encounter data,
al-Qa'ida was one of the three most frequently encountered groups in
Virginia. In 2007, at least 414 encounters between suspected al-Qa'ida
members and law enforcement or government officials were documented in
the Commonwealth. Although the vast majority of encounters involved
automatic database checks for air travel, a number of subjects were
encountered by law enforcement officers.''\11\
---------------------------------------------------------------------------
\11\ Virginia Fusion Center, 2009 Virginia Terrorism Threat
Assessment, March 2009, pg 27.
---------------------------------------------------------------------------
Every time a law enforcement officer encounters someone on the
terrorist watch list (as determined by a check of the National Crime
Information Center (NCIC) database) they contact the TSC. So in essence
Virginia law enforcement is reporting that there are more than 400 al-
Qaeda terrorists in Virginia in a given year. This is difficult to
believe.\12\ In reality most, if not all, of these stops are false
positives, mistakes regarding individuals who should not be on the
list. These false positives can only distract law enforcement from real
dangers.
---------------------------------------------------------------------------
\12\ The report does not state that any of these individuals were
arrested.
---------------------------------------------------------------------------
A 2009 report by the Department of Justice Inspector General found
similarly troubling results. From the summary:
``We found that the FBI failed to nominate many subjects in the
terrorism investigations that we sampled, did not nominate many others
in a timely fashion, and did not update or remove watch list records as
required. Specifically, in 32 of the 216 (15 percent) terrorism
investigations we reviewed, 35 subjects of these investigations were
not nominated to the consolidated terrorist watch list, contrary to FBI
policy. We also found that 78 percent of the initial watch list
nominations we reviewed were not processed in established FBI
timeframes.
``Additionally, in 67 percent of the cases that we reviewed in which a
watch list record modification was necessary, we determined that the
FBI case agent primarily assigned to the case failed to modify the
watch list record when new identifying information was obtained during
the course of the investigation, as required by FBI policy. Further, in
8 percent of the closed cases we reviewed, we found that the FBI failed
to remove subjects from the watch list as required by FBI policy.
Finally, in 72 percent of the closed cases reviewed, the FBI failed to
remove the subject in a timely manner.''\13\
---------------------------------------------------------------------------
\13\ DOJ OIG Audit Report 09-25, pg iv-v. http://www.justice.gov/
oig/reports/FBI/a0925/final.pdf.
This is only the latest in a long string of Government reports
describing the failure of the terror watch lists.\14\ In order to be an
effective tool against terrorism these lists must shrink dramatically
with names limited to only those for whom there is credible evidence of
terrorist ties or activities.
---------------------------------------------------------------------------
\14\ Review of the Terrorist Screening Center (Redacted for Public
Release), Justice Department, Office of the Inspector General, Audit
Report 05-27, June 2005; Review of the Terrorist Screening Center's
Efforts to Support the Secure Flight Program (Redacted for Public
Release), Justice Department, Office of the Inspector General, Audit
Report 05-34, August 2005; Follow-Up Audit of the Terrorist Screening
Center (Redacted for Public Release), Justice Department, Office of the
Inspector General, Audit Report 07-41, September 2007; The Federal
Bureau of Investigation's Terrorist Watchlist Nomination Practices,
Justice Department, Office of the Inspector General, Audit Report 09-
25, May 2009; DHS Challenges in Consolidating Terrorist Watch List
Information, Department of Homeland Security, Office of Inspector
General, OIG-04-31, August 2004; Terrorist Watch Lists Should Be
Consolidated to Promote Better Integration and Sharing, GAO Report to
Congressional Requesters, GAO-03-322, April 2003; Congressional Memo
Regarding Technical Flaws in the Terrorist Watch List, House Committee
on Science and Technology, August 2008.
---------------------------------------------------------------------------
Aviation Screening on the Basis of Nationality
Numerous security experts have already decried the use of race and
national origin as an aviation screening technique.
Noted security expert Bruce Schneier stated recently:
``[A]utomatic profiling based on name, nationality, method of ticket
purchase, and so on . . . makes us all less safe. The problem with
automatic profiling is that it doesn't work.
``Terrorists can figure out how to beat any profiling system.
``Terrorists don't fit a profile and cannot be plucked out of crowds by
computers. They're European, Asian, African, Hispanic, and Middle
Eastern, male and female, young and old. Umar Farouk Abdul Mutallab was
Nigerian. Richard Reid, the shoe bomber, was British with a Jamaican
father. Germaine Lindsay, one of the 7/7 London bombers, was Afro-
Caribbean. Dirty bomb suspect Jose Padilla was Hispanic-American. The
2002 Bali terrorists were Indonesian. Timothy McVeigh was a white
American. So was the Unabomber. The Chechen terrorists who blew up two
Russian planes in 2004 were female. Palestinian terrorists routinely
recruit ``clean'' suicide bombers, and have used unsuspecting
Westerners as bomb carriers.
``Without an accurate profile, the system can be statistically
demonstrated to be no more effective than random screening.
``And, even worse, profiling creates two paths through security: one
with less scrutiny and one with more. And once you do that, you invite
the terrorists to take the path with less scrutiny. That is, a
terrorist group can safely probe any profiling system and figure out
how to beat the profile. And once they do, they're going to get through
airport security with the minimum level of screening every time.''\15\
---------------------------------------------------------------------------
\15\ http://roomfordebate.blogs.nytimes.com/2010/01/04/will-
profiling-make-a-difference/.
Schneier is not alone in this assessment. Philip Baum is the
---------------------------------------------------------------------------
managing director of an aviation security company:
``Effective profiling is based on the analysis of the appearance and
behavior of a passenger and an inspection of the traveler's itinerary
and passport; it does not and should not be based on race, religion,
nationality or color of skin . . .
``Equally, the decision to focus on nationals of certain countries is
flawed and backward. Perhaps I, as a British citizen, should be
screened more intensely given that Richard Reid (a.k.a. ``the
Shoebomber'') was a U.K. passport holder and my guess is there are
plenty more radicalized Muslims carrying similar passports. Has America
forgotten the likes of Timothy McVeigh? It only takes one bad egg and
they exist in every country of the world.\16\
---------------------------------------------------------------------------
\16\ Id.
---------------------------------------------------------------------------
Former Israeli airport security director Rafi Ron:
``My experience at Ben Gurion Airport in Tel Aviv has led me to the
conclusion that racial profiling is not effective. The major attacks at
Ben Gurion Airport were carried out by Japanese terrorists in 1972 and
Germans in the 1980s. [They] did not belong to any expected ethnic
group. Richard Reid [known as the shoe bomber] did not fit a racial
profile. Professionally as well as legally, I oppose the idea of racial
profiling.''\17\
---------------------------------------------------------------------------
\17\ Katherine Walsh, Behavior Pattern Recognition and Why Racial
Profiling Doesn't Work, CSO Online, (Feb. 1, 2006), at http://
www.csoonline.com/article/220787/
Behavior_Pattern_Recognition_and_Why_Racial_Profiling_Doesn_t_Work.
This should be the end of the discussions. Policies that don't work
have no place in aviation security. When they are actively harmful--
wasting resources and making us less safe--they should be stopped as
quickly as possible.
iii. the impact on privacy and civil liberties must be weighed in any
assessment of aviation security techniques
Each of the three aviation security provisions discussed in these
remarks represents a direct attack on fundamental American values. As
such they raise serious civil liberties concerns.
Whole Body Imaging
WBI technology involves a striking and direct invasion of privacy.
It produces strikingly graphic images of passengers' bodies,
essentially taking a naked picture of air passengers as they pass
through security checkpoints. It is a virtual strip search that reveals
not only our private body parts, but also intimate medical details like
colostomy bags. Many people who wear adult diapers feel they will be
humiliated. That degree of examination amounts to a significant assault
on the essential dignity of passengers. Some people do not mind being
viewed naked but many do and they have a right to have their integrity
honored.
This technology should not be used as part of a routine screening
procedure, but only when the facts and circumstances suggest that it is
the most effective method for a particular individual. And such
technology may be used in place of an intrusive search, such as a strip
search--when there is reasonable suspicion sufficient to support such a
search.
TSA is also touting privacy safeguards including blurring of faces,
the non-retention of images, and the viewing of images only by
screeners in a separate room. Scanners with such protections are
certainly better than those without; however, we are still skeptical of
their suggested safeguards such as obscuring faces and not retaining
images.
Obscuring faces is just a software fix that can be undone as easily
as it is applied. And obscuring faces does not hide the fact that rest
of the body will be vividly displayed. A policy of not retaining images
is a protection that would certainly be a vital step for such a
potentially invasive system, but it is hard to see how this would be
achieved in practice. TSA would almost certainly have to create
exceptions--for collecting evidence of a crime or for evaluation of the
system (such as in the event of another attack) for example--and it is
a short step from there to these images appearing on the internet.
Intrusive technologies are often introduced very gingerly with all
manner of safeguards and protections, but once the technology is
accepted the protections are stripped away. There are substantial
reasons for skepticism regarding TSA promised protections for WBI
devices. In order for these protections to be credible Congress must
enshrine them in law.
Finally, the TSA should invest in developing other detection
systems that are less invasive, less costly, and less damaging to
privacy. For example, ``trace portal detection'' particle detectors
hold the promise of detecting explosives while posing little challenge
to flyers' privacy. A 2002 Homeland Security report urged the
``immediate deployment'' of relatively inexpensive explosive trace
detectors in European airports, as did a 2005 report to Congress, yet
according to a 2006 Associated Press article, these efforts ``were
frustrated inside Homeland Security by `bureaucratic games', a lack of
strategic goals and months-long delays in distributing money Congress
had already approved.''\18\ Bureaucratic delay and mismanagement should
not be allowed to thwart the development of more effective explosive
detection technologies that do not have the negative privacy impact of
WBI devices.
---------------------------------------------------------------------------
\18\ John Solomon, Bureaucracy Impedes Bomb Detection Work,
Washington Post, Aug. 12, 2006, at: http://www.washingtonpost.com/wp-
dyn/content/article/2006/08/12/AR2006081200269.html.
---------------------------------------------------------------------------
Watch Lists
The creation of terrorist watch lists--literally labeling
individuals as a terrorist--has enormous civil liberties impact. It
means on-going and repetitive harassment at all airports--foreign and
domestic, constant extra screening, searches and invasive questions.
For the many innocent individuals on the lists this is humiliating and
infuriating.
For some it is worse. Individuals on the No-Fly list are denied a
fundamental right, the right to travel and move about the country
freely. Others are threatened with the loss of their job. Erich
Sherfen, commercial airline pilot and Gulf War veteran, has been
threatened with termination from his job as a pilot because his name
appears on a Government watch list, which prevents him from entering
the cockpit.\19\ Sherfen is not the only innocent person placed on a
terror watch list. Other individuals who are either on a list or
mistaken for those on the list include a former Assistant Attorney
General, many individuals with the name Robert Johnson, the late
Senator Edward Kennedy and even Nelson Mandela.\20\
---------------------------------------------------------------------------
\19\ Jeanne Meserve, Name on government watch list threatens
pilot's career, CNN.com, August 22, 2008, http://www.cnn.com/2008/US/
08/22/pilot.watch.list/index.html?iref=newssearch.
\20\ For details on these individuals and many other please see:
http://www.aclu.org/technology-and-liberty/unlikelysuspects.
---------------------------------------------------------------------------
The most recent case--revealed just last week--is that of Mikey
Hicks, an 8-year-old boy who has been on the Selectee list seemingly
since birth. According to Hicks' family their travel tribulations that
began when Mikey was an infant. When he was 2 years old, the kid was
patted down at airport security. He's now, by all accounts, an
unassuming bespectacled Boy Scout who has been stopped every time he
flies with his family.\21\
---------------------------------------------------------------------------
\21\ Lizette Alvarez, Meet Mikey, 8: U.S. Has Him on Watch List,
New York Times, January 13, 2010.
---------------------------------------------------------------------------
In addition, to stops at the airport watch list information is also
placed in the National Criminal Information Center database. That means
law enforcement routinely run names against the watch lists for matters
as mundane as traffic stops. It's clear that innocent individuals may
be harassed even if they don't attempt to fly.
Nor is there any due process for removing individuals from the
list--there is simply no process for challenging the Government's
contention that you are a terrorist. Even people who are mistaken for
those on the list face challenges. A September 2009 report by the
Inspector General of the Department of Homeland Security found that the
process for clearing innocent travelers from the list is a complete
mess.\22\
---------------------------------------------------------------------------
\22\ Effectiveness of the Department of Homeland Security Traveler
Redress Inquiry Program, Department of Homeland Security, Office of the
Inspector General OIG 09-10, September 2009. http://www.dhs.gov/xoig/
assets/mgmtrpts/OIG-09-103r_Sep09.pdf.
---------------------------------------------------------------------------
In light of the significant and on-going harm to innocent Americans
as well as the harm to our National security caused by the diversion of
security resources these watch lists must be substantial reduced in
size and fundamental due process protections imposed. Innocent
travelers must be able to remove themselves from the list both for
their sake and the sake of National security.
Aviation Screening on the Basis of Nationality
This history of the civil rights movement in the 20th and 21st
Century is a long, compelling rejection of the idea that individuals
should be treated differently on the basis of their race or nation of
origin. Because of that, the administration's decision to subject the
citizens of fourteen nations flying to the United States to intensified
screening is deeply troubling. Long-standing constitutional principles
require that no administrative searches, either by technique or
technology, be applied in a discriminatory matter. The ACLU opposes the
categorical use of profiles based on race, religion, ethnicity, or
country of origin. This practice is nothing less than racial profiling.
Such profiling is ineffective and counter to American values.
But the harm that profiling on the basis of national origin does to
civil liberties is not an abstraction--it also has direct impact on
American security interests. These harmful policies have a direct
impact on the Muslim and Arab communities. The Senate Homeland Security
and Government Affairs committee has heard testimony from several
witnesses who cited the growth of Islamophobia and the polarization of
the Muslim community as risk factors that could raise the potential for
extremist violence.\23\ Unfairly focusing suspicion on a vulnerable
community tends to create the very alienation and danger that we need
to avoid.
---------------------------------------------------------------------------
\23\ See for example, Hearing of the Senate Homeland Security and
Governmental Affairs Committee, Violent Islamist Extremism: The
European Experience, (June 27, 2007), particularly the testimony of
Lidewijde Ongering and Marc Sageman, available at: http://
hsgac.senate.gov/public/
index.cfm?FuseAction=Hearings.Hearing&Hearing_ID=9c8ef805-75c8-48c2-
810dd778af31cca6.
---------------------------------------------------------------------------
Indeed a recent United Kingdom analysis based on hundreds of case
studies of individuals involved in terrorism reportedly identified
``facing marginalization and racism'' as a key vulnerability that could
tend to make an individual receptive to extremist ideology.\24\ The
conclusion supporting tolerance of diversity and protection of civil
liberties was echoed in a National Counterterrorism Center (NCTC) paper
published in August 2008. In exploring why there was less violent
homegrown extremism in the United States than the United Kingdom, the
authors cited the diversity of American communities and the greater
protection of civil rights as key factors.
---------------------------------------------------------------------------
\24\ National Counterterrorism Center Conference Report, Towards a
Domestic Counterradicalization Strategy, (August 2008)
---------------------------------------------------------------------------
At the January 7, 2009 White House briefing regarding the security
failures surrounding the Christmas attack, DHS Secretary Janet
Napolitano raised a question about ``counterradicalization.''\25\ She
asked, ``How do we communicate better American values and so forth, in
this country but also around the globe?'' Of course the Secretary
should know American values are communicated through U.S. Government
policies, which is why adopting openly discriminatory policies can be
so damaging and counterproductive to our National interests.
---------------------------------------------------------------------------
\25\ Briefing by Homeland Security Secretary Napolitano, Assistant
to the President for Counterterrorism and Homeland Security Brennan,
and Press Secretary Gibbs, 1/7/10, at: http://www.whitehouse.gov/the-
pressoffice/briefing-homeland-security-secretary-napolitano-assistant-
president-counterterroris[sic].
---------------------------------------------------------------------------
iv. conclusion
Ultimately security is never absolute and never will be. It is not
wise security policy to spend heavily to protect against one particular
type of plot, when the number of terrorist ideas that can be hatched--
not only against airlines, but also against other targets--is
limitless. The President has identified a failure ``connect the dots''
by intelligence analysts as the main reason that Umar Farouk
Abdulmutallab was able to board a flight to the United States.\26\ We
must not lose sight of that reality. Limited security dollars should be
invested where they will do the most good and have the best chance of
thwarting attacks. That means investing them in developing competent
intelligence and law enforcement agencies that will identify specific
individuals who represent a danger to air travel and arrest them or
deny them a visa.
---------------------------------------------------------------------------
\26\ Jake Tapper and Sunlen Miller, Obama: Intelligence Community
Failed to ``Connect the Dots'' in a ``Potentially Disastrous Way'',
ABCNews.com, January 05, 2010. http://blogs.abcnews.com/politicalpunch/
2010/01/obamaintelligence-community-failed-to-connect-the-dots-in-a-
potentially-disastrous-way.html.
---------------------------------------------------------------------------
Invasive screening mechanisms, enlarging already bloated watch
lists, targeting on the basis of national origin--none of these
approaches go to the heart of what went wrong on Christmas day. Instead
they are a dangerous sideshow--one that harms our civil liberties and
ultimately makes us less safe.
STATEMENT OF JANE HOLL LUTE, DEPUTY SECRETARY, DEPARTMENT OF
HOMELAND SECURITY
Ms. Lute. Good morning, Mr. Chairman, Ranking Member King,
Members of the committee. Thank you for this opportunity to
testify on the attempted attack on December 25.
Secretary Napolitano, Mr. Chairman, as you noted, was
scheduled to be out of the country. In view of that, although
her plans have changed, we have been in touch with your staff
that I would be here to testify for the Department.
As President Obama made clear immediately following the
attack, at the Department of Homeland Security and across the
Federal Government, we are determined to find and fix the
vulnerabilities that led to this breach.
Protecting the United States against terrorism calls upon
the expertise and authority of multiple agencies and many
partners. In addition to the men and women of the Department of
Homeland Security, this includes the efforts of the departments
of State, Defense, Justice, FBI, NCTC, and the broader
intelligence community. It also importantly includes our State
and local law enforcement agencies and our international
partners and allies around the world.
I am very pleased this morning to be joined by my
colleagues from the Department of State and the National
Counterterrorism Center.
As this committee is well aware of, Mr. Chairman, boarding
the plane means fulfilling three basic requirements. The
individual must retain proper documentation, including a
passport, visa, or other travel authorization, a ticket, and
boarding pass. He or she must pass through the checkpoint
screening to ensure that they are not concealing a dangerous
weapon or other dangerous material on their person or in their
baggage.
Finally, the individual must be cleared through a pre-
flight screening process that seeks to determine if that
individual poses a threat to the homeland security and thus
should be denied permission to fly.
Within this set of requirements, let me briefly describe
the specific role the Department of Homeland Security plays.
First, to conduct pre-flight screening, the Department is one
of the principal consumers of intelligence gathered by other
agencies, including the terrorist watch list, which includes
the No-Fly list. DHS checks passengers against these lists to
keep potential terrorists from boarding flights and to identify
travelers who should undergo additional screening.
Second, within the United States, DHS performs the physical
screening at domestic airport checkpoints and provides further
in-flight security measures in order to prevent smuggling of
weapons or other dangerous materials on airplanes.
Third, outside of the United States, the Department works
with foreign governments and airlines to advise them on the
required security measures for flights bound for the United
States and on which passengers may prove a threat. TSA nor any
other part of the Department, however, does not screen people
or baggage at international airports.
Let me say emphatically, as the President of the United
States has said and as the Secretary of Homeland Security has
said, that with regard to the attempted attack on December 25,
Omar Farouk Abdulmutallab should never have been allowed to
board a U.S.-bound airplane with explosives. As Secretary
Napolitano has detailed in recent weeks, DHS has implemented
numerous steps and is working closely with our Federal partners
to fix the vulnerabilities that led to the attempted attack.
As a consumer or a terrorist watch list information, the
Department works closely with the FBI, with the Office of the
Director of National Intelligence and NCTC to improve our
ability to connect and assimilate intelligence. We are also
taking steps to strengthen standards for international aviation
screening and bolstering international partnerships to guard
against a similar type of attack.
But to be clear, Abdulmutallab was not on the No-Fly list
and hence, did not come to our attention prior to his boarding
the flight in Amsterdam. His presence on this list would have
flagged him to be prevented from boarding. He was not either on
the Selectee list, which would have flagged him for secondary
screening. Furthermore, the physical screenings that were
performed by foreign authorities at the airports in Nigeria and
the Netherlands failed to detect the explosive on his person.
Immediately following the attempted attack, the Department
took steps to secure incoming and future flights. We directed
the FAA to alert all 128 flights inbound to the United States
from Europe of the situation. We increased security measures at
domestic airports. We implemented an enhanced screening for all
international flights coming into the United States, and we
reached out to State and local law enforcement, air carriers,
international partners, and relevant agencies to provide
information they needed on the ground to take appropriate
measures.
In January 3, Secretary Napolitano dispatched me and my
colleagues in the Department to meet with international
leadership on the crisis in aviation security that was
illustrated through the events of 12/25. We met with senior
officials from 11 countries, plus the European Union, to
discuss ways to strengthen aviation security, and we are
determined to follow through on these contacts. I can report,
as questioned, Mr. Chairman, on the results of those
discussions.
The Secretary has herself been in touch with international
colleagues to identify ways to strengthen the international
aviation security standards and procedures.
As the Secretary said last week, and as the President has
said, there are no 100 percent guarantees against another
terrorist attempt to take down a plane or attack us in some
other fashion. But what we can give you, Mr. Chairman, is the
100 percent commitment of the Secretary, myself, Department
leadership, and the hundreds of thousands of men and women who
work in homeland security to do everything we can to minimize
the risk of terrorist attack.
Thank you again for this opportunity, Mr. Chairman, to
appear before this committee. I look forward to your questions.
[The statement of Ms. Lute follows:]
Prepared Statement of Jane Holl Lute
January 27, 2010
Chairman Thompson, Ranking Member King, and Members of the
committee: Thank you for this opportunity to testify on the attempted
terrorist attack on Northwest Flight 253.
The attempted attack on December 25 was a powerful illustration
that terrorists will go to great lengths to defeat the security
measures that have been put in place since September 11, 2001. This
administration is determined to thwart those plans and disrupt,
dismantle, and defeat terrorist networks by employing multiple layers
of defense that work in concert with one another to secure our country.
This is an effort that involves not just DHS, but many other Federal
agencies and the international community as well.
As our part in this effort, DHS is a consumer of the U.S.
Government's consolidated terrorist watch list, which we use to help
keep potential terrorists off flights within, over, or bound for the
United States, and to identify travelers that require additional
screening. We work with foreign governments, Interpol, and air carriers
to strengthen global air travel security by advising them on security
measures, and on which passengers may prove a threat. We also work with
air carriers and airport authorities to perform physical screening at
TSA checkpoints and to provide security measures in flight.
Immediately following the December 25 attack, DHS took swift action
at airports across the country and around the world. These steps
included enhancing screening for individuals flying to the United
States; increasing the presence of law enforcement and explosives
detection canine teams at airports, and of air marshals in flight; and
directing the FAA to notify the 128 flights already in-bound from
Europe about the situation. Nonetheless, Umar Farouk Abdulmutallab
should never have been able to board a U.S.-bound plane with the
explosive PETN on his person. As President Obama has made clear, this
administration is determined to find and fix the vulnerabilities in our
systems that allowed this breach to occur.
Agencies across the Federal Government have worked quickly to
address what went wrong in the Abdulmutallab case. The effort to solve
these problems is well underway, with cooperation among DHS, the
Department of State, the Department of Justice, the intelligence
community, and our international allies, among others. As a consumer of
terrorist watch list information, the Department of Homeland Security
welcomes the opportunity to contribute to the dialogue on improving the
Federal Government's ability to connect and assimilate intelligence. We
are also focused on improving aviation screening and expanding our
international partnerships to guard against a similar type of attack
occurring again. To those ends, today I want to describe the role that
DHS currently performs in aviation security, how DHS responded in the
immediate aftermath of the attempted attack on December 25, and how we
are moving forward to further bolster aviation security.
dhs' role in multiple layers of defense
Since 9/11, the U.S. Government has employed multiple layers of
defense across several departments to secure the aviation sector and
ensure the safety of the traveling public. Different Federal agencies
bear different responsibilities, while other countries and the private
sector--especially the air carriers themselves--also have important
roles to play.
DHS oversees several programs to prevent individuals with terrorist
ties from boarding flights that are headed to, within, or traveling
over the United States or, in appropriate cases, to identify them for
additional screening. Specifically, DHS uses information held in the
Terrorist Screening Database (TSDB), a resource managed by the
Terrorist Screening Center (TSC), as well as other information provided
through the intelligence community, to screen individuals; operates the
travel authorization program for people who are traveling to the United
States under the Visa Waiver Program (VWP);\1\ and works with foreign
governments, international, and regional organizations, and airlines to
design and implement improved security standards worldwide. This
includes routine checks against Interpol databases on wanted persons
and lost or stolen passports on all international travelers arriving in
the United States. The Department also performs checkpoint screenings
at airports in the United States.
---------------------------------------------------------------------------
\1\ The 35 countries in the Visa Waiver Program are: Andorra,
Australia, Austria, Belgium, Brunei, the Czech Republic, Denmark,
Estonia, Finland, France, Germany, Hungary, Iceland, Ireland, Italy,
Japan, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Monaco, the
Netherlands, New Zealand, Norway, Portugal, San Marino, Singapore,
Slovakia, Slovenia, South Korea, Spain, Sweden, Switzerland, and the
United Kingdom (for the United Kingdom, only citizens with an
unrestricted right of permanent abode in the United Kingdom are
eligible for VWP travel authorizations).
---------------------------------------------------------------------------
To provide a sense of the scale of our operations, every day, U.S.
Customs and Border Protection (CBP) processes 1.2 million travelers
seeking to enter the United States by land, air, or sea; the
Transportation Security Administration (TSA) screens 1.8 million
travelers at domestic airports; and DHS receives advanced passenger
information from carriers operating in 245 international airports that
are the last point of departure for flights to the United States,
accounting for about 1,600 to 1,800 flights per day. Ensuring that DHS
employees and all relevant Federal officials are armed with
intelligence and information is critical to the success of these
efforts.
Safeguards for Visas and Travel
One of the first layers of defense in securing air travel consists
of safeguards to prevent dangerous people from obtaining visas, travel
authorizations, and boarding passes. To apply for entry to the United
States prior to boarding flights bound for the United States or
arriving at a U.S. port of entry, most foreign nationals need visas--
issued by a U.S. embassy or consulate--or, if traveling under a Visa
Waiver Program country, travel authorizations issued through the
Electronic System for Travel Authorization (ESTA).\2\
---------------------------------------------------------------------------
\2\ Exceptions would be citizens of countries under other visa
waiver authority such as the Western Hemisphere Travel Initiative or
the separate visa waiver program for Guam and the Commonwealth of the
Northern Mariana Islands, or those granted individual waivers of the
visa requirement under the immigration laws.
---------------------------------------------------------------------------
Issuing visas is the responsibility of the Department of State. At
embassies and consulates where it is operational, the Visa Security
Program positions personnel of U.S. Immigration and Customs Enforcement
(ICE) to assist State Department personnel in identifying visa
applicants who may present a security threat. For individuals traveling
under the VWP, DHS operates ESTA, a web-based system through which
individuals must apply for travel authorization prior to traveling to
the United States. These systems examine an individual's information to
assess whether he or she could pose a risk to the United States or its
citizens, including possible links to terrorism. Without presenting a
valid authorization to travel to the United States at the airport of
departure, a foreign national is not able to board a U.S.-bound flight.
The Department also works with other Federal agencies and our
foreign partners to try to prevent possible terrorists from obtaining
boarding passes. These include the application of the No-Fly List and
the implementation of Secure Flight program, which I explain below.
Pre-departure screening
As another layer of defense, DHS conducts pre-departure passenger
screening in partnership with the airline industry and foreign
governments in order to prevent known or suspected terrorists from
boarding a plane bound for the United States or, as appropriate, to
identify them for additional screening. DHS uses TSDB data, managed by
the Terrorist Screening Center that is administered by the FBI, to
determine who may board, who requires further screening and
investigation, who should not be admitted, or who should be referred to
appropriate law enforcement personnel.
Specifically, to help make these determinations, DHS uses the No-
Fly List and the Selectee List, two important subsets within the TSDB.
Individuals on the No-Fly List should not receive a boarding pass for a
flight to, from, over, or within the United States. Individuals on the
Selectee List must go through additional security measures, including a
full-body pat-down and a full physical examination of personal effects.
Through the Secure Flight Program, the Department is making an
important change to the process of matching passenger identities
against the No-Fly List and Selectee List, and fulfilling an important
recommendation of the 9/11 Commission. Previously, responsibility for
checking passenger manifests against these lists rested with the air
carriers themselves. Under the Secure Flight program, DHS began to
transfer this responsibility to TSA in 2009, and the transition is
targeted for completion by the end of this year. In addition to
creating a more consistent matching process for all domestic and
international travel to the United States and strengthening the
effectiveness of redress in preventing misidentifications, Secure
Flight will flag potential watch list matches and immediately trigger
law enforcement notification and coordination.
As an additional layer of security, DHS also uses the Passenger
Name Record (PNR), the Advanced Passenger Information System (APIS),
and the Immigration Advisory Program (IAP) to assess a passenger's
level of risk and, when necessary, flag them for further inspection.
PNR data, obtained from the airline reservations systems, contains
various elements, which may include optional information on itinerary,
co-travelers, changes to the reservation, and payment information. PNR
data is evaluated against ``targeting rules'' that are based on law
enforcement data, intelligence and past case experience. APIS data,
which carriers are required to provide to DHS at least 30 minutes
before a flight, contains important identifying information that may
not be included in PNR data, including verified identity and travel
document information such as a traveler's date of birth, citizenship,
and travel document number. DHS screens APIS information on
international flights to or from the United States against the TSDB, as
well as against criminal history information, records of lost or stolen
passports, and prior immigration or customs violations. APIS is also
connected to Interpol's lost and stolen passport database for routine
queries on all inbound international travelers.
Another layer in the screening process is the Immigration Advisory
Program (IAP). The CBP officers stationed overseas under the IAP
program at nine airports in seven countries receive referrals from CBP
screening against the TSDB, of which the No-Fly list is a subset. IAP
officers can make ``no board'' recommendations to carriers and host
governments regarding passengers bound for the United States who may
constitute security risks, but do not have the authority to arrest,
detain, or prevent passengers from boarding planes.
Checkpoint Screenings and In-Flight Security
The third layer of defense for air travel in which DHS plays a role
is the screening of passengers and their baggage. TSA screens
passengers and baggage at airports in the United States, but not in
other countries. When a traveler at a foreign airport is physically
screened, that screening is conducted by the foreign government, air
carriers, or the respective airport authority.
Domestically, TSA employs a layered approach to security, which
includes measures both seen and unseen by travelers. The 48,000
Transportation Security Officers at hundreds of airports across the
country screen passengers and their baggage using advanced technology
X-ray systems, walk-through metal detectors, explosive trace detection
equipment, trained canines, vapor trace machines that detect liquid
explosives, Advanced Imaging Technology, full-body pat-downs,
explosives detection systems, Bomb Appraisal Officers, and Behavior
Detection Officers--both at the checkpoint and throughout the airport.
Through programs such as the Aviation Direct Access Screening Program,
TSA also uses random and unpredictable measures to enhance security
throughout the airport perimeter and in limited access areas of
airports. The $1 billion in Recovery Act funds provided to TSA for
checkpoint and checked baggage screening technology have enabled TSA to
greatly accelerate deployment of these critical tools to keep
passengers safe.
In an effort to enhance international screening standards, TSA
conducts security assessments in accordance with security standards
established by the International Civil Aviation Organization (ICAO) at
more than 300 foreign airports, which include foreign airports from
which flights operate directly to the United States and all airports
from which U.S. air carriers operate. If an airport does not meet these
standards, TSA works with the host government to rectify the
deficiencies and raise airport security to an acceptable level.
Ultimately, it is the foreign government that must work to address
these security issues.
In long-term circumstances of non-compliance with international
standards, TSA may recommend suspension of flight service from these
airports to the United States. In addition, TSA inspects all U.S. and
foreign air carriers that fly to the United States from each airport to
ensure compliance with TSA standards and directives. Should air carrier
security deficiencies exist, TSA works with the air carrier to raise
compliance to an acceptable level. If an airport is located within one
of the 35 VWP countries, DHS conducts additional audits and inspections
as part of the statutorily mandated VWP designation and review process.
In terms of in-flight security, Federal Air Marshals (FAM) are
deployed on high-risk domestic and international flights where
international partners allow FAMs to enter their country on U.S.-
flagged carriers. Thousands more volunteer pilots serve as armed,
deputized Federal Flight Deck Officers. Additionally, armed law
enforcement officers from Federal, State, local, and tribal law
enforcement agencies that have a need to fly armed provide a force
multiplier on many flights.
dhs response to the attempted december 25 attack
The facts of the December 25 attempted bombing are well established
and were relayed in the report on the incident that the President
released on January 7, 2010. On December 16, 2009, Umar Farouk
Abdulmutallab, a Nigerian national, purchased a round-trip ticket from
Lagos, Nigeria to Detroit. Abdulmutallab went through physical security
screening conducted by foreign airport personnel at Murtala Muhammed
International Airport in Lagos on December 24 prior to boarding a
flight to Amsterdam Airport Schiphol. This physical screening included
an X-ray of his carry-on luggage and his passing through a walk-through
metal detector. Abdulmutallab went through additional physical
screening, conducted by Dutch authorities, when transiting through
Amsterdam to Northwest Flight 253 to Detroit, and presented a valid
U.S. visa. Abdulmutallab was not on the No-Fly or Selectee Lists.
Accordingly, the carrier was not alerted to prevent him from boarding
the flight or additional physical screening, nor did the IAP officer
advise Dutch authorities of any concerns.
As with all passengers traveling on that flight, and similar to all
other international flights arriving in the United States, CBP
evaluated Abdulmutallab's information while the flight was en route to
conduct a preliminary assessment of his admissibility and to determine
whether there were requirements for additional inspection. During this
assessment, CBP noted that there was a record that had been received
from the Department of State, which indicated possible extremist ties.
It did not indicate that he had been found to be a threat, or that his
visa had been revoked. CBP officers in Detroit were prepared to meet
Abdulmutallab upon his arrival for further interview and inspection.
The attack on board the flight failed in no small part due to the brave
actions of the crew and passengers aboard the plane.
Immediate DHS Response
Following the first reports of an attempted terrorist attack on
Northwest Flight 253 on December 25, DHS immediately put in place
additional security measures. TSA directed the Federal Aviation
Administration to apprise 128 U.S.-bound international flights from
Europe of the attempted attack and to ask them to maintain heightened
vigilance on their flights. Increased security measures were put in
place at domestic airports, including additional explosive detection
canine teams, State and local law enforcement, expanded presence of
Behavior Detection Officers, and enhanced screening. That evening, DHS
issued a security directive for all international flights to the United
States, which mandated enhanced screening prior to departure and
additional security measures during flight.
From the first hours following the attempted attack, Secretary
Napolitano worked closely with the President, senior Department
leadership, and agencies across the Federal Government. Secretary
Napolitano and I communicated with international partners and Members
of Congress. The Secretary also engaged in dialogue with State and
local leadership, the aviation industry, and with National security
experts on counterterrorism and aviation security. The results of these
communications culminated in two reports to the President: one on New
Year's Eve and the second on January 2, 2010.
One of our most important conclusions was that it is now clearer
than ever that air travel security is an international responsibility.
Indeed, passengers from 17 countries were aboard Flight 253.
Accordingly, DHS has embarked upon an aggressive international program
designed to raise international standards for airports and air safety.
On January 3, 2010, Secretary Napolitano dispatched me and Assistant
Secretary for Policy David Heyman to Africa, Asia, Europe, the Middle
East, Australia, and South America to meet with international
leadership on aviation security. In total, we met with senior officials
from 11 countries, plus the European Union in order to discuss new ways
to bolster collective tactics for improving global aviation security.
Last week, Secretary Napolitano travelled to Spain to meet with her
European Union counterparts in the first of a series of global meetings
intended to bring about broad consensus on new, stronger, and more
consistent international aviation security standards and procedures.
In addition to these efforts, the Department has been in close
contact with Congress, our international partners, the aviation
industry and State and local officials across the country since the
afternoon of the attempted attack. On December 25, the Department
issued a joint bulletin with the FBI to State and local law enforcement
throughout the Nation; conducted calls with major airlines and the Air
Transport Association; distributed the FBI-DHS joint bulletin to all
Homeland Security Advisors, regional fusion center directors and Major
City Homeland Security Points of Contact in the country; and notified
foreign air carriers with flights to and from the United States of the
additional security requirements. DHS has maintained close contact with
all of these partners since the attempted attack, and will continue to
do so.
On January 3, TSA issued a new Security Directive, effective on
January 4, mandating enhanced passenger screening.
steps forward to improve aviation security
While these immediate steps helped strengthen our security posture
to face current threats to our country, as President Obama has made
clear, we need to take additional actions to address the systemic
vulnerabilities highlighted by this failed attack. On January 7,
Secretary Napolitano was joined by Assistant to the President for
Counterterrorism and Homeland Security John Brennan to announce five
recommendations DHS made to the President as a result of the security
reviews ordered by President Obama. At the President's direction, DHS
will pursue these five objectives to enhance the protection of air
travel from acts of terrorism.
First, DHS will work with our interagency partners to re-evaluate
and modify the criteria and process used to create terrorist watch
list, including adjusting the process by which names are added to the
No-Fly and Selectee Lists. The Department's ability to prevent
terrorists from boarding flights to the United States depends upon
these lists and the criteria used to create them. As an entity that is
primarily a consumer of this intelligence and the operator of programs
that rely on these lists, the Department will work closely with our
partners in the intelligence community to make clear the kind of
information DHS needs from the watch list system.
Second, DHS will establish a partnership on aviation security with
the Department of Energy and its National Laboratories in order to use
their expertise to bolster our security. This new partnership will work
to develop new and more effective technologies that deter and disrupt
known threats, as well as anticipate and protect against new ways that
terrorists could seek to board an aircraft with dangerous materials.
Third, DHS will accelerate deployment of Advanced Imaging
Technology to provide capabilities to identify materials such as those
used in the attempted December 25 attack, and we will encourage foreign
aviation security authorities to do the same. TSA currently has 40
machines deployed at nineteen airports throughout the United States,
and plans to deploy at least 450 additional units in 2010. DHS will
also seek to increase our assets in the area of explosives-trained
canines, explosives detection equipment, and other security personnel.
Fourth, DHS will strengthen the presence and capacity of aviation
law enforcement. As an interim measure, we will deploy law enforcement
officers from across DHS to serve as Federal Air Marshals to increase
security aboard U.S.-flag carriers' international flights. At the same
time, we will maintain the current tempo of operations to support high-
risk domestic flights, as we look to longer-term solutions to enhance
the training and workforce of the Federal Air Marshal Service.
Fifth, as mentioned earlier, DHS will work with international
partners to strengthen international security measures and standards
for aviation security. Much of our success in ensuring that terrorists
do not board flights to the United States is dependent on what happens
in foreign airports and the commitments of our foreign partners to
enhance security--not just for Americans, but also for their nationals
traveling to this country.
In all of these action areas to bolster aviation security, we are
moving forward with a dedication to safeguard the privacy and rights of
travelers.
conclusion
President Obama has made clear that we will be unrelenting in using
every element of our National power in our efforts around the world to
disrupt, dismantle, and defeat al-Qaeda and other violent extremists.
While we address the circumstances behind this specific incident,
we must also recognize the evolving threats posed by terrorists, and
take action to ensure that our defenses continue to evolve in order to
defeat them. We live in a world of ever-changing risks, and we must
move as aggressively as possible both to find and fix security flaws
and anticipate future vulnerabilities in all sectors. President Obama
has clearly communicated the urgency of this task, and the American
people rightfully expect swift action. DHS and our Federal partners are
moving quickly to provide just that.
As Secretary Napolitano said last week, there is no 100 percent
guarantee that we can prevent a terrorist from trying to take down a
plane or attack us in some other fashion. That is not the nature of the
world we live in, nor of the threats that we face. What we can give
you, however, is the 100 percent commitment of the Secretary, myself,
DHS leadership, and the entire DHS enterprise to do everything we can
to minimize the risk of terrorist attacks.
Chairman Thompson, Representative King, and Members of the
committee: Thank you for this opportunity to testify. I am happy to
answer any questions you may have.
Chairman Thompson. Thank you for your testimony, Dr. Lute.
I now recognize Under Secretary Kennedy to summarize his
statement for 5 minutes.
STATEMENT OF PATRICK F. KENNEDY, UNDER SECRETARY, MANAGEMENT,
DEPARTMENT OF STATE
Mr. Kennedy. Thank you, sir. Chairman Thompson, Ranking
Member King, distinguished Members of the committee, thank you
for the opportunity to appear before you today.
After the attempted bombing of Flight 253, Secretary
Clinton stated, ``We are all looking hard at what did happen in
order to improve our procedures, to avoid human errors,
mistakes, oversights of any kind, and we are going to be
working hard with the rest of the administration to improve
every aspect of our effort.''
This introspective review and the concurrent interagency
review are on-going. We appreciate this committee's interest
and support as we continue this review process, noting in
particular the recent committee staff visit to our consular
facility in London. We recognize the gravity of the threat we
face, and we consider ourselves the first line of defense in
our National security efforts. We acknowledge that processes
need to be improved, and here are the steps we have already
taken.
The State Department misspelled Umar Farouk Abdullah's name
in our Visas Viper report. As a result, we did not have that
information about his current U.S. visa in that report. To
prevent that from occurring again, we instituted new procedures
to ensure comprehensive visa information is included in all our
Visas Viper reporting. This will highlight the visa application
and issuance material also available already in the data that
we have shared with our National security partners.
We are also reevaluating the procedures and criteria used
to revoke visas. The State Department has broad and flexible
authority to revoke visas. Since 2001, we have revoked over
51,000 visas for a variety of reasons, including over 1,700
suspected links to terror.
New watchlisting information coming from the intelligence
and law enforcement community is continually checked every day
against the database of previously issued visas. We can and do
revoke visas and circumstances where an immediate threat is
recognized. We can and do revoke visas to the point of people
seeking to board aircraft, preventing their boarding in
coordination with the FBI's National Targeting Center. We
revoke visas under these circumstances almost daily. We are
standardizing procedures for triggering revocations from the
field and are adding revocation recommendations to the Visas
Viper report.
At the same time, expeditious coordination with our
National security partners is not to be underestimated. There
have been numerous cases where a State Department unilateral
and uncoordinated revocation would have disrupted important
investigations that were under way by one of our National
security partners.
The individual involved was under active investigation, and
our revocation action would have disclosed the United States
Government's interest in that individual and ended our National
security colleague's ability to pursue the case and identify
terrorist plans and co-conspirators.
We will continue to closely coordinate visa revocation
processes with our intelligence and law enforcement partners,
while also constantly making enhancements to the security and
integrity of the visa process. Information sharing and
coordinated action are foundations of the border security
systems put in place since 9/11, and they remain sound
principles.
The State Department has close and productive relationships
with our interagency partners, particularly with the Department
of Homeland Security, which has statutory authority for visa
policy. The State Department brings unique assets and
capabilities to this partnership. Our global presence,
international expertise, and highly trained personnel provide
us singular advantages in supporting the visa function
throughout the world.
We developed and implemented intensive screening processes
requiring personal interviews and supported by a sophisticated
global information network. This front line of border security
has visa offices in virtually every country of the world and
are staffed by highly trained, multilingual, culturally aware
personnel of the State Department.
We support them with the latest technology and access to
enhanced screening tools and information systems. We are
introducing a new generation of visa software to more
efficiently manage our growing mission and the increasing
amounts of data we handle. We are pioneers in the use of
biometrics, a leader in the field of facial recognition, and we
are expanding into the field of iris screening. We have and
will continue to automate processes to reduce the possibility
of human error.
The State Department makes all visa information available
to other agencies, giving them immediate access to over 13
years of data. We introduced on-line visa applications in 2009,
which expanded our data collection tenfold and provide new
information readily available for analysis by the State
Department and by other agencies. This system is being rolled
out worldwide in a few months.
We embrace a layered approach to border security screening,
which results in multiple agencies having an opportunity to
review information and requires separate reviews at both the
visa application and admission stage. No visa--no visa--is
issued without it being run through security checks against our
partners' databases. We screen applicants' fingerprints against
U.S. databases, and we run our facial recognition software
against the photo array provided by the intelligence community.
At the same time we believe that U.S. interests in
legitimate trade, travel, and educational exchanges are not in
opposition to border security. In fact, the United States must
strive to meet both goals to guarantee our long-term security.
Again, the multi-agency team effort to which each agency
brings its particular strengths and expertise results in a
robust and secure process, a process based on broadly shared
information. We remain fully committed to correcting mistakes
and remedying deficiencies that inhibit the full and timely
sharing of information.
We fully recognize that we are not perfect in our reporting
in connection with this case. However, we are working and will
continue to work not only to address shortcomings, but to
continually enhance our border security screening capabilities
and the contributions we make to this interagency effort.
Thank you very much, Mr. Chairman. I look forward to your
questions.
[The statement of Mr. Kennedy follows:]
Prepared Statement of Patrick F. Kennedy
January 27, 2010
Chairman Thompson, Ranking Member King and distinguished Members of
the committee, thank you for the opportunity to address you today. As a
result of the attempted terrorist attack on Flight 253, the President
ordered corrective steps to address systemic failures in procedures we
use to protect the people of the United States. Secretary Clinton
reiterated this direction when she stated, ``we all are looking hard at
what did happen in order to improve our procedures to avoid human
errors, mistakes, oversights of any kind. We in the State Department
are fully committed to accepting our responsibility for the mistakes
that were made, and we're going to be working hard with the rest of the
Administration to improve every aspect of our efforts.'' Therefore, the
Department of State now is working on reviewing visa issuance and
revocation criteria and determining how technological enhancements can
facilitate and strengthen visa-related business processes.
Our immediate attention is on addressing the deficiencies
identified following the attempted attack on Flight 253. At the same
time we continue to plan for the future, incorporating new technology,
increasing data sharing and enhancing operational cooperation with
partner agencies. We have a record of quickly adapting and improving
our procedures to respond to security imperatives. We have a highly
trained global team working daily to protect our borders and fulfill
the overseas border security mission and other critical tasks ranging
from crisis management to protection of American interests abroad.
Within the Department we have a dynamic partnership between the Bureau
of Consular Affairs and the Bureau of Diplomatic Security that adds a
valuable law enforcement and investigative component to our
capabilities. We will use these strengths to address the continuing
security threats.
In the case of Umar Farouk Abdulmutallab, on the day following his
father's November 19 visit to the Embassy, we sent a cable to the
Washington intelligence and law enforcement community through proper
channels (the Visas Viper system) that ``Information at post suggests
[that Farouk] may be involved in Yemeni-based extremists.'' At the same
time, the Consular Section entered Abdulmutallab into the Consular
Lookout and Support System database known as CLASS. In sending the
Visas Viper cable and checking State Department records to determine
whether Abdulmutallab had a visa, Embassy officials misspelled his
name, but entered it correctly into CLASS. As a result of the
misspelling in the cable, information about previous visas issued to
him and the fact that he currently held a valid U.S. visa was not
included in the cable. At the same time the CLASS entry resulted in a
lookout using the correct spelling that was shared automatically with
the primary lookout system used by the Department of Homeland Security
(DHS) and accessible to other agencies.
We have taken immediate action to improve the procedures and
content requirements for Visas Viper cable reporting that will call
attention to the visa application and issuance material that is already
in the data that we share with our National security partners. All
officers have been instructed to include complete information about all
previous and current U.S. visa(s). This guidance includes specific
methods to comprehensively and intensively search the database of visa
records so that all pertinent information is obtained.
In addition to this change in current procedures to search visa
records, we immediately began working to refine the capability of our
current systems. When dealing with applications for visas, we employ
strong, sophisticated name searching algorithms to ensure matches
between names of visa applicants and any derogatory information
contained in the 27 million records found in CLASS. This strong
searching capability has been central to our procedures since automated
lookout system checks were mandated following the 1993 World Trade
Center bombing. We will use our significant experience with search
mechanisms for derogatory information to improve the systems for
checking our visa issuance records.
The Department of State has been matching new threat information
with our records of existing visas since 2002. We have long recognized
this function as critical to the way we manage our records and
processes. This system of continual vetting has evolved as post-9/11
reforms were instituted and is now performed by the Terrorist Screening
Center (TSC). All records added to the Terrorist Screening Database are
checked against the Department's Consolidated Consular Database (CCD)
to determine if there are matching visa records. Matches are sent
electronically from the TSC to the Department of State to flag cases
for visa revocation. In almost all such cases, visas are revoked. In
addition, we have widely disseminated our data to other agencies that
may wish to learn whether a subject of interest has a U.S. visa. Cases
for revocation consideration are forwarded to us by DHS/Customs and
Border Protection's (CBP) National Targeting Center (NTC) and other
entities. Almost every day, we receive requests to review and, if
warranted, revoke visas for potential travelers for whom new derogatory
information has been discovered since the visa was issued. Our
Operations Center is staffed 24 hours per day/7 days per week to work
these issues. Many of these requests are urgent because the person is
about to board a plane. The State Department then uses its authority to
prudentially revoke the visa.
Since the Presidentially-ordered Security Review, there have been
changes in the thresholds for adding individuals to the Terrorist
Screening Database, No-Fly, and Selectee lists. The number of
revocations has increased substantially as a result. This revocation
work is processed electronically in the Department. As soon as
information is established to support a revocation, an entry showing
the visa revocation is added electronically to the Department of
State's lookout system and shared in real time with the DHS lookout
systems used for border screening.
In addition to these changes, the Department is reviewing the
procedures and criteria used in the field to revoke visas and will
issue new instructions to our officers. Revocation recommendations will
be added as an element of reporting through the Visas Viper channel. We
will be reiterating our guidance on use of the broad discretionary
authority of visa officers to deny visas on security and other grounds.
Instruction in appropriate use of this authority has been a fundamental
part of officer training for several years.
The State Department has broad and flexible authority to revoke
visas and we use that authority widely to protect our borders. Since
2001, we have revoked 51,000 visas for a variety of reasons, including
over 1,700 for suspected links to terrorism. We have been actively
using this authority as we perform internal scrubs of our data with
watch list information provided by partner agencies. For example, we
are re-examining information in our CLASS database on individuals with
potential connections to terrorist activity or support for such
activity. We are reviewing all previous Visas Viper submissions as well
as cases that other agencies are bringing to our attention from the No-
Fly and Selectee lists, as well as other sources. In these reviews, we
have identified cases for revocation and we have also confirmed that
substantial numbers of individuals in these classes hold no visas and
of those few who did, many were revoked prior to the current review. We
recognize the gravity of the threat we face and are working intensely
with our colleagues from other agencies to ensure that when the U.S.
Government obtains information that a person may pose a threat to our
security, that person does not hold a visa.
We will use revocation authority prior to interagency consultation
in circumstances where we believe there is an immediate threat.
Revocation is an important tool in our border security arsenal. At the
same time, expeditious coordination with our National security partners
is not to be underestimated. There have been numerous cases where our
unilateral and uncoordinated revocation would have disrupted important
investigations that were underway by one of our National security
partners. They had the individual under investigation and our
revocation action would have disclosed the U.S. Government's interest
in the individual and ended our colleagues' ability to quietly pursue
the case and identify terrorists' plans and co-conspirators.
In addition to revocation efforts, consular officers refused
1,885,017 visas in fiscal year 2009. We now are renewing guidance to
our officers on their discretionary authority to refuse visas under
section 214(b) of the Immigration and Nationality Act with specific
reference to cases that raise security concerns. No visa is issued
without it being run through security checks against our partners'
data. And we screen applicants' fingerprints against U.S. databases as
well.
The Department has a close and productive partnership with DHS,
which has authority for visa policy. Over the past 7 years both
agencies significantly increased resources, improved procedures, and
upgraded systems devoted to supporting the visa function. DHS receives
all of the information collected by the Department of State during the
visa process. DHS has broad access to our entire CCD, containing 136
million records related to both immigrant and nonimmigrant visas and
covering visa actions of the last 13 years. Special extracts of data
are supplied to elements within DHS, including the Visa Security Units
of Immigration and Customs Enforcement (ICE). These extracts have been
tailored to the specific requirements of those units. We are working
closely with ICE Visa Security Units established abroad and with
domestic elements of DHS, such as CBP's National Targeting Center.
We gave DHS access to U.S. passport records, used by CBP to confirm
the identity of citizens returning to the United States. We developed
new card-type travel documents that work with the automated systems CBP
installed at the U.S. land borders. We are collecting more information
electronically and earlier in the process. Expanded data collection
done in advance of travel will give DHS and partner agencies richer
information and more time for analysis.
We make all of our visa information available to other involved
agencies, and we specifically designed our systems to facilitate
comprehensive data sharing. We give other agencies immediate access to
over 13 years of visa data, and they use this access extensively. In
November 2009, more than 16,000 employees of DHS, the Department of
Defense (DOD), the FBI and Commerce made 920,000 queries on visa
records. We embrace a layered approach to border security screening and
are fully supportive of the DHS Visa Security Program.
The Department of State is at the forefront of interagency
cooperation and data sharing to improve border security, and we
embarked on initiatives that will position us to meet future challenges
while taking into consideration our partner agencies and their specific
needs and requirements. We are implementing a new generation of visa
processing systems that will further integrate information gathered
from domestic and overseas activities. We are restructuring our
information technology architecture to accommodate the unprecedented
scale of information we collect and to keep us agile and adaptable in
an age of intensive and growing requirements for data and data sharing.
We proactively expanded biometric screening programs and spared no
effort to integrate this expansion into existing overseas facilities.
In partnership with DHS and the FBI, we established the largest
biometric screening process on the globe. We were a pioneer in the use
of facial recognition techniques and remain a leader in operational use
of this technology. In 2009 we expanded use of facial recognition from
a selected segment of visa applications to all visa applications. We
now are expanding our use of this technology beyond visa records. We
are testing use of iris recognition technology in visa screening,
making use of both identity and derogatory information collected by
DOD. These efforts require intense on-going cooperation from other
agencies. We successfully forged and continue to foster partnerships
that recognize the need to supply accurate and speedy screening in a
24/7 global environment. As we implement process and policy changes, we
are always striving to add value in both border security and in
operational results. Both dimensions are important in supporting the
visa process.
The Department of State is an integral player on the border
security team. We are the first line of defense. Our global presence,
foreign policy mission, and personnel structure give us singular
advantages in executing the visa function throughout the world. Our
authorities and responsibilities enable us to provide a global
perspective to the visa process and its impact on U.S. National
interests. The issuance and refusal of visas has a direct impact on
foreign relations. Visa policy quickly can become a significant
bilateral problem that harms U.S. interests if handled without
consideration of foreign policy impacts. The conduct of U.S. visa
policy has a direct and significant impact on the treatment of U.S.
citizens abroad. The Department of State is in a position to anticipate
and weigh those possibilities.
We developed and implemented intensive screening processes
requiring personal interviews, employing analytic interview techniques,
incorporating multiple biometric checks, all built around a
sophisticated global information technology network. This frontline of
border security has visa offices present in virtually every country of
the world. They are staffed by highly trained and multi-lingual
personnel of the Department of State. These officials are dedicated to
a career of worldwide service and provide the cultural awareness,
knowledge, and objectivity to ensure that the visa function remains the
frontline of border security.
In addition, we have 145 officers and 540 locally employed staff
devoted specifically to fraud prevention and document security,
including fraud prevention officers at overseas posts. We have a large
Fraud Prevention Programs office in Washington, DC that works very
closely with the Bureau of Diplomatic Security, and we have fraud
screening operations using sophisticated database checks at both the
Kentucky Consular Center and the National Visa Center in Portsmouth,
New Hampshire. Their role in flagging applications and applicants who
lack credibility, who present fraudulent documents, or who give us
false information adds a valuable dimension to our visa process.
The Bureau of Diplomatic Security adds an important law enforcement
element to the Department's visa procedures. There are now 50 Assistant
Regional Security Officer Investigators abroad specifically devoted to
maintaining the integrity of the process. They are complemented by
officers working domestically on both visa and passport matters. These
Diplomatic Security officers staff a unit within the Bureau of Consular
Affairs that monitors overseas visa activities to detect risks and
vulnerabilities. These highly trained law enforcement professionals add
another dimension to our border security efforts.
The multi-agency team effort on border security, based upon broadly
shared information, provides a solid foundation. At the same time we
remain fully committed to correcting mistakes and remedying
deficiencies that inhibit the full and timely sharing of information.
We have and we will continue to automate processes to reduce the
possibility of human error. We fully recognize that we were not perfect
in our reporting in connection with the attempted terrorist attack on
Flight 253. We are working and will continue to work not only to
address that mistake but to continually enhance our border security
screening capabilities and the contributions we make to the interagency
effort.
We believe that U.S. interests in legitimate travel, trade
promotion, and educational exchange are not in conflict with our border
security agenda and, in fact, further that agenda in the long term. Our
long-term interests are served by continuing the flow of commerce and
ideas that are the foundations of prosperity and security. Acquainting
people with American culture and perspectives remains the surest way to
reduce misperceptions about the United States. Fostering academic and
professional exchange keeps our universities and research institutions
at the forefront of scientific and technological change. We believe the
United States must meet both goals to guarantee our long-term security.
We are facing an evolving threat. The tools we use to address this
threat must be sophisticated and agile. Information obtained from these
tools must be comprehensive and accurate. Our criteria for taking
action must be clear and coordinated. The team we use for this mission
must be the best. The Department of State has spent years developing
the tools and personnel needed to properly execute the visa function
overseas and remains fully committed to continuing to fulfill its
essential role on the border security team.
Chairman Thompson. Thank you for your testimony.
I now recognize Director Leiter to summarize his statement
for 5 minutes.
STATEMENT OF MICHAEL E. LEITER, DIRECTOR, NATIONAL
COUNTERTERRORISM CENTER
Mr. Leiter. Chairman Thompson, Ranking Member King, Members
of the committee, thank you for holding this hearing on the
events of Christmas day.
Let me start with the most crystal-clear assertion I can
make. Omar Farouk Abdulmutallab should not have boarded that
plane bound for the United States on Christmas day. The
counterterrorism system failed, and I along with other leaders
have told the President--I tell you, I am telling the American
people--we are determined to do better.
I have also pledged to the President, along with the DNI, a
fresh and penetrating look at the human and technical factors
that we think contributed to this failure and try to determine
ways that we can improve our performance. The President has
tasked me with two specific responsibilities--one, a
methodology of pursuing follow-up actions for all threats and
threads as we detect them, and second, a dedicated capability
at NCTC to enhance watch list records.
In addition, I am, of course, working with the DNI, with
Leon Panetta, with Bob Mueller and other members of the IC to
work on intelligence community-specific improvements.
I would like to briefly summarize the events of Christmas
day from our perspective and what went wrong. I want to start
by debunking something that has become conventional wisdom,
that this is a failure just like 9/11. As the President has
said, this was not, like 2001, a failure to collect or share
intelligence. Rather, it was a failure to connect, integrate,
and understand the intelligence.
Now, one is not necessarily a lead to the more tragic
consequences than the other, but the differences in those
failures obviously lead to a different set of reforms that
might be necessary.
Although the National Counterterrorism Center and the
intelligence community have long warned, going back to 2008,
2009, about the threat posed by al-Qaeda in Yemen, we did not
correlate the specific information that would have kept
Abdulmutallab off that flight.
We did highlight the growing threat of al-Qaeda in Yemen.
We also focused on targets in Yemen, but in the fall of 2009 we
increased the need to talk about the possibility of al-Qaeda
from Yemen targeting the United States. We also in fact
analyzed the information that al-Qaeda was working with an
individual who, only again after the fact, did we know to be
Abdulmutallab.
Finally, the intelligence community also warned repeatedly
of the type of explosive device that was ultimately used by
Abdulmutallab and the ways in which that device could be used
to undermine U.S. aviation screening. But again, despite having
identified these overall streams, we failed to make the last
final connection, what I would refer to as the last tactical
mile here, linking Abdulmutallab's identity to the plot that
was in train.
We indeed had the information that came from his father
that he was concerned about his son going to Yemen, coming
under the influence of religious extremists, and that he was
not going to return home. We also had streams of information
from other intelligence channels that provide the pieces of the
story. We had a partial name, an indicator of a Nigerian, but
there was no single piece of intelligence that brought that
together, nor did we at NCTC or elsewhere in the intelligence
community do that in our analysis.
As a result, although Mr. Abdulmutallab was identified with
respect to terrorists and placed in the Terrorist Identities
Datamart Environment, he was not watchlisted based on the
information that was associated with him, nor was the placed on
the No-Fly or Selectee list.
Had all the information the United States had available at
the time that link together, his name would have been
watchlisted and thus on the visa screening list and the border
inspection list. Whether he would have been placed on the No-
Fly and Selectee list, based on the existing standards, would
have been determined by the strength of our analytic judgment.
As I have already said, I believe, one of the clear lessons we
have learned is a need to re-examine the standards for
inclusion on these various watch lists.
Finally, and I hope I have made clear I have no desire to
try to make excuses for what we did not do, because there are
things that we didn't do well and we didn't do right. I do want
to give you at least a bit of context about the context in
which this failure occurred.
Every day the National Counterterrorism Center receives
literally thousands of pieces of intelligence related to CT--
more than 5,000 a day; well over 5,000. We review well over
5,000 names each day. Each day more than 350 individuals are
actually placed on the watch list.
Now, in hindsight we can say with a high degree of
confidence that Abdulmutallab was plotting with AQAP. Although
we obviously have to do better, we have to recognize that in my
view there is no single silver bullet, and that is especially
true as this terror threat we face becomes more multi-
dimensional and more dispersed away from traditional areas of
promoting terrorism.
So while watchlisting and intelligence are critical tools
in this fight, I would echo the Chairman's statement of the
need for a layered approach to counterterrorism, which includes
technology, international screening and cooperation and the
like.
Now, very quickly, I would like to outline the ways in
which we are improving the system already. As I have noted, the
President has assigned to the interagency to review the
standards for inclusion on the watch lists, including the No-
Fly Selectee list. This has been done.
In addition, we have immediately moved additional resources
to focusing on Yemen and other al-Qaeda affiliates that we
believe pose a threat to U.S. homeland security.
Third, we are trying to move away from a names-based system
of pursuing these threats, ensuring that our analysts have the
time and resources to pursue the small tidbits of information
so they can in fact associate that with individuals and ensure
proper watchlisting.
Finally, as I also noted at the outset, under the
President's direction we are expanding and deepening our
allocation of responsibility for specific follow-up actions for
a wide range of threats, not just those that appear to be high-
priority threats in the beginning.
With that, Mr. Chairman, I very much look forward to
working with this committee and fielding your questions as we
work on this together.
[The statement of Mr. Leiter follows:]
Prepared Statement of Michael E. Leiter
27 January 2010
Chairman Thompson, Ranking Member King, and Members of the
Committee on Homeland Security: Thank you for your invitation to appear
before the committee to discuss the events leading up to the attempted
terrorist attack on Christmas day and the improvements the National
Counterterrorism Center and the intelligence community have underway to
fix deficiencies.
It is my privilege to be accompanied by Jane Holl Lute, Deputy
Secretary of Homeland Security and Patrick Kennedy, Under Secretary of
State for Management.
The attempted terrorist attack on Christmas day did not succeed,
but, as one of several recent attacks against the United States
inspired by jihadist ideology or directed by al-Qaeda and its
affiliates, it reminds us that our mission to protect Americans is
unending.
Let's start with this clear assertion: Umar Farouk Abdulmutallab
should not have stepped on that plane. The counterterrorism system
failed and we told the President we are determined to do better.
Within the intelligence community we had strategic intelligence
that al-Qaeda in the Arabian Peninsula (AQAP) had the intention of
taking action against the United States prior to the failed attack on
December 25, but, we did not direct more resources against AQAP, nor
insist that the watchlisting criteria be adjusted prior to the event.
In addition, the intelligence community analysts who were working hard
on immediate threats to Americans in Yemen did not understand the
fragments of intelligence on what turned out later to be Mr.
Abdulmutallab, so they did not push him onto the terrorist watch list.
We are taking a fresh and penetrating look at strengthening both
human and technical performance and do what we have to do in all areas.
Director of National Intelligence Blair and I have specifically been
tasked by the President to improve and manage work in four areas:
Immediately reaffirm and clarify roles and responsibilities
of the counterterrorism analytic components of the IC in
synchronizing, correlating, and analyzing all sources of
intelligence related to terrorism.
Accelerate information technology enhancements, to include
knowledge discovery, database integration, cross-database
searches, and the ability to correlate biographic information
with terrorism-related intelligence.
Take further steps to enhance the rigor and raise the
standard of tradecraft of intelligence analysis, especially
analysis designed to uncover and prevent terrorist plots.
Ensure resources are properly aligned with issues
highlighted in strategic warning analysis.
Additionally, NCTC has been tasked by the President to do the
following:
Establish and resource appropriately a process to prioritize
and to pursue thoroughly and exhaustively terrorism threat
threads, to include the identification of appropriate follow-up
action by the intelligence, law enforcement, and homeland
security communities.
Establish a dedicated capability responsible for enhancing
record information on possible terrorist in the Terrorist
Identities Datamart Environment for watchlisting purposes.
the events leading up to the christmas day attack
I will now briefly discuss some of the details of the bombing
attempt and what we missed. As the President has said, this was not--
like in 2001--a failure to collect or share intelligence; rather it was
a failure to connect, integrate, and understand the intelligence we
had.
Although NCTC and the intelligence community had long warned of the
threat posed by al-Qaeda in the Arabian Peninsula, we did not correlate
the specific information that would have been required to help keep
Abdulmutallab off that Northwest Airlines flight.
More specifically, the intelligence community highlighted the
growing threat to U.S. and Western interests in the region posed by
AQAP, whose precursor elements attacked our embassy in Sana'a in 2008.
Our analysis focused on AQAP's plans to strike U.S. targets in Yemen,
but it also noted--increasingly in the fall of 2009--the possibility of
targeting the United States. We had analyzed the information that this
group was working with an individual who we now know was the individual
involved in the Christmas attack.
In addition, the intelligence community warned repeatedly of the
type of explosive device used by Abdulmutallab and the ways in which it
might prove a challenge to screening. Of course, at the Amsterdam
airport, Abdulmutallab was subjected to the same screening as other
passengers--he passed through a metal detector, which didn't detect the
explosives that were sewn into his clothes.
As I have noted, despite our successes in identifying the overall
themes that described the plot we failed to make the final
connections--the ``last tactical mile''--linking Abdulmutallab's
identity to the plot. We had the information that came from his father
that he was concerned about his son going to Yemen, coming under the
influence of unknown religious extremists, and that he was not going to
return home. We also had other streams of information coming from
intelligence channels that provided pieces of the story. We had a
partial name, an indication of a Nigerian, but there was nothing that
brought it all together--nor did we do so in our analysis.
As a result, although Mr. Abdulmutallab was identified as a known
or suspected terrorist and entered into the Terrorist Identities
Datamart Environment (TIDE)--and this information was in turn widely
available throughout the intelligence community--the derogatory
information associated with him did not meet the existing policy
standards--those first adopted in the summer of 2008 and ultimately
promulgated in February 2009--for him to be ``watchlisted,'' let alone
placed on the No-Fly List or Selectee lists.
Had all of the information the United States had available,
fragmentary and otherwise, been linked together, his name would have
undoubtedly been entered on the Terrorist Screening Database which is
exported to the Department of State and the Department of Homeland
Security. Whether he would have been placed on either the No-Fly or
Selectee list--again based on the existing standards--would have been
determined by the strength of the analytic judgment. One of the clear
lessons the U.S. Government has learned and which the intelligence
community will support is the need to modify the standards for
inclusion on such lists.
In hindsight, the intelligence we had can be assessed with a high
degree of confidence to describe Mr. Abdulmutallab as a likely
operative of AQAP. But without making excuses for what we did not do, I
think it critical that we at least note the context in which this
failure occurred: Each day NCTC receives literally thousands of pieces
of intelligence information from around the world, reviews literally
thousands of different names, and places more than 350 people a day on
the watch list--virtually all based on far more damning information
than that associated with Mr. Abdulutallab prior to Christmas day.
Although we must and will do better, we must also recognize that not
all of the pieces rise above the noise level.
The men and women of the National Counterterrorism Center and the
intelligence community are committed to fighting terrorism at home and
abroad and will seek every opportunity to better our analytical
tradecraft, more aggressively pursue those that plan and perpetrate
acts of terrorism, and effectively enhance the criteria used to keep
known or suspected terrorists out of the United States.
Chairman Thompson. Thank you very much.
I thank all the witnesses for their testimony.
I remind each Member that he or she will have 5 minutes to
question the panel. I will now recognize myself for questions.
To each one of the panelists, since this occurrence on
December 25, has any personnel action or disciplinary action
taken place in your Department relative to this incident?
Ms. Lute. In the Department of Homeland Security, Mr.
Chairman, the personnel actions that have been taken have
related to intensified training, intensified deployment, but
there have been no disciplinary actions that have taken place.
Chairman Thompson. So there are no disciplinary----
Mr. Kennedy. No disciplinary actions, sir.
Mr. Leiter. We are currently reviewing all the personnel.
We have made no final decisions.
Chairman Thompson. If you will, at whatever point you
complete that review, would you provide the committee that
which the law allows so we can review it?
Mr. Leiter. Absolutely, Mr. Chairman.
Chairman Thompson. So my understanding is, even though this
was an unfortunate situation, nobody has been disciplined. We
understand the President took responsibility, and that is good,
but the question in the minds of a lot of us is, is that good
enough?
Now, my next question to each one of you is if that
situation occurred today, would it be any different?
Mr. Kennedy. On the State Department, it would be
different, Mr. Chairman. We had a process that had been worked
out with the interagency community, and we have discovered that
we did not have sufficient checkmarks in. There was no
requirement in our previous rule grid when we reported on the
Visas Viper, meaning somebody coming into an American embassy
and saying we have concerns about a third party.
We reported that immediately, but we did not have in that
process a checkmark that this individual had a U.S. visa. I
cannot tell you why that wasn't included. I can tell you
probably because we had already passed to the law enforcement
intelligence community the list of everyone who gets a visa on
a daily basis.
We have now added that to our process, so any person who
comes in the embassy and makes a report of terrorist concern,
not only to report that individual in our Visas Viper message
to the community, but we add then this person has a United
States visa, and we have also enhanced the name-checking
capability in that system to make sure that if there is a
misspelling----
Chairman Thompson. Okay. So, all right, so he has a visa.
So what does that do?
Mr. Kennedy. What?
Chairman Thompson. In the process. Does it revoke the visa?
Does it----
Mr. Kennedy. As I mentioned in my statement, Mr. Chairman,
if we unilaterally revoked a visa, and there was the case
recently up, we have a request from a law enforcement agency to
not revoke the visa. We came across information. We said,
``This is a dangerous person.'' We were ready to revoke the
visa. We then went to the community and said, ``Should we
revoke this visa?''
One of the members--and we would be glad to give you that
in private--said, ``Please, do not revoke this visa. We have
eyes on this person. We are following this person who has the
visa for the purpose of trying to roll up an entire network,
not just stop one person.''
So we will revoke the visa of any individual who is a
threat to the United States, but we do take one preliminary
step. We ask our law enforcement and intelligence community
partners, ``Do you have eyes on this person and do you want us
to let this person proceed under your surveillance so that you
may potentially break a larger plot?''
Chairman Thompson. I think that the point that I am trying
to get at is is this just another box you are checking, or is
there some security value to adding that box to the list?
Mr. Kennedy. Yes. The intelligence and law enforcement
community tell us that they believe in certain cases that there
is a higher value of them following this person so they can
find his or her co-conspirators and roll up an entire plot
against the United States, rather than simply knock out one
soldier in that effort.
Chairman Thompson. Mr. Leiter.
Mr. Leiter. I would offer four ways in which I think the
process would work differently today, Mr. Chairman. First,
actually beginning in July 2008, right after Mr. Abdulmutallab
obtained his visa, NCTC began working with State Department in
reviewing visa applications in a new and more advanced way.
The way in which we now review that visa, and I can't go
into it in the open session, would have detected a connection
with Mr. Abdulmutallab, which would have stamped an automatic
warning to State Department, DHS, FBI and other intelligence
community components. So first of all, he might not have even
gotten the visa in the first place.
Second, anyone who has a visa that goes on the watch list,
the default is if that visa is revoked, they also become a no-
fly to ensure that if someone shows up with the visa, if there
is some confusion there, they are also a no-fly. That is the
second step.
Third, we have dedicated teams that don't have any
responsibility for producing intelligence, but simply for
following up on these small leads. I believe those teams would
increase the likelihood we would tap.
Fourth, we have, as an interagency way, reviewed already
the standards for placement on No-Fly. Although those standards
have not yet been formally adjusted, they are being interpreted
in a manner which allows us to more broadly apply those
practically.
Chairman Thompson. Thank you.
I yield to the Ranking Member for questions.
Mr. King. Thank you, Mr. Chairman.
I guess this would go to Mr. Leiter and Deputy Secretary
Lute. The President first spoke to the Nation on this on
Monday, December 28, I believe. It was 3 days after the event.
During that time I assume most of this information was
available to the intelligence community, whoever was briefing
the President. Yet when he spoke that day, 3 days after, he
referred to Abdulmutallab as an isolated extremist.
Do you know who was responsible for clearing that
statement, when obviously he was not an isolated extremist? He
was part of al-Qaeda in the Arabian Peninsula. We had this
series of information on him. Now, the President seemed to
correct that the next day. Why did the President go forward and
use that term? Who is responsible for briefing him? Who is
responsible for clearing that statement?
Mr. Leiter. Congressman, I frankly can't speak to the White
House interactions and who prepared that for the President and
who briefed him on that. I simply don't know. I would say that
on the night, on Christmas night, we advised the White House. I
think the White House, we said that we believe this was an
attempted terrorist attack.
I will also add that during this entire look back, an on-
going investigation, as you know, different pieces of
information have come forward, which have made it more and more
clear, I think, each day of his connections to al-Qaeda in the
Arabian Peninsula.
Mr. King. Secretary Lute.
Ms. Lute. Congressman, I would echo what Director Leiter
has said. I was equally not involved in the deliberations
within the White House to inform the President.
I can also say, as Director Leiter has said, that from the
moment we became aware of this incident, there was an extremely
intensive effort to identify as many facts about this
individual as we possibly could, including reaching out to
international partners who held some elements of information.
That work was intensive over those several----
Mr. King. Because this interrupts my time, I want to
interrupt. Again, I am just concerned why 3 days later, with
all this information available, the President said ``isolated
extremist.'' Was it John Brennan who briefed him? Was it Leon
Panetta?
I mean it would seem to me that in a situation like this,
there should be one point person, who goes in and tells the
President, who coordinates everything. Who is that coordinator?
Do you know? Who would have allowed him to say ``isolated
extremist'' when he was not isolated?
Mr. Leiter. Congressman, I know that the National
Counterterrorism Center and others were providing intelligence
to the White House on an on-going basis. I simply don't know
how those statements were produced.
Mr. King. Okay.
Secretary Lute and Mr. Leiter, would, you know, either
yourselves or anyone in the intelligence community who would
now say that Abdulmutallab should be un-Mirandized at this
stage? Because, obviously, Director Blair seems to believe it
was a mistake to have him put into the criminal justice system.
At this stage, is anyone willing to recommend he be taken out
of the criminal justice system and put into the military
tribunal system?
Ms. Lute. Congressman, what I can say from the Department
of Homeland Security's perspective and in hindsight--there is a
lot of hindsight going on--we are focused on those aspects of
this for which the Department had key responsibility. The
decisions regarding the Mirandizing of Abdulmutallab are
appropriately directed to the Justice Department.
Mr. King. Okay. My understanding was the Secretary of
Homeland Security is a member of the President's task force on
interrogation, and that supported the creation of the HIG. I am
wondering does the Department have a position of whether or not
at this stage, not doing Monday morning quarterbacking, right
now as of Wednesday, January 27, do you believe that you should
be taken out of the criminal justice system and put into the
military tribunal system?
Ms. Lute. Congressman, I am not party of all of the
conversations that have gone in this individual. I am not
prepared----
Mr. King. Director Leiter.
Mr. Leiter. Congressman, I think it is critically important
that we try to get in as much information from him as we can. I
think now, several weeks after the arrest and Mirandizing, it
is not at all clear to me, and I am not close enough to know
whether or not it would be productive or counterproductive,
given the current FBI investigation, to do that.
Mr. King. Secretary Lute, it has been reported in the press
that CBP was waiting in Detroit to question the terrorist when
he came off the plane. If that is true, wouldn't that have been
sufficient information to contact the Netherlands and at least
ask them to do a secondary inspection?
Ms. Lute. Congressman, what CBP had was consistent with our
long-standing practice of examining issues related to
admissibility, and----
Mr. King. Okay, but looking at it now--we are going toward
the future again--I am not trying to Monday morning
quarterback, but looking toward the future, having that
information, if there is enough information to question a
person coming off, is it that difficult to ask another
government to give him a secondary inspection?
Ms. Lute. We in fact have changed our practice.
Mr. King. We have. Okay.
Ms. Lute. That kind of information will be pushed forward.
Mr. King. Let me ask Director Leiter and Secretary Lute:
People have said the system failed, but what really was the
system failure? Wasn't it judgments that failed? Obviously, we
always have to adapt the system. But it seems to me the system
provided enough information that, if it were properly
interpreted, this would not have happened. Did the system
actually fail, or are we talking about judgment mistakes?
Again, I am not trying to Monday morning quarterback. But I
think rather than just say the system failed, one person
accepts the responsibility, shouldn't we be--as the Chairman
seemed to be indicating, and I agree--looking for individuals
who did make judgment mistakes?
Mr. Leiter. Congressman, I think there are potentially some
instances where there was a protocol to be followed, and
someone didn't follow the protocol. That is one category of
failure.
The second category of failing is did you connect these two
pieces of data? I frankly think that that second category is a
lot harder to identify and clearly say you made a mistake. We
want analysts to do that. But whether or not they actually
could, and piece that all together, given the resources, the
workload they are facing, I think it is much more difficult to
say that that was a clear failure.
I believe the phrase ``systemic failure'' was meant to
suggest that there are a series of failings in different pieces
of the system, not that the entire system itself is broken.
Mr. King. Thank you, Mr. Chairman.
Chairman Thompson. Thank you very much.
The Chair now recognizes the gentlelady from California for
5 minutes. Ms. Harman.
Ms. Harman. Thank you, Mr. Chairman.
I would like to welcome our witnesses, but comment on the
absence of Secretary Napolitano. This is the committee with
primary jurisdiction over the Department of Homeland Security.
She is the Secretary of Homeland Security. She is in
Washington, DC.
She was invited to testify at this very important hearing,
and she should have been here, Deputy Secretary Lute. I
understand that you were prepared and you had accepted our
invitation, but I am very personally disappointed that she
isn't here.
I also want to note for the record that I was briefed
following the Christmas bomb plot within a few days. I was
first in my district, and then I was on a family vacation, but
Secretary Napolitano did call me after she spoke to the
Chairman. I am quite aware that she had first spoken to him. I
also exchanged e-mails and had numerous calls with Mr. Leiter,
who was first in Washington, DC, during the event and then
subsequently on a short family vacation himself. I know he was
hard at work.
Mr. King. Would you just yield for 2 seconds? Just to say
nobody on this side received those briefings, which I think is
wrong. It has always been bipartisan.
Ms. Harman. I agree with you, Mr. King, that there should
be bipartisan briefings. You know that I agree with that.
I also want to note that in recent years there have been
many intelligence community successes. The Zazi plot, the
Headley plot and others are examples of success, and there had
been many intelligence community sacrifices, particularly the
loss recently of seven CIA personnel at the Forward Operating
Base Chapman in Afghanistan. Obviously, all of us know this and
want to salute again today the hard-working women and men of
the intelligence community.
But despite all those successes and the risks that they
take, the Christmas day problem does represent a failure. Two
of you, Mr. Kennedy and Mr. Leiter, have stepped up and taken
responsibility, as has Mr. Brennan, and I applaud you for doing
that. I applaud the fact that you have all pledged that you
would do better.
Doing better is not optional. A hundred percent security
can never be achieved, but surely we can do better. At least to
me, listening to all of this and based on my long experience
with the Intelligence Reform Act and other efforts to try to
better, I think that doing better is not about laundry lists.
It is about leadership.
Only through leadership will our system of layered security
become more agile and responsive. Let us understand that the
enemy that is seeking to harm us is agile and responsive.
Whatever it is that we now decide to do, they will try to
figure out a way to get around it. So our system of collection,
analysis, visa approval, watchlisting and other things should
get better. But only through strong leadership will that better
system stay agile and responsive.
Let me just add one thing as the tag end. This I commend
the Department of Homeland Security for doing very well, and
that is preparing, not scaring the public. There is a new tone.
I applaud that. Let us remember that the successful layer of
security on Christmas day was a prepared public on that
airplane.
So, finally, let me make one other point. There is
testimony submitted for the record of this hearing by the ACLU,
and I have read that testimony, and I think it is extremely
thoughtful. It reminds me that one piece of unfinished business
since the Intelligence Reform Act of 2004 is the formation of a
privacy and civil liberties commission that was supposed to
oversee new practices to keep our country safer.
I wrote a letter to the President in October with Senator
Susan Collins of Maine, and the White House has never responded
to our letter. Insofar as I know, nothing has been done. I
think that this is unfortunate and will prevent us from
assuring the public that we are enacting better practices
consistent with our Constitution.
But my one question, because time is running out, is to
each of you. What are you personally going to do to assert
leadership in the near- and medium-term to make certain that
the people under your supervision remain agile and responsive
against an evolving threat by a learning organization?
Ms. Lute. Congresswoman, perhaps I will begin. You and I
know each other well. I take very seriously the
responsibilities of leadership, and I underscore
responsibility. I personally traveled to 12 countries in 12
days with colleagues from the Department of Homeland Security
to bring a message of leadership from the United States to our
international partners with whom we have to work very closely
to raise the standard of aviation security.
I personally spoke with the IAB officer on the ground in
Amsterdam to understand from his perspective what more can we
do to change the system and to improve our ability to prevent a
future event as occurred on Christmas day.
The Secretary equally has personally made aviation security
a cornerstone event of our efforts going forward in this, along
with other parts of the Department, who take very seriously its
leadership role to help create a homeland where the American
way of life can thrive. This is something we take extremely
seriously.
Mr. Kennedy. Ma'am, the Secretary of State is incredibly
involved in this, and she has charged me, and I think that I
would offer in the brief time I have two points, but there are
others.
The first, we need to continually increase our software
capability to take disjointed pieces of material and bring them
to get together. The second thing we need to do is and I have
to make sure that is happening, and I think that we also have
to make sure that we remain and improve our lash-up with the
National security and the law enforcement community, because we
are on the frontline.
But while we are on the frontlines, if we don't have the
backstopping that is the best that we can lash up, then we
would fail again. That is my pledge to make sure those happen.
Mr. Leiter. Congresswoman, I have spent a tremendous amount
of time since December 25 with my workforce, my analysts, my
watch listers, my watch standards, and made clear to them many
things. One, I have to enable them to be able to do the job. If
they need something, they have to come to me, so I am making
sure that lines of communication are more open than ever.
So one of the things I first said to them is I want to know
from every one of them how do we do our job better. I did an
open e-mail to my entire organization. I probably got 200
responses of what they think needs to be done.
The second thing I said to them in a way relates back to
what the Chairman asked. I told all of them you have to ask
yourself whether or not you can keep doing it, because this is
high pressure. It is high stakes. You are going to get beat up
in the public realm. You have to make sure that you can commit
yourself 100 percent to this every single day. There is no
embarrassment if they can't. We have to make sure that we have
a well-honed team that really stays on this.
Finally, the last thing I would say I am doing--I am not
generally noted to be an especially patient person, but
whatever patience I have shown in the past in terms of trying
to negotiate or massage interagency agreement to obtain data or
to provide cooperation, frankly, I am done with it. I am going
to ask once politely, and after that I am bringing to the White
House and Director Blair and saying this has to be done. If it
can't be done, I can't guarantee you the security that I think
you and the American people deserve.
Could I add one thing, Mr. Chairman? I just want to note on
the record I endorse wholeheartedly the information that this
committee needs to make a decision. You have my commitment from
NCTC--I hope we have illustrated that in the past--to provide
you that completely and on a nonpartisan basis the information
you need to do your oversight correctly.
Chairman Thompson. Thank you.
The gentleman from Indiana for 5 minutes, Mr. Souder.
Mr. Souder. Thank you, Mr. Chairman.
First, Mr. Kennedy, I would appreciate for the record if
you would--you said since 2001 you revoked 51,000 visas and
1,700 for suspected links to terrorism--could you give us a by-
year number of visas revoked and number for suspected
terrorism?
But, secondly, I know my friend from New York kept making a
point about Monday morning quarterbacking. As a Hoosier, when
you have Peyton Manning as your quarterback, you don't have to
do Monday morning quarterbacking. That is important here,
because it is the person in charge, and the people in charge.
When they fail is when we do Monday morning quarterbacking.
It is not the agent who didn't have the information who
messed up here, that as you see these people at the airports as
you go around the world, there were signals from the top to
back off of profiling, don't focus as much, agents not focusing
as much on capturing people as moving them through, not putting
things together.
I have some basic questions that we learned before, and I
was very disturbed at some of the briefing. My understanding is
in public record that we didn't know he paid cash, because we
don't collect the information on cash, because 20 percent or
some percentage of people who do foreign travel pay by cash and
that that wasn't in his--we didn't know he paid cash. That is
public record. Is that true?
Mr. Leiter. I think it is true that we did not know he paid
cash. One note, I would say, Mr. Souder. I think you are right.
Roughly 20 percent of global passengers pay cash. That
proportion, from the region he came from in Africa, is vastly
higher, so frankly, a cash payment for a ticket from where he
bought his ticket really would not raise any suspicion.
Mr. Souder. We also didn't know that the British had him on
a no-fly list. Is that correct? That is publicly reported.
Mr. Leiter. The British did not have him on a
counterterrorism no-fly list. The British had----
Mr. Souder. But they had him on a no-fly list.
Mr. Leiter. He did not have a visa----
Mr. Souder. He didn't have a visa, so he couldn't fly.
Mr. Leiter [continuing]. For criminal purposes.
Mr. Souder. So the question is, and this is what I would
ask you, in any type of basic tracking or intelligence, in
narcotics and that type of thing, you build a system. When a
business is trying to figure out risk of something, they build
a system.
The cash would not be relevant in normal, but the cash
becomes relevant if the father said this, and you knew you were
watching something from there, and you are tracking a ticket.
Then all of a sudden the cash is relevant. The fact that he
didn't have a visa was not relevant, because it wasn't relevant
to terrorism. But the fact that he was a liar on his visa form
suddenly becomes relevant, once you know that the father
called, and he bought cash in that.
In other words there is a point system. My understanding is
you don't have a point system. Is that true?
Mr. Leiter. Congressman----
Mr. Souder. In other words there is no way to pyramid the
information.
Mr. Leiter. Congressman, I don't think that is quite true,
but I don't want to quibble with your point, because I think
you are exactly right. Those individually----
Mr. Souder. Irrelevant things, yes.
Mr. Leiter [continuing]. Inoffensive bits of data add up to
a larger picture. I will say that over the past several years,
as we have tried to ``accumulate data'' so all of that data can
be shared and analyzed together, one of the consistent
challenges we have faced at the National Counterterrorism
Center is these bits of data that aren't terrorism information,
but could add to that picture.
That has been one of the most significant obstacles we have
faced in making sure all that information can be effectively
analyzed.
Mr. Souder. But would you not agree that there are things
where you are building a broad picture, and there are things
that are specifically relevant to getting on an airplane? In
other words I know early on until they somewhat improved the
system, that one time going through the Washington airport, six
of the seven people in secondary where members of Congress.
Why? We got out early. We bought e-tickets. We paid cash.
That those are logical things you watch for in an airplane,
and they build that, but you might not need them in your full
terrorism bank. Do you have any ability to separate when you
are getting on an airplane, when you are getting at something
else from kind of this general pool? Otherwise, you will have
so much information that will be indecipherable.
Mr. Leiter. On that, Congressman, I would really defer to
Deputy Secretary Lute on their screening----
Mr. Souder. Then let me tie a question with that, that we
worked hard in the very original bill to make sure that
Homeland Security was going to be at as many posts where they
were doing visas and as many posts at airports. You had 50
deployments. Are you asking for more?
In other words the whole point of port security in airports
is not to kind of arrest them after they have blown everything
up. It is to get it before it gets here. Are you asking and
requesting more overseas deployments? Are you going to get this
kind of information where they can say, okay, this is airplane
specific, this is harbor specific, as opposed to just general?
There may be something--for example, somebody's shipping
orders. That may be relevant in a port, but not relevant to the
total counterterrorism center.
Ms. Lute. Congressman, on each of these lines we are doing
more. As you know, the Department of Homeland Security has no
authority abroad. But we do have programs where we have people
deployed for precisely this purpose. These are limited
programs. We have expanded them as Congress has given us the
resources to do so. We will expand them again. We have expanded
them in the wake of this episode.
Mr. Chairman, if I could just make one thing very clear
about the Secretary's leadership and your presence today, as
you know, she had planned--there was international travel that
conflicted with this hearing today. I was offered in part
because I went abroad immediately at her direction with my
colleagues to raise some of the issues that you are raising
about the kind of information that we are collecting, about the
kind of technology that we can deploy, about the weaknesses
that exist in the system and how we can work collectively to
raise that bar.
Mr. Chairman, with your staff it was coordinated and agreed
that that I would appear for that reason.
Mr. Souder. With all due respect, it isn't true that you
have no authority abroad. You have the right to reject their
entry into the United States.
Ms. Lute. Absolutely right, Congressman. There is no
question. We do--we can----
Mr. Souder. A container doesn't have to come in. A person
doesn't have to come in. We have that authority.
Ms. Lute. That is correct. But to your point about
additional information, we have made that change in Homeland
Security, taking information that previously under our pre-
existing protocols was related to admissibility and not putting
it in the service of making flying determinations.
Chairman Thompson. Thank you.
Time has expired.
The Chair now recognizes Mr. DiFazio for 5 minutes.
Mr. DeFazio. Thank you, Mr. Chairman.
Ms. Lute, you know, we wouldn't have any imaging technology
capability today if it hadn't been for Kip Hawley. You know, I
have been a fan of this since I was first exposed to it about 8
years ago. I kept bumping up against that ``Oh, my God, we are
going to see people's skin or bodies or images'' or whatever.
Kip Hawley, you know, after a number of failed
administrators, really focused on this. He pushed it through. I
kept saying, ``Isn't it just the way you get software? It
doesn't have to be your body. It can--'' and Kip finally got
that done.
So the point I am making here is we need a TSA
administrator. I am going to ask this question, which I asked
Ms. Napolitano last spring. Can't you just get it out of the
way and allow the people in the TSA to unionize? It will not
impinge, unlike some wacko Republicans think, on National
security. Just get that out of the way so that won't be the
thing that stalls the new TSA administrator.
She said she wanted to wait for an administrator to get it
done. You can't wait. She needs to make the decision, get it
done, give them those rights and get that off the table, and
then the next administrator can just deal with security issues
and their history and background, and not this specious issue.
That is just a message I wish you would deliver to her, because
she said here, you know, to me quite some time ago she was
wanting to move this forward, but she wanted to wait for the
administrator. Can't wait. Get it done.
Point No. 2, you know, the imaging technology is good. It
may or may not have worked in this case, but it has to be mated
with something that does vapor detection. Are we full out there
working on vapor detection or trace detection? You know, I mean
dogs are great, but, you know, we need, you know, maybe, you
know, either we need a heck of a lot of dogs or, you know, we
need some technology that is more dependable than those puffer
machines.
Ms. Lute. You are absolutely right, Congressman. This
technology does represent an improvement in our overall
capabilities, but it is only one part of a layered system.
Other technology has to be brought to bear as well, as well as
improved processes, improved information gathering across the
board.
We are working very closely and have established a high-
level working group with the Department of Energy and the
National labs to look precisely not only at are we using
existing technology to best effect, but what are the promising
new technologies that we can then add to these multiple layers
to ensure the best safety and defense possible?
Mr. DeFazio. Okay.
To anybody, are all--I hate these stupid names; I don't
know, the Terrorist Identities Datamart entire and, you know,
whatever, TIDE? Are all the people on the TIDE list now
selectees? I don't see why they wouldn't be. It is an
insignificant number of daily passengers compared to the number
of people who fly daily. It would not be in an imposition. Are
they now also selectees?
Mr. Leiter. Congressman, they are not, although I must say
I very much appreciate your sentiment. Frankly, from my
perspective as the director of NCTC, it is no skin off of my
back if they all were.
Mr. DeFazio. There are 500,000 of them. They are worldwide.
There are 3 million-something people fly a day. You know, I
mean it would add significantly to the burden. Does Homeland
Security object to this?
Ms. Lute. Homeland Security has no objection to that, to
any measures that enhance the security of the traveling public.
Mr. DeFazio. Do you think that would enhance security, that
anybody who is on the TIDE list is a selectee?
Ms. Lute. Rather than going----
Mr. DeFazio. Yes or no. I am running out of time.
Ms. Lute. If any--it takes----
Mr. DeFazio. You don't know.
Ms. Lute [continuing]. It takes layers of defenses--
Mr. DeFazio. Okay. All right. So you are sort of no.
Mr. Leiter[continuing]. Respectfully.
Mr. DeFazio. Yes, yes.
Mr. Leiter. Again, I respect your views, and I am happy to
do it, but the pressure on NCTC, on DHS over the past 8 years
has never been in that direction.
Mr. DeFazio. All right.
Mr. Leiter. It has always been in the exact opposite
direction. So I just want to recognize this is a very changed--
--
Mr. DeFazio. I understand, but, you know, Congress acted,
and we pushed, and we have in place now an appeal system. So if
somebody is on that list, like John Lewis from Georgia, our
colleague, or, you know, former Senator Kennedy, others who get
on the list, you know, there is an appeals process. You can get
off the list.
But why not err on the side of caution? Anybody on that
list becomes a selectee. They at least get that slightly higher
level of screening. They have some interaction with a, you
know, with an officer, you know. I just think that to me, and
again, it would be a very, very, very infinitesimal percentage
addition to the daily workload.
Mr. Leiter. Congressman, I agree in many ways----
Mr. DeFazio. Okay.
Mr. Leiter [continuing]. But would note it would be about a
40 or 50 times increase in the number of selectees we have
today.
Mr. DeFazio. Yes, but I don't think so on a daily basis. It
is 500,000 people on the list. How many of them fly on a daily
basis, you know, when there are 3 million people a day flying?
I mean I just don't think it would be.
Mr. Leiter. But we currently have 14,000 on the Selectee
that would increase them 40 to 50----
Mr. DeFazio. Yes, but I know it would increase the list
that much, but in terms of daily workload, it would be nowhere
near that.
One other quick question to State. You talked about you
have the authority to immediately revoke a visa. You know, but
you want to communicate. Then you said, but if it was urgent,
you would act.
Have you ever had a recommendation the other way to you,
that you revoke a visa that you didn't revoke?
Okay. Thank you.
Thank you, Mr. Chairman.
Chairman Thompson. Thank you.
Thank you very much. We have been told that some votes will
happen, and I have been fairly lenient with time. But in the
interest of giving every Member an opportunity to ask
questions, we will strictly adhere to the time.
The gentleman from Alabama, Mr. Rogers, for 5 minutes.
Mr. Rogers. Thank you, Mr. Chairman.
As everybody on this committee knows, for many years I have
been a vigorous advocate of canines' use and remain that way,
and I want to talk mostly about that.
Before I do, I want to visit the subject that my colleague
from Oregon brought up about the administrator who was
proposed. The administration didn't propose him until
September. I mean they had been in office 8 months, so if this
was such a priority with the administration, he should have
been proposed earlier.
Secondly, you did raise the issue that I care about. That
is canine use. Right after this Christmas day bombing,
Secretary Napolitano in her remarks--White House press
conference--listed three or four items that the Department was
going to turn to to enhance our security layer system, and one
of them was enhanced canine use.
I sent her a letter since then, expressing again, as I have
in this hearing and in other venues, my concern that we aren't
utilizing that asset enough. I know for a fact that TSA only
uses 750 canines. These are very inexpensive, very effective
means of technology.
You have stated in your statement, the written statement,
in two different places that you have increased your use of
canine detection dogs, explosive dogs, in our transportation
hubs. Can you tell me where and how many and what your plan is
on that asset?
Ms. Lute. In this open setting, Congressman, I am not going
to detail any of the specific security measures that we have
taken, but we believe that canines are an important part of the
multi-layered defenses that we have been talking about. We look
to use them to the greatest extent possible. We know their
value. We are convinced of it, and we are going to expand our
use.
Mr. Rogers. Okay. But you haven't significantly expanded
them since the Christmas day bombing.
Ms. Lute. But we have in fact expanded them. But the
details of that in this setting I am not prepared to explain.
Mr. Rogers. That is fine. I do want to get back with you in
a more private setting, but I want to address a new technology.
Currently, the Amtrak, the Capitol Police and the Federal
Protective Service all use a new type of canine explosive
detection dog called a vapor wake dog. What it is is when
somebody walks by, the dog detects the vapors in their wake. We
all leave a wake when we walk by. Explosives in particular
leave the smell, the odor, there for 15 minutes in that wake.
So when it comes to transportation hubs like airports, bus
stations, subways, whatever, the dog doesn't have to smell the
person directly. It can just step by when the person walks by.
All these entities use it, but TSA does not use it. The
Capitol Police, as I said, uses it. The Secret Service is now
looking at it. They are going to probably start using it. Why
has TSA been so reluctant to use that technology?
Ms. Lute. Congressman, we focus on layered defense, as we
have been discussing here this morning, and we are examining
all aspects of layers, including the increased use of canines.
As I mentioned, the Secretary has made very clear her
determination that we look at promising new technologies,
techniques, canines, leave no stone unturned to increase the
security of the traveling public.
Mr. Rogers. Well, they are used extensively in Europe. One
of the things I was hoping that Secretary Napolitano would do
during her trip to Europe--and I thought about it when she
announced it--was I am hoping that as a part of the agreements
that we worked out with our allies around the world, that for
planes that are destined to the United States, that we can at a
minimum deploy dogs, canines to those airports to be at the
gate of any plane that is leaving for the United States to make
sure that at least those passengers are screened with that
layer of security that we have some control over.
If they want to let people get on the planes going
elsewhere, that is their business, but if it is coming to this
country, I want to make sure they are screened with every tool
that we have got in our toolbox. A frustration that I have got
is we are spending billions a year on bells and whistles, and
we have a very simple technology that works, and we aren't
using it anywhere close to the level that we should be using
it. So I would ask you if you are going to make this a priority
is to go forward and in the near future.
Ms. Lute. Yes, sir. As the Secretary did make clear to her
European colleagues when they met together on this issue at her
request, there are number of measures that need to be taken.
This is not a business-as-usual environment that we are in, and
it takes the collaboration of all of us to be able to assure
the traveling public that we are doing ever we can to keep them
safe, including measures such as you have outlined.
Mr. Rogers. Great. Thank you very much.
Thank you, Mr. Chairman.
Chairman Thompson. Thank you very much.
The Chairman now recognizes Representative Cleaver for 5
minutes.
Mr. Cleaver. Thank you, Mr. Chairman.
Ms. Lute, you addressed this already to some degree, and I
am not sure how much you can discuss this issue here publicly,
but you had mentioned that you and the Secretary had traveled
abroad in hopes of working out some cooperative agreements with
our allies in this fight against terror.
One of the questions that maybe you can answer here, and I
would be interested in hearing, you know, some of the more
detailed information in the right setting, proper setting, but
is there any willingness abroad to support what we are trying
to do in terms of aviation safety for other countries to
contribute financially to enhance technological measures, I
mean? Or are we the only Western nation that is engaged in
spending a lot of money in trying to increase the technology or
create more sophisticated technology?
Ms. Lute. Congressman, this was an extremely intensive
trip. My many years in the Army prepared me well for the
conditions under which we were traveling.
The dialogue with our international partners could not have
been more supportive. They recognize almost universally that
this is not a U.S. problem. This is not a Dutch problem. This
is not a Nigerian problem. This is an international problem
that the responsible governments of the world must come
together to address. Again, they all agree that in the area of
information gathering and sharing, we need to do better, and we
can.
In the area of technology, we are not deploying existing
technologies to best effect, and there are new and promising
technologies. We are not the only ones with an investment in
technology and reliance. It is one of the multiple layers of
defense that we have in place.
Equally, there is a recognition that this global system, as
we saw on Christmas day, with an access to any part of this
system, you potentially have access to the entire system, so we
all need to come together, and they recognize those
responsibilities. The Secretary is leading a series of regional
dialogues leading to a major conference on this issue so that
concrete actions can be taken in the information sharing,
technology, and system strengthening.
Mr. Cleaver. I have no other questions, Mr. Chairman. Thank
you.
Chairman Thompson. Thank you very much.
The Chairman now recognizes Mr. McCaul for 5 minutes.
Mr. McCaul. Thank you, Mr. Chairman.
This was clearly a failure in intelligence. I think all the
witnesses have agreed to that. The President of the United
States has as well. It is more than a failure to connect the
dots, as we talk about so much. It is a failure to identify
dots or specific threat information coming in and acting upon
it appropriately.
We had the Christmas bomber's father going to the embassy,
warning us about his son. The State Department issued a cable
that basically stated that and sent it to law enforcement, and
I assume to the NCTC, stating that information had posted just
that Farouk may be involved in Yemeni-based extremists.
I think Members of Congress and the American people don't
understand why with that type of information and Director
Leiter with specific intelligence coming in through the IC, the
intelligence community, why that wasn't linked together, No. 1,
and why it wasn't acted upon to ensure that this man never got
on this airplane in the first place.
I think we agree that this visa should have been revoked
immediately, given the information. I can't get into the
classified information that you are privy to, but it was
specific. What happened here?
Mr. Leiter. Congressman, some action was taken, but as you
have identified, as I have talked, we would say it was
obviously not sufficient, which was his name was entered into
the Terrorist Identities Datamart Environment, but that didn't
have automatic repercussions in terms of screening, visa
revocation, or stopping him from boarding the plane.
The other intelligence simply wasn't identified and
associated with this individual. I can tell you that there was
concern on the intelligence community's part about potential
attack by al-Qaeda in Yemen, and we were concerned even about
the timing of that. What we didn't connect was the individual's
name or where that attack would occur. That was our failure.
Mr. McCaul. Was that because it was misspelled--the name
was misspelled? I mean to me, you know, if you type my name
into Google, for instance, M-C-C-A-U-L, they will say, did you
mean M-C-C-A-L-L. and so do you not have a similar type of
capability?
Mr. Leiter. Actually, the misspelling did not affect NCTC
in any way. It did affect, as I understand it, and I will defer
to Under Secretary Kennedy on this, from our perspective when
his name was sent in, we actually put the spelling in both
ways. The technology we use, it wouldn't have made a
difference.
Mr. McCaul. Did you not have the cable that the State
Department sent?
Mr. Leiter. We did, and we inserted the spelling based on a
number of things.
Mr. McCaul. Yet you made the decision not to revoke the
visa, given that information?
Mr. Leiter. I don't have the authority to revoke a visa.
That is an authority----
Mr. McCaul. Right. Can't you call Secretary Kennedy and
say, ``You know, I think we have got a problem here. We ought
to think about revoking this visa.''
Mr. Leiter. The intelligence community can, frankly. That
normally doesn't occur, if the nomination itself comes from the
State Department, because----
Mr. McCaul. Well, I think there needs to be a lot better
coordination going on here between these two entities.
Mr. Kennedy, why, given the information that you had, why
wasn't the visa revoked?
Mr. Kennedy. Sir, as I mentioned earlier, when we get any
information, when anyone appears at an American embassy and say
that they have doubts about someone, we immediately generate
what is called a Visas Viper message. We send that to the
entire law enforcement and intelligence----
Mr. McCaul. My time is running out. I understand the
process, but you had this information, and you didn't revoke
the visa.
Mr. Kennedy. Because----
Mr. McCaul. I mean the cable I just read----
Mr. Kennedy. Right.
Mr. McCaul [continuing]. Makes it pretty clear that this
man is associated with extremists in Yemen. You didn't revoke
his visa.
Mr. Kennedy. What it was, sir, his father said he was
associated with this, and so we then asked the intelligence and
law enforcement community if they had any other information. I
don't want to take much of your time. I would be glad to visit
with you afterwards.
Mr. McCaul. Well, I think the father is a very credible
source. This isn't some anonymous person coming in saying this.
Mr. Kennedy. We have people coming in, sir, to American
embassies every day, attacking their relatives.
Mr. McCaul. Well, let me just--my time--this was a failure
extraordinaire, and I sure hope it never happens again.
Deputy Secretary Lute, the last of my remaining time, they
have identified a vulnerability in our system. I am very
concerned about future flights now. The system didn't work. The
screening--you know, they are always a simple genius, you know.
They use chemical explosives, which would be detected through
X-ray, but not through the magnetometer.
I know we are focusing on the 16 countries of interest in
terms of pat-downs and more enhanced screening, but I am
concerned about still the majority of the airports out there
where we are still vulnerable. They could still use this
technique and get chemical explosives through the magnetometer.
What is the Department of Homeland Security doing about that?
Ms. Lute. Congressman, we are not just focused on those 16
places that you have identified. We are focused on aviation
security globally and the traveling public, to ensure their
safety.
People have talked about silver bullets. We don't look for
silver bullets in Homeland Security. We know it takes a layer,
multiple measures of layers, not just by us, but by our
international partners, and it takes constant vigilance.
We have made some adjustments internally now to take the
information that we get, push it forward where we have teams on
the ground or to authorities in airlines where we don't have
specific teams. We are looking to expand our teams as well.
This is not a business-as-usual response. No one will be
satisfied----
Mr. McCaul. But my point is there are still many airports
vulnerable to the same technique deployed by this terrorist.
Chairman Thompson. The gentleman's time has expired.
The gentleman from Pennsylvania, Mr. Carney, for 5 minutes.
Mr. Carney. Thank you, Mr. Chairman.
I have to echo the sentiments of a number of our colleagues
today, who I am very dismayed that the Secretary herself is in
here. I mean it is probably fair to ask where the hell is
Secretary Napolitano for this hearing, to be quite honest.
I understand, Deputy Secretary Lute, that you are prepared
and that is great, but she was invited. She needs to be here to
address something of this magnitude. My first question is why
was her first response to the public that the system worked?
Ms. Lute. Congressman, if I could, and I clarified before,
the Secretary had international travel that was originally
conflicted. We coordinated with the Chairman's office. She has
been in regular talks with the Chairman, other Members of this
committee. She dispatched me with my colleagues around the
world to work aggressively with international partners, part of
the reason my appearance here was coordinated and agreed.
What the Secretary has made clear in her initial response,
she was responding to in the environment of what are we doing
to address this concern now? How are responding to the
information that we would have to ensure that there are no
other flights that are subjected to any danger or that pose any
threat to the American public?
Mr. Carney. I want to shift gears slightly here. You and I,
last time we spoke, I believe, was New Year's Eve. That is
right. How is the QHSR coming? Are we further down the road?
Are we going to see it soon? Frankly, does the QHSR lay out a
sort of chain of command that would obviate some of the issues
we are talking about today?
Ms. Lute. We did speak late New Year's Eve, in fact. The
QHSR from our perspective is concluded. It is with the White
House right now, ensuring final interagency coordination prior
to release. As I mentioned to you, we are on schedule that I
discussed with you.
We look for the QHSR, together with the bottom-up review of
the Department and a number of other measures that we are
taking internally to clarify roles and responsibilities in what
is a significant enterprise for this country--that is, homeland
security.
We believe that the QHSR lays this out in a clear fashion,
the roles and responsibilities of other Members, other parts of
the Federal Government, State, local, law enforcement. It is an
enterprise to ensure that this homeland is a place where the
American values, aspirations, and way of life can thrive.
Mr. Carney. Okay. Thanks. Just one more question, and you
didn't answer my second question, my first comment. Do you know
why the Secretary said the system worked in her first reaction?
Ms. Lute. Congressman, as she has made clear, she was
responding to a series of questions that were also related to
what are you doing in response to this information? What are we
doing now to ensure that the traveling public is safe--planes
in the air, airlines? What information are we pushing out?
Mr. Carney. Thank you.
Mr. Leiter, I just have a couple of moments left. By the
way, sir, I respect you enormously and what you bring to the
table, and I really want to know from your perspective, was
there a single point of failure, a double point of failure,
multiple points of failure in the Christmas day attack?
Mr. Leiter. Multiple.
Mr. Carney. Multiple.
Mr. Leiter. Yes.
I am trying to save you time, Congressman.
Mr. Carney. We will have a chance at some more questions,
Mr. Chairman?
Chairman Thompson. Well, we can, or we can submit them for
the record and get a response.
Mr. Carney. Okay.
Chairman Thompson. Multiple probably could go a long time.
Mr. Leiter. Congressman, if you would like me to expand, I
always can, but I was----
Mr. Carney. Well, no, no, as the Chairman of the Oversight
Investigation Subcommittee, I think maybe we will have you come
in and chat with us a little bit. I will appreciate that.
No more questions, Mr. Chairman.
Chairman Thompson. Thank you very much.
I don't want the committee to be misled. I have talked with
the Secretary 2 days ago. We did not talk about her non-
attendance or attendance at this hearing. Staff did communicate
based on a directive we received that the Secretary would not
be here, and we worked on Deputy Secretary Lute's presence.
That changed. At a minimum, based on that change, somebody
could have communicated back to the committee one way or the
other that we told you we weren't going to be here, we are here
now, but we still can't come because of some other things. That
is the courtesy I think the committee still deserves, and it
does not require comment.
The gentleman from Pennsylvania, Mr. Dent.
Mr. Dent. Thank you, Mr. Chairman.
Mr. Leiter, based on your testimony, your written testimony
and also your testimony that you gave last week before the
Senate, it appears you believe that the Federal Government did
in fact collect the dots, but did not recognize the linkages
between those pieces of information. Is that a fair assessment
of your statement, your position?
Mr. Leiter. Yes, definitely.
Mr. Dent. Isn't it true that the NCTC is designed to be a
major, if not the premier intelligence fusion and analysis
center?
Mr. Leiter. We have the statutory responsibility to be the
primary analytic center for counterterrorism, and we along with
the CIA have primary responsibility on it.
Mr. Dent. Thank you.
I also understand that the Intel Authorization Act of 2010
that passed the House Permanent Select Committee on
Intelligence, but was not considered on the House floor,
included sharp decreases in staffing levels for the Office of
Director of National Intelligence. Isn't it true that your
staffing at the National Counterterrorism Center is included in
those DNI staffing levels and could have been very negatively
impacted?
Mr. Leiter. Congressman, that is correct. As Director Blair
noted, I believe, last week, my discussions with him in
December were about how I was going to absorb cuts of up to 20
percent of my personnel areas to include analytic and
watchlisting personnel.
Mr. Dent. So then do you have enough analysts to connect
these dots?
Mr. Leiter. Well, believe me, it is a very, very small
silver lining and not a silver lining I really wanted, but
those initial cuts have now been canceled for us. We have been
working with the DNI and the----
Mr. Dent. So you do have enough analysts?
Mr. Leiter. No. I have already discussed with the DNI, and
he has discussed with the Office of Management and Budget the
need for additional analysts and individuals to work on
watchlisting. So we enhanced those watchlisting records, so the
right people are on the No-Fly list, the Selectee list. Right
now I don't have enough people to do that.
Mr. Dent. So you are saying, then, additional analysts, and
not fewer analysts, as HPSI proposed, that would help you
accomplish your intelligence fusion mission?
Mr. Leiter. Yes, but I do want to make clear I don't look
at this as this great opportunity to grow.
Mr. Dent. I understand.
Mr. Leiter. I look at it as the realization that we can't
do the mission as expected, and we weren't doing as well as we
did because of the assets we didn't have and the assets we were
potentially losing.
Mr. Dent. Thank you, sir.
To Deputy Secretary Lute, I understand that while at the
Schiphol Airport in Amsterdam, they have these full body
imagers, as you know. They were not used at the checkpoints for
the flights bound for the United States on Christmas day. In
fact, within the United States we have only 40 of these
machines at about 19 airports.
While I know that you can not guarantee protection,
particularly when you are relying on human interpretation of an
image, do you believe that the whole body imager would have had
a better chance of detecting or identifying Abdulmutallab's
explosive device than the current technologies employed at
airports?
Ms. Lute. Congressman, we believe it represents an
improvement over our current capabilities, but again, it is
only part of a layered system.
Mr. Dent. Understood. In order to address privacy concerns,
some of the local vendors have developed these so-called auto
detection software for their whole body imaging equipment with
the goal of getting the TSA image observer out of the process.
This auto detection technology, I am told, is currently being
tested over in Schiphol and in Amsterdam.
Is the TSA, the Transportation Security Lab, or the S&T
director examining this auto detection technology? If so, when
can we expect to see some preliminary results?
Ms. Lute. We are examining all aspects of advanced imaging
technology, whole body imaging. We are aware of some of the
technologies that exist out there, and we are also engaging in
dialogue with our international partners like the Dutch to see
what they have, what they are using. We believe this is an
enhancement.
We take the privacy concerns very seriously. There are a
number of measures in place with respect to whole body imaging
now, the dislocation of the observer, the non-retention of
image. But we believe that this is an area where we don't want
to settle for just existing technology, but also want to
explore most promising new.
But we also don't want this to take forever. We want to put
tools in the hands of screeners now to enhance security.
Mr. Dent. Good. Then I hope you will certainly communicate
with our friends in the Senate that stripped the amendment that
was placed in the TSA authorization by the House that would
restrict the use of these whole body imagers.
Finally, there appears to be a debate on which advanced
technology system is better--backscatter radiation or the
millimeter wave technology. Have you done an analysis on the
health and safety of both of those types of systems? Did you
identify any risks in multiple daily exposures?
Ms. Lute. So, Congressman, I am aware that there are
differences. I am not a scientist. Our science and technology
folks, together with the Department of Energy and the National
labs, are working with TSA on this and other technologies as
part of a layered defense.
Mr. Dent. Could somebody report back to us? Could somebody
send a report back to us, which is the better technology?
Ms. Lute. Yes.
Mr. Dent. Thank you.
I yield back.
Chairman Thompson. Thank you.
We will get the gentleman's question answered by the
Department. Be happy to.
The gentlelady from Ohio for 5 minutes, Ms. Kilroy.
Turn your microphone on.
Ms. Kilroy [continuing]. The responsibility for failing
within their respective organization. I think coming before
this committee is part of that acknowledgment of responsibility
and the oversight that it ruled as given to this body and to
the United States Congress.
I think it is critically important that once we acknowledge
the errors, that we also provide a plan or hear from you your
plan to fix, to correct the problem, to make sure that people
aren't becoming complacent in the years since 9/11 and protect
the flying public. I thank those of you who made very clear
statements in your testimony, as you did, Director Leiter,
about that level of responsibility.
The more I hear about the Christmas bomber, the more I am
amazed at how he got on the plane. That continues today to
really stun me, that given the level of information, granted in
different parts of the system, that there was sufficient
information that, at least to me, it seems that he should not
have been allowed onto that plane.
I keep learning things through hearings, through briefings,
and through public news reports, that news reporters managed to
get some information that had not been shared with the
committee in prior briefings. But there was sufficient
information, apparently, for him to be tagged for questioning
when he got off the plane. I don't understand, I guess, why the
Customs and Border Protection was the agency that was charged
with questioning him when he got off the plane.
Ms. Lute. Congresswoman, that is we have standing protocols
that have been in place in this case since 2006 related to
admissibility issue questions. The Customs and Border
Protection persons were prepared on the basis of that
information to question him when he arrived.
We have changed that process. We now take that kind of
information and push it forward to a pre-boarding opportunity
that individuals be questioned before they get on planes,
precisely because we recognize now that there is important
information that can help us understand whether or not an
individual poses a threat to aviation security, and so we have
changed that process.
Ms. Kilroy. Well, I appreciate that things have moved
forward and people will be getting questioned ahead of the
process.
But when you have this incident that has occurred--and
thank God that actions were taken that all passengers and crew
were able to get off that plane safely--but once you have this
person, who has attempted this atrocious act, when and who,
what agency should be involved in taking custody of that
person? Who is trained to interrogate a terrorist? Who has
ultimate authority in the chain of command in this type of
situation?
Ms. Lute. I can only speak to the part about the
information that we had regarding admissibility. No one is
satisfied that this individual got on this plane with this
material. It should never have happened, and we have to do
everything we can so it doesn't happen again.
We are taking the information we have about admissibility.
He was at no time identified as a No-Fly or Selectee, which
would have triggered certain actions prior to his boarding.
Ms. Kilroy. I understand that, but he took actions on the
plane. Everybody on the plane was aware of that. People on the
ground were aware of that. So are Customs and Border Patrol
agents trained in the science of interrogating a terrorist that
has been taken into custody?
Ms. Lute. He was handed over to the Department of Justice
and the FBI.
Ms. Kilroy. So the reports that I read that Customs and
Border Protection interrogated him for an hour before he was
turned over to the FBI--you are saying that would be incorrect,
then?
Ms. Lute. No. Customs and Border Protection had him upon
presentation for entry, and he was handed over to law
enforcement officials.
Mr. Leiter. Congresswoman, if I--I got it.
Ms. Kilroy. Yes.
Mr. Leiter. He was initially arrested by the Customs and
Border Protection officers, who were there at the airport.
Immediately upon being removed from the aircraft, he was
immediately turned over to the Federal Bureau of Investigation.
Ms. Kilroy. I also want to endorse the line of questioning
that Congressman Rogers led with respect to the use of canines,
because I think that they have amazing abilities to detect, and
they are very observant of body language as well as their use
of different senses.
With respect to the changes in the visa process, have there
been any changes in the length of visas that are going to be
offered, allowed to people so they could come to this country?
Mr. Kennedy. Mr. Chairman, should I answer the question?
Chairman Thompson. The gentleman will answer the question.
Mr. Kennedy. I will be glad to see the Congresswoman and
come visit with her and discuss that or submit an answer for
the record, whichever you prefer, sir. I am prepared now.
Chairman Thompson. You can answer the question now.
Mr. Kennedy. Ma'am, it really doesn't matter whether a visa
has a validity of 1 day or 1 year. If information comes to us
on the day after a visa issue or 30 days after or 90 days
after, if the intelligence or law enforcement community comes
to us and said, ``You cleared this person, because there was no
record when you cleared them. We now have something new on this
person. That is, he or she is a danger to National security,''
we revoke the visa that day.
Ms. Kilroy. Thank you.
Chairman Thompson. Thank you.
The gentleman from Georgia for 5 minutes, Mr. Broun.
Mr. Broun. Thank you, Mr. Chairman. Mr. Chairman, during
your opening statement you seemed to blame the Bush
administration on this instance on Christmas day. To me there
is a whole lot more going on here than just blaming President
Bush and his administration, because I think this
administration has a lot to blame, too.
Deputy Secretary Lute, I assume that you are just a good
soldier and carrying out the orders that you were given by your
chain of command. You mentioned attempted attack, and they have
actually--before your testimony, you just talked about that
during your discussion about the Secretary not being here.
I am incensed, frankly, that she is not here. Even the
foreign visit was to brief people in Europe, and she ought to
be here briefing these people in this committee who have
responsibility to ensure the safety of the American public.
Also, the Secretary said that the system worked, which is
hogwash. The Chairman asked if there was any disciplinary
action being taken, and all of you all said no. Frankly, I am
incensed by that, and I think the President of the United
States should ask for the resignation of Secretary Napolitano
and get somebody there who is not in la-la land. Frankly, I
think she is in la-la land.
I don't know who else in your Department is, but whoever he
is, they need to go, because the safety of the American people
absolutely is critical on having good leadership at the top. I
don't think we have that here in this country.
So I am incensed. I think other Members of this committee
are incensed that the Secretary won't take her time to come
here and face this committee. I hope the President will take
disciplinary action and get rid of her and get rid of anybody
else in your-all's Department who are in denial, frankly, about
the seriousness of this.
In the United States Marine Corps, I was taught to know
your enemy. I have heard testimony from some other of the
members of this panel. They seem to get it. But I don't think
the Department of Homeland Security, and I am not sure the
President and his administration, get it.
We are facing not a war on terror. We are facing a war
against a group of fascists in this country who hate this
Nation, hate everything we stand for, including the freedom,
including the freedom we give to women, and they want to
destroy this Nation. We must as a Nation start facing the fact
that these are Islamic fascist terrorists, who want to use that
tactic in a war. Terrorism is only a tactic. We are not
fighting terrorism. We need to stop talking about that.
To me the failure here is political correctness gone amok.
There are many Members of this committee, principally on the
other side, who don't want profiling. We just had a hearing
about the undocumented attendees to a State dinner. We have got
a lot of undocumented attendees in this Nation that the State
Department allows to come into this country, and some that are
documented.
We need to change the whole philosophy of how we are trying
to protect this Nation. I don't think we are doing a proper
job. Frankly, I am incensed. I hope the President will start
paying attention to what is going on here and will stop this
inane thought of not profiling people that are entities that we
know hate our Nation and will do what is necessary to protect
the American public and keep this Nation safe.
Mr. Pascrell. Will the gentleman yield?
Mr. Broun. No, I won't.
Mr. Pascrell. You won't yield?
Mr. Broun. No, I won't.
Mr. Pascrell. Okay.
Mr. Broun. Because I have got just a minute left, and so I
want----
Mr. Pascrell. I will just say it later, so it doesn't
matter.
Mr. Broun. But it is absolutely critical that this
administration take serious our enemy. America needs to know
its enemy. It is radical--it is a bunch of radical folks all
over the world, who want to destroy it. They are going to
continue to attack us.
Whole body imaging is not going to prevent, and even the
canines are not going to prevent, bombings. There is no way
unless we search every body cavity on every person who wants to
come into this Nation.
But we know one of the big, glaring, flashing dots is
radical Islam. We have got to start focusing upon that. There
is absolutely no question about that. Our people are going to
die. Those who are worshiping at the altar of political
correctness are going to--that worshiping at the altar of
political correctness and not profiling our enemies is going to
result in killing American citizens.
With that, Mr. Chairman, I yield back. My time is up.
Chairman Thompson. Thank you very much.
The gentleman's time has expired.
We have two votes scheduled, and we expect to return in
about 25 minutes. The committee stands in recess.
[Recess.]
Chairman Thompson. We would like to reconvene the recessed
meeting.
We now will begin questioning with the gentlelady from
Nevada, Ms. Titus.
Ms. Titus. Thank you very much, Mr. Chairman. I do have a
couple of questions. I would like to start with Mr. Leiter.
On several points in your written testimony, maybe not so
much in your oral testimony, you note that the intelligence
community possessed strategic intelligence regarding al-Qaeda
in the Arabian Peninsula, and you note that they had--and I put
this in quotes--``had the intention of taking action against
the U.S. prior to the failed attack on December 25, but we did
not direct more resources against them nor insist that the
watch list criteria be adjusted prior to the event.''
You also note that the NCTC and intelligence community had
long warned of the threat posed by this group in the Arabian
Peninsula. But it appears that despite your intelligence on
this and your concern about it expressed here, that the
necessary steps weren't taken to prevent this.
So I want to ask you who was receiving your reports about
this intelligence? Why do you think they didn't respond to it
in the appropriate way?
Mr. Leiter. Congresswoman, I think everything you said is
correct in terms of encapsulating my statement. All of the
intelligence we write goes to a broad array of consumers
ranging from the President to the members of the Cabinet,
deputy secretaries and the like.
I wouldn't say, though, that nothing was done. It is that
the things that were done turned out not to have been ones that
stopped this threat. There was forceful action taken on a
number of fronts to try to disrupt various threats from al-
Qaeda in Yemen. What it didn't do is detect this thread or stop
this particular individual.
Now, steps were taken. Why do I think that we didn't shift
enough focus onto this individual? I do think that al-Qaeda in
the Arabian Peninsula, although we saw a desire and a
possibility to strike the homeland, I don't think we fully
realized the speed with which they had moved and actually put
that desire into action.
Ms. Titus. Well, I would ask you going forward, which is
the important thing, do you think we are putting enough
resources and enough attention on this growing threat in the
Arabian Peninsula?
Mr. Leiter. I think we have begun to move those resources.
I still don't believe we have all the resources we need. I
would also add that I remain particularly concerned, as I have
testified before this committee and others previously, I remain
particularly concerned not just about Yemen, but also in
Somalia and the flow of Americans of largely Somali descent to
Somalia. I think that poses a similar threat. Although Yemen is
the subject of today's hearing, we have to remain very, very
focused again on Somalia and, of course, on Afghanistan and
Pakistan.
Ms. Titus. Do you feel like the people who are higher up,
all this group that you report to, are taking your warnings
seriously?
Mr. Leiter. I think without a doubt. I believe the
President's immediate direction on shipping resources, Director
Blair's intervention here to make sure we have the resources,
and the rest of the intelligence community, I think we have.
Ms. Titus. Well, we need to. There is no question about
that.
Mr. Leiter. I agree with you wholeheartedly.
Ms. Titus. Just one other quick question for Ms. Lute. I
would ask you--now, we have put so much focus on the
international flights, because this incident was an
international flight, but we can't forget that 9/11 involved
domestic flight. We are not ignoring them or letting them go by
the wayside as we now suddenly focus on Schiphol, are we?
Ms. Lute. Absolutely right, Congresswoman. We are not
neglecting any part of the aviation security systems, nor are
we neglecting our land and sea borders, as we have this
particular focus on air. We have a number of measures in place
across the board to enhance our vigilance, increase our
information gathering and sharing, as we have been discussing,
working with technology in this multi-layer defense
domestically as well as internationally.
Ms. Titus. Thank you, Mr. Chairman. I yield back.
Chairman Thompson. Thank you very much.
The gentlelady from Michigan, Mrs. Miller, for 5 minutes.
Mrs. Miller. Thank you very much, Mr. Chairman.
You know, there have been lots of questions from my
colleagues about the process and the failures of our protocol,
et cetera. Many people have commented about the absence of
Secretary Napolitano, and I would associate myself with those
remarks.
However, I will also say that it is stunning to me that
Attorney General Holder or nobody from the Department of
Justice is here to talk to this committee and to testify to
this committee. I would respectfully request that at some point
he does testify before this committee.
Our responsibility is to have oversight, and I want to
focus, I think, on what has happened since the attempted act of
war, because that is what it was. It wasn't a criminal act. It
was an act of war by a terrorist, an enemy combatant. I was
stunned that this terrorist was not turned over to the
military.
Again, I am just incredibly dismayed no one from the DOJ is
here. Yet, it was they, under the direction of Attorney General
Holder, that made this decision to turn this terrorist over to
the FBI, and not as an enemy combatant. He made the decision. I
believe that the attorney general is creating a culture at the
Department of Justice that fosters an ideology of approaching
this war on terror like a simple police action.
I will cite a couple examples of why I say that, because I
do believe it is dangerous to our security, and I am very
concerned about it. We know, for instance, that before becoming
the attorney general, Eric Holder and his law firm represented
accused terrorists that were in the custody of the military,
and he urged their release to the civilian justice system. That
includes Jose Padilla. They were very proud about giving free
pro bono legal service to 17 Yemeni and one Pakistani, who
currently are at Gitmo.
We know that he and President Obama have placed many of
these attorneys in high-ranking positions at the Justice
Department--again, attorneys that provided free, top-flight
legal assistance to enemy detainees.
I mean my husband's an attorney. I know a lot of attorneys.
You might have pro bono work for a child abuse case, domestic
violence case. This is what they decided they wanted to give
free legal advice to: Enemy detainees.
We also know that the attorney general has stonewalled
Senator Grassley, who is attempting to discover who these high-
ranking Justice officials are and what their role is in making
these decisions.
We know that the attorney general has been a huge advocate
to close Gitmo and to bring these detainees to the United
States. We know that the attorney general has made the decision
to bring KSM and others implicated in the 9/11 conspiracy to
New York City for trial without consulting any security
officials in New York or other high-ranking officials in the
military or intelligence communities.
Our Ranking Member mentioned that he had not consulted
them--actually, I think it was on the Jim Lehrer Show, where he
said he consulted his wife and his brother before he made that
decision. So I have concern with that.
We also know that in this instance the attorney general did
not share, in the instance of the Christmas day bomber, that he
did not share the intelligence gleaned from the Christmas day
bomber with the military or intelligence officials before
giving the Miranda rights to this terrorist.
I know the President has said that no one is accountable,
or that no one will be held accountable, no single person, but
I believe that President Obama must hold Attorney General Eric
Holder responsible for the loss of additional intelligence that
would have been gained to protect our citizens from future
attack.
He has been rather flippant, I would say, in saying that he
is not afraid of Khalid Sheikh Mohammed being given a platform
to spout his anti-American rants in our justice system. He says
we have nothing to fear from giving terrorists constitutional
rights and access to our court. I disagree.
I am the only Member of this committee from the Detroit
area, and this incident may have faded in the front of many
papers, newspapers, and media across our Nation, but I will
tell you in Detroit we are looking every single day at this
terrorist, this enemy combatant, an act of war against America,
who was treated at the University of Michigan Burn Center,
which is probably the best burn center in the entire world, and
not only given one free court-appointed, taxpayer-funded
attorney, he has three--three--attorneys.
We are looking every day at what is happening at the
Federal building in the city of Detroit, all of the expense
that is being taken on by the Detroit Police Department at a
time they can't afford that kind of expense, and other security
officials, just to make sure that we have no incident there.
The first thing this guy hears when he gets off the
airplane is, ``You have the right to remain silent.'' Here is
your great justice system that we are having here in America.
It makes me crazy.
In the absence of anyone from the Department of Justice,
let me just ask Director Leiter. Do you think that Attorney
General Eric Holder's decision to Mirandize this guy denied us
the opportunity to garner very valuable information? Do you
think that if we got a terrorist in Afghanistan or Yemen or in
theater and we only interrogated him for 50 minutes, that that
would be adequate?
Mr. Leiter. Congresswoman, I will try to answer, of course.
I mean I am not from the Department of Justice. One thing I do
want to correct, though. I don't believe it is correct that the
information that was garnered during those initial 50 minutes
of interrogation was not shared with the intelligence community
or with the Department of Defense. I say that, because I was on
the video teleconference that evening, and----
Mrs. Miller. If you could, just a moment. I recognize he
did share the information, but he did not share the information
that he was going to Mirandize this, and that was my point.
Nobody was asked about that. That was Attorney General Eric
Holder's decision, apparently.
Mr. Leiter. I apologize, Congresswoman. I understood. I
just did want to make clear that the information that they
garnered was immediately shared with the intelligence
community. It was put to action. I think there was information
that was garnered from that initial 50 minutes of interrogation
that has been quite valuable.
Mrs. Miller. Well, my time has expired, so I would just
simply say that, Mr. Chairman, we are facing a new type of
enemy who doesn't consider the battlefield to be just in Yemen
or in theater. The battlefield that day was Seat 19A on that
Northwest flight, and these are enemy combatants. I think it is
dangerous for America to treat them as civil criminals. Thank
you.
Chairman Thompson. Thank you very much.
For the record, as you know, the Minority has an
opportunity to request a witness, and it could have very well
been the Minority's option to request Attorney General Holder
for this hearing, and they did not.
The Chairman recognizes the gentlelady from New York, Ms.
Clarke, for 5 minutes.
Ms. Clarke. Thank you. Thank you very much, Mr. Chairman.
Let me just say that as a New Yorker, I know that it is
possible that we have under previous administrations tried
individuals who seek to do us harm--terrorists, if you will--in
civilian courts and been very successful there. So, you know, I
think that this is an issue we can go back and forth with.
But I think that we have to also make sure that in doing so
we don't manifest through our conversations just the outcomes
that we are seeking to prevent. That is encouraging others, by
labeling enemy combatants, to become enemy combatants.
I think that we have the power and an expertise in our
Nation to address all of these concerns, and that is why we are
here today to encourage one another to use those talents and
expertise to do what needs to be done to protect the American
people. Certainly, as we review our failures and our mistakes,
we learn from them to strengthen ourselves as a Nation, to do
what has to be done to protect the American people.
So having said that, my concern has to do with our ability
to manage these databases. I have felt all along since, really,
hearing from constituents in my constituency that they have had
a very hard time getting off these lists, that we were building
a quagmire. I say that, because at a certain point the list
becomes the proverbial trying to find the needle in a haystack,
when you are not purging it, when you are not moving people
through the cleared list.
So I am just concerned that as we build out this data
infrastructure to be able to find individuals, to communicate
in real-time about individuals that we may have on one list,
but may not be on another, that the time that it takes to scan,
to data input, because it is my understanding that particularly
in the TIDE database, that there are people with similar names
in addition to the actual name. I am sure once you sort of plug
in a name, you are going to get a list of names.
I want to raise the question with each of you about how we
refine our capacity through data maintenance and gathering to
be able to do that type of ID in real-time. The GAO has found
that agencies involved in screening international visitors to
the United States do not screen individuals against all records
in the watch list.
Can we say that the system has become too cumbersome for
accuracy of screening to become more difficult over time? I
would like to get that response from each of you.
Ms. Lute. Congresswoman, perhaps I will begin, and then
Director Leiter may want to add to it.
There is an enormous amount of data being gathered. It is
one of the tools that we use for aviation screening, and we use
it for other purposes as well. We are constantly refining our
processes to ensure that we have the accurate information of an
individual that is in these databases.
One of the issues that I raised in my conversations with
international colleagues, and the Secretary certainly
emphasized as well, is creating a standard for passenger name
records so that we have as much information as we possibly can
about individuals. Are they who they say they are, and are they
fulfilling the intent they declare?
We do and have created a sort of one-stop for de-
confliction when people find themselves on a database
erroneously. It is called the Travelers Redress Information
Program. It is not yet a perfect system, and we acknowledge
that, but we are working very hard to address it.
Mr. Leiter. Congresswoman, believe me, I am very
sympathetic to your concerns, because I have the responsibility
to get through all of this data and make sure it is clean. We
want it as clean a system as we could have. I will note a
couple of things.
First, I think it is important to note that United States
persons make up a very small percentage of our high database,
very small percentage. In fact, you can only be in our database
if you are the subject of an active FBI investigation. Within
24 hours of that investigation being closed, you are purged. I
think we have a very good record for meeting that standard. So
I think that is point No. 1.
Point No. 2, are there simply better ways of doing this?
There undoubtedly are. Any names-based screening system has
inherent weaknesses. It requires not just a name, but you also
want additional data about that person if you can, whether it
is a birth date or a passport number.
The next step, really, is moving towards greater
integration of biometrics. Under Secretary Kennedy has already
noted some of those advances that we have made. I think both at
the initial screening when someone is getting on an aircraft,
but certainly when they are getting a visa, when they arrive at
a port of entry, the integrated use of biometrics, which is
there already, is extremely helpful.
It has to be expanded. There is a significant resource
tail, and there is also a significant civil liberties concern
that have to be addressed as we do this. But we know that is
the right way to go.
Chairman Thompson. Thank you very much.
The Chairman now recognizes for 5 minutes, Mr. Olson.
Mr. Olson. Thank you very much, Mr. Chairman.
Before I get started on my line of questioning, I would
like to identify myself with my colleague from Michigan's
remark on the decision to use the criminal justice system of
our country instead of the military justice system to prosecute
this individual.
Very briefly, what I have understood is when he was brought
off that aircraft after he had tried to kill all the people
aboard that plane, he was taken into custody, was taken to the
hospital for medical treatment.
Two FBI agents began asking questions. He was giving them
actionable intelligence for at least 50 minutes, intelligence
that saves lives. Those agents that were asking those
questions--there is an exception to the Miranda rights that if
you believe there is imminent information that is going to save
lives--there is another bomb on an aircraft or, as we saw
unfortunately on September 11, there are other aircraft in the
air with bombers like Mr. Abdulmutallab on it--then they have
discretion to ask questions. Again, for 50 minutes, by reports,
they got actionable intelligence information.
Five hours later, another group, a ``clean team,'' showed
up. The first thing they did was read him his Miranda rights.
No surprise, he hasn't talked since then. We will never know
what information we have lost and what risks and what damage we
may put to our country by not interrogating him fully and
getting all the information he had to learn about what al-
Qaeda's doing in Yemen.
I would like to change tactics here, change the tone of
my--I want to talk a little bit about--you know, one thing that
I believe is the most information we can have and the quicker
we get it, the earlier in the whole process, the better chance
we have to thwart it.
As we know Mr. Abdulmuttalab, it seems to be that he got,
at least from the information I have had, that his
radicalization, his radicalization happened while he was going
to school in Great Britain in England. The British intelligence
states he is--Islamic student organization in their fight
against extremism. Abdullahmatal--I am sorry--Abdulmutallab was
the fourth president of an organization like that in Great
Britain to be charged with a terrorism-related offense.
My question is is extremism on college campuses something
that the intelligence community is focused on, both abroad and
here at home?
Mr. Leiter. Congressman, I would be happy to talk about
this more in a closed hearing. I will say we have worked very
closely with the British as they look at their groups. We have
consistently seen connections between terrorists threatening
the United States and terrorist activity in the United Kingdom.
One of the things we have done as a response to this is
reinvigorate that information sharing to make sure that we have
full visibility into whether or not it is the schools or the
garage mosques or simply the splinter groups. I agree with you.
We have to make sure this information is shared very quickly.
Mr. Olson. Have we seen anything here domestically akin to
what is going on in Great Britain?
Mr. Leiter. Congressman, we have never seen within the
United States nearly the scale, scope, depth of radicalization
that we have seen in the United Kingdom. We have pockets of it,
and we are concerned with it. I wouldn't associate it with any
single environment within the United States.
Mr. Olson. Thanks for that.
One more question. Maybe I appreciate if it is two
sentences across the line in the classification system. But one
individual I am concerned about, and I hope I pronounced this
right, is Sheikh Anwar al-Awlaki, who had contact, we know,
with Mr. Abdulmuttalab, probably in Yemen, probably as part of
the, you know, the organization that helped him get trained and
certainly can keep him indoctrinated.
Also concerned as a Member from Texas. Apparently, there
were e-mail contacts between him and Captain Hasan who, as you
know, killed 13 soldiers at Fort Hood. I am just concerned. Do
you know of any other? He is using 21st century technology--
videos, teleconferencing technology, particularly, you know, of
sending that signal to England and Great Britain again. I know
I am harping on them, but is there any evidence that he has
been doing that home here in our country?
Mr. Leiter. Congressman, I really can. I can't go into
great depth here. I will tell you that the intelligence
community has been concerned with the activities of Anwar al-
Awlaki for some time. He was initially investigated in
association with the events of 9/11, when he was an imam in San
Diego, later in Northern Virginia.
I can tell you that even well before Major Hasan, but
certainly after the events of Fort Hood, NCTC, the FBI and
other agencies have been very, very focused on Awlaki, but also
other individuals like Awlaki, who are savvy to Western ways,
Western technology, modern technology, and their ability to
reach into our border through this technology.
Mr. Olson. I see that I have run out of time. Thank you
very much. Stay on him. Thanks.
Chairman Thompson. Thank you very much.
The gentleman from New Jersey, Mr. Pascrell.
Mr. Pascrell. Chairman, thank you.
Mr. Chairman, many of us have stressed one thing as Members
of this committee. If there is one thing we have stressed, it
is that the bureaucracy itself is as great a threat to our
National security as anything else. You heard the bureaucracy
today, part of it.
Let me just point out that Congress is not exempt from this
criticism. Indeed, this is at least the fourth of different
full committees to hold a hearing on the attempted attack of
December 25. This strikes me as entirely counterproductive to
what we are trying to accomplish.
It seems crystal clear to me that the events of December 25
were allowed to occur, because once again we have failed to
connect things in the information that we already had, we
already knew about. Once again, our intelligence agencies
failed to communicate with each other. This is a human error,
not an electronic error.
We spend a lot of time talking about the state-of-the-art
of these machines that are in airports and aren't in airports.
We have not told the American people the truth. Many binary
explosives are not detectable at this point.
We established a Director of National Intelligence, the
DNI, to serve as the head of the intelligence community. It
consists of 16 different agencies spread throughout the Federal
Government--16. Each of these intelligence agencies have
different standards for their personnel--each of them. 9/11 9
years ago--they still have different standards.
I would conclude that you are not going to get the proper
relationship amongst these agencies until you have basic
standards. In fact, the agency within all of the 16 that has
the toughest standards is the CIA. I would begin there.
But we established that position of Director of National
Intelligence to finally provide some leadership and guidance
over the intelligence community so that we could finally close
the gaps in this information sharing. Clearly, we are not there
yet.
What troubles me most about this incident was that we
allowed this individual to receive a visa in the first place to
enter the United States. I think of all those families who have
tried to get united and were denied a visa, because they
thought if they came to the United States, that they wouldn't
go back. Many of those cases were adjudicated correctly. Many
of them were not.
We never took steps to revoke his visa before he entered a
foreign airport to travel. We already had negative information
on this individual. Not only had the State Department spoken to
his father, but we knew that he traveled to Yemen. For young
men to travel from Nigeria to Yemen with no known legitimate
purpose--that should raise a number of red flags.
Mr. Leiter, Director Leiter of the National
Counterterrorism Center, is often described as the arm of our
intelligence community that is responsible for--I hate the
phrase, and probably you do, too--connecting the dots on
intelligence gathering. Do you agree that is your primary role
and responsibility? If so, doesn't that hold you primarily
responsible for the failure to connect the dots on the
intelligence we already had on this individual?
Mr. Leiter. Absolutely. I said several times, Congressman,
NCTC is the primary analytic organization. It was our
responsibility to do this. We didn't do that. There was another
organization that also had responsibility under the DNI's
standards. That didn't occur there either.
Mr. Pascrell. Do you wonder why some of us have concluded
that maybe we have added an extra layer of bureaucracy to the
intelligence apparatus that is slowing us down to get to the
goal line? Do you wonder why we think that at times? Or do you
think that the DNI is absolutely necessary to stop those who
wish to bring harm to our families, to our neighborhoods, and
to our borders? What are your thoughts? I know you work for
them. What are your thoughts?
Mr. Leiter. Congressman, I think the DNI is a useful
construct to advance intelligence reform. I do not think that
the DNI in this case, this construct or the layers, was the
problem. I mean I think many of the weaknesses you have
identified are fair weaknesses. I just don't think they were
the issue that caused this failure here today.
Mr. Pascrell. Do you have the authority you need to work
with intelligence across our Federal departments and agencies?
Do you have the authority to do that?
Mr. Leiter. Congressman, it is not easy for an----
Mr. Pascrell. I am not saying it is easy. Believe me, I am
not, Mr. Leiter. But my question is very specific.
Mr. Leiter. I do not, nor do I believe the DNI, as
currently constructed, has all of the authority necessary to
move all of the information in a way that will maximize the
likelihood of detecting these plots.
Mr. Pascrell. Mr. Chairman, I hope that--and I know you
were listening, and the Ranking Member, to the last answer. The
gentleman has been forthright. I thank him for his service to
his country. We have created--my conclusion, not their
conclusion--a monster. We will never get the safety of the
American citizens as we build these levels of bureaucracy that
do not get to the heart of the issue.
I would ask you to go back----
I would ask you to go back, Ms. Lute----
I would ask you to go back, Mr. Kennedy--to look at this
bureaucracy as being the systemic problem. This is human error,
but maybe it is human error precipitated by the fact that we
have created a bureaucratic nightmare so that no one is held
accountable. That is why you create bureaucracies, you know.
Thank you, Mr. Chairman.
Chairman Thompson. Thank you very much.
The gentleman's time has expired, but we always recognize
his leadership.
Mr. Leiter, In light of your question, we are going to ask
you to provide us what authority you think you need in order
for you to do your job in a manner you deem necessary.
Mr. Leiter. Mr. Chairman, I am happy to do that, and I
would work with the DNI. I would add that although I say that,
I don't have any particular authorities right now that would
quickly ensure that every bit of this data is shared with every
other component of the intelligence community.
Chairman Thompson. I understand, but you just said in
response to the gentleman from New Jersey's question that you
don't have it.
Mr. Leiter. Mr. Chairman, I am happy to go back, and we
will come back with recommendations to you.
Chairman Thompson. Thank you very much.
The gentleman from Texas, Mr. Green, for 5 minutes.
Mr. Green. Thank you, Mr. Chairman.
I thank the witnesses for appearing today.
I believe, as has been indicated, this was a failure of
intelligence, but I would like to make sure that I state that
it was not a failure of all intelligence personnel. I say this,
because we have many people who risk their lives on a daily
basis. Some, by the way, lose their lives, as was evidenced by
the recent event that we need not go into.
Their families--they see these hearings. I don't want their
families to assume that I have concluded that all intelligence
officers are failures, because I want them to have the morale
necessary to do a very difficult job under circumstances that
are extremely complicated, and sometimes almost impossible, if
not impossible.
I believe that the structural integrity of a plane at 3,000
feet traveling at 500 miles per hour is of paramount
importance. It is as important as anything that we deal with.
Because the structural integrity of that plane is so important,
I want a system that will reveal and allow us to capture the
Omar Farouk Abdulmutallab.
But I also want a system that will capture the
Abdulmutallab who doesn't pay cash, the Abdulmutallab who
doesn't ask for Seat 19A, the Abdulmutallab whose father
doesn't turn them in. I want a system that will capture the
Abdulmutallab whose religion I am not aware of.
If we focus only on connecting the dots that could have
been connected to the exclusion of designing a system that will
allow us to capture the Abdulmutallabs who are not obvious, who
are not intuitively obvious to the most casual observer, if you
will, it would be a mistake.
We must have a system that will reveal the Abdulmutallab
who is Anglo-Saxon and has blond hair, because this beast that
we have to deal with continually metamorphoses. It becomes
something else somewhere else. If we only assume that it will
be tomorrow what it is today, we will make today's mistake, and
it will impact tomorrow.
So the system that I am looking for is one that will allow
us to understand, in my opinion, that the last line of defense
is the airport. That is the last line of defense. The American
people don't ask us to do the impossible. They do demand,
however, that we do all that we can--that we do all that we
can.
At some point the excuse that we didn't do all that we
could is not going to be enough for the American people. So we
have got a duty at these airports to do all that we can. We owe
it to the intelligence officers who risk their lives every day
to make sure that we do all that we can at the airports, our
last line of defense.
A quick question, if I may. Did we know the religion of
Richard Reid prior to December 2001?
Mr. Leiter. I don't believe so. I don't think we knew
anything----
Mr. Green. I think that that answer suffices. The reason I
asked is because if we focus on religion and then some other
adjectives, we are missing a point here. I want to capture the
culprit whose religion may not be the religion du jour for our
purposes. This is serious business, and it goes beyond the
ability to simply identify that which is superficial, the
superficial social analyst who can come in after the fact and
connect all of the dots and see how clearly we could have saved
the day, had we connected the dots.
So I suppose I had more of a statement than questions for
you, because I just absolutely believe that we must not allow
ourselves to be trapped by religion and by ethnicity and place
of origin. It is bigger than that.
Thank you, Mr. Chairman. I yield back the balance of my
time.
Chairman Thompson. Thank you very much.
The gentleman's time has expired.
The gentleman from California for 5 minutes, Mr. Lungren.
Mr. Lungren. Thank you very much, Mr. Chairman. I
appreciate the time. I am sorry I couldn't be here during all
of this, but I am divided between three different committees,
and we just voted to impeach a Federal judge. I think it is
only eight times in history we have done that, so I had to be
there for that vote.
Yes, I hope we are not prisoners of wrong impressions
either. But I also hope we are not prisoners of PC. We are in a
war declared on us by radical jihad, radical Islam. That
happens to be a fact. We didn't pick the war. They picked the
war. I haven't seen too many Irish Catholic nuns blow
themselves up.
Sometimes we do stupid things like having my 6-month-old
granddaughter a couple of years ago taken out for a secondary
search when they searched her diaper. That kind of stupidity
hurts us, I think, even though we do it to make sure that we
have some egalitarian approach to this.
Mr. Kennedy, let me ask you something. That is if the State
Department had the information about Abdulmutallab from his
father prior to issuing a visa, would we have issued a visa?
Mr. Kennedy. Sir, if we had the information the father had
presented before----
Mr. Lungren. Yes, that is my question.
Mr. Kennedy. Yes, sir. What we would have done is we would
have not issued the visa. We would have sent in to the
intelligence and law enforcement communities a security and
advisory opinion, ask them what additional information they
had, and then made the decision on the basis of what additional
information they provided as well.
Mr. Lungren. So if that is the case, why wouldn't we move
to revoke the visa if we have that information?
Mr. Kennedy. Because we sent the request in to the Visas
Viper, sir, went into the intelligence and law enforcement
community and ask them if they had any additional information
on Mr. Mutallab.
Mr. Lungren. Does someone have a constitutional right to
come to the United States?
Mr. Kennedy. No, sir.
Mr. Lungren. Does someone have some sort of international
right to come to the United States?
Mr. Kennedy. Absolutely not.
Mr. Lungren. A visa is a discretionary action by the United
States, right?
Mr. Kennedy. Absolutely, sir.
Mr. Lungren. The granting of a visa. So why would you even
hesitate about not granting someone a visa if he had that
information from the father such as was given by Mr.
Abdulmutallab's father?
Mr. Kennedy. Two reasons, sir. First is context. We turn
down almost two million--1.9 million visas a year. So we do
not----
Mr. Lungren. Okay. I don't care about the other. I am
asking you about this specific case. That is why I am asking.
Mr. Kennedy. No, because, sir, there are people who come
into embassies every day, every month, family members,
disgruntled business partners, and others who say that so-and-
so might be a terrorist. So we have been very carefully
analyzing that. We consult with our partners.
Mr. Lungren. Okay. I understand that. Let me ask you this,
then. So do we have a lot of fathers who have experience such
as Mr. Abdulmutallab's father did, who turn their sons in with
that kind of information?
Mr. Kennedy. There have been family members.
Mr. Lungren. So there are a lot of them.
Mr. Kennedy. There have been family members who----
Mr. Lungren. You know, I appreciate it. I don't like people
getting cute with me. This is very serious business.
Mr. Kennedy. Absolutely.
Mr. Lungren. The American people are asking us. I was just
home. People are saying, ``How in God's name can you screw up
like this?'' We have spent billions of dollars trying to do it,
and we say, ``Well, you know, a father comes in like this with
this guy's pedigree. He says that about it. Yes, we got a lot
of them.'' I would argue that you don't get a lot of them, and
I would argue that you ought to be a little more serious about
this then doing that.
Mr. Kennedy. Sir, I am----
Mr. Lungren. Now, you know, it is easy to be a second, you
know, on Monday morning quarterback, but when you tell me that,
it bothers me a great deal.
Mr. Kennedy. If I could just finish my sentence.
Mr. Lungren. You can finish your sentence, but we are in a
serious question here about people who want to kill us, and you
talk to me. It sounds like the State Department is doing things
the way they used to do it.
Mr. Kennedy. No, sir. The second part of my sentence, sir,
is that we are reviewing all of our procedures. We regard
ourselves as the first line of defense, and we have every
intention. We are committed to----
Mr. Lungren. Well, you weren't the first line of defense
here, were you?
Mr. Kennedy. I believe we were, sir.
Mr. Lungren. This is amazing. I am sorry. It is amazing to
me. So you don't--it didn't work the way it should, though, did
it?
Mr. Kennedy. Absolutely not.
Mr. Lungren. Okay.
Mr. Kennedy. I said that in my testimony, sir.
Mr. Lungren. So you are reviewing the procedures and
criteria. So what would do differently now, if you got this
information? Or would you do anything differently, except make
sure it went up the line?
Mr. Kennedy. If he had been a visa applicant, we would have
coded that information. We would have sent the inquiry to
Washington. We would have asked other people in the
intelligence community what----
Mr. Lungren. Okay. So he wasn't a visa applicant. He
already had a visa.
Mr. Kennedy. Right.
Mr. Lungren. So what change would take place now, if you
are confronted with the same information, not applying for a
visa, but he has a visa. This information is brought to you at
one of the embassies.
Mr. Kennedy. I would think, as you suggested, sir, we would
do all more in-depth review to make sure that the information
being presented to us was valid. Then if it was valid, we would
move to revoke the visa immediately.
Mr. Lungren. Okay. I would just like you to bring one
little bit of information back to the State Department. I have
an adult daughter who was visiting Gambia the week after
Christmas. She thought it might be important for her to go to
the embassy to indicate that she was there--American citizen
there.
She was told the person that would take that information
was sick, and the person who was--or, excuse me, was on
vacation--and the person who was supposed to take that person's
place was sick. Therefore, she could come back in a week to
tell them that she was there. She was leaving in a week.
I just want to tell you she didn't pull anything about
being my daughter or anything else. I just happen to think that
kind of a response to a simple American citizen going to a
country saying, ``You know, you might want to know I am here in
case anything happens''--not that she thought anything was
going to happen in that country, but that was the response she
got.
Mr. Kennedy. That was totally inappropriate and wrong, and
I will look into that, sir. We encourage, we request, we have
web sites to encourage any American traveler to record their--
--
Mr. Lungren. That is what she did. She was told to come
back after she had left.
Mr. Kennedy. That was an error, and we will look into it.
Why? That is not our procedure.
Chairman Thompson. The gentleman's time has expired.
The gentlelady from Texas for 5 minutes, Ms. Jackson Lee.
Ms. Jackson Lee. Thank you very much, Mr. Chairman.
To the witnesses, let me thank you.
I think all of us echo the fact that we know that there are
men and women on the front line, and we appreciate their
service. We also appreciate the leadership of the President of
the United States as the Commander-in-Chief. He should be able
to expect the highest level of performance of his staff, of his
Executive staff, that he should also expect the Congress is a
collaborator with him in team homeland security.
Unfortunately, I think that there were enormous challenges
and missteps that did not equate to the team working together
and playing on the playing field together. I frankly believe
that part of it is, of course, some of the missteps of the
United States Congress, some of the inability of the executive
to listen to the Congress.
My subcommittee, the Subcommittee on Transportation
Security and Infrastructure Protection, looked into the
question of watch lists. We actually made comments about the
burdensome method of that watch list, of how heavy laden it
was, how inaccurate it was, to the extent that we had 8-year-
olds, so we had an 8-year-old as a witness. Another 8-year-old
had been interviewed. It is a simple task to look at that watch
list and provide the intelligence and the staffing to make it a
watch list that is credible of the name.
The other broken part of the system is the responsibility
still, as I understand it, on airline personnel as people come
to counters and their names--they go to the back and check
their names--civilians looking at issues that happen to deal
with homeland security issues.
We have a problem and a crisis that needs to be fixed. A
part of it is that we must acknowledge that we will not have
people bearing flags running down airports and saying, ``I am a
terrorist.'' Individual operators and actors, franchising of
terrorism, seems to be the call of the day, and then taking
credit for it one way or the other. We know now that Osama bin
Laden has taken credit for the December 25 action.
Many of us, who are not inside the Department, were aware
that there was activity going on around the holiday. We know
that that is the modus operandi of terrorists. Go when a
country is focusing on something else. So my questions go to
this whole question of interrelatedness.
Quickly to Secretary Kennedy, are your consul offices--do
they have a direct connection to the watch list effort of
Deputy Secretary Lute and the counterterrorism efforts of
Director Leiter so that the Nigerian consulate person would
have had that direct connection?
Chairman Thompson. Please use your microphone.
Mr. Kennedy. My apologies.
We get daily and----
Ms. Jackson Lee. Can they call back and contact a human
being?
Chairman Thompson. Madam, well, just, I don't think he
finished it.
Ms. Jackson Lee. I understand, but my question is can
they--I hear what he is going to say. The question is----
Chairman Thompson. Now, I didn't hear what he was going to
say. Just let him answer. You have got plenty of time. I am
going to be very nice.
Go ahead, Mr. Kennedy.
Mr. Kennedy. The law enforcement and Homeland Security and
intelligence communities provide us with information every day
on new threats. We load that into our database, and that
information is available to every embassy and consulate
throughout the world.
Ms. Jackson Lee. Does the consular general have the
authority or the ability, or the individual who dealt with the
father of the alleged perpetrator in the incident at December
25, to be able to call back on the telephone, on a cable, on an
e-mail, or whatever is secure, to ask questions out of the
Deputy Secretary Lute area or the counterterrorism area?
Mr. Kennedy. What they do is they call the visa office at
the State Department, which is our central repository and which
is in daily contact via all the secure means with both as the
National Counterterrorism Center, the Department of Homeland
Security, the FBI's Terrorist Screening Center. Yes, ma'am. We
are in contact with daily. That is one of the major
improvements since 9/11. We are all lashed up as partners----
Ms. Jackson Lee. But if you are in contact, what does that
mean? Does that mean that the person who engaged with the
father of the alleged perpetrator had the ability to get on the
phone and call and get a quick answer of the person who
answered the phone in Washington, DC? I am suspicious. There is
an individual here talking about activity of an individual that
has a visa.
Was there a direct link for there to be a response by
checking live intelligence by way of a direct call to the
counterterrorism or direct call to the watch list? Those are in
two different areas.
Mr. Kennedy. Yes, sir. He was not on the watch list. He was
not on the Selectee list. The State Department, when the father
came in, talked to an embassy officer, who then immediately
reported to the consular section that this is the information
that was received, and that information was immediately sent to
Washington.
Ms. Jackson Lee. Have you made changes to ensure that
information that would describe someone as suspicious can be
responded to quickly? Because frankly I believe that all that
the father said was enough information for a well-trained
official, whether they are State Department or not, that we are
living in a different climate and maybe I should do something
about it? Have you had a re-training of your staff around the
country--around the world, rather?
Mr. Kennedy. Yes, ma'am. We have sent out revised and
updated instructions, and we emphasize that we have added
additional information to the immediate report that is sent
in--it is called Visas Viper--that notifies the Homeland
Security and intelligence and law enforcement communities that
the State Department has come into piece of information that
may well be important, and here it is.
Ms. Jackson Lee. Deputy Secretary Lute, if I might, on the
watch list, which has been one of the major complaints and a
burdensome list that is both, I believe, inaccurate. In many
instances it plays into my colleague's comments about profiling
for the basis of religion and otherwise, which does nothing to
fight the war on terror.
My question is the distinction between the watch list and
the No-Fly list. In this instance this person should have
definitely been on the No-Fly list, and so my question is what
is the strategy for a comprehensive and coordinated
watchlisting and screening approach into a prioritized
implementation and investment plan that describes the scope,
governance principles, outcomes, milestones, training
objectives, metrics, cost and schedule of necessary activities
as relates to the watch list to be able to move to the No-Fly
list?
If I may also raise to Director Leiter so I can have these
questions out, which I think is very important. I hope that
when we are on notice that an incident is occurring, all hands
will be on deck, similar to making sure that embassy personnel,
who we have great respect for, are at their desks at
appropriate times, because all times of the schedule, if you
will, the calendar, people are coming and going. I hope if
there is a terrorist act, we have all hands on deck on this
information.
Director Leiter, and I would say my question is there has
been a lot of discussion about the failure. This was not a
failure to connect the dots, but to analyze what we had. It has
been said that the intelligence community, to build a more
robust analytical capability, specifically what steps are being
taken to accommodate this goal in training, system design and
technological changes, but more importantly, on the human
intelligence and behavioral assessment, which, if you had done
that on the gentleman's actions, he would have been on the No-
Fly list.
Deputy Secretary Lute.
Ms. Lute. Yes, ma'am. Thank you. As you know, the
Department of Homeland Security does not own or control the
watchlisting. Abdulmutallab was neither No-Fly nor Selectee.
But we are working very closely with our colleagues
throughout the interagency to identify the kinds of information
that is necessary for us to take steps related to ensuring
aviation security.
In fact, in the wake of this incident, we will take
information such as Under Secretary Kennedy was talking about
and put that in the hand of our immigration advisory
professionals that are stationed abroad in nine locations so
that they can engage in additional questioning and examination
of persons who come on that list. That is an important step in
the direction of increased security, and we are looking at
others as well.
You also mentioned the frustration with the ensuring the
accuracy of the list. We share that frustration. It is
important that we do have lists on which we rely for ensuring
the safety of the traveling public, that these be accurate
lists. We are working very intensively to establish an easy way
for people to de-conflict information when it is erroneous and
to ensure that those lists are the accurate, important tool
that we need them to be.
But we also know that we are facing a determined adversary,
who is looking to use people who are unknown to any system. In
this regard we need to evaluate their activities, travel
patterns, and other activities which can tip us off that this
person may be dangerous, certainly is worth additional
screening and questioning, and working intensively with our
interagency colleagues to get better systems in place for those
contingencies.
Mr. Leiter. Congresswoman, thank you for the question. I
think you are exactly right, that we have to improve the
ability of these analysts to understand the characteristics of
this information as they are coming in so they get a true feel
for when a father walks in, why is the father walking in? Why
this report?
We are doing a number of things on this front. Most
importantly, we are creating specific teams that are not bound
to writing daily intelligence. When they get that bit from the
father and dive into it and connect that intelligence in a way,
that you do have all the information necessary to make that
determination about whether someone should be or should not be
on the No-Fly list.
So you also do not get people on the No-Fly list that you
don't want on the No-Fly list, because the only way you are
going to get the bad guys off the plane is to also ensure that
the good guys can get on the plane. Otherwise, the system just
becomes unwieldy.
So we have already begun additional training. The Director
of National Intelligence is studying how we can advance that
training more. We are creating teams to pursue these to ensure
that they have the time and they have the resources to track
down these free pieces of information and put them together.
Mr. Kennedy. Congresswoman, you also asked is the State
Department on duty in addition to the embassy people you
mentioned. We have somebody responsible that is in our
operation centers 7 days a week, 24 hours a day, 365 days a
year. If a question comes in from an embassy--it may be in a
different time zone--or comes in from our partners in the
National security community, that officer knows who to reach
out to to get the right information they need immediately.
Ms. Jackson Lee. Mr. Chairman, may I just say a point on
the record?
I thank the witnesses.
The one point that I heard Deputy Secretary Lute say is
that Homeland Security does not have ownership of the watch
list. I think it speaks to, again, the work we have to do and
have been doing to get the synergism so that we have some
mutually interrelatedness on trying to help all of these
persons and that we can get an understanding everybody has
ownership of the watch list, the No-Fly list.
We have got to find a way to weave in our security so that
there are no gaps, not putting the fault on these public
servants, but there has to be a cleaning up of the cracks in
the system that will allow this kind of breach to happen. It
has to be a combination, Mr. Chairman, of the Executive working
with us as team homeland security, and no distinction between
Republicans and Democrats, team homeland security.
I hope in that spirit that we will have the appointee
necessary for the running of the Homeland Security Department
to move as quickly as possible to be appointed and confirmed on
the behalf of the American people. I look forward to working
with them.
I thank you, Mr. Chairman, for yielding.
Chairman Thompson. Thank you very much.
I want to thank the witnesses for their valuable testimony
and the Members for their questions.
Mr. Kennedy, if you would provide the committee with the
instructions you referenced Chairwoman Jackson Lee that have
been implemented since the December 25 incident with respect to
training and other information. Now, if that is classified,
just let us know, we will still govern ourselves accordingly.
Mr. Kennedy. Mr. Chairman, I will be pleased to get that to
you, sir. Thank you.
Chairman Thompson. Thank you.
Mr. Leiter, you said you want to make sure that good guys
get on the plane. There is a good guy here who is a Member of
Congress that has an awful difficult time getting on planes. He
is Congressman John Lewis in Georgia.
Deputy Secretary Lute, can you look into that and figure
out a way how he can not be flagged for secondary screening and
other things, because he is in fact John Lewis? Now, there is
another John Lewis out there. We still ought to have a system
to figure out how to handle this.
Ms. Lute. Yes, sir, we should. I am on it.
Chairman Thompson. Okay. Thank you very much. I am sure he
would appreciate it.
Mr. Leiter. Mr. Chairman. Can I make one note on that
front?
Chairman Thompson. Yes.
Mr. Leiter. Not knowing the facts of Congressman Lewis'
case and certainly not accusing him of being a known or
suspected terrorist, I do want to flag for the committee--I
think it is important to understand--that a desire to have more
people on the watch list will inevitably lead to more false
positives. We have to accept that, I believe, as a cost.
There is nothing we can do technologically or with the
human to eliminate those false positives from occurring--again,
not speaking directly to the Congressman's case, but accepting
that this will be a byproduct of ensuring that some bad people
don't get on the plane.
Chairman Thompson. Well, and I understand, but that is
going forward. This has been from day 1. So we are not even to
the next generation. But, obviously, we assume the
inconvenience that adding to the list will bring, but these are
different times.
Mr. Kennedy, last question. Can you provide the committee
with either, if you know right now or at a later date, how many
people we actually have working in the visa office in your shop
here in Washington?
Mr. Kennedy. Mr. Chairman, let me get that for the record.
I can get within a swag, but I will submit that for the record,
sir.
Chairman Thompson. Thank you very much.
Mr. King. Thank you for the testimony. Thank you for their
service. I yield back.
Thank you, Chairman, for the hearing.
Chairman Thompson. Thank you.
Before concluding, I remind the witnesses that the Members
of the committee may have additional questions for you, and we
ask that you respond expeditiously in writing to those
questions.
Hearing no further business, the committee stands
adjourned.
[Whereupon, at 1:21 p.m., the committee was adjourned.]
A P P E N D I X
----------
Questions From Honorable Sheila Jackson Lee of Texas for Jane Holl
Lute, Deputy Secretary, Department of Homeland Security
Question 1. In response to a recommendation by the 9/11 Commission
about improving passenger pre-screening, the Secure Flight program is
being implemented so that TSA will be assuming the duty, which now
rests with the air carriers, of checking passengers against the No-Fly
and Selectee databases. I understand TSA is first implementing Secure
Flight domestically, but with there being a significant threat
concerning international in-bound flights, how will the Department
conduct watch list passenger pre-screening for in-bound flights to the
United States? How will this be incorporated with existing CBP programs
like the Advanced Passenger Information System?
Answer. DHS is implementing Secure Flight through a phased process.
The Transportation Security Administration (TSA) anticipates that
Secure Flight deployments for domestic aircraft operators will be
completed in spring 2010. TSA has also initiated Secure Flight
deployments for foreign aircraft operators and expects to assume watch
list matching for all flights, international and domestic, by the end
of calendar year 2010.
All aircraft operators, both foreign and domestic, who have not
transitioned to Secure Flight are responsible for conducting watch list
screening of their passengers against the No-Fly and Selectee lists.
Currently, U.S. Customs and Border Protection (CBP) screens
travelers arriving into or departing from the United States against the
Terrorist Screening Database (TSDB, the U.S. Government's Terrorist
Watch List), including No-Fly and Selectee records. All commercial and
private aircraft operators with flights arriving into or departing from
the United States are required to transmit passenger manifest
information through the Advance Passenger Information System (APIS) to
U.S. Customs and Border Protection (CBP). APIS is used for terrorist
watchlist screening, law enforcement analytical work, passenger
facilitation, and departure monitoring. As part of program alignment,
on February 19, 2008, CBP started screening all APIS manifest
submissions against the No-Fly and Selectee watch lists with the
screening results being provided to the TSA Office of Intelligence
(TSA-OI) for resolution. CBP has been working closely with TSA and the
airline industry to align the APIS program with TSA Secure Flight
watchlist screening. When TSA's Secure Flight Program is fully
implemented, the No-Fly and Selectee screening will transition from the
APIS system to Secure Flight. CBP will continue to process APIS
manifest information for its law enforcement and traveler facilitation
mission.
Question 2. Ms. Lute, It is my understanding that ``Puffer
Machines'' or Explosive Trace Portal Machines worked great when they
were tested in the lab testing but during field testing they had a high
breakdown rate caused by dust and dirt entering the machines. I have
been told by TSA that there are currently 9 machines currently in the
field, but TSA has no intention to field any more because of the
breakdown rate. Is any effort being made to revise or improve this
technology?
Answer. At this time there are only two deployed Explosive Trace
Portals (ETP), one at Gulfport-Biloxi International Airport and one at
Phoenix Sky Harbor International Airport, and both are slotted for
removal this year. As we deploy Advanced Imaging Technology (AIT) at an
airport we remove obsolete equipment at the same time. This minimizes
disruption of the airport operations and increases resource and cost
efficiencies.
While the ETP devices previously purchased by Transportation
Security Administration (TSA) experienced operational performance
issues that hindered their effectiveness in the field, TSA and the
Department of Homeland Security Science and Technology Directorate
continue to evaluate a variety of trace detection technologies.
Question 3. Ms. Lute, it is my understanding that every checkpoint
in the United States has portable Explosive Trace Technology devices. I
realize it is not practical to test every person in every airport with
this device because of time limitations, but can TSA increase the
amount of passengers randomly selected for the explosive trace
technology swab test? Has TSA taken any steps to increase their use?
Answer. To restate your question more accurately, every checkpoint
in the United States has tabletop Explosive Trace Technology devices.
Explosive Trace Detection (ETD) technology is a critical tool in our
ability to stay ahead of evolving threats to aviation security. In
fact, the Transportation Security Administration (TSA) has recently
expanded the random use of ETD technology at airports Nation-wide as an
additional layer of security. Since it will be used on a random basis,
passengers should not expect to see the same thing at every airport or
each time they travel. TSA will continue to evaluate the numbers of
passengers screened and work to maximize the effectiveness of ETD
screening as commensurate with resource levels and airport operations.
Question 4. Ms. Lute, it is my understanding that a pilot program
that was recently completed by TSA called ``e-Logbook'' would allow TSA
to instantly be able to know if a FAM or LEO flying armed is on-board
an aircraft. I have been informed this pilot program was a success
however, it is my understanding that no funding has been requested yet
for this program to go up Nation-wide. I would like to know what the
current status is and what plan does TSA have to role out this program
Nation-wide?
Answer. The Federal Air Marshal Service (FAMS) has a dedicated
system in place to continually track, in real time, Federal Air Marshal
(FAM) presence on domestic and international flights.
With regard to the Electronic Logbook (e-Logbook) pilot program,
the Transportation Security Administration (TSA) is seeking to
establish an automated process for providing situational awareness for
other armed law enforcement officers (LEOs) on-board any given
aircraft. The e-Logbook pilot program was tested in Washington (Reagan
National Airport, Dulles International) and San Francisco and TSA is
currently considering a Nation-wide implementation. In the interim,
TSA's Transportation Security Operations Center (TSOC) currently tracks
State and local armed LEOs on commercial aircraft through a National
Law Enforcement Telecommunications System (NLETS) solution implemented
last year. Although functional, the NLETS solution relies on manual
processes and is limited to State and local LEOs.
Also, on February 1, 2010, TSA began a pilot implementation of an
enhanced credential verification procedure for Federal Law Enforcement
personnel flying while armed.
The enhanced identification procedures require each Federal LEO
flying armed in accordance with 49 C.F.R. 1544.219 and respective
agency policy, to be in possession of a Unique Federal Agency Number
(UFAN). The UFAN is an agency-specific alpha-numeric number TSA issues
to Federal agencies/entities upon request. The UFAN is known only to
TSA and the respective agency/entity. Each agency/entity must ensure
its eligible law enforcement personnel are aware of this number to be
used in conjunction with the LEOs badge, credential, a secondary form
of Government-issued identification, and airline-issued LEO flying
armed paperwork. The UFAN number is an additional form of verification
and will be requested of the LEO at the LEO checkpoint prior to entry
into the boarding area.
Question 5. Ms. Lute, it has come to my intention that some flights
have both FAMS agents and LEO's flying armed, while other flights have
neither. Is the Department taking any steps to create a scheduling
system to maximize the use of FAMS with LEO's flying armed?
Answer. The Federal Air Marshal Service (FAMS) provides mission
coverage to the Nation's civil aviation system using a concept of
operations (CONOPs) that is essentially a threat-based matrix
prioritizing scheduled flight coverage well in advance of the flight
date. FAMS, on the other hand, can be made available to cover emergent
threats when necessary. In order to perform the FAMS' mission, all
Federal Air Marshals (FAM) undergo intensive specialized training far
exceeding requirements for law enforcement officers (LEOs) flying
armed.
With regard to the matter of other armed LEOs, the FAMS has
determined that flight schedules from other agencies (Federal, State,
and local) are flexible by nature, often booked within days of the
flight date (allowing virtually no advance FAMS planning) and are not
sufficiently reliable to ensure daily coverage of flights.
Overburdening airlines and TSA's Mission Operation Center with
additional last moment cancellations/bookings to ensure proper coverage
of high priority flights presents operational and logistical challenges
best overcome by the FAMS making its own schedule independent of other
LEOs traveling on flights.
Question 6. Ms. Lute, does the Department plan to hire more FAMS
agents? If so, how many?
Answer. The President's fiscal year 2011 budget request does seek
to increase the Federal Air Marshal Service funded staffing level.
Specifically, the budget request seeks to hire 499 additional FAMS
personnel in fiscal year 2011.
Question 7. I have recently become aware of ``event-driven'' as
compared to ``person-driven'' software. As I understand it, ``event-
driven'' software is very efficient and can instantly capture and
process extremely large volumes of information. I understand that
electronic signals generated by events serve as input into specialized
event-driven software. I am told that based on its processing rules
with predetermined expectations and constraints, it can intelligently
process the information to constantly revaluate individuals' risk
profiles, connect the intelligence-revealing dots, and automatically
and immediately communicate the derived intelligence or alerts to all
the appropriate people that need to know, or need to take action.
I am told that this event-driven software has been successfully
used for years in extremely complex manufacturing environments such as
Aerospace and Defense, as well as many other challenging industries.
The processing of travel and security ``events'' is apparently no
different and I understand that the software can be deployed very
quickly. It appears there is a possibility that with this software the
``events'' leading up to the Christmas day bomber incident would have
set off the alarms for everyone, even if the bomber was not on any
watch list. How long do you estimate it will take before the American
people can be protected by comprehensive ``event-driven'' software?
Answer. DHS is aware that event-driven systems have proven useful
in such large-scale applications as manufacturing, financial and
investment management, aircraft and spaceflight, and project
management. Common to all these applications is some on-going process,
workflow, or lifecycle. For example, a production line; an investment
policy based on a series of price or monetary changes; a series of
engine thrust, altitude, heading, weather, and fuel (and many other)
measurements, which describe the health of an aircraft; or a
development cycle for a software design. The ``event'' refers to a
point along the process, workflow, or lifecycle, where an automated
decision is made by the system to proceed or to take one of several
alternatives. Using our manufacturing or aircraft and spaceflight
examples, this could be deciding to insert a new throttle assembly
because the old one was ineffective or setting a series of thrusters or
making altitude adjustments on the Space Shuttle to ensure a safe re-
entry trajectory. For event-driven systems to function, at least three
elements are necessary. These are: (1) A constrained set of rules that
determine how decisions are made, (2) access to all the data or
databases that are necessary to make a decision, and (3) sensors to
detect an event or measurements that are continuously made along the
process or lifecycle.
In the context of the attempted attack on December 25, 2009, for an
individual and an explosive material, a set of rules does exist for
deciding what happens if one or the other is detected, therefore the
first element for an event-driven system is present and functioning.
The second element, access to all data, was incomplete. In the case of
the individual, while he used his real identity (e.g., he did not try
to use a false passport or another name), DHS screening systems lacked
any data indicating that he presented an imminent threat. In
particular, he was not on the U.S. Government's terrorist watch list.
Similarly, while DHS had sufficient information to know that the
particular substance could be explosive, our foreign partners did not
have systems or processes in place to detect it.
In summary, an event-driven system applied to the attempted attack
on December 25 would not have functioned because the individual was not
watchlisted and because the screening equipment was not sensitive
enough to detect the explosive material. Had the individual been
watchlisted or had the equipment been sensitive enough to detect the
explosive materials, an event-driven system would not have been
necessary as the existing information-based and physical screening
processes would have prevented him from boarding the aircraft. DHS is
working with our counterparts within the U.S. Government and our
foreign partners to close these vulnerabilities.
Event-driven systems could prove useful for some homeland security
applications. However, should the Department identify event-driven
systems as a practical technology solution for air passenger screening,
it will take time to integrate into the existing enterprise.
Question 8. The findings of the administration's report released
Jan 7, 2010, included: ``The information that was available to
analysts, as is usually the case, was fragmented and embedded in a
large volume of other data'', and that ``NCTC and CIA personnel who are
responsible for watchlisting did not search all available databases to
uncover additional derogatory information that could have been
correlated with Mr. Abdulmutallab''.
My understanding is that most of the analysis is currently a
process of manual searches of the various databases.
Could this goal be achieved with automation, through the use of
clever technology that can process large volumes of information
efficiently and if so, are you currently looking at putting such
technology in place?
Answer. The Department of Homeland Security (DHS) is investigating
ways to improve searches across the large number of databases in the
Department. Even before 25 December, in response to terrorist activity,
the Department established a DHS Threat Task Force (DTTF) and provided
access to 47 databases to a single co-located team in order to conduct
name traces. While this is a step forward and has yielded actionable
insights, the greater need is the ability to search across databases at
the same time, combining search results. Rather than search each
database individually, a federated search would allow us to more
quickly make analytic connections.
A cross-database search capability could enable DHS to conduct
searches on individual names, submit lists of names for search, and set
up alerts which are tripped when new information on individuals of
interest arrives. Various statistical and probabilistic algorithms
could be used to prioritize the search results based on context and
frequency.
DHS is exploring options for a federated search capability. While
federating searches across multiple databases is technically feasible,
it is challenging when dealing with numerous datasets of different eras
and structures, and it must also be done in a manner consistent with
DHS information use policies including implementation of the Fair
Information Practice Principles. In advance of creating this
capability, moreover, the Department will also develop applicable
System of Records Notices (SORN) and Privacy Impact Assessments (PIA)
to ensure that we use the databases in a manner consistent with what we
have publicly stated about them. The Department will continue to work
through these issues to make available for search the kinds of
sensitive U.S. persons data that are currently not easily shared with
the intelligence community in a manner that protects privacy, civil
rights and civil liberties, and ensuring DHS can achieve its mission to
detect threats to the homeland.
Question 9. Does our technology today enable us to assess every
single passenger's risk profile, considering all contributing factors,
in order to determine his/her specific risk level at any given point in
time, and to immediately communicate an elevated risk to the security
agencies for extra screening or follow up? If not, are you aware of a
technology that could accomplish this?
Answer. For international flights, in addition to screening against
the No-Fly and Selectee lists that are part of the Terrorist Screening
Database, DHS uses a decisions support tool that compares traveler
information against intelligence and other enforcement data by
incorporating risk-based targeting scenarios and assessments. The
primary purpose is to target, identify, and prevent terrorists and
terrorists' weapons from entering the country. All individuals entering
the country by commercial air and sea carriers are run through this
system. Based on results of the targeting systems, DHS will determine
appropriate next steps, which include denying boarding, additional
screening before departure or upon arrival, denying admission to the
United States, or arrest upon arrival.
Questions From Chairman Bennie G. Thompson of Mississippi for Michael
E. Leiter, Director, National Counterterrorism Center
Question 1. What disciplinary or other personnel action has your
agency taken in response to the events leading up to the failed attack
on Flight 253?
Answer. Response was not received at the time of publication.
Question 2. Does NCTC have the authority it needs to fulfill its
mission to the American people? Specify any additional authorities
needed to operate effectively.
Answer. Response was not received at the time of publication.
Question 3. Under what circumstances are names removed from the
TIDE database? Describe relevant procedures and the time intervals
associated with these procedures.
Answer. Response was not received at the time of publication.
Question From Honorable Christopher P. Carney of Pennsylvania for
Michael E. Leiter, Director, National Counterterrorism Center
Question. Mr. Leiter, at the hearing when asked about how many
points of failure occurred within our intelligence and homeland
security systems, ``Was there a single point of failure, a double point
of failure or multiple points of failure?'', you answered ``Multiple''.
Please list these failures and rank them in terms of severity and what
needs to be done to fix them.
Answer. Response was not received at the time of publication.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|