[House Hearing, 113 Congress]
[From the U.S. Government Printing Office]
A NEW PERSPECTIVE ON THREATS TO THE HOMELAND
=======================================================================
HEARING
before the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED THIRTEENTH CONGRESS
FIRST SESSION
__________
FEBRUARY 13, 2013
__________
Serial No. 113-1
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
81-461 PDF WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Michael T. McCaul, Texas, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Peter T. King, New York Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Paul C. Broun, Georgia Yvette D. Clarke, New York
Candice S. Miller, Michigan, Vice Brian Higgins, New York
Chair Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania William R. Keating, Massachusetts
Jeff Duncan, South Carolina Ron Barber, Arizona
Tom Marino, Pennsylvania Dondald M. Payne, Jr., New Jersey
Jason Chaffetz, Utah Beto O'Rourke, Texas
Steven M. Palazzo, Mississippi Tulsi Gabbard, Hawaii
Lou Barletta, Pennsylvania Filemon Vela, Texas
Chris Stewart, Utah Steven A. Horsford, Nevada
Keith J. Rothfus, Pennsylvania Eric Swalwell, California
Richard Hudson, North Carolina
Steve Daines, Montana
Susan W. Brooks, Indiana
Scott Perry, Pennsylvania
Greg Hill, Chief of Staff
Michael Geffroy, Deputy Chief of Staff/Chief Counsel
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
C O N T E N T S
----------
Page
Statements
The Honorable Michael T. McCaul, a Representative in Congress
From the State of Texas, and Chairman, Committee on Homeland
Security:
Oral Statement................................................. 1
Prepared Statement............................................. 4
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security:
Oral Statement................................................. 6
Prepared Statement............................................. 7
Witnesses
Admiral Thad W. Allen (Ret.), Senior Vice President, Booz Allen
Hamilton:
Oral Statement................................................. 9
Prepared Statement............................................. 11
Mr. Shawn Henry, President, Crowdstrike Services:
Oral Statement................................................. 16
Prepared Statement............................................. 18
Mr. Michael E. Leiter, Former Director of the National
Counterterrorism Center:
Oral Statement................................................. 20
Prepared Statement............................................. 22
Mr. David M. Walker, Founder and CEO, The Comeback America
Initiative:
Oral Statement................................................. 26
Prepared Statement............................................. 28
Mr. Clark Kent Ervin, Partner, Patton Boggs, LLP:
Oral Statement................................................. 30
Prepared Statement............................................. 32
For the Record
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security:
Letter From Hon. Janet Napolitano to Ranking Member Bennie G.
Thompson..................................................... 36
The Honorable Beto O'Rourke, a Representative in Congress From
the State of Texas:
Article........................................................ 51
Politico Article............................................... 52
A NEW PERSPECTIVE ON THREATS TO THE HOMELAND
----------
Wednesday, February 13, 2013
U.S. House of Representatives,
Committee on Homeland Security,
Washington, DC.
The committee met, pursuant to call, at 10:09 a.m., in Room
311, Cannon House Office Building, Hon. Michael T. McCaul
[Chairman of the committee] presiding.
Present: Representatives McCaul, King, Miller, Meehan,
Duncan, Marino, Palazzo, Barletta, Stewart, Rothfus, Hudson,
Daines, Brooks, Perry, Thompson, Jackson Lee, Keating, Payne,
O'Rourke, Gabbard, Vela, Horsford, and Swalwell.
Chairman McCaul. The Committee on Homeland Security will
come to order. The committee is meeting today to hear testimony
on the evolving homeland threat landscape. I now recognize
myself for an opening statement.
Let me first say what an honor it is to be elected by my
peers to serve as the Chairman of this powerful committee, and
at the same time, would like to recognize the man who sat in
this chair for 7 years, Peter King, who--just let me thank you
for your great service and dedication to the cause of
protecting the American people. I sure do appreciate that.
Mr. King. Thank you, Chairman.
Chairman McCaul. Also, as I look at the pictures on the
wall of New York, your hometown, Mr. Chairman, I know we plan
to visit there the following week. We are kind of reminded of
the unfortunate catalyst for the creation of this committee.
They will remain on the wall to remind us constantly that our
promise is ``never again.''
After 9/11, President Bush declared, ``We are fighting a
new kind of war against determined enemies. And public servants
long into the future will bear the responsibility to defend
Americans against terror.''
Over a decade later, we now know these words remain true.
The threats we face have adapted and the Department of Homeland
Security's mission and capability have yet to be solidified.
The Members of this committee are some of the public servants
the President spoke about. It is our duty to continue to
improve DHS and defend our freedom, security, and way of life.
Essential to defending our homeland is securing our
borders. Coming from Texas, I am particularly concerned with
conditions on our Southwest Border. We are and will remain a
Nation of immigrants and no one denies our immigration system
is broken and needs to be reformed.
However, as immigration reform takes center stage, we
cannot repeat the mistakes of the past. The 1986 immigration
reform did not stop the flow of illegal immigrants and we
cannot support reforms today unless they hinge on gaining
effective control of our borders.
Until the administration creates a comprehensive National
strategy to secure our borders that includes a reasonable
definition of operational control that we can measure, then we
cannot quantify success or failure. My overriding goal is to
prevent repeating this debate 10 years from now.
All Americans, whether an immigrant or citizen born here,
require a secure border that prevents drugs, weapons, and
violence from damaging our communities.
Drug cartels fight for primacy on our Southern Border,
sending narcotics into our homes. Smugglers weaken our economic
competitiveness at our ports of entry while terrorists still
seek entry into the United States undetected.
Increasingly, DHS has the opportunity to use existing
technologies returning from the theaters of war that make
securing our border cheaper and easier than ever before.
Consequently, as we embark on an immigration reform debate, we
must be mindful that the first step is to control our border,
and I will be introducing legislation soon to accomplish that
goal.
I have developed a framework for legislation to compel the
Department and its components to create and implement a
strategy to control our borders that includes measurable
progress. I am working with outside groups and my colleagues on
both sides of the aisle and in both chambers to be sure the
strategy is workable and has the support that it needs.
If fully implemented, the ability exists to gain effective
control of our borders within 3 years. The strategy must meet
three key criteria. It must ascertain situational awareness of
our borders, it must create metrics to measure progress based
on outcomes, and it must integrate the Department of Homeland
Security components that presently overlap or contradict.
This task is long overdue and the time to achieve this goal
is now. As the committee moves forward, we build upon the
success of the vice chair of this committee, Mrs. Miller, who
is Chair of the Subcommittee on Border and Maritime Security.
She has been a real leader on these issues not only for
this committee but for the entire House, and I am glad to have
her as a partner, and this committee appreciates the path that
she has paved in pushing for a stronger, smarter, border
security strategy.
Other threats to our Nation do not cross our physical
borders. They instead invade our digital networks. DHS is
tasked with securing our civilian Federal networks and equally
important, protecting our critical infrastructures.
DHS is responsible for coordinating the National
protection, prevention, mitigation of, and recovery from cyber
incidents. DHS is also charged with disseminating domestic
cyber threat and vulnerability analysis and investigating cyber
crimes within their jurisdiction.
As these threats increase, and they are, it is essential
that the Federal Government has the capability and capacity to
defend against a cyber attack that could have devastating
consequences on our economy and our way of life.
I do not need to stress the importance of this mission
because China is hacking into major American publications and
to military secrets, and Iran allegedly targeted our financial
institutions in Aramco and the Saudi peninsula just recently.
These are just some of the latest in a series of
increasingly regular attacks against the homeland and reports
this week also claim that China is currently targeting U.S.
trade secrets valued at tens of billions of dollars.
My visit to the NSA and with General Alexander, the
director of NSA, was sobering to say the least. DHS has been
building its capability to protect us from cyber attacks and it
will be the priority of this committee to help them improve
their efforts through legislation. A whole-of-Government cyber
strategy that is responsive to the threat landscape is
necessary and will require insight into the most dangerous
cyber actors.
This committee has a major role in crafting such a
strategy. In the next hearing before this committee we will
focus on the President's Executive Order on cybersecurity.
As we work to meet these challenges, we will never forget
the present threat of terrorism. While our military efforts
have scattered and disseminated the core of al-Qaeda's
operations and leadership, terrorist franchises such as those
that attacked the BP facility in Algeria last month have found
new safe havens allowing them to reconstitute.
One of my constituents, Fred Buttaccio from Katy, Texas was
killed during this terrorist takeover of the facility. I
attended his funeral and presented an American flag to his
widow.
Scattered across the map are increasing numbers of
organizations sympathetic to al-Qaeda's message reaching out to
al-Qaeda operatives in joining their global jihad. Iran
continues to expand its sphere of influence, strategically
advancing its position in the Western Hemisphere.
To face these challenges, DHS must improve. Unorganized
financial management drains resources from necessary work while
structural waste and duplication shut down solutions.
To take a recent example, the Department decided to remove
174 full-body scanners from airports across the country because
they cannot adapt to new imaging requirements, and one report
alleges these scanners cost $150,000 for each unit. This faulty
procurement process has set our travel security back while also
angering ordinary passengers.
This committee will work towards building a better
Department so that it can rise to meet a new decade and
evolving threats head-on. Looking on to the 113th Congress, we
will not turn our back on that goal, and I appreciate these
witnesses coming here today to help us better understand the
threats against us and what needs to be done to meet them.
In closing, I would like to reiterate what we said at our
last organizational meeting that Mr. Thompson, the Ranking
Member, we look forward to working with you in a bipartisan way
to accomplish our shared goal of protecting the homeland.
[The statement of Chairman McCaul follows:]
Statement of Chairman Michael T. McCaul
February 13, 2013
In the years I have sat in this hearing room, upon the walls have
hung a series of pictures taken on that day, almost 12 years ago, which
served as the unfortunate catalyst for the creation of this committee.
Today those images remain to remind us of the purpose we serve here--to
remind us of our promise, ``never again.''
After 9/11 President Bush declared:
``We're fighting a new kind of war against determined enemies. And
public servants long into the future will bear the responsibility to
defend Americans against terror.''
Over a decade later, we now know those words remain true. The threats
we face have adapted, and the Department of Homeland Security's mission
and capability have yet to be solidified. The Members of this committee
are some of the ``public servants'' the President spoke about. It is
our duty to continue to improve DHS, and defend our ``freedom,
security, and way of life.''
Essential to defending our homeland is securing our borders. Coming
from Texas, I am particularly concerned with conditions on our
Southwest Border. We are, and will remain, a nation of immigrants, and
no one denies that our immigration system is broken. However, as
immigration reform takes center stage, we cannot repeat the mistakes of
the past. The 1986 immigration reform did not stop the flow of illegal
immigrants and we cannot support reforms today unless they hinge on
gaining effective control of our borders. Until the administration
creates a comprehensive National strategy to secure our borders--that
includes a reasonable definition of operational control we can
measure--we cannot quantify success or failure. My overriding goal is
to prevent repeating this debate 10 years from now.
All Americans--whether an immigrant or citizen born here--require a
secure border that prevents drugs, weapons, and violence from damaging
our communities. Drug cartels fight for primacy on our Southern Border,
sending narcotics into our homes; smugglers weaken our economic
competitiveness at our ports of entry; while terrorists still seek
entry into the United States undetected. Increasingly, DHS has the
opportunity to use existing technologies returning from theaters of war
that make securing our border cheaper and easier than ever before.
Consequently, as we embark on immigration reform we must be mindful
that the first step is to control our border--and I will be introducing
legislation to accomplish that goal.
I have developed a framework for legislation to compel the
Department, and its components, to create and implement a strategy to
control our borders that includes measurable progress, and I am working
with outside groups and my colleagues on both sides of the aisle and in
both chambers to be sure the strategy is workable and has the support
it needs.
If fully implemented, the ability exists to gain effective control
of our borders within 3 years. The strategy must meet three key
criteria. It must ascertain situational awareness of our borders. It
must create metrics to measure progress based on outcomes. It must
integrate Department of Homeland Security components that presently
overlap or contradict.
Other threats to our Nation do not cross our physical borders--they
instead invade our digital networks. DHS is tasked with securing our
civilian Federal networks and--equally important--protecting our
critical infrastructure. DHS is responsible for coordinating the
National protection, prevention, mitigation of, and recovery from cyber
incidents. DHS is also charged with disseminating domestic cyber threat
and vulnerability analysis and investigating cyber crimes within their
jurisdiction. As these threats increase, it is essential the Federal
Government has the capability and capacity to defend against a cyber
attack that could have devastating consequences on our economy and way
of life.
I do not need to stress the importance of this mission because
China is hacking major American publications and military secrets, and
Iran is allegedly targeting our major financial institutions. These are
just the latest in a series of increasingly regular attacks against the
homeland. Reports this week also claim that China is currently
targeting U.S. trade secrets valued at tens of billions of dollars.
DHS has been building its capability to protect us from cyber
attacks, and it will be a priority of this committee to help them
improve their efforts through legislation. A whole-of-Government cyber-
strategy that is responsive to the threat landscape is necessary, and
will require insight into the most dangerous cyber actors. This
committee has a major role in crafting such a strategy, and the next
hearing before this committee will focus on the President's Executive
Order 13636* on cybersecurity.
---------------------------------------------------------------------------
* Executive Order 13636, Improving Critical Infrastructure
Cybersecurity.
---------------------------------------------------------------------------
As we work to meet these challenges, we will not forget the present
threat of terrorism. While our military efforts have scattered and
decimated the core of al-Qaeda's operations and leadership, terrorist
franchises such as those that attacked the BP facility in Algeria last
month have found new safe havens allowing them to reconstitute. One of
my constituents, Frederick Buttaccio, from Katy, Texas was killed
during the terrorist takeover of this facility.
Scattered across the map are an increasing number of organizations
sympathetic to al-Qaeda's message, reaching out to al-Qaeda operatives,
and joining their global jihad. Iran continues to expand its sphere of
influence, strategically advancing its position in the Western
hemisphere.
To face these challenges, DHS must improve. Unorganized financial
management drains resources from necessary work, while structural waste
and duplication slow down solutions. To take a recent example, the
Department has decided to remove 174 full-body scanners from airports
across the country because they cannot adapt to new imaging
requirements. One report alleges these scanners cost $150,000 for each
unit. This faulty procurement has set our travel security back, while
also angering passengers.
This committee will work toward building a better Department, so
that it can rise to meet a new decade, and evolving threats, head-on.
Looking ahead to the 113th Congress, we will not turn our back on that
goal, and I appreciate these witnesses coming here today to help us
better understand the threats against us--and what needs to be done to
meet them.
Before closing, I would again like to reiterate what I said at our
organizational meeting last month--Mr. Thompson, we look forward to
working with you to accomplish our shared goal of protecting the
homeland.
______
Attachment.--Framework for Operational Control of America's Borders
We cannot repeat the mistakes of the past by failing to ensure
border security is a primary component to reforming our immigration
system. The committee is currently consulting with outside policy and
operations experts to introduce legislation to compel DHS to establish
a comprehensive National Strategy to secure our borders. We can no
longer supply resources on an ad-hoc basis and expect to make lasting
progress. The committee will hold a series of hearings to examine the
current border landscape, and what must be done to achieve full
awareness of who and what is crossing our borders. I look forward to
working with my colleagues on both sides of the aisle in both chambers,
and with the Department, to ensure the development and implementation
of a National Strategy is achieved.
There are myriad National and departmental policies addressing
counternarcotics, terrorism, and transnational criminal organizations,
all of which touch on border security, yet still there is no clearly
articulated, centralized National strategy with a sole focus on
securing the border. DHS must create a holistic strategy that looks at
the overall picture of the border and applies resources based on threat
levels and anticipated changes in migration.
Four Guiding Principles for Legislation Establishing a National
Strategy.--Gain situational awareness using advanced technologies, to
formulate useable metrics, while eliminating agency overlap (SAFE).
1. Situational Awareness.--In order to allocate resources
appropriately, we must have situational awareness--an overall
idea of what must go where. We cannot continue to throw scarce
resources at isolated problems, only to see them shift. DHS
must present to Congress a long-term analysis of where the
United States is vulnerable based off of a holistic picture of
our borders.
2. Advanced Technologies.--The administration must work to
incorporate existing technology such as Department of Defense
Sensor Surveillance equipment used in Iraq and Afghanistan in
order to gain comprehensive visibility of the border landscape.
Using proven, effective technologies to enhance our border
security efforts will save taxpayer dollars and make our
citizens safer.
3. Formulate Metrics.--In 2010, Secretary Napolitano stopped using
the metric of ``operational control.'' At that time, DHS
claimed to have only 44% of the border under operational
control. We can no longer base our security solely on only
apprehensions, without knowing the total number of individuals
who cross undetected. Nor can we base success on the number of
resources allocated to different sectors or components. Gaining
situational awareness will allow DHS to create a new metric to
define progress--based off of the number of apprehensions
relative to the total number of illegal crossings. Only when we
have the full picture can we gauge our own progress, and we
must base progress on outcomes, instead of resources.
4. Eliminate Overlap.--The Department of Homeland Security must
present to Congress its plan to better integrate its agencies
to combat all of the threats we face on our borders. DHS's
subordinate components should not unnecessarily duplicate each
other's efforts--they should instead work in complementary
fashion to ensure our National security.
Mr. McCaul. The Chairman now recognizes the Ranking Member,
Mr. Thompson from Mississippi.
Mr. Thompson. Thank you very much, Chairman McCaul, for
holding this hearing today. Likewise, I look forward to working
with you on many of the items you outlined in your opening
statement.
However, today we will hear from witnesses who will provide
an overview of some of the areas you have identified as
priorities. I look forward to their testimony and thank each of
them before appearing today.
Before we hear their testimony, I think it is important to
point out that as Members of Congress, each of us has a
responsibility to ensure that the Department is able to
adequately perform its mission of protecting the Nation from
and responding to terrorist attacks, man-made catastrophes, and
natural disasters.
As Members of this committee, each of us has a
responsibility to assure the success of the homeland security
mission. That mission cannot be achieved without appropriate
funding, vigorous oversight, and targeted legislation.
We cannot play our part in ensuring the success of the
homeland security mission if we are not willing to use the full
weight of the committee structure, both subcommittee and the
full committee, to pursue a well-crafted agenda.
That agenda should result in bringing our bills to the
floor and assuring that our oversight yields effective
outcomes. Our energies will be wasted and our opportunities
will be squandered if we do not work towards the goal of making
the people of this Nation safer.
Therefore, Mr. Chairman, I commend you for issuing a
statement of priorities in the hope that the work of this
committee and each of its subcommittees will remain focused on
those objectives and our mission during this session of
Congress.
One of your priorities is border security. Since 2004, we
have doubled the number of Border Patrol agents and more than
doubled the number of unauthorized aliens removed from this
country. In our examination of border security, we cannot be
limited by calling for more of the same.
DHS currently lacks a border security strategy that
coordinates CBP, ICE, and the Coast Guard. We must continue to
press DHS for such a strategy. Without it, we cannot be certain
that our border control resources are strategic and well-
coordinated.
Another priority is cybersecurity. As you know, today the
administration released an Executive Order on cybersecurity. It
is my understanding that the strategy calls for strong privacy
and civil liberties protection and recognizes the necessity and
necessary leadership of the Department of Homeland Security in
establishing a volunteer program to promote the adoption of a
cybersecurity framework.
This strategy sounds a great deal like the PRECISE Act, a
bill this committee marked up last Congress but was prevented
from moving to the floor by the Majority leadership. As we
review cybersecurity, I hope we can try once again to take the
PRECISE Act to the floor of the House.
Third, I appreciate your identification of the management
and administrative functions of the Department as one of your
priorities. As you may know, since the inception of the
Department, I have worked to bring accountability and
transparency to the personnel in contracting practices.
The Department cannot succeed unless every component is
brought into an organizational structure that gives
headquarters command and control over the most basic personnel
rules and contracting procedures. Without centralized authority
and accountability, we should not be surprised by stories of
waste, fraud, and abuse.
Fourth, I look forward to working with you to explore the
terrorist threat, no matter where that threat originates. We
must not take a myopic approach. We must protect this country
from all enemies, foreign and domestic. Our view of the
terrorist threat must include domestic terrorism. The focus on
domestic terrorism was noticeably absent in the last Congress.
Finally, I noticed that disaster response and recovery was
not included in your list of priorities. I would urge you to
add this important area.
No corner of this Nation is safe from the devastation of a
natural disaster. Our people must know that we will not forget
them and are committed to improving the systems that must serve
them in their most dire moment whether it is Hattiesburg,
Mississippi, or New York City, New York.
Again, Mr. Chairman, I look forward to working with you and
thank you for holding this hearing.
With that, I yield back.
[The statement of Ranking Member Thompson follows:]
Statement of Ranking Member Bennie G. Thompson
Today we will hear from witnesses who will provide an overview of
some the areas you have identified as priorities. I look forward to
their testimony and thank each of them for appearing today. Before we
hear the testimony, it is important to point out that as Members of
Congress, each of us has a responsibility to ensure that the Department
is able to adequately perform its mission of protecting this Nation
from and responding to terrorist attacks, man-made catastrophes, and
natural disasters.
As Members of this committee, each of us has a responsibility to
assure the success of the homeland security mission. That mission
cannot be achieved without appropriate funding, vigorous oversight, and
targeted legislation. We cannot play our part in assuring the success
of the homeland security mission if we are not willing to use the full
weight of the committee structure--both subcommittees and the full
committee--to pursue a well-crafted agenda. That agenda should result
in bringing our bills to the floor and assuring that our oversight
yields effective outcomes. Our energies will be wasted and our
opportunities will be squandered if we do not work toward the goal of
making the people of this Nation safer.
Therefore, Mr. Chairman, I commend you, for issuing a statement of
priorities and hope that the work of this committee and each of its
subcommittees will remain focused on those objectives and our mission
during this session of Congress.
One of your priorities is border security. Since 2004, we have
doubled the number of Border Patrol agents and more than doubled the
number of unauthorized aliens removed from this country. In our
examination of border security, we cannot be limited by calling for
more of the same. DHS currently lacks a border security strategy that
coordinates CPB, ICE, and Coast Guard. We must continue to press DHS
for such a strategy. Without it, we cannot be certain that our border
control resources are strategic and well-coordinated.
Another priority is cybersecurity. As you know, today, the
administration released an Executive Order on cybersecurity. It is my
understanding that the strategy calls for strong privacy and civil
liberties protections and recognizes the necessary leadership of the
Department of Homeland Security in establishing a voluntary program to
promote the adoption of a Cybersecurity Framework. This strategy sounds
a great deal like the PRECISE Act, a bill this committee marked up last
Congress but was prevented from moving to the Floor by the Majority
leadership. As we review cybersecurity, I hope we can try once again to
take the PRECISE Act to the floor of the House.
Third, I appreciate your identification of the management and
administrative functions of the Department as one of your priorities.
As you may know, since the inception of the Department, I have worked
to bring accountability and transparency to their personnel and
contracting practices. The Department cannot succeed unless every
component is brought into an organizational structure that gives
headquarters command and control over the most basic personnel rules
and contracting procedures. Without such centralized authority and
accountability, we should not be surprised by stories of waste, fraud,
and abuse.
Fourth, I look forward to working with you to explore the terrorist
threat, no matter where that threat originates. We must not take a
myopic approach. We must protect this country from all enemies--foreign
and domestic. Our view of the terrorist threat must include domestic
terrorism. The focus on domestic terrorism was notably absent in the
last Congress.
Finally, I noticed that disaster response and recovery was not
included in your list of priorities. I would urge you to add this
important area. No corner of this Nation is safe from the devastation
of a natural disaster. Our people must know that we will not forget
them and are committed to improving the systems that must serve them in
their most dire moment--whether in Hattiesburg, Mississippi, or New
York City, New York.
Chairman McCaul. I thank you the Ranking Member. Let me
just comment, us both being from Gulf Coast States that I join
with you in your commitment to disaster response, and I look
forward to a Congress where I believe we can work in a
bipartisan way to get things done.
I have met with Senator Carper and Coburn who Chair and the
Ranking Member of the Homeland Security Committee in the
Senate. Hopefully we can work in a bicameral way to get
something done and passed and signed into one.
So with that, I am pleased to have five distinguished
witnesses before us today on this important topic. The first--
and actually, all of you are no strangers to this committee.
Admiral Thad Allen is the senior vice president at Booz
Allen Hamilton. He completed his distinguished career in the
United States Coast Guard as its 23rd Commandant. In 2010,
President Obama selected Admiral Allen to serve as the national
incident commander for the unified response to the Deepwater
Horizon oil spill in the Gulf Coast of Mexico. Prior to his
assignment as Commandant, Admiral Allen served as Coast Guard
chief of staff.
Mr. Shawn Henry is a retired executive assistant director
of the FBI's Cyber Division. He is credited with boosting the
FBI's computer crime and cybersecurity investigative
capabilities. He oversaw computer crime investigation spanning
the globe including denial-of-service attacks, bank and
corporate breaches, and state-sponsored intrusions. He is
currently the president of CrowdStrike Services.
The Honorable Michael Leiter served under two presidents as
the director of the National Counterterrorism Center until--
from June 2008 to July 2011. He remains a highly respected
voice on terrorism threats and National security.
Currently, Mr. Leiter is the senior counsel to the chief
executive officer of Palantir Technologies. In addition, he
serves as the national security and counterterrorism analyst
for NBC news.
The Honorable David Walker is the founder and CEO of the
Comeback America Initiative. In this capacity, he leads CAI's
efforts to promote fiscal responsibility. Prior to assuming his
current position, Mr. Walker served as the 7th comptroller
general of the United States and head of the U.S. Government
Accountability Office for nearly 10 years.
I must commend you, you were one of the first to identify
really that the debt problem that we have in the United States
is truly a National security issue, and for that, we are very
grateful.
Mr. Clarke Kent Ervin; no stranger to this committee; no
stranger to me. We worked together under attorney general, now
Senator John Cornyn. He is a member of the Homeland Security
Defense Technology Transfer and International Practice Groups
at Patton Boggs Law Firm in Washington, DC.
He previously served as first inspector general for the
Department of Homeland Security under President Bush. He has
been a member of the Homeland Security Secretary Janet
Napolitano's Homeland Security Advisory Council since 2009.
The witnesses' full written statements will appear in the
record. The Chairman now recognizes Admiral Allen for 5 minutes
for an opening statement.
STATEMENT OF ADMIRAL THAD W. ALLEN (RET.), SENIOR VICE
PRESIDENT, BOOZ ALLEN HAMILTON
Admiral Allen. Thank you, Mr. Chairman, for the opportunity
to be here this morning.
Mr. Thompson, it is good to see you again.
It is good to appear before the committee.
This morning I would like to talk about one specific aspect
of homeland security understanding there is a broad set of
challenges as you have articulated. We have got a distinguished
panel that is going to address things like cybersecurity, which
is a very important issue for all of us to think about.
I would like to talk a little bit about the borders and
maybe take a different approach on how we think about the
borders in advance considering strategy and also the upcoming
second Quadrennial Homeland Security Review.
Being from Tucson, Arizona and being raised in the
Southwest and having operated for 39 years in the Coast Guard
and as part of the Department of Homeland Security since its
inception, I think it is important to understand that when we
talk about the border we tend to think about the border from
where we see it and where we sit.
It is much different at a port of entry and between ports
of entry. The maritime domain is a band of various bands of
jurisdiction. We have air and space and obviously cyber as
well.
I think as we move forward, know that we have passed the
10-year mark of homeland security, we need to stop thinking
about border function as an aggregation of the authorities and
the jurisdictions of the components that were brought into the
Department whether it was the former INS inspection function or
the customs inspection function and start to think about it as
a system of responsibilities that we as a sovereign nation
carry out.
There are geographical and physical aspects to the border
and we understand those very, very well and they are drawn on
maps, but a lot of the trade and security practices in and
around the border actually take place without any human
intervention.
You can have cargo leave Europe, pass into the United
States, the documentation associated with that and the shippers
are evaluated, algorithms are checked, and if there is any
suspect cargo, that is pulled aside and is checked.
Absent that, the fees are transferred, tariffs are paid,
and you have a light bulb moved from Romania to Omaha. I think
looking forward in the Department we need to start thinking
about the virtual aspects of the border together with the
geographical and physical aspects and not take it as a
collection of authorities and jurisdictions of the components.
We need to understand what it is we want to do as a Nation
at the border, how to carry out our sovereign responsibility to
manage borders in a global commons and understand the
interaction of what happens with trade and security.
Operational control of the border is something that has
been discussed for a number of years. The fact of the matter
is, that varies on where you are at on the border.
Operational control of the border is a very different at
Otay Mesa and Juarez than it is in Ojinaga and the big, big
bang country of Texas and I think we need to understand that
any particular stretch of the border there are different ways
to look at what constitutes border security and what is the
best way to establish operational control, and I think we need
a consensus on how to move forward.
As we transition from the air domains, the sea domains, and
the land domains, there needs to be better integration between
TSA, the Coast Guard, CBP, and within CBP between the field
operations inspection function and the Border Patrol function
between the ports of entry.
This includes increased data sharing. You mentioned
situational awareness. We need to create a common operating
picture that can be shared across those domains and increase
the interoperability between the agencies that have authorities
and jurisdictions out there.
We need to look at things like preclearance for TSA and CBP
and expand that wherever we can. It is better to address those
threats before they even get near the United States. That is
part of managing the borders as well.
I think if we can come up with a system of systems that
constitutes what our strategy and our strategic intent is, our
vision for the future of the country in carrying out to those
sovereign responsibilities, we should pull ourselves towards
that future and not try and incrementally change what was put
together in 2003 under the exigencies of the Homeland Security
Act passage, which 10 years later we have not materially
changed either organizationally in terms of authorities and
jurisdictions or capabilities.
My recommendation to the committee would be to pursue
strategic change in the context of the Quadrennial Homeland
Security Review that will be conducted in the next year and the
better we can integrate the development of strategy and
implementation of change in homeland security through that
vehicle, it will be consistent with the Homeland Security Act
and in my view, should drive resource and budget allocation
decisions.
I would be happy to answer any questions, sir.
[The prepared statement of Admiral Allen follows:]
Prepared Statement of Thad W. Allen
13 February 2013
Mr. Chairman, Ranking Member Thompson, and Members of the
committee, I am pleased to have been invited to testify on this
important topic and I thank you for the opportunity.
A Retrospective
Mr. Chairman, the 1st of March will mark the Tenth Anniversary of
stand-up of the Department of Homeland Security. The Department was
officially created on the 24th of January 2003, but the operating
components from other departments were not moved to DHS until 1 March
2003 when the Department became operational. From the signing of the
Homeland Security Act on 25 November 2012 to the actual operation of
the Department on 1 March barely 3 months passed. I am not here to
dwell on the past but it is important to understand the circumstances
under which the Department was created.
While this could be considered Government at light speed, little
time was available for deliberate planning and thoughtful consideration
of available alternatives. The situation was complicated by the fact
that the law was passed between legislative sessions and in the middle
of a fiscal year. Other than Secretary Ridge, early leadership
positions were filled by senior officials serving in Government.
Confirmation was not required to be ``acting.'' Funding was provided
through the reprogramming of current funds from across Government for
Departmental elements that did not have existing appropriations from
their legacy departments.
Operating funds for components that were transferred were
identified quickly and shifted to new accounts in the Department to
meet the deadline. Because of the wide range of transparency and
accuracy of the appropriation structure and funds management systems of
the legacy departments some of the new operational components faced a
number of immediate challenges. Estimating the cost of salaries for
Customs and Border Protection (CBP) or Immigration and Customs
Enforcement (ICE) required the combination of different work forces,
with different grade structures, different career ladders, and
different work rules.
Basic mission support functions of the Department such as financial
accounting, human resource management, real property management,
information resource management, procurement, and logistics were
retained largely at the component level in legacy systems that varied
widely. Funding for those functions was retained at the component level
as well. In those cases where new entities were created (i.e.
Departmental-level management and operations, the Under Secretary for
Science and Technology, the Under Secretary for Intelligence and
Analysis, the Domestic Nuclear Detection Office) support systems had to
be created rapidly to meet immediate demands of mission execution.
Finally, components and Departmental offices that did not preexist the
legislation were located in available space around the Washington, DC
area and the Secretary and number of new functions were located at the
Nebraska Avenue Complex in Northwest Washington.
At the time of this transition I was serving as the Coast Guard
Chief of Staff and was assigned as the Coast Guard executive to
overseas the Service's relocation from the Department of Transportation
to the new Department. We began planning for eventual relocation as
soon as the administration submitted legislation to the Congress. I
also assigned personnel to the Transition Planning Office (TPO) that
was created in the Office of Management and Budget by Executive Order
to prepare for the transition. A considerable challenge during this
period was the fact that the TPO was part of the Executive Office of
the President and there were legal limitations on how much of their
work could be shared externally. As a result much of that effort was
redone or duplicated when the Department was created.
As I noted earlier, my intent is not to dwell on the past but to
frame the degree of difficulty facing the leaders attempting to stand
up the Department from the outset. Many of these issues persist today,
10 years later. Despite several attempts to centralize and consolidate
functions such as financial accounting and human resource management,
most support functions remain located in Departmental components and
the funding to support those functions remains in their appropriations.
Because of dissimilarities between appropriations structures of
components transferred from legacy departments there is a lack of
uniformity, comparability, and transparency in budget presentations
across the Department. As a result it is difficult to clearly
differentiate, for example, between personnel costs, operations and
maintenance costs, information technology costs, and capital
investment. Finally, the 5-year Future Years Homeland Security Plan
(FYHSP) required by the Homeland Security Act has never been
effectively implemented as a long-rang planning, programming, and
budgeting framework inhibiting effective planning and execution of
multi-year acquisitions and investments.
In the Washington Area the Department remains a disjointed
collection of facilities and the future of the relocation to the St.
Elizabeth's campus remains in serious doubt. As the Chief of Staff of
the Coast Guard and Commandant I committed the Coast Guard to the move
to St. Elizabeth and only asked that we be collocated with our
Secretary and not be there alone. The Coast Guard will move to St.
Elizabeth's this year . . . alone. One of the great opportunity costs
that will occur if colocation does not happen will be the failure to
create a fully functioning National Operations Center for the
Department that could serve at the integrating node for Departmental-
wide operations and establish the competency and credibility of the
Department to coordinate homeland security-related events and responses
across Government as envisioned by the Homeland Security Act. As with
the mission support functions discussed earlier, the Department has
struggled to evolve an operational planning and mission execution
coordination capability. As a result, the most robust command-and-
control functions and capabilities in the Department reside at the
component level with the current NOC serving as a collator of
information and reporting conduit for the Secretary.
The combination of these factors, in my view, has severely
constrained the ability of the Department to mature as an enterprise.
And while there is significant potential for increased efficiencies and
effectiveness, the real cause for action remains the creation of unity
of effort that enables better mission performance. In this regard there
is no higher priority than removing barriers to information sharing
within the Department and improved operational planning and execution.
Effective internal management and effective mission execution require
the same commitment to shared services, information systems
consolidation, the reduction in proprietary technologies and software,
and the employment of emerging cloud technologies.
Mr. Chairman, this summary represents my personal views of the more
important factors that influenced the creation and the first 10 years
of the Department's operations. It is not all-inclusive but is intended
to be thematic and provide a basis for discussion regarding the future.
Looking to the future the discussion should begin with the Department's
mission and the need to create unity of effort internally and across
the homeland security enterprise. I made similar comments before the
Senate Committee on Homeland Security and Government Affairs last year.
The Future
The Quadrennial Homeland Security Review was envisioned as a
vehicle to consider the Department's future. The first review completed
in 2010 described the following DHS missions:
Preventing Terrorism and Enhancing Security;
Securing and Managing Our Borders;
Enforcing and Administering our Immigration Laws;
Safeguarding and Securing Cyberspace;
Insuring Resiliency to Disasters.
An additional area of specific focus was the maturation of the
homeland security ``enterprise'' which extends beyond the Department
itself to all elements of society that participate in and contribute to
the security of the homeland.
The QHSR outcomes were consistent with the fiscal year 2010 budget
that was submitted in early 2009 following the change of
administrations. That request laid out the following mission priorities
for the Department:
Guarding Against Terrorism;
Securing Our Borders;
Smart and Tough Enforcement of Immigration Laws and
Improving Immigration Services;
Preparing For, Responding To, and Recovering From Natural
Disasters;
Unifying and Maturing DHS.
The fiscal year 2010 budget priorities and the follow-on QHSR
mission priorities have served as the basis for annual appropriations
requests for 4 consecutive fiscal years.
I participated in the first review prior to my retirement and we
are approaching the second review mandated by the Homeland Security
Act. This review presents an opportunity to assess the past 10 years
and rethink assumptions related to how the broad spectrum of DHS
authorities, jurisdictions, capabilities, and competencies should be
applied most effectively and efficiently against the risks we are
likely to encounter . . . and how to adapt to those that cannot be
predicted. This will require a rethinking of what have become
traditional concepts associated with homeland security over the last 10
years.
Confronting Complexity and Leading Unity of Effort
Last year in an issue of Public Administration Review (PAR), the
journal of the American Society for Public Administration (ASPA), I
wrote an editorial piece entitled ``Confronting Complexity and Leading
Unity of Effort.'' I proposed that the major emerging challenge of
public administration and governing is the increased level of
complexity we confront in mission operations, execution of Government
programs, and managing non-routine and crisis events. Driving this
complexity are rapid changes in technology, the emergence of a global
community, and the ever-expanding human-built environment that
intersects with the natural environment in new, more extreme ways.
The results are more vexing issues or wicked problems we must
contend with and a greater frequency of high-consequence events. On the
other hand advances in computation make it possible to know more and
understand more. At the same time structural changes in our economy
associated with the transition from a rural agrarian society to a post-
industrial service/information economy has changed how public programs
and services are delivered. No single Department, agency, or bureau has
the authorizing legislation, appropriation, capability, competency, or
capacity to address this complexity alone. The result is that most
Government programs or services are ``co-produced'' by multiple
agencies. Many involve the private/non-governmental sector, and, in
some cases, international partners. Collaboration, cooperation, the
ability to build networks, and partner are emerging as critical
organizational and leadership skills. Homeland security is a complex
``system of systems'' that interrelates and interacts with virtually
every department of Government at all levels and the private sector as
well. It is integral to the larger National security system. We need
the capabilities, capacities, and competency to create unity of effort
within the Department and across the homeland security enterprise.
mission execution and mission support
As we look forward to the next decade I would propose we consider
two basic simple concepts: Mission execution and mission support.
Mission execution is deciding what to do and how to do it. Mission
support enables mission execution.
Mission Execution . . . Doing the Right Things Right
As a precursor to the next QHSR there should be a baseline
assessment of the current legal authorities, regulatory
responsibilities, treaty obligations, and current policy direction
(i.e. HSPD/NSPD). I do not believe there has been sufficient visibility
provided on the broad spectrum of authorities and responsibilities that
moved to the Department with the components in 2003, many of which are
non-discretionary. Given the rush to enact the legislation in 2002 it
makes sense to conduct a comprehensive review to validate the current
mission sets as established in law.
The next step, in my view, would be to examine the aggregated
mission set in the context of the threat environment without regard to
current stove-piped component activities . . . to see the Department's
mission space as a system of systems. In the case of border security/
management, for example, a system-of-systems approach would allow a
more expansive description of the activities required to meet our
sovereign responsibilities.
Instead of narrowly focusing on specific activities such as
``operational control of the border'' we need to shift our thinking to
the broader concept of the management of border functions in a global
commons. The border has a physical and geographical dimension related
to the air, land, and sea domains. It also has a virtual, information-
based dimension related to the processing of advance notice of
arrivals, analysis data related to cargoes, passengers, and
conveyances, and the facilitation of trade. These latter functions do
not occur at a physical border but are a requirement of managing the
border in the current global economic system.
The air and maritime domains are different as well. We prescreen
passengers at foreign airports and the maritime domain is a collection
of jurisdictional bands that extend from the territorial sea to the
limits of the exclusive economic zone and beyond.
The key concept here is to envision the border as an aggregation of
functions across physical and virtual domains instead of the isolated
and separate authorities, jurisdictions, capabilities, and competencies
of individual components. Further, there are other Governmental
stakeholders whose interests are represented at the border by DHS
components (i.e. Department of Agriculture, DOT/Federal Motor Carriers
regarding trucking regulations, NOAA/National Marine Fisheries Service
regarding the regulation of commercial fishing).
A natural outcome of this process is a cause for action to remove
organizational barriers to unity of effort, the consolidation of
information systems to improve situational awareness and queuing of
resources, and integrated/unified operational planning and coordination
among components. The additional benefits accrued in increased
efficiency and effectiveness become essential in the constrained budget
environment. The overarching goal should always be to act with
strategic intent through unity of effort.
A similar approach could be taken in considering the other missions
described in the QHSR. Instead of focusing on ``insuring resiliency to
disasters'' we should focus on the creation and sustainment of National
resiliency that is informed by the collective threat/risks presented by
both the natural and human-built environments. The latter is a more
expansive concept than ``infrastructure'' and the overall concept
subsumes the term ``disaster'' into larger problem set that we will
face. This strategic approach would allow integration of activities and
synergies between activities that are currently stovepiped within FEMA,
NPPD, and other components. It also allows cybersecurity to be seen as
an activity that touches virtually every player in the homeland
security enterprise.
In regard to terrorism and law enforcement operations we should
understand that terrorism is, in effect, political criminality and as a
continuing criminal enterprise it requires financial resources
generated largely through illicit means. All terrorists have to
communicate, travel, and spend money, as do all individuals and groups
engaged in criminal activities. To be effective in a rapidly-changing
threat environment where our adversaries can quickly adapt, we must
look at cross-cutting capabilities that allow enterprise-wide success
against transnational organized criminal organizations, illicit
trafficking, and the movement of funds gained through these activities.
As with the ``border'' we must challenge our existing paradigm
regarding ``case-based'' investigative activities. In my view, the
concept of a law enforcement case has been overtaken by the need to
understand criminal and terrorist networks as the target. It takes a
network to defeat a network. That in turn demands even greater
information sharing and exploitation of advances in computation and
cloud-based analytics. The traditional concerns of the law enforcement
community regarding confidentiality of sources, attribution, and
prosecution can and must be addressed, but these are not technology
issues . . . they are cultural, leadership, and policy issues.
Mr. Chairman, this is not an exhaustive list of proposed missions
or changes to missions for the Department. It is an illustrative way to
rethink the missions of the Department given the experience gained in
the last 10 years. It presumes the first principals of: (1) A clear,
collective strategic intent communicated through the QHSR, budget,
policy decisions, and daily activities, and (2) an unyielding
commitment to unity of effort that is supported by an integrated
planning and execution process based on transparency and exploitation
of information to execute the mission.
Mission Support . . . Enabling Mission Execution
Mr. Chairman, in my first 2 years as Commandant I conducted an
exhaustive series of visits to my field commands to explain my cause
for action to transform our Service. In those field visits I explained
that when you go to work in the Coast Guard every day you do one of two
things: You either execute the mission or you support the mission. I
then said if you cannot explain which one of these jobs you are doing,
then we have done one of two things wrong . . . we haven't explained
your job properly or we don't need your job. This obviously got a lot
of attention.
In the rush to establish the Department and in the inelegant way
the legacy funding and support structures were thrown together in 2003,
it was difficult to link mission execution and mission support across
the Department. To this day, most resources and program management of
support functions rest in the components. As a result normal mission
support functions such as shared services, working capital funds, core
financial accounting, human resources, property management, and
integrated life cycle-based capital investment have been vexing
challenges.
There has been hesitancy by components to relinquish control and
resources to a Department that appears to be still a work in progress.
The structure of Department and component appropriations does not
provide any easy mechanism for Departmental integration of support
functions. As a result information sharing is not optimized and
potential efficiencies and effectiveness in service delivery are not
being realized. As I noted earlier, a huge barrier to breaking this
deadlock is the lack of uniformity in appropriations structures and
budget presentation. This problem has been compounded by the failure to
implement a 5-year Future Years Homeland Security Plan and associated
Capital Investment Plan to allow predictability and consistency across
fiscal years.
Mr. Chairman, having laid out this problem, I see three possible
ways forward. The desirable course of action would be to build the
trust and transparency necessary for the Department and components to
collective agree to rationalize the mission support structure and come
to agreements on shared services. The existing barriers are
considerable but the first principals of mission execution apply here
as well . . . unambiguous, clearly communicated strategic intent and
unity of effort supported by transparency and knowledge-based
decisions. A less palatable course of action is top-down directed
action that is enforced through the budget process. The least desirable
course of action is externally-mandated change. Unfortunately, the
current fiscal impasse and the need to potentially meet sequester
targets while facing the very real prospect of operating under a
continuing resolution for the entire fiscal year 2013 represents the
confluence of all of these factors and a fiscal perfect storm. There is
a case to act now. We should understand that a required first step that
lies within the capability of the Department would be to require
standardized budget presentations that can serve as the basis for
proposed appropriations restructuring to clearly identify the sources
and uses of funds and to separate at a minimum personnel costs,
operating and maintenance costs, information technology costs, capital
investment, and facility costs.
Creating and Acting with Strategic Intent
Mr. Chairman, I have attempted to keep this testimony at a
strategic level and focus on thinking about the challenges in terms
that transcend individual components, programs, or even the Department
itself. I have spoken in the last year to the Department of Homeland
Security Fellows and the first DHS Capstone course for new executives.
I have shared many of the thoughts provided today over the last 10
years to many similar groups. Recently, I have changed my message.
After going over the conditions under which the Department was formed
and the many challenges that still remain after 10 years, I was very
frank with both groups. Regardless of the conditions under which the
Department was created and notwithstanding the barriers that have
existed for 10 years, at some point the public has a right to expect
that the Department will act on its own to address these issues.
Something has to give. In my view, it is the responsibility of the
career employees and leaders in the Department to collectively
recognize and act to meet the promise of the Homeland Security Act.
That is done through a shared vision translated into strategic intent
that is implemented in daily activities from the NAC to the border
through the trust and shared values that undergird unity of effort. It
is that simple; it is that complex.
I understand the committee is considering whether the Department
should develop a comprehensive border strategy that would encompass all
components and entities with border equities, including State and local
law enforcement. I also understand there is concern about performance
metrics associated with carrying out such a strategy. There are also
potential opportunities related to the equipment being returned from
military operations in Iraq and Afghanistan. Finally, we are witnessing
a transition of leadership in Mexico as we continue to jointly address
the threat of drug and other illicit trafficking as a major hemispheric
threat.
In considering the strategic course of action going forward
regarding the management of the border in a global commons or any of
the diverse missions of the Department of Homeland Security, we should
remember then General Eisenhower's admonition that ``Plans are nothing;
planning is everything.'' I have been involved in strategic planning
for decades I can attest to their value. Done correctly that value is
derived from a planning process that forces critical thinking,
challenges existing assumptions, creates shared knowledge and
understanding, and promotes a shared vision. Accordingly, I would be
more concerned about the process of developing a strategy than the
strategy itself. It is far more important to agree on the basic terms
of reference that describe the current and likely future operating
environment and to understand the collective capabilities,
competencies, authorities, and jurisdictions that reside in the
Department as they relate to that environment and the threats
presented.
I believe the Homeland Security Act envisioned that process to be
the Quadrennial Homeland Security Review. Accordingly, the committee
may want to consider how that process that is already mandated in law
might become the vehicle to create strategic intent. Intent that
unifies Departmental action, drives resource allocation, integrates
mission support activities, removes barriers to information sharing and
creates knowledge.
Strategic Intent and the Border
I am often asked, in the wake of the Deepwater Horizon oil spill,
``Is it safe to drill offshore?'' My answer to that question is
relevant to any consideration of how we carry out the sovereign
responsibilities of a Nation in managing our border. My answer is that
there is no risk-free way to extract hydrocarbons from the earth. The
real question is: ``What is the acceptable level of risk associated
with those activities in light of the fact that it will take a
generation to develop alternate fuels?'' Likewise, there is no risk-
free way to manage a border short of shutting it down. Discussions
about operational control of the border and border security too often
focus on specific geographical and physical challenges related to
managing the land border. While those challenges exist, they cannot
become the sole focus of a strategy that does not account of all
domains (air, land, sea, space, and cyber) and the risks and
opportunities that the border represents. As I mentioned earlier we
need to think of the border as a set of functions. We need to think
about what is the acceptable level of risk associated with those
functions. We cannot neglect trade and become fixated on driving risk
to zero; it cannot be done.
Whether it is TSA considering options for passenger and cargo
screening, the Coast Guard considering the trade-offs between fisheries
and drug enforcement, ICE considering resource allocation to protect
intellectual property or remove dangerous aliens, NPPD considering how
to deal with cyber threats to infrastructure, or USCIS deciding how
immigration reform would drive demand for their services, the real
issue is the identification and management of risk. Those decision are
made daily now from the Port of Entry at Nogales to the Bering Sea,
from TSA and CBP pre-clearance operations in Dublin to Secret Service
protection of the President, and from a disaster declaration following
a tornado in Mississippi to the detection of malware in our networks.
The question is: How are they linked? Are those actions based on a
shared vision that make it clear to every individual in the Department
what their role is in executing or supporting the mission?
A strategy for the border or any DHS mission ideally would merely
be the codification of strategic intent for record purposes to support
enterprise decisions. The creation of self-directed employees that
understand their role in Departmental outcomes on a daily basis in a
way that drives their behavior should be the goal. If a border strategy
is desired, I believe it must be preceded by a far deeper introspective
process that addresses how the Department understands itself and its
missions as a unified, single enterprise.
Chairman McCaul. Thank you, Admiral Allen.
Mr. Henry, you are now recognized for 5 minutes.
STATEMENT OF SHAWN HENRY, PRESIDENT, CROWDSTRIKE SERVICES
Mr. Henry. Good morning Chairman McCaul, Ranking Member
Thompson, and Members of the committee.
I appreciate the opportunity to be here with you this
morning to talk to you about the cyber threat that we face as a
Nation and some of the significant economic and National
security challenges that we are at risk against. I appreciate
the level of attention that the committee is affording this
issue.
I know I have spoken of cyber threat for so long, but I
think it is just so important and it can't be overemphasized.
So I need to state it again emphatically that there are foreign
adversaries that have targeted every major organization in this
country. In each of your districts, major companies that have
been breached and there has been a tremendous impact on the
economy there and on their ability to be competitive in a
global society.
They have stolen untold billions of dollars of intellectual
property, research and development, and corporate strategies
and secrets and the volume and sophistication of these cyber
threats is only increasing and I don't see that that is going
to change in the current environment.
Over time, a cyber adversary with motivation, time, and
resources will breach every network that is connected or every
computer system that is directly accessible to the internet.
I stated publicly that it is necessary for network
administrators to assume they have already been breached rather
than waiting for the intrusion detection systems to tell them.
Many have absolutely no knowledge that this is occurring
and they don't know that adversaries remain resident on their
network many times for months or even years before they are
ever identified, if at all.
While I was executive assistant director at the FBI, my
agents went out routinely, dozens of times every month, and
told companies that they had been breached and they had no idea
that that had occurred meaning that all of their proprietary
data, their communications, their financial statements had been
completely accessible to the adversary with unfettered access
on that network.
Organizations therefore, must aggressively, constantly look
on their network for the adversary and hunt for those
adversaries. Alarmingly and increasingly, attackers are moving
beyond mere theft of information and they are moving into the
actual manipulation or the destruction of data and with the
depth and breadth of access that they have that is not a hard
or difficult task to accomplish.
Those with malicious intent can take devastating actions,
and it is difficult to say with confidence that our critical
infrastructure will be available when we most need it.
There needs to be a paradigm shift in the way we address
these issues. Vulnerability mitigation is the current
cybersecurity approach in the private sector, and it has been
the focus for more than 20 years. We continuously focus on
hardening the networks through ``Defense-in-Depth'', using
firewalls and anti-virus, looking at patching vulnerabilities,
and employing intrusion detection systems.
This approach generally stops those actors who do not care
who they are trying to breach, like the opportunistic burglar
who goes from house to house shaking the doorknob.
One mistake, however, is that we are using the same
approach against the most sophisticated state-funded actors who
actually have specific targets in mind. They have got
intelligence requirements and they are looking for very
specific information and they will get that information. Again,
over time, they will breach those networks.
Unlike the thief of opportunity, they are seeking the Hope
Diamond, something very, very specific, and those advanced and
well-funded adversaries will make sure that they achieve their
goal.
While we must continue to improve our defenses, we must
continue to build and have defense-in-depth. We need to focus
our efforts on the threat. Employing a threat mitigation
strategy requires an increased ability to detect and identify
our adversaries and penalize them, not merely defend against
them.
It is the identical strategy that we use and employ in the
physical world every single day to thwart criminals,
terrorists, and spies.
Achieving these goals in the cyber environment will require
unprecedented coordination between private industry--which as a
whole has network ownership and the ability to achieve these
goals--and the Government, which is primarily authorized to
investigate and penalize them.
Inevitably we must bring the private sector and the
Government together to achieve the goal of threat deterrence.
The vast majority of the intelligence that will lead to
information and identification of the adversaries resides on
private-sector networks; they are, in essence, ``crime
scenes,'' and the evidence and artifacts are resident on those
networks.
That intelligence can't be shared periodically through
human interaction, but it needs to be shared among all victims
immediately at network speed.
The Department of Homeland Security may be able to share
with vulnerability reduction strategies and guidelines with the
private sector and likewise they are responsible for
consequence management after a breach.
Additionally, though, under a threat mitigation model, DHS
is a potential intermediary between other Government agencies
and the private sector where they can collect intelligence
which leads to identification and attribution of the adversary.
Likewise, the Government has intelligence collection that
will make the private sector infinitely more resilient and they
need to share that information aggressively.
I know how the intelligence is collected and I recognize
there needs to be a protection of sources and methods, but
there is a lot more that the Government is able to do.
Any intelligence sharing between Government and private
sector must be done in a way that is respectful of and
consistent with privacy of our citizens, and we must start by
opening the debate on the limitations of the existing
defensive-only security model and the necessity of a threat
deterrence model.
I look forward to working with the committee and Congress
as a whole to determine a successful course forward for the
Nation that allows us to reap the positive benefits and the
economic benefits of the internet while minimizing the risk
posed by those who seek to do us irreparable harm, and I
encourage our further collaboration.
I am happy to answer any questions.
[The prepared statement of Mr. Henry follows:]
Prepared Statement of Shawn Henry
February 13, 2013
Good afternoon Chairman McCaul, Ranking Member Thompson, and
Members of the committee. Thank you for having me here today to discuss
the cyber threats facing our Nation, how these threats impact our
Government and private-sector networks, and the significant risk posed
to our economic and National security. I sincerely believe this is one
of the most critical issues facing our Nation, and I appreciate the
level of attention this committee is affording it.
the cybersecurity threat
We have spoken of the cyber threats for far too long, but it is too
important and cannot be overemphasized. So I'll state it again,
emphatically . . . foreign adversaries have targeted every major
organization in this country, and have stolen untold billions of
dollars of intellectual property, research and development, and
corporate strategies and secrets. The volume and sophistication of
cyber attacks has increased dramatically over the past 5 years, and in
the current environment it will continue to grow.
Given enough time, motivation, and funding, a determined adversary
will penetrate any system that is accessible directly from the
internet. Even systems not touching the network are susceptible to
attack via means other than remote access, including the trusted
insider using devices such as USB thumb drives, and the supply chain.
I have stated publicly that it is necessary for network
administrators to assume they have already been breached rather than
waiting for their intrusion detection systems to alert them to an
infiltration. Many have absolutely no knowledge that an adversary was,
or remains resident on, their network, often times for weeks, months,
or even years. While I was EAD at the FBI, our agents regularly knocked
on the door of victim companies and told them their network had been
intruded upon and their corporate secrets stolen, because we found
their proprietary data resident on a server in the course of another
investigation. We were routinely telling organizations they were
victims, and these victims ranged in size and industry, and cut across
all critical sectors. Organizations must, therefore, actively and
constantly hunt for the adversary on their network.
Alarmingly and increasingly, attackers are moving beyond mere
exfiltration or theft of data. With the breadth and depth of access
they have, adversaries can and have manipulated, disrupted, or
destroyed data and infrastructure. Those with malicious intent can take
devastating actions, and it is difficult to say with confidence that
our critical infrastructure--the backbone of our country's economic
prosperity, National security, and public health--will remain unscathed
and always be available when needed.
a paradigm shift in strategy
My colleagues at CrowdStrike, George Kurtz and Dmitri Alperovitch,
have talked about the deterrence of threat actors for years. Steven
Chabinsky, my colleague at the FBI for 17 years, and currently with me
at CrowdStrike as SVP of Legal Affairs, also discusses the paradigm
shift necessary in cybersecurity strategy.
Vulnerability mitigation is the current cybersecurity approach in
the private sector, and has been for the past 20 years. We continuously
focus on hardening our networks by ``Defense-in-Depth'', using
firewalls, anti-virus software, patching vulnerabilities, and employing
intrusion prevention systems. This approach generally stops those
actors who do not care who their specific targets are, but are simply
like burglars who are willing to rob anybody's house and take anybody's
jewelry.
Our mistake, however, is that we are using the same approach
against Advanced Persistent Threat actors who actually have specific
targets in mind, and are not going to stop until they have reached
their goals. These modern-day cyber burglars are targeting the
equivalent of the Hope Diamond, quite specifically, not fungible
engagement rings. For our most advanced and well-funded adversaries,
there are no substitutes for their targets, regardless of how many, and
they will continue their onslaught until they achieve success.
Ironically, our own defensive efforts have actually made the
problem worse, by encouraging our adversaries to outperform us, while
we outspend them. Although many are not prepared to consider this
possibility, the result of our failure to distinguish between the
novice and the professional adversary has been a proliferation of more
capable malware, created by nation-state adversaries and organized
crime groups, and an escalation of their activities in order to defeat
our defenses.
what does this mean?
Employing a threat mitigation strategy requires an increased
ability to detect and identify our adversaries, and to penalize them.
This is the identical strategy we employ in the physical world every
single day to thwart criminals, spies, and terrorists.
Achieving these goals in the cyber environment, however, will
require unprecedented coordination between private industry--which as a
whole has the ownership and ability to achieve these goals, and
governments, which are primarily authorized to investigate and penalize
them.
Inevitably we must bring the private sector and the Government
together to achieve the goal of threat deterrence. The vast majority of
the intelligence that will lead to identification of the adversaries
resides on private-sector networks; they are, in essence, ``crime
scenes'', and the evidence and artifacts of the breach are resident on
those networks. That threat intelligence, too, can't be shared
periodically via e-mail at human speed; it needs to be shared among all
victims, in real-time, at network speed. The private sector, then, can
fill tactical gaps that the Government is blind to. This can be done
while respecting privacy, a critical and absolutely necessary element
of intelligence sharing.
The Department of Homeland Security (DHS) naturally has the
responsibility for developing and promulgating necessary vulnerability
reduction strategies and guidelines. Likewise, they are responsible for
consequence management after a breach. Additionally, though, with a
threat mitigation model, DHS is a potential intermediary between other
Government agencies and the private sector to facilitate the analysis
and dissemination of ``big data''--collected intelligence--leading to
identification and attribution of adversaries.
Likewise, the Government has intelligence collection on the threat
actors that is different from, and additive to, that collected by the
private sector. Knowing what I do about that intelligence, and how it's
collected, I am certain the Government can share much more data with
industry than is currently shared today. That intelligence will add
infinite value, and it can be packaged and shared with the private
sector without threatening the integrity of the sources and methods
through which it's collected. Again, privacy is and must remain a key
tenet of any intelligence sharing strategy.
When the adversary is identified, the Government can then use its
resources and actions--whether it's law enforcement, the intelligence
community, diplomatic, or financial--to mitigate the threat posed by
these sophisticated opponents. The consistent threat posed by
adversaries will subside only when the cost to operate outweighs any
potential gain.
conclusion
We face significant challenges in our efforts to combat the cyber
threat. I am optimistic that by strengthening partnerships, effectively
sharing intelligence, and successfully identifying our adversaries, we
can best protect businesses and critical infrastructure from grave
damage.
We must start, however, by opening the debate on the limitations of
the existing defensive-only security model and the necessity of a
threat deterrence model. Further, we need a public discussion of how
Government and industry can jointly work together to achieve a safer
cyber environment by shining a light on our adversaries instead of
consistently telling victims to ``just do more.''
I look forward to assisting the committee, and Congress as a whole,
to determine a successful course forward for the Nation that allows us
to reap the positive economic and social benefits of the internet while
minimizing the risk posed by those who seek to do us irreparable harm.
I encourage our further collaboration, and I'm happy to answer any
questions.
Chairman McCaul. Thank you, Mr. Henry.
Mr. Leiter is now recognized.
STATEMENT OF MICHAEL E. LEITER, FORMER DIRECTOR OF THE NATIONAL
COUNTERTERRORISM CENTER
Mr. Leiter. Chairman McCaul, Ranking Member Thompson, it is
a pleasure to be back in front of the committee and I will take
the liberty of speaking on behalf of all of my co-witnesses; it
is especially nice to be up here as a former Government
official.
I am extremely happy that this committee is looking at all
homeland threats because I think with that change in the
counterterrorism threat or terror threats that we have seen
over the past several years and the very stark fiscal landscape
we face, this is a very appropriate time to do so.
With the death of Osama bin Laden and the weakness of al-
Qaeda in Pakistan, we see the lowest level of sophisticated
threat to the homeland from Pakistan that we have seen since
2001, and that is a very, very good news story thanks to the
work of the men and women of the U.S. Government and our
allies.
That being said, as the Chairman noted, the splintering of
al-Qaeda into a more distributed group with rising dangers in
Yemen, North Africa, East Africa, Europe, and the homeland does
pose new challenges.
In my view, the al-Qaeda affiliate in Yemen, AQAP, still
continues to pose the most serious, sophisticated threat that
we face. As we saw in 2009, 2010, and 2012, the organization
remains committed to sophisticated IED attacks against the
United States and the homeland.
East Africa is surprisingly a brighter spot, something I
thought I might never say about Somalia, but in fact, U.S.
efforts and Kenyan partnership has reduced that threat and most
importantly to this committee, fewer Americans traveling to the
region to fight in the jihad than we have seen for years.
On the other hand, North Africa of course is proven some
serious darkness over the past several months especially, but I
do want to say this carefully, but while the attacks in
Benghazi and the BP oil facility are absolutely tragic, in my
view, the major change in the region is not a massive increase
in the popularity of AQIM, but rather the huge shift that
occurred in the region with the fall of the government in
Libya, the availability of weapons, the loss of partner
security services in the region, and the coup d'etat in Mali.
All of that have combined to create a safe haven which is
in fact dangerous but I think still does not rise to the level
of seriousness that that we have previously seen in Pakistan or
we see today in Yemen.
I especially commend the committee for looking into the
threat of Hezbollah and Iran, which has often been overlooked
over the past 10 years. I think with growing tension between
the United States, Israel, and Iran, Hezbollah has proved
increasingly active over the past several years, most notably
the Bulgarian recognition that Hezbollah targeted and killed
six tourists last year and many other failed Hezbollah attacks.
The Hezbollah's and the Iranian Quds Force growing presence
in Venezuela and elsewhere in the world could prove a serious
problem for the United States and our allies were there to be a
conflict with Iran.
I would also add that Iranian aggressive cyber attacks
against Saudi Aramco and RasGas, destructive cyber attacks,
could also portend for a combined physical and cyber attack by
Iran, were certain red lines crossed.
With that as a threat landscape and looking ahead, let me
offer some quick views as to things that we have to guard
against now 12 years after 9/11.
The first is what I term terrorism fatigue and although
this committee does not experience it, many in the United
States, and I fear many in Congress do. After hearing about
terrorism for 10 or 12 years, people simply don't want to talk
about it anymore and there are two specific threats associated
with this.
First, with all of our counterterrorism successes that we
have had over the past 12 years, which really are incredible, I
fear that any small attack, no matter how small can result in
political finger-pointing and a real crucification of our
counterterrorism professionals, and although we of course have
to look at how we can do this job better, we have to guard
against ex-poste investigations that lack a serious
appreciation for the ex-ante difficulties of counterterrorism
work.
Second, I believe this terrorism fatigue can lead to
dangerous lethargy within the Executive branch. I saw over and
over again how hard and quickly the Executive branch could work
immediately after an attack and then as the months, weeks and
months passed by, I saw the impetus for rapid and important
change start to drop away. So I hope this committee can hold
the Executive branch's feet to the fire on these topics.
Second, weapons of mass destruction. Although this remains
a very low likelihood event and we have done very well in
combating terrorist acquisition of WMD, the high consequences
of such an attack especially biological or radiological or God
forbid, improvised nuclear devices, cannot be forgotten and
these require long-term investments.
Third, our counterterrorism partnerships. I won't go into
detail here but suffice to say with the Arab awakening we have
lost some of our most critical partners in the counterterrorism
fight and that has significantly increased the risk to the
homeland in my view.
Fourth, and this became a high-profile issue over the past
several weeks, I believe we have to stay on the offense on all
fronts. Perhaps unsurprisingly given my service in the Obama
and Bush administrations, I am quite supportive of the policy
outlined in the Department of Justice white paper. I am equally
supportive of the President's call for greater transparency,
and I would urge this committee to work with the intelligence
committee to make sure you have the transparency into these
programs.
But ultimately I believe that these offensive measures
combined with other measures, because this is only one tool,
are absolutely critical to homeland security.
Last but not least, and a good transition to the good
Honorable David Walker. We have spent close to $100 billion a
year on counterterrorism. This is the time to rationalize that
and figure out how we can get the most bang for our buck to
make sure that the American people are safe.
I think the committee and look forward to working with the
Congress in the future.
[The statement of Mr. Leiter follows:]
Prepared Statement of Michael E. Leiter
February 13, 2013
overview
Chairman McCaul, Ranking Member Thompson, and Members of the
committee, thank you for inviting me to testify on my perspectives--
which I hope are at least partially ``new''--on threats to homeland
security. Although the membership on this committee has changed over
the years, this body has always been at the forefront of understanding
threats and shaping our Government's response to them. On behalf of
those who continue to serve in homeland security and intelligence
organizations, I want to thank the committee for its continuing
oversight and support.
As the 113th Congress considers the current threat landscape, I
believe you are correct to reevaluate broadly the state of terrorism
and our associated response. Although the growing presence of al-Qaeda-
associated elements in North Africa and Syria highlight how the threat
of terrorism continues, we have made remarkable strides against the
threat of catastrophic attacks like what we experienced on 9/11.
Combined with a fiscal reality that precludes the sort of spending we
have maintained since that tragic event, this is a historic moment to
rationalize and calibrate our response to terrorism, cyber threats, and
other related threats to the homeland.
the threat landscape
Today al-Qaeda and its allies in Pakistan are at their weakest
point since 9/11. The death of Osama bin Ladin and the continued
decimation of senior ranks has made the organization a shadow of its
former self. Ayman al Zawahiri is not bin Ladin and although the
organization still attempts to provide strategic guidance and global
propaganda, its influence continues to wane. Whether this trajectory
can be maintained with a significant decrease of the U.S. presence in
Afghanistan in the coming years will be, in my view, the single biggest
determinant of al-Qaeda Core's relevance for the coming decade.
The degradation of al-Qaeda's ``higher headquarters'' and
relatively well-coordinated command and control has allowed its
affiliates and its message to splinter, posing new dangers and
challenges. Al-Qaeda affiliates or those inspired by its message have
worrisome presences in Yemen, East Africa, North Africa, Syria, Western
Europe, and of course to a lesser degree the United States.
Beginning with Yemen, in my view al-Qaeda in the Arabian Peninsula
(AQAP)--as I stated 2 years ago--continues to pose the most
sophisticated and deadly threat to the U.S. homeland from an overseas
affiliate. The death of operational commander Anwar al-Awlaki
significantly reduced AQAP's ability to attract and motivate English
speakers, but its operational efforts continue with lesser abatement.
As we saw in 2009, 2010, and 2012, AQAP has remained committed--and
able--to pursue complex attacks involving innovative improvised
explosives devices. Although some of the organization's safe haven has
been diminished because of Yemeni and U.S. efforts, the inability of
the government of Yemen to bring true control to wide swaths of the
country suggests that the group will pose a threat for the foreseeable
future and (unlike many other affiliates) it clearly remains focused on
transnational attacks.
East Africa, surprisingly to many, is a brighter spot in our
efforts. Although al-Shabaab remains a force and poses significant
risks in the region--most especially in Kenya and to the fledgling
government in Somalia--its risk to the homeland is markedly less today
than just 2 years ago. Kenya's offensive in the region shattered much
of al-Shabaab's power base and most importantly for this committee the
attractiveness of Somalia to Americans and other Westerners is
radically less than was the case. The relative flood of Americans has
turned into a trickle, thus significantly reducing the threat of
trained terrorists returning to our shores.
As the world witnessed over the past 6 months, however, al-Qaeda in
the Islamic Maghreb (AQIM) has shifted the focus in Africa as the
organization has made gains in Mali, Libya, and the rural areas of
Algeria. But while the attacks in Benghazi and on the Algerian oil
facility are of course tragic, in my view the major change to the
region is not a massive increase in AQIM's attractiveness, but rather
the huge shift that occurred with the virtual elimination of Libya's
security services, the associated flood of weapons in the region, and
the coup d'etat in Mali.
AQIM has thus far proven a less tactically proficient and more
regionally-focused criminal organization than other al-Qaeda
affiliates. Although we cannot blindly hope this remains the case, we
should also not read too much into recent events. Regional capacity-
building, targeted offensive measures, and forceful engagement with
governments like France, Algeria, and Libya that have a huge vested
interest in the region should remain at the forefront of our strategy.
And we must roundly condemn those who against every lesson of the past
several years might be willing to pay ransoms to AQIM and its
affiliates.
One notable area of concern that we must forcefully combat in the
region--and one which the United States is uniquely able to address
given our global footprint--is the cross-fertilization across the
African continent that has recently accelerated. Coordination amongst
al-Shabaab, AQIM, Boko Haram, and others is particularly problematic as
it allows each organization to leverage the others' strengths. We must
use our intelligence capabilities to define these networks and then
assist in disrupting them. And our screening of travelers to the United
States must recognize the dangers associated with these networks.
The most troubling of emerging fronts in my view is Syria, where
Jabhat al-Nusra has emerged as the most radical of groups within the
opposition. Given the enormous instability in Syria, which has to some
degree already spread to Iraq and elsewhere in the Levant, Jabhat al-
Nusra has become a magnet for al-Qaeda-inspired fighters from around
the globe. With little likelihood of rapid improvements in Syria, the
al-Nusra front will almost certainly continue to arm, obtain real-world
combat experience, and attract additional recruits--and potentially
state assistance that is flowing to the FSA. Moreover, Jabhat al-
Nusra's ideology not only contributes to the threat of terrorism, but
more broadly it is contributing significantly to the regional Sunni-
Shia tension that poses enormous risks. The rapid removal of Bashar al-
Assad would not solve these problems, but an on-going civil war does in
my view worsen the situation.
Without declaring victory, we should also have some optimism about
al-Qaeda-inspired terrorism in Western Europe and especially the
homeland. As recent studies have shown, there has been a continuing
decline in numbers of significant homeland plots that have not been
closely controlled by the FBI since 2009. In addition, the relative
sophistication of homeland terrorists has not increased. Combined with
successful counterterrorism efforts in Western Europe--most
particularly huge strides in the United Kingdom--the picture faced
today is far brighter than just 3 years ago.
Similar optimism cannot be applied to the threat posed by Lebanese
Hezbollah, especially given its successful and foiled attacks over the
past 2 years. Most notably, Hezbollah attack in Bulgaria killed six
tourists and highlights the extent to which the group (and its patrons
in Iran) continue to see themselves as being in an on-going
unconventional war with Israel and the United States. Predicting
Hezbollah and Iranian ``redlines'' is a notoriously challenging
endeavor--as illustrated by the surprising 2011 plot to kill the Saudi
Ambassador to the United States--but both organizations almost
certainly would launch attacks at least outside the United States were
there a strike on Iranian nuclear facilities.
There is little doubt that both Hezbollah and the IRGC Qods Force
maintain a network of operatives that could be used for such strikes.
In this regard the heavy Iranian presence in Latin America and Iranian
cooperation with Venezuelan President Hugo Chavez is of particular
concern. Although not every Hezbollah member and Iranian diplomat is a
trained operative, a significant number could in the case of
hostilities enable other operatives to launch attacks against Israeli
or U.S. diplomatic facilities, Jewish cultural institutions, or high-
profile individuals. In addition, and generally unlike al-Qaeda
affiliates, the specter of Hezbollah or Iranian-sponsored cyber attacks
is disturbingly real. Recent Distributed Denial-of-Service (DDOS)
attacks on major U.S. financial institutions, as well as even more
destructive Iranian-sponsored attacks on Saudi Aramco and Qatar-based
RasGas, have highlighted the extent to which physical attacks might be
combined with cyber attacks.
looking ahead
This threat picture, although complex and dynamic, is in many ways
more heartening than that which we faced from 2001 until at least 2010.
Numerous organizations continue to threaten terrorist attacks, but as a
very general matter the threats are away from the homeland and the
scale of the attacks is markedly less than what we saw in September
2001 or even 2006, when al-Qaeda came dangerously close to attacking up
to ten transatlantic airliners. It is not that events like Benghazi are
not tragic. But threats to U.S. diplomatic facilities in Libya are of a
radically different type than planes flying into civilian facilities in
New York and Washington. In this regard, this is an appropriate
juncture to look at a few of our biggest risks and challenges.
Terrorism Fatigue.--After 10-plus years of near-constant public
discussion of terrorism--in our politics, the media, and through public
messaging--many have simply had enough. This is not all bad as an
unhealthy obsession with the threat of terrorism at the expense of
countless other societal woes, such as cyber threats and drug violence
on the Southwest Border, would in many ways hand our enemy a victory.
On the other hand, there is real value in public discussion of
terrorism: It can build resilience in the population and it can lead to
the tackling of tough public policy questions like targeted killings
and domestic intelligence. With terrorism fatigue we run a real risk of
not addressing these issues in a way that provides a lasting
counterterrorism framework. In this regard I actually see the current
discussion around the use of drones as quite a heartening sign.
Terrorism fatigue poses at least two additional challenges. First,
with all of our counterterrorism success such victories have become
expected and any failure--no matter how small--can result in political
finger-pointing and excoriation of our counterterrorism professionals.
In effect we have become victims of our own success and unlike in 2001,
perfection has become a political expectation. Although we should
continuously examine how we can improve our capabilities, we must guard
against ex poste investigations that lack a serious appreciation for
the ex ante difficulties of counterterrorism.
Second, terrorism fatigue can cause dangerous lethargy within the
Executive branch on issues that do not appear to require immediate
attention but which can do longer-term damage to counterterrorism
efforts. I have repeatedly seen urgency morph into bureaucratic
sluggishness as time passes since the last attack on issues like
information sharing and interagency cooperation. Whether it is
countering violent extremism programs or information access for the
intelligence community, we must not take our foot off the gas pedal.
Weapons of Mass Destruction.--There is no doubt that smallish
terrorist attacks or at least attempts will continue to occur at home
and abroad. Such attacks can cause enormous pain and suffering to
victims and their families, but they are clearly of a scale--at least
with respect to absolute numbers killed--that is dwarfed by other
societal ills such as routine criminal activity. The same cannot be
said of terrorists' use of weapons of mass destruction--and more
specifically biological weapons or an improvised nuclear device (IND).
Although we have also made progress in reducing the likelihood of
terrorists obtaining WMD, for the foreseeable future we are faced with
the possibility that a terrorist organization will successfully acquire
these weapons. In this case, technology is not yet our friend as the
ease with which these weapons can be obtained and hidden continues to
exceed our ability to detect them.
Weapons of mass destruction pose a unique challenge as they are the
prototypical low-likelihood, high-consequence event and thus
determining the proper allocation of resources to combat them is
particular contentious. That being said, we must continue to protect
against the most dangerous of materials (e.g., HEU) being obtained by
terrorists, secure weapons in the most dangerous places (e.g.,
Pakistan), and pursue research and development that will assist in
detecting chemical and biological weapons in places where they would do
the most harm.
Counterterrorism Partnerships.--Counterterrorism has always been
and continues to be a ``team sport.'' Although the United States can do
much alone, we have always been incredibly reliant on a vast network of
friendly nations that have extended massively our intelligence, law
enforcement, military, and homeland security reach. Even before the
Arab Awakening we witnessed some weakening of these partnerships.
Whether it was fatigue on our partners' part, their own resource
challenges, or differing views on the proper scope of counterterrorist
efforts (e.g., fights over data sharing between the United States and
the European Union), these partnerships have been under some pressure.
Post-Arab Awakening we face an exponentially more daunting task, having
lost some of our most valuable partners in the very places we need them
most.
Again, part of the challenge is that we have been a victim of our
own success. Al-Qaeda is simply not viewed as the same existential
threat that it was in 2001. But without robust partnerships it will be
increasingly difficult for us to detect and disrupt rising al-Qaeda (or
other groups') cells, thus making it more likely that they will
metastasize and embed themselves in ways that makes them more dangerous
and more difficult to displace.
To maintain our partnerships we must carefully preserve funding for
programs that provide critical capabilities--and potentially more
important, a positive U.S. presence--for our allies. The increase in
funding for special operations forces is a good step, but relatively
tiny investments in Department of State and Justice programs can also
deliver real results in this realm. In addition, we will have to
approach new governments in the Middle East with sophistication and
ensure they continue to view terrorism as a mutual threat.
Staying on the Offense--on all Fronts.--Over the past week an
enormous amount has been said about targeted killings, especially of
U.S. persons. In my view, having served under both Presidents George W.
Bush and Obama, such targeted killings are a vital tool in the
counterterrorism toolbox. And regrettably, in some cases that tool must
also be used against U.S. persons like Anwar al-Awlaki who was a senior
al-Qaeda operational commander who was continuing to plot attacks
against the United States.
Perhaps unsurprisingly, I am supportive of the legal outline
contained in the released Department of Justice white paper. From my
perspective, the memorandum and administration practice (contrary to
claims by some) appropriately constrains the President's authority, has
provided extensive Congressional oversight and the opportunity to limit
the program, and provides realistic standards given the inherent
challenges of intelligence and counterterrorism. As I have previously
implied, however, I am equally supportive of the current public debate
on the issue. In fact, I believe bringing greater visibility to some
programs could be useful not only to build U.S. support, but also to
build greater international understanding if not support--a key element
in our ideological efforts.
As supportive as I am of targeted killings in appropriate
circumstances, I am equally supportive of ensuring that these are not
our only counterterrorism tools employed. I do believe that our
reliance on kinetic strikes has in some cases allowed other efforts to
atrophy or at least pale in comparison. This is enormously dangerous,
as we cannot strike everywhere nor can we lethally target an ideology.
As we increase targeted killings we must double-down on our soft power
and ideological efforts--building capacity in civilian security forces,
increasing the rule of law to diminish under-governed or ungoverned
safe havens, and the like--lest we win a few battles and lose a global
war.
Resources.--Finally, and not entirely inappropriately,
counterterrorism resources at the Federal, State, and local levels will
undoubtedly decline significantly in the coming years. It is difficult
to estimate accurately how much has been spent on counterterrorism over
the past 11 years, but the amount certainly comes close if not exceeds
$100 billion a year. Some of this was undoubtedly well spent, but it is
folly to think that inefficiencies and redundancies do not exist
widely. In this sense, a bit of frugality is likely a very good thing.
The question, however, is whether we will be willing or able to
make smart reductions to preserve critical capabilities. Our historic
ability to direct funds where the threat is greatest--as opposed to
where the political forces are strongest--have not been good. Perhaps
the declining threat will mean that we can continue to spend
imperfectly, but this is surely a dangerous bet to make.
We should use this imposed frugality to do serious mission-based--
as opposed to Department- and agency-specific-based--budgeting in the
Federal Government. This approach will require enormous changes within
the Executive and Congressional branches, but looking across the
counterterrorism budget, identifying the critical capabilities we must
preserve, and then figuring out how that matches Department-specific
budgets can be done. And if we are serious about maintaining these
capabilities we have little choice.
conclusion
More than a decade after 9/11, combatting terrorism isn't over. No
one should be surprised by this fact. Nor should anyone be surprised
that we are fighting in different places and, although some approaches
are the same as they were in 2001, many of our tools must evolve with
the evolving threat. Moreover, having the benefit of almost 12 years of
National effort we are in a better place today to balance our
counterterrorism efforts with other significant threats to our
homeland, most notably state-sponsored cyber intrusions, theft, and
attacks, and cross-border violence and instability due to
counternarcotic efforts in Mexico. To the extent we have built up
robust counterterrorist capabilities and we must maintain them, but we
must also--to the extent possible--make sure these tools are applied
effectively to other homeland security missions.
This committee has been central to much of what has been
accomplished over the past 10 years. I very much hope--and expect--that
it will be central to an inevitable transition, while never forgetting
the tragedy that was the impetus for its creation. I hope that I have
been helpful in giving a new perspective on these issues to help
address these evolving challenges. Thank you for inviting me to
testify, and for this committee's leadership on these critical issues.
Chairman McCaul. Thank you Mr. Leiter. We appreciate your
testimony and certainly miss your briefings in a classified
setting.
Now, Mr. Walker, you are recognized for 5 minutes.
STATEMENT OF DAVID M. WALKER, FOUNDER AND CEO, THE COMEBACK
AMERICA INITIATIVE
Mr. Walker. Chairman McCaul, Ranking Member Thompson,
distinguished Members of the committee, thank you for the
opportunity to testify.
The perspective I will bring is primarily more on
management issues facing DHS. I have got over 40 years of
leadership experience in all three sectors of the economy
including 10 years as comptroller general of the United States
and head of the GAO. In fact, I testified on numerous occasions
at the onset of creating the Department of Homeland Security.
First picking up on something the Chairman said earlier,
from a macro perspective as has been stated by Admiral Mike
Mullen, former chairman of the Joint Chiefs of Staff, myself,
and others, the single greatest threat to our Nation's security
is our own fiscal irresponsibility and mounting debt burdens.
Absent a change in course, our Nation's debt level will
become unsustainable. This will threaten our future position in
the world, our economy at home, our National security, our
homeland security, and even our domestic tranquility over time.
While legislation in recent years including the Budget
Control Act, the American Taxpayer Relief Act of 2012, was
intended to help address this challenge. They have not
addressed the three key drivers of our structural deficits;
known demographic trends, rising health care costs, and an
outdated and inadequate tax system.
As a result, we still face mounting deficit and debt
burdens and the portion of the Federal budget that is on
autopilot is scheduled to increase from the current 67 percent
and go up.
Ladies and gentlemen, the Congress had control of 97
percent of the budget 100 years ago. Now it controls 33 and
going down. That must change.
Therefore, a critical step to securing our Nation's future
and our homeland is to reach a grand fiscal bargain that
restores fiscal sanity, recaptures control of the budget, and
ensures adequate financing for the departments and agencies
that fall under the expressed and enumerated responsibilities
as envisioned by our Nation's founders including homeland
security.
Given the inevitability that the Federal Government will
have to do more with less it is important more than ever that
Federal agencies, including DHS, have a comprehensive and
integrated strategic plan that is future-focused, results-
oriented, resource-constrained, and that considers customers,
employees, and other key stakeholders.
In my experience, there are three key elements that any
organization must have to be successful. It has to have a plan,
it has to have a reasonable budget, and it has to have outcome-
based performance measures.
Unfortunately, over 200 years after our creation, the U.S.
Government still doesn't have any one of these three. The DHS
has done a better job, but there is still room for improvement.
From the DHS perspective, this past November marked the
10th anniversary of the formation. It is appropriate to look
back. There are several areas I think that improvement is
needed.
First, it must improve its strategic planning process. GAO
and others have noted this need. DHS relies on partners to
achieve a lot of its mission. There has to be a lot more
consultation and coordination with those partners in order to
achieve an effective plan and execution of that plan.
It needs to improve its financial management practices
although it has made real progress, and in particular, it needs
to improve its information technology and acquisition and
contracting practices; some of the issues were mentioned
previously and the waste that has occurred in that regard.
Third, there is a clear and compelling need to address
human capital challenges at DHS. It is a major organization;
the third-largest in Government. It is only as successful as
its people and yet it has one of the lowest morales of any
Federal agency with regard to its employees.
I would add two more items that aren't in my testimony but
I think they are important. As I testified when I was
comptroller general, there are certain large, complex, and
high-risk agencies that should have a chief operating officer,
a level two executive, which is a Presidential appointment,
Senate confirmation, with statutory qualification requirements,
with a 5- to 7-year tenure, and with a performance contract. We
need that in large, high-risk agencies in order to deal with
these challenges efficiently and effectively and in a timely
manner.
Last, but not least, it is not in my testimony, but I will
mention it; look, we are going to have serious budget
constraints. We are going to have to do more with less. I think
you have to also look at the possibility of user fees or other
types of fees to be able to fund some of the costs of services
associated with DHS that relate to individuals or goods, and I
will leave that to your good judgment.
Last, but not least, there are a lot of things that need to
be done in Government some of which have not been able to get
done through the normal process. I would commend to your
consideration of forming a Government transformation task force
that would be able to make recommendations to the Congress that
would be guaranteed hearings and guaranteed a vote focusing on
economy, efficiency, effectiveness, and credibility to Federal
Government.
I am happy to answer questions about this if you would
like.
Thank you, Mr. Chairman, Ranking Member, happy to answer
any questions.
[The prepared statement of Mr. Walker follows:]
Prepared Statement of David M. Walker
February 13, 2013
Good morning Chairman McCaul, Ranking Member Thompson, and
distinguished Members of the committee. I am honored to be here to
offer my perspective on the current state of the Department of Homeland
Security and how it can best achieve its important mission, that of
helping to secure our country and its citizens.
The perspective I bring to this issue is based on my almost 40
years of experience across multiple sectors of the economy, spanning
over 20 years of private sector experience, over 15 years of total
Federal Government service, including almost 10 years as comptroller
general of the United States and head of the U.S. Government
Accountability Office (GAO), and almost 5 years in the non-profit
sector. During my tenure as U.S. Comptroller General, I gained
extensive knowledge of homeland security issues, and I testified before
Congress on numerous occasions about this topic, including during the
planning and formation of the Department of Homeland Security (DHS) in
2002. I am currently the founder and CEO of the Comeback America
Initiative, which educates and engages the public about the threat
posed by our Nation's structural deficits and mounting debt burdens,
and possible ways to address them.
As has been stated by Admiral Mike Mullen, myself, and others, the
single greatest threat to our Nation's security is our own fiscal
irresponsibility and mounting debt burdens. Absent a change in course,
our Nation's debt levels will become unsustainable. This will threaten
our position in the world, economy at home, our National security, and
even our domestic tranquility over time.
While legislation in recent years, including the Budget Control Act
and the American Taxpayer Relief Act of 2012, was intended to help
address our fiscal challenge, they have not addressed the three key
drivers of our structural deficits: Known demographic trends, rising
health care costs, and an outdated and inadequate tax system. As a
result, the portion of the Federal budget that is on autopilot is set
to increase from its current 67%, and the Nation's longer-term deficits
will grow over time. According to last week's updated budget
projections from the Congressional Budget Office, under current law,
mandatory spending, including interest, will consume 76% of the Federal
budget in 2023. Discretionary spending will be squeezed to roughly 24%
of total spending, with non-defense discretionary spending being about
12% of total spending. As a percent of GDP, non-defense discretionary
spending will decrease to 2.7%, well below the historical average of
the past 40 years (4%). Therefore, a critical step to securing our
Nation's future is to reach a ``grand bargain'' that restores fiscal
sanity, recaptures control of the budget, and ensures adequate
financing for the departments and agencies that fall under the express
and enumerated Constitutional roles and responsibilities of the Federal
Government, including homeland security.
Given the inevitability of our Federal Government having to do more
with less, it is more important than ever for all Federal agencies,
including DHS, to have a comprehensive and integrated strategic plan
that is future-focused, results-oriented, resource-constrained, and
that considers customers, employees, and other key stakeholders. In my
experience, there are three key elements any organization must have to
be successful: (1) It must have a plan; (2) it must have a budget; and
(3) it must have outcome-based performance metrics. Unfortunately our
Federal Government as a whole fails on all three of these. DHS has done
a better job, but there is still plenty of room for improvement.
This past November marked the 10th anniversary of the formation of
DHS, and the Department has made meaningful strides during that time to
improve its performance, during some trying times, when it comes to
homeland security threats. I recall during my testimony before Congress
in 2002, when Congress was considering the creation of the Department,
pointing out that a consolidation of 22 separate agencies was one of
the biggest transformational changes the Federal Government had ever
undertaken. In fact, at the time I stated that ``the experiences of
organizations that have undertaken transformational change efforts
along the lines that will be necessary for the new department to be
fully effective suggest that this process can take up to 5 to 10 years
to provide meaningful and sustainable results''. Now that 10 years have
passed, it is appropriate to explore areas that DHS can focus on to
more effectively achieve its critically important mission.
First, I believe DHS must improve its strategic planning processes.
It is vitally important for any organization to have a strategic plan
to guide its actions, allocate resources, and measure results. Unlike
the Federal Government as a whole, DHS has made real progress in its
Department-wide planning. However, GAO and others have recommended that
DHS provide more opportunity for stakeholder participation in its
planning process. Given DHS's reliance on partners to achieve its
mission, in both the public and private sector, it is vitally important
for those stakeholders to be meaningfully engaged in the planning
process. In addition, DHS must do a better job of integrating risk
management into its planning process, especially given the nature of
its mission. Integrating risk management practices as a key element of
its planning process is also critical to achieving sustainable success
in an atmosphere of constrained resources. DHS planning must also
involve the development of more outcome-based performance measures to
guide allocation of limited resources.
Second, DHS must improve its financial management practices. While
DHS has made progress in improving its financial management practices
since its inception, a lot more work needs to be done. For example,
failure to fully integrate its financial management system, and various
internal control weaknesses, have resulted in DHS not being able to
achieve an unqualified audit opinion on its financial statements since
the Department's creation. DHS also has a number of material internal
control weaknesses that need to be addressed.
In addition to integrating its financial management systems, DHS
must make further strides in modernizing and integrating other
management practices and systems. DHS faces serious challenges in
integrating its IT, financial, human capital, and acquisition systems.
These challenges have contributed to cost overruns, schedule delays,
and an inability to achieve stated Departmental goals and objectives.
Furthermore, with regard to acquisition management, DHS should
implement more strategic and portfolio-based investment practices, and
execute existing acquisition policy more effectively.
GAO has stated that ``DHS culture has emphasized the need to
rapidly execute missions more than sound acquisition management
practices. Most major programs lack reliable cost estimates, realistic
schedules, and agreed-upon baseline objectives . . . '' DHS must
improve these practices if it is to effectively fulfill its mission.
Third, there are clear and compelling human capital challenges that
DHS must address if it is to effectively achieve its mission in a
sustainable manner. Any organization is only as successful as its
people, and based on recent analysis employee morale at DHS is amongst
the lowest at all Federal agencies. Furthermore, given the demographic
trends facing Government at all levels, it is vitally important that
DHS employ strategic workforce planning that focuses on acquiring,
developing, and retaining a workforce capable of achieving its mission.
This includes appropriate succession planning and recruiting practices.
The issues I have highlighted are areas where Congress can employ
its oversight responsibilities to ensure DHS is best able to fulfill
its mission in the future, especially in an era of serious fiscal
challenges. However, I also encourage the Congress to consider creating
a Government Transformation Task Force, similar to that being advocated
by the Government Transformation Initiative (GTI), for which I serve as
chairman of the board. Under GTI's proposed approach, an independent
body, authorized by statute, would be created to recommend ways the
Federal Government can operate more economically, efficiently, and
effectively. The task force would be made up of non-conflicted leaders
with proven track records of transforming organizations in the public,
private, and/or non-profit sectors. It would issue reports and
recommendations outlining ways to help Government focus on results,
plan strategically, streamline operations, leverage technology, adopt
best practices, and otherwise improve performance. Congress should be
required to consider the task force recommendations in a timely
fashion.
Our Nation's poor financial condition and mounting debt burdens
require that Congress think outside the box and develop new ways to
make Government more future-focused and results-oriented. The creation
of such a task force could help restructure our Government to meet the
needs of the 21st Century, while achieving efficiencies that allow it
to live within the resource-constrained reality that our current fiscal
path will require.
When testifying before the creation of DHS I said that, ``Strong
and visionary leadership will be vital to creating a unified, focused
organization, as opposed to a group of separate units under a single
roof.'' DHS has made real progress in this regard, but more action is
required. At the same time, greater vision and leadership is required
to help ensure that the Federal Government as a whole can effectively
address the many sustainability challenges that we face. This is
essential if we want to effectively discharge our stewardship
obligation to our children, grandchildren, and future generations of
Americans.
I thank you again for the opportunity to testify before your
distinguished committee, and I would be happy to answer any questions
you may have.
Chairman McCaul. Thank you Mr. Walker, and as I mentioned
in my opening statement, management reform and applying more of
a business model to the Department to identify waste and
inefficiencies will also be a top priority, and I appreciate
your testimony.
Mr. Ervin, you are now recognized.
STATEMENT OF CLARK KENT ERVIN, PARTNER, PATTON BOGGS, LLP
Mr. Ervin. Thank you very much, Mr. Chairman.
Chairman McCaul, Ranking Member Thompson, Chairman King,
and Members, thank you very much for this opportunity to
testify today.
Let me start by joining my colleagues, Mr. Chairman, in
congratulating you on your ascension to the Chairmanship. It is
not every day that one gets to testify before a dear, personal
friend, and a former colleague.
I have worked very closely with both Ranking Member
Thompson and you, Chairman King, over the years and look
forward to continuing to do so.
It seems not so long ago that the Nation was beginning to
turn its attention away from the threat of terrorism. With the
end of the war in Iraq, the beginning of the end of the war in
Afghanistan, the killing of Osama bin Laden and that of his
would-be rival for that dubious title, public enemy No. 1,
Anwar al-Awlaki, as well as the devastatingly successful drone
campaign against various and sundry al-Qaeda lieutenants and
foot soldiers in Pakistan, Yemen, and Somalia, the absence,
thankfully, of successful terror attacks, and the absence for
some time of even significant aborted terror plots, even some
sophisticated analysts and observers had come to think that
terrorism had returned to the status of a second-order concern
for policymakers and war fighters.
If anything good has come out of the crises in Mali,
Benghazi, and Syria and out of the renewed and intensified
controversy, occasioned by a recent movie and recent
confirmation hearings over drone strikes and enhanced
interrogation techniques, it is the understanding of the
sobering fact that, our signal victories and wholly
understandable war-weariness notwithstanding, terrorists of one
stripe or another continue to pose a grave threat to the world
in general and to our homeland in particular.
If anything, the terror threat today is more complicated
than it was a decade ago because, as Mr. Leiter noted, the
threat is more diffuse, with ``al-Qaeda Core'' having
metastasized, cancer-like, into various virulent regional cells
throughout most of the world.
We face today's terrorism threat in a severely constrained
fiscal environment, with huge defense cuts looming like a
proverbial Sword of Damocles, limiting policymakers' and war
fighters' options to a degree unprecedented in recent history.
For all these reasons, in this tenth anniversary year of
DHS, I would argue for placing ``security'' back at the front
and center of ``Department of Homeland Security.''
By that I mean that the rightful acknowledgement that the
Department has multiple important missions to carry out:
Preparing for and responding to natural disasters; dealing with
the issue of immigration; patrolling our coast line, et cetera,
to name just a few. Its chief role is to do its part to detect,
deter, and defend the Nation from terror attacks.
Now I would be remiss if I did not acknowledge the progress
that DHS, working with its partners at the Federal, State, and
local governmental level, the private sector, and the American
people, has made, through two administrations now; one
Republican, in which I served, and one Democratic, in helping
to secure the Nation.
Our aviation sector in particular, on which terrorists
understandably, remain fixated, is far more secure than it was
on September 10, 2011. But, I remain concerned about various
aspects of even our aviation system even, like, for example,
the continued vulnerability of air cargo on passenger planes,
and our use of devices at airport passenger checkpoints that
are really anomaly detectors, as opposed to what we really
need, namely, explosives detectors.
I worry, too, about our relative lack of focus over the
years on securing our mass transit sector. The successful
attacks over the years in London, Madrid, and Moscow, and the
aborted terror plots in New York City all show that mass
transit is also in terrorists' cross hairs, and sooner or
later, they will attempt to strike here again, and if we are
not careful, one day they will succeed.
I worry also about our maritime sectors, specifically, the
smuggling of radioactive material in containers and hope that
we will redouble our efforts to try to find a way to scan not
just cargo about which we have suspicions, but all cargo if
possible in an effective, efficient, and economical manner,
without bringing global commerce to a halt.
Call me a worry wart, but I don't trust terrorists to
complete a shipping manifest accurately or to do business only
with unknown shippers, and so a risk-based automated target
system largely based on such trust gives me pause. As President
Reagan would say, ``Trust, but verify.''
Finally, cyber-threats. I look forward to learning more
about the President's Executive Order later today, but we all I
think would agree that it is no substitute for legislation and
hope very much that the administration and the Congress will
work together in a bipartisan way to enact a law this year that
will further secure our Nation against this potentially
catastrophic threat.
Finally, the success of the Department on all of these
fronts will require adroit leadership on the part of Secretary
Napolitano, working with the Congress in general, and with this
committee and your Senate counterpart in particular.
Given the grave threats and our severe fiscal constraints,
there is no time to waste and not a single dollar to waste. I
would applaud Secretary Napolitano for taking steps like
pulling the plug on costly and inefficient and ineffective
procurements like SBInet and DNDO's ASP program, and I also
hope that this year that using the fiscal crisis in which we
are in, we can ensure that going forward we direct
counterterrorism grants only to those localities most at risk
of terror attack.
With that, Mr. Chairman, again, thank you very much for
having me here today to testify and like others, I look forward
very much to your questions.
[The prepared statement of Mr. Ervin follows:]
Prepared Statement of Clark Kent Ervin
February 13, 2013
Chairman McCaul, Ranking Member Thompson, and Members, thank you
very much for inviting me to testify before you today at this important
hearing. It is a great joy for me to testify before you, Mr. Chairman,
recalling as I do with delight our years together as fellow deputy
attorneys general to then-Texas Attorney John Cornyn. It is not every
day that one gets to testify before a Chairman who happens to be a dear
personal friend dating back many years. Congratulations on your
ascension to the Chairmanship, and I look forward to working with you
going forward. And, of course, though we were not colleagues likewise
in a prior life, I count you, too, as a friend, Ranking Member
Thompson, and am delighted to be working with you again in your key
role on this key committee.
It seems not so long ago that the Nation was beginning to turn its
attention away from the threat of terrorism. With the end of the war in
Iraq; the beginning of the end of the war in Afghanistan; the killing
of Public Enemy No. 1, Osama bin Laden, and that of his would-be rival
for that dubious title, Anwar al-Awlaki, as well as the devastatingly
successful drone campaign against various and sundry al-Qaeda
lieutenants and foot soldiers in Pakistan, Yemen, and Somalia; the
absence, thankfully, of successful terror attacks, and the absence for
some time of even significant aborted terror plots, even some
sophisticated analysts and observers had come to think that terrorism
had returned to the status of a second-order concern for policymakers
and war fighters.
If anything good has come out of the crises in Mali, Benghazi, and
Syria, and out of the renewed and intensified controversy, occasioned
by a recent movie and recent confirmation hearings, over drone strikes
and enhanced interrogation techniques, it is the underscoring of the
sobering fact that, our signal victories and wholly understandable war
weariness notwithstanding, terrorists of one stripe or another continue
to pose a grave threat to the world in general and to our homeland in
particular. And, if anything, the terror threat today is more
complicated than it was a decade ago because the threat is more
diffuse, with ``al-Qaeda Core'' having metastasized, cancer-like, into
various virulent regional cells throughout most of the world. And, we
face today's terrorism threat in a severely constrained fiscal
environment, with huge defense cuts looming like a proverbial Sword of
Damocles, limiting policymakers' and war fighters' options to a degree
unprecedented in recent history.
For all these reasons, in this tenth anniversary year of DHS, I
would argue for placing ``security'' back at the front and center of
``Department of Homeland Security.'' By that I mean that the rightful
acknowledgement that the Department has multiple important missions to
carry out--preparing for and responding to natural disasters; extending
the benefits of and enforcing the penalties in our existing immigration
laws and working with the rest of the administration and Congress to
reform our immigration system; patrolling our coastline and rescuing
mariners in distress; and protecting the President and other senior
administration officials and visiting foreign diplomats, to name a
few--its chief role is to do its part to detect, deter, and defend the
Nation from terror attacks.
I would be remiss if I did not acknowledge the huge progress that
DHS, working with its partners in Federal, State, and local
governments, the private sector, and among the American people, has
made, through two administrations now, one Republican and one
Democratic, in helping to secure the Nation. Our aviation sector in
particular, on which terrorists, understandably, remain fixated, is far
more secure than it was on September 10, 2011.
But, I remain concerned about certain aspects of even our aviation
system, like, for example, the continued vulnerability of air cargo on
passenger planes, and our use of devices at airport passenger
checkpoints that are, really, anomaly detectors, as opposed to what we
really need, namely, explosives detectors.
I worry, too, about our relative lack of focus over the years on
securing our mass transit sector. The threat to mass transit is not
merely theoretical. The successful attacks in London, Madrid, and
Moscow, and the aborted plots against mass transit in New York City,
all show that mass transit is also in terrorists' crosshairs, and
sooner or later, they will attempt to strike here again. If we are not
careful, one day they will succeed.
I worry also about our maritime sector, specifically, the smuggling
of radioactive material in containers, and hope that we will redouble
our efforts to try to find a way to scan not just cargo about which we
have suspicions, but all cargo in an effective, efficient, and
economical manner, without bringing global commerce to a halt. Call me
a ``worry wart,'' but I don't trust terrorists to complete a shipping
manifest accurately or to do business with only ``unknown shippers,''
and so a ``risk-based'' automated target system largely based on such
trust gives me pause. As President Reagan would say, ``Trust, but
verify.''
And, finally, cyber-threats. Every passing day shows that cyber-
crime and cyber-terrorism are clear and present dangers to our Nation.
We will either do everything in our power to prevent a devastating
cyber-attack on our Nation now, or sit here (if we are lucky enough
still to be around) 5 years from now, or 10 years from now, or 20, and
lament the fact that we did not. It is imperative that both the
administration and Congress put partisanship and ideology aside to
devise and enact, this year, a law to make our Nation more secure from
this potentially cataclysmic threat.
To conclude, making progress on all these fronts will require
adroit leadership on the part of Secretary Napolitano and her
leadership team, working in concert with the Congress, with your
committee and your Senate counterpart in particular. Given the grave
threats, and our severe fiscal constraints, there is no time to waste,
and not a single dollar to waste. I would applaud her for to taking
steps like pulling the plug on costly and ineffective procurements like
SBInet and DNDO's ASP program, and, I hope that this year, and in the
many lean years likely still to be ahead, that she will have
Congressional support for directing counterterrorism grants to only
those localities most at risk of terror attacks.
Again, Mr. Chairman, Mr. Ranking Member, and Members, thank you for
inviting me to appear before you today and I look forward to responding
to your questions.
Chairman McCaul. Thank you, Mr. Ervin. Your comments on the
necessity for cyber legislation is a good segue into my 5
minutes of questions. I recognize myself for 5 minutes.
Mr. Henry, as I mentioned my trip to the NSA yesterday, my
briefings with General Alexander highlight the sobering reality
that we are under attack as a Nation and our interests are
under attack overseas.
The enormous amount of intellectual property stolen as you
mentioned, the espionage, and the cyber warfare primarily,
China, Russia, Iran, and Iran's latest attacks on Aramco in the
Saudi peninsula and our own financial institutions, which is
probably occurring, as I speak cause me great harm.
I think we need to move quickly on this so I wanted to ask
you real quickly, what is your assessment on the role of DHS?
In addition, if you have had a chance to read the draft
Executive Order, what is your assessment of that as well?
Mr. Henry. Thank you, Chairman.
As far as DHS, I think that one of the critical areas in
everything that we do as it relates to cyber is the collection
and dissemination of intelligence.
As I mentioned in my statement, we have been focusing on
reducing the vulnerabilities for so long, but it is really
critical for us to identify who the adversaries are and to take
steps as a Nation to thwart their efforts and to mitigate that
threat.
I think as it relates to intelligence sharing, DHS has a
role in collecting perhaps or deconflicting across multiple
agencies--the FBI, NSA, DOD, and others--who collect
intelligence related to the threat and how do we take that very
critical information and intelligence and synthesize it so that
it can be shared effectively in a manner that best helps the
private sector prepare to defend their networks and also to
help take the intelligence that is collected off of the network
every single day by the private sector and to get that into the
hands of the right people who can take actions to thwart the
threat; to help do the attribution to identify there is a
particular nation and we know this particular nation is taking
this action against U.S. interests.
It is impacting our economic and National security, and as
a Government there are steps that we can take whether they be
economic, some type of trade sanctions, law enforcement
actions, some intelligence community actions. There are steps
that we can take but it can only happen if that intelligence is
synthesized and shared both ways. I think that DHS can play a
role in the critical area.
Chairman McCaul. On the Executive Order?
Mr. Henry. So the Executive Order I just had a moment to
look at it this morning. I think it talks about that. It talks
about how intelligence is shared, information is shared between
the private sector and the U.S. Government. So I think
elaborating on that, the devil's in the details of course how
we actually build that out.
I also agree with the statement that somebody made about
the comprehensive whole-of-Government response here, and I
think the Executive Order also talks about that. It has to be a
comprehensive plan and it has to work across all sectors. There
is not an agency or an organization that this doesn't touch and
everybody has got to have a piece of that response.
Chairman McCaul. I agree with that. Moving on to the
border, I just visited the L.A. port. There is a threat to our
West Coast with these boats coming up from South America. There
is a threat to the Caribbean, the Southwest Border we focus
quite a bit on, and of course the Northern Border as well.
The Southwest Border particularly, Admiral Allen, we are
going to come up with a bill, an authorization bill. What would
you recommend that we focus on for a comprehensive strategy?
Admiral Allen. Mr. Chairman, I think it is important to
take a risk-based approach. Given the resource constraints we
are dealing with, the budget environment, and the physical
realities of the border, and I mentioned some of them earlier.
I think we need to understand the risk that is presented by the
border. We don't want to drive that risk to zero because we
will shut down trade.
In my view, the best thing we can do is increase
situational awareness. In the maritime environment, that would
be maritime building awareness, our ability to understand what
is out there through a combination of information sharing,
sensor information, and a collection of information on the
movement of vessels that is available through positioning
systems that are there right now.
That needs to be centrally known, shared, and coordinated
with the various databases that are resident in the other
components to create a comprehensive common operating picture
and a common intelligence picture that allows us to queue our
resources.
Specifically in relation to the Southwest Border maritime
environment that you are talking about, there is extraordinary
cooperation between the CBP and the Coast Guard there an
actually with the Navy fleet commander down there that makes
resources available.
What we need to do is refine our ability to understand what
is happening in the maritime environment, to be able to
identify legitimate flows from illegitimate flows, and be able
to focus those resources.
That needs to be done in my view by coordinating and
consolidating command centers where we can, information,
sharing where we can, and then queuing those resources in a
collective manner.
Chairman McCaul. I think the technology piece is a piece
that has not been finalized down there, and I think that is
where we are going to be focusing quite a bit on getting
technology down there to better secure it.
Last, and it has to be very quickly, Mr. Walker, what was
it--you had mentioned a management restructuring and some
specific positions that you would recommend. Can you----
Mr. Walker. One, Government is a large, complex, and very
expensive enterprise and as it has been mentioned, we have
limited resources. We need to allocate those based upon risk.
My view is when you look at the Department of Homeland
Security, which is a combination, an amalgamation of many other
departments and agencies in the past, there is a need for a
chief operating officer; a level two official that would be
responsible for the management process that would be based upon
statutory qualification requirements, would have a term
appointment, and a performance contract.
We look to other countries, we see that this exists. I
mean, you know, the United States is not an island. We need to
learn from history. We need to learn from others, and I think
it is a concept that makes sense in certain agencies such as
DHS and DOD, for example.
Last thing is there is a lot of great recommendations that
are made by the GAL, by inspectors general, by, you know, even
good work that is done by these committees as well as OMB, but
a lot of these recommendations never get implemented. You know,
whether it is duplicated programs, whether it is best practices
problems, you know, crossing many different functions in
Government.
I think there is a need for a capable, credible, and non-
conflicted statutory group that would end up being able to look
at a number of areas, make recommendations to the Congress with
guaranteed hearings and a guaranteed vote building off of like
a Hoover Commission approach if you will because the simple
fact of the matter is whether it is Simpson Bowles, and
Domenici to Weber, or anything else, they are dealing with the
big-ticket items.
On the other hand, there are billions and billions and
billions of dollars the grow every year that we are not coming
to grips with that, that we are gonna have an extraordinary
mechanism to deal with that are not being dealt with.
Chairman McCaul. I think that the outside reading group
really kind of encapsulates the DHS Accountability Act that was
introduced last Congress, passed the House, unfortunately not
the Senate. I hope I can, in working with the Ranking Member,
we can reintroduce that legislation.
With that, I now recognize the Ranking Member.
Mr. Thompson. Thank you very much, Mr. Chairman. I would
like to enter into the record a letter from Secretary
Napolitano kind of highlighting concerns around sequestration
and what that would possibly do to adversely impact----
Chairman McCaul. Without objection, that is so ordered.
[The information follows:]
Letter From Hon. Janet Napolitano to Ranking Member Bennie G. Thompson
February 13, 2013.
The Honorable Bennie G. Thompson,
Ranking Member, Committee on Homeland Security, U.S. House of
Representatives, Washington, DC 20515.
Dear Representative Thompson: Thank you for your letter regarding
the potential impacts of the March 1st sequestration. The Department of
Homeland Security (DHS) shares your deep concerns about the effects
this unprecedented budget reduction to Fiscal Year (FY) 2013 funding
will have on DHS, its missions, and our Nation's security and economy.
Reductions mandated by sequestration would undermine the
significant progress the Department has made over the past 10 years and
would negatively affect our ability to carry out our vital missions.
Sequestration would roll back border security, increase wait times at
our Nation's land ports of entry and airports, affect aviation and
maritime safety and security, leave critical infrastructure vulnerable
to attacks, hamper disaster response time and our Surge Force
capabilities, and significantly scale back cybersecurity infrastructure
protections that have been developed in recent years. In addition,
sequestration would necessitate furloughs of up to 14 days for a
significant portion of our front-line law enforcement personnel, and
could potentially result in reductions in force at the Department. The
following provides specific examples of the potential impacts of
Sequestration on the Department:
U.S. Customs and Border Protection (CBP) would not be able
to maintain current staffing levels of Border Patrol Agents and
CBP Officers as mandated by Congress. Funding and staffing
reductions will increase wait times at airports, affect
security between land ports of entry, affect CBP's ability to
collect revenue owed to the Federal Government, and slow
screening and entry programs for those traveling into the
United States.
U.S. Immigration and Customs Enforcement (ICE) would not be
able to sustain current detention and removal operations or
maintain the 34,000 detention beds mandated by Congress. This
would significantly roll back progress that resulted in record-
high removals of illegal criminal aliens this past year, and
would reduce ICE Homeland Security Investigations' activities,
including human smuggling, counter-proliferation, and
commercial trade fraud investigations.
The Transportation Security Administration would reduce its
front-line workforce, which would substantially increase
passenger wait times at airport security checkpoints.
The U.S. Coast Guard (USCG) would have to curtail air and
surface operations by nearly 25 percent, adversely affecting
maritime safety and security across nearly all missions areas.
A reduction of this magnitude will substantially reduce drug
interdiction, migrant interdiction, fisheries law enforcement,
aids to navigation, and other law enforcement operations as
well as the safe flow of commerce along U.S. waterways.
Furloughs and reductions in overtime would adversely affect
the availability of the U.S. Secret Service workforce, and
hinder on-going criminal investigations.
Reductions in funding for operations, maintenance, and
analytical contracts supporting the National Cybersecurity
Protection System (NCPS) would impact our ability to detect and
analyze emerging cyber threats and protect civilian Federal
computer networks.
The Federal Emergency Management Agency's Disaster Relief
Fund would be reduced by over a billion dollars, with an impact
on survivors recovering from future severe weather events, and
affecting the economic recoveries of local economies in those
regions. State and local homeland security grants funding would
also be reduced, potentially leading to layoffs of emergency
personnel and first responders.
The Science and Technology Directorate would have to stop
on-going research and development including: Countermeasures
for bio-threats, improvements to aviation security and
cybersecurity technologies, and projects that support first
responders.
The Department would be unable to move forward with
necessary management integration efforts such as modernizing
critical financial systems. This would hinder the Department's
ability to provide accurate and timely financial reporting,
facilitate clean audit opinions, address systems security
issues, and remediate financial control and financial system
weaknesses.
Hurricane Sandy, recent threats surrounding aviation and the
continued threat of homegrown terrorism demonstrate how we must remain
vigilant and prepared. Threats from terrorism and response-and-recovery
efforts associated with natural disasters will not diminish because of
budget cuts to DHS. Even in this current fiscal climate, we do not have
the luxury of making significant reductions to our capabilities without
placing our Nation at risk. Rather, we must continue to prepare for,
respond to, and recover from evolving threats and disasters--and we
require sufficient resources to sustain and adapt our capabilities
accordingly. We simply cannot absorb the additional reduction posed by
Sequestration without significantly negatively affecting front-line
operations and our Nation's previous investments in the homeland
security enterprise.
The Department appreciates the strong support it has received from
Congress over the past 10 years. As we approach March 1, Congress is
urged to act to prevent Sequestration and ensure that DHS can continue
to meet evolving threats and maintain the security of our Nation and
citizens. Should you have any questions or concerns at any time, please
do not hesitate to contact me[.]
Yours very truly,
Janet Napolitano.
Mr. Thompson. Thank you.
Mr. Ervin, let us look at TSA as a point of conversation.
Most of us here go through airports every week. The assumption
is that the screening technology that we all go through is
good.
What has been your concern about TSA's approach to
technology and whether we are really identifying all the
vulnerabilities or are we just--just tell me what your concerns
are.
Mr. Ervin. Right. Well, thank you for that Mr. Thompson. I
guess I would say several things. First of all, as I mention
just briefly in my testimony, it seems to me that the chief
problem with the current technology that we deploy at
checkpoints, advanced imaging technology, to use the technical
term, which encompasses millimeter wave machines and also
backscatter machines, and it is the backscatter machines that
the Chairman talked about in his opening statement that we are
not able to meet the privacy concerns and as a result have been
pulled back.
Both of them--while one could argue that one is more
effective than the other--both of them are anomaly detectors as
opposed to explosives detectors.
By that I mean that all those machines do is show that
there is something on the person of the passenger that is out
of the ordinary and it is therefore incumbent upon the screener
observing that image to determine that there is in fact anomaly
and then to inquire further as to whether that anomaly isn't in
fact an explosive and therefore should be of concern.
Instead, as I say, I think what we need to do is to skip a
step, take out a step, and instead to deploy machines that are
automated explosive detectors, which is to say immediately
without any human intervention determine that there is in fact
or is not which of course is usually the case an explosive and
I think that would be a huge advantage.
There are certain companies that have such technology. That
technology is being tested by TSA to be fair, but I think we
need to redouble our efforts to deploy it. I guess----
Mr. Thompson. My point, to support what the Chairman has
said, one of the things we will look at is how we do
procurement and contracting with the Department. We know all of
these vulnerabilities are out there, but we can't get the
through-put to the point of reality.
So, Mr. Chairman, I look forward to--as we go forward.
Admiral Allen, Congress passed some legislation long time
ago saying that we should screen in-bound cargo coming in to
this country from foreign areas, and we are woefully beyond the
point of the Congressional mandate.
Do you see that also as a vulnerability from a security
standpoint to this country not knowing what is coming in the
containers to this country?
Admiral Allen. Mr. Thompson, there is always going to be a
risk in any cargo entering the country and any inspection
regime associated with that.
As I stated earlier, we need to understand the risk that is
inherent in these flows in trades and then try and attack it
where we best get the return on our resources.
I know that 100 percent container inspection has been
discussed for many, many years. I myself think that that is a
little bit of a bridge too far in terms of resources and the
technology available to accomplish that and make that actually
an effective way to secure cargo.
I think we need to look at emerging technologies. Some of
the other Members here have alluded to different types of
sensing equipment that could actually interrogate these
containers while they were being moved themselves.
I think in the long run, it has to do with evaluating data
intelligence and sharing information is the way to go. I know
there is a desire to see 100 percent screening of containers. I
don't think it is realistically achievable in the near-term,
sir.
Mr. Thompson. What is realistic in your opinion?
Admiral Allen. Well, considering the technology challenges
and the costs associated with it, sir, I think that it would be
very, very difficult to achieve that goal in the current budget
environment and current technology environment.
Mr. Thompson. Good answer.
Mr. Walker, you talked about creating a commission or a
individual who has some responsibility for certain challenges
within DHS. Can you go a little farther in how you see that----
Mr. Walker. Sure.
Mr. Thompson [continuing]. Individual operating?
Mr. Walker. Sure. There is two issues. One is a micro-issue
for the Department of Homeland Security and the other is a
macro-issue that deals with the Government at large.
The Department of Homeland Security is the third-largest
Federal agency. It is accumulation, amalgamation of a bunch of
different, you know, previous organizations. It has got a very
important mission. It has got very limited resources, and it
has got a number of fundamental management challenges that
exist and will continue to exist.
We need to have somebody focused full-time on management
transformation and execution; economy, efficiency,
effectiveness, credibility.
We need to focus, have somebody focus full-time on the
issue of risk assessment. There is no such thing as zero risk.
You have to be able to allocate limited resources to mitigate
as much risk as possible.
In my view, while deputy secretaries typically try to do
some of this job and to differing degrees of success and this
has nothing to do about the current incumbent or prior
individuals that were there, it is just a big darn job and that
we need to recognize that we need to have people in those jobs
that have appropriate qualification requirements who will be
there for enough time to be able to get things done.
That is why say 5- to 7-year term with a performance
contract focused on results so that we are in effect
professionalizing part of the management and execution of
Government. I think----
Mr. Thompson. If the Chairman will indulge me, are you
saying that individual will also have the authority to fix
whatever they encounter?
Mr. Walker. Well, there is two things. One of which is they
will identify to the extent that they have the authority under
current law then they would fix it.
The second is the macro issue I am talking about. If you
look at duplicate programs, if you look at problems with
procurement, human capital, whatever, there are a number of
things that exist throughout Government and that have not been
effectively addressed for a variety of reasons in the normal
course.
I believe there is a need to create some type of a
statutory task force where the Congress would buy in and the
President would buy in that would be comprised of individuals
who are capable, credible, with proven transformational change
experience in the private sector, public sector, and/or not-
for-profit who don't have conflicts, who would oversee a
process to review different functions or programs that would
make recommendations focused on economy, efficiency,
effectiveness, and credibility that would be guaranteed
hearings and guaranteed a vote.
If you look at, you know, whether it is the Grace
Commission or the good work that Vice President Gore did, you
know, on reinventing Government, there is a lot of things that
come out that frankly never get acted on and I think we have to
recognize that given our current and projected financial
condition and the fact that the agencies that are discretionary
spending including this Department that is envisioned by the
Constitution, but nonetheless is getting squeezed--not--didn't
say homeland security but domestic tranquility and I would
argue that this is part of domestic tranquility, then, you
know, we have got to figure out a new way to try to be able to
address these long-standing problems to free up more resources
to mitigate the risk and to execute on mission.
Mr. Thompson. Thank you very much.
I appreciate the Chairman's indulgence.
Chairman McCaul. I thank the Ranking Member. I plan to
recognize Members who are in accordance with the committee
rules, those who were present at the start of the hearing, by
seniority, and those coming in after the hearing will be
recognized in the order of arrival.
With that, Chairman King is now recognized.
Mr. King. Thank you, Mr. Chairman.
Let me thank all of the witnesses for their Government
service over the years. It is greatly appreciated.
Director Leiter, let me just focus on a few things in your
statement. You mentioned the concern about terrorism fatigue
both in the Government and among the general public.
You also referenced the concern about improvised nuclear
devices. I know in New York we are very concerned about dirty
bombs, the impact that would have whether it was in lower
Manhattan, Wall Street, Times Square area. Both, you know, the
loss of human life, which would be significant enough, but also
the economic impact it would have on the country perhaps
costing billions of dollars in the economy making it
uninhabitable for 6 to 8 months.
In response to that, we set up the Secure the Cities
Program, which was intended to be not just for the New York
area and this includes Long Island, Connecticut, and New
Jersey, but also to serve as a template for the country for
other urban areas around the country.
When you were with MCTC, did you have an opportunity to
observe Secure the Cities or discuss with Commissioner Kelly
all?
Mr. Leiter. I did not, Congressman, but I spent an
extensive amount of time with the NYPD counterterrorism
officials throughout the region in New York, New Jersey, and
Connecticut.
In my regard, I think this is a very good program. I would
associate myself with previous comments that a risk-based
approach on these topics is absolutely critical.
If we simply slice the salami and try to get all of the
funding everywhere in the country to defend against low-
likelihood but high-consequence events like an improvised
nuclear device, we will not cover the places that are most
likely to be hit and we have to take some risk there.
Certainly major metropolitan areas, New York, Chicago, Los
Angeles--this is not to say that other parts of the country are
not important--but we have to prioritize because if we try to
spend the money everywhere, we either will run out of money or
we won't be able to protect anything effectively.
Mr. King. Thank you.
Mr. Ervin, if anyone was literally present at the creation
of the Department it has been you, and you have been involved
in many capacities ever since the Department was created, both
as a Government official and as a private citizen.
As Director Leiter said, you mention the importance of
risk-based funding in your statement. You also pointed to mass
transit and that has been--again it is perhaps a parochial
concern of mine since we have 5 million passengers every day
whether it is the subway system, Long Island Railroad, Path
subways. We have had six attempted plots against the mass
transit system in New York.
What though would you suggest that we do since to me it is
much easier to secure an airport, much easier to make airliners
secure. I think in New York we have over 1,000 entrances and
exits just on the subway system. How you can possibly secure
that? Is it technology? Is it personnel? Is it intelligence
gathering?
Mr. Ervin. Well, thank you for that, Mr. Chairman. I am
glad you underscored that because as I said in my statement,
just briefly, I really worry about that and think that we have,
relatively speaking, underprepared for it.
I think you put your finger on it. We certainly cannot
secure the mass transit sector in the same way or attempt to
secure it in the same way that we secure the aviation sector
for all of the reasons you cite.
I think what we need to do going forward is what New York
City does very well, but I think we need to see that model
replicated in other cities around the country that don't have
the same degree of threat that New York has.
I think New York is unique in that regard, but are likewise
in terrorist crosshairs--Washington, DC; Los Angeles; Chicago;
and by that I mean, it is what you said. It is a combination of
personnel and technology.
The good news is, after every scare, mass transit scare, in
around the world and in this country we see--not just in New
York City but in the cities that I mentioned--an increased
police presence, the greater deployment of technology, but what
tends to happen is that that is just time-limited.
When the issue fades from the headlines, those resources
are taken away and that is understandable to some degree given
the budget constraint we are in and the fact that to a very
large degree, mass transit, unlike aviation security, is
financed at the State and local level.
Given our fiscal environment and given this threat, I think
we need to redirect our resources so that a greater percentage
of TSA's budget in particular and the overall DHS budget is
directed to mass transit sector given, as I say, the threat
that the mass transit sector poses to our country.
Mr. King. I would suggest also, and the question, of
course, though, that we factor in--I think you agree with
this--the financial impact a successful attack on any of our
urban centers would have, whether it is in New York, Los
Angeles, Chicago, Boston, Philadelphia--go down the line, and
that would impact billions and billions of dollars.
Mr. Ervin. No question about it, sir. You know, mass
transit is called mass for reason. There are huge numbers of
people, as you note, who are affected by mass transit, and we
know that terrorists' intention is to maximize the number of
people killed and maximize the number of people injured, to
maximize the psychic impact of it, and to maximize the economic
impact.
We certainly saw that in 9/11 with regard to the aviation
sector. We would see that with regard to the mass transit
sector if God forbid there were successful attacks.
Mr. King. Thank you, Mr. Ervin.
My final statement will be to Mr. Leiter. You testified
before our committee in January 2011, and you said that al-
Awlaki was the most dangerous person in the world followed by
bin Laden.
Within 8 months, they were both gone. Anybody else you want
to mention today?
[Laughter.]
Mr. Leiter. Mr. Chairman, Mr. King, that is a dangerous
question and my answer is even more dangerous, but what I would
say is it shows that focused or prioritizing where our most
deadly enemies are and doing so with greater transparency, so
our elected officials have an opportunity to weigh-in with the
Executive branch and make their views known about whether or
not someone should or should not be legitimately targeted, is
an important role for this committee, the intelligence
committee, the armed services committee.
In my view, the fact that someone is an American citizen,
although tragic and a weighty decision for the President,
clearly cannot immunize that person from being stopped from
launching attacks, and sometimes we have to do that using
deadly force.
Mr. King. Thank you, Mr. Leiter.
Thank you, Mr. Chairman.
Chairman McCaul. The Chairman now recognizes the gentleman
from Massachusetts, Mr. Keating.
Mr. Keating. Thank you, Mr. Chairman.
I am gonna just drill down on one issue that I brought up
in the past but still remains a problem. Since 2001, there's
been over 1,300 perimeter security breaches at airports.
So even though we have an easier job at airports, I don't
think that job is being done frankly, and as history has shown
us, one unsafe airport compromises every airport in the entire
country.
In October 2011, I introduced an amendment in the
authorization bill for this committee that seeks to protect
U.S. travelers and threats resulting from airport perimeter
breaches by asking TSA to map out a plan to conduct security
vulnerability assessments at airports throughout the United
States--not just the 17 percent that they had checked at that
point of the airports.
So going forward, what is the best way to address perimeter
security at the airports? We have that the public going through
gates and radiation and screening and doing all kinds of things
as they approach the gate yet we are wide-open in my opinion;
pretty darn close to wide-open around our perimeters.
Could any of you comment on that? Because I continually see
no action going forward with the Department in this respect.
Mr. Ervin. Can I say a word about that, Mr. King? I am
really glad you raised it. Perimeter security at airports is an
issue that is not often talked about, but like you I worry
about that as a vulnerability. I guess I would say a couple of
things.
One is I would commend to you and I am sure you are aware
of it and others, the work that Los Angeles has done in this
regard. There is a forward appointment of police officers,
which can serve as a deterrent effect--obviously nothing is
perfect--but can serve as a deterrent effect.
There are random searches of cars before they approach the
airport. I think we need to see the wider deployment of this in
airports around the country.
We all should recall the incident in Edinborough I believe
back in 2010 or something like that where an airport was
breached and there were--I believe there--certainly there were
injuries, I think there were deaths as well, within the pre-
checkpoint area of the airport.
There is no screening whatsoever that happens and so in the
same way, and Admiral Allen can talk about this, in the same
way that we successfully since 9/11 have pushed the borders out
as far as border security is concerned, likewise, I think we
need to push airport security out past the checkpoint and long
before a passenger approaches the airport.
Mr. Keating. Yes, I am reminded when I was the district
attorney there was a case just before I entered Congress where
a 16-year-old boy just pierced through all the security that is
there or wasn't there. He stowed away on a commercial airline
and tragically ended up being killed as the airplane elevated
and his body dropped in our district.
They went back through all of the video and all of the
security and had no trace of him. So can you imagine if
somebody was doing a bank robbery and you knew the bank was
going to be robbed and you are gonna go back and find out how
they did it that you never even had a trace of the person?
This is how wide open it is and the other thing that--if
anyone wants to comment--it is a big problem with homeland
security, the pointing of the finger of the local--oh, this is
the local airport municipality or the ownership of the airport
or this is the local police and TSA is just saying it is not
our job. Well, it is their job.
Mr. Leiter. Congressman, I would say not to minimize your
concern at all, I think it is very appropriate. I think we have
similar challenges along the perimeter of much of our critical
infrastructure in this country whether it is oil and gas,
electrical facilities, and the like.
Going to Mr. Henry's area of expertise, but one in which I
also work, we should accept that we have adversaries from
around the world who are already inside the perimeter of all of
these institutions. It just happens to be in the cyber world.
If we don't look at the combined cyber and physical world
together we will undoubtedly be burned by one or both.
Mr. Keating. We are still recovering from the Wall Street
meltdown yet if there is a cyber breach in one of the big five
financial institutions, for even several hours, they go
bankrupt and can you imagine the effect on our economy.
So you are absolutely right. I yield back my time, Mr.
Chairman.
Mr. Walker. Can I mention one other thing, Mr. Keating?
Mr. Keating. Yes.
Mr. Walker. First, I guess I would say to what extent are
we using the same technologies that we use on the border of the
United States for the perimeter of airports? I don't know the
answer to that, but there are technologies that are used to
provide border security. So you could argue that this is
another potential application of those technologies.
Mr. Keating. That airport--just to clarify a point--where
that young man breached security I believe was the eighth-
biggest hub of the country. So this isn't just small airports
that this becomes a problem with.
I yield back, Mr. Chairman.
Chairman McCaul. Thank you, and point of personal
privilege, I enjoyed sharing the Chair with Chairman King for a
couple of minutes.
[Laughter.]
Chairman McCaul. The Chairman now recognizes the Vice Chair
of the full committee, Mrs. Miller.
Mrs. Miller. Thank you very much, Mr. Chairman. First I
want to thank you for this great panel, for all of these great
patriots, great Americans coming to testify before the
committee.
Sort of a broad range of I think the vision of this
committee; where we are going, whether it is border security or
cybersecurity or terrorism. Mr. Walker talking about how the
National debt is going to impact our ability to secure the
homeland, so I say it is a very interesting panel and I am very
appreciative of that.
As you mentioned, I am and again, I am very appreciative
again to be the Chairperson in the 113th Congress of the
Subcommittee on Border and Maritime Security and so I am going
to be focusing most of my questions for Admiral Allen and I
appreciated your testimony. I will also say I do want to
recognize again your service to the Nation, particularly with
the Deepwater.
The country has moved past that but we are never forgetting
when you were tasked with that mission and when you arrived on-
site and started pulling everybody together and just by the
very--your presence and your determination, you really--that
was a remarkable mission that accomplished so well. Thank you
so much for that.
Admiral, you have talked about, you know, all of the
various components that might go into operational control of a
border; what that might look like. You know, I was interested
in a report that came out a couple of years ago from the GAO
that talked about the percentage of operational control that we
currently have at the Southern Border which is about, in the
40, low 40 percentile and the Northern Border in its single
digits, 1-digit numerals and, you know, this is not the best
position to be in, I think.
Whether or not Secretary Napolitano has mentioned that
operational control is an antiquated term, but we have to have
some sort of metrics. How do you actually measure that?
Our committee is actually going to be--our subcommittee is
actually going to be having a hearing just asking the
Department: ``What does a secure border look like to you, at
the Department?'' I would ask you, sir, if you were sitting
there, what does a secure border actually look like?
Admiral Allen. Thank you for the question, ma'am. If I
could start off with a metaphor related to the oil spill. I get
asked all the time if there is any way to safely extract
hydrocarbons in deep water drilling I tell everybody there is
no risk-free way to extract hydrocarbons and we are going to go
to another generation of energy development before we are going
to have to move away from dependence on that.
So the question is: What is an acceptable level of risk to
carry out those activities? I would tell you just the same as
in deep water drilling, it depends on where you are at, the
local region, the particular characteristics related to that,
and frankly, the political sensitivities and some of the
political perspectives and culture in the region.
The reason operational control of the border is such a
vexing term is some cases you can effectively control the
border with a 1-mile offense in a downtown municipal area like
Juarez or Otay Mesa.
In other areas, sensors, integrated fixed towers can give
you enough situational awareness where you can react if
something does occur before it becomes a threat inside the
United States.
In other places, they are such a remote area in the big
bang country of Texas where it is going to take you an hour or
2 hours to get to the nearest crossroad. So the question is:
What is deployed there that can respond to the threat?
I think what is needed is an integrated assessment of the
areas of the border focusing on regional risk and
vulnerabilities and what constitutes the greatest threat. There
were conversations earlier about improvised explosive devices
and nuclear devices in relation to high-population areas.
I think we need to look at the vulnerabilities that are out
there and where we best mitigate risk, understanding that there
are places where we will have to respond in some period of
time.
That is the reason when people say operational control of
the border or border security, I kind of cringe because I used
to tell people if you can explain what that is, you have just
proved you don't know it.
I think what we have to have is a comprehensive assessment
and what happens in one port or one area of the border needs to
be specifically--criteria that is equally applied in each area
that will produce a different outcome on the type of resources,
personnel, sensors that you need, but ultimately, all of that
needs to come back someplace to create common operating picture
to direct responses from.
Mrs. Miller. Well, I appreciate that and just one other
question then. Following up on that, talking about the Southern
Border, the Northern Border, if you think about the Maritime
Border as well and with your background, the Ranking Member
asked a question about the percentage of scanning, you know,
the Congress saying we are going to have 100 percent scanning.
I would agree with your assessment that that is not
possible. We are really only right now at 3 or 4 percent,
scanning 3 or 4 percent of all the cargo that is coming.
So as we look at the outer ring of border security
particularly from a maritime environment at our ports, et
cetera--excuse me--what again, what kinds of things, you know,
we talk about some of the--looking at our partners at some of
the point of debarkation for some of the cargo, et cetera.
How could we do a better job and again how do you even
measure those kinds of things?
Admiral Allen. Well, if I could just reiterate on the
container situation, I think the best way to reduce that risk
as low as we can is to look at technologies that actually allow
those containers to be interrogated with sensors while they are
being moved and the devices that lift them and that is a
technology that has not matured, but I think that is where we
ought to be looking there because we are never gonna be able to
drive that risk to zero.
We made tremendous strides in the last 10 years in maritime
domain awareness in terms of automated identification systems,
devices that are required to be carried and transmitted by
vessels of a certain length, and long-range tracking devices
that are required by the International Maritime Organization
when vessels have declared their intent to enter into a
country.
It is not 100 percent. We need to continue to evolve this
because the more we can identify the traffic that is out there
and separate legitimate from illegitimate or dark traffic that
is not identifying themselves, then we can funnel those
resources where they can best be used to address those threats.
I think building out a robust National automated
identification system for the country, which has struggled to
get funding and support over the years, and create that
maritime domain awareness is the best thing we can do in the
maritime domain and that is consistent with international
treaties and sharing agreements on trying to track and
basically create more transparency out there on the ships that
are moving on the ocean.
Mrs. Miller. Thank you.
Thank you, Mr. Chairman.
Chairman McCaul. Admiral, I appreciate your reference to
Texas as a ``big country.''
[Laughter.]
Chairman McCaul. The Chairman now recognizes the Ranking
Member of the Emergency Preparedness Response Committee, Mr.
Payne.
Mr. Payne. Thank you, Mr. Chairman.
Mr. Ervin, following up on what Mr. King asked about mass
transit, and as you know I am in Newark, New Jersey right
across the river from New York and a lot of our mass transit
systems are shared.
Could you be more specific about what security measures
should be taken? Does it look like airport security, the
screening of the bags, passengers? Does it involve more
targeted screening through human observation?
Mr. Ervin. Thank you for that, Mr. Payne. Well, I think it
is really all those things and as I mentioned, New York City I
think is a very good incubator in this regard for other
relevant cities in the country to emulate. It is a combination
of personnel.
In New York you have these Viper teams for example, which
are, you know, for want of a better word, multidisciplinary
teams of police officers who have a variety of skills who
deploy en masse occasionally unprovoked at mass transit
stations.
It serves to deter terrorists who are casing mass transit
facilities to see what the vulnerabilities are. I think there
should be greater deployment of cameras for example. There are
smart cameras that can spot anomalies and call those anomalies
to the attention of those who are monitoring those cameras at
police headquarters and otherwise.
There are sensors that can be deployed that detect the
presence of chemical agents in the air and there are also
random bag searches. In New York City there was a lawsuit, I
think, is correct that the ACLU brought and the city won that
lawsuit.
So I would urge the adoption of measures like that in
cities across the country and I recognize as I said that
financing is a problem especially now at the Federal level and
at the State and local level, but this is a major threat and
eventually the threat is going to catch up to us if we don't do
something to address it not just at the time of the headline
but on an on-going basis.
Mr. Payne. Just a follow-up on that. What would you think
would be an appropriate time line for this transit security
that is needed?
Mr. Ervin. Well, you know, that is difficult to say. I
think of the fierce urgency of now, to use that phrase.
I really don't think we have a moment to waste. You know,
the principal point of my testimony, and I think Mr. Leiter
made the same point, is that we cannot allow ourselves to think
that the terrorism threat has receded.
In part I think we are a potential victim of our own
success because we have done such a good job over the years in
securing the aviation sector. I think that opens up terrorists'
eyes to the vulnerabilities that remain with regard to mass
transit, with regard to maritime, and also with regard to soft
targets.
We haven't talked about soft targets today during the
course of the hearing, and I think that you know as devastating
as an attack was on the aviation sector, as devastating as an
attack would be on the mass transit sector, an attack on a
movie theater, on a shopping mall, and not just in New York
City or Washington, DC, but in Clute, Texas or in, you know,
Nebraska or Idaho would have a huge psychological, political
impact in this country. So we have got a huge job to do and
fewer resources than ever with which to do it.
Mr. Leiter. Congressman, if I may just add to that. I agree
with everything that Clarke has said, but I think it is a
mistake to try to only think about this in defensive measures,
because we can't defend all of the sites, whether it is mass
transit or City Hall or whatever it is. It is simply
impossible.
In my view, intelligence is the key here and we have to
understand these networks and find the people before they go
out and actually launch the attacks. Now, we are not going to
be perfect there either; that is critical
From this committee's perspective, I think one of the areas
where we have to find efficiencies and improve our capabilities
simultaneously is a greater rationalization of responsibilities
between DHS-funded State and local fusion centers and FBI joint
terrorism task forces.
We have spent a lot of money on this over the past 12
years. They do serve different purposes, but in my view we
could rationalize a relationship between those organizations,
have just as much safety, and save money.
Mr. Payne. Thank you.
I yield back.
Chairman McCaul. The Chairman now recognizes the Chairman
of the Subcommittee on Cybersecurity, Intelligence, and
Security Technologies, Mr. Meehan.
Mr. Meehan. Thank you, Mr. Chairman, and I want to express
my appreciation to the Chairman for his confidence in allowing
me the distinct honor of chairing the Subcommittee on
Cybersecurity, Intelligence, and Security Technologies coming
into this new Congress here on this committee.
I also want to express my deep appreciation to this very
distinguished panel not just for your presence here today, but
for your long record of service and attention to the multiple
issues before us. We watch this morph, but a couple of times
this issue has been raised, the word ``fatigue'' has been
identified.
Mr. Leiter, I think you spoke to it quite eloquently and
now an aspect of that fatigue includes sort of a sense of
complacency and built because of the successes that have been
realized by many of the people who have worked alongside of you
and your colleagues.
One of the challenges that I face as I look at this and I
just left a week of visits throughout New York with many
members of the banking community and others that have been most
recently victimized by the scope of the attacks. Cyber--how
real is this threat, Mr. Leiter?
Mr. Leiter. I think this is far more real than almost
anyone understands. We have state-sponsored threats,
principally China and Iran and Russia.
In the case of China, stealing absolutely billions of
dollars and targeting not just traditional government, not just
traditional military, but targeting every sector of our
economy; agriculture, advanced manufacturing, clean energy, the
law firms that support these worlds, our information service
providers, all of them are being penetrated.
The best organizations at this, organizations like BAE who
sell cyber defenses, have had these intruders in their networks
for 18 months before they even know it.
In the case of Iran, we have seen destructive Iranian cyber
attacks on Saudi Aramco and RasGas and if anyone thinks that
you can't go from stealing data to destroying data and
disrupting critical infrastructure, they simply don't
understand the technology.
It is changing a few zeros and ones and that intrusion
becomes an attack. So in my view, the scope of economic loss
and the potential for physical destruction is very, very real.
Mr. Meehan. Well thank you. I think you framed it well.
Mr. Henry, we had the good privilege of working together
during your days in the FBI and I appreciated your expertise,
but you are one who works exclusively in this area of
cybersecurity and I was struck--I mentioned I was in New York
and I had been preceded just a few weeks earlier by Mr. Panetta
and he used the word a ``Cyber Pearl Harbor'' talking about
trains being diverted off of tracks with chemical weapons and
the shutdown of our electrical grid.
But at the same time, how does the average American
appreciate that they are affected by what is going on today in
the cyber world, they have got a role, and that we have got to
be responsive to this threat?
Mr. Henry. I think that your recognition of that is key
here. It is very, very difficult for the average American to
see this because it is, to some of them, many of them it is
very amorphous.
You can't actually see many of the impacts of this and I
think that it may take unfortunately the digital equivalent of
planes flying into buildings for people to take this seriously,
until they can actually see it.
I have used an example before. If I were to say that there
was a bomb under this table, everybody here would get up and
run out of the room because everybody knows what it looks like
when that bomb goes off. We have seen the news footage. We have
seen the movies. We know what that means if there is a bomb
under the table.
But if I say to that same audience that there is a foreign
adversary in your computer network right now, they are stealing
your most sensitive information, your most important research
and development, that same group of people looks back at me and
smiles like I am telling a joke because it doesn't resonate
with them. It is not real to them, and that is very
unfortunate.
I think the way we do that is through hearings like this,
through committees, through some of the media attention to some
of the real impacts.
When Mr. Leiter talks about some of the critical
infrastructure that has been damaged, that needs to be
highlighted for people for them to understand what the real
risk is to their organizations, to our society as a whole going
forward.
Mr. Meehan. I appreciate your framing it that way as well.
One of the recognitions, 90 percent of this internet in which
all of our commerce really today is built around, is in the
hands of private entities.
Now we have got a real challenge tying together the
intelligence resources that we are able to generate but working
simultaneously with the private sector and information sharing.
It includes a variety of things, not only how we move that
information, but how we protect privacy and other things too.
How do we get people comfortable with the idea that we need to
be working together while simultaneously being able to protect
the individuals concerned about intrusions on thier privacy?
Mr. Henry. Well, the, again is very, very critical. I think
that for people to understand what the risk is that they are
willing to accept certain inconveniences that may be critical
to securing the networks.
If on September 10, 2001, somebody came from, a Government
official, and said from now on September 10, 2001, from now on,
we recognize that there as a terrorism threat and we are going
to ask everybody to take their shoes off when they come
through, take your laptop out of the bag, take your jacket off,
you can't carry any shampoo, people would be outraged.
We can't do this. This is an inconvenience. It infringes on
people's privacy. But then the next day the world changed and
all of a sudden everybody understands how significant the risk
is and they are willing to accept the inconvenience.
I don't particularly care to do it, but I get it. I
understand what the risk is, what the adversaries are trying to
do to us, and I am willing to make those concessions.
I think in the cyberspace it is very, very similar. People
need to understand the risk. I think we can balance privacy
with security. That is gonna take some work and some effort and
I think the committee has a huge role to play in that.
Voice. Mr. Chairman----
Mr. Walker. Very quickly I think there are three elements
that you have to be able to make real to people, okay.
No. 1, self-preservation. That is the most fundamental in
hierarchy of needs. So how can a cyber have an impact that
could end up having loss of life?
Second, economic security. How might cyber affect their
assets, their resources, their accounts, all right?
Third, personal privacy. Those are the three big elements,
I think, and you have to make that real to people to help them
understand it and appreciate it and then they will be, I think,
more aware and concerned about it.
Mr. Leiter. Congressman, privacy considerations here are
really enormous and I would offer at least two ways in which
this committee can be of assistance on that.
One is making sure there is transparency about how when
this information is shared with the U.S. Government and vice
versa, how it is used. Narrowing the scope of how it is used is
critical in my view.
Second, currently today, as much as the Department of
Homeland Security has done to increase the skill of its
workforce technically, it is still pale by comparison to the
National Security Agency and the Department of Defense.
They don't have the people they need to do this job well.
Hence we talk a lot about giving the National Security Agency
and the Department of Defense a larger role in this than we
might otherwise do.
In my view, we might have to do that at the beginning, but
this committee is critical in providing DHS the management
flexibility and personnel authority to bring in people that
they won't normally get so they can actually build up that
expertise.
Hiring and firing people in the Federal Government is
impossible. If you give DHS flexibility to bring in people
through private sector for short-term tours at DHS they can
build up that capacity much, much faster and then there is less
of an operational impetus to share all of the staff all the
time with the National Security Agency and Department of
Defense.
Mr. Meehan. Well, thank you. My time's expired, but I look
forward to working with each of you as we move forward in the
year on this very challenging issue.
Chairman McCaul. Yes, and thank you for your testimony, Mr.
Leiter, in terms of, I think, building the capability and
credibility--excuse me--of the cyber workforce within DHS will
be a priority as well.
The gentleman from Texas, Mr. O'Rourke, is recognized.
Mr. O'Rourke. Thank you, Mr. Chairman.
I would ask for unanimous consent to submit two articles
both published this week--one by our county judge in El Paso,
Veronica Escobar, the other by Eric Olsen and Chris Wilson of
the Wilson Institute--both dealing with the dynamic on the
U.S.-Mexico border and the need to secure our border without
sacrificing our way of life, trade, mobility, and our economy.
Chairman McCaul. Without objection, so ordered.
[The information follows:]
Article Submitted for the Record by Hon. Beto O'Rourke
February 10, 2013
gridlock on the rio grande
By Veronica Escobar, El Paso.
Talk of comprehensive immigration reform is welcome news--
especially because it could offer a possible path for citizenship for
undocumented immigrants and more visas for highly-skilled workers.
But the debate's focus on enforcement is ill-advised and its
approach is still too narrow. By emphasizing enforcement, Federal
resources won't go where they are truly needed: America's international
ports of entry, where millions of dollars in goods enter and leave the
country each day.
These ports are overburdened and underfinanced. While billions are
spent on walls and drones, the movement of people and goods is choked.
Instead of further militarization of our Southern Border, we need to
invest in the movement of people and goods through our land ports. The
El Paso area's five ports of entry handle tremendous traffic: In the
2011 fiscal year, they had 6.8 million pedestrian crossings, 811,000
truck crossings, and almost 11 million car crossings, which translated
into $80 billion in trade.
Much of that trade arrives in the form of trucks that go on to
points deep inside the country. But a substantial amount stays in El
Paso: Some 350,000 visitors walk across the Paso del Norte bridge into
downtown every month.
But these ports haven't received significant Federal investment in
personnel or technology for years. Facilities are outdated and
understaffed. A Texas Department of Transportation assessment found
that two were already at ``operational failure,'' with average peak
wait times of more than an hour for commercial traffic and 2 hours for
passenger traffic.
One has only to view the rush hour between El Paso and Ciudad
Juarez, its Mexican counterpart: Long lines of idling vehicles and
exasperated pedestrians, infuriating at best, hazardous--during
sweltering summer months--at worst.
Last year Steve Ortega, an El Paso City Council member, frustrated
by the lack of meaningful response to the long wait times, drove
repeatedly across the border to experience the process himself. Each
morning he waited at least twice as long as what was being reported,
mainly because most of the available lanes were closed for lack of
staff.
El Paso isn't alone; ports of entry all along the border need
investment. But for too long, policy makers, including the Obama
administration, have fixated on security and enforcement to the
exclusion of all else.
The result is a significant and chronic loss of jobs and trade on
both sides of the border. But long waits could be eliminated if the
Federal Government would aggressively invest in personnel, port
infrastructure, and technology.
El Paso County is building a new port of entry, but the Federal
Government has to pay for its personnel. Will it be another clogged
artery in a country that fails to recognize the enormous benefits of
cross-border movement, or will it be adequately staffed through more
rational immigration reform?
When Government prioritizes enforcement and minimizes the benefits
of the people and goods flowing through those ports, it does so at its
own peril. Just as a path to citizenship for the undocumented would
create millions of new taxpayers, a smoother path through our ports
would create stronger economies.
Veronica Escobar, a Democrat, is the county judge in El Paso.
______
Politico Article Submitted for the Record by Hon. Beto O'Rourke
Defining border security
By: Eric Olson and Christopher Wilson
February 10, 2013, 08:48 PM EST.
The recent announcements by President Barack Obama and a bipartisan
group of senators outlining broad principles for immigration reform are
very welcome. While the specifics of any reform will be hotly debated,
a major advance has been made with the emergence of a broad political
consensus, from left to right, that the current system is broken and in
need of major repair.
It would be troubling, then, if this golden opportunity to fix a
broken system falls victim to the very same trap that has ensnared
other reform efforts. By conditioning reforms on achieving a poorly
defined and much misunderstood notion of ``securing the border,'' the
whole effort is at risk of unraveling.
It has never been clear what precisely is meant by the term, but
billions have nevertheless been spent on fences and sophisticated
technology, and the Border Patrol is now more than five times larger
than it was two decades ago. Has the border been secured? Hard to say
since there is no agreement on the metrics for measuring border
security.
In the post-Sept. 11 era, border security has largely been thought
of in terms of terrorist threats, ``spillover'' violence from drug-
trafficking organizations operating in Mexico, and the risks associated
with undocumented migrants. The top priority for border law enforcement
has been denying entry into the United States to would-be terrorists.
To this end, enforcement has been quite effective: There are no
reported cases of a terrorist attack in the United States that involved
passage over our Southern Border.
While drug-trafficking-related violence in Mexico has increased
dramatically in recent years, violence has largely stayed in Mexico.
Illegal drugs continue to flow in significant amounts, but crime data
suggest that it has not contributed to a significant increase in crime
or violence in the United States. There are exceptions to this, such as
the 2009 kidnapping of a suspected drug trafficker in West Texas, but
these are exceptional cases, not a trend, and communities near the
border have, on average, rates of murder and violent crime that are
lower than the rest of the Nation. San Diego and El Paso, the two
largest cities on the border, are among the safest in the country.
Protecting the United States from the unauthorized entry of
migrants often becomes the default criterion for establishing border
security. Counting illegal crossings is inherently difficult, but we do
know that unauthorized crossings are at their lowest point in 40 years,
and the Pew Hispanic Center believes there are now as many Mexicans
leaving the United States as entering. Studies have also dispelled the
myth that immigration and crime are linked; in fact, the presence of a
large immigrant population appears to actually help make a city safer.
All of this is to say that defining border security is actually
quite complicated. The Department of Homeland Security has been
wrestling with this concept for some time, and is currently working to
revise its definition and measures of success.
In the absence of a clear definition and diagnostic of border
security to help focus their strategy, Congress and the past two
administrations have responded to border security concerns by
dramatically increasing spending on technology and personnel on the
border. The focus of these efforts has been the vast empty areas
between the official ports of entry. Yet nearly half of all
unauthorized immigrants in the United States entered through our ports
of entry with legitimate visas but failed to leave when their visas
expired, and most hard drugs like cocaine and methamphetamine likewise
enter via official crossing points. While the Border Patrol does appear
to be apprehending more unauthorized crossers, migrants are taking
ever-greater risks by heading farther into the desert, with hundreds
dying each year as a result.
The relative lack of attention on the official crossing points is
also getting in the way of business. Wait times at the border for cargo
and individuals have increased, resulting in new costs to manufacturers
and shrinking the number of customers who enter the United States each
day to shop. This same congestion can actually facilitate illegal
crossing and trafficking rather than decrease it.
So before Congress and the Obama administration fall into the
reflexive pattern of conditioning immigration reform on border security
and spending additional money to further beef up the Border Patrol, we
suggest they take a close look at what has already been done and
whether more of the same is really the answer. As Homeland Security
Secretary Janet Napolitano recently said at the Wilson Center, ``We're
getting to the point of diminishing marginal returns. What would really
help us is if we could improve the legal migration system so that
people come through our ports of entry.''
Instead of making another border buildup a pre-condition for
immigration reform, border security should be addressed in a way
complementary to immigration reform. To do so, two things are needed.
First, clearer metrics for border security must be established so we
can ensure limited resources are directed to where they can best
protect the Nation. Second, rather than more border security, we need
better border management. Creating more legal avenues for workers to
enter and depart the United States in an orderly fashion also serves as
a disincentive to illegal immigration and allows law enforcement to
focus its energy on more dangerous traffic. Similarly, at official
border crossings, techniques to expedite known, safe travelers and
shipments can free up resources to search for and deny entry to
criminals and contraband.
Eric Olson is associate director of the Latin American Program at
the Wilson Center and an expert on regional security and organized
crime. Christopher Wilson is an associate with the Wilson Center's
Mexico Institute and an expert on U.S.-Mexico trade and border
management.
Mr. O'Rourke. For Mr. Walker, you know, in your testimony I
was, I was very pleased to hear you talk about doing more with
less and for your request that we adopt efficiency,
effectiveness, economy, and credibility as the watchwords for
DHS going forward.
For a little bit of context for my question, I represent
most of El Paso, Texas, which with Ciudad Juarez forms one of
the largest binational communities in the world. We have five
land crossings connecting the two communities and two countries
over which pass $80 billion in trade every year.
In addition to that, there are millions of pedestrians and
auto crossings every year in El Paso and those crossing north
spend upwards of $2 billion in our economy, and the trade and
retail activities alone support about 50,000 jobs in my
community.
At the same time, we have 2-, 3-, even 4-hour wait times to
cross those bridges--up to 9 hours for trade--and so with the
over doubling of the Border Patrol force that we have seen in
the last 10 years, billions of dollars spent on border walls,
and the adoption of new technologies like drones to man the
border, how do we do more with less?
How do we prioritize our ports of entry and the legitimate
legal crossings taking place there and not sacrifice the
economies of communities like El Paso, the economies of the
State of Texas--Mexico is our largest trading partner--and the
economy of the United States; 6 million jobs are dependent on
U.S.-Mexico trade?
Mr. Walker. Well, first, I have been to El Paso several
times so I know exactly what you are talking about. Look, I
think we are all recognizing that the threats are real and they
are diverse. I think we are also recognizing that the resources
are constrained and are likely to get more constrained as time
goes on.
There is no such thing as zero risk and therefore I think
what it means is that we not only have to develop a
comprehensive integrated strategy but we have to work with our
partners, in this case, Mexico and if we are talking about
freight that is coming from Europe, or Asia or whatever, we
have to work more productively with our partners to be able to
figure out what can be done elsewhere but before you get to the
border, to keep able to use technology to a greater extent, and
to, you know, have human intervention on a more limited basis
in circumstances where we think there may be a credible threat
or there is something unusual, alright?
So there is clearly an opportunity to make more progress
there. Quite frankly, we are going to have to make more
progress there given that we can't mitigate all the risk and
given that we want the flow of people and we want the flow of
goods and given that resources are going to become more
constrained as time goes on.
Admiral Allen. Sir, could I make a comment?
Mr. O'Rourke. Please.
Admiral Allen. When I was commandant I served as the
chairman of the interdiction committee for 4 years and made
several trips to El Paso, and in the middle of 1970s I was one
of the people that set up the maritime program with the El Paso
Intelligence Ccenter. So I am familiar with El Paso.
I would like to focus a little on some of the challenges
the CBP has related to border operations and I think it is
really important to understand this. The inspections that take
place at ports of entry are done by the Office of Field
Operations and the Border Patrol's mission is between ports of
entry.
When you are looking at how to effectively--and I am really
cognizant of the trade issue down there. I recently did a panel
with Nelson Balido of the Border Trade Alliance looking at how
we could do this better and also Mr. Winkowski who is the
acting Customs Commissioner.
We need to look at the actual organic operation of the
ports of entry, how they are staffed, how they are resourced,
and we also need to look at how CBP is resourced to carry out
these missions.
They are still dealing with a legacy appropriation
structure that looks at fees that go back to when agriculture,
customs, and INS were actually separate inspections.
They have problems with their human resource structure over
time, how they handle their workforce, and it really restricts
their agility and flexibility on how they apply inspection
operations at ports of entry.
Likewise, I think we need to look at queuing on the Mexican
side of the border, how we handle truck traffic, which you know
there is a large amount of, agricultural products that come
across. Most of the offloads by trucks on the Southwest Border
are done for agricultural purposes.
I think, I try to bring all of these things together and
look at them as a system, and I look at the resource structure
that supports those in terms of the human resource practices
that are going on inside of CBP and how they have to fund their
personnel overtime and so forth is something that desperately
needs to be looked at.
Mr. O'Rourke. Very quickly, Admiral Allen, I was pleased to
hear you talk about the consequences of zero risk; one of which
would be zero trade to paraphrase what you said. I want to
commend and thank the Chairman and many others for their
remarks about the need to set defined goals, metrics that will
chart our progress towards those goals because right now,
border security can mean many different things to many
different people, and I am afraid that any more border security
in areas like El Paso will crush our economy, our way of life,
and threaten the National economy as well. So I appreciate your
testimony.
Chairman McCaul. The Chairman now recognizes the Chairman
of the Oversight and Management Efficiency Subcommittee, Mr.
Duncan.
Mr. Duncan. Thank you, Mr. Chairman, and thanks for your
confidence in me to handle the committee that you led so well
in the last Congress.
I want to thank the members of the panel for your service
to our great Nation in your various roles.
Specifically, Mr. Walker, and continuing, I will raise
awareness about the Nation's debt and our fiscal situation and
its threat to our National security.
If you followed the last Congress, you will understand that
one of the areas of emphasis that I had was Iran and the threat
that Iran and its proxies posed to the security of the United
States.
Mr. Leitner, if you could provide, I am gonna ask you to
provide in writing to the committee and myself, your thoughts
on Iran and specifically the Caracas-Tehran nexus in a post-
Chavez Venezuela.
That is an in-depth issue I know and so for my oversight
role, what I would like to ask you guys independent of that,
given the fact that the Department of Homeland Security has a
$59 billion budget, 225,000-plus employees--and I will start
with Mr. Walker--if you were named Secretary of the Department,
where would you direct the resources to meet your mission or
the mission of the Department?
Mr. Walker. Well, that is getting down to the detail. I
guess what I would say is I would come back to what I said. I
think that you have to have three things to effectively manage
any entity. You have to have a strategic and integrated plan
that is forward-looking, threat/risk/opportunity-oriented,
resource-constrained.
Second, you have to define specific goals and objectives.
What are you trying to achieve? How do you measure success?
Third, you have to have outcome-based performance metrics.
How can you end up measuring whether or not you are being
successful? Are you getting better or worse? How do you compare
to others on an outcome basis?
Third, you have to allocate your limited resources to be
able to maximize value, mitigate risk within current and
available resource levels.
That means: Do they have all of those? They don't have all
of that to the extent that they need to. Second: Who is going
to execute on this? Who is going to make sure that the systems
and the processes are in place and that you have continuous
improvement in order to be able to execute on these things? I
am talking about the--I am not talking about the operators, but
I am talking about the management aspects and support
mechanisms.
That is why I come back to a chief operating officer who is
focused full-time on these types of things because the fact is,
is that we have too much turnover in those critical roles that,
you know, very good political appointees are appointed, but
they don't necessarily have the right background. They don't
necessarily stay there long enough in order to effectively do
what needs to be done.
So, I mean, I would give you--that is what I think needs to
be done rather than saying I would give more money in this
particular area versus another because it would be, I think, I
don't have that data to be able to give you an intelligent
answer there.
Mr. Duncan. Okay. I am going to ask the admiral to comment
on that and then I am gonna come back to Mr. Ervin. How would
you allocate those resources to meet the mission?
Admiral Allen. Frankly, sir, I would go with the current
financial structure of the Department and start there. You need
to be able to enable mission execution with a mission support
organization and that is not completely integrated in the
Department now.
There have been great strides that have been made in the
last 10 years, but attempts to establish a core financial
accounting system and a standard human resource system have not
been successful.
One of the problems I think exists if you want to get right
to the bottom of it is that the appropriations structures for
each of the components is not the same.
It is not possible to compare personnel costs, operating
costs, and capital expenditures across the components. Because
of that, it is not possible to come up with future-years
homeland security plan very similar to the future-year defense
plan that allows consistency in planning, especially in capital
investment.
I believe that the first step towards getting our arms
around this would be to standardize the appropriation
structure--and this gets back to the comments I made about
CBP's having a legacy structure of fees that date back to their
legacy departments that have never been rationalized--so it
makes it almost impossible to estimate personnel costs.
This is like blocking and tackling of management. Without
that structure below you it is going to be very hard to do
that. I would start with the financial management structure of
the Department.
Mr. Duncan. Okay.
Mr. Ervin, how would you allocate the resources?
Mr. Ervin. Well, sir, I guess I would make a--one quick
overarching comment and then give a couple of items of detail.
I guess my overarching comment is I think the bulk of the
DHS' resources should be deployed on the counterterrorism given
the importance of that mission to the Department and the
genesis of the Department.
To be a bit more detailed about that, given this budget
environment, I think the DHS should look hard and I think this
committee can be helpful in this regard and I think, to be
fair, DHS is beginning to look hard. It needs to look harder.
Among the missions it performs, even within the
counterterrorism space: What is it that DHS can perform
uniquely that other agencies either literally cannot perform or
can't perform as well as DHS? I will give you two examples.
One is the Intelligence and Analysis, I&A unit, at DHS.
There are lots of other intelligence agencies, some 15 others
within the United States Government, but of all the multiple
intelligence missions out there, the one it seems to me that
DHS uniquely can play is to take the intelligence that the rest
of the community collects and analyze this and then make sure
that that intelligence is then shared with the private sector
that owns and operates the bulk of critical infrastructure and
State and local governments in a non-classified way, but in an
actionable way, in enough detail such that action can be taken
on it when action needs to be taken, and I don't know that DHS
has focused on that enough.
The second area that I would highlight is S&T. There are
lots of other S&T R&D components elsewhere in the United States
Government; DOD comes immediately to mind and that is the case
as well in the intelligence community.
It seems to me that S&T should do a better job of
piggybacking onto those research and development advances that
other agencies have developed and deployed, and then focus on
what it is uniquely that either DHS should develop or should
adapt for the unique purposes of the homeland security mission.
I think if that mindset is brought to bear we can see huge
economies, huge efficiencies, and a more effective security for
the Nation.
Mr. Duncan. Okay.
Thank you, gentlemen.
I yield back.
Chairman McCaul. The Chairman now recognizes the gentleman
from Texas, Mr. Vela.
Mr. Vela. Thank you, Mr. Chairman.
I, like Mr. O'Rourke, represent a border region in Texas. I
represent the most southern border region beginning in
Brownsville, and I just have a few questions.
Mr. Walker, you have on a few occasions mentioned the
difficulty in mitigation of risk, and I was curious if you
could expound on that.
Mr. Walker. I think my point is that we are never going to
fully protect the border. We are never going to fully protect
the air system. Just recognize reality. That is not going to be
the case.
It is an impossible task and therefore we also have to
recognize that we have got limited resources that are going to
become more limited and that is why it is so important to be
able to create this comprehensive integrative plan that focuses
on risk. There are certain areas of the country that are higher
risk than others.
There are certain modes of transportation that are higher
risk than others. There are certain areas of the country that
quite frankly where you don't have, you know, a large
population and you can use technology to be able to help scan
the border, but if somebody crosses the border, which they
easily can, you are going to have to have a system to be able
to get them within 100 miles or something of that nature in
order to be able to deal with it.
So we have to recognize there is no such thing as zero
risk. We have to mitigate risk. It will never be zero and we
need to mitigate it in an intelligent way where we are trying
to protect as many people as possible and as much assets as
possible given the resources we have.
Mr. Vela. Of course like Mr. O'Rourke, we have a
significant interest in our Texas border on the facilitation of
trade, so I share many of the same concerns that he has.
Admiral Allen, one of the questions I have for you is, I
was curious as to your thoughts on the significance and impact
of security in Mexico on the safety of citizens on our side of
the border.
Admiral Allen. Let me start with an overarching statement.
I believe the most significant security issue that Mexico has
to deal with is their southern border and their ability to
control illicit trafficking, movement of people.
Once either people or contraband moves into Mexico, we are
dealing with our own ports of entry. So I think as a general
statement, working with Mexico to enable them to do a better
job on their southern border is in everybody's best interest.
They have had tremendous challenges there; the new
administration coming into place has some ideas about what to
do with the national gendarme, if you will. They have been
effective in the past by using their naval forces and their
Marines as a special operation forces, if you will, to be
effective against the drug cartels.
We exchange information with Mexico. We are improving daily
on that. I think there has to be a shared common purpose on the
border related to exchange of information. There are some
barriers. Those barriers are starting to be dropped down, but I
think in the long run it is in our best interest to enable our
Mexican partners to deal with their southern border first and
then look at the art of the possible in dealing with our
borders as far as managing risk.
That includes things like taking advantage of high-
performance computing and data analysis to look at license
plate reader data, and other things out there that we can't put
into a data link or data cloud and do analytics on them to look
at trends and anomalies that would allow us to be able to
attack the areas of highest risk.
Mr. Vela. What is the state of affairs, so to say, of
Mexico's efforts on their southern border?
Admiral Allen. I might defer to other panel members here if
they have any information on that because I am a little time
late being out of the Coast Guard at this point.
I do know initiatives like the America Initiative may have
been put in place to give them resources and create capability
and capacity to allow them to manage those issues on their
southern border.
I believe that this is a regional issue. It is not just a
Mexican issue. The Central American countries that are
suffering the corrosive effects of drug movements that are now
moved into the littoral areas in mainland because of our
successes offshore are producing a regional risk down there.
I think the more that we can encourage regional approaches
to their southern border the better off we will be, but I think
anything that empowers them to have a better situational
awareness, to be able to move resources, and attack those
threat vectors that are crossing the southern border should be
our goal.
Mr. Vela. So do any of the other witnesses have that
information with respect to the current state of affairs of
Mexico's efforts on the southern border or is that something
left for maybe another witness?
Admiral Allen. I would defer to our current colleagues that
are in Government right now and potentially probably a
classified briefing.
Mr. Vela. Okay.
Thank you, Mr. Chairman.
Chairman McCaul. Thank you. The Chairman now recognizes the
gentleman from Utah, Mr. Stewart.
Mr. Stewart. Thank you, Mr. Chairman.
To the witnesses, thank you for being here today and thank
you, each of you, for a lifetime of service to your Nation.
This committee has broad responsibilities. We have touched
on some of those responsibilities today even if only briefly--
border security, anti-terrorism training and efforts, WMDs,
cybersecurity--I mean, the list is long.
I am a former Air Force pilot. Many years we were trained
to be effective; we had to analyze the threat. We had to
prioritize the threat in order to effectively defeat that and I
would ask you to kind of take a--you know--again an Air Force
analogy; a 30,000-foot view here.
Is there, with your various backgrounds and your areas of
expertise, is there a consensus at all about what our priority
should be? Our No. 1 priority?
If there is not a consensus, would you individually answer
the question? If you were king for the day, what would you do?
What would be the one thing that you would do in order to, you
know, most greatly enhance our security; the thing were all
striving to do?
Admiral, we will start with you if you don't mind.
Admiral Allen. Let me echo what was said earlier and I
quote my very good friend, Mike Mullen, past chairman of the
Joint Chiefs of Staff. I don't think it can be overstated
enough the current risk that the current budgeting situation,
continuing resolution, sequestration, and the uncertainty
associated with that has on National security.
Moving to actual threats themselves, I would place
cybersecurity at the top.
Mr. Stewart. Okay.
Admiral Allen. I think one of the challenges associated
with cybersecurity is that it manifests itself differently; the
different infrastructure sectors and with privacy. I think
somewhere we need to divide that out and then talk about what
an inherent Governmental role is within the regulatory
frameworks of each of those sectors, and find out where that
places where we can exchange the information that was alluded
to moving forward.
I think after that, we need to look at how we functionally
manage our borders--not just at a port of entry or between or
Border Patrol or field operations or Coast Guard does. We need
to look at the border as a holistic framework and how we are
going to minimize risk by, in my view what is underutilized
right now is bringing the various sets of data that are
resident in the components and taking advantage of high-
performance computing and data analytics to be more aware of
anomalies and where we ought to be putting our forces.
Mr. Stewart. So Admiral, just making sure I understand,
your No. 1 would be, focus would be, cybersecurity then?
Admiral Allen. Right now, yes.
Mr. Stewart. Okay. Yes.
Mr. Henry.
Mr. Henry. Well, I will follow on then on the admiral and
concur as well on cybersecurity. Although as a taxpayer and a
former Government employee working in the budget, certainly our
budget deficit is a significant concern to me for a lot of
different reasons that have been articulated here.
I think from the cybersecurity perspective, what we need to
do, king for a day, what is the one thing you need to do, I
think it really is defining the red lines and communicating
those red lines to our adversaries, so they know very clearly
what the repercussions are for attacking the United States of
America whether it be stealing intellectual property or
impacting our critical infrastructure.
That has got to be key, and again, we cannot just merely
try to reduce the vulnerabilities. That is important, but we
have to thwart the adversary. They have to know that they
cannot attack us.
There are so many comments that have been made here today
by each of the distinguished witnesses regarding
counterterrorism and protecting the border, all of those things
that they said absolutely apply right here to this space, to
cyber, it is a direct parallel.
Mr. Leiter talked about----
Mr. Stewart. Mr. Henry, could I, could I just add, follow-
on before you move on? It seems to me that they don't pay a
great price right now that to some degree they work with some
impunity towards us. Would you agree with that?
Mr. Henry. There is no risk to the adversary. The return on
their investment is tremendous.
Mr. Stewart. Yes.
Mr. Henry. They are stealing billions of dollars, and there
is no risk because nobody is telling then, ``Stop.''
Mr. Stewart. Yes.
Mr. Henry. Nobody--there is no penalty and until the
penalty and the threat to them, the risks to them, outweighs
the game, you are absolutely right, Congressman, there will be
no stopping this threat.
Mr. Stewart. Okay.
Admiral Allen. There is no barrier to entry.
Mr. Stewart. Yes.
Mr. Leiter. Congressman, with the caveat that I am a formal
naval aviator, so you might choose to dismiss everything I say.
Mr. Stewart. You are a bigger man than I am, if you have
landed on a carrier.
Mr. Leiter. Just close your eyes and pray. Congressman, I
would say two mission areas that I simply can't say one is more
important than the other; counterterrorism and cyber.
But on counterterrorism I am going to caveat that with we
can not aim to stop every small attack and we have to really
defend and prioritize the catastrophic event.
But there is a different priority that I would take which
is not mission-focused, it is following on what Mr. Walker and
Admiral Allen said. If I was king for a day, I would spend 75
percent of my time striving for true coordination and
cohesiveness across the Department, and then making sure that
the Department is really only doing those things that other
departments and agencies can't do in the rest of the Federal
Government.
By doing that, I am going to have a lot more capability and
resources to cover all of my other mission-focused priorities.
Mr. Stewart. Okay, thank you.
Mr. Walker. If you don't put your finances in order,
everybody will suffer to differing degrees over time and every
function of Government will suffer to differing degrees over
time.
Second, I do agree that we need to focus on, you know, a
more comprehensive and integrated approach, a more risk
management approach, focus on core competencies and comparative
advantage, which is I think what is being said. What can they
do uniquely?
Then last, cyber and border. I think, my personal view is
we are wasting a hell of a lot of money on what TSA is doing
domestically with regard to airport security.
You know what TSA stands for, right? The acronym? Yes,
okay.
Mr. Ervin. I associate myself with everything my colleagues
said. I particularly agree with Mr. Leiter. He said exactly
what I would say about where to focus.
You know, I think it is very tough to distinguish between
the degree of threat posed by cyber and terrorism. I think they
are essentially equal within terrorism.
I would agree with Mr. Leiter what he said earlier that we
need to focus most on events that are low-probability but high-
consequence, namely the threat of terrorists with the weapons
of mass destruction.
In terms of what to do about it, again I agree with my
colleagues. One thing that hasn't been said that I think is
important is that, you know, I think the figure of $100 billion
was used by Mr. Leiter earlier as the total amount of money
that has been spent since
9/11 to secure our country against the threat of terrorism. It
is something like that--yearly, annually. So it is a huge
amount of money needless to say.
But we don't have an integrated approach, a strategic
approach to the expenditure of that money. There is a lot of
duplication within DHS across agencies with regard to that and
I don't think--for example, part of the strategy is how much of
the total money spent is focused on preventing terrorism?
Countering violent extremism?
To what degree is that integrated across governments? So I
think greater attention needs to be paid to that and I think it
would yield outsize dividends if we were to.
Mr. Stewart. Thank you, all.
Mr. Chairman, I yield back.
Chairman McCaul. Thank you.
The Chairman recognizes the gentleman from Nevada, Mr.
Horsford.
Mr. Horsford. Thank you, Mr. Chairman.
I look forward to working with my colleagues on this
committee.
My district includes a portion of Las Vegas and our airport
there, the McCarran Airport, is the fifth-busiest airport in
the country; nearly 40 million people fly through that airport
on an annualized basis.
So listening to the testimony today, clearly security,
technology, innovation is at the forefront and I appreciate the
explanation while also balancing the interests of civil
liberties and protecting the privacy of individuals.
My question is: What are the processes in place to share
the best practices that we have learned over the last few years
in airport security, particularly in large airports like
McCarran, and how do we share that with other airports that
aren't yet at that level? And for airports that are at the
cutting edge, how do we make sure that they are staying at the
cutting edge?
Mr. Ervin. Well, I guess I will start there--start with it.
I think it is a very good question. I don't know frankly the
extent of which TSA focuses on best practices among airports.
You know, there certainly is a degree of variation among them.
There are differing degrees of effectiveness, differing
degrees of efficiency, differing degrees of innovation as you
said. I don't know that there is an organized way to do that,
but there certainly should be. I agree with that.
Mr. Walker. I fly multiple times every week all over the
country. I have been to all 50 States. I have been to 100
countries. I think that is a great question to ask the
administrator at TSA because it is a very clear to me they are
not consistent. They are not consistent and there are clearly
opportunities to share best practices and lessons learned, if
you will.
Mr. Leiter. Congressman, I am not sure of the best
practices, but I would say one thing for this committee to
consider how TSA and the Department of Homeland Security can
accelerate those programs that we all know work well, which are
real risk-based approaches, in particular global entry and TSA
PreCheck.
These are ways of focusing on the people you have to focus
on and not focusing on the people that you have already done
background investigations as a matter of intelligence are far
lesser threats.
Admiral Allen. Just to follow up, if you look at the risk-
based, screening is probably what you want to do. I don't think
there is any legal requirement to run people through scanners.
That is the technology or that is the process that is being
used right now even with the new advanced imaging technology.
I think the more you can understand about people and the
threat posed by that and the more you understand about them in
advance related to prescreening, the better off you are going
to be, but I would encourage TSA very much to go to risk-based
screening, to look at other areas other than just--and Clarke
already mentioned this--you know, just screening for anomalies
is not going to reduce risk to zero.
But to allow them to understand more about passengers, to
understand about behaviors, behavioral detection officers is
being deployed, and things that don't negatively impact the
queues.
Mr. Horsford. Mr. Chairman, just a follow-up briefly.
On the counterterror-attack funding--I think one of you
mentioned that earlier--I know that there have been issues in
the past where communities like ours that have a higher tourism
base aren't always taken into account in that methodology. Can
one of you touch on the need for that in various areas?
Mr. Ervin. Yes sir, I think I am the one who mentioned it,
but I am sure we would all agree with that. As you know, over
the course of the, you know, decade or so of post-9/11, DHS's
history, there has been a constant struggle over how
counterterrorism--scarce even then and even scarcer now--
counterterrorism dollars should be allocated.
You know, my argument is that, you know, perhaps there is a
role for pork barrel programs, one can argue about that, but if
there is, there certainly isn't a role for pork with regard to
counterterrorism dollars in particular in this time.
So I think on a bipartisan, bicameral basis, there needs to
be a consensus about the obvious that certain--the larger a
city is, the more iconic it is, like Los Angeles being a
tourism mecca, Las Vegas and--and I believe that there was some
interaction with the 9/11 hijackers in Las Vegas as a matter of
fact--the more likely it is that they continue, those cities
continued to--localities generally speaking--continue to be in
terrorists' crosshairs. So we have got to direct those
counterterrorism dollars to cities and localities most at risk.
Chairman McCaul. Thank you.
The Chairman now recognizes the gentleman from
Pennsylvania, Mr. Rothfus.
Mr. Rothfus. Thank you, Mr. Chairman.
Admiral Allen, I appreciated the interchange with
Representative Miller about the operational control of the
border issue.
You know, we are going to be taking a look at immigration
and one of the measures that they are going to be looking at is
securing the border and I think part of the discussion was
there is going to be maybe a commission that would certify that
the border is secure.
You know, what are going to be the criteria? Are there
objective criteria by which we can judge whether the border is
secure? What would we be looking for?
Admiral Allen. Well, it gets back to the comments I made
about the oil spill. These are sometimes subjective evaluation
of what is acceptable risk because the risk can never be driven
to zero.
But what it needs to be is an acceptance of risk that is
openly arrived at, transparent, and the criteria that is
supplied in the discussion needs to be universally understood,
recognized, and accepted.
That will be different in different parts of the border. It
is a far different border in Ciudad Juarez and El Paso than it
is in Detroit where you have got an international border there
with Canada.
I think what we need to strive for are criteria that we can
apply to a certain area that will produce different outcomes
depending on the geography and everything else.
Mr. Rothfus. What kind of criteria would we be looking for?
Admiral Allen. Well, the physical nature of the border
itself. Is there a land border? Is there a water border? The
type of access, the terrain.
The population density, the amount of cargo in traffic that
moves through it. How much of that is related to trade? How
much is foot traffic?
All of those are different dimensions----
Mr. Rothfus. So if it is a land border for example, are we
looking at a fencing issue, I mean looking at, you know,
remoteness----
Admiral Allen. Well, I think you----
Mr. Rothfus [continuing]. If it is a water border, are we
looking at certain either drones or cameras or something
watching?
Admiral Allen. If you look at a highly densely-populated
area, you can extend fencing out several miles either way and
you have not reduced the risk to zero but you have channeled
the threat to places where it can be more adequately dealt
with.
There are places where fences aren't going to do you any
good, out in the middle of nowhere. Where you have a river or
some other natural barrier, that needs to be considered.
I guess what I am saying is we need to come up with a
universally recognized and accepted set of criteria that will
allow us to make it the best assessment of risk and then accept
that in terms of what constitutes adequate border security
knowing that it will never be driven to zero and if we wait for
that we will never--if we drive it to zero, we will have no
trade in this country and you will never see immigration
reform.
Mr. Rothfus. As far as establishing those criteria, I guess
it is to policymakers in this House and looking to the people
in the administration who would be suggesting things also?
Admiral Allen. I believe, and this gets back to my
experience in environmental issues and the oil spill, there is
a much different view of what constitutes an acceptable level
of risk in the Gulf of Mexico say than there might be off
southern California or off the North Slope of the Arctic.
These are local issues that that need to be--that need to
be taken into account the concerns and the equities of those
communities, but I think from a National standpoint, we have to
come up with a set of criteria where we equally apply those to
areas knowing they will be different outcomes because as one of
my predecessors said, ``If you have seen one port, you have
seen one port.''
That doesn't mean you can't apply criteria to each port. It
might produce a different outcome, but then you have a standard
way to assess risk and know what kind of risk you are
accepting.
Mr. Rothfus. Thank you.
Mr. Henry, on cybersecurity, you know, taking a look at the
organization of the Department, we have an office in the
National preparedness--it used to be preparedness--the programs
and--NPPD directorate. There is an office of cybersecurity
there.
We also have cybersecurity elements in other components of
the Department. Is this the optimal organization for
cybersecurity issues at the Department? Should we be--we are
two levels down from the Secretary that I can see anyway on
handling cybersecurity issues.
Can you comment on the how the assets of the Department are
deployed with respect to cybersecurity?
Mr. Henry. Yes, let me first say that when we are talking
about cyber, we are talking about espionage, we are talking
about terrorism, we are talking about criminality. Cyber is
actually the tool.
So that is why so many of the things that we have talked
about here and other areas, border protection,
counterterrorism, et cetera are absolutely relevant in this
space. That is important to get out.
As it relates to DHS, I think that you need to have
visibility into this at the senior levels. I think that
executives have to be part and parcel of this. This is a whole-
of-Government response and a whole-of-agency response, and
there is a lot of overlap and many gaps and not enough
comprehensive review of this at the and in the departments and
agencies and writ large, the Government writ large, so I think
that that has got to be considered and look across the agency
and bring it, consolidate it into one particular area with the
leadership of the executives directly involved.
Admiral Allen. I might suggest there are three roles inside
the DHS related to cyber, and I am going to go functional not
related to the threat that Mr. Henry talked about.
The first is the Department has to protect its own network.
The second: There is a role right now for the Department in
coordinating across the dot-gov domain, in terms of continuous
diagnostics and monitoring, to bring them in compliance with
the administrative directive regarding how the entire
Government will defend its networks.
Third is the external requirement that we have discussed
here today to interact with the private sector, especially
regarding infrastructure protection and how those sectors will
be protected, and that is a work in progress impacted by the
Executive Order that was signed by the President yesterday and
hopefully will be codified and have legal ambiguities removed
through legislation that is passed by Congress.
So if you look at those tiering, it is easy to kind of
break out who in the Department is doing what. For internal
network security you are talking about the CIO. When you are
talking about their role in relation to the dot-gov domain and
the private sector, then you are talking about NPPD, but there
also is a role for Intelligence and Analysis that are related
to how they are dealing with the State and local governments in
the critical infrastructure sectors as well.
Mr. Rothfus. Thank you.
Thank you, Mr. Chairman.
Chairman McCaul. The Chairman now recognizes the gentlelady
from New York, Ms. Clarke.
Ms. Clarke. Thank you, Mr. Chairman.
I thank the Ranking Member.
I thank all of you who have testified before us today, and
I am going to be a little bit more provocative than some of my
other colleagues because I truly believe that while we all have
good intentions when it comes to homeland security, we are
really playing at homeland security, we are not doing homeland
security.
I say that in the light of the fact that when you look at
our armed services and the role that they play in securing our
Nation, if we treated our armed services the way we treat
homeland security, other nations would be eating our lunch.
Other nations would be eating our lunch.
The title of today's hearing was ``A New Perspective on the
Threats to Homeland,'' and as a New Yorker I am extremely
sensitized to it having lived and currently living in New York
City; I am extremely sensitized to it.
But when I have CBP officers or, come to my office to tell
me how at any moment in time something really bad can happen
because they are doing double, triple shifts because assets
have been moved to the Southern Border and we are not looking
at the whole matrix of what needs to be done to actually have
the FTEs in place to protect our Nation, I get concerned.
I get extremely concerned, and when we talk about
cybersecurity for instance, we know what the vulnerabilities
are. It is not a matter of, you know, how it is going to
happen, it is--it is like, when is it going to happen, at this
stage.
So my concern is that while yes we are trying to do more
with less, why are we playing with homeland security? Why is it
that everyone is so ambivalent to talk about what is really
required to secure the homeland?
I am really intrigued at the fact that were this the
Marines, the Air Force, the Navy, the Coast Guard, that we
would not have the same posture about it.
So I want to raise a question because we are talking about
threats to the homeland and when you have a situation where
ports of entry for instance like JFK Airport has far fewer
workers, CBP officers, than they had prior to 9/11 working on a
given shift. You have hundreds if not thousands of people
coming through customs. They are waiting in a very--about the
size of this room, maybe a little bit bigger, to go through and
be documented and be screened.
You have people waiting there for 2 and 3 hours and mayhem
breaks out and you have got like four guys sitting there. Is
that not a threat? Does not that--something like that--pose a
problem for us as a Nation and how do we bring efficiency, how
do we bring balance to what we are looking at?
When people are able to walk around a CBP officer and leave
undetected the airport and then we find out that, you know,
there is a superhighway within our communities of drug flow, of
gun flow.
Isn't there some connection that we should be looking at in
terms of threats to the homeland? I am raising this because I
am a bit concerned--I have heard all of you speak to the threat
of terrorism but terrorism is one aspect of homeland security
and we are so fixed on it as we should--listen--well, I have
been through two terrorist attacks.
My father worked for the Port Authority, so I am not
looking at this as someone who doesn't understand what
terrorism is, but I have also been in City Hall when my
colleague was gunned down. So I know what illegal handguns can
do.
How do we look at this comprehensively and how do we raise,
stand up this agency, so that it does what it needs to do
without excuse, without equivocation?
Because what I am hearing here today is that well we are
going to do more with less. Well, you know what, we invested in
IC about one, two, three, four, five, six technology
deployments for the Southern Border at the cost of billions of
dollars that never worked, that never worked.
Yet my airport is a powder keg ready to explode. I am
putting this out there just a little frustration. I wanted to
raise it with you because I wanted to get a sense from you of,
you know, what do we really see as the role of CBP?
If they are not the first line of defense than who is? That
is one question. I will have you answer that and then I will
come back with my next.
Admiral Allen. I will take a stab----
Ms. Clarke. But if you can just share with me your----
Admiral Allen. If I could maybe provide a little context.
What you are talking about, terrorism, drug trafficking,
trafficking human beings, trafficking and guns, what you are
really talking about is illicit trafficking that produces
financial resources that perpetuate criminal activity. Now I
would classify terrorists as political criminals.
All of these networks require money to continue to operate
and I didn't discuss it specifically, but I think one of the
challenges facing the Department and the country right now is
how to deal with these criminal networks by attacking a network
with a network.
When we talk about cyber, we talk about defending a network
with a network. I think we need to understand that these
threats start to pass organizational boundaries that a lot of
our traditional law enforcement agencies are created for one
specific threat; DEA in drugs; ATF in guns, and so forth.
What we need to understand is moving ahead in this country
and dealing with either criminal activity, terrorist activity--
we have got to start breaking down the barriers between
agencies that are being constructed to attack one problem, put
the information together, and attack a network with a network.
Ms. Clarke. Isn't that what DHS does? Isn't that their
role?
Admiral Allen. That gets back to the high-performance
computing data analysis, information sharing, breaking down IT
stovepipes, coming up with a common operating, common
intelligence picture. I think it is a major challenge for the
Department.
Mr. Leiter. Congresswoman, I will be a bit provocative
back. Without disagreeing with you that you of course have to
have adequate staffing to deal with whatever threat you see,
first of all, we shouldn't be looking at the Department as
having counterterrorism resources. I agree with you. They have
border protection and security resources and those should be
applied equally across different missions.
In most cases, not many things are actually specialized and
cut down one mission area. You can work all of these security
threats, but the place where I will be a bit more provocative
is I think you have very little sense of whether or not
security at Kennedy Airport has been increased because there
are four people or eight people there at the border.
What we learned in the case of Umar Farouk Abdulmutallab on
Christmas day in 2009, is that if we are waiting to screen
these people once they get to JFK, we have probably already
lost the fight.
So I would go to Admiral Allen's point. The question is:
How is the National Targeting Center for CBP doing in screening
these travelers before they even get there, either stopping
them from getting on a plane and arriving at JFK or knowing
which ones they have to screen additionally?
So I do think it is more than a uni-dimensional look at the
number of people that are at that airport.
Mr. Walker. Yes. I would say don't focus on how many people
they have and how big the budget is because that is not
necessarily indicative of outcome-based results. I will give
you some examples.
We spent two-and-a-half times per person for health care.
We spent two-and-a-half times per person for K-12 education,
and we get poor results. We are not top 25 in the world, okay.
If you look at the Defense Department, I can assure you
that the Defense Department has a huge amount of waste, a huge
amount of waste, and they are going to have to be cut too.
But it comes back to what a lot of us have been saying. You
need a plan, you need a comprehensive and integrated plan. You
need to define risk and measure risk. You need to determine
what are you trying to accomplish and how do you measure
success in that regard, and you have to allocate your limited
resources, whatever they are, to try to accomplish the most
with what you have; focus on outcomes. I think there is clearly
room for improvement there.
Ms. Clarke. Thank you, Mr. Chairman.
Chairman McCaul. I thank the witnesses for their valuable
testimony.
The record will stay open for 10 days pursuant to the rule.
Without objection, this committee stands adjourned.
[Whereupon, at 12:27 p.m., the committee was adjourned.]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|