[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]
UNITED STATES SECRET SERVICE: EXAMINING PROTECTIVE AND INVESTIGATIVE
MISSIONS AND CHALLENGES IN 2012
=======================================================================
HEARING
before the
SUBCOMMITTEE ON COUNTERTERRORISM
AND INTELLIGENCE
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED TWELFTH CONGRESS
FIRST SESSION
__________
SEPTEMBER 14, 2011
__________
Serial No. 112-44
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
_____
U.S. GOVERNMENT PRINTING OFFICE
73-355 PDF WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
__________
COMMITTEE ON HOMELAND SECURITY
Peter T. King, New York, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Daniel E. Lungren, California Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Michael T. McCaul, Texas Henry Cuellar, Texas
Gus M. Bilirakis, Florida Yvette D. Clarke, New York
Paul C. Broun, Georgia Laura Richardson, California
Candice S. Miller, Michigan Danny K. Davis, Illinois
Tim Walberg, Michigan Brian Higgins, New York
Chip Cravaack, Minnesota Jackie Speier, California
Joe Walsh, Illinois Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania Hansen Clarke, Michigan
Ben Quayle, Arizona William R. Keating, Massachusetts
Scott Rigell, Virginia Kathleen C. Hochul, New York
Billy Long, Missouri Janice Hahn, California
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Mo Brooks, Alabama
Michael J. Russell, Staff Director/Chief Counsel
Kerry Ann Watkins, Senior Policy Director
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE
Patrick Meehan, Pennsylvania, Chairman
Paul C. Broun, Georgia, Vice Chair Jackie Speier, California
Chip Cravaack, Minnesota Loretta Sanchez, California
Joe Walsh, Illinois Brian Higgins, New York
Ben Quayle, Arizona Kathleen C. Hochul, New York
Scott Rigell, Virginia Janice Hahn, California
Billy Long, Missouri Bennie G. Thompson, Mississippi
Jeff Duncan, South Carolina (Ex Officio)
Peter T. King, New York (Ex
Officio)
Kevin Gundersen, Staff Director
Alan Carroll, Subcommittee Clerk
Stephen Vina, Minority Subcommittee Director
C O N T E N T S
----------
Page
Statements
The Honorable Patrick Meehan, a Representative in Congress From
the State of Pennsylvania, and Chairman, Subcommittee on
Counterterrorism and Intelligence.............................. 1
The Honorable Jackie Speier, a Representative in Congress From
the State of California, and Ranking Member, Subcommittee on
Counterterrorism and Intelligence.............................. 4
Witnesses
Mr. Mark Sullivan, Director, United States Secret Service, United
States Department of Homeland Security:
Oral Statement................................................. 6
Prepared Statement............................................. 8
For the Record
The Honorable Patrick Meehan, a Representative in Congress From
the State of Pennsylvania, and Chairman, Subcommittee on
Counterterrorism and Intelligence:
Letter From the Federal Law Enforcement Officers Association... 3
UNITED STATES SECRET SERVICE: EXAMINING PROTECTIVE AND INVESTIGATIVE
MISSIONS AND CHALLENGES IN 2012
----------
Wednesday, September 14, 2011
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Counterterrorism and Intelligence,
Washington, DC.
The subcommittee met, pursuant to call, at 2:14 p.m., in
Room 210, Cannon House Office Building, Hon. Patrick Meehan
[Chairman of the subcommittee] presiding.
Present: Representatives Meehan, Cravaack, Quayle, Speier,
and Hahn.
Mr. Meehan. The Committee on Homeland Security Subcommittee
on Counterterrorism and Intelligence will come to order. The
subcommittee today is meeting to hear the testimony of Director
Mark Sullivan of the United States Secret Service regarding the
missions and challenges that we will face in 2012.
I want to note for the record we anticipate briefly being
called to votes and very much appreciate your presence today,
and we will be looking for a way to try to accommodate both of
these in a way that will fit the flow. Hopefully what we may be
able to do is to have an opening statement from myself and the
Ranking Member, and with respect to time, it may make more
sense to come back, allow you to have your testimony, and then
we can go into questions.
Before we begin today's hearing, I would like to thank the
Budget Committee Chairman Paul Ryan and his staff for allowing
us to use his hearing room. There was an overflow today due to
a conflict with another subcommittee markup. I invited Chairman
Ryan to today's hearing, but he made it clear when he decided
not to run for President, that he prefers to keep his distance
from the Secret Service.
Today's hearing is an examination of the duties,
responsibilities, and performance of the United States Secret
Service, and we will hear the challenges that we will face in
the coming year, particularly the protection challenges in the
upcoming 2012 Presidential election cycle, in light of all of
the issues that we see on a global scale. The hearing follows
our past examination of the Department of Homeland Security's
intelligence enterprises. It will help us continue in our
efforts to ensure effective Congressional oversight of
counterterrorism and intelligence-related functions of the
Department of Homeland Security.
The Secret Service is a highly-regarded institution best
known for protecting the President of the United States.
However, what is often overlooked is that its work goes far
beyond protecting the President. In addition to its protective
mission, the Secret Service ensures the integrity of the United
States currency, which is vital in a functioning country in the
world economy. Accordingly, the mission includes everything
from running beside the President's caravan to running
counterfeit money stings in Colombia and penetrating the
networks of Russian hackers. It is a global and multifaceted
law enforcement organization.
Yesterday a number of directors, Petraeus, Muller, Clapper,
Olson, Napolitano, all testified before Congress about the
evolving terrorist threat posed by lone wolf terrorists and
radicalized extremists. I think this is an issue that we have
to be anticipating in 2012.
I would like to point out that the Secret Service also
deals with terrorist threats against the President and
protectees regularly and have long experience and have
expertise with the concept of lone wolves, the two of them
enormous challenges that relate to this terrorist threat.
The 2012 Presidential election cycle is fast approaching.
Some may say it is already here. For the Service this includes
candidate protection and the security at both Democratic and
Republican Conventions. So I look forward to hearing from
Director Sullivan how the Service is adjusting with your
tightened budget environment to meet this critical mission,
particularly in light of the threat environments and the many
demonstrations that can be anticipated in events like that.
In addition to protection, the Service's investigative
responsibilities have expanded to include financial crimes like
identity theft, counterfeiting, and computer fraud and
computer-based attacks on the Nation's financial, banking, and
telecommunications infrastructure. Ten years ago, in the wake
of 9/11, the Secret Service took on an expanded mission with
the investigation of cybercrimes, recently opened an office in
Estonia to combat Russian cybercrime. The PATRIOT Act calls for
the establishment of a Nation-wide electronic crimes task force
in order to bring together multiple components to help
investigate, detect, and mitigate or prevent attacks on the
Nation's financial and critical infrastructure.
As a former United States attorney, I appreciate the
remarkably expanding role and work closely with the Secret
Service in all of these capacities, but particularly as the
emerging roles of the Electronic Crimes Task Force in fighting
cybercrime.
As part of the mission, the Secret Service plays the lead
role in planning, coordination, and implementation of security
operations at special events of National significance. The next
Secret Service will be leading security efforts at the Asia-
Pacific Economic Cooperation summit in Hawaii, the Presidential
State of the Union Address, and significantly, to me, both the
NATO and the Group 20, G-20, meetings which will be held in
Chicago, and I think during the time when you will already be
doing substantial Presidential protection.
In addition, next week the Secret Service will be heavily
involved in protecting the heads of state at the annual United
Nations General Assembly in New York City again during a period
of time when we may be looking at a relatively significant
international event if, in fact, there is a movement forward by
the Palestinian organizations to seek international
recognition.
The success of the Secret Service depends upon the constant
and unrelenting support of the entire intelligence community
paired with positive relationships with State and local
agencies. I believe it is a model for the entire Department in
developing relationships with State and local agencies and
leveraging the rest of the intelligence community. I am going
to ask I have unanimous consent for a letter from the Federal
Law Enforcement Officers Association that I would like to
insert into the record in support of that effort. So without
objection, so ordered.
[The information follows:]
August 2, 2011.
The Honorable Patrick Meehan,
Chairman, Subcommittee on Counterterrorism and Intelligence, Committee
on Homeland Security, U.S. House of Representatives,
Washington, DC 20515.
Dear Mr. Chairman: I am writing on behalf of the membership of the
Federal Law Enforcement Officers Association (FLEOA), to express our
views with respect to the subcommittee hearing entitled ``Secret
Service Missions and Outlook.'' We respectfully request that this
letter be made part of the record for this hearing.
The Federal Law Enforcement Officers Association (FLEOA) is the
largest non-partisan, non-profit law enforcement association
representing 26,000 Federal law enforcement officers from 65 agencies.
FLEOA is considered the ``voice'' of Federal law enforcement and has
advocated for measures including the Law Enforcement Officers Safety
Act (LEOSA), the Federal Law Enforcement Badge of Bravery, and the
James Zadroga 9/11 Health and Compensation Act. FLEOA has and continues
to work with Members of Congress towards the goal of ensuring that
Federal law enforcement officers and their agencies are supported,
funded, and appropriately supported in their missions.
The U.S. Secret Service is one of the premier law enforcement
agencies in the world. FLEOA represents Secret Service Special Agents
and has established a strong relationship with Director Sullivan, who
has persevered in his tenure as Director through some difficult
challenges faced by his agency. The Secret Service's protective mission
is paramount to National security and its investigative mission is a
lynchpin in securing our Nation's financial system.
From its inception, the Secret Service was given broad
investigative then protective authority as it was one of the first
Federal investigative law enforcement agency in our Nation's history.
Recently, the agency has faced funding and staffing concerns as a
result of the broad budget issues the Federal Government faces. In
2012, the next Presidential Campaign will occur and FLEOA feels it is
imperative that the Congress support and fulfill the needs outlined by
the Secret Service.
Increases in Funding
Over time, Secret Service jurisdiction has expanded and the agency
has broadened both its investigative and protective missions. Often
these increases occur at the behest of either the current
administration or Congress. Without regard to their situation, the
Secret Service and its Special Agents answer the call and effectively
carry out any assigned mission.
Unfortunately though, these enhanced authorities have not been
commensurate with the level of funding and support it has received. The
agency has often found itself doing without or having to come back to
the Congress and appeal for more. For an agency with such a stellar and
distinct reputation and mission, the budgeting process has not mirrored
it or its agents' extensive mission or needs. FLEOA recommends that the
Congress raise the level of Secret Service funding to allow the agency
to maintain its stature in the law enforcement world including in
research and development so the Secret Service can stay with advances
in ballistics, armor, explosives, and other protective technologies.
Campaign Year Pay Cap Waiver
Agent staffing is a critical component of every Presidential
Campaign. For the Secret Service, a Presidential Campaign equals a full
deployment of its personnel and resources. Agents of the Secret Service
perform a valiant service every 4 years for the people of the United
States. Staffing and managing the Presidential Campaign and ensuring
the smooth transition of the Executive branch, is not a light
assignment. Secret Service Agents and its support staff work extensive
hours, travel to multiple destinations and encumber an enormous
responsibility. The Federal Government's pay cap often blocks
remuneration to the agency's most senior Special Agents who hold the
command positions during a campaign. This has a negative effect on
morale and retention. This full deployment of Secret Service personnel
and assets occurs within the tight parameters of a security matrix that
works and is effective. The campaign's logistical challenges are
exacerbated by hiring freezes and attrition--so often the agents endure
fatigue while bearing the challenge of last-minute schedule changes,
added-on campaign stops, or stadium rally site added the night before.
FLEOA has and continues to recommend a waiver to the Federal pay
cap for the campaign year. As is done with Department of Defense
civilian personnel in CENTCOM or AFRICOM, this would assist with
recruitment and retention and acknowledge the hard work and sacrifice
they make on behalf of the American people during that intensive year.
FLEOA supports the Secret Service with its missions and hopes the
Congress will look to support the agency commensurate with the level of
dedication and sacrifice its agents perform everyday for the American
people.
Sincerely,
Jon Adler,
National president.
Mr. Meehan. Before I begin, I would like to note as well
this past weekend was the anniversary, as we all know, many of
us attended numerous events, of the tragic events of 9/11,
including the attacks on the World Trade Center where the New
York field office of the Secret Service was located. Sadly, the
Service lost the life of Special Master Officer Craig Miller,
who was actually one of those heroes who ran into the building
helping to save others. So we honor his memory today and the
other Secret Service employees who were among the first
responders of 9/11.
So, with that, I am honored to welcome Mark Sullivan, the
Director of the Secret Service, here today to testify. You are
a busy man. I want to thank you for taking the time to be with
us to--in preparation for our discussions about the great
challenges you face and with your agency in anticipation of
2012.
Now I would like to recognize the Ranking Minority Member
of the subcommittee, the gentlewoman from California, Ms.
Speier for her statements.
Ms. Speier. Mr. Chairman, thank you for holding this
hearing today. I apologize for my tardy arrival to you, to Mr.
Sullivan, and to all the members of the public.
Let me say at the outset, Director Sullivan, we thank you
for participating in this hearing today and for enlightening
not just us, but the public in general about the important work
of the Secret Service and to review some of the challenges that
you have had in the past.
This is a critical time for the Secret Service as the
campaign season for 2012, for the Presidency, begins to heat
up. In the last Presidential election, then-candidate Barack
Obama reportedly received a record number of threats requiring
him to get Secret Service protection earlier in the campaign
cycle than any candidate in the history of this country.
We now face a diverse array of threats from terrorist
groups, lone wolves, deranged individuals, and others we may
not even know about. We learned that dramatically last January
when our dear friend and colleague Gabrielle Giffords was shot
and six people killed in Tucson, Arizona.
In what is sure to be an eventful election year, does the
Secret Service have all the resources and support it needs to
protect the candidates in this constrained budget environment?
A question for you, Director Sullivan.
Although the Secret Service has done an excellent job in
keeping our candidates safe in past elections, it has had
trouble managing its budget. The DHS inspector general recently
released a report finding that the Secret Service violated the
Antideficiency Act when the CFO failed to notify DHS and the
Congress that the Service had overspent its appropriated funds
during the hectic 2008 campaign. In the run-up to the 2012
campaign, I am interested to hear about what changes have been
made and controls put in place to prevent this from happening
again.
The Secret Service's mandate goes beyond just protecting
the President and candidates. They also have the responsibility
for protecting other Government officials, foreign dignitaries,
and the security for designated NSSEs. As the Chairman has
noted, providing protection for the U.N. Assembly, which has
just begun its work and sits in the heart of Manhattan, also
falls to the Secret Service. We are reminded by events over the
past week with the sobering news of a credible threat
surrounding the 9/11 10th anniversary that these events of
special significance also face threats from actors and actions
of terror.
In addition, there are many events over the next year that
the Secret Service must prepare for, including the APEC summit,
the G-20 summit, and the Democratic and Republican National
Conventions. It is critical that all of the Secret Service's
protective activities are conducted with the appropriate
planning, resources, and oversight.
The Secret Service has a vital mission, but it has faced
significant criticism in the past. The Secret Service has come
under fire from many, including the Ranking Member of the full
committee, who points out that the Service's poor history of
promoting a diverse workforce and for several discriminatory
practices it has been accused of in the past several years. Of
course, the last time Director Sullivan testified before the
committee, before my time on the panel, it was to answer to the
much-publicized White House security breaches. I am looking
forward to finding out if these issues have been addressed once
and for all.
I am also eager to learn more about the Secret Service's
other important mission, to investigate crimes against our
financial institutions and maintain the security of our
economy. At first this meant the Secret Service had to protect
our currency from counterfeiters, but the way we conduct
business, from personal payments to transactions between large
institutions, has drastically changed in the internet era, and
our economic security is threatened by a diverse array of
criminal activity, from counterfeiting to credit card fraud to
hacking.
So let me underscore this last question. Does the Secret
Service have the expertise and the resources it needs to keep
up with the times and be effective as a crime fighter in this
dynamic environment?
The Secret Service is absolutely vital to our Nation's
security and prosperity, and I commend the men and women of the
Secret Service for carrying out their work with diligence on 9/
11 and every day of the year.
Once again, I want to welcome you, Director Sullivan, and I
look forward to working with the Secret Service to ensure they
have all the necessary resources required to carry on this very
important dual mission. I yield back.
Mr. Meehan. Well, I want to thank the Ranking Member for
her opening comment.
I am going to make a judgment. At 2:27--by the record, they
expected to call us for votes between 2:20 and 2:30. Now,
Director, how long do you think your opening statement will be?
Mr. Sullivan. It is about 4 minutes.
Mr. Meehan. I think, my math, we should try to get this in,
and then we will also--please, when you hear the bells go, you
know that is when the moment for us to begin. But we will have
a minute or 2.
Why don't you take your time, do your opening statement,
and then at the conclusion of your opening statement, we will
recess, because I am confident we will be called to vote
thereafter, and then we will return and begin the opportunity
to ask you a few questions.
Before I begin, let me just tell, the rest of the committee
is reminded that opening statements may be submitted for the
record.
So we are pleased to have a distinguished witness before us
today on this important topic.
Director Mark Sullivan was sworn in as the 22nd Director of
the United States Secret Service on May 31, 2006. Director
Sullivan has led a distinguished career at the Secret Service.
He began his career as a special agent assigned to the Detroit
field office in 1983. He has held many positions within the
United States Secret Service, including Deputy Special Agent in
Charge of the Counterfeit Division; Special Agent in Charge of
Vice Presidential Protective Division; and also in charge of
human resources and training; the Assistant Director for the
Office of Protective Operations; and finally, Deputy Director
of the Secret Service.
During his work with the Office of Protective Operations,
Director Sullivan managed all protective activities for the
agency encompassing 12 divisions and 2,300 employees. He has
been the recipient of numerous awards for superior performance
throughout his 25-year tenure and 30-year career in law
enforcement. Most recently he was awarded a Distinguished
Presidential Rank Award.
Director Sullivan, your entire written statement will
appear in the record. We look forward to your comments.
STATEMENT OF MARK SULLIVAN, DIRECTOR, UNITED STATES SECRET
SERVICE, UNITED STATES DEPARTMENT OF HOMELAND SECURITY
Mr. Sullivan. Good afternoon, and thank you, Chairman
Meehan, Ranking Member Speier, and distinguished Members of the
committee. I am pleased to appear before you today to discuss
the investigative and protective mission and challenges of
2012.
I would like to thank all the Members for the work you have
done over the years to ensure that we, our front-line
employees, have the resources that we need to be effective in
today's threat environment. This has been especially critical
given the challenges we have been confronted with in recent
years. Emerging threats, a historic campaign, increases in the
number of designated National special security events, and the
proliferation of cybercrimes directed at our banking and
financial payment systems has required our front-line employees
to remain vigilant and adaptable at all times.
Despite these challenges, the men and women of the U.S.
Secret Service continue to perform their duties in an
outstanding manner. In fiscal year 2010, protective details and
field agents ensured the safe arrival and departure for more
than 5,900 domestic travel stops and 515 international travel
stops.
Foreign dignitary protection reached a record of just over
2,500 travel stops, including visits by 236 heads of state and
government. Dignitary protection also included security
operations for the nuclear security summit and the 65th
anniversary of the United Nations General Assembly, where we
staffed protective details for 125 foreign heads of state and
government and 51 spouses.
In the area of criminal investigations, our long-standing
priority of investigating financial crimes prevented roughly
$13.5 billion in potential loss. Building on that success, the
number of financial crime cases we closed in fiscal year 2010
increased just over 7 percent from fiscal year 2009 levels, a
reflection of our ability to adapt to emerging trends in
financial crimes.
We expect fiscal year 2012 to be the most demanding year
our agency has faced since the 2008 Presidential campaign. The
biggest demand on our time and resources and our people will be
the 2012 Presidential campaign, which includes candidate/
nominee protection and the planning, coordination, and
implementation of security operations for six planned NSSEs.
In preparation for the 2012 Presidential campaign, we began
training candidate protective details in May 2011. These
details recently completed their training and will be
ultimately assigned to provide protection for Presidential
candidates. The details are comprised of special agents from
our domestic offices who operate on 21-day rotational
assignments. Upon completing their rotating assignment, each
special agent returns to their respective field office to
continue their criminal investigations or participate in
protection assignments in and outside of their district. These
rotational duties continue through the end of the campaign or
until the candidate they are assigned to protect withdraws from
the campaign.
We are also coordinating with other Federal law enforcement
agencies that may assist us during the upcoming campaign. As
they did during the 2008 campaign, we anticipate that the
Transportation Security Administration officers will, from time
to time, assist our Uniformed Division officers with the
security screening at various protective venues.
Protective advance team training at numerous field offices
throughout the country has also been completed. This refresher
training is provided to special agents who will conduct the
protective security advances for our campaign visits throughout
the country.
Both the Democratic National Convention in Charlotte and
the Republican National Convention in Tampa have also been
designated as NSSEs. Under the NSSE designation, the
operational security requirements include protection for the
convention sites and venues, the candidate nominees and the
dignitaries, delegates, and general public participating in the
event.
In addition to the DNC and RNC, we are also planning for
four additional NSSEs, including the Asia Pacific Economic
Cooperation summit in Honolulu in November 2011, the State of
the Union Address, and the G-20 and NATO summits, both of which
are scheduled to take place next spring in Chicago, Illinois.
As the lead Federal agency, law enforcement agency,
responsible for the operational security plan at NSSEs, we will
establish multiagency communications centers, or MACCs, for
each event. Each Federal, State, and local agency with an
operational role in these events will have command-level staff
assigned to the multiagency coordinating center. This
coordination ensures that all agencies have full situational
awareness and can immediately provide assets or assistance to
one another if needed.
In closing, while fiscal year 2012 promises to be a
challenging year, I am confident that through the determination
and strong work ethic of our special agents, our Uniformed
Division officers and our administrative, professional, and
technical staff, we will successfully meet those investigative
and protective challenges.
Mr. Chairman, Ranking Member Speier, and distinguished
Members of the committee, this concludes my opening statement,
and I am happy to answer any questions you may have at this
time or wait until you come back.
[The statement of Mr. Sullivan follows:]
Prepared Statement of Mark Sullivan
September 14, 2011
introduction
Good afternoon Chairman Meehan, Ranking Member Speier, and other
distinguished Members of the committee. I am pleased to appear before
you today to discuss the anticipated protective and investigative
challenges the Secret Service will face in fiscal year 2012. In the 8
years since the Secret Service was transferred to the Department of
Homeland Security (DHS), the men and women of our agency have made
significant contributions to the overarching goals of the Department.
In recent years, the Secret Service has faced emerging threats that
have required enhancements at permanent and temporary protective sites,
a historic Presidential campaign, increases in the number of designated
National Special Security Events (NSSEs), and the proliferation of
cyber crimes directed at our banking and financial payment systems and
other critical infrastructure.
Despite these challenges, the men and women of the Secret Service
continue to perform their duties in an exemplary manner. In fiscal year
2010, Secret Service protective details and field agents ensured 100
percent incident-free protection for 5,906 domestic travel stops and
515 international travel stops. Foreign dignitary protection reached a
record 2,495 travel stops, including visits by 236 heads of state and
government, and 107 spouses from over 147 countries. Dignitary
protection also included security operations for the Nuclear Security
Summit in April 2010 and the 65th anniversary of the United Nations
General Assembly in September 2010. Additionally, the protective
mission was supported through 7,726 site surveys.
Thus far in fiscal year 2011 the Secret Service protective details
and field agents have provided protection at 246 domestic travel stops
and 49 international travel stops. Further, the U.S. Secret Service has
already commenced extensive security planning and coordination for the
Asia Pacific Economic Conference to be held in Honolulu, Hawaii on
November 12 and 13. Last, we have begun the training of the candidate
nominee protective details in preparation for the 2012 Presidential
Campaign.
In the area of criminal investigations, Secret Service field
offices closed a total of 9,137 cases in fiscal year 2010, an increase
of 7.8 percent over fiscal year 2009. These cases led to 8,930 arrests.
Additionally, the Secret Service continued to strengthen our
partnerships with U.S. Attorney offices, sustaining a high conviction
rate of 99.3 percent for all cases that went to trial. The Secret
Service's longstanding investigative priority of combating financial
crime led to an estimated $13.5 billion in potential losses prevented,
of which $6.95 billion was tied to cyber crimes. Building on these
successes, the number of financial crime cases closed increased 7.1
percent from comparable fiscal year 2009 levels, and resulted in 5,589
arrests, a reflection of the Secret Service's ability to adapt to
emerging financial and cyber crime threats.
In her appearance before the House Security Committee in March
2011, Secretary Napolitano noted that, ``Today's threat picture
features an adversary who evolves and adapts quickly and who is
determined to strike us here at home--from the aviation system and the
global supply chain to surface transportation systems, critical
infrastructure, and cyber networks.'' In the past 2 years, the
attempted assassination of the Deputy Interior Minister of Saudi Arabia
and the failed detonation of an explosive device on Delta/Northwest
Airlines flight 253 have illustrated the importance of advanced
screening techniques. Additionally, as evidenced by materials
discovered during the search of Osama bin Ladin residence, our
protectees remain a highly sought-after target by terrorist
organizations. However, even in a general sense, a heightened threat
environment for our country is an obvious concern to the Secret
Service, since many aspects of our dual mission rely on safe modes of
transportation, the security of fixed and mobile sites where our
protectees work and visit, and secure communications.
As documented through the Department's Quadrennial Homeland
Security Review\1\ and bottom-up review process,\2\ the Secret
Service's missions include the protection of our National leaders,
ensuring the continuity of National leadership, protection of visiting
heads of state and government, implementation of operational security
plans and protective activity for designated NSSEs, as well as
investigating crimes directed towards our Nation's banking and
financial payment systems.
---------------------------------------------------------------------------
\1\ Department of Homeland Security. (2010). Quadrennial Homeland
Security Review Report: A Strategic Framework for a Secure Homeland.
\2\ Bottom-Up Review Report, July 2010.
---------------------------------------------------------------------------
The Secret Service anticipates that fiscal year 2012 will be a very
demanding and challenging year. As you will recall, the 2008 campaign
presented a number of unforeseen challenges, such as being directed to
provide candidate protection earlier than any time in history, a
protracted Democratic primary, massive crowds at campaign rallies all
over the country, and larger venues to secure. In fiscal year 2012, the
Secret Service will not only be responsible for candidate/nominee
protection, but also six anticipated NSSEs: (1) Asia Pacific Economic
Cooperation (APEC) Summit; (2) Presidential State of the Union Address;
(3) North Atlantic Treaty Organization (NATO) Summit; (4) Group of
Twenty (G-20); (5) Republican National Convention; and (6) Democratic
National Convention.
protective operations
The Secret Service's protection mission is comprehensive, and goes
well beyond surrounding a protectee with well-armed special agents.
Over the years, the agency's protective methodologies have become more
sophisticated, incorporating such tools as airspace interdiction
systems and chemical, biological, radiological, and nuclear (CBRN)
detection systems. As part of the Secret Service's continuous goal of
preventing an incident before it occurs, the agency relies heavily on
meticulous advance work and threat assessments to identify potential
risks to our protectees.
Advances in technology as well as the interdependencies of our
country's network systems have required a new paradigm in the way we
approach protection. No longer can we rely solely on human resources
and physical barriers in designing a security plan; we must also
address the inherent vulnerabilities of critical infrastructures upon
which security plans are built. Addressing such potential areas of
vulnerability is part of the comprehensive security plan the Secret
Service develops to provide the highest level of protection to
protectees.
Candidate Protection
Today, the Secret Service's Dignitary Protection Division is
responsible for campaign planning and protection. By statute, the
Secretary of Homeland Security determines who qualifies as a major
Presidential or Vice Presidential candidate. This determination is made
in consultation with an advisory committee comprised of the Speaker of
the House, the Minority leader of the House, the Majority and Minority
leaders of the Senate, and one additional member selected by the other
Members of the committee, which has historically been the Sergeant at
Arms of either the House or the Senate.
While much has changed in the 43 years since we began protecting
Presidential candidates, the challenges associated with planning and
budgeting for candidate protection 2 years ahead of Presidential
campaigns remain. Forecasting staffing and costs for Presidential
campaigns is surrounded by a great deal of unknowns, such as the number
of candidates that will run for the Presidency, how much they will
travel, and how soon the field of candidates is selected.
In analyzing past campaigns, one of the first things to consider is
historical information of the number of Presidential and Vice
Presidential candidates who received Secret Service protection. The
number of Presidential and Vice Presidential candidates receiving
Secret Service protection hit a high point in 1976 with 15 protectees
and a low point in 2004 with three protectees. However, this
information does not reflect Secret Service protection for candidate
spouses and children, both of which have become significant factors in
recent years as they have been granted protection by Executive
Memoranda earlier in the campaign cycle.
2012 Presidential Campaign
Consistent with previous campaigns, the Secret Service's primary
means for estimating costs associated with candidate/nominee protective
details is the ``protection day.'' The protection day calculation
includes costs such as travel, per diem, hotels, and overtime required
to sustain a candidate/nominee protective detail for 1 day. It should
be noted that factors outside of the Secret Service's control, such as
the frequency of travel, events with large venues and crowds, or
international travel by the candidates also impact cost.
In addition, the projected number of protection days is critical to
the overall estimated cost of the campaign. Although we cannot predict
exact start and end dates of when candidates and their dependents
receive protection, we can identify a range of how many total
protection days will be required. To achieve this estimate, the Secret
Service performed a probability-based analysis which incorporated
historical campaign information, recent trends in candidate protection,
and other factors such as anticipated primary schedules.
2012 President Campaign/Candidate Nominee Operation Section Training
In preparation for the 2012 Presidential Campaign, the Secret
Service's Dignitary Protective Division--Candidate Nominee Operation
Section (CNOS) in conjunction with the JJRTC began the training of
protective details in May 2011. All of the protective details are
expected to have completed training by the end of August 2011 and will
ultimately be assigned to provide protection for a Presidential
candidate.
The CNOS protective details are comprised of special agents from
our 142 domestic field offices. The CNOS details operate on 21-day
rotational assignments. Upon completing their protective rotation, they
return to their respective office and continue their criminal
investigative cases or participate in protection assignments in their
district. Agents assigned to a candidate protective detail continue on
this protection rotation through the end of the campaign or until the
candidate they are assigned to protect withdraws from the campaign.
Additionally, the CNOS initiated a training program to prepare
other Federal law enforcement agencies that may assist the Secret
Service during the 2012 Presidential Campaign. At this time, we
anticipate that Transportation Security Administration officers will
periodically assist the Secret Service Uniformed Division Officers with
security screening operations at various protective sites. The CNOS has
also started ``Protective Advance Team Training'' at numerous Secret
Service Field Offices throughout the country. During this training,
refresher training is provided to special agents who will conduct the
protective security advances for campaign visits throughout the country
during the 2012 Presidential Campaign.
National Special Security Events (NSSEs)
In addition to candidate/nominee protection, the Secret Service
will be responsible for the security planning for six anticipated NSSEs
in fiscal year 2012, the APEC Summit; the Presidential State of the
Union Address; the NATO Summit; the G-20 Summit; the RNC; and the DNC.
Title 18 U.S.C. 3056 (e)(1) and various Presidential directives over
the years have established the Secret Service as the lead Federal
agency responsible for the planning, coordinating, and implementing
security operations for NSSEs. Federal partners are critical to the
overall success of these events with the Federal Bureau of
Investigation responsible for crisis management and the Federal
Emergency Management Agency responsible for consequence management.
Due to the extensive planning and coordination efforts required for
an NSSE, the Secret Service has already temporarily transferred
personnel to plan, coordinate, and implement the security operations
for the APEC Summit. To ensure effective coordination and planning, the
Secret Service has established a Steering Committee with 24
subcommittees to cover all areas of the security plan. For several
months now, special agents from the Office of Protective Operations/
Dignitary Protective Division have been on the ground meeting with
their State and local law enforcement partners, fire safety personnel,
first responders, military, and numerous other entities to ensure the
overall security plan for the APEC Summit.
In addition, we recently learned that the NATO Summit and the G-20
will be held in Chicago, IL next spring. Senior staff from our Chicago
Field Office has already engaged their State and local law enforcement
partners in Illinois to begin the critical security planning and
coordination for these events.
Information Sharing with Our Law Enforcement Partners
Due to the dual mission of the Secret Service, we have always
maintained a close working relationship with our State and local law
enforcement partners. On a daily basis, special agents assigned to
domestic field offices work criminal investigations with their State
and local partners. These preexisting relationships allow the Secret
Service to perform its protective responsibilities seamlessly. When a
protective visit is scheduled, the Special Agent in Charge of that
office immediately contacts the Chief of Police, the Sheriff, and State
Police to convene a police meeting and discuss the security planning
for the upcoming protective visit. At this meeting, the Secret Service
provides information concerning the visit with our law enforcement
partners. We then establish teams, consisting of Secret Service agents,
State, and local law enforcement for each aspect of the protective
visit. Sharing this critical information and working together ensures
that all necessary entities have full awareness of the anticipated
protective movements and can thus plan accordingly.
As the lead Federal law enforcement agency responsible for the
security planning, coordination and implementation and operations at
NSSEs, the Secret Service will establish the Multi-Agency
Communications Center (MACC). During the NSSE, each agency that has an
operational role in the NSSE will have command-level staff in the MACC.
This coordination ensures that all agencies have full simultaneous
situational awareness of events occurring and can immediately provide
assets or assistance to one another if needed.
For example, the majority of threat investigative cases are worked
by our special agents in our domestic field offices. When investigating
threats made against any of our protectees, the Secret Service
frequently works with our State and local partners. Often, individuals
who have made threats against our protectees may have also made threats
against State and local officials or are at least known to the local
and State law enforcement community. Consequently, communicating and
sharing information with our local and State partners is critical to
the success of these investigations.
investigative operations
The partnerships that the Secret Service relies on to successfully
perform our protection responsibilities are cultivated at the field
office level. In addition to the permanent protective details dedicated
solely to the protection of our Nation's leaders, the backbone of the
Secret Service is our network of 142 domestic and 23 international
investigative field offices, which carry out protective intelligence
and financial crimes investigations while providing the surge capacity
needed to successfully carry out its protection responsibilities.
All Secret Service special agents begin their career as a criminal
investigator in a field office. The training, judgment, and maturity
they develop as criminal investigators in their field office
assignments are essential to the transition into the next phase of
their careers--protecting our Nation's leaders. During their time in
the field, special agents are routinely assigned to temporary
protective assignments. This developmental period enhances their skills
in both the protective and investigative arenas and promotes the
philosophy of having a cadre of well-trained and experienced agents
capable of handling the Secret Service's dual mission. By conducting
criminal investigations, special agents develop relationships with
local, State, and Federal law enforcement partners that prove critical
when protectees visit their district. These relationships also enhance
investigations into protective intelligence investigations against
Secret Service protectees.
Moreover, the effective relationships we have developed with our
international law enforcement partners are attributable to our long-
term commitment to work with the host nation in a cooperative
environment. This environment fosters relationships built on trust and
mutual respect, and results in the sharing of information and best
practices. Where permanent stations are not available, the Secret
Service relies on temporary assignments to respond to emerging trends
in overseas counterfeiting and other financial crimes.
Cyber Crime Investigations
Beyond the support that investigative field offices provide to the
protection mission, the Secret Service's investigations into financial
crimes has prevented billions of dollars in losses to the American
taxpayer over the years. In recent years, Secret Service investigations
have revealed a significant increase in the quantity and complexity of
cyber crime cases. Broader access to advanced computer technologies and
the widespread use of the internet has fostered the proliferation of
computer-related crimes targeting our Nation's financial
infrastructure. Current trends show an increase in network intrusions,
hacking attacks, malicious software, and account takeovers resulting in
data breaches affecting every sector of the American economy.
While cyber criminals operate in a world without borders, the law
enforcement community is constrained by jurisdictional boundaries.
Therefore, the international scope of these cyber crime cases has
increased the time and resources required for successful investigation
and adjudication. To address the threats posed by these transnational
cyber criminals, the Secret Service has adopted a multi-faceted
approach to investigate these crimes while working to prevent future
attacks. A central component of our approach is the training provided
through our Electronic Crimes Special Agent Program (ECSAP), which
gives our special agents the tools they need to conduct computer
forensic examinations on electronic evidence obtained from computers,
personal data assistants, and other electronic devices. At the end of
fiscal year 2010, more than 1,400 special agents were ECSAP-trained.
Since 2008, the Secret Service has provided similar training to 932
State and local law enforcement officials, prosecutors, and judges
through the National Computer Forensics Institute (NCFI) located in
Hoover, AL. Prior to the establishment of the NCFI, the Secret Service
provided training to State and local law enforcement officials through
the Electronic Crimes State and Local Program (ECSLP).
The Secret Service's commitment to sharing information and best
practices with our partners, the private sector, and academia is
perhaps best reflected through the work of our 31 Electronic Crimes
Task Forces (ECTFs), including two international task forces in Rome
and London. Currently, membership in our ECTFs include: 4,093 private
sector partners; 2,495 international, Federal, State, and local law
enforcement partners; and 366 academic partners.
To coordinate these complex investigations at the headquarters
level, the Secret Service has enhanced our Cyber Intelligence Section
(CIS) to identify transnational cyber criminals involved in network
intrusions, identity theft, credit card fraud, bank fraud, and other
computer-related crimes. In the past 2 years, CIS has directly
contributed to the arrest of 41 transnational cyber criminals who were
responsible for the largest network intrusion cases ever prosecuted in
the United States. These intrusions resulted in the theft of hundreds
of millions of credit card numbers and the financial loss of
approximately $600 million to financial and retail institutions.
Counterfeit Suppression
The Secret Service remains committed to suppressing the
counterfeiting of U.S. currency around the world. Domestically, $8.2
million of counterfeit U.S. currency was seized before entering public
circulation in fiscal year 2010, an increase of 7.9 percent over fiscal
year 2009. Our international field offices seized $261 million,
representing an increase of 170 percent over fiscal year 2009, and a
734 percent increase over fiscal year 2008. These seizures included the
suppression of 428 counterfeit plants.
The effective relationships we have developed with our
international law enforcement partners are attributable to our long-
term commitment to work with the host nation in a cooperative
environment. This environment fosters relationships built on trust and
mutual respect, and results in the sharing of information and best
practices. Where permanent stations are not available, the Secret
Service relies on temporary assignments to respond to emerging trends
in overseas counterfeiting and other financial crimes.
One example of this is the Secret Service's response to the
proliferation of counterfeit originating in Peru. From fiscal year 2008
to fiscal year 2009, the Secret Service noted a 156 percent increase in
the worldwide passing activity of counterfeit U.S. currency emanating
from Peru. In response to this increase, which was second only to the
domestic passing of digital counterfeit in fiscal year 2008, the Secret
Service formed a temporary Peruvian Counterfeit Task Force (PCTF) in
partnership with Peruvian law enforcement officials. Since beginning
operations in Lima, Peru on March 15, 2009, the PCTF has yielded 50
arrests, 21 counterfeit plant suppressions, and the seizure of more
than $33 million in counterfeit U.S. currency. To date, Secret Service
personnel have conducted 44 temporary duty assignments to Peru. Due to
the overwhelming success of the PCTF, the Secret Service and Peruvian
law enforcement officials agreed to extend operations in 6-month
increments throughout fiscal year 2011.
james j. rowley training center
The Secret Service endeavors to recruit, develop, and retain a
diverse and well-qualified workforce necessary for meeting the
challenges I have discussed here today. That is why the training
provided through the agency's JJRTC is so critical. In a single year,
hundreds of newly-hired special agents, Uniformed Division officers,
special officers, and technical personnel undergo extensive training in
protective methodologies used to protect major sites and events,
firearms marksmanship, use of force/control tactics, financial crimes
investigations, cyber forensic training and other courses. The Secret
Service also offers protective security and other training to our
Federal, State, and local law enforcement personnel from across the
country, as well as our international partners.
conclusion
I would like to thank the subcommittee for holding this hearing. I
am confident that through our determination and strong work ethic, our
special agents, Uniformed Division Officers and our Administrative
Professional and Technical staff, the Secret Service will successfully
meet the challenges ahead.
Thank you again for the opportunity to be here today. I look
forward to working with the subcommittee and would be happy to answer
any questions you may have at this time.
Mr. Meehan. Well, Director Sullivan, you are probably the
one guy that is used to changes in schedules and being quick on
the fly. But I received a note from the cloakroom that they
expect to call this vote in just a minute or 2, and so my
judgment is that what we will do is recess for the moment and
look to return as quickly as possible after those votes are
concluded. I think we have a short string of votes, and we will
begin the questioning. I will encourage my colleagues to come
back and join us for the opportunity to speak with you. Okay?
Mr. Sullivan. That would be great. Thank you, Chairman.
Mr. Meehan. Thank you.
We will stand adjourned until conclusion of votes.
[Recess.]
Mr. Meehan. The Subcommittee on Counterterrorism and
Intelligence, looking at the United States Secret Service,
Examining Protective and Investigative Missions and Challenges
in 2012, is called back to order.
Secretary Sullivan, I thank you for your opening statement,
and I now recognize myself for 5 minutes of questioning.
Secretary Sullivan, right now we are in the beginning of, I
think, something that interests so many Americans, which is
what they generally associate the Secret Service with, which is
the protection of the President in a campaign cycle, but in
addition you have responsibilities to protect any number of
candidates who would like to be the President. As a result,
great challenges.
Can you tell me how it is that you begin the process of
distinguishing among the many who are out there to identify and
determine whom you will provide services for, when you make
those calculations, and how you distinguish what kinds of
resources need to be put together for any one particular among
them as they begin the process once they qualify?
Mr. Sullivan. Yes, Chairman. Thank you.
Well, first of all, the Department of Homeland Security
Secretary is the person who decides who does receive protection
from us for a campaign. She makes that--he or she makes that
decision in consultation with an advisory committee, and they
will determine who is a major candidate and if, in fact,
protection is needed.
That advisory committee is made up of the Majority leader
of the Senate, Minority leader of the Senate, the Speaker of
the House, the Minority leader of the House. There is a fifth
at-large member, and for the last several campaigns that has
been on a rotating basis either the Sergeant at Arms for the
Senate or the Sergeant at Arms for the House.
This protection, the candidate needs to come forward and
make that request for protection in order to be considered.
There is certain criteria that the committee will look at. The
Secretary has already sent letters up to all of these Members
outlining what that criteria is, but they will take a look at
that criteria. If need be, they will take a look at the--they
will request us to do a threat assessment, and then based on
all this, the information they get from the--from these
guidelines they are given, they will make a determination if,
in fact, protection should be initiated.
Mr. Meehan. When you say ``a threat assessment,'' what does
that mean? You will do a threat assessment about what?
Mr. Sullivan. We will do a general threat assessment for a
particular individual. We will do a general threat assessment
just what is going on at this period.
Mr. Meehan. So one person may actually include a different
kind of level of threats, or a nature of threats against one
person, at least as you anticipate them, may be different from
another candidate?
Mr. Sullivan. That is correct.
Mr. Meehan. Then how do you respond to those
determinations, and when will they make those kinds of
determinations so that you are able to calculate where and how
you move your resources around in this coming year?
Mr. Sullivan. What we will do is take a hard look at who
that particular individual is we are going to be protecting. We
try to--we try to take into account where they are going to be
going, what they are going to be doing. Again, we assume these
people are actively out there campaigning. What we begin to do,
and, quite frankly, we start this the day after the
inauguration, we begin to put a plan together in place for the
next campaign. We do an after-action report on the previous
campaign. We look at lessons learned, and we begin to put our
plan together.
What we have been doing over the last year now, we have
purchased equipment, we have identified the staffing
requirements for each detail, we have put together----
Mr. Meehan. Are they the same as they have been in years
past in light of the----
Mr. Sullivan. Pretty much. We make different--there are
different modifications we make, and, of course, there are
different countermeasures we have added as we have gone along.
As the threat has evolved, our reaction to that threat----
Mr. Meehan. The threat, I assume, in some ways is more
sophisticated each cycle.
Mr. Sullivan. That is correct.
But right now we have trained upwards of about 12- or 1,400
people to go out and to staff these details. These people that
we use to staff these details are people that work out in the
field. That is why our field office infrastructure is so
important. They are the backbone of the campaign for us.
Mr. Meehan. I have a number of questions I would like to
ask to follow up on those particular points, but I have always
been curious about one thing, which is the very nature of these
political campaigns means that they can be very precarious. An
issue one day can change a candidate's travel from one
purported location to another on a minute's notice. Yet I know
that especially when you get to the point where it is narrowed
to a few critical candidates, you spend sometimes days ahead of
the arrival of a particular candidate in a location assuring
the safety of that.
How does the changing nature of candidates' routines affect
your work? Is there any consideration given if somebody decides
that they want to go to a different location on a moment's
notice? How do you deal with that? Is that taken into
consideration by candidates?
Mr. Sullivan. You know, that is a great point, Chairman.
Again, I come back to our field office people and how important
it is for our people out there in the field to have really
good, strong relationships and communication with our State and
local law enforcement partners. They really do make this work
for us.
To your point, we do see it where a candidate will--we will
be told maybe 1 day, 2 days prior that we are going to be going
to a certain city. I know when I was an agent in charge out in
the field, there were many nights I would call a local law
enforcement counterpart to let them know that we were going to
be having a visit in 2 days, and we would put together a police
meeting.
One of the things we do for every visit that we have
regardless if it is a week or if it is 2 days, we will get all
of our State and local partners together, have a police meeting
with them and all of our other Federal law enforcement partners
if they are involved, and we will outline for them the
itinerary of the particular protectee or candidate. We will
give them any threat assessment that we may have, any issues we
have going on. We will ask them if there are any issues on
their end. But we will pretty much put a plan together.
I will tell you, every visit we have goes off without a
hitch, and it is because of that great relationship and the
hard work by our State and local law enforcement partners and
our people.
Mr. Meehan. Well, thank you, Director.
My time has expired, and I now turn it to the Ranking
Member, Ms. Speier.
Mr. Sullivan. Thank you, Chairman.
Ms. Speier. Thank you, Mr. Chairman.
Thank you, Director Sullivan, for being with us.
I would like to start my questioning on the issue of on-
line content, and do you have the kinds of resources you need
to do your job in a platform that is dramatically changing as
we speak? For example, this last summer the twitter account of
FOXNews was hacked into, and someone tweeted a number of times
that President Obama had been assassinated.
How do you access that? How are you able to determine it is
a hoax? How do you monitor threats? Do you have the kinds of
resources you need to comb the internet for potential
terrorists and for acts like the one I just mentioned?
Mr. Sullivan. Thank you. When I was a new agent, a lot of
times if you got a threat, it would come in the mail, and if
the person who was making the threat was very courteous, they
would put their return address on there. You would know who to
go out and talk to.
But regardless of whether it is by mail or over the
internet, our people are extremely aggressive with that. Again,
I go back to just how much the duality of our mission does help
us with our protection. What we learn as investigators and what
we have learned working our financial crimes through our
Electronic Crime Task Force and our electronic crime special
agent program really has helped us with our--with these
internet threats we have.
We do have an internet threat desk. We do work with all of
our State and local and Federal partners. We do comb the
internet. We have a system right now that people are working 24
hours a day just going through the internet looking for any
type of buzzwords or any type of threatening or inappropriate
activity out there that we may see that involves any of our
protectees.
But I would say that we have a very robust system and some
very qualified and good people that are working these type of
threats. I will also tell you that when we do identify that
individual who has made that threat or that inappropriate
interest that they are displaying, whether it is 2 o'clock in
the morning or 2 o'clock in the afternoon, our people are out
there looking for that individual to interview them.
Ms. Speier. So you have enough nerds working for you?
Mr. Sullivan. I am sorry ma'am.
Ms. Speier. You have enough nerds working for you?
Mr. Sullivan. We have some really qualified people who have
some great cyberskills.
Ms. Speier. All right. Very good.
At the hearing 2 years ago, you said, ``And I tell all of
our people that we can't just depend on human resource people
to do our recruitment, that everybody in this organization has
to be a recruiter.'' This was in response to an issue of
diversity within the Service.
Can you speak to how that has improved and what steps you
have taken since making that statement to make sure that your
recruitment is robust in terms of making sure you have a
diverse group of people serving?
Mr. Sullivan. Yes, ma'am, and I continue to do that at
every office meeting I have, every town hall meeting I have. I
bring that up, we talk about recruitment. Again, I say that
with due respect to HR, but I really do think if any
organization--if you are going to depend on HR to do all your
recruitment for you, you are going to fail. It has to be the
job of every employee in your organization to be out there
recruiting.
Ms. Speier. Do you have some numbers that you can share
with us about how it has improved?
Mr. Sullivan. Ma'am, I can get you those numbers.
Ms. Speier. Can you get those?
Mr. Sullivan. I would be more than happy to do that.
Ms. Speier. Thank you.
Mr. Sullivan. I will tell you that I meet with every new
agent class and every new Uniformed Division class before they
graduate, generally the numbers being 22, 23, 24 officers and
agents in every class. I will meet with them for an about an
hour, hour and a half or so, along with our Deputy Director,
and the first thing each of us look at is the make-up of that
class.
I can tell you that the classes that I have been meeting
with over the past few years have been one-third--we had a
couple recently that were one-half women and minorities. So I
will tell you that I do not feel that we are where we need to
be, but I will tell you I continue to see it improving. I
believe in role models----
Ms. Speier. I think you have answered the question. I want
to get one more question in before my time expires, and that is
on financial crimes.
Many of your counterfeit investigations and operations are
located in South America. We have been focused on this
committee on the role of Hezbollah in South America and Central
America, and to what extent they are coming into the United
States to do their fundraising. Can you enlighten us on any
information you have about your efforts and your focus in South
America?
Mr. Sullivan. Yes. We started several years ago in
Colombia, in Bogota, with counterfeit currency. Most of the
offset of the traditional type of counterfeit that we saw was
coming out of South America. We partnered up with the Colombian
police, with their vetted forces, and we made a significant
dent in the amount of--in securing counterfeit currency before
it was put out into the market, before it came into our
country, being aggressive down there with counterfeit currency.
We have seen as a result a lot of the counterfeiting we have
seen in Bogota is now going into Peru, and we are about to open
an office in Peru. But most of our efforts, Congresswoman, are
focused on counterfeit currency in South America.
Mr. Meehan. Thank you, Ranking Member Speier.
At this point, I will turn to questions to the gentleman
from Minnesota, Mr. Cravaack.
Mr. Cravaack. Thank you, Mr. Chairman.
Director Sullivan, I want to thank you for all of your
service to this country, and also all the people of the Secret
Service all their fine service they have done as well in
keeping us all safe at night so we can lay down our heads. So
thank you, sir, to all your people.
Specifically in your testimony you highlighted the work the
Secret Service does, investigate cyber-related crimes and
suppressing counterfeiting. In previous years we have read a
lot about states like North Korea, for example, that have been
heavily involved in counterfeiting U.S. currency.
In your testimony you note that there has been a dramatic
increase in worldwide counterfeiting throughout the U.S.
currency. I am interested to know over the past 3 years, has
the Secret Service observed a rise in the percentage of state-
sponsored counterfeiting and cyber-related criminal activity?
If so, what is the most prevalent kinds of state-sponsored
crimes?
Mr. Sullivan. As far as state-sponsored crimes go,
Congressman, if we do come up with anything that we believe to
be state-sponsored or terrorism, we turn that over to the FBI.
Our focus is mainly on criminal violations. What we are
seeing, quite frankly, and a lot of it is coming out of Eastern
Europe, is an increase in cyber intrusions, network intrusions,
where these individuals are intruding into financial systems,
banking power system. There is a whole loosely organized group
there where one group will do the intrusion; another group may
buy those numbers, traffic those numbers out. But our focus is
mainly on the criminal financial aspect of these particular
individuals.
Mr. Cravaack. Thank you.
Now, in the interest of expanding your investigative arm,
in all of basically the brief history the Chairman has given us
and you gave us a little bit earlier, what is your perfect
Secret Service in the next 5 years? What would it look like?
Mr. Sullivan. We are--I have to tell you we are recruiting
an incredible workforce. The people that we are recruiting
right now are coming into it, they have a very good cyber
background, it is second nature to them.
But I believe we need to just continue to maintain and
evolve with the threat as we see it and stay ahead of it, stay
ahead of the threat. I am looking for our organization to be
diverse, reflective of our society. I want us to continue to be
proactive to those threats that we are seeing out there every
day. I am looking for us to make sure that as we see the
country change, that we change with it as far as shift in
population, that we put our resources where they need to be. I
want our people to look--we give our agents in charge out there
in the field--we want them to have the freedom to take a hard
look at, you know, what is it that is going to have the high
impact in that location. You know, what might be a priority in
New York isn't going to be a priority in Los Angeles.
But we just have a really good, I believe, workforce out
there, looking to work extremely hard and evolve with the
threat.
Mr. Cravaack. There has been some debate whether the
Department of Homeland Security is the most appropriate place
for the Secret Service. Can you expound upon that and give us
what your thoughts are?
Mr. Sullivan. Sure. We came over to the Department of
Homeland Security back in March 2003. We came over from the
Treasury Department. We had been there for 138 years. I think
as with any agency entering an organization where there is
going to be over 200,000 people, I think there is going to be
some growing pains.
I believe when you look at the QHSR, and you look at the
result of that, I think you will see that there is a place for
the U.S. Secret Service within the Department of Homeland
Security. The purpose of the Department of Homeland Security is
to keep the homeland safe and to keep our American way of life
safe. I believe that is what we do by protecting those people
we are entrusted to protect and by protecting our financial
infrastructure.
Mr. Cravaack. As the Secret Service expands its
investigative arm, do you think that is going to inhibit your
mission on the protection side, or how do you think you are
going to be able to balance all that?
Mr. Sullivan. I think it enhances it. When you look at all
the people that we have on protection details, all of us start
the same way. We all begin our careers in a field office. We
all begin learning about the organization, we learn how to be
criminal investigators. Everybody is an 1811 criminal
investigator. We are out there interviewing people, we are
learning how to evaluate people, we are learning how to
evaluate situations. I think it just makes us better at
protection.
You look at the way we have evolved with some of the things
we do, we go out and we do a protective advance, a lot of what
we do now is to go out and protect that critical
infrastructure, you know, the elevator systems, the
transportation systems, the air infiltration systems, the water
purification. Years ago those would be attacked manually. Today
they are attacked remotely. These skills that Ranking Member
Speier had asked me about as far as cyber, we learn that as
investigators it helps us with our protection.
So I believe that the duality of our mission really does go
hand-in-hand, and what makes us better in protection is what we
learn as investigators, and what we makes us better in
investigation, I believe, is what we have learned in
protection.
Mr. Cravaack. Thank you, sir. I appreciate your time, and I
yield back, sir.
Mr. Sullivan. Thank you, Congressman.
Mr. Meehan. We are hoping your material works better out in
the Secret Service than our buzzers do here in the Budget
Committee, but as I noted before----
Mr. Sullivan. We can come take a look at it for you, sir.
Mr. Meehan [continuing]. They are cutting everything these
days in Washington.
Thank you, Mr. Craavack.
Let me take a moment before I recognize our next
Congressperson for questioning to welcome Ms. Hahn to our
subcommittee. To the best of my knowledge, this is the first
time that we have been sitting together, so we collectively
welcome you to the committee and look forward to working with
you on the important matters ahead.
So the Chairman recognizes the gentlewoman from California
Ms. Hahn.
Ms. Hahn. Thank you, Chairman Meehan, for that gracious
welcome, and to Ranking Member Speier. This is my first
subcommittee meeting, but I am really looking forward to
serving on the subcommittee as I think the issues are extremely
important and extremely relevant to my district at home.
Director Sullivan, I appreciate your testimony today before
us. In 2001, the U.S. PATRIOT Act mandated the Secret Service
to establish a Nation-wide network of electronic crimes task
force, and my own city in Los Angeles in 2002, the Los Angeles
Electronic Crimes Task Force was created and was tasked with
working with Federal, State, and local law enforcement in
providing network security and digital data recovery.
Can you tell me a little bit more about the role of this
agency, its current initiatives? How does this task force work
with local law enforcement, including LAPD, L.A. County
sheriffs?
Mr. Sullivan. Yes, ma'am. The Electronic Crime Task Force
concept has been an incredible success for us, I believe. We
had our first original one in New York going back to the late
1990s.
What the Electronic Crime Task Force does is it brings
everybody under one roof going after the same people, and
Nation-wide we have 29 electronic task forces Nation-wide,
which brings, I think, into play about 2,500 State and local
law enforcement. We have got about 1,800 or 2,000 members who
are from the financial and banking industry, and we have about
350 people from academia.
But really this is a great force multiplier. It is all
about partnership. These people coming into the same office
every day working together going after the same people.
Training is also a very critical part of what we do. All of
our special agents, when they go through their initial training
period as new agents, they get a basic computer class, computer
training, and then from there they get into more training. We
have three different levels of training for all of our agents.
We have the basic training, we have cyber or network intrusion
training, and then we also have forensic training.
As a result of how well that has done for our people, in
cooperation with the Department of Homeland Security and the
State of Alabama, we have opened up in Hoover, Alabama, a cyber
training institute for State and local law enforcement as well
as local prosecutors. So far we have put about 1,000 people,
State and local law enforcement, through that training, giving
them the same--again, a force multiplier. Many of these people
are involved in our Electronic Crime Task Forces, but they are
able to go out--we get them the equipment, we give them the
training, and they are able to go out and do the same thing our
agents are doing.
Ms. Hahn. Let me ask you one other question.
Interoperability is a problem that was identified when we heard
the 9/11 report card in the Homeland Security Committee. It was
one of the major lessons we learned that day on 9/11: The
inability of our first responders to communicate resulted in a
loss of lives. Ten years later apparently we still haven't been
able to create and fund that system. I know my district has the
Port of Los Angeles in it, L.A. International Airport, and I am
always hearing from my local law enforcement agencies that the
need for a National interoperability communications system is
vital.
The Secret Service, do you see that as a problem as well?
What is your ability to communicate with first responders in a
crisis situation?
Mr. Sullivan. I think that is part of the reason when we
put any event together, we are always going to be planning
for--we want every single trip and every single visit to be a
success, but you always have to plan for the worst-case
scenario. That is why, again, I go back to the police meetings
we have and why they are so important, and why we--for each
event we do have--if it is an NSSE, we have a multiagency
coordinating center, and in that multiagency coordinating
center, we are going to have every command-level individual
from every single department is going to be represented in
there, and that could be anywhere from 50 to 55 people. So if
an incident does occur, we are all going to be in there
together, everybody is going to have the same information, and
everybody is going to be able to talk to each other and respond
to that particular threat.
But I would agree with--I would agree with the assessment
that you are getting from your State and local law enforcement
that there is more work that needs to be done with
interoperability.
But I do think that we, working with our partners, when we
are working on these planned events, we are taking into account
every contingency to make sure we do have the best
communication plan we can have if an incident were to occur.
Ms. Hahn. Thank you.
Mr. Meehan. Thank you, Ms. Hahn.
Now the Chairman recognizes the gentleman from Arizona, who
may know a little bit about this from previous experience. So
the gentleman from Arizona, Mr. Quayle.
Mr. Quayle. Thank you, Mr. Chairman, and thank you,
Director Sullivan, for being here today. Mr. Chairman, you are
right. I have to say right off the bat that I have had a lot of
interaction with the men and women of the Secret Service, and
they are, by far, some of the best and most professional people
that I have ever had the privilege to be around. So I just want
to say thank you for running such a great organization, and the
people in the Secret Service are just tremendous.
Mr. Sullivan. Thank you, Congressman.
Mr. Quayle. One thing in your testimony, you raised the
concern of the widespread use of the internet has led to a lot
of the proliferation of computer-related crimes that have been
targeting our Nation's financial infrastructure, and it
affected virtually every sector of the American economy. How is
the Secret Service dealing with that threat? Are there any
areas that you think might be able to be strengthened?
Mr. Sullivan. Again, I go back to the model we have with
our Electronic Crime Task Force, where we bring everybody
together, and what we try to do is just try to stay one step
ahead of the technology. These people that we are up against
that are committing these crimes, every time we figure out a
solution to prevent them from what they are doing, they are out
looking for the next technology. Their technology is evolving
the same way as everybody's technology is evolving, and they
really do take advantage of that.
So we find by working with academia--we have people at the
Carnegie Mellon, at the engineering institute there--we work
with them to again let them see the trends we are seeing, but
also for them to help us with countermeasures to that and look
for better law enforcement tools for us to operate on.
But the best people we have are the people that are dealing
with this crime out there and just staying current with it, and
making sure that we get them the training that they need, make
sure that we get them the equipment they need, and make sure
that we keep them current.
Mr. Quayle. Do you think you are staying one step ahead
rather than being reactive? Because I know in all sorts of law
enforcement, whether cybersecurity or whatever, it is hard to
keep that one step ahead, because every single time you think
you are one step ahead, then you get pinged with another thing
you hadn't even thought about before.
Mr. Sullivan. It is a combination of both. I would say a
lot of it is reactive. We have to see what that threat is out
there, and then we try to be very aggressive reacting to that.
We, using different investigative techniques, I think--and
again, that goes back to how we have prevented about $13
billion in fraud, whether we are working with informants--you
know, there is a lot of good--even though we have a new type of
crime here, we still do rely on good old police work and making
sure we are out there talking to people who might have
information, and making sure that our people are out there
being very aggressive in looking at what the particular crime
is. But a lot of it is reactive, without a doubt.
Mr. Quayle. Thank you, Director Sullivan.
Mr. Chairman, I yield back.
Mr. Meehan. Thank you, Mr. Quayle.
I have a couple of follow-up questions myself, and I have a
few things I would like to ask you, and then I will open it. If
we have anybody that would like to ask an individual question
or participate in some follow-up with you, I will invite that
and allow that as well for a few moments.
But I want to return, Director Sullivan, to some of the
line of questioning that I spoke about before, because I
identify this coming cycle as a moment in which there is going
to be a great deal of attention on our process and our
candidates. We have been here watching a transition in the
world of terror in which we have identified the nature of the
threat that we saw on September 11 a decade ago, the
sophisticated ring operating in concert, and now we have begun
to see, at least experienced here in the United States, to the
extent that we have had issues with terrorism, it has been
changed. We have seen individuals operating as lone wolves as
the word would go.
In addition, we are seeing a pattern of activity in which
some from outside of this country are trying to reach back,
connect with individuals within here. We call this the
radicalization aspect.
I am not sure that we have ever dealt with both of those
while we have conducted a Presidential campaign, or at least to
the extent that we think it exists today.
Without going into any particular techniques or other
things, is this certainly an issue that you and the agency have
anticipated? How is it that you communicate with our other
agencies who are looking at the global picture and trying to
identify risks to the homeland, not the least of which would be
a risk to an iconic situation like a candidate?
Mr. Sullivan. Thank you, Chairman.
I think this is a benefit from us being part of the
Department of Homeland Security. I know that it is a priority
for the Secretary to counter violent extremism, and part of her
strategy is to reach out to the community, make sure that we
are letting our State and local law enforcement partners out
there know what we know, and making sure that we have the best
information out there as well.
As far as we are concerned, we are a big consumer of
information. We are not an intelligence component, but for our
threat reduction, for our risk management, we really do depend
on the information that we get from all of our partners. I can
tell you--and I think this past weekend you mentioned the
events up in New York and Pennsylvania and here in Washington,
DC, and I can tell the Chairman, the information we got from
all of our Federal partners out there, whether it was the FBI
or from the intelligence community, we got tremendous support
regarding these events, the information that was out there,
that really did help us put together the best plan we could put
together. But when we put a plan together, we take into account
the lone wolf, we take into account the organized terrorist
attack, we take into account the threat of VBIEDs, of IEDs. All
of that we take into account.
Mr. Meehan. The changing nature of the infrastructure out
there that you have to--it is no longer just the individual
with a--unfortunately, it is weapons as well have changed.
Mr. Sullivan. Absolutely. So over the years, as again as I
have talked about before, as we see that threat evolve, we have
evolved with it, but I can't emphasize enough just the support
that we get from all of our State, local, and Federal law
enforcement partners. We really do succeed because of that
information and the support we get from them.
Mr. Meehan. Let me ask one follow-up question related to,
again, anticipating 2012. I notice we call the special events
the events of National significance that are going to be
occurring here. Any one of those would be important, but you
are going to be in the spring of 2012. That implies that you
are really at the height of the political season. At the same
time you are going to be dealing with two rather significant
incidences that will probably attract international attention.
My own recollection is whenever the G-20 gets together, it
becomes an international event unto itself.
How are you going to be positioned going into the dual
challenges of dealing with the continuing protection of your
multiple dignitaries while looking at these very significant
events that are likely to require a fair amount of security for
us in this Nation?
Mr. Sullivan. Again, I go back to our partnership. Right
now we have had people in Honolulu for a number of months now
putting together their operational plan for the APEC summit. At
the same time we have people in Charlotte and Tampa working
with their State and local law enforcement partners putting the
plans together for both conventions. We will be naming, or I
think we have already named, people that are going to be
working in Chicago on the NATO and the G-20 summit. This is
going to be their focus.
What we do for these events, Mr. Chairman, is we have an
executive steering committee. The executive steering committee,
the three main Federal partners that are involved in that
committee would be FEMA for the consequence management, we have
the FBI for the crisis management, and we have us for the
operational planning. Then in addition to that, we have the
State and local law enforcement that are involved in the public
safety. Their leadership will also be on that executive
steering committee.
Underneath that executive steering committee, we would have
anywhere from about 20 to 25 subcommittees. These subcommittees
work on different areas that we believe to be issues. We have
people working on an airport subcommittee, we have the airspace
subcommittee, we have an intelligence subcommittee, we have
fire and life safety subcommittee. We have a subcommittee for
everything you can think of.
Mr. Meehan. Sounds like Congress.
Mr. Sullivan. But all these subcommittees, everybody is
coming into work every single day. So it goes back to what I
talked about before, Chairman: The collaboration that we have
out there, the partnership that we have out there, quite
frankly, if we didn't have that, we could not do this by
ourself. We really do rely on all of our partners out there to
make sure that we are able to do the visit. Again, we don't go
in there and say, we are in charge. We go in there and say,
this is a partnership, an equal partnership, and everybody is
valued here, and we really do want to work this together.
I think this must be working because since 1998, we have
already done 37 of these, and every one of them seems to get
better with time, and we learn from each one of them as well.
Mr. Meehan. I thank you for your collaboration, and I have
seen it first-hand. The challenges mount, but it certainly
seems clear the work with the others is particularly
appreciated, with the locals in particular.
Mr. Sullivan. Thank you, Chairman.
Mr. Meehan. Now I would turn to the Ranking Member, Ms.
Speier.
Ms. Speier. Two quick questions.
Many States have the open carry laws, which allow you to
carry your guns openly. During the Presidential campaign in
2008, there were assault weapons at some public rallies.
How do you deal with their Constitutional right to carry
those weapons and yet make sure that the safety of the
candidates and the public is provided for?
Mr. Sullivan. Yes. Our people go out, and we abide by the
rules of that State. But what we do is we have--at every venue
we have, we have what we call a secure zone. Nobody is allowed
into that secure zone, and we make sure that we give ourselves
enough stand-off distance so that there is no type of weapon
that is going to be within that area that we believe is going
to do any harm to us.
But we also have other protective countermeasures going on
to make sure that we do identify anybody who is out there with
the weapon, that we can identify those individuals and make
sure that we will--that they will not be capable of bringing
any harm to us.
But again, it goes back to our partnership with State and
local law enforcement. They are just so important at what they
do, and they do help identify those threats to us before they
get to a point where it might be unmanageable.
Ms. Speier. Do some States allow for open carry of loaded
guns?
Mr. Sullivan. I believe so. I am not--I believe they do,
though, yes.
Ms. Speier. All right. My second question and final
question deals with the issue you had previously where you
overspent your budget and didn't inform Congress or DHS. What
steps have you put in place to prevent that from happening
again?
Mr. Sullivan. I would just say, for us, we put together
these type of events with a campaign. It really is very
difficult for us to forecast out a cost. There is a lot of
things that come into effect here; the crowds, and the number
of days, and just a whole myriad of different things.
What happened in this particular instance was right at the
end of December 2008, we learned that four additional NSSEs
were going to be on for during the inauguration. Philadelphia,
there was going to be a train trip originating in Philadelphia
coming down to Washington. So Philadelphia; Wilmington,
Delaware; Baltimore, Maryland; and an event at the Lincoln
Memorial were all designated as NSSEs.
As we looked at our budget, we realized that the money that
we had for the campaign, the transition in the inauguration was
not going to support these four NSSEs. We notified the
Department of that challenge and let them know that we needed
to do a reprogramming.
You know, one point I do want to be clear on: We did not
overspend from overall budget, but what happened was we had to
take money out of one protection line account and put it into
this NSSE account. So we took it from one protection account
and put it into another protection account. Unfortunately, we
did not--a written notification of this was not sent up to
Congress, and thus we were given this violation.
Some of the things we have done in the mean time is that we
do have more frequent interaction with the DHS budget shop on
this particular issue. There is a lot more oversight
internally, internal controls that--budgetary controls we have
to monitor the budget.
But I will tell you, Congresswoman, I, we as an
organization, took this to be a very, very serious thing. I
think if you read the report, it will show that this was not an
intentional oversight, it was just that these events came at us
at a very fast pace, and we reprogrammed from our own line
items that were not within that particular PPA, and the timely
notification to Congress was not made. We have talked to our
appropriators on that. We have told them that we will make sure
not only in written language, but verbally--we will make sure
that they know we are going to be doing any reprogramming.
Ms. Speier. All right. I thank you, and I yield back.
Mr. Meehan. Thank you, Ms. Speier.
I know the gentleman from Minnesota has one final question.
Mr. Cravaack. Thank you again, Mr. Director.
One of the questions I have, in your testimony you have
kind of alluded to expanding the paradigm of protection to
include a vulnerable infrastructure. How does the Secret
Service go about doing that, in the extent of being able to
talk in an open mike, in protecting our infrastructure and
moving forward?
Mr. Sullivan. Again, I go back to what I--you are talking
about the infrastructure around the event. We have started up
a--it is called the Computer Systems Protection Division.
Again, these are all of our agents who have been trained in
forensic or cyberintrusion, but that these agents are out there
looking to see if there is anybody out there trying to use
cyber to attack our systems, looking to make sure that we
prevent that from happening.
But again, I go back to the variety of our mission. These
people that understand protection, understand investigations,
these are the people that we are using to conduct these
assessments. For the NSSE, for example, we have a group of
people that are dedicated to paying attention and being very
proactive on these issues here.
But again, I go back to everything that was done manually
years ago is all being done remotely now either from within
this country or outside of our country, and we just want to
make sure that we evolve with that threat and make sure we
defeat it the same way it is originating, which is via cyber.
Mr. Cravaack. Is there any areas that you feel the Secret
Service could use more help in in regards to a soft underbelly
that you haven't been able to quite reach the challenges that
are faced?
Mr. Sullivan. Well, the biggest challenge we have is right
after I became--one of the biggest issues, right after I became
Director, I asked that we take a look at our IT infrastructure.
I guess the best way to describe it, if you are looking for a
1980 state-of-the-art IT infrastructure, we were your guys. Our
IT infrastructure was just old, and it needed a lot of support
and a lot of upgrades to it.
Working with Congress, working with the Department, and
working with many others, we have been able to upgrade our IT
infrastructure significantly. I believe that our IT
infrastructure now is a lot more secure, I believe it is a lot
more robust, but we still have a ways to go with that. We have
stabilized it, but there are still some issues we need to work
on with our IT infrastructure. I believe as we go further into
the 21st Century, the better our IT infrastructure can be, and
all the things we are doing with IT now, if we can get that
even further improved, I think that is going to help us with
our operational mission as well as our business enterprise that
we are doing, and maybe help prevent some of the challenges we
had with the ADA, for example, like getting us better time
information on where we are with our budget.
Mr. Cravaack. Thank you, Mr. Director, and I yield back.
Mr. Meehan. Thank you, Mr. Cravaack.
The Chairman notes the rapid ascension of Ms. Hahn on this
committee, but I know that Ms. Hahn has a concluding question.
Ms. Hahn. Thanks, Mr. Chairman.
I thought about it when you asked Mr. Quayle, you
recognized Mr. Quayle, and you said you have had some
experience with this. It was something, and you probably all
know the answer to this question, but who in our Government
gets Secret Service protection and for how long? Is it all the
candidates, their spouses, their children, just the nominee,
Presidents, wives, children? How long after? Who in our
Government receives Secret Service protection and for how long?
Mr. Sullivan. Thank you, Congresswoman.
By statute the people we protect are the President, First
Lady, their family; the Vice President, Dr. Biden in this case,
and their family; former Presidents and their spouses; foreign
heads of state and other dignitaries. I think that is about it
by statute that are receiving protection right now.
One of the things I try not to do is name people by names
because potentially there could be people that aren't receiving
protection, and people may be under the assumption they are
receiving protection. But by statute that is pretty much who is
receiving protection.
Ms. Hahn. How long after; is it lifetime for all of these?
Mr. Sullivan. Up until I believe it was 19--2001, it was
for lifetime for the President and First Lady. There was a law
passed, I believe, in the mid-1990s now that has outlined that
protection now for a former President would be for 10 years
after they leave office.
Ms. Hahn. Thank you.
I yield the balance of my time.
Mr. Meehan. I noted that as I was reviewing the documents--
and that was a very good question. It was one that I was
wondering as well--and I saw that I think at least from the
previous, the most recent President on, that they are going to
put a cap at a certain point after a decade or so and then--so
that was under statute. So that will be a change moving into
the future.
So I want to thank you for your testimony and to the
Members for questions. Members of the committee may have some
additional questions, and if they do, I will ask that they be
submitted to you and you would respond in writing, if you
would. The hearing record will be held open for 10 days.
Let me conclude as well we share with you a concern, and a
supportive concern, for the challenging mission that you have.
You have done a great job of identifying the expansive mission,
particularly as we are watching technology change in the focus
of a global economy with your protection of our money supply,
so to speak. But as we come particularly into 2012 in this
time, of which we are well aware the changing nature of the
world and the identification of America as a target, we stand
here ready. If there are issues or moments of concern, we hope
that you will reach back to the committee and at least allow us
to do our best to be responsive to the questions you might
have.
So I thank you for your service and for the service of your
many partners and agents, who I know, in anticipation of this
year, will be doing great work for America and for the people
who you protect. Thank you.
Mr. Sullivan. Thank you very much, Mr. Chairman. I
appreciate it.
Mr. Meehan. Without objection, the committee stands
adjourned.
[Whereupon, at 4 p.m., the subcommittee was adjourned.]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|