[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]
TEN YEARS AFTER 9/11: CAN TERRORISTS STILL EXPLOIT OUR VISA SYSTEM?
=======================================================================
HEARING
before the
SUBCOMMITTEE ON BORDER AND
MARITIME SECURITY
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED TWELFTH CONGRESS
FIRST SESSION
__________
SEPTEMBER 13, 2011
__________
Serial No. 112-43
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
_____
U.S. GOVERNMENT PRINTING OFFICE
72-930 PDF WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Peter T. King, New York, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Daniel E. Lungren, California Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Michael T. McCaul, Texas Henry Cuellar, Texas
Gus M. Bilirakis, Florida Yvette D. Clarke, New York
Paul C. Broun, Georgia Laura Richardson, California
Candice S. Miller, Michigan Danny K. Davis, Illinois
Tim Walberg, Michigan Brian Higgins, New York
Chip Cravaack, Minnesota Jackie Speier, California
Joe Walsh, Illinois Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania Hansen Clarke, Michigan
Ben Quayle, Arizona William R. Keating, Massachusetts
Scott Rigell, Virginia Kathleen C. Hochul, New York
Billy Long, Missouri Janice Hahn, California
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Mo Brooks, Alabama
Michael J. Russell, Staff Director/Chief Counsel
Kerry Ann Watkins, Senior Policy Director
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON BORDER AND MARITIME SECURITY
Candice S. Miller, Michigan, Chairwoman
Mike Rogers, Alabama Henry Cuellar, Texas
Michael T. McCaul, Texas Loretta Sanchez, California
Paul C. Broun, Georgia Sheila Jackson Lee, Texas
Ben Quayle, Arizona, Vice Chair Brian Higgins, New York
Scott Rigell, Virginia Hansen Clarke, Michigan
Jeff Duncan, South Carolina Bennie G. Thompson, Mississippi
Peter T. King, New York (Ex (Ex Officio)
Officio)
Paul Anstine, Staff Director
Diana Bergwin, Subcommittee Clerk
Alison Northrop, Minority Subcommittee Director
C O N T E N T S
----------
Page
Statements
The Honorable Candice S. Miller, a Representative in Congress
From the State of Michigan, and Chairwoman, Subcommittee on
Border and Maritime Security:
Oral Statement................................................. 1
Prepared Statement............................................. 3
The Honorable Henry Cuellar, a Representative in Congress From
the State of Texas, and Ranking Member, Subcommittee on Border
and Maritime Security.......................................... 5
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security.............................................. 7
Witnesses
Mr. Thomas Winkowski, Assistant Commissioner, Office of Field
Operations, U.S. Customs and Border Protection, Department of
Homeland Security:
Oral Statement................................................. 10
Prepared Statement............................................. 11
Mr. Edward J. Ramotowski, Deputy Assistant Secretary, Acting,
Bureau of Consular Affairs, U.S. Department of State:
Oral Statement................................................. 14
Prepared Statement............................................. 16
Mr. John D. Cohen, Deputy Counter-Terrorism Coordinator,
Department of Homeland Security:
Oral Statement................................................. 24
Prepared Statement............................................. 25
Mr. Peter T. Edge, Deputy Associate Director, Homeland Security
Investigations, Immigration and Customs Enforcement, Department
of Homeland Security:
Oral Statement................................................. 30
Prepared Statement............................................. 32
Mr. Richard M. Stana, Director, Homeland Security and Justice,
Government Accountability Office:
Oral Statement................................................. 36
Prepared Statement............................................. 38
Appendix
The Honorable Henry Cuellar, a Representative in Congress From
the State of Texas, and Ranking Member, Subcommittee on Border
and Maritime Security:
Slide.......................................................... 53
TEN YEARS AFTER 9/11: CAN TERRORISTS STILL EXPLOIT OUR VISA SYSTEM?
----------
Tuesday, September 13, 2011
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Border and Maritime Security,
Washington, DC.
The subcommittee met, pursuant to call, at 10:00 a.m., in
Room 311, Cannon House Office Building, Hon. Candice S. Miller
[Chairwoman of the subcommittee] presiding.
Present: Representatives Miller, McCaul, Quayle, Rigell,
Duncan, Cuellar, Clarke, and Thompson (ex officio).
Also present: Representative Bilirakis.
Mrs. Miller. I am going to call the hearing in order here
this morning. Of course this is the Committee on Homeland
Security, Subcommittee on Border and Maritime Security. I think
we have a very interesting, interesting and critically
important topic to discuss this morning. The title of our
hearing is ``Ten Years After
9/11: Can Terrorists Still Exploit Our Visa System?''
We will be hearing testimony from a fantastic distinguished
panel whom I will be introducing in a moment. As I make my
opening statement you may want to take a look at some of the
pictures that we are going to have up on the screen of various
terrorists, murderers, cowards, cockroaches, however you want
to categorize these individuals that overstayed their visas.
So 2 days ago of course we commemorated the 10th
anniversary of the devastating acts perpetrated by these
cowardly terrorists who took the lives of nearly 3,000 of our
fellow citizens. As a Nation most of us had not really heard
before of al-Qaeda before that day despite their contributions
which funded the 1993 attacks on the World Trade Center, fatwa
that had declared war against our Nation in 1996, the bombing
of our embassies in Kenya and Tanzania in 1998, and of course
the bombing of the U.S.S. Cole in 2000. Despite these attacks
we were really not prepared and certainly our countrymen paid a
horrific price.
In Article I, Section 8 we find the enumerated powers of
Congress, and in the first paragraph of that section you find
what, in my opinion, is certainly the first and foremost
responsibility of the Federal Government, and that is to
provide for the common defense. The very purpose of this
committee is aligned with this principal responsibility of the
Government and to guard against another attack.
Photographs along our wall in this committee hearing room
certainly remind us of our purpose to defeat al-Qaeda and like-
minded groups and to defend our homeland, which includes of
course securing our borders.
On that day in September we learned a very hard lesson as a
9/11 Commission has noted. For terrorists, they said, travel
documents are as important as weapons and four of the 9/11
hijackers had overstayed visas, a missed opportunity to prevent
the attacks.
Since September 11, we have put a series of measures in
place to strengthen our visa security process and today have a
layered approach that begins overseas at the U.S. embassies and
consulates around the world which pushes our border out to
deter and prevent visa fraud and terrorists from obtaining
travel documents. Immigration and Customs Enforcement agents
and Customs and Border Protection officers are now stationed
overseas to conduct additional background checks on prospective
visa applicants. Certainly while this system is an improvement
over what was in place before 9/11, it is by no means perfect.
We will be exploring today what we can do to improve our
system.
Our enemies are intent on attacking our country and are
actively seeking to avoid our countermeasures. Our job is to be
one step ahead instead of constantly reacting to their last
attack.
In the case of the Christmas day bomber--I see his picture
there--it certainly illustrates the lengths terrorists will go
to thwart our security measures. The Christmas day bomber was
known to the intelligence community. His father had approached
the embassy in Nigeria with his concerns that his son may be
involved in terrorism. But still he was able to fly on a valid
U.S. visa. He tried to detonate his concealed explosive device
7 minutes before the plane was to land in Detroit. Of course I
reside in the Detroit area, fly in and out of that airport,
just flew out of it yesterday, which would have placed that
plane certainly over my Congressional district, over southeast
Michigan. So I am especially interested to hear from our
witnesses today about the progress we have made to ensure that
another known person of concern cannot board an aircraft with a
valid U.S. visa.
Last week before the full committee, Ranking Member Cuellar
and I were just talking, we heard from Representative Lee
Hamilton and former Secretary Tom Ridge regarding the progress
of the 9/11 Commission recommendations. The report recommended
and Congress mandated a biometric exit program to ensure that
foreign visitors have not overstayed their visa and have
returned home. However, this administration has still not
articulated the way forward on this vital program.
The U.S. Visitor and Immigration Status Indicator
Technology, or US-VISIT as they call it, captures foreign
nationals' fingerprints at the port of entry and at U.S.
consulates overseas in instances where the individual is
traveling on a visa. The fingerprints are then recorded and
compared with fingerprints already in the Federal database to
check for immigration violators, criminals, and others wanted
for violation of U.S. laws.
In 2009, US-VISIT conducted an exit pilot project at the
Detroit and Atlanta airports and generated 175 watch lists and
more than 120 visa overstay hits. So I think if we are serious
about controlling who comes into our Nation and preventing
another attack, we need to get serious about an exit program.
It has been more than 2 years since the pilot, and the
Department again has yet to articulate a program or plan to
move forward with a comprehensive exit plan in the air
environment or elsewhere.
More than just preventing terrorists from entering the
country, the lack of a visa exit program inhibits our ability
to control our border. I think it is an interesting statistic
that in this country as we talk about illegal immigrants and
how many are here in our country, it is interesting to note
that it is theorized that about 40 percent of everyone who is
here illegally didn't come across the border. They are here
because of overstay of visas, 40 percent. That is a very
startling number.
Today there is a backlog of 757,000 unvetted visa overstay
records. So we obviously have to do better than that, and I
will be very interested as our hearing progresses about talking
about this backlog, what we are doing to ensure that we don't
have such as backlog in the future.
ICE pursues only a small fraction of these visa
overstayers. By not seriously enforcing visa overstays, we are
sending a message that if you make it past the port of entry,
the chances of us ever finding you are slim to none. ICE
enforcement memos put an additional question mark over our
enforcement efforts there.
We do know that terrorists have a very strong affinity for
using a student visa process to enter the country, as earlier
this year a young man from Saudi Arabia purposely sought out a
program that would allow him to come to the United States as a
student. Then of course he has been accused of purchasing
chemicals that he intended to use to construct an IED.
So we have a lot of questions about this, and certainly our
visa security process needs to be robust. We have to deny
terrorists the freedom of movement because 10 years ago we saw
what failure looked like very unfortunately on that horrific
day which we all commemorated just this past Sunday.
[The statement of Mrs. Miller follows:]
Prepared Statement of Chairwoman Candice S. Miller
September 13, 2011
Two days ago we commemorated the 10th anniversary of the
devastating acts perpetrated by cowardly terrorists who took the lives
of nearly 3,000 of our fellow citizens.
As a Nation, most of us had not heard of al-Qaeda despite their
financial contributions which funded the 1993 attacks on the World
Trade Center, fatwa that declared war against our Nation in 1996, the
bombing of our embassies in Kenya and Tanzania in 1998 and the bombing
of the U.S.S. Cole in 2000. Despite these attacks, we were not
prepared, and our countrymen paid the price.
In Article I Section 8, we find the enumerated powers of Congress,
and in the first paragraph of that section you find what is, in my
opinion, the principal responsibility of the Federal Government--to
provide for the common defense.
The very purpose of this committee is aligned with the principal
responsibility of the Government--to guard against another attack.
Photographs along the wall here in the hearing room remind us of our
purpose--to defeat al-Qaeda and like-minded groups and defend the
homeland.
On that day in September, we learned a hard lesson--as the 9/11
Commission noted, ``For terrorists, travel documents are as important
as weapons.'' Four of the 9/11 hijackers had overstayed visas--a missed
opportunity to prevent the attacks.
Since September 11 we have put a series of measures in place to
strengthen our visa security process. Today, we have a layered approach
that begins overseas at U.S. Embassies and Consulates around the world
which pushes our border out to deter and prevent visa fraud, and
terrorists from obtaining travel documents.
Immigrations and Customs Enforcement agents and Customs and Border
Protection officers are now stationed overseas to conduct additional
background checks on prospective visa applicants.
While this system is an improvement over what was in place before
September 11, it is by no means perfect.
Our enemies are intent on attacking our country, and are actively
seeking to avoid our counter measures. Our job is to be one step ahead,
instead of constantly reacting to their last attack.
The case of Umar Farouk Abdulmutallab illustrates the lengths
terrorists will go to thwart our security measures.
The Christmas day bomber was known to the intelligence community,
his father had approached the Embassy in Nigeria with his concerns that
his son might be involved in terrorism, but he was able to fly on a
valid U.S. visa.
Abdulmutallab tried to detonate his concealed explosive device 7
minutes before the plane was to land in Detroit--which would have
placed that plane over my Congressional district. I am especially
interested to hear from our witnesses about the progress we have made
to ensure that another known person of concern cannot board an aircraft
with a valid U.S. visa.
The 9/11 Commission report recommended and Congress mandated a
biometric exit program to ensure that foreign visitors have not
overstayed their visa and have returned home.
The U.S. Visitor and Immigrant Status Indicator Technology, or US-
VISIT captures foreign nationals' fingerprints at the port of entry and
at U.S. Consulates overseas in instances where the individual is
traveling on a visa. The fingerprints are then recorded and compared
with fingerprints already in Federal databases to check for immigration
violators, criminals, and others wanted for violations of U.S. laws.
In 2009, US-VISIT conducted an exit pilot project at the Detroit
and Atlanta airports and generated 175 watch list and more than 120
visa overstays hits. However, full deployment of an exit program is
being delayed due to space and infrastructure constraints, and the
remaining question of how to limit disruption to the flow of people and
commerce into the United States. The Bipartisan Policy Center 9/11
Report Card lists this recommendation as ``unfulfilled''.
If we are serious about controlling who comes into the Nation and
preventing another 9/11 attack, we need to get serious about an exit
program. It has been more than 2 years since the pilot and the
Department has yet to articulate a plan to move forward with a
comprehensive exit plan in the air environment or elsewhere.
More than just preventing terrorists from entering the country, the
lack of a visa exit program inhibits our ability to control the border.
Nearly 40% of all illegal aliens do not sneak across the border in the
dark of night; they walk through the front door, and never leave.
Today, there is a backlog of 757,000 unvetted visa overstay
records. We can and must do better than that. I will be interested in
hearing about our progress on this backlog and what we are doing to
ensure that we do not have such a backlog in the future.
Immigration and Customs Enforcement pursues only a small fraction
of these visa overstayers. By not seriously enforcing visa overstays,
we are sending the message that if you make it past the port of entry,
the chances of us ever finding you are slim to none.
We know that terrorists have a strong affinity for using the
student visa process to enter the county as earlier this year a young
man from Saudi Arabia purposely sought out a program that would allow
him to come to the United States as a student. He stands accused of
purchasing chemicals he intended to use to construct an Improvised
Explosive Device (IED).
I am sure my colleague, Mr. Bilirakis will have some questions for
the witnesses on the status of our efforts in this area.
Our visa security process must be robust, and we must deny
terrorists the freedom of movement because 10 years ago we saw what
failure looked like.
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Mrs. Miller. At this time the Chairwoman would now
recognize the Ranking Minority Member of the subcommittee, the
gentleman from Texas, Mr. Cuellar, for his opening statement.
Mr. Cuellar. Thank you, Chairwoman Miller, for holding this
committee hearing. I also want to thank the Ranking Member of
the full committee for the work that he has done in the past on
this issue. I am pleased that the subcommittee is meeting today
to examine the issues of visa security, which is particularly
appropriate as we recently marked the tenth anniversary of the
terrorist attacks of September 11, 2001.
The 9/11 hijackers did not sneak into this country, did not
cross a river, the Rio Grande, but rather entered the United
States on visas. More recently the attempted bombing of an
airline by Umar Farouk on Christmas day 2009 refocused
attention on the vulnerabilities in the visa process.
Since 2001, the Department of Homeland Security and
Department of State, with direction from Congress, have taken
important steps to strengthen visa security, including efforts
to identify and enforce overstays, individuals who are admitted
to the United States legally either with or without a visa but
then overstay their authorized period of admission. Of the
approximately 11.5 million to 12 million unauthorized resident
alien populations, the most recent estimates proposed that it
is about 33 to 48 percent are overstays. That is almost 50
percent of all the people that got here, again I emphasize did
not cross the Rio Grande but actually came in through a visa
and overstayed.
Five of the 19 September 11, 2001 hijackers were overstays.
There should be no argument against about the vital importance
of the work completed by the Immigration and Customs
Enforcement, ICE, and the Counterterrorism and Criminal
Exploitation Unit, the CTCEU, whose primary responsibility is
overstay enforcement.
In addition to the CTCEU overstay investigations, the
primary responsibility for apprehending and removing overstays
as well as aliens who did not have lawful immigration status
rests with ICE, the Enforcement Removal Operation, the ERO. It
is my understanding certain individuals subject to orders were
removal from the United States are often delayed due to the
respective host government relations with the United States and
members.
Madam Chairwoman, I will have a handout on this, an
overhead to go over this, and ask the witnesses on this
particular issue. Consequently host countries refuse to accept
the return of the nationals or use lengthy delay tactics. I
know this is an issue that I sat down with John Morton in the
State Department trying to get the State Department to move a
little faster on this particular issue. I look forward to
hearing more from the State and GAO about the U.S. former
relations with these recalcitrant countries and why visas
continue to be issued to individuals from such countries, and
at what rate and as well as recommended steps for improvement
and actions being taken. Again, Members, I would ask you to
look at this particular issue as we talk about this.
Also within DHS and ICE, ICE has stood up a visa security
unit, the VSUs, at high-risk visa issuing posts. It is my
understanding, I might be wrong, but it is my understanding
that historically there has been some tension between ICE and
State regarding getting new VSUs established and hopefully we
have gone beyond that turf battle. I hope to hear from the two
agencies about whether they have made progress in overcoming
those obstacles.
Customs and Border Protection also plays an important role
in preventing terrorist travel to the United States. They have
established the Immigration Advisory Program Units at key
overseas airports to help screen travelers to the United
States. Also I visited the CBP's National Targeting Center and
I have seen the good work that they are doing along with their
interagency partners, prescreening individuals en route to the
country.
Many believe that given its security missions and resources
DHS should play an even greater role in the visa processes. At
a minimum we need to make most of our limited visa security
resources and ensure that all agencies are doing their part.
I look forward to hearing from our DHS and State witnesses
about how their agencies can work cooperatively to prevent
those who would seek to do us harm from traveling to the United
States.
It is worth noting that despite all the attention of the
vulnerabilities along the Southern border, and again I
emphasize to Members, an estimated 40 to 48 percent, as the
Chairwoman said, of those currently in the United States
illegally entered legally through the proverbial front door but
have overstayed, again visas legally into the United States but
overstayed, not crossing the Rio Grande.
We know that the overwhelming majority of those who enter
the country do so for legitimate purposes. Even those who enter
the country illegally or enter legally but overstay the
majority mean this country no harm. But nevertheless those
people have overstayed and violated the law.
However, a decade after 9/11 the fact remains that there
are terrorists and others who seek to enter the United States
for purposes to hurt us and our communities. So I look forward
to a good, frank dialogue on this important Homeland Security
matter, and I thank the Chairwoman Miller for holding this
important hearing and the witnesses for joining us here today.
Thank you.
Mrs. Miller. I thank the gentleman. Before I recognize the
Ranking Member of the full committee I would ask unanimous
consent that the gentleman from Florida, Mr. Bilirakis, who is
the Chair of the committee's Subcommittee on Emergency
Preparedness, Response, and Communications, be permitted to sit
on the dais and participate in today's hearing.
Without objection, so ordered.
At this time the Chairwoman would recognize the Minority
Ranking Member of the full committee, the gentleman from
Mississippi, Mr. Thompson, for his opening statement.
Mr. Thompson. Thank you very much, Madam Chairwoman. I
appreciate you holding this hearing. I also welcome our panel
of witnesses.
In the aftermath of the September 11 attacks, Congress
recognized the importance of securing the visa process and
required it to be used as a counterterrorism tool. Since that
time the Departments of Homeland Security and State have made
important strides toward better securing the visa and passenger
prescreening processes for travelers to the United States,
efforts including establishing visa security units at high-risk
embassies and consulates, deploying immigration advisory
program personnel at foreign airports and enhancing
prescreening of airline passengers before they arrive in the
United States. However, the attempted bombing of Northwest
flight 253 on Christmas day 2009, by an individual with a valid
U.S. visa served as a wake-up call about the persistent visa
security vulnerabilities.
During the 111th Congress, the Committee on Homeland
Security and this subcommittee held hearings to examine the
circumstances surrounding the attempted Christmas day bombing.
From our examination of the chain of events leading up to the
incident, it is clear that there were several failures that
allowed the perpetrator to board the U.S.-bound flight.
Today I look forward to hearing what progress has been made
in closing those security gaps since that incident nearly 2
years ago. I also hope to hear that DHS and the State
Department have taken proactive measures to address possible
emerging threats to visa security. I have long held that we
must develop a layered security approach that pushes borders
out and begins the screening process far in advance of a
passenger boarding a flight in this country.
Both DHS and the State Department have vital roles to play
in this effort. Clearly defined responsibility and close
coordination between the departments are essential to success.
I want to hear from the witnesses today whether the turf
battles between the departments are now a thing of the past or
if they still linger. I certainly hope it is the former and not
the latter.
Of course these security efforts require appropriate
personnel and resources and that in turn requires adequate
funding. Members of Congress who talk a good game on border
security will need to put their money where their mouths are
when it comes to funding these programs, even in tight
budgetary times.
Just as we must ensure the security of the visa process for
those entering the United States, we must also ensure
individuals depart this country in a timely manner. As already
indicated, over 40 percent of the persons unlawfully present in
the United States enter this country legally and have
overstayed. Among those millions of people may be a handful of
those who seek to do us harm.
In accordance with the 9/11 Commission recommendations,
Congress has repeatedly required DHS to deploy a biometric
entry-exit system under US-VISIT to attract visitors to the
United States. Yet a decade after September 11, 2001, we are no
closer to having such a system than we were on that fateful
day. Some of us read the paper this morning and I guess
somebody is going to tell us something new about that in this
hearing. I look forward to hearing that. The lack of progress
toward this mandate under this administration and its
predecessors is simply unacceptable. I hope to hear from our
witnesses about how DHS can fully fulfill our 9/11 Commission
recommendations and Congressional mandates. We will never truly
have visa security until an entry-exit system is completed.
I thank the witnesses for being here today and I look
forward to their testimony. I yield back.
Mrs. Miller. I thank the gentleman for his comments. It is
interesting to note that the administration is going to be
making an announcement about this issue based on the fact that
we are having a hearing about it. So I sometimes think it is
exactly what Congress needs to be doing, exercising its
oversight responsibilities to get some action on various
things.
What I will do is go through and read the bios of our very
distinguished panel, and we appreciate you all coming. We can
go through rather than interrupting each time.
First Mr. Thomas Winkowski, who is the Assistant
Commissioner from the Office of Field Operations, U.S. Customs
and Border Protection, Department of Homeland Security, was
appointed the Assistant Commissioner in August 2007. He is
responsible for operations at 20 major field offices, 331 ports
of entry, 58 operational container security initiative ports,
and 15 preclearance stations in Canada, Ireland, the Caribbean.
Previously he served as Director of Field Operations in Miami,
where he was responsible for managing all inspectional
operations at the Miami International Airport and the seaport,
Port Everglades, Fort Lauderdale International Airport, and
West Palm Beach and Key West as well.
Then we will hear from Mr. Edward Ramotowski, who is the
Deputy Assistant Secretary, Acting, Bureau of Consular Affairs,
the U.S. Department of State. He assumed his current position
as Managing Director of Visa Services at the U.S. Department of
State in August 2009, and in that position he oversees the visa
office in Washington, DC, two domestic processing centers, as
well as visa operations at over 200 U.S. embassies and
consulates abroad. From August 2006 to July 2009 he served as
principal officer at the U.S. Consulate General in Guadalajara,
Mexico. He has previously worked as a Special Assistant to the
Assistant Secretary of State for Consular Affairs, Chief of the
Consular Section of the U.S. Embassy in Nassau, Bahamas and the
U.S. Council in Warsaw, Poland.
Then we will hear from Mr. John Cohen, who is the Deputy
Counterterrorism Coordinator, Department of Homeland Security.
He serves as the Principal Deputy Coordinator for
Counterterrorism at the U.S. Department of Homeland Security,
and as the Senior Advisor on Counterterrorism, Law Enforcement
and Information Sharing. He has also served as the Senior
Advisor to the Program Manager for the Information Sharing
Environment, Office of the Director of National Intel, where he
authored and coordinated the implementation of key components
of the National Strategy for Information Sharing.
Peter Edge, the Deputy Associate Director, Homeland
Security Investigations, Immigration and Customs Enforcement,
Department of Homeland Security, began his law enforcement
career in 1986 in Essex County, New Jersey Prosecutor's Office,
prior to his selection as a Special Agent was with the U.S.
Customs Service in Newark, New Jersey. In 2005, Mr. Edge was
promoted to the position of Assistant Special Agent in Charge
of the SAC New York office where he lead high-profile
investigative components such as the El Dorado Task Force, the
New York High Intensity Financial Crime Area, JFK International
Airport, and the Immigration Division. Today he serves as the
Deputy Associate Director of Homeland Security Investigations
for the U.S. Immigration And Customs Enforcement.
Then we will hear from Mr. Richard Stana, we welcome him
back to the committee again, the Director of the Homeland
Security and Justice, Government Accountability Office. During
his 27-year career with the GAO, he has directed reviews on a
wide variety of complex domestic and military issues while
serving in headquarters, field, and overseas offices. Most
recently he has directed GAO's work relating to immigration,
customs law enforcement, drug control corrections, court
administration, and election system.
So you can see we have a very, very distinguished panel. We
will begin with Mr. Winkowski. The floor is yours, sir, for
your prepared testimony.
STATEMENT OF THOMAS WINKOWSKI, ASSISTANT COMMISSIONER, OFFICE
OF FIELD OPERATIONS, U.S. CUSTOMS AND BORDER PROTECTION,
DEPARTMENT OF HOMELAND SECURITY
Mr. Winkowski. Good morning, Chairwoman Miller, Ranking
Member Cuellar, and distinguished Members of the subcommittee.
Thank you for the opportunity to appear today to discuss CBP's
visa security efforts.
Since its establishment in 2001, the National Targeting
Center's priority mission has been to provide tactical
targeting and analytical research support for CBP's
antiterrorism efforts. The NTC develops tactical data and
actual intelligence to prevent high-risk travelers and goods
from entering the United States.
Centralized NTC targeting endeavors combined with
interagency collaboration as well as robust partnerships with
our foreign counterparts ensure a coordinated response to
terrorists in National security events.
CBP works in coordination and collaboration with a number
of Government agencies with broad authorities, robust
capabilities, and missions that are complimentary for other
Nation's security. Each agency's unique capability and
resources leverage DHS's layered risk management approach to
safeguarding U.S. borders.
A few critical examples of this, Chairwoman Miller, the NTC
coordinates with the terrorist screening center to resolve
every terrorist screening database encounter. We work closely
with the State Department to enhance visa security. As a
result, the State Department has revoked more than 1,000 visas
based on CBP's vetting results and recommendations.
ICE has collocated visa security personnel at the National
Targeting Center to augment and expand current operations. We
are collaborating with TSA in the private sector on an air
cargo advanced screening pilot which was implemented following
the October 2010 attempts by extremists to ship explosive
devices in their cargo shipments.
Additionally, CBP has information-sharing agreements with
foreign partners, including Canada, the United Kingdom, New
Zealand, and Australia.
On an average day CBP processes nearly 1 million travelers
at our ports of entry. The challenge faced by CBP each day is
rapidly and accurately identifying those individuals that pose
a threat to the United States and prevent their entry into the
country. CBP takes action at a number of points in the travel
continuum.
In the area of visa and visa waiver program security, while
the State Department is responsible for visa issuance, CBP has
partnered with the State Department to ensure the visa issuance
and travel process. In March 2010 we implemented a system that
vets all visas on a continuous basis.
Under the Visa Waiver Program and the Electronic System for
Travel Authorization, ESTA, we conduct enhanced vetting on Visa
Waiver Program applicants in advance of travel. As you recall,
that was a 9/11 Commission recommendation.
In the area of predeparture screening, CBP now conducts
predeparture screening of all travelers prior to boarding
flights bound for the United States. When the NTC identifies a
high-risk traveler through this process, we coordinate with our
immigration advisory program offices that are located in 8
airports around the world or our regional carry liaison group
which is located in three areas in the United States, in
Honolulu, JFK Airport, and Miami International Airport, to
resolve the issues or recommend to the carrier that a traveler
not be boarded.
Now as a result of these efforts 100 percent of travelers
on all flights arriving at and departing from the United States
are checked against Government databases prior to boarding a
flight. In fiscal year 2011, CBP made more than 2,000 no-board
recommendations to carriers. In the area of outbound in
addition to predeparture screening of inbound travelers, we
have also enhanced our outbound screening efforts. As a result
CBP has notable success in identifying and preventing the
departure of the Time Square bomber in May 2010 as well as a
suspected serial killer that was departing Atlanta airport in
August 2010.
In closing, CBP is continuing proactively looking for
solutions to threats to the homeland identified by
operationalizing intelligence through real-time targeting,
officer screening, and data sharing. Partnering with our
agencies and nations, effectively extending our borders and
exchanging information, makes this a truly global fight again
terror.
Our future state should include additional screening
processes and methods to make this protection a greater reality
so the American public remains safe. Chairwoman Miller, Ranking
Member Cuellar, and Members of the subcommittee thank you for
the opportunity to testify. I look forward to answering your
questions.
[The statement of Mr. Winkowski follows:]
Prepared Statement of Thomas Winkowski
September 13, 2011
Chairwoman Miller, Ranking Member Cuellar, and distinguished
Members of the subcommittee, thank you for the opportunity to appear
today to discuss the good work of U.S. Customs and Border Protection
(CBP) related to ensuring and enforcing security measures implemented
since the attacks of September 11, 2001. I appreciate the committee's
leadership and your commitment to helping ensure the security of the
American people.
cbp's role in multiple layers of defense
CBP and, more broadly, Department of Homeland Security (DHS)
continually refine our risk-based and layered approach to security,
focusing our resources on the greatest vulnerabilities, extending our
borders outward, and interdicting threats before they reach the United
States. DHS, in cooperation with our interagency and foreign partners,
is now screening people and goods earlier in the travel process. With
more advanced and better quality data than ever before, we now employ
an extensive network of research and analysis well before a traveler
applies for admission at a U.S. port of entry.
Depending on the traveler's point of origin and travel and entry
document requirements, the screening process can begin in a number of
ways: With the application for a visa, application for electronic
travel authorization, purchase of an airline ticket, or arrival at a
foreign airport or domestic port of entry. At each step along the way,
CBP, in cooperation with other Government agencies and commercial
carriers, reviews information about the traveler, including their
documents, their effects, and/or their responses to questions, prior to
arrival at a U.S. port of entry. Several Federal agencies are
responsible for different aspects of our aviation security, while other
countries and the private sector--particularly the air carriers--also
have important roles to play. These multiple layers of defense across
departments and agencies secure the aviation sector and ensure the
safety of the traveling public.
The foiled plot to bring liquid explosives onboard U.S.-bound
flights from the United Kingdom in 2006, the attempted bombing of
Northwest Flight 253 on December 25, 2009, the failed Times Square
bombing in May 2010, and the attempts to mail explosive devices within
printer cartridges from Yemen in October 2010 are all powerful
illustrations that terrorists continue to try to overcome security
measures we have enacted since September 11, 2001.
CBP continually evaluates and supplements existing security
measures with additional enhancements to strengthen our ability to
identify and prevent the international travel of mala fide travelers
and cargo. The success of these additional security measures depends in
great part on our ability to gather, share, and respond to information
in a timely manner--using both strategic intelligence to identify
existing and emerging threat streams, and tactical intelligence to
perform link analysis and targeted responses.
CBP and Intelligence
As part of our efforts to screen passengers bound for the United
States, CBP uses the U.S. Government's consolidated terrorist watch
list, specifically, the Terrorist Screening Database (TSDB), managed by
the Terrorist Screening Center. In addition, we use additional relevant
information from the intelligence community to determine whether
someone may be a risk to a flight, requires further screening and
investigation, should not be admitted, or should be referred to
appropriate law enforcement personnel.
Further, CBP's Office of Intelligence and Investigative Liaison
(OIIL), which serves as the situational awareness hub for CBP, provides
timely and relevant information along with actionable intelligence to
operators and decision-makers and improving coordination of CBP-wide
operations. Through prioritization and mitigation of emerging threats,
risks, and vulnerabilities, OIIL helps CBP to better function as an
intelligence-driven operational organization and turns numerous data
points and intelligence into actionable information for CBP officers
and analysts.
National Targeting Center
The National Targeting Center (NTC) is another key tool for DHS in
analyzing, assessing, and making determinations based on the TSDB and
other intelligence information. The NTC is a 24/7 operation,
established to provide tactical targeting information aimed at
interdicting terrorists, criminal actors, and contraband at the
earliest point. CBP's Automated Targeting System (ATS) is a decision-
support tool crucial to the operation of the NTC and is a primary
platform used by DHS to match travelers, conveyances, and shipments
against law enforcement information and known patterns of illicit
activity.
Safeguards for Visas and Travel
One of the initial layers of defense in securing air travel is
preventing dangerous persons from obtaining visas, travel
authorizations, and boarding passes. Before boarding a flight destined
for the United States or arriving at a U.S. port of entry, most foreign
nationals need to obtain a visa--issued by a U.S. embassy or
consulate--or, if they are eligible to travel under the Visa Waiver
Program (VWP), they must apply for a travel authorization issued
through the Electronic System for Travel Authorization (ESTA).\1\
---------------------------------------------------------------------------
\1\ Exceptions would be citizens of countries under other visa
exempt authority, such as Canada. Citizens of countries under visa
exempt authority entering the U.S. via air are subjected to CBP's
screening and inspection processes prior to departure. In the land
environment, they are subjected to CBP processing upon arrival at a
U.S. port of entry.
---------------------------------------------------------------------------
The Department of State (DOS) is responsible for visa issuance. DOS
also screens all visa applicants' biographic data against the DOS
Consular Lookout and Support System, which includes entries that alert
consular officers to the existence of TSDB files, for records related
to potential visa ineligibilities and checks their biometric data
(i.e., fingerprints and facial images) against other U.S. Government
databases for records indicating potential security, criminal, and
immigration violations prior to the issuance of the visa. For
individuals traveling under the VWP, CBP operates ESTA, a web-based
system through which individuals must apply for travel authorization
prior to traveling to the United States. Through ESTA, CBP conducts
enhanced vetting of VWP applicants in advance of travel to the United
States in order to assess whether they could pose a risk to the United
States or the public at large. Additionally, through interactive
communications with CBP, air carriers are required to verify that VWP
travelers have a valid authorization before boarding an aircraft bound
for the United States.
Pre-departure Vetting
CBP can also gather information and assess risk at the point of
travel booking. CBP conducts pre-departure and outbound screening for
all international flights arriving into and departing from the United
States. This works in concert with the Transportation Security
Administration's Secure Flight program, which vets 100 percent of
passengers flying to, from, and within the United States against the No
Fly and Selectee portions of the known or suspected terrorist watch
list, or TSDB. The NTC uses a variety of data sources and automated
enforcement tools to perform its function. The process starts when a
traveler purchases a ticket for travel to the United States; a
Passenger Name Record (PNR) may be generated in the airline's
reservation system. PNR data contains various elements, including
information on itinerary, co-travelers, changes to the reservation, and
payment information. CBP receives PNR data from the airline at various
intervals beginning 72 hours prior to departure and concluding at the
scheduled departure time.
CBP uses the Automated Targeting System (ATS) to then evaluate the
PNR data against ``targeting rules'' that are based on law enforcement
data, intelligence information, and past case experience. ATS allows
CBP to identify and interdict travelers with potential nexus to
transnational crime, including terrorism, narcotics trafficking, and
human smuggling.
The traveler's check-in provides the next opportunity in the travel
process for CBP to gather information and assess risk. On the day of
departure, when an individual checks in for his or her intended flight,
the basic biographic information from the individual's passport is
collected by the air carrier and submitted to CBP's Advance Passenger
Information System (APIS). Carriers are required to verify the APIS
against the traveler's government-issued travel document and provide
the data to DHS at least 30 minutes before departure, or up to the time
of securing the doors if using APIS Quick Query, for all passengers and
crew on board.\2\ APIS data contains important identifying information
that is not included in PNR data, including verified identity and
travel document information such as a traveler's date of birth,
citizenship, and travel document number. DHS vets APIS information on
all international flights to and from the United States against the
TSDB, as well as against criminal history information, records of lost
or stolen passports, public health records, and prior immigration or
customs violations and visa refusals. APIS is also connected to
Interpol's lost and stolen travel document database for routine queries
on all foreign passports used for check-in.
---------------------------------------------------------------------------
\2\ APIS is the electronic data interchange for air carrier
transmissions of electronic passenger, crew member, and non-crew member
manifest data.
---------------------------------------------------------------------------
Another layer in the vetting process is the Immigration Advisory
Program (IAP), which stations CBP officers at eight foreign airports in
six countries in coordination with the host foreign governments.
Officers are deployed to these key transit hubs and work with border
control authorities, foreign law enforcement agencies, and air carriers
to identify known or suspected terrorists and other high-risk travelers
and assist in preventing them from boarding aircraft destined for the
United States. CBP officials at the NTC support IAP by screening all
travelers against the TSDB, including the subset No Fly list, ESTA
denials, visa revocations, public health lookouts, lost and stolen
passport records, and all State Department records for persons
identified as actually, or likely, having engaged in terrorist
activity. At IAP locations, CBP officers can make ``no board''
recommendations to carriers and host governments regarding passengers
bound for the United States who may constitute security risks, but
officers do not have the authority to arrest, detain, search, or
prevent passengers from boarding planes. Those authorities lie with the
host government.
After the attempted bombing on December 25, 2009, CBP expanded on
the NTC's IAP pre-departure screening efforts to include screening at
all foreign airports with direct flights departing to the United States
to identify and assess risks prior to travel and prevent the boarding
of high-risk travelers. When pre-departure screening identifies a
potential high-risk traveler, the NTC confirms the information through
vetting procedures, and then coordinates the issuance of ``no board''
recommendations to carriers via the nearest ICE or CBP Attache, Air
Carrier Security Office, and the CBP Regional Carrier Liaison Group.
Now, as a result of these efforts, 100 percent of travelers on all
flights arriving at and departing from the United States are checked
against Government databases prior to boarding a flight. During fiscal
year 2011 to date, pre-departure screening by the NTC has kept more
than 2,000 high-risk or otherwise inadmissible travelers from boarding
flights destined for the United States.
In March 2010, the NTC implemented a new program to conduct
continuous vetting of U.S. nonimmigrant visas that have been recently
issued, revoked, and/or denied. The continuous vetting ensures that
changes in a traveler's visa status are identified in near real-time,
allowing CBP to immediately determine whether to provide a ``no board''
recommendation to a carrier or recommend that DOS revoke the visa, or
whether additional notification should take place for individuals
determined to be within the United States. If a violation is
discovered, and the person is scheduled to travel to the United States,
CBP will request that DOS revoke the visa and recommend that the
airline not board the passenger. If no imminent travel is identified,
and derogatory information exists that would render a subject
inadmissible, CBP will coordinate with DOS for a prudential visa
revocation. If the subject of an existing visa revocation initiated by
the DOS or recommended by CBP is found to be in the United States, CBP
will notify the ICE Counterterrorism and Criminal Exploitation
Enforcement Unit for further action as appropriate.
Additionally, ICE has co-located Visa Security Program (VSP)
personnel at the NTC to augment and expand current operations. ICE
special agents and intelligence analysts conduct thorough analysis and
in-depth investigations of high-risk visa applicants. The focus of the
VSP and NTC are complementary: The VSP is focused on identifying
terrorists and criminal suspects and preventing them from exploiting
the visa process and reaching the United States, while the NTC provides
tactical targeting and analytical research in support of preventing
terrorist and terrorist weapons from entering the United States. The
co-location of VSP personnel at the NTC has helped increase both
communication and information sharing.
Vetting While En Route to the United States and Upon Arrival
While flights are en route to the United States, CBP continues to
evaluate the updated APIS and PNR information submitted by the
airlines. Based on the information garnered during the in-flight
analysis, as well as the CBP officer's observations at the port of
entry, a determination is made as to whether the traveler should be
admitted to the United States following primary inspection or referred
for a secondary inspection.
conclusion
As this committee no doubt knows, we live in a world of ever-
evolving risks, and we must move as deftly as possible to identify and
fix security gaps and to anticipate future vulnerabilities. CBP will
continue to work with our colleagues within DHS, and with DOS, and the
intelligence community to address these challenges.
Chairwoman Miller, Ranking Member Cuellar, and Members of the
subcommittee, thank you for this opportunity to testify. I look forward
to answering your questions.
Mrs. Miller. Thank you very much. The Chairwoman now
recognizes Mr. Ramotowski for his comments and his testimony.
STATEMENT OF EDWARD J. RAMOTOWSKI, DEPUTY ASSISTANT SECRETARY,
ACTING, BUREAU OF CONSULAR AFFAIRS, U.S. DEPARTMENT OF STATE
Mr. Ramotowski. Good morning, Madam Chairwoman, Ranking
Member Cuellar, and distinguished Members of the subcommittee.
As a 25-year veteran of the United States Foreign Service, it
is an honor to testify before you just 2 days after our Nation
marked such a somber event, the 10-year anniversary of the 9/11
attacks. My colleagues and I in the Foreign Service in the
State Department will never forget that day, and we are fully
determined to ensure that such a tragedy does not occur again.
My focus today is on how the Department of State reformed
the visa process in the 10 years since 9/11 to eliminate
loopholes for terrorists to exploit our system, as well as
additional measures the Department undertook in response to the
December 25, 2009 attempted airline bombing.
Today visa processing rests on a multi-layered approach to
security, what we refer to as the five pillars, technological
advances, biometric innovations, personal interviews,
interagency data sharing, and intensive training. All of these
pillars supported the Department's response to the Christmas
day incident and we are continually refining and improving them
to deal with constantly evolving threat.
Among the key measures taken, we improved our visa Viper
terrorist information reporting program, by directing all
chiefs of mission to ensure that it was working effectively at
all their posts and instructing consular officers to include
complete information about the U.S. visa status of any
individuals included in Viper reporting.
As a second critical step, we issued new instructions to
officers on visa revocation procedures, and we enforced
standing guidance on their discretionary authority to deny
visas under Section 214(b) of the Immigration and Nationality
Act with specific reference to cases that raise security and
other serious concerns.
We also created a dedicated revocation unit in Washington
that is focused exclusively on ensuring that any derogatory
information on a U.S. visa holder is rapidly evaluated and
acted upon.
As another step, we improved the capability of consular
systems to match visa records against new and emerging
derogatory information, to support the revocation process in
appropriate cases. We employ sophisticated name searching
algorithms to ensure matches to derogatory information
contained in the millions of records in our lookout system. We
use our authority to immediately revoke a visa in circumstances
where we believe there is an imminent threat.
The continuous vetting of the database of issued visas by
the Department and our partner agencies helps ensure that new
derogatory information that arises after visa issuance is
rapidly analyzed for revocation purposes.
Let me briefly turn to the overall visa security and the
five-pillar system we have in place today. Before any visa is
issued the applicant's fingerprints are screened against DHS
and FBI databases. We use facial recognition technology to
screen visa applicants against a watch list of photos obtained
from the terrorist screening center as well as visa applicant
photos contained in our own consular consolidated database.
Our new on-line visa application forms have the potential
to provide consular and fraud prevention officers as well as
our intelligence and law enforcement partners the opportunity
to analyze data in advance of a visa interview, including the
detection of potential nonbiographic links to derogatory
information. We have ambitious plans to screen more of this
data with our partner agencies to make the visa system even
more secure.
We also invest heavily in our people. Each consular officer
completes the basic consular course and receives continuing
advanced education in interviewing and name-checking techniques
throughout his or her career. Language fluency and area and
culture knowledge are other important skill sets that consular
officers use daily to improve the adjudication of visas.
We work closely with our partners to ensure that no
terrorist receives a visa or is admitted into our country. Our
vast database of visa information is fully available to other
agencies and we have specifically designed our systems to
facilitate comprehensive data sharing. In return we have
unprecedented levels of cooperation with law enforcement and
intelligence agencies and benefit from their capabilities and
resources in ways that were not possible at the time of 9/11 or
even on Christmas day 2009.
Distinguished Members of the committee, our current layered
approach to border security screening in which each agency
applies its particular strengths and expertise best serves our
border security agenda while furthering traditional U.S.
interest in legitimate travel, trade promotion, and exchange of
ideas. The United States must meet both goals to guarantee our
long-term security.
Thank you and I welcome your questions.
[The statement of Mr. Ramotowski follows:]
Prepared Statement of Edward J. Ramotowski
September 13, 2011
Good afternoon Madame Chairwoman Miller, Ranking Member Cuellar,
and distinguished Members of the committee. I thank you for this
opportunity to update you on the steps we have taken to increase the
security of the visa process.
The Department of State (the ``Department'') is dedicated to the
protection of our borders, and has no higher priority than the safety
of our fellow citizens. We are the first line of defense in border
security because the Department is often the first Government agency to
have contact with foreign nationals wishing to visit the United States.
We are committed, along with our partner agencies, to a layered
approach to border security that will enable the U.S. Government to
track and review the visa eligibility and status of foreign visitors
from their visa applications throughout their travel to, sojourn in,
and departure from, the United States.
corrective actions implemented after december 25, 2009
After the December 25, 2009 attempted terrorist attack on Northwest
flight 253, the President ordered corrective steps to address
identified weaknesses in the systems and procedures we use to protect
the people of the United States. In the months following the attack, we
reviewed our requirements for reporting potential terrorists who are
not applying for visas, which fall under our ``Visas Viper'' program,
as well as visa issuance and revocation criteria, and we introduced
technological and procedural enhancements to facilitate and strengthen
visa-related business processes.
Our immediate focus was on the deficiencies identified following
the attempted attack on flight 253 by Umar Farouk Abdulmutallab. On the
day following his father's November 2009 visit to the U.S. Embassy in
Abuja, Nigeria, the Embassy sent a Visas Viper cable to the Department
and the Washington intelligence and law enforcement community, stating
that Abdulmutallab may be involved with Yemeni-based extremists. In
sending the cable and checking State Department records to determine
whether Abdulmutallab had a visa, Embassy officials misspelled his
name, and as a result of that misspelling, information about previous
visas issued to him, and the fact that he held a valid U.S. visa, was
not included in the cable.
At the same time, the Consular Section entered Abdulmutallab's name
into the Consular Lookout and Support System (CLASS), our on-line
database of lookout information. This correctly spelled CLASS lookout
was shared automatically with the primary lookout system used by the
Department of Homeland Security (DHS) and accessible to other agencies.
On the basis of this CLASS entry, DHS's U.S. Customs and Border
Protection (CBP) determined, after the flight departed Amsterdam, that
Abdulmutallab warranted secondary screening upon arrival in Detroit.
Additional reporting on this case carried the correct spelling, with
additional reports reaching the necessary agencies in Washington.
To address the deficiencies identified in that review, including
our concerns with the Visas Viper process, we took immediate action to
improve the procedures and content requirements for Visas Viper cable
reporting. We directed all Chiefs of Mission to ensure that the Visas
Viper program functioned effectively at their posts, and that all
appropriate agencies and offices at post contributed relevant
information for Viper nominations. We instructed consular officers to
include complete information about all previous and current U.S. visas
in Visas Viper cables. The guidance cable included specific
instructions on methods to comprehensively and intensively search the
database of visa records so that all pertinent information is obtained.
We also issued new instructions to officers regarding procedures and
criteria used to revoke visas and reiterated guidance on consular
officers' use of the discretionary authority to deny visas under
section 214(b) of the Immigration and Nationality Act (INA), with
specific reference to cases that raise security and other concerns.
Instruction in appropriate use of this authority has been a fundamental
part of officer training for several years.
In addition to changes in standard procedures for searching visa
records, we immediately began working to refine the capability of our
current systems, with a particular focus on matching records of
currently valid visas against new and emerging derogatory information,
to support visa revocation in appropriate cases. For visa applications,
we employ strong, sophisticated name-searching algorithms to ensure
matches between names of visa applicants and any derogatory information
contained in the 42 million records found in CLASS. This robust
searching capability, which takes into account variations in spelling,
has been central to our procedures since automated lookout system
checks were mandated following the 1993 World Trade Center bombing. We
constantly use our significant and evolving experience with searching
mechanisms for derogatory information to improve the systems for
checking our visa issuance records.
CLASS has grown more than 400 percent since 2001--largely as a
result of improved data sharing among the Department, Federal law
enforcement agencies, and the intelligence community. Almost 70 percent
of CLASS records come from other agencies, including information from
the FBI, DHS, DEA, and the intelligence community. CLASS also includes
unclassified records regarding known or suspected terrorists (KSTs)
from the Terrorist Screening Database, which is maintained by the
Terrorist Screening Center (TSC) and contains unclassified data on KSTs
nominated by all U.S. Government sources. We automatically run all
applicants' names against the Department's Consular Consolidated
Database (CCD), which holds our historical visa records, as part of our
on-going commitment to optimizing the use of our systems to detect and
respond to derogatory information regarding visa applicants and visa
holders. A system-specific version of the automated CLASS search
algorithm runs the names of all visa applicants against the CCD to
check for any prior visa applications, refusals, or issuances.
The Department has been continuously matching new threat
information with our records of existing visas since 2002. We have long
recognized this function as critical to the way we manage our records
and processes. This system of continual vetting evolved as post-9/11
reforms were instituted, and is now performed in cooperation with the
TSC. All records added to the Terrorist Screening Database are checked
against the CCD to determine if there are matching visa records.
Matches are sent electronically from the Department to TSC, where
analysts review the hits and flag cases for possible visa revocation.
In addition, we have widely disseminated our data to other agencies
that may wish to learn whether a subject of interest has a U.S. visa.
Cases for revocation consideration are forwarded to the Department
by our consular offices overseas, CBP's National Targeting Center
(NTC), and other entities. As soon as information is established to
support a revocation (i.e., information that could lead to an
inadmissibility determination), a ``VRVK'' entry code showing the visa
revocation is added to CLASS, as well as to biometric identity systems,
and then shared in near-real time (within about 15 minutes) with the
DHS lookout systems used for border screening. As part of its enhanced
``Pre-Departure'' initiative, CBP uses these VRVK records, among other
lookout codes, to recommend that airlines should not board certain
passengers on flights bound for the United States. Almost every day, we
receive requests to review and, if warranted, revoke any outstanding
visas for aliens for whom new derogatory information has been
discovered since the visa was issued. Our Operations Center is staffed
24 hours a day, 7 days a week, to address urgent requests, such as when
a potentially dangerous person is about to board a plane. In those
circumstances, the State Department can and does use its authority to
revoke the visa, and thus prevent boarding.
The Department has broad and flexible authority to revoke visas and
we use that authority widely to protect our borders. Since 2001, the
Department has revoked approximately 60,000 visas for a variety of
reasons, including nearly 5,000 for suspected links to terrorism; 1,451
of those occurring since the attempted attack on December 25, 2009.
Following that incident, we reviewed the last 10 years of Visas Viper
nominations, as well as ``P3B'' entries (potentially ineligible for a
visa due to suspected ties to terrorism) in CLASS to determine whether
Visas Viper subjects were properly watch listed, and to determine the
visa status of all P3B subjects. The Department's Visa Office completed
a review of all 2001-2010 data and revoked 30 visas.
Most revocations are based on new information that has come to
light after visa issuance. Because individuals' circumstances change
over time, and people who once posed no threat to the United States can
become threats, revocation is an important tool. We use our authority
to revoke a visa immediately in circumstances where we believe there is
an immediate threat. At the same time, we believe it is important not
to act unilaterally, but to coordinate expeditiously with our National
security partners in order to avoid possibly disrupting important
investigations.
a more secure visa application process
The Department constantly refines and updates the technology that
supports the adjudication and production of U.S. visas. Under the
Biometric Visa Program, before a visa is issued, the visa applicant's
fingerprints are screened against DHS's Automated Biometric
Identification System (IDENT), which has a watch list containing
available fingerprints of terrorists, wanted persons, and immigration
law violators; and against the FBI's Integrated Automated Fingerprint
Identification System (IAFIS), which contains more than 50 million
criminal history records. More than 10,000 matches of visa applicants
with records on the IDENT watch list are returned to posts every month,
normally resulting in visa refusals. In 2010, IAFIS returned more than
57,000 criminal arrest records to posts. The Biometric Visa Program
partners with the DHS US-VISIT Program to enable CBP officers at ports
of entry to match the fingerprints of persons entering the United
States with the fingerprints that were taken during visa interviews at
overseas posts and transmitted electronically to DHS IDENT. This
biometric identity verification at ports of entry has greatly enhanced
CBP officers' ability to identify photo-substituted visas and the use
of valid visas by imposters.
We also use facial recognition technology to screen visa applicants
against a watch list of photos of known and suspected terrorists
obtained from the FBI's TSC, as well as the entire gallery of visa
applicant photos contained in our CCD. Facial recognition screening has
proven to be another effective way to combat identity fraud.
The Consular Electronic Application Center (CEAC) is another major
technological advance. CEAC is an electronic platform where applicants
submit visa applications and photos via the internet, eliminating
paperwork, decreasing visa application and adjudication times, and
reducing the number of forms applicants must complete. The worldwide
roll out of the on-line DS-160 nonimmigrant visa application form is
complete, and we are currently piloting the on-line DS-260 immigrant
visa application form. These new on-line forms provide consular and
fraud officers the opportunity to analyze data in advance of the
interview, enhancing their ability to make decisions, and soon will
afford intelligence and law enforcement agencies opportunities to
analyze visa application data before applicants appear for their
interviews. The on-line forms offer foreign language support; however,
applicants are required to answer in English, to facilitate information
sharing between the Department and other Government agencies. The new
application forms are ``smart,'' meaning that certain answers to
questions will trigger subsequent questions. The system will not accept
applications if the security-related questions have not been fully
answered, and ``irregular'' answers are flagged to ensure that consular
officers address them in the interview.
In April 2011, we greatly enhanced the way we track visa fraud. We
globally deployed a tool called the Enterprise Case Assessment Service
that provides a platform to store fraud-related research that used to
be stored outside of consular systems. This new tool associates fraud-
related information with visa records, making it available to consular
officials around the world. Should fraud be confirmed during the course
of a visa interview, consular officers can record that data in this new
tool, where it can be easily referenced if the individual attempts to
re-apply for a visa. Future iterations of this tool will track fraud in
other consular services, such as U.S. passport applications, and will
enable us to track the activities of third-party document vendors and
visa fixers. We hope soon to be able to share this new data source with
our U.S. Government partners to enhance interagency cooperation on
fraud prevention.
student and exchange visitor visas
I am aware that the Members of this committee have a keen interest
in the processing of student and exchange visitor visas. Consular
processing of these visa classes follows the same sequence of
clearances as the other visa classifications, including collection of
biometrics and submission of the on-line DS-160 form. All CLASS and
other security checks apply.
In addition, in order for an applicant to demonstrate that he/she
is qualified to apply for a student or exchange visitor visa, the
applicant must have been issued specific documentation, in addition to
what is required for other visas classes, and present it to the
consular officer at the time of interview. A student, for instance,
must have been issued a Form I-20A-B by the school he/she will attend
in order to apply for an F-1 student visa (or for dependants, an F-2
visa), or a Form I-20M-N if the student has been accepted at a
vocational school. In order to qualify for an exchange visitor visa (J-
1, dependent J-2), the applicant must present a Form DS-2019 issued by
the designated sponsor of one of the 15 categories of exchange visitor
programs.
Upon acceptance to the chosen educational institution or
organization, the student or exchange visitor is assigned a unique ID
number in the Student and Exchange Visitor Information System (SEVIS),
a DHS database. The individual retains the same number throughout his
or her educational career.
For an applicant to be found eligible for an F, M, or J visa, the
student must meet the requirements specific to student or exchange
visitor status (accepted at a school authorized by DHS to issue the
Form I-20, pursuing a degree or certificate with sufficient finances,
etc.) necessary to participate in the type of program chosen. In
addition, the student must demonstrate the intent to engage only in
approved activities for the visa class, the ability to meet the
financial requirements of the activity undertaken, and demonstrate a
present intent to depart the United States upon the completion of the
chosen activity.
training
Consular officers are trained to take all necessary steps during
the course of making a decision on a visa application to protect the
United States and its citizens. Every consular officer is required to
complete the Department's Basic Consular Course at the National Foreign
Affairs Training Center prior to performing consular duties. The course
places strong emphasis on border security, featuring in-depth
interviewing and name-checking technique training, as well as fraud
prevention. Throughout their careers, consular officers receive
continuing education in all of these disciplines to ensure they
integrate the latest regulations and technologies into their
adjudicatory decisions.
To augment this training and strengthen the security of the visa
program, in early 2010 the Department launched a program to provide
consular officers overseas with enhanced security clearances. This
allows them to participate more fully in posts' review of security
issues that bear on the issuance of passports and visas, and the
protection of U.S. citizens traveling and living abroad. In the past
few months, a concerted push on this project resulted in the tripling
of the number of highly-cleared consular officers (to more than 150) in
key positions at high-threat posts. The Office of Counterintelligence
and Consular Support, in the Bureau of Intelligence and Research, has
increased its efforts to identify relevant reporting for review by
those consular officers.
security advisory opinions
The Department's Security Advisory Opinion (SAO) mechanism provides
consular officers with the necessary advice and background information
to adjudicate cases of visa applicants with possible terrorism
ineligibilities. Consular officers receive extensive training on the
SAO process, including modules on cultural and religious naming
conventions, which assists them in identifying applicants who require
additional Washington vetting. The SAO process requires the consular
officer to suspend visa processing pending interagency review of the
case and additional guidance. Most SAOs are triggered by clear and
objective circumstances, such as nationality, place of birth,
residence, or visa name check results. In addition, in cases where
reasonable grounds exist regardless of name check results, consular
officers may suspend visa processing and institute SAO procedures if
they suspect that an applicant may be inadmissible under the security
provisions of the INA.
the visa security program
The Department of State believes that the Visa Security Program
(VSP), under which DHS deploys U.S. Immigration and Customs Enforcement
(ICE) special agents to conduct visa security screening and
investigations at certain overseas consular posts, is a valuable
component of the U.S. Government's overall policy of protecting our
borders. We have a close and productive partnership with DHS, which has
authority for visa policy under section 428 of the Homeland Security
Act, and are fully supportive of the mission and future of the VSP, as
well a number of data-sharing arrangements.
The VSP increases the utility of the visa application and interview
processes to detect and combat terrorism, criminality, and other
threats to the United States and the traveling public. ICE special
agents assigned to Visa Security Units provide timely and valuable on-
site vetting of visa applications and other law enforcement support to
our consular officers. We work very closely with DHS to ensure that no
terrorist receives a visa or is admitted into our country.
Reports from our posts with ICE visa security operations suggest
that, as the VSP has matured over the past few years, ICE special
agents have, where resources permit, moved beyond a singular focus on
visa application review. They have been able to contribute their
expertise and resources to enhance our response to all kinds of threats
to the visa and immigration processes--terrorism, human smuggling and
trafficking, and trafficking in a wide variety of contraband. As
reported by one of our missions, ``(i)n addition to their concerns with
visa security, [ICE special agents'] efforts have also led to arrests
and indictments in the areas of child pornography and countering the
proliferation of controlled technology. This is a win-win
partnership.''
In Washington, we work very closely with our VSP colleagues on day-
to-day issues affecting the operations of the program, as well as
longer-term issues related to the expansion of the program to select
overseas posts. VSP special agents in Washington review our visa
databases and advise posts of emerging information about visa holders.
Another important aspect of our Washington partnership is the
resolution of issues raised as the VSP expands to more posts. In
January 2011, the Department's Bureaus of Consular Affairs (CA) and
Diplomatic Security (DS) concluded a Memorandum of Understanding (MOU)
with ICE. This MOU governs VSP-Department of State interactions within
visa sections, procedures for resolving the very few disputed visa
cases that emerge from the VSP review process, and collaboration
between ICE special agents and their DS law enforcement colleagues
assigned as Regional Security Officers (RSOs) or Assistant Regional
Security Officer Investigators (ARSO-Is) assigned to consular sections.
Under the umbrella of section 428 of the Homeland Security Act and
the implementing Memorandum of Understanding between the Departments of
State and Homeland Security, we work together to resolve cases. When
warranted, DHS special agents assigned to the VSP will conduct
targeted, in-depth reviews of individual visa applications and
applicants prior to issuance, and recommend refusal or revocation of
applications to consular officers. We work with DHS to ensure that
terrorists do not receive visas and to expeditiously revoke visas as
appropriate.
The Department works collaboratively with DHS, pursuant to an
October 2004 MOU between the Department and the VSP on the
``Administrative Aspects of Assigning Personnel Overseas,'' and
National Security Decision Directive 38 (NSDD-38). This directive
outlines factors to be considered by Chiefs of Mission when considering
requests by a U.S. Government agency to create a new position at a post
abroad. NSDD-38 gives Chiefs of Mission responsibility for the size,
composition, and mandate of U.S. Government agency staff under his or
her authority.
Currently, there are 19 visa-issuing posts in 15 countries with an
ICE VSP presence. Before submitting an NSDD-38 request, ICE officials,
with the support of senior State Department officers from CA and DS,
conduct a post-specific, on-site assessment. The visit provides an
opportunity for the team to consult with officials at post to validate
the interagency assessment of the risk environment, determine the
feasibility and timing of establishing an office, and brief the Chief
of Mission on the role of the VSP.
layered security and data sharing
The Department embraces a layered approach to security screening.
In addition to our support of the VSP, over the past 7 years the
Department and DHS have increased resources significantly, improved
procedures, and upgraded systems devoted to supporting the visa
function. DHS receives all of the information collected by the
Department during the visa process. DHS's US-VISIT is often cited as a
model in data sharing because the applicant information we provide,
including fingerprint data, is checked at ports of entry to confirm the
identity of travelers. DHS has broad access to our entire CCD, which
contains more than 143 million records, related to both immigrant and
nonimmigrant visas, covering the last 13 years. A menu of reports
tailored to the specific needs of each particular unit is supplied to
elements within DHS such as ICE's agents assigned to conduct visa
security investigations overseas.
We make all of our visa information available to other U.S.
Government agencies for law enforcement and counterterrorism purposes,
and we specifically designed our systems to facilitate comprehensive
data sharing with these entities. We give other agencies immediate
access to more than 13 years of visa data for these purposes, and they
use this access extensively. For example, in May 2011, over 23,000
officers from DHS, the Department of Defense (DoD), the FBI, DOJ, and
the Department of Commerce submitted nearly 2 million queries on visa
records in the course of conducting law enforcement and/or
counterterrorism investigations.
Working in concert with DHS, we have proactively expanded biometric
screening programs and integrated this expansion into existing overseas
facilities. In partnership with DHS and the FBI, we have established
the largest biometric screening program on the globe. We were a pioneer
in the use of facial recognition techniques and remain a leader in
operational use of this technology. Currently, more than 146 million
images are enrolled in our facial recognition database. In 2009, we
expanded use of facial recognition from a selected segment of visa
applications to all visa applications, and we are now expanding our use
of this technology to passport records. We are testing use of iris
recognition technology in visa screening, making use of both identity
and derogatory information collected by DOD. These efforts require
intense on-going cooperation from other agencies. We have successfully
forged and continue to foster partnerships that recognize the need to
supply accurate and speedy screening in a 24/7 global environment. As
we implement process and policy changes, we are always striving to add
value in both border security and in operational results. Both
dimensions are important in supporting the visa process.
In addition, every post that issues visas has a fraud prevention
officer and locally employed staff devoted specifically to fraud
prevention and document security. We have a large Fraud Prevention
Programs office in Washington, which works closely with DS, and we have
fraud screening operations using sophisticated database checks at both
the Kentucky Consular Center in Williamsburg, Kentucky, and the
National Visa Center in Portsmouth, New Hampshire. Their role in
flagging questionable applications and applicants who lack credibility,
present fraudulent documents, or give us false information adds a
valuable dimension to our visa process.
DS adds an important law enforcement element to the Department's
visa procedures. There are currently 75 ARSO-I positions approved for
73 consular sections overseas specifically devoted to maintaining the
integrity of the process. In 2010, DS approved 48 additional ARSO-I
positions to work in consular sections overseas. They are complemented
by officers working domestically on both visa and passport fraud
criminal investigations and analysis. These highly-trained law
enforcement professionals add another dimension to our border security
efforts.
The multi-agency team effort, based upon broadly-shared
information, provides a solid foundation for securing our borders. The
interagency community continues to automate processes to reduce the
possibility of human error while at the same time enhancing our border
security screening capabilities.
We face an evolving threat of terrorism against the United States.
The people and the tools we use to address this threat must be
sophisticated and agile and must take into account the cultural and
political environment in which threats arise. Our officers must be
well-trained, motivated, and knowledgeable. Information obtained from
these tools must be comprehensive and accurate. Our criteria for taking
action must be clear and coordinated. The team we use for this mission
must be the best. The Department has spent years developing the tools
and personnel needed to properly execute the visa function overseas and
remains fully committed to fulfilling its essential role on the border
security team.
training foreign passport officials
As part of our fraud prevention efforts, CA is working with the
International Narcotics and Law Enforcement Affairs (INL) Bureau
through INL's International Law Enforcement Academy (ILEA) network to
provide passport anti-fraud training to officials from foreign passport
issuance agencies.
The first class was piloted September 7-9, 2011 in El Salvador, for
officials from various Central American countries. The training is
designed to improve the integrity of other countries' passport issuance
by helping them institute organizations, processes, and procedures for
detecting fraudulent passport applications as part of their
adjudication and issuance processes.
We plan to offer this training in 2012 at the ILEAs in Botswana and
again in El Salvador.
foreign partner capacity-building programs
The Department regularly engages our foreign partners bilaterally,
regionally, and on a multilateral basis to address the issue of
terrorist transit. This engagement involves a range of activities,
including the exchange of information in a variety of security
channels, the execution of capacity-building programs on border and
document security, the provision of border screening programs like the
Terrorist Interdiction Program/Personal Identification Secure
Comparison and Evaluation System (TIP/PISCES), and regular
consultations on broader issues. Our capacity-building efforts are
intended to foster regional cooperation and collaboration, whether
through participation in organized regional groupings, such as the
Trans-Sahara Counterterrorism Partnership, which facilitate regional
training and exercises, or through assistance programs, such as the
Regional Security Initiative (RSI), which funds regional
Counterterrorism (CT) training and cooperative efforts across all CT
priority regions.
The Department works in close coordination with the interagency
community for the development and implementation of the full range of
CT programming, through a range of fora. In addition to participation
in regular National Security Council-led meetings, we have established
mechanisms, such as the aforementioned RSI, which brings together our
Embassy leadership with the full range of interagency representatives
to discuss key issues of regional concern. This is replicated at the
working level through the Regional Interagency Consultative Group. In
North Africa, as already noted, we also have the Trans-Sahara
Counterterrorism Partnership, through which State, DoD, and USAID
cooperate and coordinate efforts to strengthen the counterterrorism
capacity of our regional partners. The success of this approach has led
to consideration of a similar construct for other regions. In addition
to coordination through formal structures, we cooperate informally on a
regular basis with the Departments of Defense, Justice, Homeland
Security, and the Treasury on our counterterrorism efforts across the
board.
u.s. government efforts to stop terrorist travel
The U.S. Government has many programs designed to thwart terrorist
travel around the world. Many portions of the U.S. Government play a
critical role in stopping terrorist travel--DHS and its components,
DoD, the law enforcement and intelligence communities, and State
Department consular officers.
U.S. passports and visas contain sophisticated security features
that make them very difficult to forge. The electronic chips in our
passports and the machine readable lines on our visas employ some of
the most sophisticated technical security measures available. State
Department consular officers work with our partners from CBP and ICE to
train foreign border and airline personnel in the detection of
fraudulent travel documents. The Department's Office of the Coordinator
for Counterterrorism (S/CT) also helps foreign partners at risk for
terrorist activity to establish their own computerized stop-list
systems via the TIP/PISCES program.
In the additionally critical areas of international travel document
security and interoperability, we have intensified our work. With
passport-issuing authorities of International Civil Aviation
Organization (ICAO) member States around the globe, we have striven to
ensure that, as with the U.S. ePassport, other issuing authorities meet
internationally established standards for security and
interoperability. This has included the cooperative and growing use of
the Public Key Directory (PKD), which is centrally managed and overseen
by a board of actively participating ICAO member states. The PKD is a
directory used by a receiving state to verify the digital signature
used by a travel document's issuing authority, thereby authenticating
the passport in real time.
The ePassports, which we have been issuing since December 2005,
introduce a new class of security feature to identity documents: A
digital signature. The validation of a signature guarantees that the
chip contents, which include the facial image, are genuine and belong
to the physical document. Only on this basis can it be proven that a
specific ePassport was issued to the person that claims to be the
rightful owner. The ICAO PKD is integral to the effort to have an
efficient and commonly-accepted means of sharing and updating digital
signatures (public keys) used by the world's ePassport-issuing
authorities.
Where validation using the ICAO PKD occurs during travel, whether
at points of embarkation, transit, or upon entry, it provides much
greater levels of assurance than are currently possible with
traditional machine-readable travel documents. Border inspectors will
be better able to identify inadequately documented travelers. Border
inspectors worldwide can, in effect, assist the issuing authority in
enhancing the integrity of all ePassports.
The benefits of the ICAO PKD increase exponentially as the number
of States participating, and the number of ePassports in circulation,
increase. Participating States and entities stand to benefit most,
because their participation in the ICAO PKD maximizes global coverage
of validation of their travel documents.
Electronically reading the PKI adds a third level of security for
biometric passports, joining visual/tactile and laboratory features of
the document, and scanner reading of the biometric content. This
combination of features constitutes a tool bag for CBP officers to use
in verifying the authenticity of the person and his/her passport when
entering the United States.
The U.S. Government's advanced information-sharing initiatives
ensure that we and our international partners are in constant contact
regarding the threat of terrorist travel. CBP's use of Advance
Passenger Information (API) and Passenger Name Record (PNR) data are
valuable tools in detecting travel patterns and co-travelers of
terrorist suspects. The U.S. Government's agreements with foreign
partners under Homeland Security Presidential Directive (HSPD) 6 allow
us to share terrorist screening information with trusted partners, in
order to interdict known and suspected terrorists.
We also have entered into arrangements for the sharing of visa
information with foreign governments, consistent with the requirements
of section 222(f) of the INA. Since 2003, there have been arrangements
in place with Canada for such sharing under certain circumstances. With
DHS, the Department is participating in a pilot program, through the
Five Country Conference (United States, Australia, Canada, New Zealand,
and the United Kingdom) for identification of travelers based on
biometric matching in some individual cases. We are in negotiation with
the governments of Canada and the United Kingdom for agreements that
would provide a legal basis for us to implement arrangements for the
automated sharing of visa refusal data and for systematic confirmation
of an applicant's identity through biometric matching. These
arrangements would be limited to information regarding nationals of
third countries. We expect both agreements to be completed this year,
and similar agreements with Australia and New Zealand in 2012.
The Department plays a key role in all of these international
initiatives. With our partners at the TSC, we negotiate the HSPD-6
agreements overseas. We are a close partner with DHS in API and PNR
discussions overseas, in particular with respect to the current talks
with the European Union on PNR. Together, all of these programs are
helping achieve the goal of constraining terrorist mobility. This is
our obligation to the American people.
conclusion
We believe that U.S. interests in legitimate travel, trade
promotion, and educational exchange are not in conflict with our border
security agenda and, in fact, further that agenda in the long term. Our
long-term interests are served by continuing the flow of commerce and
ideas that are the foundations of prosperity and security. Acquainting
people with American culture and perspectives remains the surest way to
reduce misperceptions about the United States. Fostering academic and
professional exchanges keeps our universities and research institutions
at the forefront of scientific and technological change. We believe the
United States must meet both goals to guarantee our long-term security.
Our global presence, foreign policy mission, and personnel
structure give us singular advantages in executing the visa function
throughout the world. Our authorities and responsibilities enable us to
provide a global perspective to the visa process and its impact on U.S.
National interests. The issuance and refusal of visas has a direct
impact on our foreign relations. Visa policy quickly can become a
significant bilateral problem that harms broader U.S. interests if
handled without consideration for foreign policy equities. The conduct
of U.S. visa policy has a direct and significant impact on the
treatment of U.S. citizens abroad. The Department of State is in a
position to anticipate and weigh all those factors, while ensuring
border security as our first priority.
The Department has developed and implemented an intensive visa
application and screening process requiring personal interviews,
employing analytic interview techniques, incorporating multiple
biographic and biometric checks, all supported by a sophisticated
global information technology network. We have visa offices in
virtually every country of the world, staffed by consular officers
drawn from the Department's professional, mobile, and multilingual
cadre of Foreign Service Officers. These officials are dedicated to a
career of worldwide service, and provide the cultural awareness,
knowledge, and objectivity to ensure that the visa function remains the
frontline of border security. Each officer's experience and individual
skill set are enhanced by an overall understanding of the political,
legal, economic, and cultural development of foreign countries in a way
that gives the Department of State a special expertise over matters
directly relevant to the full range of visa ineligibilities.
This concludes my testimony today. I will be pleased to take your
questions.
Mrs. Miller. Thank you very much. The Chairwoman now
recognizes Mr. Cohen for his testimony.
STATEMENT OF JOHN D. COHEN, DEPUTY COUNTERTERRORISM
COORDINATOR, DEPARTMENT OF HOMELAND SECURITY
Mr. Cohen. Thank you, Chairwoman Miller, Ranking Member
Cuellar, Mr. Thompson, Members of the subcommittee. Thank you
for the opportunity to be here today to discuss efforts to
prevent terrorists from exploiting our visa system. As you have
heard and as you pointed out yourself, through a combination of
expanded and recurrent vetting of visa applicants, visa
holders, as well as improved capabilities that I will describe
in just a bit of vetting potential overstays, the ability of
terrorists to exploit our visa systems has been greatly
diminished.
Over the past 3 years Secretary Napolitano has made it a
top priority for the Department through ICE, the efforts of ICE
and CBP and US-VISIT, and our headquarters elements to improve
our ability to vet prior to departure those traveling to the
United States on visa or waiver country. We have made
significant progress in leveraging the vast holdings of the
intelligence community, the law enforcement community, and
improve the information sharing and operational coordination
between law enforcement, intelligence community, and those
responsible for protecting our borders.
Today what I am about to describe is the next step in that
process, because we have embarked on an effort to automate data
queries that in the past were carried out through manual
database checks. This is important because in many respects a
big part of the problem and one of the main reasons that we had
what were commonly referred to as backlog was because of the
time-consuming nature that these database queries required. By
interlinking immigration, National security, and law
enforcement information systems, and better using intelligence-
driven targeting capabilities such as those used at the
National Targeting Center and through the automated targeting
system, we have and will continue to bring greater efficiencies
to this process, and this will allow for more effective use of
personnel involved in investigations and analysis.
You referred to earlier, Madam Chairwoman, to the 1.2--
750,000 records that had been unvetted. We began with 1.6
million records and through an initiative began earlier this
year that involved CBP, ICE, US-VISIT, NCTC, and others we were
able to eliminate from that 1.6 million records approximately
800,000 records that we were able to determine had actually
departed the country or had changed their immigration status.
That left approximately 839,000 records that we were then
able to vet through the holdings of the NTC and leveraging
CBP's technical capabilities through a variety of law
enforcement databases. Each one of those 839,000 records has
been vetted from a National security and public safety
perspective. Let me repeat that, the entire set of records in
that 839,000 data set has been vetted from the National
security and public safety perspective. Through this process,
this automated and manual process, we have been able to provide
to ICE, CTCEU, and ICE investigations several thousand
additional leads which they have fully vetted, fully
investigated and are in the process of completing their
investigative processes. This was a significant milestone. We
learned from that effort that we could do more to automate the
process. Over the next 6 to 12 months you will see a number of
improvements. We will further enhance our ability to prevent an
onerous, suspected terrorist from exploiting the visa system or
visa waiver program because we will be bringing automated
processes to our ability to determine the location and the
immigration status. We are seeking to eliminate to the greatest
degree possible all of those manual database checks that are
carried out in this country, that are carried out by visa
security agents abroad. We will improve US-VISIT's ability to
determine whether a person is in overstay status and quickly
identify and forward to ICE investigators overstays are of a
National security or public safety concern.
We will incorporate and enhance vetting capability that
aggregates information for multiple systems into a unified
electronic dossier, reducing the need for US-VISIT researchers
and ICE agents to review multiple systems. We will be able to
provide Congress country-by-country data on percentages of
nationals who have overstayed their period of admission. We
will establish a more complete, enhanced biographic exit system
which includes expanded use of biometric data collected and
retained in law enforcement immigration and DOD systems.
In addition to providing enhanced biographic exit
capability, we will have established the foundation for a
biometric exit capability. As resources become available and
biometric collection technology continues to mature in the
coming years, we will integrate those advances into this
biographic exit foundation.
We are looking to leverage, as I pointed out, the same
architecture into the visa protection program, allowing ICE to
bring analytic responsibilities back home here to the United
States, thereby allowing agents abroad to be more focused on
investigative activities.
I appreciate again the opportunity to be here today, and I
look forward to answering any questions. Thank you.
[The statement of Mr. Cohen follows:]
Prepared Statement of John D. Cohen
September 13, 2011
introduction
Chairwoman Miller, Ranking Member Cuellar, and distinguished
Members, I am pleased to appear before you to outline the efforts of
the Department of Homeland Security (DHS) to both prevent terrorists
from entering the United States and ensure that our Visa System is
secure.
I am testifying today in my role as the Principal Deputy
Coordinator for Counterterrorism (CT) at the Department. In this
capacity, I will address the Department's efforts to enhance the
security of the Visa System, and also discuss the creation and
evolution of the CT Coordination functions at DHS. In addition, I will
describe specific actions being taken by the National Protection and
Programs Directorate's (NPPD's) United States Visitor and Immigrant
Status Indicator Technology (US-VISIT) Program to complement the
efforts of U.S. Immigration and Customs Enforcement (ICE) and U.S.
Customs and Border Protection (CBP), alongside whom I am pleased to be
testifying today.
enhancing visa security to prevent terrorist travel
The Homeland Security Act of 2002 gave DHS the responsibility of
preventing terrorists from entering the United States, providing the
Department with the authority to establish and administer the rules
that govern the granting of visas. This includes ensuring that the visa
process is secure. Under this authority, DHS works closely with the
Department of State to use the Visa System as a first layer of security
to prevent known or suspected terrorists from traveling to the United
States. Central to this mission is ensuring that consular officers at
the State Department have necessary information, and then appropriately
vet this information, which includes fingerprints and photographs,
through the Department and our interagency partners.
Since 9/11, DHS has enhanced our Nation's ability to detect
individuals seeking to exploit the visa system through recurrent
vetting of visa holders. In May 2010, CBP's National Targeting Center--
Passenger (NTC-P) implemented a new program to conduct continuous
vetting of U.S. non-immigrant visas that have been recently issued,
revoked, and/or denied. The Visa Hot List vetting ensures that changes
in a traveler's visa status are identified in near real-time. If a
violation is discovered, and the person is scheduled to travel to the
United States, CBP will request that DOS revoke the visa and recommend
to the airline that the person be denied boarding. If no imminent
travel is identified, CBP will coordinate with DOS for a visa
revocation, if appropriate. If the subject of an existing visa
revocation initiated by the DOS or recommended by CBP is found to be in
the United States, CBP will notify the Counterterrorism and Criminal
Exploitation Enforcement Unit for further action.
In addition, since December 25, 2009, we have accelerated our
efforts to synchronize, streamline, and advance the Department's
overall vetting capability, which both increases security and
efficiency. In particular, the Department is currently working to
enhance screening efforts for those who have potentially overstayed
their period of admission and modernize and enhance the Department's
Biographic Exit architecture.
In May 2011, at the direction of Secretary Napolitano, DHS's CT
Coordinator organized an effort to ensure that all overstays,
regardless of priority, receive enhanced National security and public
safety vetting by the National Counterterrorism Center (NCTC) and CBP.
NPPD/US-VISIT used automated means to review all records in the
backlog by checking ADIS, CLAIMS, and I-94 holdings to reduce the
backlog. As a result of this review, we identified 843,000 visa
overstays who were no longer in the country. Then, both NCTC and CBP
vetted the remaining 757,000 potential in-country overstay leads, along
with 82,000 previously vetted overstay leads. CBP used its Automated
Targeting System to query multiple databases, and to compare records to
CBP's intelligence-based threshold targeting rules to identify
indicators such as suspicious travel patterns or irregular travel
behavior. Simultaneously, NCTC vetted the backlogged records through a
number of databases held by the intelligence community.
By the end of July 2011, all of the previously un-reviewed possible
overstays records had been reviewed from a National security and public
safety standpoint and ICE is currently pursuing leads that meet our
priorities.
This effort has increased the standard of review of overstay leads,
at reduced cost. The process allows ICE to better prioritize targets
for investigation and removal. It is a prime example of how increased
coordination can help our Department to better leverage information and
capabilities spread across the Department and the Federal Government.
The Department is nearing the final stages of developing a plan
that not only institutionalizes these vetting enhancements, but also
improves the current biographic exit system as well. We are focusing
our efforts on improving information sharing, streamlining screening
and vetting, and ensuring identification of potentially harmful
individuals.
This plan includes many enhancements, including those which will
allow DHS to:
Quickly identify and forward to ICE investigators overstays
that are of a National security concern.
Integrate and leverage relevant CBP, ICE, and US-VISIT
information systems and operational processes to automate
manual data queries and to vet DHS-held immigration and travel-
related information against a broad array of law enforcement
and IC data holdings.
Incorporate an enhanced vetting capability that aggregates
information from multiple systems into a unified electronic
dossier reducing the need for US-VISIT researchers and ICE
agents to review multiple systems during their Validation and
Vetting processes.
Take action against all overstays. DHS will forward
information to the State Department for the purpose of
cancelling visas of those who overstay. DHS will also eliminate
the ability of those who overstay from using the Visa Waiver
Program by cancelling any ESTA approvals or denying ESTA
submissions for those who have overstayed. DHS will also place
lookouts on individuals who overstay beyond certain statutory-
identified time limits, so that they are inadmissible to the
United States. DHS believes this will create a deterrent
effect.
Provide to Congress country-by-country data on percentages
of nationals who have overstayed their period of admission.
DHS is committed to working with Congress to make these
improvements.
In addition to improving visa security, DHS has also implemented
other measures to prevent another terrorist attack, including:
Unifying immigration and border management systems to
implement a more effective capability to access and employ
biometric- and biographic-based information when reviewing
possible terrorist travel.
Enhancing capabilities for identifying fraudulent documents
and imposters and implementing measures to confirm the
authenticity and validity of travel documents.
Establishing interoperability and information-sharing
protocols with our Federal partners.
Supporting State and local law enforcement agencies and the
intelligence community; using a more complete and accurate
picture of a person's immigration, terrorist, and criminal
history enables DHS to more effectively make connections in
determining who might pose a threat or use more than one
identity.
Establishing and maintaining strategic partnerships with an
increasing number of international partners. In these
partnerships, we share appropriate information, provide
technical assistance, develop commonality in biometric
standards and best practices, and investigate and test emerging
biometric technologies.
the role of the coordinator for counterterrorism
Following the attempted bombing of Northwest flight 253 on December
25, 2009, Secretary Napolitano gave NPPD's Under Secretary Rand Beers
the additional role of CT coordinator. The Department's CT Coordinator
is responsible for coordinating all counterterrorism activities for the
Department and across its directorates, components, and offices related
to the detection, prevention, response to, and recovery from acts of
terrorism.
In November 2010, DHS established the Counterterrorism Advisory
Board (CTAB) to further improve coordination on counterterrorism among
DHS Components. As the CT Coordinator, Under Secretary Beers serves as
the chair of the CTAB, with the Under Secretary of Intelligence and
Analysis (I&A) and the Assistant Secretary for Policy supporting the
Board as Vice Chairs. Members include the leadership of TSA, CBP, ICE,
the Federal Emergency Management Agency (FEMA), the U.S. Coast Guard
(USCG), USCIS, the U.S. Secret Service (USSS), NPPD, and the Office of
Operations Coordination and Planning (OPS). The DHS General Counsel
serves as legal advisor to the CTAB.
In December 2010, the Department also established a
counterterrorism working group, known as the CTWG, to support the CT
Coordinator, and Secretary Napolitano later appointed me as Principal
Deputy CT Coordinator.
The CTAB's mission is aligned with the Department's central
mission: To prevent terrorist attacks and enhance security. The CT
Coordinator, the CTAB, and the CTWG serve as the connective tissue that
brings together the intelligence, operational, and policy-making
elements within DHS Headquarters and the Components.
We rely on I&A to provide an understanding of potential threats and
to coordinate with intelligence components within the Department and
intelligence community. We then facilitate a cohesive and coordinated
operational response, through the CTAB and other mechanisms, to deter
and disrupt terrorist operations.
The CTAB is both headquarters- and Component-driven. Components
have the opportunity to address the Secretary's priorities in an
organized, coordinated fashion, but also use the CTAB to bring
attention to their initiatives and priorities that need support from
headquarters and other components. In addition, the CTAB fosters
collaboration among Components and provides situational awareness of
what each Component does and needs during a high-threat scenario.
Similarly, we work with the DHS Office of Policy to address day-to-day
and long-term strategy issues identified through this process and work
to implement those changes.
Let me provide the following examples of how this process has
worked over the last few months, with the offer to provide greater
detail in a classified setting.
nppd/us-visit
One of NPPD/US-VISIT's most important roles is to identify visitors
to this country and to assist in the overall security of our
immigration system.
NPPD/US-VISIT provides biometric identification and analysis
services to distinguish people who pose a threat from the millions of
people who travel for legitimate purposes. The program stores and
analyzes biometric data--digital fingerprints and photographs--and
links that data with biographic information to establish, and then
verify, identities. NPPD/US-VISIT's IDENT, is the Department's
biometric storage and matching service.
IDENT contains a watch list of more than 6.2 million known or
suspected terrorists, criminals, and immigration violators. This
capacity enables US-VISIT to provide homeland security decisionmakers
with critical information when and where they need it. For example,
this system can be utilized during by CBP primary screening during to
run the fingerprints of foreign nationals against the watch list, with
results returned in fewer than 10 seconds.
IDENT data, paired with biographic information from NPPD/US-VISIT's
ADIS, supports decision-maker determinations as to whether foreign
travelers should be prohibited from entering the United States; can
receive, extend, change, or adjust immigration status; have overstayed
or otherwise violated their authorized terms of admission; should be
apprehended or detained for law enforcement action; or need special
protection or attention, as in the case of refugees. Through ADIS,
NPPD/US-VISIT can identify individuals who have overstayed their period
of admission and then forward these leads to ICE for further action. In
addition, IDENT plays a critical role in the biometric screening and
identity verification of non-U.S. citizens for the State Department,
ICE, CBP, USCIS, and the U.S. Coast Guard.
NPPD/US-VISIT's IDENT is fully interoperable with the Federal
Bureau of Investigation's (FBI's) 10-fingerprint-based Integrated
Automated Fingerprint Identification System (IAFIS). Daily transactions
of FBI fingerprint data shared between IAFIS and IDENT number in the
tens of thousands, providing the capability for FBI and NPPD/US-VISIT
customers to simultaneously match biometrics against our system and
watch list, as well as FBI data.
Enhanced interoperability with the FBI has enabled NPPD/US-VISIT to
launch the Rapid Response capability, which allows CBP officers to
search and receive a response against the FBI's entire criminal master
file of more than 69 million identities, in near real-time, during
primary inspection. Rapid Response is operational at four air ports of
entry and is planned for Nation-wide deployment at air ports of entry
next fiscal year.
DHS is also working closely with the Department of Defense (DOD) to
increase information sharing and establish interoperability between
IDENT and DOD's fingerprint database, the Automated Biometric
Identification System. We currently have manual methods for sharing
this data, which has helped DOD identify foreign combatants and match
latent fingerprints retrieved from objects such as improvised explosive
device fragments or collected from locations where terrorists have
operated.
The goal is to have the U.S. Government's three largest biometric
systems--those of NPPD/US-VISIT, the FBI, and DOD--completely
interoperable, thereby enriching our data sets by making information
sharing more seamless and automating the biometric-checking process to
make it far more efficient. Even after complete interoperability has
been achieved, the three systems will continue to be maintained and
governed by each agency's respective policies, including those that
ensure appropriate privacy safeguards are in place.
international cooperation and collaboration
DHS works extensively with foreign governments to increase
information sharing to prevent terrorist travel at the earliest point
possible. The Department is focused on sharing appropriate information,
increasing system interoperability, providing technical assistance, and
establishing commonality in data and biometric standards and best
practices. For instance, we are:
Working with Mexican federal police and immigration
authorities to identify and stop dangerous people from
transiting to Mexico; enhancing efforts to combat transnational
crime and confront organizations whose illicit actions
undermine public safety, erode the rule of law, and threaten
National security; and supporting Merida Initiative capacity-
building programs such as the incorporation of biometrics into
Mexico Immigration's Integrated System for Migration
Operations. DHS has supported non-intrusive inspection
equipment training, financial crimes investigative training,
canine enforcement training, assistance in transitioning the
Mexican Customs from a revenue-based institution to a law
enforcement-based institution, and improvements in immigration
control programs.
Forging new partnerships with New Zealand, India, South
Africa, the Republic of Korea, Germany, Spain, Greece, and the
Dominican Republic to support their implementation of biometric
systems.
Sending technical experts to the United Kingdom, Australia,
Canada, and, potentially, New Zealand, to help build biometric
capabilities and develop more systematic methods for
information sharing.
Implementing the Preventing and Combating Serious Crime
agreements to formalize sharing of biometric and limited
biographic data under the U.S. Visa Waiver Program with
Germany, Spain, the Republic of Korea, and other countries.
Working with the International Civil Aviation Organization,
the International Transport Association and INTERPOL to support
the exchange of information and best practices and the
establishment of standards in the areas of aviation security,
identity management, emerging technologies, document security
and verification, and fraud detection.
The Immigration Advisory Program (IAP) is another example of
partnership between the Department, foreign governments, and commercial
air carriers to identify and prevent high-risk, improperly-documented
travelers from boarding U.S.-bound flights. IAP is currently in
operation at eight airports in six countries. IAP officers have
established strong working relationships with foreign law enforcement
and counterterrorism officials and facilitated a direct link and real-
time communication between foreign counterparts, the U.S. Embassy/
Consulate, and the National Targeting Center.
DHS will continue to expand international coalitions to protect our
Nation in the face of evolving terrorist threats, an increasingly
interconnected global economy, and growing transnational crime. Along
with our partners, we view cooperation, collaboration, and information
sharing as critical in reaching our common goals of enhancing global
security while facilitating legitimate travel and ensuring access to
our economies.
success stories
Information sharing among agencies and international partners
continues to yield significant results, as demonstrated by these
success stories:
On February 3, 2011, the Australian Department of
Immigration and Citizenship submitted a batch of fingerprints
under the High Value Data Sharing Protocol of the Five Country
Conference for matching against IDENT. The fingerprints of a
subject applying for asylum in Australia matched an identity on
the IDENT biometric watch list as a known or suspected
terrorist in the FBI's Terrorist Screening Database. DHS
contacted the FBI Counterterrorism Division and its Terrorist
Explosives Device Analytical Center to confirm the subject's
derogatory information. The FBI then notified Australian
authorities. The individual was not granted asylum status in
Australia based on this information.
In November 2010, DHS assisted in a case involving an
applicant for employment at a nuclear power plant. It was
determined that the subject was using a false document under a
false identity, in an attempt to demonstrate his legal status
to reside and work in the United States. The subject was
subsequently arrested by DHS law enforcement authorities as an
overstay and placed into Federal custody awaiting removal
proceedings.
In October 2009, a vessel named Ocean Lady, transporting 76
undocumented persons, arrived off the coast of British
Columbia, Canada. The intent of all individuals on board was to
claim asylum status in Canada. The Canada Border Services
Agency (CBSA) intercepted the vessel and worked with the ICE
attache in Ottawa to determine whether information on the
identities of the individuals existed in U.S. systems. Pursuant
to an existing agreement between CBSA and DHS, the asylum
claimants' fingerprints were submitted to NPPD/US-VISIT for a
search. The fingerprint searches in IDENT identified two
subjects as known or suspected terrorists and members of the
Liberation Tigers of Tamil Eelam. Both subjects had also
previously applied for U.S. nonimmigrant visas in 2008 and had
been denied. Both subjects were denied asylum in Canada.
conclusion
DHS is working hard to stop terrorists before they ever get to the
United States. As we continue to work to address today's complex
challenges, we will look for innovative ways to bridge gaps in
information, technology, and human decision-making. Working with our
partners; using common technologies, standards, and best practices; and
sharing critical information will better protect us from those who seek
to exploit our immigration systems. DHS is also cognizant that although
physical security is of paramount concern and it is vital that we do
everything possible to prevent terrorist travel, we must steadfastly
seek to ensure that privacy, civil rights, and civil liberties are
always protected. In developing and operating our programs, the
Department's Office of Privacy and Office of Civil Rights and Civil
Liberties are an integral part of the process.
By strengthening and increasing coordination within the Department,
across the Federal Government, and with our international partners, we
will develop and implement comprehensive measures that make efficient
use of limited resources. With the appropriate coordination and
structure within DHS Headquarters, we can better support our
Operational Components as they work to enhance the security of our
immigration systems while facilitating legitimate travel. In my role as
Principal Deputy CT Coordinator for the Department, I look forward to
continuing to work with you to address the challenges that remain.
Chairwoman Miller, Ranking Member Cuellar, and distinguished
Members, thank you again for this opportunity to testify. I will be
happy to answer any of your questions.
Mrs. Miller. Thank you very much, Mr. Cohen. We look
forward to questioning you on all of that new information you
just gave us, so get ready.
Next the Chairwoman recognizes Mr. Edge.
STATEMENT OF PETER T. EDGE, DEPUTY ASSOCIATE DIRECTOR, HOMELAND
SECURITY INVESTIGATIONS, IMMIGRATION AND CUSTOMS ENFORCEMENT,
DEPARTMENT OF HOMELAND SECURITY
Mr. Edge. Good morning, Chairwoman Miller, Ranking Member
Cuellar, and distinguished Members of the subcommittee. On
behalf of Secretary Napolitano and Director Morton, thank you
for the opportunity to discuss ICE's efforts to prevent the
exploitation of our visa system by terrorists.
Visa overstays and other forms of status violation bring
together two critical areas of ICE's mission: National security
and immigration enforcement. The importance of determining who
to allow entry into the United States and ensuring compliance
with the conditions of the such entry cannot be understated.
We are proud of the good work we have done over the last 10
years to protect the integrity of our visa system. ICE
recognizes that those who pose National security threats often
commit immigration benefit fraud while seeking to enter or
remain in the United States, and we work hard to detect and
deter immigration fraud by continually enhancing our anti-fraud
efforts.
Working closely with Citizenship and Immigration Services,
or CIS, ICE exercises criminal authority in the detection and
deterrence of immigration fraud. While recognizing CIS's
administrative authority, this strategy allows ICE to
concentrate its effort on major fraud conspiracies and other
cases of National security or public safety interest while
allowing CIS to address the bulk of immigration benefit fraud
cases administratively.
As you know, the Homeland Security Act of 2002 directs DHS
to assist in the identification of visa applicants who wish to
enter the United States for illegitimate purposes, including
illegal immigration, criminal activities, and terrorism-related
activities. The visa adjudication process is often the first
opportunity to assess whether a potential non-immigrant visitor
or immigrant presents a threat to the United States.
The Visa Security Program is one of several ICE programs
designed to minimize global risk. Our special agents in the
Visa Security Program focus on select applicants who may have
connections to terrorism or transnational criminal
organizations. We then coordinate with the State Department to
develop targeting plans based on the various threats. DHS does
not participate in all of these adjudications, but rather
becomes a part of the process following initial screening of an
applicant where ICE's visa security operation happens to be
present.
DHS actions compliment the consular office's initial
screening, applicant interviews, and reviews of the
applications and supporting documentation. ICE now conducts
visa security operations at 19 high-risk visa adjudication
posts in 15 countries. In fiscal year 2011 to date the Visa
Security Program has screened over 900,000 visa applicants and,
in collaboration with our State Department colleagues,
determined that 130,000 require further review. Following the
review of these 130,000 applicants, ICE identified derogatory
information on more than 10,400 applicants. In every instance
the State Department followed ICE's recommendation concerning
the visa applicant.
A vulnerability that in the past had been exploited
involved the acceptance of foreign students and visitors into
the U.S. educational system. Helping to mitigate this
vulnerability is ICE's Student and Exchange Visitor Program, or
SEVP, which is a self-funded program based on fees collected
from students, exchange visitors, and schools. This program
certifies, recertifies, and decertifies schools' eligibility to
sponsor foreign individuals for scholastic enrollment and other
academic purposes. The SEVP acts as the bridge for Government
organizations that have an interest in information on foreign
students. SEVP helps DHS and the State Department to monitor
schools and exchange programs regarding the visa
classifications of F for academic and M for vocational and J
for exchange category visitors.
SEVP administers the F and M student visa categories, while
the State Department manages the J exchange visitor program.
SEVP collects, maintains, and provides the information so that
only legitimate foreign students or exchange visitors gain
entry into and remain in the United States. SEVP uses the
Student and Exchange Visitor Information System, or SEVIS, to
track and monitor schools and programs, student exchange
visitors and their dependents approved to participate in the
U.S. education system.
SEVP interacts closely with ICE's Counterterrorism and
Criminal Exploitation Unit, CTCEU, the first National program
dedicated to the enforcement of nonimmigrant visa applications.
Today through the CTCEU, ICE proactively develops cases for
investigation and cooperation with SEVP and the US-VISIT
program.
As we move forward it is imperative that we expand the
Nation's enforcement efforts concerning overstays and other
status violations specifically regarding those who threaten
National security or public safety. Accordingly, ICE is
analyzing various approaches to this issue, including
sharpening the focus of programs that address vulnerabilities
exploited by visa violators.
Ten years after the attacks of 9/11 ICE has made
significant progress in preventing terrorists from exploiting
the visa process.
Thank you again for the opportunity to testify today, and I
would appreciate your continued support of ICE and law
enforcement. Thank you very much.
[The statement of Mr. Edge follows:]
Prepared Statement of Peter T. Edge
September 13, 2011
introduction
Chairwoman Miller, Ranking Member Cuellar, and distinguished
Members of the subcommittee: On behalf of Secretary Napolitano and
Director Morton, thank you for the opportunity to discuss U.S.
Immigration and Customs Enforcement's (ICE) efforts to prevent the
exploitation of our visa system by terrorists. Visa overstays and other
forms of status violation bring together two critical areas of ICE's
mission--National security and immigration enforcement, and the
importance of determining whom to allow entry into the United States
and ensuring compliance with the conditions of such entry cannot be
understated. We are proud of the good work we have done over the last
10 years to protect the integrity of our visa system, and I look
forward to sharing with you both our successes thus far and the
opportunities we see to improve our systems.
joint anti-fraud strategy
We recognize that those who pose National security threats often
commit immigration benefit fraud while seeking to enter or remain in
the United States, and we work hard to detect and deter immigration
fraud and to continually enhance our anti-fraud efforts. Working
closely with U.S. Citizenship and Immigration Services (USCIS), ICE
exercises criminal authority in the detection and deterrence of
immigration fraud, while recognizing USCIS' administrative authority.
This strategy allows ICE to concentrate its efforts on major fraud
conspiracies and other cases of National security or public safety
interest, while allowing USCIS to address the bulk of immigration
benefit fraud cases administratively.
Through the ICE Document and Benefit Fraud Task Forces (DBFTFs), we
focus our efforts on detecting, deterring, and disrupting document and
benefit fraud. DBFTF participants include USCIS, the Department of
State, the Department of Labor, and the Social Security Administration.
Task Force investigators with expertise in different aspects of fraud
collaborate with U.S. Attorneys' Offices around the country to
formulate a comprehensive approach in targeting the criminal
organizations and the beneficiaries behind these fraudulent schemes.
the visa security program
The Homeland Security Act of 2002 directs DHS to assist in the
identification of visa applicants who wish to enter the United States
for illegitimate purposes, including illegal immigration, criminal
activities, and terrorism-related activities. The visa adjudication
process is often the first opportunity to assess whether a potential
non-immigrant visitor or immigrant presents a threat to the United
States. The Visa Security Program (VSP) is one of several ICE programs
focused on minimizing global risks.
Our VSP Special Agents focus on select applicants and any
connection the applicants may have to terrorism or transnational
criminal organizations and coordinate with DOS to develop targeting
plans based on assessed conditions and threats. The VSP ensures
thorough reviews of applicants of concern in order to assess whether
they pose a security threat to the United States. DHS does not
participate in all visa adjudications, but rather becomes a part of the
process following initial screening of an applicant in countries where
an ICE visa security operation is present. DHS actions complement the
consular officers' initial screening, applicant interviews, and reviews
of applications and supporting documentation.
ICE now conducts visa security operations at 19 high-risk visa
adjudication posts in 15 countries. In fiscal year 2011 to date, the
VSP has screened 900,000 visa applicants and, in collaboration with DOS
colleagues, determined that 130,000 required further review. Following
the review of these 130,000 applications, ICE identified derogatory
information on more than 10,400 applicants. In every instance, DOS
followed the VSP's recommendation concerning the visa applicant.
In March 2010 Customs and Border Protection's National Targeting
Center (NTC) implemented a program to conduct continuous vetting of
U.S. non-immigrant visas that have been recently issued, revoked, and/
or denied. The continuous vetting ensures that changes in a traveler's
visa status are identified in near real-time, allowing CBP to
immediately determine whether to provide a no board recommendation to a
carrier, recommend revocation of the visa to Department of State, or
notify the ICE NTEU for individuals determined to be within the United
States. Since the program's inception the Department of State has
revoked more than 900 visas based on requests from CBP on information
uncovered after a visa was issued.
Additionally, ICE has deployed VSP personnel to the NTC to augment
and expand current operations. The NTC provides tactical targeting and
analytical research in support of preventing terrorist and terrorist
weapons from entering the United States. The co-location of VSP
personnel at the NTC has helped increase both communication and
information sharing. The NTC conducts pre-departure screening of all
travelers on flights bound for the United States. Screening identifies
high-risk passengers who should be denied boarding, including those
whose visas have been revoked.
the student and exchange visitor program (sevp)
The Student and Exchange Visitor Program (SEVP) is a self-funded
program based on fees collected from students, exchange visitors, and
schools. It also certifies, recertifies, and decertifies schools'
eligibility to sponsor foreign individuals for scholastic enrollment
and other academic purposes. SEVP oversees reporting requirements and
policies related to foreign nonimmigrant students and exchange
visitors, and provide overall guidance to schools regarding SEVIS.
SEVP acts as the bridge for Government organizations that have an
interest in information on foreign students. SEVP helps DHS and DOS
monitor schools and exchange programs, as well as F (academic), M
(vocational), and J (exchange) category visitors. SEVP administers the
F and M student visa categories, while DOS manages the J exchange
visitor program.
SEVP collects, maintains, and provides the information so that only
legitimate foreign students or exchange visitors gain entry to, and
remain in, the United States. The result is an easily accessible
information system that provides timely information to DOS, U.S.
Customs and Border Protection, U.S. Citizenship and Immigration
Services and ICE. SEVP has a mutual commitment of shared responsibility
with the educational community to maintain support and cooperation.
Currently, SEVP has certified over 10,360 schools.
SEVP uses the Student and Exchange Visitor Information System
(SEVIS) to track and monitor schools and programs, students, exchange
visitors, and their dependents approved to participate in the U.S.
education system.
the counterterrorism and criminal exploitation unit (ctceu)
The Counterterrorism and Criminal Exploitation Unit is the first
National program dedicated to the enforcement of nonimmigrant visa
violations. Today, through the CTCEU, ICE proactively develops cases
for investigation in cooperation with the SEVP and the United States
Visitor and Immigrant Status Indicator Technology (US-VISIT) Program.
These programs enable ICE to access information about the millions of
students, tourists, and temporary workers present in the United States
at any given time, and identify those who have overstayed or otherwise
violated the terms and conditions of their admission.
Each year, the CTCEU analyzes records of hundreds of thousands of
potential status violators, after analysis of data from SEVIS and US-
VISIT, along with other information. These records are resolved by
further establishing potential violations that would warrant field
investigations, establishing compliance, or establishing departure
dates from the United States. Between 15,000 and 20,000 of these
records are resolved by in-house analysts each month. Since the
creation of the CTCEU in 2003, analysts have resolved more than 1.6
million such records using automated and manual review techniques. On
average, ICE opens approximately 6,000 investigative cases annually,
and assigns them to our Special Agents in the field for further
investigation, resulting in over 1,400 administrative arrests per year.
Agents and analysts in ICE monitor the latest threat reports and
proactively address emergent issues. This practice has contributed to
ICE's counterterrorism mission by initiating or supporting high-
priority National security initiatives based upon specific
intelligence. The practice is designed to detect and identify
individuals exhibiting specific risk factors based on intelligence
reporting, including international travel from specific geographic
locations to the United States, and in-depth criminal research and
analysis of dynamic social networks. This person-centric approach to
nonimmigrant prioritization moves away from the traditional
identification approach based upon country of birth, gender, and age.
In order to ensure that the potential violators who pose the
greatest threats to National security are given priority attention, ICE
uses intelligence-based criteria, developed in close consultation with
the intelligence and law enforcement communities. ICE assembles the
Compliance Enforcement Advisory Panel (CEAP) on a tri-annual basis to
ensure that it uses the latest threat intelligence to target
nonimmigrant overstays and status violators who pose the greatest
threats to National security and to discuss possible changes based on
current threat trends.
A recent ICE investigation in Las Cruces, New Mexico, highlights
how the CTCEU functions. As a result of CTCEU data analysis and field
investigation, in February 2010, ICE Special Agents arrested two
foreign nationals who were admitted as F-1 nonimmigrant students and
violated the terms and conditions of their admission. Both individuals
were referred for investigation after their status was terminated in
SEVIS for failure to maintain student status, as well as for possessing
several indicators of National security concerns.
Likewise, in March 2010, ICE's Counterterrorism and Criminal
Exploitation Group in Miami, Florida, initiated ``Operation Class
Dismissed,'' a criminal investigation that led to the indictment of the
owner/operator of a Miami-based foreign language school and one of its
employees on four counts of conspiring to commit a criminal offense
against the United States. The owner and employee were suspected of
fraudulently sponsoring foreign students by certifying student status
to nonimmigrants, without requiring them to maintain full courses of
study in order to comply with the terms of their admission. ICE's
primary goal in these types of investigations is to focus on the
criminal violations of the owner/operators of these businesses and the
administrative violations on the students. This ICE investigation
uncovered information that only approximately 5 percent of the school's
students attended class on any given day. In addition to the
indictment, follow-up investigation by ICE resulted in the
administrative arrests of 116 student visa violators purported to be
attending the school from countries including Thailand, Syria,
Honduras, South Korea, Japan, Colombia, the Dominican Republic,
Turkmenistan, Turkey, Indonesia, Venezuela, Brazil, and Kyrgyzstan.
As we move forward, it is imperative that we expand the Nation's
enforcement efforts concerning overstays and other status violations
specifically regarding those who threaten National security or public
safety. Accordingly, ICE is analyzing various approaches to this issue,
including sharpening the focus of programs that address vulnerabilities
exploited by visa violators.
coordination with us-visit and other dhs components
CTCEU also works in close collaboration with US-VISIT, part of the
DHS's National Protection and Programs Directorate (NPPD). US-VISIT
supports DHS's mission to protect our Nation by providing biometric
identification services to Federal, State, and local government
decisionmakers to help them accurately identify the people they
encounter, and determine whether those people pose risks to the United
States. DHS's use of biometrics under the US-VISIT program is a
powerful tool in preventing identity fraud and ensuring that DHS is
able to rapidly identify criminals and immigration violators who try to
cross our borders or apply for immigration benefits under an assumed
name. Biometric information sharing between the Federal Bureau of
Investigation's Criminal Justice Information Services and US-VISIT is
the foundation of ICE's Secure Communities IDENT/IAFIS Interoperability
Program.
Through Secure Communities, aliens--including those who have
overstayed or otherwise violated their immigration status--who are
encountered by law enforcement may be identified as immigration
violators when criminally arrested by State and local law enforcement.
Once individuals are identified through Secure Communities, ICE
officials determine what enforcement action is appropriate, consistent
with ICE's enforcement priorities. Currently, Secure Communities is
deployed in over 1,500 jurisdictions in 44 States.
US-VISIT also analyzes biographical entry and exit records stored
in its Arrival and Departure Information System to further support
DHS's ability to identify international travelers who have remained in
the United States beyond their periods of admission by analyzing
related biographical information.
ICE receives or coordinates nonimmigrant overstay and status
violation referrals from US-VISIT Data Integrity Group (DIG) from three
unique sources, which includes the typical overstay violation; a
biometric watch list notification and a CTCEU Visa Waiver Enforcement
Program (VWEP) nomination. The first type, Nonimmigrant Overstay Leads,
is used by the CTCEU to generate field investigations by identifying
foreign visitors who violate the terms of their admission by remaining
in the United States past the date of their required departure.
A second type of lead is generated from biometric data collected by
US-VISIT. US-VISIT routinely receives fingerprint records from a
variety of Governmental sources and adds them to a biometric watch list
that includes individuals of National security concern. These new watch
list records are checked against all fingerprints in the US-VISIT's
biometric database, the Automated Biometric Identification System, or
IDENT, managed by US-VISIT, to determine if DHS has previously
encountered the individual. If US-VISIT identifies a prior encounter,
such as admission to the United States, the information is forwarded to
ICE for review and possible field assignment. Similarly, US-VISIT
monitors records for individuals who, at the time of admission to the
United States, were the subject of watch list records that did not
render the individuals inadmissible to the United States. Therefore, if
such individuals overstay their terms of admission, information on the
subjects is forwarded to ICE for review and possible referral to
investigative field offices for follow-up.
The third type of lead pertains to the CTCEU's Visa Waiver
Enforcement Program (VWEP). The Visa Waiver Program (VWP) is the
primary source of nonimmigrant visitors from countries other than
Canada and Mexico. Although the overstay rate from this population is
less than 1 percent, ICE created a program dedicated to overstays
arising from this VWP population given the large number of individuals
in this category. Prior to the implementation of the VWEP in 2008,
there was no National program dedicated to addressing overstays within
this population. CTCEU provides a refined weekly list of individuals to
US-VISIT for additional scrutiny, who have been identified as potential
overstays who entered the United States under the VWP. In accord with
its intelligence-based criteria, a relevant portion of this report is
then imported into the CTCEU's internal lead tracking system for review
and possible field assignment.
Additionally, the CTCEU develops potential overstay and status
violation leads from SEVIS and other sources, imports these leads
directly from those databases, and applies its intelligence-based
criteria to determine whether investigative referral is appropriate.
Throughout its history, the integrity of SEVIS data and its
applicability have been valued throughout the law enforcement.
ice's presence overseas
Stopping a threat before it reaches our shores is an important
priority that ICE supports internationally. Through our Office of
International Affairs (OIA), we have personnel in 70 offices in 47
countries. ICE personnel in these offices collaborate with our foreign
counterparts and Federal partner agencies in joint efforts to disrupt
and dismantle transnational criminal organizations engaged in money
laundering, contraband smuggling, weapons proliferation, forced child
labor, human rights violations, intellectual property rights
violations, child exploitation, human smuggling and trafficking, and
many other violations. Additionally, ICE facilitates the repatriation
of individuals with final orders of removal, returning violators to
their home countries.
overseas coordination with dos
Effective border security requires broad information sharing and
cooperation among U.S. agencies. On January 11, 2011, ICE signed a
memorandum of understanding (MOU) outlining roles, responsibilities,
and collaboration between ICE and the DOS Bureaus of Consular Affairs
and Diplomatic Security. The MOU governs the day-to-day operations of
ICE agents conducting visa security operations at U.S. embassies and
consulates abroad. To facilitate information sharing and reduce
duplication of efforts, ICE and DOS support collaborative training and
orientation prior to overseas deployments. Once they are deployed to
overseas posts, ICE and DOS personnel work closely together in:
Participating in working groups; coordinating meetings, training, and
briefings; and engaging in regular and timely information sharing. The
VSP's presence at U.S. embassies and consulates brings an important law
enforcement element to the visa review process. Additionally, this
relationship serves as an avenue for VSP personnel to assist Consular
Officers and other U.S. Government personnel to recognize potential
security threats in the visa process.
ICE continues to evaluate the need to screen and investigate
additional visa applicants at high-risk visa issuing posts other than
the 19 posts at which the agency currently operates, which were
determined in collaboration between ICE and DOS. ICE will continue to
conduct joint site visits with DOS to identify locations for deployment
based on emerging threats. We are engaged with our counterparts at DOS
in determining a common strategic approach to the broader question of
how best to collectively secure the visa issuance process. We look
forward to continuing to report back to you with updates on this
process.
recent successes
Working in tandem with other DHS personnel, as well as our
international, Federal, State, local, and Tribal partners, we have
enjoyed significant successes preventing visa fraud. I would like to
elaborate briefly on a few of these cases.
In December 2010, ICE Special Agents were involved in the
identification and investigation of a transnational alien smuggling
organization that facilitated the illegal travel of Somali nationals
into Yemen and on to other Western locations including the United
States. ICE Special Agents received information from the ICE Attache
office in Amman, Jordan that two Somali nationals had been intercepted
in Amman attempting to travel to Chicago using counterfeit travel
documents, and contacted local officials in Yemen and Somalia to
investigate how the counterfeit documents had been obtained and how the
subjects had transited Yemen. The information developed was shared with
other U.S. agencies at post in Sana'a via the Law Enforcement Working
Group, as well as ICE domestic offices and the appropriate FBI Joint
Terrorism Task Force. While the joint investigation is on-going,
efforts to date have eliminated this scheme as a method of entry to the
United States.
More recently, in May 2011, ICE Special Agents within the VSP
Security Advisory Opinion Unit (SAOU) investigated a Saudi Arabian
national who obtained a nonimmigrant visa to enter the United States by
concealing his true identity from DOS by using a variation of his true
name. Through vetting efforts, the SAOU identified this individual's
true identity and revealed that he was a known terrorist with
significant ties to other known terrorists, and who was likely involved
in the planning of a terrorist attack in 2003. Based on this
investigation and at the request of the VSP and SAOU, DOS revoked the
individual's visa on National security-related grounds and prevented
him from traveling to the United States.
conclusion
Ten years after the attacks of 9/11, ICE has made significant
progress in preventing terrorists from exploiting the visa process.
Thank you again for the opportunity to testify today and for your
continued support of ICE and its law enforcement mission.
I would be pleased to answer any questions you may have.
Mrs. Miller. Thank you, Mr. Edge. You certainly do have our
continued support, and now the Chairwoman recognizes Mr. Stana.
STATEMENT OF RICHARD M. STANA, DIRECTOR, HOMELAND SECURITY AND
JUSTICE, GOVERNMENT ACCOUNTABILITY OFFICE
Mr. Stana. Thank you, Chairwoman Miller and Mr. Cuellar,
for the invitation to testify at today's hearing about GAO's
work on this very important topic, the integrity and security
of our visa processes.
As you know, each year millions of visitors come to the
United States legally for a temporary visit. In the 6-year
period from fiscal year 2005 to 2010 there were 36 million
nonimmigrant visas issued for things like pleasure, business
travel, student exchanges and so on, among other things. In
addition, during that same period over 98 million visitors were
admitted to the United States under the visa waiver program.
While most visa abusers you might say are motivated by
economic opportunities to enter the United States and work,
there are other National security consequences. As was
mentioned earlier, 5 of the 19, 9/11 hijackers were here on one
or the other overstay category, and 36 of 400 individuals
convicted in international terrorism-related investigations by
the Department of Justice were overstays.
As you have heard from the other panelists, both DHS and
State have made some progress in shoring up our visa processes.
I would like to discuss three areas from my prepared statement
which could possibly add some context to what you have heard.
First, let's talk about the problem. We have overstays
whether the person was admitted to the U.S. on a valid visa or
through the visa waiver program. As was previously mentioned,
the Pew Hispanic Center has estimated that about 40 percent of
the total illegal alien population in the United States came in
legally through a visa. On average that is about 4 in 10 and
contrast the resources that we spend on interior enforcement
with what we spend on the 60 percent for border enforcement, a
big difference.
To its credit, as you heard, ICE uses a risk management
approach to focus its limited resources on overstays leads that
it considers most likely to pose a threat to National security
or public safety. But that said, ICE averages only about 1,200
overstay arrests per year and devotes a little more than 3
percent of its investigative resources to overstays.
Now to be fair, finding overstays can be difficult, they
don't self-advertise. Sometimes they leave the United States,
sometimes they are now on status, sometimes they simply cannot
be located. There are other programs that ICE and other DHS
components operate, like work site enforcement and secure
communities that do address overstays or overstays are a
component of those programs. But when you add it all up, you
take all those programs together, we are not making much of a
dent in that 40 percent of the illegal alien population.
Moving forward, ICE expressed interest in increasing the
resources to overstay investigations and assigning some
responsibilities to ERO. But they haven't established time
frames yet or identified the resources to make this happen.
My second point involves the US-VISIT system. There's good
news and not so good news. The good new is it is operating 300
air, sea, and land ports of entry and it seems to be working
well. It gathers biometric information which can enable DHS to
identify travelers, check law enforcement databases, and
prescreens others.
The not-so-good news is that it has only a very limited
capability to process exit records currently. The exit process
now includes processing air carriers, electronic submissions of
manifest data and other biographic information as well as
inconsistent collection of
I-94s. So all told, it is not in a position right now to
reliably state who has overstayed their visa and remains in the
country.
As of July, this past July, US-VISIT obligated about $193
million to develop air, sea, and land exit solutions since
2002. They had different types of exit solutions and piloted
them, but all have been determined to be insufficient and
incomplete. There are some other arrangements being discussed
now, such as with the Canadians, to make their exit as a person
leaving the United States going into a Canada become our--their
entrance become our exit and share information. But those
agreements have not been formalized and there is more work that
remains.
Finally, let's turn to the issue of ensuring visa integrity
and security overseas. ICE has deployed agents to certain
embassies and consulates as part of its Visa Security Program,
as you have heard, but at some posts we found that guidance,
training, and standard operating procedures were not
established, which led to tensions between ICE and State, as
well as operational inconsistencies. We also found that while
ICE had a presence at 19 posts in 15 countries; it did not have
agents located at 11 of the top 20 high-risk posts. You know,
expanding the program can be limited by embassy space and
budget consideration, but ICE has not acted on possible
alternatives. Although I am listening to some of my fellow
panelists this morning, it sounds like perhaps that information
is superseded and there are steps to be taken to expand their
vetting and screening processes.
On the positive side we heard about ESTA a few minutes ago.
ESTA was implemented without many glitches. They are screening
about 99 percent of the travelers coming into the United States
on visa. However, there were about, I believe it was about
350,000 travelers who were boarded on airplanes without having
a verified ESTA document and of those about 650 of those it was
later found should not have been permitted to board the
airplane. DHS has yet to analyze these cases to see if these
were of legitimate concern or there were systematic weaknesses
that need to be addressed for the program.
That concludes my statement. It is important to balance
visa security responsibilities with a need to enhance travel,
and we have made a number of recommendations to both State and
DHS to help this happen.
Thank you very much.
[The statement of Mr. Stana follows:]
Prepared Statement of Richard M. Stana
September 13, 2011
gao highlights
Highlights of GAO-11-910T, a testimony before the Subcommittee on
Border and Maritime Security, Committee on Homeland Security, House of
Representatives.
Why GAO Did This Study
The attempted bombing of an airline on December 25, 2009, by a
Nigerian citizen with a valid U.S. visa renewed concerns about the
security of the visa process. Further, unauthorized immigrants who
entered the country legally on a temporary basis but then overstayed
their authorized periods of admission--overstays--could pose homeland
security risks. The Department of Homeland Security (DHS) has certain
responsibilities for security in the visa process and for addressing
overstays. DHS staff review visa applications at certain Department of
State overseas posts under the Visa Security Program. DHS also manages
the Visa Waiver Program through which eligible nationals from certain
countries can travel to the United States without a visa. This
testimony is based on GAO products issued in November 2009, August
2010, and from March to May 2011. As requested, this testimony
addresses the following issues: (1) Overstay enforcement efforts, (2)
efforts to implement a biometric exit system and challenges with the
reliability of overstay data, and (3) challenges in the Visa Security
and Visa Waiver programs.
What GAO Recommends
GAO has made recommendations in prior reports that, among other
things, call for DHS to strengthen management of overstay enforcement
efforts, mechanisms for collecting data from foreign nationals
departing the United States, and planning for addressing certain Visa
Security and Visa Waiver programs' risks. DHS generally concurred with
these recommendations and has actions planned or underway to address
them.
visa security: additional actions needed to strengthen overstay
enforcement and address risks in the visa process
What GAO Found
Federal agencies take actions against a small portion of the
estimated overstay population, but strengthening planning and
assessment of overstay efforts could improve enforcement. Within DHS,
U.S. Immigration and Customs Enforcement's (ICE) Counterterrorism and
Criminal Exploitation Unit (CTCEU) is the lead agency responsible for
overstay enforcement. CTCEU arrests a small portion of the estimated
overstay population in the United States because of, among other
things, ICE's competing priorities, but ICE expressed an intention to
augment its overstay enforcement resources. From fiscal years 2006
through 2010, ICE reported devoting about 3 percent of its total field
office investigative hours to CTCEU overstay investigations. ICE was
considering assigning some responsibility for noncriminal overstay
enforcement to its Enforcement and Removal Operations directorate,
which apprehends and removes aliens subject to removal from the United
States. In April 2011, GAO reported that by developing a time frame for
assessing needed resources and using the assessment findings, as
appropriate, ICE could strengthen its planning efforts. Moreover, in
April 2011, GAO reported that CTCEU tracked various performance
measures, but did not have a mechanism to assess the outcomes of its
efforts. GAO reported that by establishing such a mechanism, CTCEU
could better ensure that managers have information to assist in making
decisions.
DHS has not yet implemented a comprehensive biometric system to
match available information (e.g., fingerprints) provided by foreign
nationals upon their arrival and departure from the United States and
faces reliability issues with data used to identify overstays. GAO
reported that while the United States Visitor and Immigrant Status
Indicator Technology Program's biometric entry capabilities were
operating at ports of entry, exit capabilities were not, and DHS did
not have a comprehensive plan for biometric exit implementation. DHS
conducted pilots to test two scenarios for an air exit solution in
2009, and in August 2010, GAO concluded that the pilots' limitations,
such as limitations not defined in the pilot evaluation plan like
suspending exit screening at departure gates to avoid flight delays,
curtailed DHS's ability to inform a decision for a long-term exit
solution. Further, in April 2011, GAO reported that there is not a
standard mechanism for nonimmigrants departing the United States
through land ports of entry to remit their arrival and departure forms.
Such a mechanism could help DHS obtain more complete departure data for
identifying overstays.
GAO identified various challenges in the Visa Security and Visa
Waiver programs related to planning and assessment efforts. For
example, in March 2011, GAO found that ICE developed a plan to expand
the Visa Security Program to additional high-risk posts, but ICE had
not fully adhered to the plan or kept it up to date. Further, ICE had
not identified possible alternatives that would provide the additional
security of Visa Security Program review at those high-risk posts that
do not have a program presence. In addition, DHS implemented the
Electronic System for Travel Authorization (ESTA) to meet a statutory
requirement intended to enhance Visa Waiver Program security and took
steps to minimize the burden on travelers to the United States added by
the new requirement. However, DHS had not fully evaluated security
risks related to the small percentage of Visa Waiver Program travelers
without verified ESTA approval.
Chairwoman Miller, Ranking Member Cuellar, and Members of the
subcommittee: I am pleased to be here today to discuss the Department
of Homeland Security's (DHS) programs and efforts to strengthen the
security of the visa process, including efforts to identify and take
enforcement against overstays--individuals who were admitted to the
United States legally on a temporary basis--either with a visa, or in
some cases, as visitors who were allowed to enter without a visa--but
then overstayed their authorized periods of admission.\1\ The attempted
bombing of Northwest Airlines flight 253 on December 25, 2009, by a
Nigerian citizen in possession of a valid U.S. visa renewed concerns
about the security of the visa process. Each year, millions of visitors
come to the United States legally on a temporary basis. From fiscal
year 2005 through fiscal year 2010, the Department of State issued over
36 million nonimmigrant visas for business travel, pleasure, tourism,
medical treatment, or for foreign and cultural exchange student
programs, among other things.\2\ In addition, from fiscal year 2005
through fiscal year 2010, over 98 million visitors were admitted to the
United States under the Visa Waiver Program, which allows nationals
from certain countries to apply for admission to the country as
temporary visitors for business or pleasure without first obtaining a
visa from a U.S. consulate abroad.\3\
---------------------------------------------------------------------------
\1\ Visitors who are allowed to seek admission without a visa
include citizens of Canada and the British Overseas Territory of
Bermuda (and certain residents of other adjacent islands, such as the
Bahamas) under certain circumstances, as well as Visa Waiver Program
participants (see footnote 3). In-country overstays refer to
nonimmigrants who have exceeded their authorized periods of admission
and remain in the United States without lawful status, while out-of-
country overstays refer to individuals who have departed the United
States but who, on the basis of arrival and departure information,
stayed beyond their authorized periods of admission.
\2\ Temporary visitors to the United States generally are referred
to as ``nonimmigrants.'' For a listing and descriptions of nonimmigrant
categories, see 8 U.S.C. 1101(a)(15); see also 8 C.F.R.
214.1(a)(1)-(2). Generally, nonimmigrants wishing to visit the United
States gain permission to apply for admission to the country through
one of two ways. First, those eligible for the Visa Waiver Program
apply on-line to establish eligibility to travel under the program
prior to departing for the United States (unless they are seeking
admission at a land port of entry, in which case eligibility is
established at the time of application for admission). Second, those
not eligible for the Visa Waiver Program and not otherwise exempt from
the visa requirement must visit the U.S. consular office with
jurisdiction over their place of residence or, in certain
circumstances, the area in which they are physically present but not
resident, to obtain a visa. Upon arriving at a port of entry,
nonimmigrants must undergo inspection by U.S. Customs and Border
Protection officers, who determine whether or not they may be admitted
into the United States.
\3\ In order to qualify for the Visa Waiver Program, a country must
meet various requirements, such as entering into an agreement with the
United States to report lost or stolen passports within a strict time
limit and in a manner specified in the agreement. Currently, 36
countries participate in the Visa Waiver Program: Andorra, Australia,
Austria, Belgium, Brunei, Czech Republic, Denmark, Estonia, Finland,
France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Japan,
Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Monaco, the
Netherlands, New Zealand, Norway, Portugal, San Marino, Singapore,
Slovakia, Slovenia, South Korea, Spain, Sweden, Switzerland, and the
United Kingdom.
---------------------------------------------------------------------------
Further, the most recent estimates from the Pew Hispanic Center
approximated that in 2006, out of an unauthorized resident alien
population of 11.5 million to 12 million in the United States, about 4
million to 5.5 million were overstays.\4\ In February 2008, we reported
that most overstays are likely motivated by economic opportunities to
stay in the United States beyond their authorized periods of
admission.\5\ Individuals overstaying their authorized periods of
admission could pose homeland security concerns. For example, in some
instances overstays have been identified as terrorists or involved in
terrorist-related activity, such as 5 of the 19 September 11, 2001,
hijackers. Further, according to DHS data, of approximately 400
individuals reported by the Department of Justice as convicted in the
United States as a result of international terrorism-related
investigations conducted from September 2001 through March 2010,
approximately 36 were overstays.\6\
---------------------------------------------------------------------------
\4\ Pew Hispanic Center, Modes of Entry for the Unauthorized
Migrant Population (Washington, DC: May 22, 2006).
\5\ GAO, Visa Waiver Program: Limitations with Department of
Homeland Security's Plan to Verify Departure of Foreign Nationals, GAO-
08-458T (Washington, DC: Feb. 28, 2008).
\6\ For more information on these convictions, see Department of
Justice, National Security Division Statistics on Unsealed
International Terrorism and Terrorism-Related Convictions (Washington,
DC: March 2010).
---------------------------------------------------------------------------
DHS has certain responsibilities for strengthening security in the
visa process, including identifying and taking enforcement action to
address overstays. Within DHS, U.S. Customs and Border Protection (CBP)
is tasked with, among other duties, inspecting all people applying for
entry to the United States to determine their admissibility to the
country and screening Visa Waiver Program applicants to determine their
eligibility to travel to the United States under the program. U.S.
Immigration and Customs Enforcement (ICE) is the lead agency for
enforcing immigration law in the interior of the United States and is
primarily responsible for overstay enforcement, and within ICE, the
Counterterrorism and Criminal Exploitation Unit (CTCEU) is primarily
responsible for overstay investigations. The United States Visitor and
Immigrant Status Indicator Technology Program (US-VISIT) within DHS's
National Protection and Programs Directorate supports the
identification of nonimmigrant overstays. In 2002, DHS initiated the
US-VISIT Program to develop a comprehensive entry and exit system to
collect biometric data from aliens traveling through U.S. ports of
entry. In 2004, US-VISIT initiated the first step of this program by
collecting biometric data on aliens entering the United States.
Further, the Department of State is responsible for issuing visas to
foreign nationals seeking admission to the United States. In addition,
DHS has responsibility for managing the Visa Security Program and the
Visa Waiver Program. Specifically, ICE oversees the Visa Security
Program under which it deploys officials to certain U.S. embassies and
consulates to strengthen the visa process by working with Department of
State officials in reviewing visa applications.\7\ DHS is also
responsible for establishing visa policy, including policy for the Visa
Waiver Program.
---------------------------------------------------------------------------
\7\ The Homeland Security Act of 2002 (Pub. L. 107-296, 116 Stat.
2135) established DHS and gave the Secretary of Homeland Security
authority to issue regulations with respect to the issuance and refusal
of visas. Section 428 of the Homeland Security Act authorizes the
Secretary of Homeland Security to assign DHS employees to consular
posts overseas to support the visa process through various functions.
See 6 U.S.C. 236(e).
---------------------------------------------------------------------------
As requested, my testimony will cover the following key issues: (1)
Efforts to take enforcement action against overstays and reported
results; (2) DHS's efforts to implement a biometric exit system and the
reliability of data used to identify overstays; and (3) challenges and
weaknesses in the Visa Security and Visa Waiver programs. This
testimony is based on our prior work on overstay enforcement efforts,
the US-VISIT program, the Visa Security Program, and the Visa Waiver
Program. We issued reports from these efforts in April 2011, August
2010 and November 2009, March 2011, and May 2011, respectively.\8\ For
these reports, we examined program documentation, such as standard
operating procedures, guidance for investigations, and implementation
plans. We also interviewed DHS and Department of State officials.
Additional details on the scope and methodology are available in our
published reports. We conducted this work in accordance with generally
accepted government auditing standards.
---------------------------------------------------------------------------
\8\ GAO, Overstay Enforcement: Additional Mechanisms for
Collecting, Assessing, and Sharing Data Could Strengthen DHS's Efforts
but Would Have Costs, GAO-11-411 (Washington, DC: April 15, 2011);
Homeland Security: US-VISIT Pilot Evaluations Offer Limited
Understanding of Air Exit Options, GAO-10-860 (Washington, DC: Aug. 10,
2010); Homeland Security: Key US-VISIT Components at Varying Stages of
Completion, but Integrated and Reliable Schedule Needed, GAO-10-13
(Washington, DC: Nov. 19, 2009); Border Security: DHS's Visa Security
Program Needs to Improve Performance Evaluation and Better Address Visa
Risk Worldwide, GAO-11-315 (Washington, DC: Mar. 31, 2011), and Visa
Waiver Program: DHS Has Implemented the Electronic System for Travel
Authorization, but Further Steps Needed to Address Potential Program
Risks, GAO-11-335 (Washington, DC: May 5, 2011).
---------------------------------------------------------------------------
In summary, DHS has taken action to strengthen security in the visa
process, but operational and management weaknesses have hindered the
effectiveness of these efforts. First, ICE investigates and arrests a
small portion of the estimated overstay population in the United States
because of, for example, competing enforcement priorities. ICE also
reported allocating a small percentage of its investigative work hours
to overstay investigations since fiscal year 2006, but the agency has
expressed an intention to augment the resources it dedicates to
overstay enforcement efforts moving forward. However, ICE does not yet
have a target time frame for completing its planning efforts for
augmenting overstay enforcement resources, and it lacks mechanisms for
assessing the effectiveness of its enforcement efforts. Second, DHS has
not yet implemented a comprehensive biometric entry and exit system for
collecting biometric data on foreign nationals when they depart the
United States. In the absence of such a system, DHS uses primarily
biographic data to identify overstays. However, unreliable data hinder
DHS's efforts to accurately identify overstays. Third, ICE has deployed
agents to certain embassies and consulates as part of the Visa Security
Program, but has not performed mandated training, has faced staffing
challenges, and has not fully adhered to its program expansion plan.
DHS has taken action to strengthen the security of the Visa Waiver
Program, but has not fully analyzed program risks or completed required
reports on participating countries' security risks in a timely manner.
We made a number of recommendations to DHS to strengthen its efforts in
these areas, such as improving its management and assessment of
overstay enforcement efforts, planning for a biometric exit capability
and mechanisms for collecting data from foreign nationals departing the
United States at land ports of entry, and addressing risks in the Visa
Security and Visa Waiver programs. DHS concurred with these
recommendations and has actions planned or under way to address them.
federal agencies take actions against a small portion of the estimated
overstay population
ICE Investigates Few In-Country Overstays, but Its Efforts Could
Benefit from Improved Planning and Performance Management
As we reported in April 2011, ICE CTCEU investigates and arrests a
small portion of the estimated in-country overstay population due to,
among other things, ICE's competing priorities; however, these efforts
could be enhanced by improved planning and performance management.
CTCEU, the primary Federal entity responsible for taking enforcement
action to address in-country overstays, identifies leads for overstay
cases; takes steps to verify the accuracy of the leads it identifies
by, for example, checking leads against multiple databases; and
prioritizes leads to focus on those the unit identifies as being most
likely to pose a threat to National security or public safety. CTCEU
then requires field offices to initiate investigations on all priority,
high-risk leads it identifies.
According to CTCEU data, as of October 2010, ICE field offices had
closed about 34,700 overstay investigations that CTCEU headquarters
assigned to them from fiscal year 2004 through 2010.\9\ These cases
resulted in approximately 8,100 arrests (about 23 percent of the 34,700
investigations), relative to a total estimated overstay population of 4
million to 5.5 million.\10\ About 26,700 of those investigations (or 77
percent) resulted in one of these three outcomes:\11\ (1) Evidence is
uncovered indicating that the suspected overstay has departed the
United States; (2) evidence is uncovered indicating that the subject of
the investigation is in-status (e.g., the subject filed a timely
application with the United States Citizenship and Immigration Services
(USCIS) to change his or her status and/or extend his or her authorized
period of admission in the United States); or (3) CTCEU investigators
exhaust all investigative leads and cannot locate the suspected
overstay.\12\ Of the approximately 34,700 overstay investigations
assigned by CTCEU headquarters that ICE field offices closed from
fiscal year 2004 through 2010, ICE officials attributed the significant
portion of overstay cases that resulted in a departure finding, in-
status finding, or with all leads being exhausted generally to
difficulties associated with locating suspected overstays and the
timeliness and completeness of data in DHS's systems used to identify
overstays.
---------------------------------------------------------------------------
\9\ CTCEU also investigates suspected Visa Waiver Program
overstays, out-of-status students and violators of the National
Security Entry-Exit Registration System, a program that requires
certain visitors or nonimmigrants to register with DHS for National
security reasons. For the purpose of this discussion, these
investigations are referred to collectively as ``overstay''
investigations. In addition to CTCEU investigative efforts, other ICE
programs within Enforcement and Removal Operations may take enforcement
action against overstays, though none of these programs solely or
directly focus on overstay enforcement. For example, if the Enforcement
and Removal Operations Criminal Alien Program identifies a criminal
alien who poses a threat to public safety and is also an overstay, the
program may detain and remove that criminal alien from the United
States.
\10\ The most recent estimates from the Pew Hispanic Center
approximated that, in 2006, out of an unauthorized resident alien
population of 11.5 million to 12 million in the United States, about 4
million to 5.5 million were overstays. Pew Hispanic Center, Modes of
Entry for the Unauthorized Migrant Population (Washington, DC: May 22,
2006).
\11\ Investigations resulting and not resulting in arrest do not
total 34,700 due to rounding.
\12\ With regard to the second outcome, that the subject is found
to be in-status, under certain circumstances, an application for
extension or change of status can temporarily prevent a visitor's
presence in the United States from being categorized as unauthorized.
See Donald Neufeld, Acting Associate Director, Domestic Operations
Directorate, USCIS, ``Consolidation of Guidance Concerning Unlawful
Presence for Purposes of Sections 212(a)(9)(B)(i) and
212(a)(9)(C)(i)(I) of the [Immigration and Nationality] Act,''
memorandum, Washington, DC, May 6, 2009.
---------------------------------------------------------------------------
Further, ICE reported allocating a small percentage of its
resources in terms of investigative work hours to overstay
investigations since fiscal year 2006, but the agency expressed an
intention to augment the resources it dedicates to overstay enforcement
efforts moving forward. Specifically, from fiscal years 2006 through
2010, ICE reported devoting from 3.1 to 3.4 percent of its total field
office investigative hours to CTCEU overstay investigations. ICE
attributed the small percentage of investigative resources it reported
allocating to overstay enforcement efforts primarily to competing
enforcement priorities. According to the ICE Assistant Secretary, ICE
has resources to remove 400,000 aliens per year, or less than 4 percent
of the estimated removable alien population in the United States. In
June 2010, the Assistant Secretary stated that ICE must prioritize the
use of its resources to ensure that its efforts to remove aliens
reflect the agency's highest priorities, namely nonimmigrants,
including suspected overstays, who are identified as high-risk in terms
of being most likely to pose a risk to National security or public
safety. As a result, ICE dedicated its limited resources to addressing
overstays it identified as most likely to pose a potential threat to
National security or public safety and did not generally allocate
resources to address suspected overstays that it assessed as non-
criminal and low-risk. ICE indicated that it may allocate more
resources to overstay enforcement efforts moving forward and that it
planned to focus primarily on suspected overstays whom ICE has
identified as high-risk or who recently overstayed their authorized
periods of admission.
ICE was considering assigning some responsibility for noncriminal
overstay enforcement to its Enforcement and Removal Operations (ERO)
directorate, which has responsibility for apprehending and removing
aliens who do not have lawful immigration status from the United
States. However, ERO did not plan to assume this responsibility until
ICE assessed the funding and resources doing so would require. ICE had
not established a time frame for completing this assessment. We
reported in April 2011 that by developing such a time frame and
utilizing the assessment findings, as appropriate, ICE could strengthen
its planning efforts and be better positioned to hold staff accountable
for completing the assessment. We recommended that ICE establish a
target time frame for assessing the funding and resources ERO would
require in order to assume responsibility for civil overstay
enforcement and use the results of that assessment. DHS officials
agreed with our recommendation and stated that ICE planned to identify
resources needed to transition this responsibility to ERO as part of
its fiscal year 2013 resource-planning process.
Moreover, although CTCEU established an output program goal and
target, and tracked various performance measures, it did not have a
mechanism in place to assess the outcomes of its efforts, particularly
the extent to which the program was meeting its mission as it relates
to overstays--to prevent terrorists and other criminals from exploiting
the Nation's immigration system. CTCEU's program goal is to prevent
criminals and terrorists from exploiting the immigration system by
proactively developing cases for investigation, and its performance
target is to send 100 percent of verified priority leads to field
offices as cases.\13\ CTCEU also tracks a variety of output measures,
such as the number of cases completed their associated results (i.e.,
arrested, departed, in-status, or all leads exhausted) and average
hours spent to complete an investigation. While CTCEU's performance
target permits it to assess an output internal to the program--the
percentage of verified priority leads it sends to field offices for
investigation--it does not provide program officials with a means to
assess the impact of the program in terms of preventing terrorists and
other criminals from exploiting the immigration system. We reported
that by establishing such mechanisms, CTCEU could better ensure that
managers have information to assist in making decisions for
strengthening overstay enforcement efforts and assessing performance
against CTCEU's goals. In our April 2011 report, we recommended that
ICE develop outcome-based performance measures--or proxy measures if
program outcomes cannot be captured--and associated targets on CTCEU's
progress in preventing terrorists and other criminals from exploiting
the Nation's immigration system. DHS officials agreed with our
recommendation and stated that ICE planned to work with DHS's National
security partners to determine if measures could be implemented.
---------------------------------------------------------------------------
\13\ Verified leads are leads that CTCEU has determined to be
accurate and viable by analyzing information from Government and
commercial databases containing information related to immigration
status. For example, these procedures are intended to verify that an
individual suspected of overstaying has not departed the country or
been granted an extension of stay by USCIS.
---------------------------------------------------------------------------
The Department of State and CBP Have Taken Action to Prevent Ineligible
Out-of-Country Overstays from Returning to the United States
In addition to ICE's overstay enforcement activities, in April 2011
we reported that the Department of State and CBP are responsible for,
respectively, preventing ineligible violators from obtaining a new visa
or being admitted to the country at a port of entry. According to
Department of State data, the Department denied about 52,800
nonimmigrant visa applications and about 114,200 immigrant visa
applications from fiscal year 2005 through fiscal year 2010 due, at
least in part, to applicants having previously been unlawfully present
in the United States for more than 180 days, according to statute.\14\
Similarly, CBP reported that it refused admission to about 5,000
foreign nationals applying for admission to the United States from
fiscal year 2005 through 2010 (an average of about 830 per year)
specifically because of the applicants' previous status as unlawfully
present in the United States for more than 180 days.\15\
---------------------------------------------------------------------------
\14\ State Department data indicate that a total of about 36.5
million nonimmigrant visas and about 2.7 million immigrant visas were
issued from fiscal year 2005 through 2010.
\15\ CBP data indicates that, in total, about 1.3 million foreign
nationals were determined to be inadmissible to the United States by
the CBP Office of Field Operations from fiscal year 2005 through 2010.
As is the case with the State Department, CBP is unable to isolate and
quantify the number of aliens it has determined to be inadmissible
because of the aliens having overstayed by 180 days or less, because
actions taken against these aliens are recorded under grounds of
inadmissibility that may apply to, but are not limited to, overstays.
---------------------------------------------------------------------------
dhs has not implemented a reliable exit system and faces reliability
issues with existing visa overstay data
DHS Has Not Yet Implemented a Comprehensive Biometric Exit System
DHS has not yet implemented a comprehensive biometric system to
match available information provided by foreign nationals upon their
arrival and departure from the United States. In August 2007, we
reported that while US-VISIT biometric entry capabilities were
operating at air, sea, and land ports of entry, exit capabilities were
not, and that DHS did not have a comprehensive plan or a complete
schedule for biometric exit implementation.\16\ In addition, we
reported that DHS continued to propose spending tens of millions of
dollars on US-VISIT exit projects that were not well-defined, planned,
or justified on the basis of costs, benefits, and risks.\17\ Moreover,
in November 2009, we reported that DHS had not adopted an integrated
approach to scheduling, executing, and tracking the work that needed to
be accomplished to deliver a comprehensive exit solution as part of the
US-VISIT program. We concluded that, without a master schedule that was
integrated and derived in accordance with relevant guidance, DHS could
not reliably commit to when and how it would deliver a comprehensive
exit solution or adequately monitor and manage its progress toward this
end. We recommended that DHS ensure that an integrated master schedule
be developed and maintained. DHS concurred and reported, as of July
2011, that the documentation of schedule practices and procedures is
on-going, and that an updated schedule standard, management plan, and
management process that are compliant with schedule guidelines are
under review.
---------------------------------------------------------------------------
\16\ The purpose of US-VISIT is to provide biometric (e.g.,
fingerprint) identification--through the collection, maintenance, and
sharing of biometric and selected biographic data--to authorized DHS
and other Federal agencies.
\17\ GAO, Homeland Security: U.S. Visitor and Immigrant Status
Program's Longstanding Lack of Strategic Direction and Management
Controls Needs to Be Addressed, GAO-07-1065 (Washington, DC: Aug. 31,
2007).
---------------------------------------------------------------------------
More specifically, with regard to a biometric exit capability at
land ports of entry, we reported in December 2006 that US-VISIT
officials concluded that, for various reasons, a biometric US-VISIT
exit capability could not be implemented without incurring a major
impact on land facilities.\18\ In December 2009, DHS initiated a land
exit pilot to collect departure information from temporary workers
traveling through two Arizona land ports of entry. Under this pilot,
temporary workers who entered the United States at these ports of entry
were required to register their final departure by providing biometric
and biographic information at exit kiosks located at the ports of
entry. DHS planned to use the results of this pilot to help inform
future decisions on the pedestrian component of the long-term land exit
component of a comprehensive exit system.
---------------------------------------------------------------------------
\18\ GAO, Border Security: US-VISIT Program Faces, Strategic,
Operational, and Technological Challenges at Land Ports of Entry, GAO-
07-248 (Washington, DC: Dec. 6, 2006).
---------------------------------------------------------------------------
With regard to air and sea ports of entry, in April 2008, DHS
announced its intention to implement biometric exit verification at air
and sea ports of entry in a Notice of Proposed Rule Making.\19\ Under
this notice, commercial air and sea carriers would be responsible for
developing and deploying the capability to collect biometric
information from departing travelers and transmit it to DHS. DHS
received comments on the notice and has not yet published a final rule.
Subsequent to the rule making notice, on September 30, 2008, the
Consolidated Security, Disaster Assistance, and Continuing
Appropriations Act, 2009, was enacted, which directed DHS to test two
scenarios for an air exit solution: (1) Airline collection and
transmission of biometric exit data, as proposed in the rulemaking
notice and (2) CBP collection of such information at the departure
gate.\20\ DHS conducted two pilots in 2009, and we reported on them in
August 2010. Specifically, we reported that the pilots addressed one
statutory requirement for a CBP scenario to collect information on
exiting foreign nationals. However, DHS was unable to address the
statutory requirement for an airline scenario because no airline was
willing to participate. We reported on limitations with the pilots,
such as the reported scope and approach of the pilots including
limitations not defined in the pilot evaluation plan like suspending
exit screening at departure gates to avoid flight delays, that
curtailed their ability to inform a decision for a long-term air exit
solution and pointed to the need for additional sources of information
on air exit's operational impacts.\21\ We recommended that the
Secretary of Homeland Security identify additional sources of
information beyond the pilots, such as comments from the Notice of
Proposed Rule Making, to inform an air exit solution decision. DHS
agreed with the recommendation and stated that the pilots it conducted
would not serve as the sole source of information to inform an air exit
solution decision. In July 2011, DHS stated that it continues to
examine all options in connection with a final biometric air exit
solution and has recently given consideration to using its authority to
establish an advisory committee to study and provide recommendations to
DHS and Congress on implementing an air exit program.
---------------------------------------------------------------------------
\19\ 73 Fed. Reg. 22,065 (Apr. 24, 2008).
\20\ Pub. L. No. 110-329, 122 Stat. 3574, 3668-70 (2008).
\21\ GAO, Homeland Security: US-VISIT Pilot Evaluations Offer
Limited Understanding of Air Exit Options, GAO-10-860 (Washington, DC:
Aug. 10, 2010).
---------------------------------------------------------------------------
More Reliable, Accessible Data Could Improve DHS's Efforts to Identify
and Share Information on Overstays
In the absence of a comprehensive biometric entry and exit system
for identifying and tracking overstays, US-VISIT and CTCEU primarily
analyze biographic entry and exit data collected at land, air, and sea
ports of entry to identify overstays. In April 2011, we reported that
DHS's efforts to identify and report on visa overstays were hindered by
unreliable data. Specifically, CBP does not inspect travelers exiting
the United States through land ports of entry, including collecting
their biometric information, and CBP did not provide a standard
mechanism for nonimmigrants departing the United States through land
ports of entry to remit their arrival and departure forms.
Nonimmigrants departing the United States through land ports of entry
turn in their forms on their own initiative. According to CBP
officials, at some ports of entry, CBP provides a box for nonimmigrants
to drop off their forms, while at other ports of entry departing
nonimmigrants may park their cars, enter the port of entry facility,
and provide their forms to a CBP officer. These forms contain
information, such as arrival and departure dates, used by DHS to
identify overstays. If the benefits outweigh the costs, a mechanism to
provide nonimmigrants with a way to turn in their arrival and departure
forms could help DHS obtain more complete and reliable departure data
for identifying overstays. We recommended that the Commissioner of CBP
analyze the costs and benefits of developing a standard mechanism for
collecting these forms at land ports of entry, and develop a standard
mechanism to collect them, to the extent that benefits outweigh the
costs. CBP agreed with our recommendation and stated it planned to
complete a cost-effective independent evaluation.
Further, we previously reported on weaknesses in DHS processes for
collecting departure data, and how these weaknesses impact the
determination of overstay rates. The Implementing Recommendations of
the 9/11 Commission Act required that DHS certify that a system is in
place that can verify the departure of not less than 97 percent of
foreign nationals who depart through U.S. airports in order for DHS to
expand the Visa Waiver Program.\22\ In September 2008, we reported that
DHS's methodology for comparing arrivals and departures for the purpose
of departure verification would not inform overall or country-specific
overstay rates because DHS's methodology did not begin with arrival
records to determine if those foreign nationals departed or remained in
the United States beyond their authorized periods of admission.\23\
Rather, DHS's methodology started with departure records and matched
them to arrival records. As a result, DHS's methodology counted
overstays who left the country, but did not identify overstays who have
not departed the United States and appear to have no intention of
leaving. We recommended that DHS explore cost-effective actions
necessary to further improve the reliability of overstay data. DHS
reported that it is taking steps to improve the accuracy and
reliability of the overstay data, by efforts such as continuing to
audit carrier performance and work with airlines to improve the
accuracy and completeness of data collection. Moreover, by statute, DHS
is required to submit an annual report to Congress providing numerical
estimates of the number of aliens from each country in each
nonimmigrant classification who overstayed an authorized period of
admission that expired during the fiscal year prior to the year for
which the report is made.\24\ DHS officials stated that the Department
has not provided Congress annual overstay estimates regularly since
1994 because officials do not have sufficient confidence in the quality
of the Department's overstay data--which is maintained and generated by
US-VISIT. As a result, DHS officials stated that the Department cannot
reliably report overstay rates in accordance with the statute.
---------------------------------------------------------------------------
\22\ 8 U.S.C. 1187(c)(8).
\23\ GAO, Visa Waiver Program: Actions Are Needed to Improve
Management of the Expansion Process, and to Assess and Mitigate Program
Risks, GAO-08-967 (Washington, DC: Sept. 15, 2008).
\24\ 8 U.S.C. 1376(b).
---------------------------------------------------------------------------
In addition, in April 2011 we reported that DHS took several steps
to provide its component entities and other Federal agencies with
information to identify and take enforcement action on overstays,
including creating biometric and biographic lookouts--or electronic
alerts--on the records of overstay subjects that are recorded in
databases. However, DHS did not create lookouts for the following two
categories of overstays: (1) Temporary visitors who were admitted to
the United States using nonimmigrant business and pleasure visas and
subsequently overstayed by 90 days or less; and (2) suspected in-
country overstays who CTCEU deemed not to be a priority for
investigation in terms of being most likely to pose a threat to
National security or public safety. Broadening the scope of electronic
lookouts in Federal information systems could enhance overstay
information sharing. In April 2011, we recommended that the Secretary
of Homeland Security direct the Commissioner of Customs and Border
Protection, the Under Secretary of the National Protection and Programs
Directorate, and the Assistant Secretary of Immigration and Customs
Enforcement to assess the costs and benefits of creating biometric and
biographic lookouts for these two categories of overstays. Agency
officials agreed with our recommendation and have actions under way to
address it. For example, agency officials stated that they have met to
assess the costs and benefits of creating lookouts for those categories
of overstays.
additional steps needed to address risks in the visa security and visa
waiver programs
Visa Security Program
As we reported in March 2011, the Visa Security Program faces
several key challenges in implementing operations at overseas posts.
For example, we reported that Visa Security Program agents' advising
and training of consular officers, as mandated by section 428 of the
Homeland Security Act, varied from post to post, and some posts
provided no training to consular officers. We contacted consular
sections at 13 overseas posts, and officials from 5 of the 13 consular
sections we interviewed stated that they had received no training from
the Visa Security Program agents in the last year, and none of the
agents we interviewed reported providing training on specific security
threats. At posts where Visa Security Program agents provided training
for consular officers, topics covered included fraudulent documents,
immigration law, human smuggling, and interviewing techniques. In March
2011, we recommended that DHS issue guidance requiring Visa Security
Program agents to provide training for consular officers as mandated by
section 428 of the Homeland Security Act. DHS concurred with our
recommendation and has actions under way to address it.
Further, in March 2011 we reported that Visa Security Program
agents performed a variety of investigative and administrative
functions beyond their visa security responsibilities, including
criminal investigations, attache functions, and regional
responsibilities. According to ICE officials, Visa Security Program
agents perform non-program functions only after completing their visa
security screening and vetting workload. However, both agents and
Department of State officials at some posts told us that these other
investigative and administrative functions sometimes slowed or limited
Visa Security Program agents' visa security-related activities. We
recommended that DHS develop a mechanism to track the amount of time
spent by Visa Security Program agents on visa security activities and
other investigations, in order to determine appropriate staffing levels
and resource needs for Visa Security Program operations at posts
overseas to ensure visa security operations are not limited. DHS did
not concur with our recommendation, stating that ICE currently tracks
case investigation hours through its data system, and that adding the
metric to the Visa Security Program tracking system would be redundant.
However, DHS's response did not address our finding that ICE does not
have a mechanism that allows the agency to track the amount of time
agents spend on both investigation hours and hours spent on visa
security activities. Therefore, we continue to believe the
recommendation has merit and should be implemented.
Moreover, we found that ICE's use of 30-day temporary duty
assignments to fill Visa Waiver Program positions at posts created
challenges and affected continuity of operations at some posts.
Consular officers we interviewed at 3 of 13 posts discussed challenges
caused by this use of temporary duty agents. The Visa Security
Program's 5-year plan also identified recruitment of qualified
personnel as a challenge and recommended incentives for Visa Security
Program agents as critical to the program's mission, stating, ``These
assignments present significant attendant lifestyle difficulties. If
the mission is to be accomplished, ICE, like State, needs a way to
provide incentives for qualified personnel to accept these hardship
assignments.'' However, according to ICE officials, ICE had not
provided incentives to facilitate recruitment for hardship posts.\25\
ICE officials stated that they have had difficulty attracting agents to
Saudi Arabia, and ICE agents at post told us they have little incentive
to volunteer for Visa Security Program assignments. Thus, we
recommended that DHS develop a plan to provide Visa Security Program
coverage at high-risk posts where the possibility of deploying agents
may be limited. DHS agreed with our recommendation and is taking steps
to implement it.
---------------------------------------------------------------------------
\25\ The Department of State has designated roughly two-thirds of
its 268 overseas posts as hardship posts. Staff working in such
locations often encounter harsh environmental and living conditions
that can include inadequate medical facilities, limited opportunities
for spousal employment, poor schools, high levels of crime, and severe
climate.
---------------------------------------------------------------------------
In addition, ICE developed a plan to expand the Visa Security
Program to additional high-risk visa-issuing posts, but ICE had not
fully adhered to the plan or kept it up to date. The program's 5-year
expansion plan, developed in 2007, identified 14 posts for expansion
between 2009 and 2010, but 9 of these locations had not been
established at the time of our March 2011 report, and ICE had not
updated the plan to reflect the current situation. Furthermore, ICE had
not fully addressed remaining visa risk in high-risk posts that did not
have a Visa Security Program presence. ICE, with input from the
Department of State, developed a list of worldwide visa-issuing posts
that are ranked according to visa risk. Although the expansion plan
stated that risk analysis is the primary input to Visa Security Program
site selection and that the expansion plan represented an effort to
address visa risk, ICE had not expanded the Visa Security Program to
some high-risk posts. For example, 11 of the top 20 high-risk posts
identified by ICE and Department of State were not covered by Visa
Security Program at the time of our review. The expansion of the Visa
Security Program may be limited by a number of factors--including
budget limitations and objections from Department of State officials at
some posts--and ICE had not identified possible alternatives that would
provide the additional security of Visa Security Program review at
those posts that do not have a program presence. In May 2011, we
recommended that DHS develop a plan to provide Visa Security Program
coverage at high-risk posts where the possibility of deploying agents
may be limited. DHS concurred with our recommendation and noted actions
under way to address it, such as enhancing information technology
systems to allow for screening and reviewing of visa applicants at
posts worldwide.
Visa Waiver Program
As we reported in May 2011, DHS implemented the Electronic System
for Travel Authorization (ESTA) to meet a statutory requirement
intended to enhance Visa Waiver Program security and took steps to
minimize the burden on travelers to the United States added by the new
requirement.\26\ However, DHS had not fully evaluated security risks
related to the small percentage of Visa Waiver Program travelers
without verified ESTA approval. DHS developed ESTA to collect passenger
data and complete security checks on the data before passengers board a
U.S.-bound carrier. DHS requires applicants for Visa Waiver Program
travel to submit biographical information and answers to eligibility
questions through ESTA prior to travel. Travelers whose ESTA
applications are denied can apply for a U.S. visa. In developing and
implementing ESTA, DHS took several steps to minimize the burden
associated with ESTA use. For example, ESTA reduced the requirement
that passengers provide biographical information to DHS officials from
every trip to once every 2 years. In addition, because of ESTA, DHS has
informed passengers who do not qualify for Visa Waiver Program travel
that they need to apply for a visa before they travel to the United
States. Moreover, most travel industry officials we interviewed in six
Visa Waiver Program countries praised DHS's widespread ESTA outreach
efforts, reasonable implementation time frames, and responsiveness to
feedback but expressed dissatisfaction over ESTA fees paid by ESTA
applicants.\27\
---------------------------------------------------------------------------
\26\ See 8 U.S.C. 1187(h)(3).
\27\ In September 2010, the U.S. Government began to charge ESTA
applicants a $14 fee when they applied for ESTA approval, including $10
for the creation of a corporation to promote travel to the United
States and $4 to fund ESTA operations.
---------------------------------------------------------------------------
In 2010, airlines complied with the requirement to verify ESTA
approval for almost 98 percent of the Visa Waiver Program passengers
prior to boarding, but the remaining 2 percent--about 364,000
travelers--traveled under the Visa Waiver Program without verified ESTA
approval. In addition, about 650 of these passengers traveled to the
United States with a denied ESTA. As we reported in May 2011, DHS had
not yet completed a review of these cases to know to what extent they
pose a risk to the program. DHS officials told us that, although there
was no official agency plan for monitoring and oversight of ESTA, the
ESTA office was undertaking a review of each case of a carrier's
boarding a Visa Waiver Program traveler without an approved ESTA
application; however, DHS had not established a target date for
completing this review. DHS tracked some data on passengers that travel
under the Visa Waiver Program without verified ESTA approval but did
not track other data that would help officials know the extent to which
noncompliance poses a risk to the program. Without a completed analysis
of noncompliance with ESTA requirements, DHS was unable to determine
the level of risk that noncompliance poses to Visa Waiver Program
security and to identify improvements needed to minimize noncompliance.
In addition, without analysis of data on travelers who were admitted to
the United States without a visa after being denied by ESTA, DHS cannot
determine the extent to which ESTA is accurately identifying
individuals who should be denied travel under the program. In May 2011,
we recommended that DHS establish time frames for the regular review
and documentation of cases of Visa Waiver Program passengers traveling
to a U.S. port of entry without verified ESTA approval. DHS concurred
with our recommendation and committed to establish procedures to review
quarterly a representative sample of noncompliant passengers to
evaluate, identify, and mitigate potential security risks associated
with the ESTA program.
Further, in May 2011 we reported that to meet certain statutory
requirements, DHS requires that Visa Waiver Program countries enter
into three information-sharing agreements with the United States;
however, only half of the countries had fully complied with this
requirement and many of the signed agreements have not been
implemented.\28\ Half of the countries entered into agreements to share
watch list information about known or suspected terrorists and to
provide access to biographical, biometric, and criminal history data.
By contrast, almost all of the 36 Visa Waiver Program countries entered
into an agreement to report lost and stolen passports. DHS, with the
support of interagency partners, established a compliance schedule
requiring the last of the Visa Waiver Program countries to finalize
these agreements by June 2012. Although termination from the Visa
Waiver Program is one potential consequence for countries not complying
with the information-sharing agreement requirement, U.S. officials have
described it as undesirable. DHS, in coordination with the Departments
of State and Justice, developed measures short of termination that
could be applied to countries not meeting their compliance date.
---------------------------------------------------------------------------
\28\ See 8 U.S.C. 1187(c)(2)(D), (F).
---------------------------------------------------------------------------
In addition, as of May 2011, DHS had not completed half of the most
recent biennial reports on Visa Waiver Program countries' security
risks in a timely manner. In 2002, Congress mandated that, at least
once every 2 years, DHS evaluate the effect of each country's continued
participation in the program on the security, law enforcement, and
immigration interests of the United States. The mandate also directed
DHS to determine based on the evaluation whether each Visa Waiver
Program country's designation should continue or be terminated and to
submit a written report on that determination to select Congressional
committees.\29\ According to officials, DHS assesses, among other
things, counterterrorism capabilities and immigration programs.
However, DHS had not completed the latest biennial reports for 18 of
the 36 Visa Waiver Program countries in a timely manner, and over half
of these reports are more than 1 year overdue. Further, in the case of
2 countries, DHS was unable to demonstrate that it had completed
reports in the last 4 years. DHS cited a number of reasons for the
reporting delays. For example, DHS officials said that they
intentionally delayed report completion because they frequently did not
receive mandated intelligence assessments in a timely manner and needed
to review these before completing Visa Waiver Program country biennial
reports. We recommended that DHS take steps to address delays in the
biennial country review process so that the mandated country reports
can be completed on time. DHS concurred with our recommendation and
reported that it would consider process changes to address our concerns
with the timeliness of continuing Visa Waiver Program reports.
---------------------------------------------------------------------------
\29\ See the Enhanced Border Security and Visa Entry Reform Act of
2002.
---------------------------------------------------------------------------
This concludes my prepared testimony statement. I would be pleased
to respond to any questions that Members of the subcommittee may have.
Mrs. Miller. Thank you very much, Mr. Stana. I appreciate
all the testimony of all the witnesses. I know we have a lot of
questions.
One of the things that struck me as you all were testifying
was the common theme about sharing information, et cetera, and
working together with your sister agencies, with your partners
and having good partnerships. That is a theme in my office and
I think certainly most Members' offices, that was a critical
element of the
9/11 Commission recommendations about moving from the need to
know to the need to share and getting out of our respective
silos, et cetera, et cetera. We talk about that all the time.
It is very important certainly. I think that is why our
committee staff put you all so close together. You are just
smashed together.
As I mentioned, the first and foremost responsibility of
the Federal Government to provide for the common defense is
actually in the Constitution; securing our borders is a
Constitutional mandate of the Congress, and that is what this
committee is all about. So we want to work with the
administration in every way possible to secure our borders. I
really do not look at it as a Republican or Democratic issue. I
see this in very nonpartisan terms. I am delighted that because
this committee has been very, very vocal about continuing the
presence of the National Guard as a force multiplier for CBP
and Border Patrol along the Southern border the administration
just recently has agreed to do so for some period of time. I
think we could use more, but still it is a very, very
excellent, positive step forward, I think.
Mr. Cohen, as you are outlining today, I don't know whether
serendipity or whatever, you don't need to comment on that, but
certainly the timing of having the administration talk about
things that this committee has been pushing for for some period
of time in regards to the visa program, announcing those today
as we are having this hearing does strike me as a bit
interesting and very welcome, very welcome. So we are delighted
to hear about those kinds of things.
I guess I would start, Mr. Cohen, with you. I was trying to
take some notes as you were outlining this. So there may be a
couple of questions in this. But you mentioned that you had 1.6
million names that you started with and about 800,000 of those
you found then had left, which was an interesting number. So we
really didn't know about that until you started this, which is
okay, and then 839,000 left to vet, which you have done so,
several thousand sent to ICE. I am trying to understand where
we are in this whole vetting process, if you would flesh out
your testimony a little bit with that, because you mentioned
also that Congress would get the data for instance by country
and some of the other metrics that you outlined. I am
interested to know when that might be. I thought you said 6, 12
months. I am interested in that.
I guess just generally there is no secret about the painful
economic transition that is happening Nationally and all of us
are concerned about the budget deficit, and what we want to do
of course is prioritize our expenditures so that we are doing
what we need to do with the resources that we have. I think by
using technology--that was going to be a question I had before
you outlined here about the biometric forms, and some of the
biometric and biographic information, of course using the
biographic information, but the biometric forms whether that is
iris scan or retinal scanning or fingerprints, all of these
different kinds of things. I am a big believer in utilizing
technology as a cost-effective, cost-efficient, in this case
National security efficiency matrix as well has been overlayed.
So I was delighted to hear you talk about that.
So I don't know if I am making my question clear, but I am
trying to understand exactly what it is that you have outlined
for us today, because what you said is essentially what we have
been trying to get at as a committee.
Mr. Cohen. Thank you, Madam Chairwoman. I think you are
right, there are a couple of factors that have come into play
that have allowed us to come here today and be able to describe
what I think is a pretty fully based approach to how to deal
with this issue. I think the level of cooperation that has
matured across not only the Department, but across the Federal
interagencies, across the law enforcement community, the
intelligence community as well as the immigration community,
coupled with quite frankly a maturation of information systems.
Whether it is the information systems of the NCTC, the
information systems of the intelligence community, the
information systems used by US-VISIT, ICE, and CBP and State
Department, there has been a maturation over the last several
years. I would argue that what I started to describe earlier
probably could not have occurred several years ago.
So how do we get to where we are today? Earlier this year,
for many of the reasons you all have outlined earlier, the
Secretary pulled CBP, ICE, US-VISIT together and said, we need
to vet the 1.6 million records that are commonly referred to as
the overstay backlog from a National security and public safety
perspective. We have to get it done and we have to get it done
now. That meant we all came together and we reached out to our
intelligence community colleagues and we came up with a way to
leverage existing technical capabilities to vet from a public
safety and National security perspective those records.
The first step was US-VISIT running through their systems
that 1.6 million records. That is how they were able to
eliminate the first tranche of that data to determine that they
had left the country or they had actually changed their
immigration status.
The remaining records, a portion of those were considered
confirmed potential overstays. Based on existing protocols
those 82,000 records would have been more fully evaluated under
the preexisting manual database checks and protocols that
existed through the ICE prioritization process.
What we did this time is we took those 82,000 records and
the remaining 757,000 records, which under the prior paradigm
would never have been fully vetted, and we ran them through the
NCTC system and then we then leveraged the capabilities of
automated targeting system to query not only law enforcement
and other immigration databases but we leveraged the
intelligence-driven targeting rules that ICE--that CBP utilizes
in the course of their general business. Out of 839,000 records
we were able to identify a subset that were potentially public
safety or National security threats. Working with ICE and CBP
and the intelligence community, we were able to essentially go
through each and every one of those 2,000 records.
A subset of those, several hundred, were potential leads
that ICE eventually ran down to the point where we were talking
about dozens. So we started with 1.6 million records and ended
up with dozens of new investigations. Now some of those,
several hundred, were preexisting investigations, some had
died, some were in jail. Which think they were overstays
because they were actually in jail. Some we determined had left
the country because we were querying different databases like
Interpol databases, et cetera. But we were able to automate
that public safety and national security vetting process.
We brought the same group together to say, okay, can we do
the same thing from a location and immigration status
perspective? Current capabilities did not allow that. To be
able to vet those 757,000 records from a location and
immigration status perspective would have required time-
consuming manual databases--database queries, excuse me. So we
put this team--we focused this team on coming up with a design
on how to automate those processes as well. That work has been
underway for several months now. I think we have come up with a
concrete plan. As we looked at what would result when we put
that plan into motion, we estimate will take between 6 to 12
months, we will have phased in results along that time period.
We not only will be able to fully vet from an on-going basis
any other potential overstays, or visa applicants, or visa
holders, or people requesting other immigration benefits from a
public safety or National security perspective, but we will
also have enhanced biographic exit capability from added
biometric features, such as better utilization of fingerprint
identification numbers and other biometrics. If we couple that
with research being done by our S&T on biometric data
collection capabilities from an exit perspective, you have the
foundation for a biometric exit capability in the future.
Mrs. Miller. Well, I for one cannot tell you how much
better I feel now than I did at the beginning of this hearing
listening to your explanation and as you have been talking
about your process here. I guess one follow-up, when you talk
about follow-on, sometimes ``follow up'' are the two most
important words in the English language. You have this large
group that you began with, 1.6 million, and you went through
various iterations down to a couple of hundred apparently that
are continuing with some sort of investigative process there.
How will you do in following up so we never get to that huge
backup again? So you will be able to--maybe you told me that,
but I didn't quite get it. How are you going to continue to do
this so it will not happen in the future, we will be able to in
real time understand if there is a significant threat to
National security--not 6 months after the fact.
Mr. Cohen. So, for me, one of the most exciting parts of
this has been to watch how as we have brought more clarity to
the technological capabilities that can come when we interlink
these systems, that that has caused a parallel excitement on
the operational side. ICE has, working with CBP and others, has
been rethinking the way that they track day-to-day. So instead
of us being reactive, an overstay list being--a potential
overstay list being created, it being prioritized best based on
preexisting prioritization standards, CBP and the technologists
will be working developing essentially a hot sheet, which on
day-to-day will look at new derogatory information coming in,
new immigration information coming in, new travel information
coming in and will essentially create a dashboard available to
ICE on a day-to-day basis that will provide them insights about
those public safety and National security risks that are either
overstays or existing visa holders.
So ICE is actually--this has provided an opportunity for
ICE, as they are able to free up more personnel from these
database queries, to be more imaginative and creative in how
they use their existing investigative resources.
Maybe I would defer to Mr. Edge if he wants to add any more
to that.
Mrs. Miller. Mr. Edge.
Mr. Edge. Thank you very much, Chairwoman Miller.
That is certainly a very accurate assessment. The part that
US-VISIT begins we are able to take after all these leads have
been fully evaluated and vetted through various databases, and
then we farm those leads out to our various offices in the
field. We have 265 offices on the domestic side and 70 offices
internationally. So once those leads are sent out to the field,
our agents are able to conduct investigations and very detailed
investigations, based on the quality of the information that we
have received.
So it certainly has worked very well. We certainly see that
it is going to continue to work. We also have received well
over 194,000 leads, not only from US-VISIT, but from the SEVIS
process as well. We have initiated 7,272 investigations as a
result, and that is pretty significant, certainly something
that we haven't been doing over the past--since the inception
of the agency and us trying to combat terrorism.
As a result, we have also been able to make 2,194 arrests.
So the information that we are getting now has really been
analyzed carefully, resulting in some significant results. As
Mr. Cohen indicated, we are able to conduct some quality
investigations by gathering this information and sending it to
additional databases in the intelligence community as well as
our counterparts in the law enforcement world.
Mrs. Miller. Thank you very much.
I would just conclude my questioning here by once again
observing that this is really how Congress is supposed to act,
where we are doing oversight, we are asking various questions,
hopefully getting the agencies to respond.
You certainly are responding and I think in a very
appropriate manner. So I am appreciative to hear all of this
today.
With that, I would like to recognize our Ranking Member,
Mr. Cuellar, for his questions.
Mr. Cuellar. Thank you very much, Chairwoman.
I have two sets of questions. One has to do with the time
that after an alien is ordered to be removed, how long it takes
for that person to stay.
Members, I would ask you to look at the handouts, and I
believe Diana is going to put an overhead also. What is the
average time to get the travel documents issuance before they
are removed? So it involves a little bit of the State
Department.
[The information follows:]
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
The other one is an issue I brought up at the committee
last week, I believe, about a Mexican-based school that taught
students how to fly. They were in south Texas. Instead of being
there on student visas, they were there learning--being taught
on tourist visas it sells. Again, the way this came about,
because one of the Mexican pilots, training pilots, went over
and buzzed some of the boaters at one of the places and had to
create that type of activity to bring this up.
So I will go first with the travel. As you know, when an
alien other than a Mexican national is ordered removed from the
United States, a consular officer from the alien's country of
origin must issue a travel document. This travel document
allows the alien to return to his or her country and are
necessary to effect the order removal of aliens from the United
States. There are some countries, like Guatemala, Honduras, and
the DR that have electronic travel documents that make that to
move a lot faster. Of course, with Mexico overall we have a
good working relationship where they will take them rather
quickly.
But as you can see up there, there are certain countries,
and this is only just a few: Pakistan takes 92 days. This is
after--just to get the travel documents. China, 147 days;
India, 160 days; Bangladesh, 192 days; Zimbabwe, 257; Cambodia,
300 days; Vietnam, 337; Iraq, 391 days. Again, I know from the
State Department, because--and I want to thank John Morton,
because he is the one that brought up this issue about a year
ago. We sat down with the State Department, and we were given
the diplomatic reasons why the State Department couldn't move
on.
But at the same time, keep in mind that that will cost us
money, because any time they stay here in the United States, it
is going to cost us money. This is from the time an order was
given. This is not before the time; this is after. So if you
add all of those, it is going to cost the taxpayers thousands
and thousands and thousands of dollars to keep those folks
here.
The chart, as I mentioned, those are the recalcitrant
countries that are just slow in accepting their nationals back,
and they will give up different reasons. They are good at
giving information so they can get their visas. But when we
want to send them back, they will give you all these reasons.
My only thing is this: If we can be given the reasons again
why it is difficult to get these countries to get them to
accept the folks back and what is being done by the United
States, and are those delays a consideration when determining
whether to issue visas to individuals for certain countries? My
thing is, if they are taking a hard time to take back those
folks, then when we give them visas, why are we continuing to
give them visas when at the end, they are going to take their
time? I really think that the State Department should consider
that. Should we consider restricting visa issuance to those
countries until they begin to accept their nationals in more
timely visas? Again, I am a Georgetown Graduate School of
Foreign Service, I understand all the diplomatic reasons. But
again, as a taxpayer and as a Member of Congress that
represents all those folks, I think that is something that we
need to play a little bit more hardball with those countries
that are taking their time and costing us a lot of money.
The second part of the question is the situation that we
had in south Texas. How can students that come in, take flying
lessons in small planes--and we know what happened in 9/11. You
know they are coming in to learn. They are here on tourist
visas and not student visas. Then of course, when we talk to
the FAA and Homeland Security, everybody will say, well, we
don't do this, we don't do this, we don't do that. That is
their responsibility, not our responsibility. It goes to what
the Chairwoman and Chairman Thompson has been and all of us
have been talking about, all Members of the committee, is:
Where is the coordination?
I mean, at the end of the day, the American taxpayer
doesn't want to know what agencies blame what agency. They want
to know: What are the results and how are you keeping us safe?
The first part of the question is the recalcitrant agent
countries. I guess we will start with the State Department.
Mr. Ramotowski. Thank you, Congressman.
Let me first say that the State Department is acutely aware
of the seriousness of this issue. We share your concern. We are
taking all possible steps to improve the situation with respect
to recalcitrant countries. Together with our interagency
partners we have established a high-level working group to work
out a strategy for dealing with the most egregious countries.
In addition to that, former Under Secretary Burns, now deputy
secretary, instructed all our chiefs of mission to do what they
could to produce positive responses in the recalcitrant
countries.
Mr. Cuellar. Could I ask you a question? Since April--I
think it was in April 2011 that we met in my office with the
State Department and John Morton. Has anything been done except
establish a working task force--with all due respect. I mean
that with all respect. I appreciate all the help that you and
Secretary Clinton are doing. Anything been done since that time
besides incur more taxpayers' dollars? Is the task force the
only thing that has been done?
Mr. Ramotowski. Well, these issues are also being addressed
case by case with the foreign consulate officers here in
Washington. Again, our staff works with ICE and the other
agencies involved to try to encourage the foreign countries to
take back more of these individuals. But as you have
recognized, it is a difficult process. There are many issues at
stake, and the progress hasn't been as rapid as we would all
like.
I would point out, too, that our new ambassador to China,
former Secretary of Commerce Gary Locke, is personally aware of
and engaged in this issue and is determined to see more
progress with respect to China. So we are doing everything that
we can. Let me close by saying that for us, this is a very
serious issue.
Mr. Cuellar. I appreciate that. Could we put a little bit
more pressure on them at the beginning instead of the end?
Mr. Ramotowski. We will try our best, sir.
Mr. Cuellar. We will follow up on the second question on
the second round on that. Just keep thinking about that
particular case in south Texas.
Thank you, Madam Chairwoman.
Mrs. Miller. I thank the gentleman.
The Chairwoman now recognizes the other gentleman from
Texas, Mr. McCaul.
Mr. McCaul. Thank you, Madam Chairwoman.
Fifteen of the hijackers came from Saudi Arabia. When I
look at the Visa Security Program, it does not have 11 of the
top 20 high-risk posts included, including Saudi Arabia, which
seems sort of interesting to me.
So Mr. Edge and Mr. Cohen, can you explain to me why Saudi
Arabia is not on this--part of this program?
Mr. Edge. I believe Saudi Arabia is a part of the program
as we speak today.
Mr. McCaul. They are?
Mr. Edge. Yes, they are.
Mr. McCaul. Then perhaps I had some misinformation.
Let me continue with Mr. Cohen. I am glad that after 10
years later, we are making progress on our exit program. When
do you plan to have that fully implemented?
Mr. Cohen. We anticipate that the capabilities that I
described earlier will be implemented within 6 to 12 months.
Mr. McCaul. Will that include also biometric?
Mr. Cohen. It will include enhanced biographic with certain
biometric elements included. As I referenced earlier, more
expanded use of information captured on the front end,
fingerprints, et cetera. We are also--it will also include
within that same time period more advancements in research on
biometric technologies we can use here as part of the exit
program.
Mr. McCaul. I agree with Madam Chairwoman. That is
certainly good news. That is where the Congress in our
oversight working with you actually is a positive experience.
Let me move on to visa overstays. The Secretary announced
that criminal aliens are a high priority for deportation. As a
former Federal prosecutor, I certainly understand that with
limited resources. On the other hand, she seemed to infer that
noncriminal aliens that were having visa overstays could stay
in this country and apply for work permits.
First of all, Mr. Edge, can you respond to that; is that
the administration's position?
Mr. Edge. Well, our position as a law enforcement agency is
to take the information that we acquire from the SEVIS program
and US-VISIT and focus on those overstays that pose the most
threat and potentially are the most dangerous to our country.
Mr. McCaul. I get that, and I agree with that. But I was
disturbed by the inference that the noncriminal aliens
overstaying could stay here and apply for work permits. Was
that an accurate statement on the part of this administration?
Mr. Edge. I am not familiar with that statement. I would
have to defer to the Department.
Mr. McCaul. Okay. Perhaps I need to ask the Secretary
herself that question.
Mr. Stana, if that is the policy of this administration, do
you think that would pose a threat in any way to our security?
Mr. Stana. Well, given with the theme of the hearing, the
integrity of the visa process, you would certainly call it into
question.
Listening to the new program that ICE and DHS is putting
together, I think it is a step in the--I would welcome the
opportunity to take a look at it. It raises a whole host of
questions. But if we are still going to focus on the National
security and public safety folks, which is the thing to start
with, it still leaves the vast majority of people untouched,
and it gives the impression that once you are in the country,
you are in, unless you act out, and then you might get caught.
Mr. McCaul. Because as I look at some of these, whether it
is hijackers or high-profile terrorist violators, many of them
were noncriminal aliens here on a visa overstay.
Mr. Stana. Well, and the fact that the Christmas day bomber
went through the visa processes, many of which were in place in
December 2009, apparently got in on the airplane and got a
visa, just calls into question how much question has to be
raised before you deny boarding.
Mr. McCaul. Mr. Edge, I hope you can get back to me on that
question in terms of what is the administration's position.
[The information follows:]
A typical scenario is someone enters legally, overstays, marries a
United States Citizen and applies for adjustment of status. I believe
in this case the person may qualify for an Employment Authorization
Document (EAD) based on the pending I-485, Application to Adjust
Status. Here are some other examples under which an individual, like an
overstay, would get an EAD:
Deferred Action;
Temporary Protected Status;
Withholding of Removal;
Applicant for Cancellation of Removal;
Certain Asylum applicants (where applications have been
pending for more than 180 days);
Certain individuals who are subject to Final Removal Orders
can also apply for employment authorization if they cannot be
physically removed for some reason or if they are the sole
supporters of other family members.
[Ruth Tintary, Associate Chief Legislative Branch for USCIS provided
this answer to ICE, Office of Congressional Relations]
Mr. McCaul. Or perhaps, Mr. Cohen, you may have an answer
to that.
Mr. Cohen. Yes, Congressman, if I may.
So, first and foremost, because of resource issues
primarily, the administration prioritizes the targeting of
those visa overstays that represent a National security or
public safety risk. Through the capabilities that I have
described earlier, as we are better able to identify people who
are actually confirmed overstays, meaning we have assessed that
they are actually located in this country and they have not
changed their immigration status, we then, as we do now, will
have the ability to provide that information so they can be
inputted by CBP and others into their systems and State
Department into their systems. So if there is a second
encounter, meaning they are arrested, meaning that they seek to
apply for another visa, they seek to apply for other types of
entry, the information that they are an overstay will be
available to those CBP officers or others.
Mr. McCaul. Well, again, a majority of the hijackers were
overstay noncriminal aliens. The Blind Sheik responsible for
the 1993 World Trade Center bombing was a visa overstay without
a criminal record. So I think it is important, and I am
concerned--and that is why I look forward to hearing from the
administration--I am concerned about sending a message out
there that if you are a noncriminal alien, it is okay to stay;
in fact, you can apply for a work permit as well.
Mr. Cohen. If I may, Congressman, one last point. You make
an excellent point about whether information about the
hijackers was in databases like NCIC because they have been
arrested. What there was on many of the hijackers, or on
several hijackers, was derogatory information or other law
enforcement information that under this new construct would
come to the attention of authorities; information in FinCEN,
information that may reside in other repositories of the
intelligence community, other than say the TSDB. So what we are
seeking to do is expand our ability to vet visa information or
information regarding potential overstays against a much
broader set of law enforcement or intelligence information than
we have done so in the past.
Mr. McCaul. I look forward to working with you on that, and
thank you for your testimony.
Mrs. Miller. Thank you.
The Chairwoman now recognizes the gentleman from Virginia,
Mr. Rigell.
Mr. Rigell. Thank you, Madam Chairwoman.
Thank you all to our panel. I appreciate the work that you
are doing.
You know, that we have had no major domestic terrorist
attack since 9/11 certainly is a high degree of success, and we
recognize that. Now, also, though, at the same time that we
have approximately 4.5 million illegal immigrants here who came
here on a visa and then overstayed, that is unquestionably a
failure. I am going to in my short time here try to see how we
link performance with--and accountability with performance
here.
Mr. Ramotowski--I, too, have a difficult last name to
pronounce--what is the approximate number of countries who
citizens are eligible to apply for a visa to come to the United
States?
Mr. Ramotowski. Well, the citizens of all countries are
eligible to apply to travel to the United States.
Mr. Rigell. Okay. So any country?
Mr. Ramotowski. Yes.
Mr. Rigell. Now, among that range of countries then, surely
there is some disparity between those countries whose citizens
have a higher percentage of violating our visa conditions than
others, right?
Mr. Ramotowski. That is correct.
Mr. Rigell. Okay. Could you please identify for us then
those top five countries?
Mr. Ramotowski. I don't have statistics here, sir, on the
number of visa overstays by country. We would have to get back
to you on that.
Mr. Rigell. Okay. If you would, please. Not so much by
the--well, I would like it to be the actual number, but also as
a rate, a percentage. Because those countries who--it would
indicate to me that if we have the top five countries, I would
say, what is taking place at our offices there, our State
Department offices there, our embassies, to understand what is
taking place there?
Now, on that, as a follow up, with the actual personnel
side, actually approving a visa is by definition a judgment
call. We are trying to predict future human behavior,
inherently difficult. We have some mechanisms that help us with
that and the biometrics that we are working on, on all of those
things, but at the end of the day, it is a judgment call. It
would stand to reason, wouldn't it, that some folks are better
at that than others, wouldn't it?
Mr. Ramotowski. That is correct.
Mr. Rigell. Okay. What processes and procedures do we have
in place that would help us discriminate in the most positive
sense of the word those personnel who are really good at this
and others who clearly aren't very good at it?
Mr. Ramotowski. Well, again, Congressman, we have a layered
approach to the training of our personnel. As I mentioned in my
statement, they receive an intensive basic consular course when
they join the Foreign Service that includes training in
interview techniques, behavior detection and all of our
consular automated systems. Many of them also do consultations
with other law enforcement agencies before they go out to their
post. When they arrive in country--and I should also point out
that they are given training in the language and culture and
area studies of the regions to which they are sent. When they
arrive in country, senior consular personnel are charged with
overseeing their professional development and monitoring their
work.
Mr. Rigell. I appreciate that.
I really don't want to be rude by interrupting you. We have
such little time here, and this is a very important question
for me. Let's say, for example, that there are 500 visas
approved by a particular person and their failure rate is in
the 12 percent range, and generally, you would say, well, that
is pretty good compared to maybe the average for that country.
But there is another person over time who you see has a 42
percent failure rate, that is 42 percent of the visas he or she
approves actually end up overstaying. I am trying to--I am
trying to help our Government have this culture of
accountability. So you have described a lot of things there,
but I did not hear how we circle back around and try to track
performance, not to punish someone, but to help those--to
elevate those who are doing well, and maybe if we do have a
person who is not having a particularly good track record on
this, that we either help them become better or, frankly, we
remove them.
Mr. Ramotowski. Well, Congressman, as I was saying, we do
have a process for evaluating our personnel. It is a continuous
process. Individuals who do not perform to the Service's
expectations can be denied tenure and removed from Service.
Mr. Rigell. Thank you, sir. I just would circle back maybe
around on some written questions that I will submit to
understand better the metrics of that, if there are actual
metrics of violations.
Thank you, Madam Chairwoman.
Mrs. Miller. Thank the gentleman.
The Chairwoman will now recognize the gentleman from
Florida, Mr. Bilirakis.
Mr. Bilirakis. Thank you, Madam Chairwoman.
I appreciate you giving me the opportunity to participate
today.
According to the Homeland Security Department's numbers,
more than 7,300 foreign students have left school early for
various reasons but illegally remain in the United States. More
than 800,000 students in the United States participate in the
Student and Exchange Visitor Program. Most of them come here
for noble intentions. While not all would-be terrorists come to
the United States under the guise of a student visa, we have
seen examples where several have. I know everyone--well, we
have examples right here.
For this reason, I have long advocated for legislation of
the Student Visa Security Improvement Act, which I introduced
to ensure that student visas are issued to those genuinely
interested in obtaining an education. It seeks to ensure that
once allowed into the country on a student visa, students are
actually here to study and do not drop off the radar. So I have
a couple of questions here.
Secretary Ramotowski, to what extent does the State
Department coordinate with DHS to review and screen student
applications for security concerns?
Mr. Ramotowski. Congressman, student visa applicants are
screened through the same intensive process that all these
applicants are screened with, with some additional features.
They have their fingerprints taken and screened through our
biometric fingerprint systems. We also use facial recognition
technology to screen those applicants. We conduct an intensive
visa interview with consular officers in the local language or
in English. In addition to that, we utilize extensively the
Immigration and Customs Enforcement SEVIS system to ensure that
the student is attending a registered school and has in fact
completed the registration process at that school.
As I mentioned in my remarks, after the visa is issued,
there is a continuous vetting process of all issued visas, such
that if at any time derogatory information surfaces from any
source, law enforcement or intelligence, it can be promptly
analyzed and the visa can be reviewed for possible revocation.
So, yes, we work very closely with Homeland Security and our
other partner agencies on these cases.
Mr. Bilirakis. Well, why is it then that we have 7,300
students that are here--or former students that are here
illegally in the United States? How can we help you with that
issue?
Mr. Ramotowski. I think, Congressman, and I obviously can't
speak for them, but individuals overstay for a variety of
reasons. We are continually reviewing our processes at our
posts abroad to ensure that if there is a change in the
country, perhaps economic activity, an economic crisis or
something of that sort, that our officers are fully aware when
they make their visa adjudication decisions that there might be
other factors encroaching on an individual's decision whether
to comply with our immigration laws or not. We will never
knowingly issue anyone who is unqualified or has an intention
to overstay in the United States a visa.
Mr. Bilirakis. Are we searching for those individuals,
those 7,300, that are located here in the United States? Do we
have any idea where they are?
Mr. Ramotowski. I will defer to my Homeland Security
colleagues on that one.
Mr. Edge. If I may, Congressman, ICE is working very
closely with the Department of State in sharing our various
databases. Currently we have more than 10,364 institutions as a
part of the SEVP program, and we follow up with the various
institutions on a regular basis to determine if these students
are remaining in school. So those students that certainly are
out there as overstays, their names are being vetted through
the various systems that we highlighted earlier in our
testimony today, and they are being prioritized. We certainly
would be looking for the most egregious ones, those that pose a
threat to our National security.
Mr. Bilirakis. Thank you.
For the entire panel, to what extent are some fraudulent
educational institutions able to serve as visa mills and as a
back door into the country? What tools exist or are needed to
close this loophole, for the entire panel?
Mr. Stana. Well, I will start off. I think what my other
panelists said was probably what we all wish for. We all hope
that the information provided by the educational institutions
is accurate and there is no fraud. Our work has shown, however,
that that is just not the case. Sometimes information which ICE
depends on to do its casework is submitted late into SEVIS or
not at all. The students themselves don't update the
information that they have to update about their job status, so
it may appear that they are still in school.
There is fraud involved, Mr. Bilirakis. I think you
mentioned that is what you alluding to, at universities. There
was one in the paper I think, and I am not saying this was
fraudulent, but University of Northern Virginia, that was
alleged to be of the type that you are saying.
So I think that we have to take more steps than we have in
the past to make sure that this is as seamless as we would like
it to be. Right now it is not. There are too many inaccuracies
in the data, and there are too many cases of fraud in
connection with these schools, other people taking the
students' tests for them, people not checking photo IDs when
they should, and so on.
Mr. Ramotowski. I would just like to add, Congressman, that
that underlines the importance of the personal interview that
our officers conduct and our embassies and consulates. Because
although someone may submit a fraudulent test paper, a highly
trained consular officer can often note discrepancies in the
interview that would open a line of inquiry and lead to the
denial of that visa.
In our high-fraud posts, we also have fraud prevention
units and fraud prevention managers. They are dedicated to
ensuring the integrity of the visa system. They investigate
questionable cases and provide the results of those
investigations back to the visa officers. So we take this
concern very seriously, and we work closely, again, with
Homeland Security in maintaining the integrity of the process.
Mr. Bilirakis. Madam Chairwoman, I know my time has
expired. I have one additional question, but I will wait for
the second round.
Mrs. Miller. Okay. Thank the gentleman.
The Chairwoman now recognizes the gentleman from South
Carolina, Mr. Duncan.
Mr. Duncan. Thank you, Madam Chairwoman, and thank you for
the timeliness of this hearing.
It never ceases to amaze me that when we schedule a hearing
on a topic like this, that we see the administration react in a
positive manner, and then that is a good thing.
There was an article today in the AP, ``Broader Security
Checks to Reduce Visa Overstays.'' It may have been brought up
earlier, but it is a good thing that we are having an impact,
so thank you for that.
I want to address my question, I guess it could go to Mr.
Edge or Mr. Cohen or Mr. Stana, but visa overstay is definitely
a topic that concerns folks in my home State of South Carolina,
because we know that we have got to do a better job than what
we do in this country. When you see statistics, such as a
backlog of 1.6 million people have overstayed their visas in
the United States--and recently you all have vetted those
through multiple channels, which I will talk about in a minute,
there are still 839,000 people here that I think Mr. Cohen said
the Department vetted everyone for potential National security
and public safety concerns. But there are still 839,000 people
here that have overstayed their visa in violation of the
sovereignty of the United States of America, and I just have to
say, why? Why do we still have 839,000 people here who are here
illegally?
Mr. Cohen. Great question, Congressman, and you have made a
really important point.
The sad fact is that we do not know until we go through a
manual vetting process what number of that 839,000 actually are
either still in this country or have changed immigration
status. That is why the capabilities I described earlier are so
important, because in the past, because of resource issues and
the lack of technical capability, it required US-VISIT, ICE, to
manually do a series of manual database checks that was
incredibly time-consuming, so there were large numbers of
records that were never evaluated. Now, those people may have
left. They may have changed status; we just did not know that.
Mr. Duncan. Can you pause right there and explain to me as
a freshman Congressman what ``change in status'' is, what you
mean by that?
Mr. Cohen. Change of status means they came into the
country under a visa, they may have changed their immigration
status. They may have extended their visa. They may have
reapplied for a new visa. They may have applied for a new visa
with a slight variant in their name.
Mr. Duncan. Would not we know if they applied for a change
in status that they are no longer here as a student and they
have changed and you take them out of that category, wouldn't
that be automatic?
Mr. Cohen. In some cases, yes. In some cases, the way that
the systems had been designed in years past, that information
was not immediately apparent, and it would require an
individual, an investigator, or a researcher, to go into
multiple systems to determine that.
Mr. Duncan. So if Tom Davis comes into this country from
Ireland and he realizes he is here on a student visa, he
overstays his visa, he has gotten a job or he is now consulting
for a company, and he wants to change that status to here for
business reasons or whatever, and he comes to your office and
says, I want to change my immigration status, Tom Davis from
Ireland, here is my Social Security Number, here is my whatever
identifying factor that you have, you can't electronically with
all the abilities we have today take that Tom Davis out of that
category and put him in another, and he would not be listed in
the 839,000 people that we are talking about now? Is that that
difficult?
Mr. Cohen. The way systems were designed in the past, yes,
sir, and that is what we are fixing.
There is one example I can talk to you about the 839,000
records that we did vet, where we found an individual who came
based on a visa applied for by her husband. She then changed
status and got a visa on her own. She is a very good student at
a southern university. The system would not have automatically
picked that up and did not. That is what we will be fixing
through this new capability, this interlinking of systems that
I referred to earlier, Congressman.
Mr. Duncan. It is very obvious to me that we have got a
broken visa system for overstays based on these numbers when
you vetted over half of them through multiple channels and
said, okay, those guys have gone back to their country; we
still have 839,000, 2,000 of which warrant further
investigation because they are probably here for maybe God
knows what. But I believe that we have got to pursue in this
Nation, in my last seconds here, a biometric countercheck so
that we know when someone leaves this country that they have
left. If they haven't shown up and left the country within
their stated time, then we put them in a category that they are
here illegally and we start running down their last address and
we start taking care of securing our country.
The sovereignty of this Nation is very, very important to
me. It is no wonder we see instances like we recently saw with
a member of a certain family who has been here, overstayed a
visa for a very, very long time, so very timely. Thank you.
I yield back.
Mrs. Miller. I thank the gentleman for those comments.
I think the gentleman has demonstrated a frustration that
many of us feel that when you see an administration who has
just recently announced their policy that say they are not
going to deport illegal aliens, known illegal aliens, unless
they think they are a public safety threat.
So that is a very unfortunate backdoor amnesty, however you
want to characterize. It is an end-run around the legislative
process.
I am now speaking to other Members of Congress. I don't
expect any comment from any of our panelists. I am talking
about an administration-announced policy that I have vehemently
stated I have a lot of problems with. I think that is going to
add to our problem. It is going to incentivize others to get
here, stay here, and knowing that unless they really do
something criminal, even a DUI, which apparently is not enough
criminal activity to be a public safety threat to deport an
individual. That is a significant problem I believe to our
National security here and to the political will of the
American people who have demonstrated over and over again they
want to secure our borders and they want to get rid of a lot of
the illegal aliens who are here, whether they are overstays or
what have you.
I would just comment to Mr. Stana, because you have
mentioned here--one thing that you said that I felt was very
interesting, when you said the amount of the budget that we are
spending to protect, secure our borders and yet here we have 40
percent plus of all the illegals that are in the country are
overstays from their visa. You just mentioned specifically with
ICE that you are only spending 3 percent of your budget on
these overstays when they are 47 percent of some of the
problems that we have.
So I would just ask Mr. Stana, you mentioned about the
information Mr. Cohen gave today and you looking forward to
evaluating that. Will the GAO just go ahead and evaluate this?
Or are you looking for a letter from our subcommittee, or what
will trigger your analysis and recommendation?
Mr. Stana. What would trigger a study would be a letter
from the subcommittee or committee.
Mrs. Miller. You are going to have it very shortly then.
Mr. Stana. If both sides would do it, it would be
advantageous.
There are a number of questions that were raised. I think
this is definitely a step in the right direction, but there are
questions about timeliness and reliability when you are using
biographic versus biometric. The rest of the system has to be
resourced to be able to move people along the line to
deportation, if that is the goal. Of course, you mentioned the
immigration impact aside from the National security impact, and
when that part of the tail would be resourced as well. So there
are lots of questions. As I say, it is a step in the right
direction. It is something that I am sure you have been looking
for for awhile. I just would like to see how reliable the
system would be.
Mrs. Miller. Very good. That letter will be forthcoming.
I also want to mention again about the Christmas day
bomber. Obviously, I come from southeast Michigan. That
particular incident has sort of faded from the National radar
screen, but I will tell you, it has not faded in my media
market, because as we speak, the Christmas day bomber, who is
now his own attorney, he is his own attorney, and they are
going through jury selection. It makes me crazy every day I am
watching this guy going--after we Mirandized him, sent him to
the University of Michigan, the best burn center in the entire
Nation, and now he is going through this entire process, and
how much the city of Detroit actually is having to pay for
security, et cetera, for this guy going through our system when
he should be, in my opinion--again I am talking to other
Members of Congress; I am not looking for any comment from any
of you, this is an administrative-stated policy--this
individual in my estimation should be treated as an enemy
combatant. They are looking at the battlefield in asymmetrical
terms, and on that particular day, the battlefield was seat 19A
of that Northwest flight, and that was a battlefield in his
mind.
I think we hurt ourselves by not appropriately responding
to that. But I guess this is a question in regards to him,
because it is my understanding that running the name through
the NCIC database, et cetera, that his name as it was
introduced after his father came to the embassy in Nigeria, et
cetera, was misspelled. So how has that--I mean, will that
happen again? What steps have we taken to correct that?
Mr. Ramotowski. Madam Chairwoman, we have taken a number of
steps to ensure that that will never happen again. The database
that we use to store the records for issued visas has fuzzy
logic for name searches such that a future search, a current
search with a misspelling will still return all possible
records and close matches. In addition to that, our embassy in
Nigeria had forwarded a telegram, as was noted here, to
Washington indicating that the father had come in and had
concerns about his son's dealings with extremists in Yemen.
That was sent as a Visas Viper message. At that time, the
interagency watch listing guidance did not call for the
automatic watch listing of that sort of information. That has
been changed, and at this point, I have no doubt whatsoever
that Mr. Abdulmutallab would have been watch listed, would be
watch listed now. The State Department in turn has changed its
revocation policy. Upon receipt of a Visas Viper message of
that kind now, we automatically review the issued visa for
revocation and act upon it, unless a law enforcement or
intelligence agency has formally asked us not to take action.
So we have corrected many--all of the State Department
issues that were identified in the aftermath of the Christmas
day bomber, and most important of all is the continuous vetting
of issued visas. Like I mentioned in my remarks, at any time,
the watch listing system can be updated with new derogatory
information from whatever source, and that will be vetted
against the databases of issued visas, so if there is any match
to a possible visa holder, we will review that and revoke it.
Mrs. Miller. Thank you very much. I appreciate that
information, and am very comforted to hear of those corrections
being made. My final question I would ask of Mr. ICE--excuse
me, Mr. Edge from ICE. You mentioned about the visa security
units being in 19 countries, et cetera, and I know you talked a
little bit about how that is happening in some of the high-risk
embassies and the consulates, et cetera.
I thought it was interesting listening to Mr. Ramotowski
talk about the Department of State and how you handle your
agents in regards to language skills and various kinds of
things. I am just wondering how you do with having your agents
with language skills in these various areas. Also because,
again, we are talking about budgetary considerations, I am not
sure, but I would guess that it is very, very expensive to set
up, to stand up such a unit in any of the consulates or
embassies, and is there any way of replicating, maybe not 100
percent, but doing--I am not sure how many others you would
like to have in a perfect world, what your optimal number
actually is, is there any way of replicating that State-side to
assist you from a budgetary standpoint, but really helping us
prioritize again from a National security perspective?
Mr. Edge. Well, certainly, the agency could always do more
with more, but the Congress has been very, very helpful to us
in setting up the current visa security programs in the various
countries that we have them in.
Also hearing my counterparts' statements a little while ago
from the consular perspective of the interviews that take
place. During those interviews and the high-risk posts around
the world, we would certainly have an ICE agent, special agent
who is highly trained in investigations and interview
techniques to sit with our Department of State counterpart. It
would be a joint effort to determine whether or not
admissibility should be granted and a visa should be issued.
As far as the expansion of the program, it costs about $2.2
million to open up an office and $2.2 million to continue the
full operation of such a post. So we are doing the best we can,
and we would welcome the continued support of the Congress in
meeting the requirements of our mission. But our attempt to
push the borders out and do a lot of this work overseas, as
well as a lot of the vetting that we spoke about earlier on the
domestic side, will certainly bolster our borders in countless
ways.
Mrs. Miller. Thank you.
Perhaps GAO could take a look at how that might happen
State-side as well to do some of those kinds of things, not to
tell you your business.
Mr. Stana. Actually, we have. We have looked at some of the
efforts they have to not only do their work overseas but try
domestically to do some of the screening via computer matches.
There was one item, which I think was dropped from the budget
before it went to OMB, I think it was a $17 million line item,
which would have enabled a match--matching law enforcement
databases to visa applications, which would have done the
initial screening worldwide, $17 million. Given the numbers he
was talking about, it seems like it might be a bargain. We
haven't looked at it to see if it was a bargain, but the
numbers were right.
Mrs. Miller. Very good. I appreciate you outlining that. I
am sure my staff has taken a note of that. We are going to look
at that as we proceed through our budgetary process here in the
future.
At this time, the Chairwoman would now recognize Mr.
Cuellar, our Ranking Member, for his questions.
Mr. Cuellar. Thank you.
Before I ask my question, just to be fair to this current
administration, everything depends on resources. I think what
President Bush saw, what President Clinton and Bush No. 1 also
saw the same thing; you can do as much as what Members of
Congress give you, isn't that correct?
Mr. Edge. That is correct, Congressman.
Mr. Cuellar. Isn't it true also that the current
administration has deported more criminal aliens than any other
administration?
Mr. Edge. That is correct, sir.
Mr. Cuellar. By a lot larger number, is that correct?
Mr. Edge. That is correct.
Mr. Cuellar. All right. Thank you.
Let me go back to the original question I had, but before I
ask you this thing about the flight training school in south
Texas. Mr. Stana, I appreciate everything GAO. I am a big fan
of what you all do. In your testimony, Mr. Stana, you stated
that the 2010 airlines complied with the requirements that
verify ESTA approval for almost 98 percent of the Visa Waiver
Program's passengers prior to boarding. However, the remaining
2 percent, about 364,000 travelers travel without this Visa
Waiver Program--without ESTA approval. Tell me what happened
here in your opinion.
Mr. Stana. What seems to have happened in those cases--
first off, the statistic went up to 99 percent. I think when we
looked at that program, the 98 percent figure was from slightly
prior, so it is getting better all the time.
In that case, I think it was a computer glitch where the
computer was down, they couldn't get the ESTA verifications in
on time. I have no idea how many of these ESTA inquiries result
in a ``do not board'' or a stop for people. I don't think that
data is tracked. I might be mistaken, but I don't think that
data is tracked. But what we did see is that there were about
650 out of the number you cited that caused enough concern
that, upon reflection, they said that they shouldn't have been
allowed to board. But the computer was down; they couldn't get
the assurances before the person boarded the plane.
Also, I should note that there is a timing issue here. You
could submit the ESTA paperwork up to 2 years before a flight,
and something could happen to you within those 2 years, you get
a drunk driving conviction or something, which would result in
an inability to board. All this really means is you have got to
go to the consulate to get a visa manually as if this were not
a visa waiver country.
Mr. Cuellar. Gentlemen, for the other questions dealing
with the south Texas----
Mr. Winkowski. If I could just add just a little clarity
there. When we started up with the ESTA system, we relied on
the carriers to program this system so they could get a ``no
board'' message. That took a little while, No. 1. No. 2, all
ESTA applications are vetted on a continuing basis, like the
visa. So if you have an individual that has applied for an
ESTA, the ESTA is good for 2 years, and something happens in
between that time that individual then is denied the ESTA and
is notified to go to the embassy for a visa.
Mr. Cuellar. Thank you.
Talk to me about south Texas. How do foreigners coming to
the United States go to a flying school, training school on a
tourist visa instead of a visa, and then how do we get agencies
who start pointing the finger to each other and we can't seem
to coordinate? Apparently, there were no terrorist ties to
these students, at least from what I have been told, but it is
just a little concerning that some other country can come in
and do--you know, somebody from another country could come in
and do the same thing and get some flight training. Whoever
wants to handle this.
Mr. Edge. In this particular instance, Ranking Member
Cuellar, certainly the SEVP program didn't provide us with the
information because the flight school was not registered with
the program. You know, Praat was not a certified school at the
time in September. What we have to do a better job of certainly
is to communicate with our fellow Federal agencies, in this
case the FAA, when they recognize that there are in fact people
who are here on visitors' visas, a B-1 or B-2, who are enrolled
in flight school when that should certainly be a F visa, N visa
or a J visa, which would be more appropriate for that type of
training.
If that were the case, we certainly would have had a little
more vetting, and we would have been able to take a closer look
at things. What we are doing now is taking a look at the flight
school itself and conducting an investigation, the particulars
of which I would be more than happy to offer you a briefing on
outside of the scope of this hearing to give you a complete in-
depth update, but there is certainly work to be done.
Mr. Cuellar. Thank you.
I appreciate it. I appreciate a briefing at a later time on
that. I would ask you to do that.
Gentlemen, my time is up. I want to thank all of you. I
know that from the GAO, and I hope they listen to your good
recommendations, and hopefully that you will take that in a
constructive way what the GAO has given you. To all of you I
really appreciate what you all do to keep our country safe.
Thank you.
Thank you, Madam Chairwoman.
Mrs. Miller. Thank the gentleman.
The Chairwoman now recognizes the gentleman from Florida.
Mr. Bilirakis. Thank you, Madam Chairwoman. I appreciate it
very much.
For the panel or whoever would like to respond, what
percentage of visa applicants are interviewed personally?
Mr. Ramotowski. Congressman, I will have to take that
question back. It varies by country, and there is no set
percentage that we apply. Most first-time applicants in most
countries are interviewed. Renewal applicants under certain
circumstances can qualify for a waiver of that interview if
they are renewing their visa in the same category within 12
months of the prior visa's expiration. So it would vary by
country and by post.
Mr. Bilirakis. If you could get that information to me, I
would really appreciate it very much.
Mr. Ramotowski. Yes, sir.
Mr. Bilirakis. Okay. With regard to the question that the
Chairwoman asked with regard to the visa security units, I
understand there are about 50 high-risk units identified by
DHS, and it is ICE and the Department of State, and there are
19 in place. Can you please provide this committee with a
progress report regarding the updated MOU between DHS and
State?
Mr. Edge. Certainly, sir, we would be able to provide that
in writing at your request. We do have 57 high-risk issuing
posts, and 19 are fully operational at this point in time.
Mr. Bilirakis. Okay. If you could get that to me, I would
really appreciate it. Thank you.
I yield back, Madam Chairwoman.
Mrs. Miller. Thank the gentleman.
The Chairwoman now recognizes the gentleman from South
Carolina.
Mr. Duncan. Thank you, Madam Chairwoman.
First off, let me say, I am Scotch-Irish, and I used
Ireland earlier in an example only. I don't want the folks in
Ireland to say I was targeting their country. That happened one
time when I mentioned the Northern border, and the Canadian
press wrote something that I was talking of--it gets
misconstrued. So no ire intended to Ireland at all.
Gentlemen, let me say first also that my ire is not
directed at you or the agencies, but rather, I reflect the very
passionate frustration of many, many Americans when it comes to
immigration issues. It is in particular something that should
be easier for us. From the folks in South Carolina looking at
what Government does, they say this issue, visa-related
immigration, should be easy because we are allowing guests to
come into our country. We are giving them access through the
visa process. It is not like they are just walking across our
Southern border coming here, and that is a whole other issue of
immigration, but we are issuing a visa. So it should be easier
to make sure they don't overstay because we are giving them the
ability to come here. I know I am simplifying matters in a lot
of ways.
Mr. Winkowski, you have been sitting down there very
patiently. I don't have a question for you, but I want to say
thank you to you also. I met Chief Fisher a number of times,
and I appreciate what you guys do.
My staff would like me to ask you a question, but I am
really interested in the fact that if we have got Visa Security
Program, if it is designated to be risk-based and the program
is supposed to be active in the riskiest of countries, why are
11 of the top 20 high-risk posts not included? At high-risk
posts where there are no visa security agents, what is the
consular process for ensuring terror threats do not receive a
visa?
I guess I will direct that to Mr. Edge.
Mr. Edge. Well, the process to determine what posts are
high-risk certainly is determined by the funding that is
available. We also work very closely with the Department of
State to determine at what posts would warrant based on the
visa applications and other metrics, what posts would warrant a
visa security unit overseas.
Mr. Ramotowski. Let me follow up, Congressman, if I could,
from the State Department's perspective. We screen all our
applicants as if they are high-risk in the sense that you can't
guarantee where the next threat will come from. So all of our
posts and all of our officers are trained to use our systems,
to conduct intensive interviews and to be prepared to refuse
visas to individuals who seek to do us harm, regardless of
where in the world they actually apply for a visa. In this era
of globalization, you can't predict where the next case will
come from.
Mr. Duncan. Mr. Stana, what checks are not done with that
regard?
Mr. Stana. You mean if the VSU is not at a post?
Mr. Duncan. Yes, sir.
Mr. Stana. It is just like Mr. Ramotowski said, they do a
certain amount of vetting. The added security from the ICE
person being there comes from their ability to use their law
enforcement experience to maybe query another data set that
isn't normally queried or ask the kinds of questions that a law
enforcement background should give you.
But I would like to make one other point, Mr. Duncan. I
think your point is a good one with the 11 of 20 high-risk
posts not being staffed by VSUs. On the other end, there is a
large number of the bottom 25 percent posts that are staffed
with VSUs. I mean, there might be a rational reason why they
would be there, but it would be good to reexamine that in the
light that maybe some of those folks in the bottom 25 percent
risk category, at least some of them, might be better served
being in the top-risk posts.
Mr. Duncan. I know overseas service is very expensive, and
so we have got CBP folks at overseas locations and consular
affairs. Is there a way or are you looking at maybe bringing
some of those people home that are stationed there and working
more closely with U.S.-based? It is a flat world. We have got
X-rays being looked at, they are taken here, looked at
overnight in another country; it is a 24-hour cycle. So are we
considering some of that to make it more cost-efficient? I will
ask Mr. Winkowski that.
Mr. Winkowski. Congressman, that is a very good question.
What we have done in Customs and Border Protection is we have
taken a hard look at our immigration advisory program that we
have in eight countries of about 40 officers. We continue to
evaluate the need to have officers in certain locations as well
as the need to have them in different locations. So, for
example, in Korea, we had made the decision that we did not
need to have individuals at the airport in Korea, rather we
could handle virtually, your point of the world being flat,
that we could handle it out of our regional carrier liaison
group out of Honolulu. So what happens is as that advanced
information and that pre-departure information is sent through
the system, that particular unit looks at that, identifies
individuals that we believe are high-risk, perhaps has a visa
that has been revoked, perhaps is a TSDB, perhaps has some type
of admissibility issue, and we coordinate with the host
government and the airlines to prevent that person from going
on the aircraft.
Conversely, there are other locations, for example
Heathrow, very active, a lot of feeder flights in from areas of
strategic importance, and we see a need to have those people
there. So we are continuing to evaluate on a regular occurring
basis, because as you point out, it is very, very expensive.
Mr. Duncan. So you have got a good relationship with the
host countries is what you are saying?
Mr. Winkowski. Yes, we do. We have a very, very good
relationship.
Mr. Duncan. Madam Chairwoman, is there a way we can get the
GAO to make sure, or request and to make sure that the
ultimate--the most technology is being used to keep the costs
down, but at the end of the day, we don't want any undie bomber
to get on a plane and come to this country and create harm. So
I appreciate what they do, but I also want to make sure we are
getting the most bang for the buck for the taxpayer.
Mrs. Miller. Absolutely. We will talk to the GAO about that
and perhaps incorporate some of those requests in this letter
that we will be drafting very shortly.
I thank the gentleman.
I thank certainly all of the panelists. I think this has
been an excellent hearing. As we started at the outset talking
about here we are on the 10th anniversary of the horrific,
horrific attacks of our Nation on 9/11 and whether or not
terrorists continue to exploit our visa system. It is clear
from the testimony that we have had today that we have come a
very long way, and I think we are making enormous progress and,
again, as Mr. Cohen has outlined today a huge step forward.
But you know the largest room is always a room for
improvement, and we have to continue to do that. Again, it is
Congress' responsibility to provide the oversight to the
various agencies, and it is our responsibility as well to
budget the dollars and to make sure that the agencies
understand our priorities and that we all work together
cooperatively. I think we need to obviously continue to
highlight some of our progress, but also not be afraid to take
a very candid focus on what we need to do as a Nation to
continue to secure our borders, to, as I mentioned at the
outset, under our Constitution, our Constitutional
responsibilities to secure our borders and to keep our citizens
safe.
So I would also mention to the Members that if they have
any additional questions, the hearing record will be held open
for 10 days, and they can submit those questions for the
record. Again, we thank all of our witnesses for coming today.
The committee is adjourned.
[Whereupon, at 12:00 p.m., the subcommittee was adjourned.]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|