[House Hearing, 108 Congress] [From the U.S. Government Publishing Office] NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES ======================================================================= HEARING before the SELECT COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED EIGHTH CONGRESS SECOND SESSION __________ AUGUST 17, 2004 __________ Serial No. 108-55 __________ Printed for the use of the Select Committee on Homeland Security Available via the World Wide Web: http://www.gpoaccess.gov/congress/ index.html __________ _____ U.S. GOVERNMENT PRINTING OFFICE 25-324 WASHINGTON : 2006 _________________________________________________________________ For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 SELECT COMMITTEE ON HOMELAND SECURITY Christopher Cox, California, Chairman Jennifer Dunn, Washington Jim Turner, Texas, Ranking Member C.W. Bill Young, Florida Bennie G. Thompson, Mississippi Don Young, Alaska Loretta Sanchez, California F. James Sensenbrenner, Jr., Edward J. Markey, Massachusetts Wisconsin Norman D. Dicks, Washington David Dreier, California Barney Frank, Massachusetts Duncan Hunter, California Jane Harman, California Harold Rogers, Kentucky Benjamin L. Cardin, Maryland Sherwood Boehlert, New York Louise McIntosh Slaughter, New Joe Barton, Texas York Lamar S. Smith, Texas Peter A. DeFazio, Oregon Curt Weldon, Pennsylvania Nita M. Lowey, New York Christopher Shays, Connecticut Robert E. Andrews, New Jersey Porter J. Goss, Florida Eleanor Holmes Norton, District of Dave Camp, Michigan Columbia Lincoln Diaz-Balart, Florida Zoe Lofgren, California Bob Goodlatte, Virginia Karen McCarthy, Missouri Ernest J. Istook, Jr., Oklahoma Sheila Jackson-Lee, Texas Peter T. King, New York Bill Pascrell, Jr., New Jersey John Linder, Georgia Donna M. Christensen, U.S. Virgin John B. Shadegg, Arizona Islands Mark E. Souder, Indiana Bob Etheridge, North Carolina Mac Thornberry, Texas Ken Lucas, Kentucky Jim Gibbons, Nevada James R. Langevin, Rhode Island Kay Granger, Texas Kendrick B. Meek, Florida Pete Sessions, Texas Ben Chandler, Kentucky John E. Sweeney, New York John Gannon, Chief of Staff Stephen DeVine, Deputy Staff Director and General Counsel Thomas Dilenge, Chief Counsel and Policy Director David H. Schanzer, Democrat Staff Director Mark T. Magee, Democrat Deputy Staff Director Michael S. Twinchek, Chief Clerk (II) C O N T E N T S ---------- Page STATEMENTS The Honorable Christopher Cox, a Representative in Congress From the State of California, and Chairman, Select Committee on Homeland Security.............................................. 1 The Honorable Jim Turner, a Representative in Congress From the State of Texas, Ranking Member, Select Committee on Homeland Security....................................................... 3 The Honorable Robert E. Andrews, a Representative in Congress From the State of New Jersey................................... 64 The Honorable Dave Camp, a Representative in Congress From the State of Michigan.............................................. 39 The Honorable Lincoln Diaz-Balart, a Representative in Congress From the State of Florida...................................... 85 The Honorable Benjamin L. Cardin, a Representative in Congress From the State of Maryland..................................... 50 The Honorable Donna M. Christensen, a Delegate in Congress From the U.S. Virgin Islands: Prepared Statement.................... 7 The Honorable Peter A. DeFazio, a Representative in Congress From the State of Oregon............................................ 36 The Honorable Norman D. Dicks, a Representative in Congress From the State of Washington........................................ 37 The Honorable Jennifer Dunn, a Representative in Congress From the State of Washington........................................ 6 The Honorable Bob Etheridge, a Representative in Congress From the State of North Carolina.................................... 100 The Honorable Barney Frank, a Representative in Congress From the State of Massachusetts......................................... 40 The Honorable Jim Gibbons, a Representative in Congress From the State of Nevada................................................ 62 The Honorable Bob Goodlatte, a Representative in Congress From the State of Virginia.......................................... 45 The Honorable Jane Harman, a Representative in Congress From the State of California............................................ 47 The Honorable Ernest J. Istook, Jr., a Representative in Congress From the State of Oklahoma..................................... 93 The Honorable Peter T. King, a Representative in Congress From the State of New York.......................................... 49 The Honorable James R. Langevin, a Representative in Congress From the States of Rhode Island................................ 105 The Honorable Sheila Jackson-Lee, a Representative in Congress From the State of Texas........................................ 66 The Honorable John Linder, a Representative in Congress From the State of Georgia............................................... 52 The Honorable Zoe Lofgren, a Representative in Congress From the State of California............................................ 86 The Honorable Nita M. Lowey, a Representative in Congress From the State of New York Oral Statement................................................. 60 Prepared Statement............................................. 8 The Honorable Karen McCarthy, a Representative in Congress From the State of Missouri: Prepared Statement...................... 9 The Honorable Kendrick Meek, a Representative in Congress From the State of Florida........................................... 108 The Honorable Eleanor Holmes Norton, a Delegate in Congress From the of District of Columbia.................................... 136 The Honorable Bill Pascrell, Jr., a Representative in Congress From the State of New Jersey................................... 33 The Honorable Loretta Sanchez, a Representative in Congress From the State of California........................................ 119 The Honorable John B. Shadegg, a Representative in Congress From the State of Arizona........................................... 55 The Honorable Christopher Shays, a Representative in Congress From the State of Connecticut.................................. 35 The Honorable Louise McIntosh Slaughter, a Representative in Congress From the State of New York: Oral Statement................................................. 53 Prepared Statement............................................. 10 The Honorable Lamar S. Smith, a Representative in Congress From the State of Texas............................................. 31 The Honorable Mark Souder, a Representative in Congress From the State of Indiana............................................... 58 The Honorable John E. Sweeney, a Representative From the State of New York....................................................... 87 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi.................................. 30 WITNESSES Panel I The Honorable Lee H. Hamilton, Vice Chair, National Commission on Terrorist Attacks Upon the United States: Oral Statement................................................. 15 Prepared Statement............................................. 19 The Honorable Thomas H. Kean, Chair, National Commission on Terrorist Attacks Upon the United States: Oral Statement................................................. 11 Prepared Statement............................................. 19 Panel II The Honorable J. Cofer Black, Coordinator, Office of the Coordinator for Counterterrorism, Department of State: Oral Statement................................................. 67 Prepared Statement............................................. 68 Ms. Maureen Baginski, Executive Assistant Director for Intelligence, Federal Bureau of Investigation: Oral Statement................................................. 77 Prepared Statement............................................. 79 Mr. John Brennan, Director, Terrorist Threat Integration Center: Oral Statement................................................. 74 Prepared Statement............................................. 75 General Patrick Hughes, Assistant Secretary for Information Analysis, Department of Homeland Security: Oral Statement................................................. 70 Prepared Statement............................................. 70 For the Record Responses from Ms. Maureen Baginski: Quesitons submitted by the Honorable Edward J. Markey.......... 139 Questions submitted by the Honorable John Sweeney.............. 139 NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES ---------- Tuesday, August 17, 2004 House of Representatives, Select Committee on Homeland Security, Washington, DC. The committee met, pursuant to call, at 9:40 a.m., in room 345, Cannon House Office Building, Hon. Christopher Cox [chairman of the committee] presiding. Present: Representatives Cox, Dunn, Smith, Shays, Camp, Diaz-Balart, Goodlatte, Istook, King, Linder, Shadegg, Souder, Gibbons, Granger, Sessions, Sweeney, Turner, Thompson, Sanchez, Markey, Dicks, Frank, Harman, Cardin, Slaughter, DeFazio, Lowey, Andrews, Norton, Lofgren, McCarthy, Jackson-Lee, Pascrell, Christensen, Etheridge, Langevin, Meek, and Chandler. Chairman Cox. Good morning. The Select Committee on Homeland Security will come to order. The prior business of the committee will stand adjourned, and the committee will proceed to hear testimony pursuant to notice on the 9/11 Commission recommendations concerning homeland security information sharing. Let me welcome the distinguished chairman and vice chairman of the Commission, Tom Kean and Lee Hamilton. We appreciate your appearance before us today. This committee, Republicans and Democrats alike, commend you for your work and for your significant contribution to our national effort to apply the lessons learned from the tragedies of September 11th. This committee and the 9/11 Commission both have a common origin. We were formed because of and in the wake of the catastrophic terrorist attacks against America. Both Congress and the President swiftly recognized that neither the executive nor the legislative branch of our government was organized to deal with this terrorist assault. This committee, as you know, represents the only structural change thus far in Congress, since September 11th, which was undertaken specifically to deal with the threat of international terrorism to the United States. As such, you can understand why we are here to conduct this hearing into your findings and your recommendations. As chairman, I can report that this committee has consistently pursued a legislative and policy agenda to focus congressional attention on preventing and preparing for acts of terrorism targeting the United States. This has been a bipartisan effort owing in part to the strong and able leadership of our ranking member, Jim Turner, and also to the recognition by all our members that the security of the American people must transcend politics, even in an election year. Partisanship will surely cause us to fail. The theme of today's hearing is information sharing, which was a primary focus of the Commission, as it has been of numerous hearings of our committee. In the fight against international terrorism there can be no higher priority. Nor do we treat this subject narrowly. It encompasses fundamental issues of structure, systems, policy, and leadership. It is about getting vital information to those who need it in time to prevent harm to Americans. The 9/11 Commission has done a superb job in investigating and recounting for the American people the details of the Al- Qa'ida attacks on our Nation nearly 3 years ago. In 77 minutes on that fateful day, terrorism on U.S. soil took over 3,000 innocent American lives. The report shows in graphic detail how the terrorists exploited systemic weaknesses to defeat one U.S. Government agency after another. These were agencies that we reasonably could have expected to stop the terrorists--the Intelligence Community, law enforcement, the Federal Aviation Administration, the State Department, and the Department of Defense. Nor does the report spare the Congress. The Commission concludes that the Congress had failed to organize itself to deal effectively with post-Cold War national security threats in general and international terrorism in particular. Your indictment, therefore, is not just of our Intelligence Community, but of the way the entire U.S. Government was organized with respect to counterterrorism. The Intelligence Community does not exist in a vacuum. Its priorities and performances are clearly influenced both by executive branch structures and by the authorization and appropriations committees in the Congress. Reforms will not succeed, the report concludes, unless the priorities of the President, the Federal Government, and the Congress are brought into alignment for the future. And this means each branch must be properly organized to do this, which is still not the case today. President Bush has gotten ahead of this issue by accepting two principal recommendations from the Commission. First, with regard to establishing the National Counterterrorism Center, and second, by proposing a National Intelligence Director. These swift and bold decisions are consistent with his repeated statements that whatever we have achieved over the past 3 years, we have much more work to do to protect the American people. The President clearly sees the 9/11 Commission report as helping toward this end, and so should we here. I know the Commission will stay engaged with us as we grapple with these active issues in the months ahead. You have not just delivered a carefully prepared historical analysis, but you have also significantly advanced the long-term prospects for fundamental reform. Finally, let me turn to the Commission's look at the performance of Congress over the past several years. The report found Congress wanting in several key areas. Congress, the report says, is too much oriented toward domestic rather than foreign affairs. Congress has resisted reorganizing itself to deal with the post-Cold War threat environment, including international terrorism. Congress has focused on selective investigations over comprehensive and thorough oversight. And Congress has allowed rigid and unchanging committee jurisdiction to skew priorities, often against heightened security concerns in a changing world. That is an unflinching diagnosis. All of us, Republicans and Democrats alike, would have preferred a different one. But we do hear you, and we must now do something about it. The Commission follows this provocative analysis with a recommendation that permanent standing committees on homeland security be established in both the Senate and the House. These far-reaching recommendations I know will be delved into even more deeply this morning. Let me thank you both once again for coming before our committee this morning. I am eager to hear your testimony and to remain engaged with you in the challenging year ahead. Let me now turn to our distinguished ranking member, Jim Turner, for his opening remarks. Mr. Turner. Thank you, Mr. Chairman. Thank you for calling this very important hearing. I want to acknowledge the presence of all of our colleagues here today to deal with this very critical issue. And I have been a part of several other hearings where many of the family members of the families of the 9/11 victims have been with us. I want to acknowledge their steadfastness in following this issue and working together with the 9/11 Commission to bring us to the point where we can make America safe. Governor Kean and Congressman Hamilton, we are very pleased to have you before us. I know you have had a rigorous schedule of testifying. I know, Governor, you are probably tired of hearing all of Lee Hamilton's former colleagues brag on him, but we want to do that once again here today. I was listening to Congressman Hamilton's successor, Baron Hill; in talking about him the other day in the Armed Services Committee, he pointed out that following Lee Hamilton in office was kind of like following Abraham Lincoln in office. Lee Hamilton did such an outstanding job for many years leading us, particularly in the area of foreign policy. So we are very honored by your presence and we thank you for being with us. Most importantly, thank you for your leadership of a bipartisan commission. Your unanimous report creates, I think, the political conditions that are necessary to advance meaningful reform. You have invited all to embrace your report and its recommendations. And in the partisan world of Washington, D.C., you have produced a truly bipartisan product. We commend you in that effort. You have not dealt with the blame game, wisely recognizing that prior to 9/11 failing to take Al-Qa'ida seriously was a pervasive fault. Now, here we are almost 3 years after 9/11, and frankly we have no excuse. We have heard repeatedly from numerous scholarly reports, recommendations for action. Today, we are confronted with the clear threat of another major attack on our country. The reality of these continued threats should be a stark reminder to us that we have much more to do to make America safe. You have been very clear in your recommendations that just moving a few positions around on the organizational chart as the proposed National Director of Intelligence will not get the job done. You have said we need a grand strategy, a comprehensive, long-term approach to address a new enemy, militant Islamic jihadism. Defeating this enemy, you say, requires a three-pronged approach: one, attacking the terrorists more aggressively; two, securing our homeland better; and three, pursuing policies and initiatives to prevent the rise of future terrorists. Only one of your recommendations, I note, deals with the role of the military; 21 of your recommendations deal with strengthening homeland security, 10 of your recommendations deal with preventing the rise of future terrorists. Clearly we must transform the military to defeat this new enemy. Condoleezza Rice testified to your commission that in June of 2001 when she was tasked with drawing up plans to attack Al- Qa'ida and the Taliban, in her words, quote, ``The military didn't particularly want this mission.'' We are trained and equipped to fight nations and armies, but the new enemy requires new training, new capabilities, and new missions. We defeated communism in the last century by maintaining superior military capabilities and by projecting our values and our ideals as a nation to the rest of the world. When the Berlin Wall fell, not one shot was fired. Radical Islamic fundamentalism must be defeated by the same force of our ideals and our values. Secretary Rumsfeld, in his now famous memo, asked this: He said, ``Are we capturing, killing or deterring and dissuading more terrorists every day than the madrasas and the radical clerics are recruiting, training, and deploying against us? The United States is putting relatively little effort into a long-range plan, but we are putting a great deal of effort into trying to stop terrorists.'' That is from the Secretary of Defense. The 9/11 Commission gives us a long-range plan to stem the rise of future terrorists, and it begins with supporting the voices of moderation in the Islamic world. The Commission recommends investment in education and economic partnership in the Muslim and Arab world with America offering, in your words, an example of moral leadership in the world committed to treat people humanely, abiding by the rule of law and being generous and caring to our neighbors. This clearly will require American leadership in building strong alliances and coalitions around the world. If our government continues to ignore the 10 recommendations of the Commission to prevent the rise of future terrorists, we have no strategy for victory over terrorism. We will be left to decades of fighting the terrorists both abroad and here at home. And until we achieve this ultimate victory over terrorism, we have no option but to implement vigorously the 21 recommendations of your report dealing with securing the homeland. I am pleased that we can report to you that our committee has already taken action on your recommendation to distribute homeland security funds based solely on the assessment of threats and vulnerabilities. We acted on this in a unanimous and bipartisan way last February. Now this legislation should be set for debate on the House floor. For over 2 years we have called on the administration to close the security gaps facing America as outlined in many of your recommendations. The 9/11 Commission has stated that unscreened air cargo is a threat to our security. Congressman Markey and Congressman Shays have called for action on this for over 2 years, yet little has been done to close that security gap, and the vulnerability remains. The 9/11 Commission has stated that we need a biometric interoperable border screening security system. Members of Congress on both sides of the aisle have been advocating for such a system for many years. Yet the 9/11 Commission has concluded that the US VISIT system, initiated by the Department of Homeland Security, is built on, and I quote, ``antiquated computer environment.'' That will have to be replaced. Almost 3 years after 9/11 we still do not have an interoperable border security system. We still have not achieved integrated information sharing among intelligence agencies. The 9/11 Commission has noted that even after the deadly rail attacks in Madrid, the Department of Homeland Security has failed to develop an integrated strategic plan for the transportation sector. My colleague, Congresswoman Holmes Norton, called for this action months ago in our legislation to better secure our rail and public transportation sector, but there has been no action. The list could go on. The 9/11 Commission report is a wake-up call for our government. We need to regain the sense of urgency that we all had after September 11th. With 21 recommendations on homeland security, we should, Mr. Chairman, schedule hearings on each of these recommendations jointly with other committees when appropriate to be ready to act on comprehensive legislation that addresses each of the Commission's 41 recommendations. We also should be proceeding with the suspended markup of our Homeland Security Authorization Act. Many of the amendments that my colleagues and I would offer to that bill relate directly to the recommendations of the Commission. Democrats met last week with Governor Kean and Lee Hamilton to talk about the report and to let it be known that we are ready to get to work. I hope that this committee can provide and will provide the leadership necessary over the next few weeks to move forward on this important task. Governor Kean, Mr. Hamilton, thank you again for your leadership in helping make America safe. America is grateful for what you and your colleagues have done, and for your dedication and your commitment we will be eternally grateful. Thank you, Mr. Chairman. Chairman Cox. I thank the gentleman. I would advise members of the outset that both Chairman Kean and Vice Chairman Hamilton have been generous with their time today. They are available to be with us all morning, and they have requested that they be dismissed at 12:15. In order to provide sufficient time for questioning by all members, I would ask members to consider waiving or limiting the durations of opening statements. If members have written statements, they may as always be included in the hearing record. The vice chairman of the full committee, the gentlelady from Washington State, Ms. Dunn, is recognized for her opening statement. Ms. Dunn. Thank you, Mr. Chairman. I too thank the witnesses for coming yet another time to testify before our committee--a very important committee, though, I believe, of people who are representative of districts all over the Nation. And we have flown in today to make sure that we hear from you firsthand. It is a credit to you that you have got so many members here today, because we believe that you have done a very thoughtful job and have brought sensitivity and attention to an issue that we have been dealing with now for almost 2 years. So thank you for being here. The terrorist attacks on September 11th forced all of us to think differently about life in America. We realize we faced a new enemy, one that is not easily contained or eliminated. That day we shifted our focus and our resources. The terrorists didn't make us fearful as they had hoped they would do. They strengthened our resolve. They have not made us cower. We have confronted them with international might. Most of all, the terrorists have reminded us of what is great about America: freedom, democracy, justice, values that we will always fight for. These radical groups are creative and enduring in their effort to bring down the values of the Western civilization. We must be just as unwavering and innovative in our effort to prevent them from doing so. The 9/11 Commission's report has provided an insightful road map for our continuing effort to reform systems and processes that were not designed to confront the present enemy. Today, we will hear firsthand from Commission leaders as well as Federal officials of counterterrorism responsibilities. House and Senate leadership are committed to swift action on the Commission's report. In the following weeks, the American people will see a careful and thoughtful process that takes into account the progress that already has been made by the administration and the Congress as well as the equally thoughtful calls for action in the Commission's report. We have a lot of work to do. The President has already proposed creating a National Intelligence Director as well as a National Counterterrorism Center, two changes suggested in your report. It is also important to note that of the 19 recommendations for intelligence reform issued by the joint Senate-House inquiry last year, which are consistent with the 9/11 Commission's recommendations, Congress and the administration already have implemented or addressed all but three of those. As we take action on the 9/11 Commission's ideas, we will also consider the Commission's recommendation to focus congressional oversight. Successful reform of Federal Government agencies will absolutely depend on effective oversight. And the current system which requires Homeland Security Secretary Tom Ridge and his chief deputies to report to an estimated 88 committees and subcommittees reinforces the status quo and is unacceptable. We will continue to seize this opportunity for reform. And during our consideration of bold proposals, we will not discount the reform that has already taken place--the consolidation of 22 Federal agencies within the Department of Homeland Security; the establishment of the Terrorist Threat Integration Center, centralizing information and manpower from several intelligence agencies; the passage of Project BioShield--all bold steps that have made us safer than we were on 9/11. In a Presidential election year, it is especially tempting to focus on what has been done wrong and not what has been done right. As we focus on the Commission's recommendations, I am confident that all of us will put politics aside. It would be a mistake and a disservice to our constituents to ignore the progress we have made since 9/11. Today we welcome ideas for continued process. Thank you, Mr. Chairman. Chairman Cox. I thank the gentlelady. Does the gentleman from Mississippi, Mr. Thompson, have an opening statement? Mr. Thompson. Mr. Chairman, in the interest of getting to the substance of why we are here, I will reserve the time allotted to me. Mr. Frank. Mr. Chairman, as greatly as I respect my colleagues, I would not have interrupted my vacation to come listen to us all make speeches. I ask unanimous consent that we waive opening statements and get right to the witnesses. Prepared Statement of the Honorable Donna M. Christensen Thank you Mr. Chairman. I want to, at the outset, commend you Mr. Chairman for scheduling a hearing before this committee on the recommendations of the September 11th Commission. Mr. Chairman, I welcome the opportunity to discuss the Commission's findings and recommendations with the Commission's distinguished Chairman and Vice-Chairman. They are to be commend for the remarkable job they have done, not only in spearheading the drafting of the report but also for the generous way that they have given of their time in appearing before a number of other committees to press for the enactment of their recommendations in their entirety. I also appreciate that we will hear from the Mr. Brennan of the TTIC again, as well as a comprehensive list of witnesses who will allow us to fully explore the need for a better homeland security information sharing system between agencies and state and local governments. Coming close to the end of the committee listing, I am sure that most of the broader questions will have been asked. My interest then is in border security, the treatment of the territories and Indian reservations, funding and preparedness of first responders, and how we regain our position of moral leadership in the world. Over the past two weeks, in response to the 9/11 commission report and in preparation for this hearing, I convened Town Meetings across my Congressional District to gage my constituent's reaction to the commission's recommendations. These meetings were hugely successful in demonstrating the importance the people of the Virgin Islands place on the protection of the community and the United States as a whole. Overall we endorse the findings and recommendations of the Commission, but stress the need for a planned approach developed on the basis of study and research. To the extent we are still not as well prepared as we should be and limited in our capacity to adequately respond, I believe it is because all along we have ``reacted'' instead of ``responded.'' I daresay, if lack of imagination was a fault before 9/11, it continues to be so today, closely followed by being entrenched in the old ways things were always done. This and the other legislative body bear much of the responsibility for the latter, and I see little signs of willingness to change. Change was and is needed to meet new threats and new methods of attack that are only limited by the imagination, will and ingenuity of those who would do us harm. If we fail to imagine and change, our constituents will always remain at great risk. Political posturing which is dominating much of our reaction has no place. To eliminate it requires presidential leadership of a kind we have not seen in the life of this Committee. More specifically, where you address the need for a comprehensive border strategy, the 175 miles of unsecured border in the U.S. Virgin Islands, my district--a cross over point for illegal entrants from distant places remains unsecured. We fully support that all borders must be secured. We support an all hazard approach that protects our communities' safety at all times, for we cannot know where the terrorists will next strike or how. This includes a fully prepared and intact public and private health system with emphasis on poor and minority communities where it is weakest--including Indian reservations, with clear lines of authority and accountability. One area not specifically iterated in the report, but very relevant to improved intelligence, is the need to diversify our intelligence workforce if we are ever to penetrate the enemy cells. Realizing that this is a report on 9/11, I would nevertheless add that the focus of our terrorist identification and eradication cannot be focused on Islamic believers only. Continuing to do so leaves every other flank open. Lastly, and this is my greatest concern--as you have so accurately said, we have done nothing to reduce the growth of the numbers of those dedicated to doing harm to our citizens and our country. We have failed to look within, to go beyond getting back to ``normal''. It--normal--was and remains not a nice place to be for many of us, and the world can see that. Our failure to deal fairly with those who are ``different'' right here in the US portends the impossible for our dealings with those in foreign lands. To gain respect we not only have to reach out with educational, political and economic opportunity elsewhere, we must begin that process here at home. We have yet failed to do so, and any outreach across the seas will be seen for the empty, false gesture that it is. So we have a lot of work to do. We are grateful for your service, and the blueprint you have so ably provided. It remains for the president and us to respond appropriately. The only hope I hold out that we will do so is your promise to follow through on the recommendations to the end, and the commitment of the families of those who were so brutally assassinated on September 11, 2004, whose efforts made the commission possible. Thank you once again Mr. Chairman for the opportunity to give these brief opening remarks. I look forward to hearing from our witnesses. Prepared Statement of the Honorable Nita M. Lowey I want to welcome Commission Chairman Kean and Vice Chairman Hamilton to the Committee. I commend you for the thorough and dedicated way in which you have carried out your work on behalf of our country. It is clear that this Committee, and this Congress, has a great deal of work to do. I share your commitment to act expeditiously to implement the recommended reforms, some of which can be put in place without major structural changes and without enacting legislation. It is on these recommendations I would like to focus today. This Committee has an awesome responsibility as the first oversight panel of the Department of Homeland Security. But despite the best intentions of many of my colleagues, the Select Committee has not become the perfect solution to the question of how to oversee this new Department. Instead, this arrangement has turned out to be the perfect storm. We have been hamstrung by jurisdictional disputes that the leadership has been unwilling to resolve. We passed a First Responder bill out of Committee five months ago that would have ensured that our formula for disbursing homeland security dollars was based on threat, population, and vulnerability, just as the Commission has recommended. But it has been stalled on its way to the floor by Members who disagree with the Commission's recommendation that ``Congress should not use this money as a pork barrel.'' We could act on this recommendation right now, but we have not. Since the summer of 2003, the Department of Homeland Security has cited consistent intelligence reports that terrorists remain interested in using aircraft as weapons against the United States. A GAO report released in June concluded our airports and aircraft are still vulnerable--passengers are not checked adequately for explosives, and more than 1 million airport workers, many of whom have antiquated background checks, enter secured areas each day without being physically screened. The Commission recommended that we give priority attention to improving screening of passengers and more closely oversee screener performance. We could act on this recommendation right now, but we have not. Our communication systems failed our first responders on September 11th, leading to many deaths that could have been prevented. In May, I introduced the CONNECT First Responders Act, a bill that would fund the creation of a nationwide interoperable communications infrastructure. The Commission recommended that Congress support efforts to improve communications connectivity. We could act on this recommendation right now, but we have not. The Commission has also made recommendations that are more long- term, recognizing that homeland security is not only a matter of practice; it's a matter of policy. I appreciate the Commission's focus on the importance of providing a quality education in the Muslim world that teaches tolerance, the dignity and value of each individual, and a respect for different beliefs. As Ranking Member of the House Appropriations Subcommittee on Foreign Operations, I have worked to quadruple U.S. spending on basic education abroad, from $98 million in FY 2000 to a total of $400 million for FY 2005. I have always maintained that support for this objective is a matter of national security--not just a nice thing to do--and I am pleased to have the unanimous support of the Commission in this endeavor. The Commission's report has provided Congress with a road map. The speed and resolve with which we follow this road map will have serious consequences for the security of the American people. I urge this Committee and this Congress to listen carefully to our witnesses today, and to act quickly to make our country more safe. Prepared Statement of the Honorable Karen McCarthy Thank you Chairman Cox and Ranking Member Turner for convening this important hearing. On September 11, 2001 the world watched in horror as terrorists attacked our country. They were able to invade our country and commit these terrible acts of violence. The release of the bipartisan 9/11 Commission Report has told us what went wrong but most importantly provides us a roadmap to prevent this from happening in the future. Their recommendations are the actions that we in Congress must take to prepare and prevent another attack. The Commission found that lack of intelligence information sharing between the CIA, FBI and other government agencies was the greatest weakness leading to the 9/11 attacks. They found that even when intelligence was shared there still was an inability to make sense of this information and take immediate action. I strongly agree with the Commission's recommendation that the President should lead a government wide effort to help fix these critical problems within our intelligence gathering organizations. If this had happened before the 9/11 attacks many lives may have been saved. These institutions must be able to collect, analyze and share intelligence expeditiously and have the means to pass on and collect intelligence to and from our state and local officials who serve on the front lines. The Commission recommends the establishment of a National Counterterrorism Center, built upon the foundation of the existing Terrorist Threat Integration Center (TTIC). They also recommend the consolidation of budgetary and operational oversight of all fifteen intelligence agencies and the naming of a new National Intelligence Director to unify the intelligence community. As the Ranking Member on the Intelligence and Counterterrorism Subcommittee of the Select Committee on Homeland Security, I whole heartedly support these recommendations. The international collection and sharing of information is extremely important to stopping terrorists. The Commission recommends a global strategy for the United States to ``. . .reach out, listen to, and work with other countries. . .'' Congress must embrace this strategy. During the first part of August, I joined with my Homeland Security Committee colleagues on an intelligence gathering trip to the UK and Northern Ireland and the Republic of Ireland. We learned about the existence of foreign terrorist cells from their intelligence agencies and had a very frank exchange about how we can help each other in the fight against terrorism. I was very pleased to see that the 9/11 Commission Report recommends that United States ``. . .should reach out, listen to, and work with other countries. . .'' as a means of gathering intelligence. Now that the 9/11 Commission has done its job, we need to do ours. Today's hearing puts us a step closer to preventing another terrorist attack. I urge the leadership of Congress to follow the lead of this Committee. I want thank the 9/11 Commissioners and the staff for their hard work and dedication. This report should become our bible in winning the war on terrorism. I look forward to hearing from our witnesses today on how we can quickly move forward to create a new National Counterterrorism Center, name a National Intelligence Director, develop a global strategy for working with our allies and implement all of the Commission's recommendations. Thank you Mr. Chairman. Prepared Statement of the Honorable Louise M. Slaughter Thank you, Chairman Cox and Ranking Member Turner for holding this timely and important hearing, and thank you Governor Kean and Representative Hamilton for joining us. I would like to start by giving special recognition to the two fine men before us today for their yeoman's work. The fortitude and great character that Governor Kean and Representative Hamilton exhibited at every point in the process is truly remarkable. From the very beginning, we could see that these two men took their responsibilities to the 9-11 families and the American people very seriously. As we are all aware, the process for investigating the attacks was not always smooth. In some corners, there were those who tried to denigrate the effort to secure key testimony and access to records. There were even some who chose to characterize the effort to secure this information as partisan. Those critics were blind to what was really behind this effort. On 9/11, I stood on the steps of the Capitol building, arm-in-arm with my colleagues in Congress to sing God Bless America. On that day, there was no such thing as Democrat or Republican. We were all just Americans. It is that sense of unity and patriotic spirit that guided this Commission's work. Governor Kean, the other Commissioners, and the Commission staff were executing their solemn oath to the 9/11 families and the nation. They did not execute their responsibilities to serve the interests of any one political party. No, they were on a mission to get to the truth to make America safer. The 9/11 Commission was not focused on pointing fingers or laying blame. Rather, it was focused on providing the truth about what happened on that terrible, terrible day to the families of those lost in the September 11th attacks and all Americans. The 9/11 Commission was also focused on providing us with a plan to ensure that our country is never as vulnerable as it was on September 11, 2001. They could not have provided a higher service to this country. I am pleased that the reaction to the 9/11 Commission report recommendations has been overwhelmingly positive. However, the Commissioners are right to be concerned that this report, like so many well-regarded reports before it, will be relegated to sitting on a shelf in all our offices, and see no action. We cannot not--we must not--let that happen. My constituents, the 9/11 families, and all Americans expect more than cosmetic changes from our government. We must act on all 41 recommendations outlined by the 9/11 Commission--not merely the provisions that the President supports. The focus of today's hearing is on information sharing--an area that has received significant attention by this panel since the Committee's inception in January 2003. The 9/11 Commission's findings seem to support what I have come to believe. Despite the creation of the Department of Homeland Security in March 2003, our information sharing system is weak and the problems of interagency coordination that existed on September 11th persist. The people I represent in Western New York are the kind of people who ``call it like they see it''. When it comes to current state of homeland security, they don't know what to think. In the wake of the September 11th attacks, they stood ready to sacrifice; many going down to Ground Zero to help in the search and recovery. They still stand ready to withstand delay and discomfort, if it means our country will be safer. But today, nearly three years later, they ask me how duct tape will make their families safer. They ask me why there are chronic delays at the U.S.-Canadian border, even when we're not at a heightened Orange Alert. They ask me how confiscating a key-chain pocketknife from an elderly man at the airport will make them safer. As the Ranking Member of this panel's Rules Subcommittee, I am keenly interested in the Commission's views on the weaknesses in the current congressional oversight model. Today, DHS officials must come before 88 congressional committees and subcommittees. How does that impact the Department's ability to execute its mission and Congress' ability to conduct oversight? When it came to creating DHS, Congress accepted, on a bipartisan basis, that the merger of 22 Executive agencies would be required to ensure greater coordination and accountability. Congress must now put aside its petty jurisdictional fights and enhance accountability by adopting a centralized model of oversight. This is not just my opinion, it's what the 9/11 Commission recommends. In fact, the Commission calls on Congress to ``create a single, principal point of oversight and review for homeland security.'' By the Commission's own admission, ``[o]f all our recommendations, strengthening congressional oversight may be among the most difficult and important.'' As someone who has served in this body for 18 years, I must commend the Commission for its accurate assessment of the challenges ahead. I am interested in hearing from Representative Hamilton, a 34-year veteran of the House, on how to overcome the jurisdictional hurdles and develop a centralized approach to oversight. I am also interested to hear the panelists' views on making this Committee permanent--as the primary House Committee in charge of overseeing the Department of Homeland Security. After months of study, I strongly believe that this Committee is uniquely situated to undertake the challenges of enhanced congressional oversight. Congress should make this Committee permanent to do just that. I also must reiterate that Congress must act on all forty-one recommendations. For this to be accomplished, Congress will not only have to put partisanship aside but also abandon jurisdictional wrangling. Such action is essential to giving the American people the homeland security they deserve. Thank you Mr. Chairman and Ranking Member Turner for holding this important hearing. Chairman Cox. Is there objection? Hearing none, we will move immediately to the testimony of our distinguished witnesses, the chairman and vice chairman of the National Commission on Terrorist Attacks Upon the United States. Chairman Cox. Governor Kean, we will begin with you. STATEMENT OF THE HONORABLE THOMAS H. KEAN, CHAIR, NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES Mr. Kean. Chairman Cox, Ranking Member Turner, distinguished members of the House Select Committee on Homeland Security, I want to thank you, the ranking member and the chairman for their statements. We appreciate that it is a wonderful summary of our recommendations and your statements of support. I thank you on behalf of the Commission and the American people very much. We are honored to appear before you today. We want to thank you and the leadership of the House of Representatives for your very prompt attention to our recommendations. We are very grateful to you and the leadership for that attention. The Commission's findings and recommendations, as you know, were strongly endorsed by all commissioners, five Democrats, and five Republicans. We share a unity of purpose and we call upon Congress and the administration to display that same bipartisanship and that same unity of purpose as we all strive to make our country and all Americans safer and more secure. How information is shared in our government, and not just at the Federal level, but with State and local agencies, is a matter of critical importance to homeland security and to national security. As we looked at the 9/11 story, we found that the failure to share information cost us very dearly. All agencies, Federal, State, and local, need to have information available in a timely manner because they all have responsibilities to protect Americans. We need to get this right. What we learned in our 9/11 story is that the U.S. Government has access to a vast amount of information. We have Customs and immigration information, FBI and police reports, and so much more. The storehouse of information is immense. But the government has very weak systems for processing and using that information it possesses, especially when that information has to be used across agency lines. Our report details many unexploited opportunities to disrupt the 9/11 plot, failures to watchlists, failures to share information, failures to, as we say, ``connect the dots.'' The story of Hamzi and Mihdhar in Kuala Lumpur in January of 2000 is just one of a number of examples. We caught a glimpse, we found those future hijackers, but we lost their trail somehow in Bangkok. And because information wasn't shared when these people came to the United States and were living openly on the West Coast, Los Angeles and San Diego, the FBI didn't know about it. And the FBI didn't learn until August of 2001 that Hazmi and Mihdhar were in the United States. And so they suddenly started pursuing leads, but that was too late, and time on that fateful day just simply ran out. Agencies live by the need-to-know rule. They limit the sharing of information. Each agency has its own computer system, its own security practices, and these are outgrowths of the Cold War. Implicit in their practices is the assumption that the risk of inadvertent disclosure outweighs the benefits of larger sharing among agencies. And we believe, as a commission, that that is a Cold War assumption and it is no longer appropriate. In the 9/11 story we came to understand the huge cost of failing to share information across agency boundaries. Yet the current practices of government, security practices encourage overclassification. Now, we understand the critical importance of protecting sources and methods. We believe it is also important to share information. There are plenty of penalties for unauthorized disclosure, but you know there isn't one single penalty for not sharing information. We believe that information procedures across the government need to be changed, that there should be incentives provided for sharing information. Intelligence gathered about transnational terrorism should be processed, turned into reports, and distributed according to the same quality standards whether it is collected in Indonesia or Minnesota. We believe the President needs to lead a government-wide effort to bring the major national security institutions into the information revolution. The President needs to lead the way and coordinate the resolutions of the legal, policy, and technical issues across agency lines so that we can make sure in the future that this important information is shared. The model is a decentralized network. Agencies would still have their own databases, but those databases would be searchable across agency lines. In the system, in this system, secrets are protected. They are protected, though, through the design of the network that controls access to the data. They don't prevent people from having access to the network. An outstanding conceptual framework for this kind of trusted information network has been developed by a task force of leading professionals in national security, information technology and laws as they are all assembled by the Markle Foundation. Its report has been widely discussed throughout the U.S. Government, but so far it has just been discussed; it hasn't been converted into action. The point here is that no single agency can do this alone. One agency can modernize its stovepipe, but cannot develop a system to replace that stovepipe. Only Presidential leadership can develop the necessary government-wide concepts and standards. In a hearing that Lee Hamilton and I testified at last week, a Member of Congress asked us what information about terrorism did the pilot of American 11 have available to him on the morning of September 11th? And the answer is very simple: He had none. Despite his professional training and military experience, he was given no useful information to help him or the crew to protect the passengers of that plane. In fact, his training told him that if there was a hijacking, you submit to it, protect the passengers, and eventually perhaps you would land in Havana and then go home. Now, contrast this with the situation on United 93 when the passengers and crew learned from phone conversations with their loved ones about the attacks on the World Trade Center. They took action as citizens. They saved the Capitol, or the White House, we don't know which, from probable destruction. An informed citizenry, a citizenry that knows the facts, is this Nation's best defense. For the same reason, we believe it is imperative that as much information as possible be shared with State and local authorities. There are a lot more of them than there are Federal authorities, and they too can take action to protect the homes of their fellow citizens. There are some 18,000 State and local law enforcement agencies in the United States. If we can harness the awareness and experience of these dedicated professionals, as a Nation we will greatly enhance our security. Reforms of the kind we recommend will push more important information out to State and local agencies. The more everyone charged with our security knows, the more information they have, and the safer we all will be. Let me turn for a moment to some of our findings and recommendations. As our report makes clear, the decade before 9/11 border security was simply not seen as a national security matter. From a strategic perspective, border policy focused on counternarcotics efforts, illegal immigration, and more recently perhaps, the smuggling of weapons of mass destruction. Our government simply did not exhibit a comparable level of concern about terrorists' ability to enter and stay in the United States. During that same period, Al-Qa'ida was working very hard. They were studying all our systems. They were learning how to exploit gaps and weaknesses in our passport system and our visa system, our entry systems of the United States and other countries. Al-Qa'ida actually set up its own passport office in Kandahar and developed working relationships with travel facilities, travel agents, some of them witting, some of them unwitting, document forgers, corrupt government officials to move their people around. More robust enforcement of routine immigration laws, supported by better information, might have made a real difference in stopping these hijackers. Had information been shared and these terrorists watchlisted, border authorities could have intercepted up to three of those hijackers. Two hijackers made patently false statements on their visa applications. They could have been shown to be false by U.S. Government records, and those records were available to consular officials. Many of the hijackers lied about their employment or lied about their educational status. Two hijackers could have been denied admission to ports of entry based on violations of immigration rules themselves governing the terms of admission. Three hijackers violated the immigration laws after entry. One who said he was going to enroll in school and then never did, two by overstays of their terms of admission. Although the intelligence as to their tactics was not known at the time, examining their passports could have allowed authorities to detect at least four and possibly up to 15 hijackers. Neither the Intelligence Community, nor the border security agencies or the FBI, had programs in place to analyze and act upon intelligence about terrorists' travel tactics--how they obtained their passports, how they made travel arrangements and subverted national laws and processes governing entry and stays in foreign countries. Now, Congress during the 1990's took some steps to provide better information to immigration officials by legislating requirements for a foreign student information system and entry-exit system. As we know, these programs had not yet successfully been completed by 9/11. Since 9/11, some important steps have been taken to strengthen our border security. The Department of Homeland Security has been established, combining the resources of the former Immigration and Naturalization Service and the Customs Bureau into new agencies to protect our borders and to enforce the immigration laws within the United States. The visa process and the terrorist watchlist system have been strengthened. DHS has begun to implement, through the US VISIT program, a biometric screening system for use at the borders. Now, we believe, as a commission, there is no question that these efforts have made us safer, but they have not made us safe. As a nation, we have not yet fully absorbed the lessons that we should have learned from 9/11 with respect to border security. When they travel, that is the time that terrorists are at their most vulnerable. You see, they have to leave safer havens where they have been. They have to travel secretly. They have to use evasive techniques, from altered travel documents to lies or cover stories. Terrorist entry can often be prevented and terrorist travel can be constrained by acting on this knowledge and understanding it. Targeting terrorist travel is at least as powerful a weapon against terrorists as targeting their finances. The Commission therefore has recommended that we combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility. Frontline border agencies must not only obtain from the Intelligence Community, on a real-time basis, information on terrorists, they must also assist in collecting it. Consular officers and immigration inspectors, after all, are the people who encounter these terrorists. They encounter travelers, they encounter their documents. Specialists must be developed and deployed in consulates and at the border to detect terrorists in their travel practices, including looking very carefully at their documents. Technology has a vital role to play. Three years after 9/11 it is more than time for border officials to integrate into their operations terrorist travel indicators that have been developed by our Intelligence Community. The Intelligence Community and the border security community, they really haven't been close partners in the past. This simply must change. We also need an operational program to target terrorist travel facilitators--forgers, human smugglers, travel agencies and corrupt border officials. Some may be found in this country. Most will be found abroad. Disrupting them will seriously hurt the terrorists. While there have been some successes in this area, intelligence far outstrips action. This should be rectified by providing the interagency mandate and the necessary resources to Homeland Security's enforcement arm, immigration and customs enforcement, and other relevant agencies, including, by the way, the FBI. This problem illustrates the need for a National Counterterrorism Center. Investigations of travel facilitators invariably raise complicated questions. For instance, should a particular travel facilitator be arrested or should he be the subject of continued intelligence operations? If he is going to be arrested, in which country do you do it? A National Counterterrorism Center is needed to bring the numerous agencies to the table so that they can talk together in a unified way, decide in each case what is the best course of action. And I now turn to my partner and friend and teacher, Lee Hamilton. STATEMENT OF THE HONORABLE LEE H. HAMILTON, VICE CHAIR, NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES Mr. Hamilton. Thank you very much, Governor. Let me join you in thanking you Chairman Cox, Ranking Member Turner, Congresswoman Dunn, for your really superb statements. It was very pleasing to us to hear the manner in which you summarized our report. I want to say just a word, that it has been a high personal privilege for me to work with Tom Kean. He is a consensus builder, a talent I think that is rare even among politicians today. And it has been one of the great privileges of my public career to work with Tom. And I also want to express a word of personal appreciation to each of the members for returning for this hearing in August. That is really unprecedented. And Tom and I and the Commission are very grateful to you for your interest in our report. I will begin on screening systems. To provide better information to our consular officers and immigration inspectors, the government must accelerate its efforts to build a biometric entry and exit screening system. This is an area in which Congress has been active since the mid-1990's, and it has been a frustrating journey. Congress first legislated an entry-exit system in 1996 to increase compliance with our immigration laws. It was not associated with counterterrorism nor with biometric identification. As a practical matter, the entry-exit effort was not seriously funded until the end of 2002. By that time, aspects of the system were directed by four separate laws. The establishment of the Department of Homeland Security then changed the organizational context for implementing those laws. The new department is emerging from its difficult start-up period and is, we believe, poised to move forward to implement Congress' mandates in this area. We stress four principles that we believe must guide our efforts: First, the U.S. border security system is effectively a part of a larger network of screening points that includes our transportation system and access to vital facilities such as nuclear reactors. The Department of Homeland Security should lead an effort to design a comprehensive screening system, addressing common problems and setting common standards with system-wide goals in mind. Second, a biometric entry and exit screening system is fundamental to intercepting terrorists, and its development should be accelerated. Each element of the system is important. The biometric identifier makes it difficult to defeat a watchlist by slight alteration in the spelling of a name, a technique relied upon by the terrorists. The screening system enables border officials' access to all relevant information about a traveler in order to assess the risk they may pose. Exit information allows authorities to know if a suspect individual has left the country and to establish compliance with immigration laws. Third, United States citizens should not be exempt from carrying biometric passports or otherwise enabling their identities to be securely verified, nor should Canadians or Mexicans. Fourth, there should be a program to speed known travelers so inspectors can focus on those travelers who might present greater risks. This is especially important for border communities. We believe that the schedule for completion of this biometric entry-exit screening system should be accelerated to the extent feasible. This will require additional annual funding and a mandate to a central organizational authority such as the US VISIT office to manage the effort. We need much greater collaboration with foreign governments on border security. This means more exchange of information about terrorists and passports and improved global passport design standards. Implicit in this recommendation is continued close cooperation with Mexico and Canada. It is especially important to improve screening efforts prior to departure from foreign airports, especially in countries participating in the visa waiver program. We must be able to monitor and respond to entries along our long borders with Canada and Mexico, working with those countries as much as possible. Our law enforcement system ought to send a message of welcome, tolerance, and justice to members of the immigrant communities in the United States. Good immigration services are one way to reach out that is valuable, including for intelligence. State and local law enforcement agencies need more training and partnerships with Federal agencies so they can cooperate more effectively with those Federal authorities in identifying terrorist suspects. Finally, secure identification should begin in the United States. We believe the Federal Government should set standards for the issuance of birth certificates and sources of identification such as driver's licenses. The agenda on immigration and border control, then, is multifaceted and vital to our national security. The bottom line is that our visa and border control systems must become an integral part of our counterterrorism intelligence system. We must steer a course that remains true to our commitment to an open society and that welcomes legitimate immigrants and refugees, while concentrating our resources on identification of potential terrorists and prevention of their entry into the United States. We recommend that homeland security assistance should be based strictly on an assessment of risks and vulnerabilities. Now, in 2004, Washington, D.C., and New York City are certainly at the top of any such list. We understand the contention that every State and city needs to have some minimum infrastructure for emergency response. But Federal homeland security assistance should not remain a program for general revenue sharing. It should supplement State and local resources based on the risks or vulnerabilities that merit additional support. Congress should not use this money as a pork barrel. The 9/11 attacks showed that even the most vigorous emergency response capabilities can be overwhelmed if an attack is large enough. We recommend that emergency response agencies nationwide should adopt the incident command system. When multiple agencies or multiple jurisdictions are involved, they should adopt a unified command. Both are proven frameworks for emergency response. We strongly support the decision that Federal homeland security funding will be contingent, as of October 1, 2004, upon the adoption and regular use of ICS and unified command procedures. In the future, the Department of Homeland Security should consider making funding contingent on aggressive and realistic training in accordance with ICS and unified command procedures. The inability to communicate was a critical element at the World Trade Center, Pentagon, and Pennsylvania crash sites where multiple agencies and multiple jurisdictions responded. The occurrence of this problem at three very different sites is strong evidence that compatible and adequate communications among public safety organizations at the local, State, and Federal levels remains an important problem. Congress should support pending legislation which provides for the expedited and increased assignment of radio spectrum for public safety purposes. Furthermore, high-risk urban areas such as New York City and Washington, D.C., should establish signal corps units to ensure communications connectivity between and among civilian authorities, local first responders, and the National Guard. Federal funding for such units should be given a high priority by Congress. The private sector controls 85 percent of the critical infrastructure of the United States. The Department of Homeland Security's mandate includes working with the private sector to ensure preparedness. Preparedness in the private sector and public sector for rescue, restart, and recovery of operations should include a plan for evacuation, adequate communications capabilities, and a plan for continuity of operations. As we examined the emergency response to 9/11, witness after witness told us that despite 9/11, the private sector remains largely unprepared for a terrorist attack. We were also advised that the lack of a widely embraced private-sector preparedness standard was a principal contributing factor in this lack of preparedness. The Commission, therefore, endorses the American National Standard Institute's recommended standard for private preparedness, and we thank them for developing that. We were encouraged by Secretary Tom Ridge's praise of the standard and urged the Department of Homeland Security to promote its adoption. We also encouraged the insurance and credit rating industries to look closely at a company's compliance with the ANSI standard in assessing its insurability and creditworthiness. We believe that compliance with the standard should define the standard of care owed by a company to its employees and the public for legal purposes. Private-sector preparedness is not a luxury, it is a cost of doing business in the post-9/11 world. If we ignore it, the potential costs in lives, money and national security will be inestimable. Mr. Chairman, we believe the recommendations we have presented this morning, as well as the many other recommendations we have made on foreign policy, public diplomacy, and transportation security, can make a significant difference in making America safer and more secure. We also recommend reforms in the structure of the executive branch and the Congress. We believe that organizational reforms in the absence of implementing the other reforms and recommendations in our report will have significantly less value than the value of these reforms as a complete package. In short, while we welcome each step toward implementation of our recommendations, no one should be mistaken in believing that organizational reforms alone can address the current terrorist threat we face. We are very gratified by the rapid response of the President and the White House to our recommendations. We welcome the President's support for a National Intelligence Director and National Counterterrorism Center. We welcome the support of Senator Kerry. We look forward to working with you on our recommendations. We should seize this historic opportunity and move expeditiously. With your counsel and direction, we believe the Nation can and will make wise choices. And we are pleased now to respond to your questions. [The statement of Messrs. Kean and Hamilton follows:] Prepared Statement of Chairman Thomas Kean and Vice Chair Lee Hamilton The 9/11 Commission's Findings and Recommendations Chairman Cox, Ranking Member Turner, distinguished members of the House Select Committee on Homeland Security. We are honored to appear before you today. We want to thank you and the leadership of the House of Representatives for your prompt attention to the recommendations of the Commission. We are grateful to you, and to the leadership of the House. The Commission's findings and recommendations were strongly endorsed by all Commissioners--five Democrats and five Republicans. We share a unity of purpose. We call upon Congress and the Administration to display the same spirit of bipartisanship as we collectively seek to make our country and all Americans safer and more secure. How information is shared in our government--not just at the federal level, but with state and local agencies--is a matter of critical importance to homeland security, and to national security. As we looked into the 9/11 story, we found that the failure to share information cost us dearly. All agencies--federal, state, and local-- need to have information available in a timely manner to protect Americans. We need to get this right. Unity of Effort in Sharing Information What we learned in the 9/11 story is that the U.S. government has access to a vast amount of information. We have customs and immigration information, FBI and police reports, and much more. The storehouse of information is immense. But the government has weak systems for processing and using the information it possesses, especially across agency lines. Our report details many unexploited opportunities to disrupt the 9/ 11 plot: failures to watchlist, failures to share information, failure to connect the dots. The story of Hazmi and Mihdhar in Kuala Lumpur in January 2000 is a telling example. We caught a glimpse of the future hijackers, but we lost their trail in Bangkok. Agencies did not share information. The FBI did not learn until August, 2001 that Hazmi and Mihdhar had entered the United States. Late leads were pursued, but time ran out. Agencies live by the ``need to know'' rule. They limit the sharing of information. Each agency has its own computer system and its own security practices, outgrowths of the Cold War. Implicit in their practices is the assumption that the risk of inadvertent disclosure outweighs the benefits of wider sharing. We think this Cold War assumption is no longer appropriate. In the 9/11 story we came to understand the huge costs of failing to share information across agency boundaries. Yet, in the current practices of government, security practices encourage overclassification. We understand the critical importance of protecting sources and methods. We believe it is also important to share information. There are plenty of penalties for unauthorized disclosure; there are no punishments for not sharing information. We believe that information procedures across the government need to be changed, to provide incentives for sharing. Intelligence gathered about transnational terrorism should be processed, turned into reports, and distributed according to the same quality standards, whether it is collected in Indonesia, or in Minnesota. We believe the president needs to lead a government-wide effort to bring the major national security institutions into the information revolution. The president needs to lead the way and coordinate the resolution of the legal, policy, and technical issues across agency lines so that information can be shared. The model is a decentralized network. Agencies would still have their own databases, but those databases would be searchable across agency lines. In this system, secrets are protected through the design of the network that controls access to the data, not access to the network. An outstanding conceptual framework for this kind of ``trusted information network'' has been developed by a task force of leading professionals in national security, information technology, and law assembled by the Markle Foundation. Its report has been widely discussed throughout the U.S. government, but has not yet been converted into action. The point here is that no single agency can do this alone. One agency can modernize its stovepipe, but cannot design a system to replace it. Only presidential leadership can develop the necessary government-wide concepts and standards. Sharing Information with State and Local Authorities In a hearing last week, a Member of Congress asked us: what information about terrorism did the pilot of American 11 have available to him on the morning of September 11? He had none. Despite his professional training and military experience, he had no useful information to help him or the crew protect the passengers or plane. We contrast this with the situation on United 93. When the passengers and crew learned from phone conversations about the attacks on the World Trade Center, they took action. They saved the Capitol or White House from destruction. An informed citizenry is the nation's best defense. For the same reason, we believe it is imperative that as much information as possible be shared with state and local authorities. They, too, can then take action to protect their homes and fellow citizens. There are some 18,000 state and local law enforcement agencies in the United States. Harnessing the awareness and experience of these dedicated professionals can greatly enhance our security. Reforms of the kind we recommend will push more important information out to state and local agencies. The more everyone charged with our security knows, the more information they have, the safer we will all be. We will turn to some of our other findings and recommendations. Border Control As our Report makes clear, in the decade before 9/11, border security was not seen as a national security matter. From a strategic perspective, border policy focused on counternarcotics efforts, illegal immigration, and, more recently, the smuggling of weapons of mass destruction. Our government simply did not exhibit a comparable level of concern about terrorists' ability to enter and stay in the United States. During that same period, however, Al-Qa'ida studied how to exploit gaps and weaknesses in the passport, visa, and entry systems of the United States and other countries. Al-Qa'ida actually set up its own passport office in Kandahar and developed working relationships with travel facilitators--travel agents (witting or unwitting), document forgers, and corrupt government officials. More robust enforcement of routine immigration laws, supported by better information, might have made a difference in stopping the hijackers.Had information been shared and the terrorists been watchlisted, border authorities could have intercepted up to three of the hijackers. Two hijackers made statements on their visa applications that could have been shown to be false by U.S. government records available to consular officers. Many of the hijackers lied about their employment or educational status. Two hijackers could have been denied admission at the port of entry based on violations of immigration rules governing terms of admission. Three hijackers violated the immigration laws after entry, one by failing to enroll in school as declared, and two by overstays of their terms of admission. Although the intelligence as to their tactics was not developed at the time, examining their passports could have allowed authorities to detect from four to 15 hijackers Neither the intelligence community, nor the border security agencies or the FBI, had programs in place to analyze and act upon intelligence about terrorist travel tactics--how they obtained passports, made travel arrangements, and subverted national laws and processes governing entry and stays in foreign countries. Congress during the 1990s took some steps to provide better information to immigration officials by legislating requirements for a foreign student information system and an entry-exit system. As we know, these programs were not successfully completed before 9/11. Since 9/11, some important steps have been taken to strengthen our border security. The Department of Homeland Security has been established, combining the resources of the former Immigration and Naturalization Service and the Customs Bureau into new agencies to protect our borders and to enforce the immigration laws within the United States. The visa process and the terrorist watchlist system have been strengthened. DHS has begun to implement, through the US VISIT program, a biometric screening system for use at the border. Targeting Terrorist Travel These efforts have made us safer, but not safe enough. As a nation we have not yet fully absorbed the lessons of 9/11 with respect to border security. The need to travel makes terrorists vulnerable. They must leave safe havens, travel clandestinely, and use evasive techniques, from altered travel documents to lies and cover stories. Terrorist entry often can be prevented and terrorist travel can be constrained by acting on this knowledge. Targeting terrorist travel is at least as powerful a weapon against terrorists as targeting their finances. The Commission therefore has recommended that we combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility. Front line border agencies must not only obtain from the Intelligence Community, on a real-time basis, information on terrorists, they must also assist in collecting it. Consular officers and immigration inspectors, after all, are the people who encounter travelers and their documents. Specialists must be developed and deployed in consulates and at the border to detect terrorists through their travel practices, including their documents. Technology has a vital role to play. Three years after 9/11 it is more than time for border officials to integrate into their operations terrorist travel indicators that have been developed by the intelligence community. The intelligence community and the border security community have not been close partners in the past. This must change. We also need an operational program to target terrorist travel facilitators--forgers, human smugglers, travel agencies, and corrupt border officials. Some may be found here, but most will be found abroad. Disrupting them would seriously constrain terrorist mobility. While there have been some successes in this area, intelligence far outstrips action. This should be rectified by providing the interagency mandate and the necessary resources to Homeland Security's enforcement arm, Immigration and Customs Enforcement (ICE), and other relevant agencies, including the FBI. This problem illustrates the need for a National Counterterrorism Center. Investigations of travel facilitators invariably raise complicated questions: Should a particular travel facilitator be arrested or should he be the subject of continued intelligence operations? In which country should he be arrested? A National Counterterrorism Center is needed to bring the numerous agencies to the table to decide on the right course of action. Screening Systems To provide better information to our consular officers and immigration inspectors, the government must accelerate its efforts to build a biometric entry and exit screening system. This is an area in which Congress has been active since the mid-1990's. It has been a frustrating journey. Congress first legislated an entry-exit system in 1996, to increase compliance with our immigration laws. It was not associated with counterterrorism, nor with biometric identification. As a practical matter, the entry-exit effort was not seriously funded until the end of 2002. By that time, aspects of a system were directed by four separate laws. The establishment of the Department of Homeland Security then changed the organizational context for implementing those laws. The new Department is emerging from its difficult start-up period and is, we believe, poised to move forward to implement Congress's mandates in this area. We would like to stress four principles that we believe must guide our efforts in this arena. First, the U.S. border security system is effectively a part of a larger network of screening points that includes our transportation system and access to vital facilities, such as nuclear reactors. The Department of Homeland Security should lead an effort to design a comprehensive screening system, addressing common problems and setting common standards with system-wide goals in mind. Second, a biometric entry and exit screening system is fundamental to intercepting terrorists and its development should be accelerated. Each element of the system is important. The biometric identifier makes it difficult to defeat a watchlist by a slight alteration in spelling of a name, a technique relied upon by terrorists. The screening system enables border officials access to all relevant information about a traveler, in order to assess the risk they may pose. Exit information allows authorities to know if a suspect individual has left the country and to establish compliance with immigration laws. Third, United States citizens should not be exempt from carrying biometric passports or otherwise enabling their identities to be securely verified. Nor should Canadians or Mexicans. Fourth, there should be a program to speed known travelers, so inspectors can focus on those travelers who might present greater risks. This is especially important for border communities. We believe that the schedule for completion of this biometric entry-exit screening system should be accelerated to the extent feasible. This will require additional annual funding, and a mandate to a central organizational authority, such as the US VISIT office, to manage the effort. International Collaboration We need much greater collaboration with foreign governments on border security. This means more exchange of information about terrorists and passports, and improved global passport design standards. Implicit in this recommendation is continued close cooperation with Mexico and Canada. It is particularly important to improve screening efforts prior to departure from foreign airports, especially in countries participating in the visa waiver program. Immigration Law and Enforcement We must be able to monitor and respond to entries along our long borders with Canada and Mexico, working with those countries as much as possible. Our law enforcement system ought to send a message of welcome, tolerance, and justice to members of the immigrant communities in the United States. Good immigration services are one way to reach out that is valuable, including for intelligence. State and local law enforcement agencies need more training and partnerships with federal agencies so they can cooperate more effectively with those federal authorities in identifying terrorist suspects. Finally, secure identification should begin in the United States. We believe that the federal government should set standards for the issuance of birth certificates and sources of identification such as drivers' licenses. The agenda on immigration and border control, then, is multi- faceted and vital to our national security. The bottom line is that our visa and border control systems must become an integral part of our counterterrorism intelligence system. We must steer a course that remains true to our commitment to an open society and that welcomes legitimate immigrants and refugees, while concentrating our resources on identification of potential terrorists and prevention of their entry into the United States. Setting Priorities We recommend that homeland security assistance should be based strictly on an assessment of risks and vulnerabilities. Now, in 2004, Washington, D.C., and New York City are certainly at the top of any such list. We understand the contention that every state and city needs to have some minimum infrastructure for emergency response. But federal homeland security assistance should not remain a program for general revenue sharing. It should supplement state and local resources based on the risks or vulnerabilities that merit additional support. Congress should not use this money as a pork barrel. Command, Control, and Communications The 9/11 attacks showed that even the most vigorous emergency response capabilities can be overwhelmed if an attack is large enough. We recommend that emergency response agencies nationwide should adopt the Incident Command System (ICS). When multiple agencies or multiple jurisdictions are involved, they should adopt a unified command. Both are proven frameworks for emergency response. We strongly support the decision that federal homeland security funding will be contingent, as of October 1, 2004, upon the adoption and regular use of ICS and unified command procedures. In the future, the Department of Homeland Security should consider making funding contingent on aggressive and realistic training in accordance with ICS and unified command procedures. The inability to communicate was a critical element at the World Trade Center, Pentagon, and Pennsylvania crash sites, where multiple agencies and multiple jurisdictions responded. The occurrence of this problem at three very different sites is strong evidence that compatible and adequate communications among public safety organizations at the local, state, and federal levels remains an important problem. Congress should support pending legislation which provides for the expedited and increased assignment of radio spectrum for public safety purposes. Furthermore, high-risk urban areas such as New York City and Washington, D.C., should establish signal corps units to ensure communications connectivity between and among civilian authorities, local first responders, and the National Guard. Federal funding of such units should be given high priority by Congress. Private-Sector Preparedness The private sector controls 85 percent of the critical infrastructure of the United States. The Department of Homeland Security's mandate includes working with the private sector to ensure preparedness. Preparedness in the private sector and public sector for rescue, restart, and recovery of operations should include (1) a plan for evacuation, (2) adequate communications capabilities, and (3) a plan for continuity of operations. As we examined the emergency response to 9/11, witness after witness told us that, despite 9/11, the private sector remains largely unprepared for a terrorist attack. We were also advised that the lack of a widely embraced private-sector preparedness standard was a principal contributing factor to this lack of preparedness. The Commission therefore endorses the American National Standard Institute's recommended standard for private preparedness. We were encouraged by Secretary Tom Ridge's praise of the standard, and urge the Department of Homeland Security to promote its adoption. We also encourage the insurance and credit-rating industries to look closely at a company's compliance with the ANSI standard in assessing its insurability and creditworthiness. We believe that compliance with the standard should define the standard of care owed by a company to its employees and the public for legal purposes. Private-sector preparedness, we believe, is not a luxury; it is a cost of doing business in the post-9/11 world. If we ignore it, the potential costs in lives, money, and national security will be inestimable. Closing Comments Mr. Chairman, we believe the recommendations we have presented this morning--as well as the many other recommendations we have made on foreign policy, public diplomacy, and transportation security--can make a significant difference in making America safer and more secure. We also recommend reforms in the structure of the Executive branch and the Congress. We believe that organizational reforms, in the absence of implementing the other reforms and recommendations in our report, will have significantly less value than the value of these reforms as a complete package. In short, while we welcome each step toward implementation of our recommendations, no one should be mistaken in believing that organizational reforms alone can address the current terrorist threat we face. We are gratified by the rapid response of the White House to our recommendations. We welcome the President's support for a National Intelligence Director, and a National Counterterrorism Center. We welcome the support of Senator Kerry. We look forward to working with you on our recommendations. We should seize this historic opportunity and move expeditiously. With your counsel and direction, we believe that the nation can, and will, make wise choices. We would be pleased to respond to your questions. Chairman Cox. I thank you both for your excellent statements. I would like to begin with the point that Lee Hamilton has just made, that organizational changes will not be enough--your report makes this very, very clear--unless we also address the deep-rooted cultural resistance to sharing that is shot through the executive branch. Your report states that, quote, ``The biggest impediment to all-source analysis is the human or systemic resistance to sharing information.'' I want to ask you whether or not one of the highest purposes, therefore, to which a National Intelligence Director might be addressed is enforced sharing. Might we not consider that the National Intelligence Director have as his or her highest order of business the enforced sharing of information across jurisdictional lines? You mentioned, Governor Kean, the Markle report, which you have also drawn attention to in your Commission report. It is something that we have focused on in this committee. We must move, in my view, I agree completely, to a trusted information network along the lines of the Markle commission has proposed because agency-owned databases have to be made accessible across agency lines. That is a step beyond the TTIC concepts. Might this not be something that the National Intelligence Director would be tasked with enforcing? On the other side of this coin, I would like you to address concerns that a National Intelligence Director, to the extent he or she has programmatic responsibility, might homogenize the requirements that are currently in place across the Intelligence Community. As you know, we employ enough people in the Intelligence Community to populate a midsize U.S. city. There are 15 separate intelligence agencies, each with their own unique capabilities and missions, each of those critical to our national security. Currently, our chief national security priority is fighting terrorism, but if history is any guide, we will in the future at some point in the indefinite future face a war between nations. And one of the highest purposes of intelligence is to forestall conflict between nations. What can we do to make sure that we don't dilute the positions on the field played by each of these intelligence agencies, to make sure that by funneling everything through a single National Intelligence Director we don't--to make sure that we maintain the distinct purposes of each of these 15 agencies in our Intelligence Community. Separately, from NID, I would like you to address the question of the National Counterterrorism Center, in specifics, its relationship to the Department of Homeland Security. As you know, Congress created within the Department of Homeland Security the Information Analysis and Infrastructure Protection directorate with the purpose of fusing both domestic and foreign intelligence and then disseminating that to State and local government and the private sector. One of the reasons, one of the several reasons that CIA was not given this function is that there is significant reach into our local communities, into the domestic United States, into the private sector beyond anything that we have asked CIA to do in the past; and we have abiding civil liberties concerns with breaching those walls that have been erected in the past for a very good purpose. The Department of Homeland Security now having been created for that purpose, TTIC now having been created separately from it outside the department, we are now faced with a proposal for a National Counterterrorism Center. Will it subsume TTIC? Will it subsume IAIP? Will it move its analysis directly to State, local, and private-sector entities? So if you would please address both the National Intelligence Director and the National Counterterrorism Center proposals and recommendations with those questions in mind, I would appreciate it. Mr. Hamilton. That is a very formidable list you have us, Mr. Chairman. On the first point, you are absolutely right. We think that someone has to enforce sharing and that is a principal role of the national intelligence director. You have a lot of marvelous groups out here in the intelligence community who do very good work. The intelligence community is organized basically on the method of collection. And they do an excellent job in developing information through their particular means of collection. What does not happen is that intelligence community agencies share that information and our analysis of 9/11 was that a principal cause of 9/11 was because the intelligence agencies did not share. You have to find some way to smash the stovepipes. And I think that can be done--has to be done by someone above them and therefore, the national intelligence director would have that role and it is a critically important role as we understand it. You simply got to get a better flow of intelligence information across all of the intelligence agencies and make that information available, more available than it is--has been in the past. I think some progress has been made here since 9/11. I know a lot of dedicated patriotic officials are trying to do a better job of it, but the organization is standing in the way of the sharing. Now the second point you raised with regard to homogeneity of intelligence is likewise an enormously significant question and one that we wrestle with a great deal. We do not believe that combining the intelligence agencies under one official undermines competitive analysis. Indeed, we want to encourage competitive analysis, and I think everybody does. It is a question of how best to put the structure together. I don't think anyone can claim that the current structure fosters tears competitive analysis. We just had the Senate report come out the other day on group think. And the whole idea there is that everybody is thinking the same way with regard to Iraq and you did not have competitive analysis. So it seems to me the status quo is not satisfactory with regard to the competitive analysis. Under our system, I want to emphasize that we have recommended not all of the analysis would fall under the director. The State Department would still have the INR. The Treasury would still have their intelligence. The Energy Department would still have their intelligence. The Army, the Air Force, the Navy, the Marine Corps would all have their intelligence units. So the competitive analysis situation is very lively and viable. And the other point I would want to make here is that the focus we put on open source information, indeed we make it a special part of the national counterterrorism center, calls for the development of a new office or agency to collect and analyze intelligence that is available on the open source. I know that kind of runs counter to what you think with regard to intelligence agencies, but if you look back on 9/11, the fact of the matter is that almost all of the information that was available was available to all of us. All you had to do was read the newspaper. The problem was we just didn't put it together, none of us put it together, or at least very, very few of us put it together. So open source analysis is important and will help competition. So we don't see any reduction of competitive analysis under our plan. We think even more. And we also would mention that very same objection was made to Goldwater-Nichols prior to that being brought into effect. We think our military is the best in the world today. We think it performs far better than ever because of the joint command system, and we believe that the intelligence community will perform better with joint mission centers. The final point you made with regard to the NCTC, its relationship to the DHS, let me just say that the there are two parts of our organizational chart. I don't know if you have that in front of you. It perhaps would be helpful if we did have it, the DHS, the Department of Homeland Security, is very much a part of the national intelligence centers. And they sit on the agency or the board where you have the deputy national intelligence director, who oversees homeland security. There are three deputies to the national intelligence director. One relates to the foreign field. That is CIA clandestine services. The other relates to defense. That is NSA, NGA, NRO. And the third relates to homeland security or homeland intelligence and that is where the tie would be to DHS. We think that TTIC is the right concept, but it needs to be strengthened. Mr. Kean. I would add just very little to that except that we believe our proposal will strengthen analysis and enhance competitive analysis, right now viewed as marginalized from some of the agencies. And it can have dire consequences. An example, easy example of not sharing information is when we found Moussaoui. The FBI identified him as the guy trying to learn how to fly jumbo jets and not much else. That information was gathered by the FBI. It got to the CIA. It went right up to the director of the CIA. The director of the CIA said that is an FBI matter, and so he ignored it. It never got to the FBI. If there was at that point a counterterrorism center, that kind of information would have surfaced and people would have shared information and we believe there would have been fairly prompt action. And of course, there was no action on this before 9/11. Mr. Hamilton. You mentioned, Mr. Chairman you mentioned specifically and I neglected to respond to it, what happens to IAIP, the information analysis and infrastructure protection agency within the Department within the homeland security, the answer is under our proposal, the locus of analysis moves to the national counterterrorism center, but IAIP continues to exist and continues to support the Department requirements, infrastructure protection, support to State and local authorities, but the overall analysis moves to the national center. Chairman Cox. I thank you. We have a great deal more to delve into on these subjects, but my time has expired and I want to move this along, we are going to be operating on a strict five-minute rule to give members who travelled great distances to be here, the opportunity to ask their questions. And I now recognize Mr. Turner for his questions. Mr. Turner. Thank you, Mr. Chairman. Governor Kean, in your statement, you say, and I am looking at it here, we believe the President needs to lead a government-wide effort to bring the major national security institutions into the information revolution. And you also say further down in your statement, only presidential leadership can develop the necessary government-wide concepts and standards. And I hope we don't miss that message, because as I have reviewed the efforts to bring about an integrated information sharing system, it is clear to me that the Congress has made repeated efforts to accomplish that. We have passed, as Lee Hamilton said, four separate laws mandating an interoperable border security system. Back in 2000, Congress created an independent commission appointed by the Attorney General to report on how border agencies could efficiently and effectively carry out the mission of creating an integrated collection and data sharing system, including an integrated entry and exit system which was mandated by the Congress in 1996. It seems that this law creating this independent commission followed 4 years of costly delays at the former INS when they failed to develop such an integrated entry exit system. Congress authorized the task force that was created. It authorized funding for fiscal years 2001 through 2008. In the first report of that Commission issued in December, 2002, the task force included an entire chapter on subjects that the task force would continue to research through 2003 and 2004, which included the development of an interoperable entry exit border system. In December of 2002, Attorney General Ashcroft renewed the task force charge to study this issue, provided $5.6 million to do it and assigned seven new staff divisions to accomplish it. And among the most significant efforts of this task force was to employ a group of eight scientists from the Los Alamos labs to study the 50 major border IT systems that are used in our government and to make recommendations. And when they issued their report in December of 2003, which, by the way, was on the eve of the implementation of this new U.S. VISIT program, these Los Alamos scientists stated that most of the existing border security systems could be readily integrated into an interoperable network so that one query could search numerous data bases simultaneously. They cautioned that the underlying technical infrastructure at the borders needed to be replaced with a more modern foundation in order to achieve interoperability. It seems clear to me--oh, by the way, this task force was dismissed by the Department of Homeland Security after the task force warned, in its December 2003 report, that entry-exit U.S. VISIT is a critical component of the broader DHS strategy and any system that is designed or perceived as a stand alone system simply would not fit into a post-September 2001 world. The report went on to recommend an independent evaluation of U.S. VISIT. It seems very clear that this task force suspected that we were once again building another stovepipe. And it comes back down to your initial statement that I read when I began my question and that is, it takes presidential leadership to develop the necessary government-wide concepts and standards to have an interoperable system. So I ask each of you if you were advising the President this morning and he were to say, yes, I will call in all the relevant players, the Cabinet secretaries and I will try to find out why after 3 years, we haven't created this interoperability that is so critical to preventing another 9/ 11, I would like you, based on your experience, to tell me what kind of excuses would we get from the relevant players for not moving forward more expeditiously to solve this problem? Where is the problem? You say it is presidential leadership. But even if the President were to lead, what kind of excuses would he get for this problem not being solved today? Mr. Hamilton. Well, first excuse would be need to know, I believe, because that is so embedded in our intelligence community today and we don't mean to dismiss that. That can be very important in protecting sources and methods. So you have to get a balance here. You have to get a balance on need to know on the one hand and need to share on the other. But the way we produce our intelligence in each of these areas, HUMINT over here, satellites over here, interceptions over here and other means, they all kind of hanging on to that information. And because the need to know philosophy is so deeply embedded in the intelligence community, they hang onto it. And they say, we are the only ones that really have to know this information. Now that is understandable and it probably historically has validity to it, but we are in a different world now with terrorism. And we think that you have to elevate the need to share up to the need to know and maybe the balance has to tip a little towards need to share because it was precisely the lack of sharing of information that Tom has cited just a moment ago that created the circumstances that permitted 9/11 to occur. In addition to this, as we say in our report, there is this very strong urge, which every one of you has countered to overclassify. Look, a document becomes secret before a person has the authority to classify or not classify. He or she looks at that document. There is no incentive for that person to make it public. The incentive is to classify it and protect himself from the possibility of the information getting out and causing a problem, so they stamp it secret. And we pile up enormous amounts of information, warehouses of information that are secret because of the incentives are all on the side of classification. Now this is a problem we think that no agency can deal with, no agency can solve this problem. It has to be done above an agency. And it has some very tough problems in it. There are technical problems, there are legal problems, there are political problems. And I think only the President can resolve those matters and has to resolve them, I believe, or you will not get the kind of information rights management that we think is necessary to protect ourselves. Chairman Cox. The gentlelady from Washington is recognized for her questions. Ms. Dunn. Thank you, Mr. Chairman. Congressman Hamilton, 12 years ago, as you may recall, you and I served together on the joint committee for the organization of Congress. Our report included specific recommendations on consolidation within the committee structure. You devote some of your report to this subject, specifically noting that congressional oversight for intelligence and counterterrorism is dysfunctional. My question to you and certainly Governor Kean, please jump in because you have been through this thing for the past many months, and we are very intrigued to hear the results of your experience on this, if you were in charge of organizing Congress to provide particular focus to this new threat of terrorism, where would you start? Would you, for example, divide the responsibilities for oversight and authorization in appropriations? What would you do with the terrorist watchlist, which is not currently under the aegis of our Select Committee on Homeland Security? What kind of a committee would you see happening? Would it be a joint committee between the House and the Senate? And I would suggest to you that just as you see what we are going through today with such a massive committee, it is hard for us to bore in and spend the time we need to spend to get precise answers and to follow up. It is very challenging. But the goal of all of us is to provide focus. I think, for example, that if something else does happen here in the United States, people will turn to Congress and say they had the chance to do the best job they could ever do to put such an oversight committee together. And so I am asking for your experience and for your thoughts as you have heard from other groups you have testified before and from the people who testified before your committee in the many, many hearings you have held, what is your suggestion to do with Congress? Mr. Kean. Well, we have general, what we have said has got to be consolidated. The importance came to me and I got this from the outside in that in this whole area, normally in areas other than intelligence, there is a lot of oversight from the press and from the public. People press in. People want questions answered. When you get into the counterterrorism area, so much of it is secret that that whole area doesn't exist. So you depend much more heavily on the Congress to do the oversight than you do than in almost any other area of government. And if the Congress can't get it done, nobody gets it done. If these agencies are allowed to go their own way or make use of multiple jurisdictions or not answer the questions properly from the Congress, then there is no oversight at all. And we suggest in the report that--particularly homeland security where there is mention, they are responsible to 88 different committees. That doesn't mean oversight at all. What it does mean is that people who should be spending their time protecting us all are spending an enormous amount of time of time testifying before a whole vast majority of committees. We suggest consolidating homeland security into a committee in the House and committee in the Senate. We suggested intelligence doing something radical and that is taking the authorization and budget functions and combining them into one committee because we sense the intelligence committee without any budget authority doesn't really have the clout with the intelligence community that they need to do their job. So it is moving in those directions so there is more concentrated oversight that can really understand these organizations, which are very complicated. Lee Hamilton knows more about this than I will ever learn in a lifetime, but he tells me that in the intelligence area, it is 4 years, 6 years before you really understand these agencies and are really able to ask the intelligent questions. So it is a question of consolidation. More authority for the committees. Mr. Hamilton. I think Tom has made the essential points. I must say, I have considerable sympathy for the Congress in putting this together, because Congresswoman Dunn, you and I served on the Joint Reform Committee and I might say that when the Democrats controlled the Congress, we weren't all that successful in making these reforms. It is very tough to do. I appreciate that. Very difficult to do, because when you are talking about reform of committee jurisdiction, you are talking about allocation of power, and power is the name of the game. Now what we are saying to you here is that this threat of terrorism is so urgent, so long-term, so difficult that not only must we do some reorganization of the executive branch, we also have to reorganize the Congress as well. And I will be quick to admit that it is a lot easier to say this from outside the body than from inside the body. But I think you folks are at a crunch point. And I think you are exactly right when you say that if another incident were to happen and the Congress had done nothing to put its own house in order, I think the institution, and maybe some of you individually would be heavily criticized for not acting. In other words, I think there is a political risk here. I may be wrong about that. I don't think so. I certainly don't think that the particular suggestions we made are carved in granite. You have to analyze the situation, understand the internal dynamics better than I do and you have to figure it out, but you have to get your house in order so you can have robust oversight of the Department of Homeland Security. The Department of Homeland Security needs your advice and counsel. And they want to be able to come--as Secretary Ridge said to us, I want to be able to come to one body of expert members of the Congress and lay out my problems to them and tell them what we have done and tell them what we haven't done and get their advice and counsel, rather than going to 88 subcommittees, which Tom mentioned, 88 subcommittees. That really is absurd. And it is not fair, it simply is not fair to the executive branch to make them do that, I don't believe. So we say OK, we have to have robust reform. Let me tell you what I did in the Senate. I was making a presentation on this for the Senate not long ago, and I asked them how long did you spend in the appropriations committee on review of the intelligence budget? And one Senator spoke up and said 10 minutes. The defense subcommittee appropriations in the United States Senate spent 10 minutes reviewing what we all know to be a $40 billion budget. I used that illustration in another group of senators a day or two later. And one Senator got up and say Hamilton, you are all wrong, you greatly exaggerated it. It was 5 minutes. Now nobody can say that is robust oversight. And it is a very, very serious matter. So you work it out. We have made our suggestions on it. You know this place better than I know it, now. But I think it is important for the Congress to get itself in shape so that it can perform one of its constitutional duties, which is oversight. Chairman Cox. The gentleman from Mississippi, Mr. Thompson. Mr. Thompson. Thank you, Mr. Chairman. And let me welcome the two gentlemen here this morning. Let me join my colleague, Ms. Dunn, in saying that the notion that we have all these jurisdictional issues before us is a real problem and it is both--it is a bipartisan problem. Mr. Hamilton, you are absolutely correct. This institution loves power, individuals love power and the homeland security issue is really one that should not be about power, but one about the people and how we can secure the homeland. So I will join you and other colleagues who testified before this committee that we ought to have a standing committee with all the jurisdictional authorities right within the committee. So I appreciate your comments on that respect. But there are some other issues associated with your report. One, it has to do with transportation. Many individuals in the public would like for people to try to prioritize transportation problems. Did you all look at transportation and try to give it a pecking order in terms of security or what did you do? Mr. Kean. I don't think we gave it a pecking order, but what we did was identify the various problems that had to be addressed in the transportation and security areas. And we are spending most of the money now on air safety, but we recognize that the transportation of containers, transportation of people via rail or subway, there are a number of other areas we have got to give if not equal attention to at least more attention to than we are giving them right now. Mr. Hamilton. Mr. Thompson, I think we look quite a bit at the transportation sector and there are so many possible recommendations that you could make there. We did not try to do that. But what we did say is that you have to plan. We have been doing is planning on planning for the last 3 years. We have got to put into place plans and it has to be done urgently. A comprehensive plan for the entire transportation system that Tom mentioned, aviation, rail, all the rest of it, and likewise, sector plans so that you have some way of measuring what you have done, you know what your goals are, you establish your priorities, you do your budgeting and all the things that are necessary in good planning, we are not there yet. We heard yesterday from the assistant secretary, Asa Hutchinson. We are moving forward on this. And I think some of these plans will be ready by the end of the year. We think it is terribly important to have integrated security plans for all of these modes of transportation. And the other things we mentioned were with regard to aviation security was to make sure you had layers of security, not just one checkpoint. What happened with the 9/11 terrorists was there was no layered security. They had to get by one principal problem and that was the check-in. And incidentally, a number of them were screened twice, but we didn't stop them. But I think everybody acknowledges that in order to have an effective security system, you have to have layers of checks and so we emphasized that. We put a lot of emphasis on explosives, because we think that is a very major problem in transportation security today and recommended among other things, for example, that every airplane have an explosive proof container on it and very few airplanes have that today. So those are some of the comments we made with regard to aviation security and rail security. But we didn't try to deal with it comprehensively but picked out two, three things that we thought were especially important. Chairman Cox. The gentleman from Texas, Mr. Smith. If the gentleman would suspend in order to permit time for all members' questions, I would ask that both members and our witnesses observe the green, amber and red lights that are there for your convenience. The gentleman from Texas. Mr. Smith. Chairman Kean, my first question is addressed to you and this goes to the statement on page 1 of your testimony today where you say the failure to share information cost us dearly. Today as we sit here, does ICE within the Homeland Security Department, the FBI and the CIA have the computer interface capability to exchange information, not whether they should exchange any and all information, but do they have the ability to exchange information? Mr. Kean. No. Mr. Smith. Do you have any idea when they will have that ability? Mr. Kean. No. We don't know what the timetable is. We know they are working on it, but we have not been given a timetable. Mr. Smith. Mr. Hamilton, page 3 of your testimony suggests pretty strongly that if a previous administration had enforced the immigration laws then in effect, we might have stopped the terrorist attack from occurring. You specifically refer to a number of laws, including laws--one law passed in 1996, Immigration Reform Act, which called for a entry-exit system, called for standardized birth certificates, called for better scrutiny of student visas. And you give examples, in fact, there on page 3 of your testimony that pretty clearly implied that a majority of the terrorists might have been apprehended or at least not admitted had those and other laws been enforced. You then say that eventually in 2002, they were implemented or beginning to be implemented or enforced then. But we did have a terrorist attack in 1993. The basement of the World Trade Center was attacked. You are suggesting something pretty seriously. If the Clinton administration had enforced the 1996 law which was passed by the House by a 3-to-1 margin, and in the Senate by a 9-to-1 margin, we might have avoided the terrorist attack; is that right? Mr. Hamilton. We certainly say that more robust enforcement of routine immigration laws supported by better information might have made the difference. Tom and I have been very, very careful not to say that if this step or that step had been taken, it would have prevented 9/11. Causation is much too complex to draw that conclusion. Mr. Smith. You said might have stopped. That is a very astounding statement. And is there any good explanation as to why the previous administration didn't enforce a lot of these laws considering the overwhelming support in Congress and considering the wake-up call we had in 1993? Mr. Hamilton. Two administrations have not enforced the 1996 law with regard to entry and exit systems. Mr. Smith. The current administration is enforcing that. Mr. Hamilton. I think our enforcement is better, and I agree with that, because we have learned a lot. Why didn't we enforce it back then, the reason is that none of us thought that this could happen. We just didn't expect it. And I think that made us all kind of lax probably in enforcement. What we are saying today-- Mr. Smith. Let me interrupt you quickly. The 1996 bill was passed just a couple of years after the 1993 World Trade Center bombing. It seems to me that we were pretty much on notice that we should start enforcing immigration laws especially those that were passed by Congress. Is there any good explanation as to why we did not? Mr. Hamilton. I thought I just answered that. Any reason we why we did not enforce? Mr. Smith. 1993. We passed major legislation in 1996. It was ignored. I know we are talking in retrospect, but it seems to me that was a dangerous position. Mr. Hamilton. I think in retrospect, it is easy to see there should have been a much more robust enforcement of our immigration laws. Mr. Smith. Let me squeeze in one more question. The Commission relied upon an individual foreign national security advisor to provide the Commission with information as to whether the previous administration had--how they had handled the Al-Qa'ida terrorist threat. Don't you think there was some conflict of interest on relying upon a national security advisor with a previous administration to tell the committee whether or not the previous administration had, in fact, handled the Al-Qa'ida threat well or no? Wasn't there some conflict of interest relying on a biased source there? Mr. Hamilton. We took the testimony of hundreds of people and I don't think we relied on anyone. We tried to sort through all of it. And we certainly gave the national security advisors of both administrations ample opportunity to defend their administrations and they both did a very good job of it. Mr. Smith. My time is up. Thank you, Mr. Chairman. Mr. Pascrell. Mr. Chairman, point of inquiry? Chairman Cox. Gentleman of New Jersey. Mr. Pascrell. I must say after that line of questioning-- Chairman Cox. If the gentleman is not stating a procedural inquiry, the gentleman is going to recognize the gentlelady from California. Mr. Pascrell. We have not had time for questions at our end many, many times on both sides. And I think that the line of questioning is improper and does not sit well--with the findings of this-- Chairman Cox. The gentleman will suspend. The gentleman will suspend. Mr. Pascrell. You can suspend all you want. Chairman Cox. The Chair will take this opportunity to announce that in order to permit time for all members to ask questions, we are going to proceed in the order of questioning for this panel that we have been following until 12:15 when our panel members must leave, and then the testimony of the second panel. We will continue in that order without interruption. So we will not resume with questions from the chairman and ranking member until every member has had an opportunity to ask questions. The gentlelady from California is recognized for her questions. Ms. Sanchez. Thank you, Mr. Chairman, and thank you again, gentlemen. I had the pleasure of questioning you last week in the defense committee. I have two questions, one for Governor Kean and one for my former colleague and let me say them both. The first one would be to Governor Kean. It is about the whole issue that you wrote about with respect to the relationship of strengthening and in some cases repairing our relationships with other countries. In your report, you recommend the formation of a flexible contact group of leading coalition governments. Can you elaborate more on what you meant by this; how do you see this contact group functioning; what would be its relationship to other multinational groups, like NATO, for example? And then to my former colleague, great again to see you. If you take a look over there on the majority side right after Ms. Dunn, you will see a lot of empty seats. Those are all chairmen of other committees. I also sit on the subcommittee of this group, which is the rules subcommittee, the one tasked with trying to figure out how we make this or if we make this a real standing committee with real jurisdictional power. When we had testimony before that rules subcommittee, most of those chairmen said make this go away. Comes back to that power struggle that you were talking about. So I would like to ask you, after all of the experience that you have had and the changes that you were able to construct within the Congress, how do we get these gentlemen to sit here and have a real discussion about not having 88 subcommittees for the homeland security agency to report before the Congress? Mr. Kean. I guess I will start. Our recommendation was that there should be some sort of a forum. We have no forum now for talking with the countries of the Arab world. We meet a number of times a year with the European union and we have an organization to discuss with them. The Asian countries and we have a forum to discuss things with them. If you take the countries of the Muslim world, there is no forum of that kind and there is no occasion to get together with them to share our thoughts and share our differences and get to know each other in that kind of a relationship. And so the point of that recommendation is just to suggest that such a forum be created. And that we as a country, therefore, would have the ability to have the same kind of conversations with that part of the world as we do with other parts of the world. Mr. Hamilton. I am not sure I can be helpful to you in trying to figure out the best way to deal with your very real problems of jurisdiction, except I would recommend to you the Tom Kean approach. Tom deserves much of the credit for the fact that we had a consensus report. And it is worth looking at why we were able to reach it and I think it may have some lessons for the Congress. The first rule was that we are going to agree on the facts. It is amazing how often we disagree on facts. And the Commission again and again--somebody would say, what is the fact, what is the fact here? And we would kind of suspend everything in the work of the Commission until we agreed upon the fact. So you have to figure out what the problems are and what the facts are. And then if you can get an agreement on the facts, it becomes not a cinch, but it becomes easier to get agreement on recommendations. But it can only be done with extended dialogue and deliberation. One of the things that really boaters me about the Congress today, looking at it from my posture is how difficult it is for you to deliberate, and that really is what the body is all about or should be, deliberation. But your schedules are so hectic and the time that you have to sit down with your colleagues and work through difficult problems is limited. I think one of the things you really have to do is to figure out how to engage in dialog with one another. And so much of the activity on the floor of the House, you are just kind of reading speeches and making speeches past one another. That is not deliberation. That is not dialog. That is not the way the body is supposed to work. And so I have that advice for you. And it all came about because of the remarkable leadership that Tom Kean showed in bringing a very disparate group of commissioners together. It is a hard business and it is tough to do and takes a lot of time. Chairman Cox. The gentleman from Connecticut, Mr. Shays. Mr. Shays. Thank you very much, Mr. Chairman. I just want to say to both of you as the chairman and vice-chairman, I am in awe of the work you did on the 9/11 Commission. I am absolutely in awe of it. I am grateful that you made it unanimous and you didn't have to work hard to do that part. I mean, you had to work hard to make sure it didn't become partisan. And it is very clear that you put criticism on previous administrations, the present, Congress, our oversight and yet, you did it in a way that I thought was helpful in our getting and moving forward. I believe some of this can be done in executive order, regulation, law and House and Senate rules. And I just want to say publicly that I will not, and if I am reelected and in a position to vote on the rules, I am not going to vote for any House rule that doesn't include a permanent committee on Department of Homeland Security, for instance. I just simply will vote against any rule. I will not vote for a rule that places our country in jeopardy because we don't have the good sense to make this a permanent committee. And I think my colleague is correct that when she points out that the people who aren't here today are the Chairmen of the other committees. It is outrageous. We have to put this aside and do what is right and have a permanent committee. Lots of things to talk about with the limited time I have, I would like you both to address the whole issue of overclassification. And I would like you to just tell me when you see what is the incentive for change? I mean, we all know that we have too much classification. We read documents. And I think, Governor Kean, you told me that you just were amazed at the fairly average stuff you read that was classified. So what is the incentive, though, that we put in to change that? We are going to have a hearing, my subcommittee is going to have a hearing on this next week, called too many secrets, overclassification, it is a barrier to information sharing. But I don't know what the incentive is. Tell me what the incentive is so we don't have so much overclassification? Mr. Kean. It is hard. I will tell you, Congressman, you are absolutely right, coming from the outside, it just absolutely amazed and appalled me the amount of information I read that was stamped, classified, top secret, all these stamps on it and then you would read it and it wasn't anything you hadn't read in the newspapers. And I was asking one of my watches that we used to call them and I said, why would 300 pages of it--why is it classified? And he said because he didn't know it was true when he read it before. That is no answer. That is no answer. I think this overclassification is hurting us terribly right now. The public is not an enemy, it is an ally in this war against terrorism. The more they know, the more they can help us. The more local law enforcement knows, the more they can help us. I don't know whether you have somebody with all the incentives to declassify that you now have to classify. What Congressman Hamilton said before was absolutely right. If you have a document, you get in no trouble for classifying it secret. You might get in trouble if you don't. So everything is stamped secret. You have to somehow put the motivation on somebody to look at all this stuff and say why shouldn't the American people have this information? Why shouldn't it be in the paper? Wouldn't it help if it was? Knowledge is power. Mr. Shays. It would strike me that if you didn't classify as much, you would then know what are those classified pieces of information that have to be shared from one agency to another. So it seems to me like a huge issue. I have been wrestling with what the incentives are. Mr. Hamilton. Mr. Hamilton. Congressman Shays, I am immensely pleased to learn that you are having a hearing in this area because it really does need to be explored and we need to get some more ideas into it. And what I am going to suggest may not be too palatable to this group. But my experience is the Congress has just defaulted on the question of classification, just been too timid and has said in effect, Mr. President, you deal with it. The President today--and look, presidents have many things on their plate. Presidents of the United States do not sit around stamping documents secret. They have the authority, but they delegate that authority all over the place so that every department of government you go into, they have classifiers whose job it is to stamp documents secret. And believe you me, they have got a good stamp. I think the Congress has to assert itself and begin to find ways and means of setting standards, for example, for when a document should be classified and when it should not be classified. Now I don't suggest that is easy. It will be a tough task. It hadn't been done before. But I think the tumidity of the Congress, the willingness just to defer to the President, whoever the President is, the authority to stamp--to delegate this authority without any real review by the Congress is a major default of responsibility. So I will be following your hearings. I would like to hear--we did not have time, I guess, maybe that is not a very good excuse--we did not get into the question of what incentives, the one you are raising--it is a hard one to answer--I would like to see what you come up with. Chairman Cox. The gentleman's time has expired. I will interject at this point that the comments that have been made about chairmen of other committees should be clarified by observing that the questioner himself is the vice chairman of the Full Committee on Government Reform and Oversight and top representative of that committee on the select panel. He is, of course, here today and has endorsed the concept of creating a permanent homeland security committee. Likewise, the chairman of the Committee on Intelligence who, with his ranking member, has strongly endorsed a permanent-- Mr. DeFazio. Mr. Chairman, we are running out of time. You said there would be no extraneous statements. Could we move on? We are not going to have a chance to ask questions. Chairman Cox. I appreciate the gentleman. I think we wish to point out that the chairman of the Intelligence Committee has recused himself from today's hearing because he has been nominated as Director of Central Intelligence, and likewise, the chairman of the Committee on Armed Services strongly supports the recommendations of this commission. The gentleman from the State of Washington, Mr. Dicks is recognized. Mr. Dicks. I, too, want to thank the chairman and vice- chairman for their great work for the country-- Chairman Cox. Would the gentleman yield for just a moment? I failed to recognize that Mr. Goodlatte, the chairman of the Committee on Agriculture is present. Mr. Dicks. I want to thank you for your great service and I know particularly Lee Hamilton chaired the intelligence committee. I served for 8 years on the Intelligence Committee. One of the things that Secretary Kissinger reminded us of yesterday was that one of the biggest breakdowns is not necessarily in the collection of the information, but in the assessment of that information and it in almost every one of these intelligence failures we have had, we have had the information. Either we have collected it through our national, technical means or we had information like that from the FBI field offices, but it was the failure of higher-ups who got that information to act upon it. When we think about this whole issue, we need to remember that. In many of these cases, we had the information. It is tragic, but we had it and we just didn't act on it. The group think, you know, like that which occurred going into the Egyptian-Israeli of 1973. Another classic example was right before Desert Storm and Desert Shield. The information was there. We saw the tanks being fueled, but the President was talking to leaders in the region and they said Saddam won't do it and he did it. And to President Bush's great commendation, he came out and said this wasn't an intelligence failure but a failure to act on the intelligence. But I think that is one thing we need to consider here. I think John Hamre has made an important point in his statement. Remember, this is the start of the debate. This is far too important a point on whether we create a national intelligence director and how that is done because you have the classic problem here. 80 percent of the intelligence budget is in the Defense Department. 20 percent is over at CIA. So how do you work out an arrangement so the Director of the Central Intelligence Agency, who has community-wide responsibility, can actually have authority over this budget? Hamre puts out a pretty good point. You could put the NRO, the NSA, NEMA and the interspacial group all together and put the intelligence director over that so you would have diversity and you would have the CIA and director of CIA. You would have the DIA over in the Defense Department and their services. So I think that deserves some consideration. Another idea here that we need to think about in trying to figure out a solution is there is a model where the head of the NRO, Peter Teets, is also the assistant secretary of the Air Force for science and space. You could have a model where the director of the Central Intelligence Agency would also be the deputy Secretary of Defense for intelligence. He would still have to work out his arrangement with the Secretary of Defense, but you could have then one person in charge of the entire intelligence community in terms of formulating the budget and the policy, but also he would have to coordinate with the Secretary of Defense, which is the situation that we have today. So there is some concern, I think, about if we create a new national intelligence director, then we are going to have to create a new bureaucracy and all the staff to support that person. And what does the Director of the Central Intelligence Agency do besides run the CIA as part of this operation? I like the idea of the center. I think it is good. But I make the point. All this discussion about information sharing and tearing down the stovepipes, we have done a lot of that work. A lot of these interagency centers can get the work done. But don't forget, it is the failure of assessment. That is where the real failures have occurred in our history. I just would make that point. Mr. Hamilton. Well, Congressman Dicks, the two articles that you referred to by former Secretary Kissinger and John Hamre, need to be looked and studied carefully because both are highly respected figures who have had a lot of experience in this field. Secretary Kissinger obviously is correct when he says we have got to get the assessments right. The question I raise about that is how can you possibly get the assessment right if you don't have accurate sharing? You have to have the sharing of the information so that the analyst is able to see what these various agencies of intelligence have done. You have to pool that information. You have to bring it together somewhere or you cannot get an accurate assessment. And that is what we are saying. We are saying we have to share that information and only then can the analysts have a chance of getting an accurate assessment. There is no quarrel with the idea that you have to put emphasis on assessment. I think he is exactly right in many respects. We have put most of our resources in intelligence on collection. And we collect so much data that we can't process it all. Mr. Dicks. That is true. As you well know, there is only a fraction of this information that is analyzed in real-time, and that is a major problem. The assessment thing has to be considered. I agree completely with you on the information sharing, and I think that is a great concept. But it is the assessment phase, getting the equipment and getting the information so you can analyze this information as much as possible in real-time and then having people who are smart enough to be able to conclude that something is happening and convince their superiors to act upon it. Don't forget that part. Chairman Cox. The gentleman from-- Mr. Kean. May I say one comment? You are absolutely right on the assessment side. And we think the director of the CIA is going to have a full-time job rebuilding the CIA. It will take 5 years to do that. We hope he can do it faster, but that is going to be a full-time job, getting diversity, language skills and getting the right people on board. So we think that is very, very important. And looking at the assessment, I will tell you, having read, I guess, the highest level briefings that were given to two presidents, I will say only as a citizen coming from the outside, I think our intelligence agencies failed two presidents. Neither president had the information that he needed to assess the situation properly and make correct decisions. So I think the one thing we cannot do is allow a lot of status quo to exist. Chairman Cox. The gentleman from Michigan, Mr. Camp. Mr. Camp. Thank you, Mr. Chairman, and thank you for your service in making our country safer. My question is this, you both referred to our porous borders and some of the things we have done to address that issue. Certainly creating the Department of Homeland Security is one of those things to secure our borders. There is this U.S. VISIT program. The administration is ahead of the congressionally-mandated schedule. But my question is this recent change. As you know, border protection could deport at airports and seaports people found illegally. Now that has been extended to those found within 100 miles of our border. It is a new responsibility of our border protection. Is that something you would agree with? Is that moving in the right direction in terms of trying to address our border issue? Mr. Hamilton. Mr. Camp, I am not clear on what change you are talking about. Mr. Camp. The law was that if someone was found within 100 miles of our border, border patrol did not have the authority to deport people. However, if they were at a airport or seaport they were immediately deported to another country. There has been an administrative change allowing now inspectors at our borders to deport people who are found in this country illegally. Is that the sort of thing that would fit in with attempts to address our porous border? Mr. Hamilton. That is the so-called expedited removal program that was announced this week. That was announced after the Commission had completed its work. We do want to emphasize the need for terrorists' travel intelligence and operational strategy in this. And that step when I read it, I thought my reaction was positive to it. Of course it is implemented and makes all the difference, but it is a means of making a decision on site as I understand it, is that correct, to act? Mr. Camp. Yes, it is. Mr. Kean. It does give us an opportunity. Everybody who we catch who crosses the border on phony documents we shouldn't just send them back. We should get those documents, find out where those documents came from. Because if we can crack these illegal terrorist facilitators who are doing this work, we will go a long way to stopping the problem. So I think we should look at any of these people we catch as not just somebody but as an opportunity to learn more. Mr. Camp. My second question is on the issue of airline security and particularly the No-Fly Lists and attempting to compare every passenger list with comprehensive lists or terrorist lists. This has been done primarily by the airlines. Recently, there is a suggestion to move that to TSA. And I would like to get your comments. It would seem to me that if the more everyone knows, the safer we are, I don't see why the airlines should not have a role in that as well. But I would be interested in both of your comments in that area. Mr. Hamilton. One of the recommendations we made was that you have to have an improved No-Fly List and you have to have an improved automatic selectee list and that we ought not to delay the development of those while the argument goes on about the successor to the CAPS program. We believe the screening function should be performed by the TSA, not by the air carriers. It certainly has to utilize the set of terrorist watchlists, all of them, that we have that are maintained by the Federal Government; and air carriers should be required to supply information that is needed for the system. Mr. Camp. Thank you very much. Thank you, Mr. Chairman. Chairman Cox. The gentleman from Massachusetts, Mr. Frank. Mr. Frank. In your report you have a great deal about the FBI and quite thoughtfully note that there were past problems with the FBI in terms of getting into impingement on political freedom. And I was struck by the thoughtfulness with which you said that your recommendations--essentially, you rejected the notion that there should be a new agency that would take a big chunk out of the FBI but did say quite thoughtfully that you are expressing the hope that the FBI will be able to reform. We all share that hope. I must say that my hope in that regard was given a little bit of a jolt yesterday when I read the New York Times article by Eric Lichtblau headed ``FBI goes knocking for political troublemakers.'' FBI officials, it says, are urging agents to canvas their communities for information about planned disruptions aimed at the convention and other coming political events. Essentially what it says is that a significant number of FBI agents are questioning people about whether or not they know whether or not somebody is going to do something violent at the Republican convention. They had apparently done it with regard to the Democratic convention. The New York Times in today's editorial says, quite accurately, I believe, these heavy-handed inquiries are intimidating and they threaten to chill freedom of expression. They also appear to be a spectacularly poor use of limited law enforcement resources. You pay some attention, I was pleased to see, about privacy and civil liberties. I wonder if you have any reaction to this. I mean, the notion the FBI is out there asking people if they plan to do things, there is a troubling tendency here to take the doctrine of preemption, which seems to me controversial enough in the international area, and apply it domestically. It is none of the business of law enforcement in the United States to preempt people of what some might think are whacky political views and I might think because they might be about to do something. We have this new notion of free speech zones. Many of us had always thought that the free speech zone was called the United States of America, and efforts to kind of make it anything less than that were grave error. In your judgment--you spent a great deal of time on this-- is there any reason why we should be having the FBI going around anticipatorily asking people if they know anybody who plans to divert attention? Is the FBI that deep in extra agents that they got people with nothing else to do for the summer to go out and do this? I wonder if this in your mind raises the concern that it raises in mine. Let me read, in your report, on page 75, you note Attorney General Levi, who did great work when he was under Gerald Ford in this regard, tried to clean it up and then talked about Attorney General Smith's revision. But this is the key point: Smith's guidelines, like Levi's, took account of the reality that suspicion of, quote, terrorism like suspicion of, quote, subversion could lead to making individuals targets for investigation more because of their beliefs than because of their acts. I am wondering if you think have we gotten that out of our system? Is it coming back? Mr. Kean. I don't know the facts other than what you have read behind this particular case. What we do believe is that, as we try to protect ourselves, there is always the danger as we get into these new methods of protection that our civil liberties will be jeopardized; and we have recommended creating something that does not exist right now, which is a board within the executive branch to examine these various things where in cases like this are raised to actually look and see is this getting unnecessarily into the jeopardies of our-- Mr. Frank. Thank you, Chairman Kean. I would hope very strongly that we would make that part of any report. I hope it will get the attention. Mr. Chairman, I ask unanimous consent to put into the record the New York Times article and the editorial. Chairman Cox. Without objection. [The information follows:] Copyright 2004 The New York Times Company The New York Times August 16, 2004 Monday Correction Appended Late Edition--Final SECTION: Section A; Column 2; National Desk; Pg. 1 LENGTH: 1605 words HEADLINE: F.B.I. Goes Knocking for Political Troublemakers BYLINE: By ERIC LICHTBLAU DATELINE: WASHINGTON, Aug. 15 BODY: The Federal Bureau of Investigation has been questioning political demonstrators across the country, and in rare cases even subpoenaing them, in an aggressive effort to forestall what officials say could be violent and disruptive protests at the Republican National Convention in New York. F.B.I. officials are urging agents to canvass their communities for information about planned disruptions aimed at the convention and other coming political events, and they say they have developed a list of people who they think may have information about possible violence. They say the inquiries, which began last month before the Democratic convention in Boston, are focused solely on possible crimes, not on dissent, at major political events. But some people contacted by the F.B.I. say they are mystified by the bureau's interest and felt harassed by questions about their political plans. ``The message I took from it,'' said Sarah Bardwell, 21, an intern at a Denver antiwar group who was visited by six investigators a few weeks ago, ``was that they were trying to intimidate us into not going to any protests and to let us know that, `hey, we're watching you.' '' The unusual initiative comes after the Justice Department, in a previously undisclosed legal opinion, gave its blessing to controversial tactics used last year by the F.B.I in urging local police departments to report suspicious activity at political and antiwar demonstrations to counterterrorism squads. The F.B.I. bulletins that relayed the request for help detailed tactics used by demonstrators--everything from violent resistance to Internet fund- raising and recruitment. In an internal complaint, an F.B.I. employee charged that the bulletins improperly blurred the line between lawfully protected speech and illegal activity. But the Justice Department's Office of Legal Policy, in a five-page internal analysis obtained by The New York Times, disagreed. The office, which also made headlines in June in an opinion--since disavowed--that authorized the use of torture against terrorism suspects in some circumstances, said any First Amendment impact posed by the F.B.I.'s monitoring of the political protests was negligible and constitutional. The opinion said: ``Given the limited nature of such public monitoring, any possible 'chilling' effect caused by the bulletins would be quite minimal and substantially outweighed by the public interest in maintaining safety and order during large-scale demonstrations.'' Those same concerns are now central to the vigorous efforts by the F.B.I. to identify possible disruptions by anarchists, violent demonstrators and others at the Republican National Convention, which begins Aug. 30 and is expected to draw hundreds of thousands of protesters. In the last few weeks, beginning before the Democratic convention, F.B.I. counterterrorism agents and other federal and local officers have sought to interview dozens of people in at least six states, including past protesters and their friends and family members, about possible violence at the two conventions. In addition, three young men in Missouri said they were trailed by federal agents for several days and subpoenaed to testify before a federal grand jury last month, forcing them to cancel their trip to Boston to take part in a protest there that same day. Interrogations have generally covered the same three questions, according to some of those questioned and their lawyers: were demonstrators planning violence or other disruptions, did they know anyone who was, and did they realize it was a crime to withhold such information. A handful of protesters at the Boston convention were arrested but there were no major disruptions. Concerns have risen for the Republican convention, however, because of antiwar demonstrations directed at President Bush and because of New York City's global prominence. With the F.B.I. given more authority after the Sept. 11 attacks to monitor public events, the tensions over the convention protests, coupled with the Justice Department's own legal analysis of such monitoring, reflect the fine line between protecting national security in an age of terrorism and discouraging political expression. F.B.I. officials, mindful of the bureau's abuses in the 1960's and 1970's monitoring political dissidents like the Rev. Dr. Martin Luther King Jr., say they are confident their agents have not crossed that line in the lead-up to the conventions. ``The F.B.I. isn't in the business of chilling anyone's First Amendment rights,'' said Joe Parris, a bureau spokesman in Washington. ``But criminal behavior isn't covered by the First Amendment. What we're concerned about are injuries to convention participants, injuries to citizens, injuries to police and first responders.'' F.B.I. officials would not say how many people had been interviewed in recent weeks, how they were identified or what spurred the bureau's interest. They said the initiative was part of a broader, nationwide effort to follow any leads pointing to possible violence or illegal disruptions in connection with the political conventions, presidential debates or the November election, which come at a time of heightened concern about a possible terrorist attack. F.B.I. officials in Washington have urged field offices around the country in recent weeks to redouble their efforts to interview sources and gather information that might help to detect criminal plots. The only lead to emerge publicly resulted in a warning to authorities before the Boston convention that anarchists or other domestic groups might bomb news vans there. It is not clear whether there was an actual plot. The individuals visited in recent weeks ``are people that we identified that could reasonably be expected to have knowledge of such plans and plots if they existed,'' Mr. Parris said. ``We vetted down a list and went out and knocked on doors and had a laundry list of questions to ask about possible criminal behavior,'' he added. ``No one was dragged from their homes and put under bright lights. The interviewees were free to talk to us or close the door in our faces.'' But civil rights advocates argued that the visits amounted to harassment. They said they saw the interrogations as part of a pattern of increasingly aggressive tactics by federal investigators in combating domestic terrorism. In an episode in February in Iowa, federal prosecutors subpoenaed Drake University for records on the sponsor of a campus antiwar forum. The demand was dropped after a community outcry. Protest leaders and civil rights advocates who have monitored the recent interrogations said they believed at least 40 or 50 people, and perhaps many more, had been contacted by federal agents about demonstration plans and possible violence surrounding the conventions and other political events. ``This kind of pressure has a real chilling effect on perfectly legitimate political activity,'' said Mark Silverstein, legal director for the American Civil Liberties Union of Colorado, where two groups of political activists in Denver and a third in Fort Collins were visited by the F.B.I. ``People are going to be afraid to go to a demonstration or even sign a petition if they justifiably believe that will result in your having an F.B.I. file opened on you.'' The issue is a particularly sensitive one in Denver, where the police agreed last year to restrictions on local intelligence-gathering operations after it was disclosed that the police had kept files on some 3,000 people and 200 groups involved in protests. But the inquiries have stirred opposition elsewhere as well. In New York, federal agents recently questioned a man whose neighbor reported he had made threatening comments against the president. He and a lawyer, Jeffrey Fogel, agreed to talk to the Secret Service, denying the accusation and blaming it on a feud with the neighbor. But when agents started to question the man about his political affiliations and whether he planned to attend convention protests, ``that's when I said no, no, no, we're not going to answer those kinds of questions,'' said Mr. Fogel, who is legal director for the Center for Constitutional Rights in New York. In the case of the three young men subpoenaed in Missouri, Denise Lieberman, legal director for the American Civil Liberties Union in St. Louis, which is representing them, said they scrapped plans to attend both the Boston and the New York conventions after they were questioned about possible violence. The men are all in their early 20's, Ms. Lieberman said, but she would not identify them. All three have taken part in past protests over American foreign policy and in planning meetings for convention demonstrations. She said two of them were arrested before on misdemeanor charges for what she described as minor civil disobedience at protests. Prosecutors have now informed the men that they are targets of a domestic terrorism investigation, Ms. Lieberman said, but have not disclosed the basis for their suspicions. ``They won't tell me,'' she said. Federal officials in St. Louis and Washington declined to comment on the case. Ms. Lieberman insisted that the men ``didn't have any plans to participate in the violence, but what's so disturbing about all this is the pre-emptive nature--stopping them from participating in a protest before anything even happened.'' The three men ``were really shaken and frightened by all this,'' she said, ``and they got the message loud and clear that if you make plans to go to a protest, you could be subject to arrest or a visit from the F.B.I.'' URL: http://www.nytimes.com CORRECTION-DATE: August 17, 2004 CORRECTION: A front-page article yesterday about efforts by the F.B.I. to interview prospective political demonstrators in advance of the Republican National Convention in New York misidentified the Justice Department office that found the bureau's monitoring of previous protests to be constitutional. It is the Office of Legal Counsel, not of Legal Policy. A caption with a picture of four Denver residents who were questioned in the effort referred incorrectly to two of them in some copies. Sarah Graves, not Christopher Riederer, is the housemate of Sarah Bardwell. GRAPHIC: Photo: F.B.I. agents and Denver police officers visited Sarah Bardwell, right, and a housemate, Sarah Graves, and two neighbors, Christopher Riederer, second from right, and Blake, who would not give his last name, at their homes to ask them about political and antiwar protest activities. (Photo by Carmel Zucker for The New York Times)(pg. A11) LOAD-DATE: August 16, 2004 Copyright 2004 The New York Times Company The New York Times August 17, 2004 Tuesday Late Edition - Final SECTION: Section A; Column 1; Editorial Desk; Pg. 20 LENGTH: 542 words HEADLINE: Interrogating the Protesters BODY: For several weeks, starting before the Democratic convention, F.B.I. officers have been questioning potential political demonstrators, and their friends and families, about their plans to protest at the two national conventions. These heavy-handed inquiries are intimidating, and they threaten to chill freedom of expression. They also appear to be a spectacularly poor use of limited law- enforcement resources. The F.B.I. should redirect its efforts to focus more directly on real threats. Six investigators recently descended on Sarah Bardwell, a 21-year- old intern with a Denver antiwar group, who quite reasonably took away the message that the government was watching her closely. In Missouri, three men in their early 20's said they had been followed by federal investigators for days, then subpoenaed to appear before a grand jury. They ended up canceling their plans to show up for the Democratic and Republican conventions. The F.B.I. is going forward with the blessing of the Justice Department's Office of Legal Counsel--the same outfit that recently approved the use of torture against terrorism suspects. In the Justice Department's opinion, the chilling effect of the investigations is ``quite minimal,'' and ``substantially outweighed by the public interest in maintaining safety and order.'' But this analysis gets the balance wrong. When protesters are made to feel like criminal suspects, the chilling effect is potentially quite serious. And the chances of gaining any information that would be useful in stopping violence are quite small. The knock on the door from government investigators asking about political activities is the stuff of totalitarian regimes. It is intimidating to be visited by the Federal Bureau of Investigation, particularly by investigators who warn that withholding information about anyone with plans to create a disruption is a crime. And few people would want the F.B.I. to cross-examine their friends and family about them. If engaging in constitutionally protected speech means subjecting yourself to this kind of government monitoring, many Americans may decide--as the men from Missouri did--that the cost is too high. Meanwhile, history suggests that the way to find out what potentially violent protesters are planning is not to send F.B.I. officers bearing questionnaires to the doorsteps of potential demonstrators. As became clear in the 1960's, F.B.I. monitoring of youthful dissenters is notoriously unreliable. The files that were created in the past often proved to be laughably inaccurate. The F.B.I.'s questioning of protesters is part of a larger campaign against political dissent that has increased sharply since the start of the war on terror. At the Democratic convention, protesters were sent to a depressing barbed-wire camp under the subway tracks. And at a recent Bush-Cheney campaign event, audience members were required to sign a pledge to support President Bush before they were admitted. F.B.I. officials insist that the people they interview are free to ``close the door in our faces,'' but by then the damage may already have been done. The government must not be allowed to turn a war against foreign enemies into a campaign against critics at home. URL: http://www.nytimes.com LOAD-DATE: August 17, 2004 Mr. Frank. One last question. I was struck when you talked about the failure of immigration enforcement to exclude some of the people who came in. I was involved to state my role during the 1980's and 1990's trying to change the rules. I thought they were unduly restrictive on political grounds of people coming in. I take it from reading your report that you don't find that the problem is in the definition statutory of who can be excluded but rather in the failure to use that definition appropriately. Am I reading that accurately? Mr. Kean. I think you are reading that accurately. We had a wonderful example of an immigration official in Orlando, Florida, who simply asked a couple of questions. A lot of these people just automatically granted access even to those that made false statements. Mr. Frank. Can I just say that the key point is that under the statutes as they now exist those people were excludable if the right procedures had been followed. It is not that the statute allows-- Mr. Kean. No, they were excludable, and they were not. I am saying there was at least one case of a very alert Customs agent who simply started asking questions, and that was probably the 20th hijacker who was excluded because of a good civil servant doing his job. Mr. Frank. We have FBI agents asking too many questions and immigration officials not asking enough. Maybe they can trade off. Chairman Cox. The gentleman from Virginia, the distinguished chairman of the Committee on Agriculture, Mr. Goodlatte. Mr. Goodlatte. Mr. Chairman, thank you very much for holding this very important hearing. Thank you for the excellent work that both of you and your colleagues have done in preparing this report and providing us with many thought- provoking ideas that the Congress and the executive branch need to act upon and act upon aggressively. I would like to follow up on two areas that have been talked about thus far. Governor Kean, you mentioned in your opening comments and in the report your note that in the past the wall that we have built between intelligence-gathering agencies like the CIA and law enforcement agencies like the FBI was due to the risk of inadvertent disclosure that outweighs the benefit of sharing information with other agencies. That certainly is one of the concerns, certainly, on the part of intelligence agencies why we had that wall, but it was not by any means the only reason. Another reason that the wall was built up was to address the concern about the use of intelligence gathering which is done with regard to foreign nationals but necessarily involves also gathering information about U.S. citizens when those foreign nationals have communications with them and so on. Even when done properly, information is gathered, and the concern was then that law enforcement agencies which could abuse that information would not have access to it. Obviously, there is a big flaw in that; and September 11th is the greatest proof of that flaw. But, nonetheless, while we did in the PATRIOT Act, I would note, partially tear down that wall to enable the sharing of that information, we have also been careful to make sure that we not have the kind of abuses that some have suggested could occur. I wonder if you have additional comments that you might make or recommendations that you might make to how the Congress can assure the public that the action taken as a part of the PATRIOT Act was a sound one for the reasons of September 11th but not one that should cause them concern that their civil liberties are going to be abused. Mr. Kean. You know, in that regard I would say there is probably no substitute for the oversight of the committees. I mean, that is another argument for really having very, very vigorous oversight on the part of the Congress, to make sure that the public can be assured that it is being done properly. Mr. Goodlatte. Thank you. Congressman Hamilton. Mr. Hamilton. Well, we think the provisions of the PATRIOT Act that facilitate the sharing of information between the law enforcement people on the one side and the intelligence on the other are very beneficial and very important in terms of a counterterrorism strategy overall. We are not experts on the PATRIOT Act, and there are many provisions of the PATRIOT Act, but this provision we think is very, very important. Mr. Goodlatte. Let me follow up also on the questions related to immigration. I was pleased to hear you both say that more robust enforcement of routine immigration laws--and the example you just cited is clearly one of those--is very important. I wonder how serious you are about that. This is, as you probably know, a major political issue here in the Congress. There are very widely differing opinions about what types of overall reforms, some related to national security, some related to a whole host of other interests, should take place. But we have been unable to reach conclusions about that except the law that we passed in 1996 that did provide for greater crackdown on illegal immigration. Nonetheless, since that time I would argue, in part because of lack of enforcement of our current immigration laws, we have seen the number of illegal immigrants in the country rise. Obviously, not all of those are threats to our national security, but it is very difficult when have you a lack of information because people are operating below the radar screen which ones are and which ones are not of concern to the country because of national security. How aggressively should we be enforcing our immigration laws overall to avoid that very type of problem when that individual presented himself to that particular immigration officer in Florida, that officer had no reason before asking the questions whether that particular person was a threat. We also have millions of people who never check in with an immigration officer to go through that kind of questioning who are here in this country, some of which have malicious intent; and I wish you would comment on the need to enforce our immigration laws overall and address this problem. Mr. Hamilton. I want to say, first of all, in responding to your question, that we were given a mandate and we did not construe that mandate to mean that we should review all of these immigration questions that you have presented. Mr. Goodlatte. I understand. I am talking about enforcement of current law. Mr. Hamilton. I think the enforcement has to be very robust. Let me say that we believe that border security is a part of national security and that we have to have an integrated, modern border and immigration system. You can't look at them as two separate things. You have got to have a border and immigration system that meshes. We make three specific recommendations, and they are fairly broad, but there is where we focused our interest. Number one, we said you must move towards a biometric entry and exit system as soon as you possibly can. We think that is absolutely essential to getting control of the border and to providing an integrated border immigration system. So number one is the adoption of a biometric entry exit system. Number two is to have accessible files on visitors and immigrants so that officials at all points who deal with people coming into this country--Customs, Border Patrol, immigration, visas, passports, whatever--you have to have an accessible file that people can tap into to learn about that person. Is that person who he says he is or she is? And we have got to be able to put that all together and integrate it. And the third thing we say is you have to use intelligence on indicators of the terrorist travel tactics. Terrorists are great travelers. They have all kinds of tactics which we have already referred to earlier in our report, and you have got to get intelligence on those tactics so that you can effectively defend your borders. We do not, Mr. Goodlatte, get into more detail on immigration than that. What we have suggested is--calls for major change, and I must say it is not inexpensive. It is going to cost a lot of money. Mr. Kean. It is probably the largest expense of all of our recommendations. We also believe, by the way, as we move in this direction if possible it be coordinated with other countries, particularly like the European Union who have the same interest we do. And because the terrorists are so vulnerable when they are traveling, if we could have a biometric system as integrated with as many countries as possible, it is going to make the terrorist's job a lot tougher. Chairman Cox. The gentlelady from California, Ms. Harman. Ms. Harman. Thank you, Mr. Chairman. I would first like to observe that many members of this committee in the lower rows here have traveled across the country today to participate, and I would urge you to gavel each person's questions closed at 5 minutes sharp, including the answers, because it is really unfair to other members that they will have so little time. Chairman Cox. I appreciate the gentlelady's comments. Ms. Harman. And please gavel me closed. I don't plan to exceed the 5 minutes. I would like to welcome our witnesses. I have had a lot of time to talk to them, to read their report carefully. I think it is an exceptionally good report. I think we will be measured, all of us in this committee, all of us in Congress, and the President, by whether we step up and act on the recommendations, not just talk about them but act on the recommendations. If there are representatives of the 9/11 families in the audience today, as there have been in so many hearings, I would like to welcome you and tell you that, certainly speaking just for me, I will do everything I can to make sure that these recommendations are acted on in a timely way in this term of Congress. I just want to mention several things. I was one who testified before the Rules Committee as a ranking member of the Intelligence Committee. I testified in favor of making this committee permanent, making it have real jurisdiction so that it could truly authorize a real homeland security budget. That will mean other committees giving up jurisdiction. I think we should be for that. Similarly, I feel that the Intelligence Committee--realize I have an interest in it, but even if I were not a member-- should have real jurisdiction and should have, as both witnesses have testified, control over both the authorization and appropriations of a standalone intelligence budget. We do not have that. In fact, the defense appropriations budget is already law. It appropriates funds for intelligence programs that have not yet been authorized. I think that that is a sad commentary on the state of power of the Intelligence Committees in the Congress. At any rate, I want to focus today on one of what I think are two glaring gaps. One glaring gap is information sharing. We have had lots of conversation about the need--and I share this--for a national intelligence, a national counterterrorism director, technology reforms and so forth. These are great ideas. I want to talk about the other glaring gap, and that is interoperable communications. Congressman Hamilton mentioned it this morning. Congressman Kean testified about it yesterday. There is a recommendation in your report that specifically says Congress should support legislation to expedite the assignment of radio spectrum. Legislation introduced in the House 17 months ago by Congressman Curt Weldon and me has been languishing because of jurisdictional disputes in various committees. It would close the gap and make certain that adequate spectrum is available by the end of 2002 which was the promise--2006, excuse me, a promise Congress made in 1997. My question to you is, when you say we should expedite the assignment of radio spectrum, are you talking about closing the loopholes and making certain that that spectrum is available by 2006 or are you trying to argue that we should transfer that spectrum even sooner? Mr. Kean. As soon as possible. Let me tell you what she is talking about. We have been told by respondents--firemen, policemen, first aid people--who respond to the scene that they do not now have the ability to communicate with one another and therefore save lives together. It puts their lives in jeopardy, and it puts people's lives in jeopardy. They can't do it because they don't have enough spectrum for their radios. This is a plea that came to us particularly from the New York Police Department and Fire Department but a number of others, also. I recognize this is a tougher one because I guess you would be taking on the National Association of Broadcasters. They win most of their fights. But it is absolutely essential for the protection of the American people. I can't tell you how important that is. Talk at home, talk to your responders, talk to your fire and police, talk to the people in your districts, because this has to be done. This is something which will not only in case of a terrorist attack but in case of the kind of terrible tragedy we had in Florida with the hurricane, in case of any other emergencies like that, giving spectrum to our public safety officials is just going to make your constituents and our countrymen and women a lot safer. Ms. Harman. Governor, I thank you. I would like to quote Senator McCain from yesterday. He said, ``I have been on this committee''--that is the Commerce Committee--``for 18 years and they''--that is the broadcasters--'' won every time. Maybe we will have a victory on behalf of the American people. I surely hope so.'' Thank you, Mr. Chairman. Chairman Cox. I agree. The gentleman from New York, Mr. King. Mr. King. Thank you, Mr. Chairman. First of all, I want to thank Governor Kean and Congressman Hamilton for the great job they have done. The country owes you a tremendous debt. Also, as someone who lost well over 100 friends, neighbors, and constituents on September 11th, I want to thank Congresswoman Sanchez and Congressman Shays for the remarks they made about the importance that Congress has to give to this committee and to this entire issue of homeland security. I think it is really unfortunate that too many Members of Congress are still living back on September 10th, 2001. If another attack does come, we haven't done our job. There will be no forgiving any of us for not having moving forward when we should have. Congressman Hamilton, I think my main question is to you. You touched on this before, but it is often the whole issue of TTIC and the National Counterterrorism Threat Center. I would ask you--first of all, I read the report. I am not certain exactly what you mean by saying that you would build on TTIC. In other words, will it still be there? Will it continue to function? Second, if you could give us your analysis of the job that TTIC has done and is doing and how you expect that to be improved by the National Counterterrorism Threat Center. How and why will there be a better job done in the future than there will be now under TTIC? Mr. Hamilton. I think TTIC is a valuable concept. It is working reasonably well. We are concerned that the people that are assigned to TTIC are not at the highest level. In other words, it tends to be junior level people; and it doesn't quite have the overall clout that you want. What you have today is a lot of different fusion centers around the government, and TTIC is one among several fusion centers, maybe even one among many. What we are suggesting here is a National Counterterrorism Center which would take the lead on strategic analysis and develop net assessments, and it would really have--it would not--it would replace all of the other fusion centers. This would be the center that you would look to for your strategic analysis, the President and Members of Congress, and to make assessments and to provide warnings of possible terrorist attacks. It would have the responsibility of tasking collection requirements. In other words--and that is a terribly important role in the Intelligence Community--to say, OK, you are going to go after this, you are going to use these assets to go after this kind of intelligence. And it would be--it would have that responsibility both inside and outside the United States. It would be a very--it would absorb and we think strengthen the analytic talent that exists today in TTIC and not just TTIC but the Counterterrorism Center, the DIA's Joint Intelligence Task Force combating terrorism. So it is a newer and much more powerful fusion center. In addition to what I have said, it would have not just responsibilities in intelligence but it would have responsibilities in operational planning as well. And this is an important concept that we borrow completely from the military. It is not just an intelligence entity, it is a place where you pool and collect and analyze all of the intelligence from the various intelligence agencies of the United States, but, beyond that, it is an operational center in the sense that it plans operations. The Governor mentioned early on in his testimony the case of these two muscular hijackers in San Diego. We had bits and information--bits and pieces of information about them. Nowhere did it all come together. Nobody was in charge in the sense of managing the case. And that is what you need. You need someone to step forward and say we are going to manage the case. George Tenet was informed in August of 2001 about Moussaoui in Minneapolis. We asked him about it; and he said, first of all, he assigned some of his people to work with the FBI on it. Then we said, did you talk to the President about it? And he said, no, and said this was the FBI's case. I don't think that answer was wrong. It was the FBI's case, but clearly insufficient. What was the problem? The problem was nobody was managing the case. Nobody was saying to themselves, I know about these two fellows out on the West Coast. I know this about them. I know that about them. It raises red flags. And somebody has got to take hold of that and management case, plan it operationally. And that is what this counterterrorism would do. They are appointed by the President. It reports to the National Intelligence Director. It is a very, very important center. May I say that it is not just a center that deals with counterterrorism--excuse me, beyond that, we create centers for other threats. Because the same thing is needed with regard to other threats. WMD or maybe you put China or maybe you put the international crime and narcotics on the list. Whatever you think the major threats to the national security are, we create a center, if you would, to deal with it. Those would change from time to time, and the responsibility would be not just to pool all of the intelligence you have got but to operationally plan it and to see that the policy decisions of the President and the National Security Council are in fact carried out. Chairman Cox. The gentleman from Maryland, Mr. Cardin. Mr. Hamilton. It is a very new concept, and it is not easy to get hold of. Mr. Cardin. Thank you, Mr. Chairman. Let me also offer my congratulations to Governor Kean and to Congressman Hamilton for their extraordinary service to our country. I also want to compliment the other members of your Commission for the extraordinary work that you were able to do. It is a very professional document. I hope the fact that we are holding these August hearings, which are extraordinary for Congress to do, means that we will have action in September establishing a single point, single person for the collection and analysis of intelligence information and strengthening the entire process for dealing with intelligence information and protecting us. I also cannot help but look at a comparison to the Cold War. Growing up in the Cold War, the fear of communism and the Soviet Union really prevailed throughout our community, similar to how the fear of terrorism is today. We developed a strategy in the Cold War to develop a very strong national defense, and we did that in the United States. But we also recognized we couldn't win the war on terrorism alone and the war against the communists alone, that we needed to develop international support. We worked with our friends in Europe, and we developed NATO, which was a way of shoring up our defense in Europe, and we shared a lot of information with the Europeans. And we won. We developed a war of ideas, and we used new technology at that time to get information behind the Iron Curtain that there was a better way of life, with democratic principles and respect for human rights that led to economic advancements. And more and more people, more and more nations agreed with us; and we won the Cold War. So I guess my point is, I looked at your report, and I am impressed by your commitment to expand our efforts internationally. Yes, we need to develop our capacities here for sharing information, but we also need to work with our friends around the world to share information. The people who travel to the United States, the terrorists go through other countries; and we need to share that information. In 1975, we developed the Helsinki Accord, the organization for security and cooperation in Europe to develop an international regional forum to share a commitment towards democratic principles and respect for human rights. It helped us during the Cold War with a forum that we could go to challenge the actions of other countries and to help people who in their own countries were fighting a battle of ideas. There is interest in the Middle East to do that, to develop forums where we can show hope to people and look at longer- range solutions to this battle. So I just really wanted to give you an opportunity to underscore the importance not just for us to look inward at our own Nation to improve the collection of intelligence information and to deal with a better sharing of information, but this battle, if we are going to win it, also has to be engaged internationally with the U.S. leadership working with our friends around the world, particularly in the Middle East. Mr. Kean. Congressman, thank you very much for making that point. Because that is a very strong and important area of our recommendations and hasn't received the focus, frankly, that some the rest of it has. We have got to have a consistent message going out to that part of the world. And it is a message of hope. You are absolutely right. Bin Laden's message is one of despair that leads eventually to death. That is what he is talking about. If we don't have a message to these people to show there is a better life, that we can actually provide a path to that better life, that we are on their side, not somebody else's side, we are not going to win this. Because, as Secretary Rumsfeld said to us once, you know we can kill these terrorists, but if they are being created faster than we kill them, we are not going to win this one. That is one thing, the message of hope, certainly working with our friends and allies who have some of the same interests we do and share the same hopes and dreams and way of life and ideals, getting those across. We have specific recommendations, as you know, for some of the most important countries, we believe-- Saudi Arabia, Afghanistan, Pakistan. The emphasis on those three countries in our report is very, very important. We believe the whole way in which we do business in that part of the world, once we get a consistent message, has got to change--if we are, for instance, upset, as we should be, that these madrasas that kids are going to in that part of the world are teaching hate and teaching hate of the West and all of that, well, there has got to be some alternative. A lot of the young children are going to those madrasas because there is no other school. There is other opportunity for parents to send them anywhere except the madrasas. All right, let's help these countries to build alternatives. There are a number of recommendations along this area in our report. We believe, frankly, they are among the most important recommendations. Thank you very much for bringing them to our attention. Chairman Cox. The gentleman from Georgia, Mr. Linder. Mr. Linder. I want to thank you both for being here and for your service to our country. We appreciate it. Lee, you mentioned something about biometrics early on. It strikes me that the terrorists need access to our traveling systems, our airplanes, our trains, and if we could get to biometric identifiers on people who are not risks quickly, could we spend more of our time on those who might be risks and cannot be identified with the biometrics? Would you expand on that? Mr. Hamilton. You always have a tension here. Most of the people that come into this country are peaceful and have good intent. The overwhelming number that come into the country do. You have a lot of people who come into the country every day to work and go back and you have to develop systems that sort these people out very quickly. That is one of the goals, I think, of the biometric entry exit system. We have to develop the technology and the skill to let the peaceful people, if you will, through quickly and the person who is a regular commuter across the international boundary, to let him go through quickly; and we think the biometric system integrated with both border security and immigration is the way to do that. It is the quickest way to do it. To pick up on the previous question, you have to have international cooperation on that. We want to develop a biometric system that is internationally recognized. Now, that is not going to be done in the next year or two, but it ought to be the goal in the long term, and it is the way to assure fluid commerce. We are very concerned about the anecdotal, I guess, information we were getting about the number of scholars who are not coming into the country and the number of students who are not coming into the country. This is a serious matter for us in the long term, and we have to figure out a system. Now, we have talked to all of the top officials about this. They are very alert to it. They know the importance of it. So I think the system will move forward. But we have got to accelerate it. If we don't, we are going to be denying ourselves and this country a lot of talent that we need. Mr. Linder. Governor, you think alluded twice to are we staying ahead, are we killing more terrorists than we are creating or than are being created? You referred to the madrasas. I would like to ask you very bluntly, can we deal with this without dealing directly and frontally and bluntly with Saudi Arabia? Mr. Kean. No. And the relationship with Saudi Arabia has got to change. Our relationship in the past with Saudi Arabia, to be very blunt, is, as I understand it, has been oil. That has been the relationship with Saudi Arabia. Allies to the royal family, they ensure us enough oil, and that has sort of been the relationship. That can't be the relationship anymore. We have got to continue to work with the royal family. There is no question about it. But we got to work with the royal family to bring some changes in that country. It seems they are now recognizing that their way of life, the royal family's leaders of Saudi Arabia, is under attack; and these Islamic militants would like to overthrow them just as much as they would like to injure us at the moment. So they are, of necessity, our allies; and they also realize the need for change within their own borders. We have got to work with them on that. We have got to help them on that. We have got to work with them instituting the changes that are possible and then try to push and shove a little bit and get a few more changes to the system. Because if Saudi Arabia--I mean, we identified those three countries--Saudi Arabia, Pakistan, Afghanistan--because if any one of them went the wrong direction, we would have a world of trouble on the international stage and in the terrorist problem. So, yes, the relationship with Saudi Arabia has to change, must change. Chairman Cox. The gentlelady from New York, Mrs. Slaughter. Ms. Slaughter. Thank you, Mr. Chairman. I am so happy to see both of you here this morning. I think the whole world owes you thanks for what you have done. I want to express my thanks to your amazing staff as well. The report that they have produced is unequal to any report I have seen in three legislatures, and I am very grateful for that. Personally. I lost any confidence I might have had that our intelligence agencies were any good when the CIA let Aldrich Ames sit with them for 8 years as a Russian spy and the FBI let Robert Hanssen do the same thing here in the shadow of the Capitol. It certainly was not lost on me that if they couldn't even find spies in their midst that worked with them on a daily basis that they probably weren't doing a great deal to protect us. So I was not surprised at that. I agree with you absolutely about congressional oversight. We have got to get some control in this House and make this a strong committee that really has the jurisdiction it needs to see to give the American people and the rest of the world confidence that we are doing our part to keep America secure. In that regard, I have only got one complaint. I represent Niagara Falls, New York; and you have recommended that DHS lead the effort for the comprehensive integrated system. I would like to ask you to reconsider that. After 3 years, DHS has still not given us a threat assessment. At this point, Wyoming is getting the same amount of aid from our national security as New Yorkers on a per capita basis. This makes no sence since all of us are aware that if terrorists strike, two things they are going to want to do is, one, kill as many people as possible and, two, cause as much economic damage as possible. And while I don't mean to denigrate Wyoming, that is not likely to happen there. On our border, since 9/11 there has been a complete backup of both commerce and people at our border crossing. It it takes about five hours to get across. At the same time, you can still come across in a rowboat from Canada to the United States at many, many points; and people do that. DHS' plan for security on the Great Lakes was to set up something that would require every boat on the lake to report to a video phone somewhere, many, many of them 60, 70 miles apart, which are continuously out of order. Now what people tell me is that fewer than 5 percent even attempt to use those video phones. The only thing that people who do not do so have to worry about, in some of our rural counties, is that the sheriff might somehow pluck them up from all of the hundreds of boaters who are there. It simply does not work; and, beyond that, it doesn't make any sense. At the same time, we have tightened up so much on our border on our side you cannot come in from Canada literally for hours. I am meeting tomorrow with my Canadian counterparts to see what we can do. DHS has come up with a Nexus card, which I think Congressman Hamilton referred to, which would work except it costs $80 for 5 years and nobody will pay. In addition, in my area, you can only buy it in Canada. So these are some of the things that we should be able to deal with, but at this point I would like to see if you would re-consider your border recommendation and see if one of the national laboratories or NIST or GAO or somebody could develop a better border plan do that in a hurry. Because we can't wait 3 more years for something like that. So that is my major concern at this point having-- representing one of those border States, I need to tell you that what DHS is doing there simply does not work. Citizens tell me that in these rural towns, they see boats come in, cars drive on the bridge, pick up somebody or something from that boat and go away all night long. By the time they call the sheriff, they are long gone. So this is a wide-open area which is of some concern. What the answer is eludes me, but I am very much concerned that after 3 years I think that all that we have accomplished there basically is to aggravate almost everybody who lives in that area. Most of these people cross this bridge almost on a daily basis; and if they try to get to the Nexus lane, they can't. They are tied up so much in traffic. So these are some of the things on a local basis that we are trying to deal with. My sense about DHS is 170,000 people trying to learn how to get along. I am not sure they are anywhere near close to that at this point. So I just throw that out for your recommendation. But, beyond that, I cannot tell you how impressed I am on the work that you have done. Like Congressman Shays, I will certainly pledge to you my strong support that we will get your recommendations enacted into law. Thank you very much for what you have done and I appreciate, despite all that other work you have done, that you continue to make all these rounds and talk to all of us. Thank you both very much. Mr. Kean. Thank you very much. Chairman Cox. The gentleman from Arizona, Mr. Shadegg. Mr. Shadegg. Thank you, Mr. Chairman; and, gentlemen, I would like to echo the appreciation of the others on the panel. I greatly appreciate the work you have done. I think it is a great contribution to our efforts here in the Congress to move forward and to improve homeland security. I want to begin with a question that goes to kind of one of the thrusts of the report. A great deal of your recommendations go to restructuring, restructuring particularly of the Intelligence Community, and not substantive recommendations. Some have criticized that. One prominent individual within the CIA has criticized that rather strongly. Others have said that at least a flaw they see in your overall report is its failure to emphasize revitalizing the clandestine service to infiltrate and destroy terrorist organizations, as opposed to making structural or restructuring recommendations. I would like to give you a chance to respond to that and tell us why you think focusing on restructuring is important and, second, how important you personally believe it is to increase our efforts through the clandestine service to infiltrate and destroy terrorist organizations. Mr. Hamilton. We put a lot of emphasis on strengthening human intelligence, and I think that is part of the conventional wisdom today. Everybody agrees with it. I don't know anybody that disagrees with it. Now, there are two problems with it. One is that it is very, very tough to penetrate these cells; and that is why you have to have a lot more diversity into the CIA. But these cells are very small. I suspect they are the most difficult intelligence targets there to penetrate. We must not have exaggerated expectations about our ability to do it. I am all for doing it, I am all for strengthening the human intelligence, and it clearly needs to be done. But may I cite to you when I was chairman of the Intelligence Committee back in the late 1980's and the early 1990's that we were talking about strengthening human intelligence. This is not a new idea. It is just very hard to do. And Tenet testified before us that it will take him at least 5 years from now to get intelligence clandestine service where he wants it to be. The second problem that I think we often overlook with regard to intelligence HUMINT, human intelligence, is you are asking a person to live a very dangerous life for a very long period of time, away from family, away from country, and it is not the easiest thing to recruit those kind of people. They have to be absolutely fluent in the language. They have to be able to be absorbed into the culture so that nobody would recognize them. So I am all for human intelligence. I think it needs to be strengthened, but I also think we have to have some reasonable expectation of its limitations. The second point about why did we put so much emphasis on the structure, I would only say to the person that made that criticism they haven't read the report. Look, we talk in here about the military actions that are necessary, attacking the Usama bin Ladens of the world, of not providing any sanctuaries. We have a whole chapter devoted to American foreign policy and how you prevent the growth of terrorism, how you have got to engage with ideas, how our policies have to understand the--we have to understand the consequences of our policies. We talk about the elements of a coalition strategy, public diplomacy, scholarship exchanges, agenda of opportunity, a better vision. We talk about how to stop terrorist financing or use terrorist financing to your advantage; and we have a whole list of recommendations, many of which we have been talking about today, about how to protect ourselves better. So I understand that a lot of the discussion in the public press and in the media has been on institutional reform, and that is understandable because--but-- Mr. Shadegg. I have just a little bit of time. Let me get in one other question. Under the structure you envision there will be--several agencies will be able to search the database--we are talking about intelligence-gathering agencies--the database of other agencies. I think that is clearly necessary. But my question is, is not that or did you give thought to the fact that might, in fact, be a disincentive for the agencies to put information into their database and--since human nature being what it is-- and are there recommendations you think within your report that go to that particular point? Mr. Hamilton. It is a good point, and what it means is you have to have someone above the agency who has the power to impose rules and regulations to force that sharing. I think you put your finger on a very good point. It is not automatic that you get the sharing, and the tendency of keeping the information you have got from everybody else is a very human one and a very strong one. The only way I know you can deal with it is through superior authority. Mr. Shadegg. I thank you for your report. Chairman Cox. The gentleman from Oregon, Mr. DeFazio. Mr. DeFazio. Thank you, Mr. Chairman. Mr. Chairman, thanks for convening the committee during the August recess. I have several questions. Stansfield Turner and others have postulated that a number of the more urgent reforms and requirements that you are putting forward in terms of a National Intelligence Director, budgetary control, basically putting someone in charge and making the agency share could be done by executive order or modification of Ronald Reagan's executive order regarding the intelligence services. So that would be one question, to comment on whether or not, given the fact Congress won't act at least until September, very likely may be not even until later than that, shouldn't the President look at implementing some of these changes more quickly by executive order? The second would be, you commented on interoperability and the focus was on spectrum, but I would like you to focus, if you could, on cost of interoperability. Because that seems to me to be the major barrier to all of the first responders I talked to. In fact, the President's budget this year zeroed out interoperability funds from the Federal Government. What priority would you put on that since you have talked about the fact that the funds are spread widely, but would you put a priority on a national interoperable communications system for all level of government since you rightly pointed out that Federal, State, and local are the eyes and ears and first responders are the State and local and they need to be there. So, first, the executive order; second, interoperability; and then, third, if you could just come back to--I continue to be frustrated. I thought I was told at an aviation hearing that we now had an integrated watchlist or it was announced actually at a hearing by Admiral Stone, as I recall, that by the end of that month--and I believe that was the month of June--that there would be an integrated watchlist available so that the agencies and the TSA could access that. If you could comment on those three things. Mr. Kean. I guess I will start. While some of it could be done by executive order, we felt very strongly--we talked about this and talked about this on the Commission--that the Congress really ought to--is it ought to be law and Congress ought to have the input and Congress ought to be the designer and it ought to be permanent. And that things done by executive order are not permanent and sometimes they are not agreed to by the Congress and that creates all sorts of problems. So we felt very strongly in the Commission as we talked about it that this really should be congressionally inputted. Mr. DeFazio. Quickly, because I hope you can cover the other two points, but I mean is it urgent that we begin to force the coordination more quickly and that perhaps at least as an interim step the President could appoint somebody or could force that change in terms of authority to the CID? Mr. Kean. He could do anything, I guess, in consultation with the Congress. My worry is if you start to put a new system in place or a new individual in place or what have you and then the Congress comes along behind that--for instance, a person who we would recommend should be Senate confirmed because it is such an important position. So you put somebody in, it is just--it raises problems that we would much rather have the Congress to obviously act with due deliberation but act as hastily as possible because we believe that until this information is shared the American people are not going to be as safe as they should be. As far as the cost of trying to make a communication system, we leave it--we believe it is a national priority. These first responders and people who are going to come to national emergencies need help and everything we can do to help them I think we ought to do. And the third point. Mr. DeFazio. Watchlist. We have been told it was going to be up and running. Mr. Hamilton. Our impression is we do not have a totally integrated watchlist, and there is still a number of different watchlists, and we are urge, of course, that it be integrated. Mr. DeFazio. Thank you. Thank you, Mr. Chairman. Chairman Cox. The gentleman from Indiana, Mr. Souder. Mr. Souder. Thank you, Mr. Chairman. I want to pursue a little bit the biometric indicators on the licenses. We have had a little bit of discussion about this, mostly as it relates to borders. A couple of premises. One is that not every terrorist is going to cross the border. Some may already be here. second, they may even in fact, since they don't seem in a rush, get themselves into regular crossings and get into the fast pass lanes, get secured. It seems to me, in addition to kind of the way we are doing it now, the random or unexpected or occasional terrorist, we also have to have a system that has biometric indicators or other things more than just that. Could you elaborate a little bit more on whether you see this as a watermark, whether you see this as indicators, what type of things, whether you see this for all citizens, for people who have Green Cards? And also address the question, as many cities in Indiana and other places are starting to accept non-American identification, which would include setting up a bank account which would make it very difficult for us to track financial funding, be able to go to a store to pick up precursor chemicals for bombs using a non-American ID, could you elaborate more in detail and specific how we should start to address this question? Mr. Hamilton. I don't think, Mr. Souder, that we consider ourselves any kind of experts on what kind of a biometric screening system you have. It is a complicated, technical question; and you do want to try to begin to implement the system as soon as you can and not wait for the perfect system to come along. What we say is that the goal is an effective biometric entry/exit screening system, that it needs to be compatible with other countries to the extent possible so that we can exchange information about these people that cross international boundaries. We need to have border officials who have access to interoperable--access I guess to all of the information about an individual traveler; and we think it is just common sense to have a modern, integrated border immigration system. Now, all of that, of what I have said to you, are kind of general principles and statements. That is as far as the Commission went in addition to saying that you have got to have all of the intelligence you can about individual travelers. When you get into the questions you are raising about the kinds of biometric systems and all, we did not address those. Mr. Souder. Don't you agree it isn't just a matter of travelers? They may already be here. People can move and get work permits and say something more than a passport. Don't we need a system internally as well? Can you comment on how can you track intelligence if you can't track the individuals? What good will a national intelligence center do if people can start bank accounts and pick up bomb supplies and we don't know who they are? Mr. Hamilton. Well, it is a very important point because what we know is that the terrorists are very good at exploiting the gaps. And if we have a marvelous system that works at the borders but it doesn't catch the illegals and it doesn't catch other people who come in different ways, it is not going to work. And that is really what we mean by the word integrated. It has to include all of the ways that we check on people coming into this country. Mr. Souder. Mr. Hamilton, I have a question. As a fellow Hoosier, one of the difficult things we have, and you have this in your report, that we have to put the money to targeted higher-risk areas. Bottom line what that means is moving money from Indiana to the East Coast and hardening targets in the East Coast, which potentially leaves us more vulnerable in Indiana. We saw the incident in Ohio, that it can move to other places. How do you advise those of us who are in those places to deal with this difficult political question? It is fine to say that is the case, but the terrorists may move around. They are going to go to softer targets. You may get copycats. What do you recommend we say, those of us who already see a lot of our dollars go to the East and West Coast? Mr. Hamilton. There are limited resources, and you have to make some tough judgments. I think it is likely that every State could make a claim for some of these funds. But to suggest that you are going to predict a rural county in southern Indiana--I will say southern rather than northern Indiana--to the extent that you protect New York City or Washington, D.C., just doesn't stack up with the intelligence information. So you have a limited number of dollars. You can't protect against every threat, you cannot protect against every tactic that a terrorist will use, and you have to make some very tough judgments as to where you put those dollars. I know that those are very difficult judgments to make because you are dealing with a question of priorities, and priorities is always the toughest question in government. Where do you put limited resources? The intelligence chatter is very clear. The intelligence chatter is that New York and Washington, D.C., are the primary targets and, therefore, the bulk of your resources have to go there. I know that may not be an easy message for somebody from Indiana because they see it, but I also think that there are many facilities--I mentioned in the testimony 85 percent of the facilities that need protection are in the private sector. You folks know better than anybody what facilities in your district need protecting, and I suspect some Federal funds should be made available for these most vulnerable facilities. You have to also take into account not just the vulnerability of the facility but how much damage would be done if the facility, in fact, were attacked. Mr. Hamilton. How many lives would be lost, what are the risks, all of those things have to be sorted through, and so we say money should be distributed largely on a risk assessment basis. Mr. Kean. There are two targets that come over and over and over again. These people want to kill as many of us as possible, so they are going to pick targets where the most people are. And second, they talk about the symbols of America. And so where those symbols are located are where the targets will be. We have to direct our resources to the places where those large numbers of people congregate and where the symbols exist. Chairman Cox. The gentlelady from New York, Ms. Lowey. Mrs. Lowey. Thank you, Mr. Chairman. And I want to join my colleagues in welcoming you, Chairman Kean and my good colleague, Lee Hamilton. I really appreciate your last comments, because it is an excellent segue way to several of the issues that many of us have been working on as New Yorkers. First of all, I would like to generally ask you to continue your involvement, to continue using your clout and influence in implementing the recommendations that don't require overall structure change. I support the structure change, but for those of us who have been trying to move some of these issues forward, we share the frustration of many here in this Congress that we can't get it done. First of all, John Sweeney and I and others have been working on formula change. We have not been able to get that done. I won't repeat the statistics. You know, and Louise Slaughter mentioned it as well, when you compare the per capita of New York to the other areas, it should be an embarrassment to all of us: $10.12 compared to the $38 to other parts of the country. So please continue your advocacy. Whether it is done through the Congress or executive order, it must be done and it must be done as soon as possible, and I know you agree. second, many of us have been talking about airport security. In your report, you say, quote, ``It must take into consideration the full array of possible enemy tactics, such as the use of insiders.'' Did the Commission intend for airport workers, cabin cleaners, maintenance crews, caterers who are currently permitted to bypass metal detectors, or should everyone have to go through metal detectors? And I have been repeatedly told by TSA it is too inconvenient and costly to screen airport workers despite the fact that 100 percent of workers are physically screened at airports like Heathrow, almost 100 percent at Charles de Gaulle. This doesn't make sense to me. If you could, continue to weigh in on that issue, because I am sure you agree that everyone should be going through metal detectors. And I--as a New Yorker, it disturbs me that currently, we are so worried about security in the New York area, yet thousands of people are going through airports every day with antiquated identification badges. I also would like to comment on your eloquent statements about education. You are very well aware that the whole budget for the foreign aid appropriations bill is $19.3 billion--I happen to be the ranking member--and the budget for the military is upwards of $416 billion. We managed to get education dollars from $100 million to $400 million. I would be interested to know whether you think the current estimate of $10 billion or more should be validated by this committee and this Congress by adding dollars to our overall allocation for education. The $19.3 billion goes, as you know, to HIV-AIDS, goes to all the work of US-AID, goes to education. I would like to hear your recommendations. And since my time is running out, if you could comment on the formula change, if you could comment on airport security in particular, the fact that thousands of people are not going through the metal detectors with their badges; and third with regard to our foreign aid budget. Thank you very much. Mr. Kean. Everybody should go through metal detectors, my belief, without exception. Mrs. Lowey. Do we have to wait for structural change or do you think it can be implemented now, or can it be implemented by executive order? We can't seem to move the FAA or TSA, and business keeps talking about an inconvenience. How can we get that done now? Mr. Kean. You probably could answer it better than I could. I don't know how you can do these things by executive order, or whether you can, or whether you have to have something through the United States Congress. I don't have the expertise to answer that, but it should be done. No question about it. I believe that if we are going to create fewer terrorists, change minds in the Arab world, we have got to change--we just can't be viewed as a military power. We have to get back to some of the things we used to do in the Cold War, to try to win that Cold War and change minds, and that involves not only education expenses, but cultural exchanges, ways in which there are student exchanges, ways in which we allowed these people to get to know us and we get a better understanding of them. We have to get into those soft areas. We have got to get into them. We have to let these people know who we are, and we have to understand in a much better way who they are. And I am not talking about the small percentage who want to kill us, but I am talking about the much larger percentage that don't really like us at all because of what they know of us right now, but if we are able to send a different message, might like us a bit better. And the third question-- Mrs. Lowey. The formula. Mr. Kean. My view and the Commission's view: You have to put the money where the greatest danger is, and that is measurable due to the chatter we hear and the estimates from the intelligence agencies. We know where the greatest danger is and that is where the money ought to go. Mr. Hamilton. Let me add to what Tom has said. What you are really wrestling with here is, what should the elements be of a counterterrorism policy. And the answer to that is that it takes a lot of elements. And if you think only in terms of one or two of those elements, you are not going to get it together. You have to have military force. You have to have covert actions and the right kind of diplomacy, the right kind of public diplomacy, the right kind of law enforcement. You have to have the right kind of action in the Treasury Department to trace the flow of monies. And I think the risk that you face in thinking about counterterrorism policy is that you grab on to one or two of those and say you are going to solve counterterrorism with covert action or with military action or with educational reform. You are not going to do it. You have to get the whole thing in balance and integrate it, and that is the big challenge of counterterrorism policy. With regard to the education matter, we think that is a very, very important part of it. I want to pick up on what Tom has said. The challenge to American foreign policy is not the Osama bin Ladens. We know what we have to do with them. We have to remove them. We have to kill them. We think and we believe that is a very small portion of the Muslim world. The challenge to American foreign policy is the great vast number of Muslims who are sympathetic to Osama bin Laden, who may admire him, but do not support the idea of violence. And that is--if you are going to win the war on terrorism, you have got to prevail, you have got to persuade those people that we offer a better vision and an agenda and an opportunity for them. Now, you work all the time with the foreign aid budget and you know the limitations of that budget, but you also know the importance of it. You cannot solve the problem of these schools in Saudi Arabia and Pakistan in the United States--can't do it. You have money in the foreign aid budget today for Pakistani schools. What is it, 100 million or so? Mrs. Lowey. Out of the 600 million about 30 million is going to education. Mr. Hamilton. It is a drop in the bucket, isn't it? But it does say to these people who are seeking a better life, who want some of the same things you and I seek, that we are on their side and we are trying to help them with their problem; and that is a very important message to convey. Fundamentally, Pakistan has to solve its own education program and so does Saudi Arabia. As Tom said a moment ago, you have to push and prod them in that direction. And we certainly do, and we could maybe encourage them a little bit with a few million dollars here and there, but we cannot solve their problem. But we want to let them know that it is not only in the American national interest that they reform their school systems; it is in their national interest that they do it, and if they don't do it with all of the technology available today to let these people know that their life is pretty miserable, if they don't begin to deal with those problems, they are not going to be in charge. Chairman Cox. The gentleman from Nevada, Mr. Gibbons. Mr. Gibbons. Thank you very much. And gentlemen, thank you very much for your patience with us here today. Your dedication to helping us better understand these issues is greatly appreciated. Thank you for your assistance in helping make America safer. We appreciate that as well. Let me say that over the last 3 weeks as I sat here listening to each of you, I know we have talked about information sharing, the need for information sharing, the management and direction that information sharing should take. We have talked about the overclassification of information, but you do not make a recommendation; in fact, you oppose a recommendation for an internal MI5-style intelligence agency which would look at domestic or U.S. citizens' intelligence. I want to build on that concept, because I think the confluence of understanding your recommendations and our taking action has to understand a better--little bit better, this idea. Because what I see is an agency, the FBI, as needing some reform itself, because we have a construct in the FBI today which says that when we gather intelligence information in FBI, we are focused on prosecution and criminal action cases, rather than on anti terrorism intelligence. Now, the focus on prosecution is highly appropriate for a law enforcement agency, but it is not appropriate for intelligence gathering in a counterterrorism, antiterrorism type environment. Should we, and here is my question and I will leave it to one question--should we divide the FBI into two intelligence-type agencies leaving to it law enforcement for the conviction and prosecution and that construct, and giving it an additional role, a different agency, which is intelligence gathering for antiterrorism? What are your thoughts on that? Mr. Kean. Under the reforms that the director is trying to implement in the FBI, that would in a sense be a division in the FBI, an important division of the FBI, and that would be their job. Their job would be to collect information against terrorist efforts. We on the Commission wrestled with this FBI problem, because the history of the FBI and the culture of FBI is as you so correctly stated. As you know, you break down the door, you make the case and you take somebody to trial and convict them. That is not gathering information for counterterrorism purposes. There is now a large part of the FBI that is starting to be devoted to collecting information for counterterrorism purposes. But it is being done from a very top-down reform by Director Mueller. Our concern on the Commission was that this-- these reforms were based on the work of two or three people at the very top, and if they were to retire, to leave or die or whatever, that the FBI culture would go right back to the way it was. So we think it is very important and this again comes to oversight. I don't think you have to create something different, but you have to systematize these reforms. You have to make sure that the FBI doesn't slide back. The people that go into the intelligence gathering side have to have the same chances at promotion, same chances of salary increases, same chances to get to the top of the FBI as the people under the old J. Edgar Hoover side. If that doesn't happen, then it is not going to work. So we endorsed the director's reforms with the proviso that the Congress in particular look and make sure that these reforms are implemented not only under this director, but with future directors. Because without it, it doesn't work. That was basically the view we came to. Mr. Hamilton. I think the Commission believed that there is a very important synergy between intelligence gathering on the one hand and law enforcement on the other, and you ought not to put a wall between them. The guy out here who is trying to prosecute somebody collects a lot of information. The fellow out here who is doing some surveillance on a prospective terrorist is also collecting a lot of information. And you want to make sure that they are talking to one another and that there is interaction between them and that you not build that wall too solidly. So that is what we are really driving at. Now, when you talked about the FBI collecting all antiterrorist intelligence, you are not talking about the foreign side? Mr. Gibbons. No. Mr. Hamilton. I may have misunderstood. We do think this synergy is very, very important and each benefits from the other in effect. Mr. Gibbons. Thank you. Thank you, Mr. Chairman. Chairman Cox. The gentleman from New Jersey, Mr. Andrews. Mr. Andrews. Thank you, Mr. Chairman. I want to express to Mr. Hamilton the honor of having served with him in this institution, and on behalf of our fellow New Jerseyans, express our pride to Governor Kean and the work you have done here. We are proud of you. One of the most compelling parts of your report is the riveting discussion of those moments on the morning of September 11th when there were still two planes in the sky and there was a muddled and dysfunctional series of communications among decision makers as to what to do about those two planes. And in your report you address that, I think, in two places. One is in Recommendation 26 about incident command systems and the other is in Recommendation 40 about the role of the Northern Command. I want to ask you this question based upon this chilling hypothetical. If we knew right now that someone had hijacked a tanker truck on the New Jersey Turnpike filled with chlorine gas and that the person was headed toward Washington, D.C., on I-95 and that their intention was to blow up that chlorine tanker truck and in fact create a chemical weapon on the Capitol Mall, and we had to make a decision about what to do about that truck right now, who should be in charge of making that decision and what should the chain of command be? Mr. Kean. Under the present system or under the system we-- Mr. Andrews. What does the Commission believe it ought to be? Mr. Hamilton. The question of who is responsible for defending us at home? Mr. Andrews. During an imminent ongoing emergency. Mr. Hamilton. Very tough question. We think there are two answers. One is the Department of Defense, the Northern Command, and the second is the Department of Homeland Security. They both have the responsibility and the authority for defending the country. Now they have to work that out, how that authority is split. I don't know the answer to your question specifically. Mr. Andrews. As my colleague knows, one of the vexing questions here is the doctrine of posse comitatus and how it would play into the answer of this question. I don't want in any way to erode our important tradition of separating the military from the control of civilian life. I think that is one of the key precepts of the country. On the other hand, just because something is taking place on or above our soil does not mean it is a domestic matter. And I think that is one of the key issues we have to grapple with. My own suggestion is that we have to revisit the doctrine of posse comitatus in this terrible new world. We need to do so in a way that doesn't undermine civil liberties, but sorts this question out. To answer my own hypothetical, if a decision were made to take paramilitary action to stop that truck, scramble a helicopter and shoot the driver of the truck, that is a function that I want the Department of Defense to lead and be responsible for. On the other hand, I think it has to be under extremely egregious and emergent circumstances like those on the morning of 9/11. I think one of the most chilling things I read in your report is that the order that was given by President Bush to Vice President Cheney and then passed down the command to--as I understand it, to intercept and shoot planes that were hijacked was not communicated to the pilots in the cockpit; that they received an order that they should identify tail and type of the airplanes, but that is it. That could have been--and I ascribe no fault here, but I blame all of us--that could have been a terrible miscommunication. I am interested in the Commission's thoughts on how to fix it. Mr. Kean. I had exactly the same reaction you did. And there is another part to that story, that the Secret Service had some control of National Guard planes that they sent up, and they had the order to shoot. So the National Guard planes, without getting an order from the President, might have shot these planes that were supposed to have orders from the President to shoot, wouldn't have shot. So we are told in questioning that that command and control problem has been straightened out. We hope it is true, but that was a moment for me, too, when I heard that information. Mr. Andrews. This fall, the GAO will be issuing a report that examines in the war game context whether the problems have been straightened out, and we are anxiously awaiting that report and we would be interested in the Commission's review of it. Mr. Kean. Command and control, that whole day in the fog of war, as the President told us, Air Force One didn't work properly. The President was not--did not have the communicative skills above Air Force One as commander in chief. Now he told us as a commission when we met him that that has been straightened out. We have to be sure of these things. It is too important for the defense of this country that these things cannot occur that way again. Mr. Hamilton. I want to amend. I think I said there are two people who had the responsibility to defend, the Department of Defense and Department of Homeland Security. The Department of Defense would only defend in the event of a military attack, I think. And what you described, the example you gave about the truck on the turnpike, I think probably would not qualify as a military threat. As a practical matter, if something like that happened, we would put every resource we had into it to try to stop it. That would include local sheriffs, National Guard and probably some military components as well. Mr. Andrews. The question is not how we categorize it, but how we stop it. Mr. Hamilton. Mr. Chairman, we are hitting 1:00 and I had kind of planned finishing at 12:15 or 12:30. Chairman Cox. I understand and I want to at this point recognize that we have members on both sides of the aisle who have not yet had the opportunity to put questions, but out of courtesy to both of you, we will adjourn this panel at this time. And we want to thank you very much for the extended period of time that you have spent with us this morning. I know that when Congress reconvenes in 2 weeks that you will be available to continue to work with us on the implementation and further consideration of your recommendations. At this time-- Ms. Jackson-Lee. Mr. Chairman, I have an inquiry, please. This is such a moment in history and time for this committee, and I respect the gentlemen's time and I am always grateful for their work. My request to the chairman, because other members have not had a chance to inquire and other members may have been on other committees, that the gentlemen be asked to come back. This is crucial. We are not acting, we are only hearing and listening. This committee is burdened with the responsibility of doing something. And I would ask respectfully if we could inquire of the gentlemen through the committee and have them come back to the Homeland Security Committee, the very committee you have asked to take up the responsibility singularly of oversight of the Homeland Security Department. And I ask the chairman for a response, and I know the gentlemen may not have their schedules, but looking at the smiling face of the Governor, it looks as if we can work that out. You are cutting us off from doing the questions with respect to the gentlemen's time, and I do respect their time. Mr. Chairman. I yield back to the chairman. Chairman Cox. I know that both the chairman and vice chairman have committed to continue to work with this committee, both formally through the hearing process and informally. As part of the latter, I hope that members who have additional questions will feel free even before Congress reconvenes. And the hearing record will be held open for that purpose. Ms. Jackson-Lee. Will the gentleman extend an invitation to the Chair and Cochair? That is my inquiry and my question, and I think they would be receptive to that invitation. This is a work in progress and it is not complete. Mr. Shays. Would the gentleman yield? It may be if these gentlemen cannot attend that--we had Mr. Lehman and Senator Kerrey come before us and they likewise did an excellent job and I think that is the strength of this Commission. There are other members who could come before us as well. Ms. Jackson-Lee. I would welcome that. I welcome any opportunity for us to pursue the work of the Commission. I think the two Chairs, Cochairs have done an excellent job. I think we should do that. Chairman Cox. Well, I don't wish to speak for our witnesses, but I know that they have on multiple occasions extended their full cooperation to this committee, and I expect they and their staff and other commissioners will continue to do so. We will be seeking that cooperation. It is a vital concern to our Nation. It is a point that I know we are in complete accord on. There being no further questions at this time, I thank you, Mr. Kean and Mr. Hamilton, for your testimony. And at this time you are excused, and I call up our second panel. Members should be advised as we call up the second panel, following the testimony of this panel, questioning will resume with Ms. Granger and Ms. Holmes Norton; and we will proceed, continuing in the order that we have already adopted. Our witnesses on this second panel will include Hon. J. Cofer Black, Counterterrorism Coordinator for the Department of State; Patrick Hughes, Assistant Secretary For Information Analysis for the Department of Homeland Security; John Brennan, Director of the Terrorist Threat Integration Center; and Maureen Baginski, the Executive Assistant Director for Intelligence for the Federal Bureau of Investigation. Some of our witnesses are involved in White House discussions today on the very proposals for restructuring the Intelligence Community that are the subject of this hearing. Members are informed that Mr. Hughes must depart no later than 2:45 p.m. today. Mr. Brennan will be with us until 3:45 p.m. We will do our best to get as much questioning done as we can today before those deadlines. As the witnesses take their seats, I ask members to take their seats. The chairman will recognize first Mr. Black and Mr. Hughes, Mr. Brennan and Ms. Baginski. I think our panel is now all seated. Chairman Cox. Welcome, Ms. Baginski, Mr. Brennan, General Hughes, Mr. Black. Thank you very much for being with us. We look forward to an opportunity to have significant discussion with you. I know that you have offered to forgo your opening statements and go directly into questions. We would like, nonetheless, to have you put a summary of your statement on the record; members, I think, will benefit from that. And we will begin with the Counterterrorism Coordinator for the Department of State, Cofer Black. Mr. Black, your statement, please. STATEMENT OF THE HONORABLE J. COFER BLACK, COORDINATOR, OFFICE OF THE COORDINATOR FOR COUNTERTERRORISM, U.S. DEPARTMENT OF STATE Mr. Black. Mr. Chairman, thank you very much, distinguished members of the committee. Thank you for the opportunity to testify on the recommendations of the 9/11 Commission. I will attempt to summarize my formal, written statement and ask that you include my full testimony in the record. Today's hearing offers a timely opportunity to examine broad recommendations to reorganize the national security institutions of the U.S. Government in order to combat terrorism. I welcome the invitation to contribute to this important debate on how to protect American citizens at home and abroad. Following the September 11 attacks, the administration developed the National Strategy for Combating Terrorism, which outlines the broad policy framework for coordinated actions to prevent terrorist attacks against the United States, its citizens, its interests and its friends around the world. The national strategy is premised on the systematic application of the key elements of national security, diplomacy, financial, law enforcement, military and intelligence and information sharing. Today I would like to address the process in place at the Department of State. The Bureau of Intelligence and Research, or INR, is the Department's liaison to the Intelligence Community at large. My office works closely with INR, with the Bureau of Diplomatic Security's Office of Intelligence and Threat Analysis, to assess the current intelligence information related to terrorist threats overseas and at home. Through these relationships, the State Department has ample opportunities to provide input to the U.S. Government's process for collecting and analyzing intelligence for counterterrorism purposes. Finally, as a participant in the National Security Council's Counterterrorism Security Group, I have frequent interactions with other interagency officials who shape and direct the counterterrorism policies of the U.S. Government. The State Department will play a crucial role in the President's strategy to implement reforms that will make Americans safer at home and abroad. I look forward to the role that the Department and my office will play in this process through the intra--and interdepartmental relationships briefly outlined in my testimony today. Mr. Chairman, with this background and experience in mind, I will conclude my formal testimony. Thank you again for the opportunity to appear before your committee. I will be happy to take questions. Chairman Cox. Thank you. [The statement of Mr. Black follows:] Prepared Statement of the Honorable Cofer Black Chairman Cox, Distinguished Members of the Committee, thank you for the opportunity to testify today on the recommendations of the 9-11 Commission to reorganize the national security institutions of the U.S. Government to better combat terrorism. In light of the testimony you will hear from my co-panelists and other witnesses, I will keep my remarks brief. Following the September 11 attacks, the Administration developed the National Strategy for Combating Terrorism, which outlined the policy framework for coordinated actions to prevent terrorist attacks against the United States, its citizens, its interests, and its friends around the world. Our work to implement the National Strategy will ultimately create an international environment inhospitable to terrorists and all those who support them. We have implemented this strategy to act simultaneously on four fronts: Defeat terrorist organizations of global reach by attacking their sanctuaries, leadership, finances, and command, control and communications; Deny further sponsorship, support, and sanctuary to terrorists by cooperating with other states to take action against these international threats; Diminish the underlying conditions that terrorists seek to exploit by enlisting the international community to focus its efforts and resources on the areas most at risk; and Defend the United States, its citizens, and interests at home and abroad. Today's hearing offers an opportunity to examine the 9-11 Commission's recommendations on information and intelligence sharing. I welcome the invitation to contribute to this important national debate on how better to protect American citizens at home and abroad. The National Strategy for Combating Terrorism is premised on five key elements of national security--diplomatic, financial, law enforcement, military, and, as we will discuss today, intelligence and information sharing. Intelligence Analysis and Information Sharing When discussing ways to improve information and intelligence sharing for counterterrorism, it is important to consider the foundation upon which we must build, in this case, the elements of intelligence analysis in place at the Department of State. The Department's Bureau of Intelligence and Research (INR) is one of the 15 members of the U.S. Intelligence Community. My colleagues in INR share my opinion that we need to do much more to make it easy, not just possible, to share information across agencies, with state and local officials and with our foreign allies. This is especially important to the State Department because widespread, timely, and routine information sharing facilitates decentralized and competitive intelligence analysis crucial to our mission. My office also works closely with the Bureau of Diplomatic Security Office of Intelligence and Threat Analysis (DS/ITA), which focuses specifically on threats against U.S. interests, to assess the current intelligence information on terrorist threats overseas and at home. We also agree with the 9-11 Commission's recommendation to move from a system based on ``need-to-know'' to one based ``need-to-share,'' consistent, of course, with the 9-11 Commission's recommendation to ``safeguard the privacy of individuals about whom information is shared.'' Mechanisms for separating content from source information could help with classification levels. This is already accomplished to a certain extent with tear lines. Web-based systems will undeniably be part of the solution, given the ubiquitous nature of this technology. By following the progression of technology advances in the open market, information sharing can be made technologically easier and less cumbersome. The Counterterrorism Security Group Intelligence sharing within the Department and with other agencies was a reality before September 11, but it has since improved. Deepening our intelligence sharing through personnel liaison, we have provided the Terrorist Threat Integration Center (TTIC), among others, with State Department detailees, and we host detailees from the CIA and other agencies as well. In addition to the intelligence analysis work of INR and DS/ITA, S/CT and the Assistant Secretary for the Bureau of Diplomatic Security participate in the Counterterrorism Security Group (CSG). The CSG is chaired by the National Security Council and serves to share information and coordinate the response to terrorist threats against U.S. interests domestically and abroad. Each morning we join the NSC-chaired meeting of high-level representatives from the Homeland Security Council, the Departments of Defense, Justice, Treasury, and Homeland Security, the CIA, FBI, and TTIC. A staff-level meeting of CSG participants is conducted every afternoon. Within the CSG structure, the Department has frequent and direct interactions with the other senior interagency officials who shape and direct the counterterrorism policies of the U.S. Government. Through these relationships, we have ample opportunity to provide input to the U.S. Government process for collecting and analyzing intelligence for counterterrorism purposes. The quality of information exchange and effectiveness has improved significantly since 9/11 partly because the CSG mechanism promotes proper coordination among agencies regarding terrorist threats globally on a daily basis. Other Department Contributions to Information Sharing Since 9/11, the Department of State's Bureau of Consular Affairs has worked with other agencies to make significant improvements to our ability to share information. Thanks to this new level of collaboration, the data holdings in the Department's consular lookout system now total almost 18 million records on people potentially ineligible to receive visas, nearly triple what we had prior to September 11. We now have more than eight million records from the FBI alone in our system. In fact, the majority of the data in the consular lookout system now derives from other agencies, especially those in the law enforcement and intelligence communities. Information sharing, of course, must be mutual. The Department now provides access to 75 million visa records in our consular database so that Department of Homeland Security officers at ports of entry can view the electronic files of every passenger with a visa entering the United States. This database permits detailed examination of the information in near-real time for all visas issued, including the photographs of nonimmigrant visa applicants. We are also sharing our consular database with the National Targeting Center, a 24/ 7 operation of Customs and Border Protection in DHS. The Department of State joined in the establishment of the Terrorist Screening Center (TSC), which integrates terrorist watchlists and serves as the centralized point of contact for everyone from the U.S. police officer on the beat to the consular officer in the farthest reaches of the globe. Together with TTIC, which maintains the principal database on known and suspected international terrorists in a highly classified form, we rely on the TSC to ensure that consular officers have access to the information they need to scrutinize applications and deny visas to those who would do us harm. These institutions rest on a foundation that the Department laid in the form of TIPOFF, a pioneering system in the use of classified information for screening purposes. Much of the cost of developing and operating TIPOFF was funded through the Border Security Program, which the Bureau of Consular Affairs manages for the Department. The TIPOFF database with its approximately 120,000 records, more than double the amount since September 11, is now housed at TTIC. TTIC and TSC together eliminate the stovepiping of terrorist data and provide a more systematic approach to posting lookouts on potential and known terrorists. Conclusion The President indicated in his speech on August 2nd support for the key recommendations of the 9-11 Commission, including the establishment of a National Intelligence Director and a National Counterterrorism Center. The Department of State will play a crucial role in the President's plan to implement reforms that will make Americans safer at home and abroad. I personally look forward to the role that the Department and my office will play in this process, through the intra- and interdepartmental relationships briefly outlined in my testimony today. With this background and experience in mind, I will conclude my formal testimony. Thank you again for the opportunity to appear before the Committee. I would be happy to take your questions. Chairman Cox. General Hughes. STATEMENT OF LIEUTENANT GENERAL PATRICK M. HUGHES, USA, RET., ASSISTANT SECRETARY FOR INFORMATION ANALYSIS, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Hughes. Good day, Mr. Chairman and members of the committee. It is a privilege to appear before you today as I have in the past. And today, I would like to just give you a short version of my views. We are very supportive of efforts to improve and enhance the Intelligence Community that are ongoing in the aftermath of the 9/11 Commission's report and recommendations. Today's hearing, I think, is in the context of information sharing and improvements; and in that category, the glue that links and holds our national intelligence and counterterrorist activities together is indeed the professional exchange of information that empowers knowledge and action, often referred to as ``information sharing,'' but we would like to include the idea of ``collaboration'' in the construct. We are supporting making information readily available rapidly to all who need it to accomplish their mission, while at the same time facilitating interaction to better understand and use the knowledge that collaboration produces while always protecting sources and methods. It is a very simple philosophical underpinning; and I think I will give the rest of my time back to you, sir, and say I am willing to answer any questions you have today. Chairman Cox. Thank you. [The statement of General Hughes follows:] Prepared Statement of Patrick M. Hughes Good morning Chairman Cox and distinguished members of the Committee. I am privileged to appear before you today to discuss the role of the Office of Information Analysis (IA), within the Information Analysis and Infrastructure Protection Directorate (IAIP) of the Department of Homeland Security (DHS), as well as IA's intelligence, coordination, and information sharing efforts to date. September 11, 2001 forever transformed our nation. In one moment, we came face to face with a known enemy. . .on American soil. . .and a changed condition threatening to our way of life. This day seared images of devastating loss and destruction into our national consciousness, images that we--I--will never forget. I was present at the Pentagon minutes after the plane struck and I saw once again something I have become all too familiar with over the years. . .the violent outcome of a terrorist attack against unwarned unprotected people. The anguish and fear of the moment was written on the faces of many of my colleagues who never dreamed that their place of work in a bastion of Democracy would be struck. Our co-workers, soldiers all, lay in the wreckage. The damage was done. However, on that day, something far greater than fear and something much stronger than despair took root. An unshakeable faith in our fellow citizens, in our ideals, in our nation and an unwavering determination to protect and preserve what we stand for as a country emerged from the destruction, to guide our efforts in the fight against terrorism and the quest to preserve liberty. I am at my place of work at the Department of Homeland Security because of that motivating set of beliefs. In the aftermath of 9/11, the Department of Homeland Security was envisioned, formed, and is now in operation. Standing up the Department, the largest reorganization of government in fifty years, has been a great undertaking. Many employees of DHS have assumed new responsibilities, and all have put in long hours to ensure that while our strategies may change to meet the terrorist threat, our course as a nation will remain constant. President Bush's decision to establish the Department has enabled us to unify our resources into one team, to ready ourselves against our enemy, and to ensure the highest level of protection for our country and the citizens we serve. I became a direct part of this Department's effort when I became the Assistant Secretary for Information Analysis, part of the Information Analysis and Infrastructure Protection Directorate, on 17 November 2003. Through the Homeland Security Act of 2002, IAIP is charged with integrating relevant information, intelligence analyses, and vulnerability assessments (whether such information, analyses, or assessments are provided or produced by the Department or others) to identify protective priorities and support protective measures by the Department, by other executive agencies, by State and local government personnel, agencies, and authorities, by the private sector, and by other entities. The philosophical underpinning of IA as an integral part of the IAIP Under-Secretariat of DHS is to provide the connectivity, the integration, the communication, the coordination, the collaboration, and the professional intelligence work necessary to accomplish the missions of, and the products and capability necessary for the customers and the leadership of DHS. Simply put, we perform the intelligence and threat analysis of Department of Homeland Security. IAIP is moving forward in carrying out our statutory responsibilities which include: Providing the full range of intelligence support to senior DHS leadership and component organizations and to state and local and private sector respondents Mapping terrorist threats to the homeland against assessed vulnerabilities to drive our efforts to protect against terrorist attacks Conducting independent analysis and assessments of terrorist threats through competitive analysis, tailored analysis, and an analytical red cell Assessing the vulnerabilities of key resources and critical infrastructure of the United States Merging the relevant analyses and vulnerability assessments to identify priorities for protective and support measures by the Department, other government agencies, and the private sector Partnering with the intelligence community, TTIC, TSC, law enforcement agencies, state and local partners, and the private sector, as well as DHS' components to manage the collection and processing of information within DHS involving threats to the Homeland into usable, comprehensive, and actionable information Disseminating time sensitive warnings, alerts and advisories to federal, state, local governments and private sector infrastructure owners and operators It is the mandate to independently analyze, coordinate, and disseminate information affecting the homeland that makes IA unique among its Intelligence Community partners. The analysts within Information Analysis are talented individuals who draw on intelligence from other components within DHS, IA's fellow Intelligence Community members, the Terrorist Threat Integration Center (TTIC), and federal, state and local law enforcement and private sector entities. The analysis produced is coordinated with the vulnerability assessment and consequence predictions identified by the Infrastructure Protection half of the IAIP Directorate. The Office of Information Analysis communicates timely and valuable threat products to state and local officials, federal sector specific agencies (as indicated in Homeland Security Presidential Directive-7, ``Critical Infrastructure Identification, Prioritization, and Protection''), and the private sector as is appropriate. The relationship IA and indeed the entire Department of Homeland Security has with these contacts results in the IAIP Directorate being in the position to effectively manage information requirements from the state and local governments and private sector entities that are vital to protecting the homeland. DHS will continue to work in close communication with these officials, as well as with the other organizations it receives inputs from, to maintain the effective relationships that have been established. IA is the heart of the intelligence effort at DHS. It is responsible for accessing and analyzing the entire array of intelligence relating to threats against the homeland, and making that information useful to first responders, state and local governments, and private sector officials. As such, IA provides the full-range of intelligence support to the Secretary, DHS leadership, the Undersecretary for IAIP, and DHS components. Additionally, IA ensures that the best intelligence information informs the administration of the Homeland Security Advisory System. Central to the success of the DHS mission is the close working relationship among components, the Office of Information Analysis and the Office of Infrastructure Protection (``IP''), and the Homeland Security Operations Center (HSOC), to ensure that threat information and situational awareness are correlated with critical infrastructure vulnerabilities and protective programs. Together, the three offices provide real time monitoring of threat information and critical infrastructure to support the Department of Homeland Security's overall mission. This permits us to immediately respond to and monitor emerging potential threat information and events, and to take issues or information for more detailed analysis and recommendations for preventive and protective measures. The integration of information access and analysis on the one hand, and vulnerabilities analysis and protective measures on the other, is the fundamental mission of the IAIP Directorate. IA and TTIC The close professional associations that have been forged between the two offices will allow both organizations to work on complimenting each other in the best interest of the nation's security. For example, IA is responsible for translating the analysis done at the TTIC into actionable data for State, territorial, tribal, local, and private sector officials responsible for homeland security. From a personal standpoint, I believe both organizations are fulfilling their missions and enriching both each other and the wider Intelligence Community. My relationship with TTIC Director John Brennan could not be better. At present, we talk at least daily and as specific threats pertinent to the homeland arise. This opinion is backed by the tremendous track record of success TTIC has in supporting the Department of Homeland Security and its needs. As partners, IA and TTIC spend much time communicating, both through the DHS representatives located at TTIC and through direct communication of leadership. IA and TSC The Office of Information Analysis has a similarly productive relationship with the Terrorist Screening Center. While both perform duties that result in information being passed to local first responders and State, territorial, tribal, and local officials, both entities have separate missions. IA provides the full spectrum of information support necessary for the operation of the Department of Homeland Security and for the benefit of Federal, State, territorial, tribal, local, and private sector officials throughout the United States, to secure the homeland, defend the citizenry and protect our critical infrastructure. In contrast, the TSC is in the process of developing a fully interoperable watch list database which will provide immediate responses to border-screening and law-enforcement authorities to identify suspected terrorists trying to enter or operate within the United States. Just as TTIC plays a vital role in supplying its federal partners with the broad threat picture, the TSC has quickly become an essential resource for local law enforcement, its federal government contributors, and other users. Through the matching and cross- referencing of lists, the TSC is allowing those personnel on the front lines of the fight against terrorism to access the information they need to identify and detain suspicious individuals. DHS, IAIP, and especially IA will continue to work with the TSC to coordinate information sharing efforts and to establish requirements for accessing information. IA and the TSC will grow together in their effort to serve the people and guardians of this nation. Improving Information Sharing and Collaboration While existing relationships are gaining momentum every day, we must assure that we formalize a process which will improve information sharing and collaboration. The Department is charged with this responsibility by law and by Executive Order. Our goal is to effectively, efficiently, and synergistically pass and receive information in all of its forms for the benefit of the United States Government, our State, tribal, territorial, local, and private sector partners, and other DHS entities. In order to achieve this goal we must develop technical and procedural transparency and interoperability in mind to the greatest extent possible. However, the most significant impediments to information sharing are not technological, they are legal and cultural. We needed to start with the ``business case'' and work toward a common, integrated, and rational vision for the Department. That is precisely what we are doing. Information sharing involves working with the Department of Justice (DOJ), Federal Bureau of Investigation (FBI), and Department of Defense (DOD), the Central Intelligence Agency (CIA), the State Department and others. For instance, as part of this effort, the DOJ and DHS information sharing staffs are working hard to bring the Homeland Security Information Network (HSIN), Law Enforcement Online (LEO), and the Regional Information Sharing System (RISSNET) together with the goal of making the systems more compatible as quickly as possible. As we rely on existing systems, we recognize the significant work needed ahead to achieve compatibility and interoperability to meet the challenges faced by DHS. In Conclusion The Office of Information Analysis' unique position, roles and efforts have lead to many challenges. However, the work is not done. These challenges now lead us to the next logical step in protecting the nation, its people, and its infrastructure. Following careful review of the 9/11 Commission report, President Bush announced his support for the creation of National Intelligence Director (NID) and the establishment of the National Counterterrorism Center (NCTC). We at the Department of Homeland Security look forward to continuing to work with the Congress to take these important steps in preventing terrorist attacks against the United States. The Department of Homeland Security is a prime example of how changes have already been made to the Intelligence Community and the counterterrorism community as they existed before September 11th, 2001. The creation of the NID and NCTC will enhance DHS' ability to better identify threats and map those threats against vulnerabilities. However, these are not the only recommendations the Commission made. The Commission also recommended continued improvements in information sharing among agencies involved in national security. DHS, especially the IAIP Directorate, plays a central role in this effort as we continue the work of communicating both with our partners in the federal government as well as with the State, territorial, tribal, local, and private sector officials charged with protecting the people and infrastructure of this country. Building up the IA office, increasing our information capabilities, and coordinating information sharing across the entire federal government are monumental tasks. And, while we have accomplished much in a short period of time, we continue to press forward to strengthen this vital office and our ability to support the overall DHS mission of securing our homeland. In order for the Office of Information Analysis to accomplish its unique mission, we need the right organizational structure, qualified and cleared personnel, resources, and technical capabilities. We are working hard to coordinate and integrate the intelligence and information necessary to protect our people and our critical infrastructure. Yet, we still have much work to do. We have made tremendous progress and the dedication and devotion to duty of those who do the work of intelligence at DHS is unparalleled. We are meeting threats to the homeland with determination and dedication to lead this nation to a higher level of protection every single day. The sheer depth and breadth of our country means that one slip, one gap, one vengeful person, can threaten the lives of our citizens at any time, in any number of ways. There are no guarantees, but I firmly believe the American people are more secure and better prepared than before September 11th 2001, directly because of the Department of Homeland Security. A brief note about the threat: it is real. Terrorists are at work around the world and when they succeed it seems our best efforts in intelligence, security, defense and protective measures have somehow failed, despite the many successes we have against terrorists. We continue to receive substantial information concerning terrorist intent to strike us again in our homeland. As we approach the period of our national political process and the many associated events, it is my view that we are entering a period of significant risk, perceived by those who would strike us as an opportunity to tear our societal and cultural fabric. We cannot relax, we cannot falter, we cannot live in fear. Instead, we who do the work of intelligence and law enforcement must persevere and provide insight and knowledge to those who lead and decide. We have accomplished much in IA since our inception and we are on course with our partners and colleagues to continue to achieve. We are fully connected to the U.S. Intelligence Community and well informed. We are integrated into the workings of the domestic security structure. We are connected with law enforcement. We have working analysts poring over the detail of intelligence and law enforcement reporting to discover the hidden patterns and concealed threads of terrorist activity and the manifestation of other threats to America from crime with national security implications and from other disasters and threatening conditions that come our way. We have a sense of purpose and we have embarked on what has likely never been done before with regard to information fusion. . .to fully understand the threat and the conditions extant in the ``new normal'' United States context that we see now and in the future. The 9-11 attacks, the December 2003-- February 2004 period of heightened concern, the recent attack in Madrid and potential but largely interdicted attacks elsewhere, and the fact of anthrax and ricin attacks here in the United States, combine to form this ``new normal'' condition of constant possibility that we cannot ignore. At the same time we are--I am--most mindful of the need to protect the civil liberties and personal privacy of our citizens and to preserve and defend our Constitution and our way of life. In the end, we are--I am--focused on defeating the terrorists before they can strike. That is why we exist. Chairman Cox and Members of the Committee, this concludes my prepared statement. I would be happy to answer any questions you may have at this time. Chairman Cox. Mr. Brennan. STATEMENT OF JOHN O. BRENNAN, DIRECTOR, TERRORIST THREAT INTEGRATION CENTER Mr. Brennan. Good afternoon, Mr. Chairman and members of the committee. It is a pleasure to appear before you today to talk about information sharing and homeland security. And I would like to offer just a few brief ideas, as well as lessons learned from the TTIC experience on information sharing. In order to minimize the potential for dangerous seams and coverage as well as to optimize the use of finite resources, we must continue building and implementing a national framework for the origination, analysis and dissemination of terrorism information by the U.S. Government. The delineation of such responsibilities must be as unambiguous and as straightforward as possible to ensure we continue building an agreed-upon information sharing architecture, both horizontal and vertical, that is based on a clear understanding of who is responsible for what. Such an architecture must include an overall Intelligence Community business model framework to ensure comprehensive, robust and as appropriate, alternative terrorism capability; a national information sharing framework based on increased clarity of mission roles and responsibilities, including an understanding of the information needs of the Federal Government, State and local officials and law enforcement and the private sector; an overall blueprint for information technology systems, including strategic prioritization, implementation schedules and sunset requirements for legacy systems that impede interoperability; community-wide standards for reporting formats, dissemination requirements, interoperable hardware and software; and role-based data access. There are important lessons in the establishment of TTIC. Assignees to TTIC retain authorities to home organizations, which allows TTIC to access more information than in any single government department or agency. Now, a key TTIC objective has been to develop an integrated information technology architecture so its sophisticated analytic tools and search capabilities can be applied against the many terabytes of data available to the Federal Government. We must be able to cross-check these different data sets which are collected by departments and agencies statutorily authorized to do so. Our approach for this is called the Sanctum architecture, which will allow analysts to conduct simultaneous and federated searches against data sets resident on separate networks. By the end of this month, we will be able to conduct federated simultaneous searches against the data contained in six separate networks, and other networks will be added throughout the year. An additional challenge is dealing with disparate information technology systems and nonstandardized information technology practices, processes and procedures, including a plethora of legacy information systems and networks that impede interoperability. This is not to say that there should be a single integrated database of all terrorism information in the U.S. Government. However, overall guidelines for U.S. Government information technology systems and enforced community-wide standards regarding metadata tagging, security practices and procedures would go a long way toward implementing an overall national framework that promotes interoperability and information sharing. And I look forward to taking your questions. [The statement of Mr. Brennan follows:] Prepared Statement John O. Brennan Good afternoon, Chairman Cox, Ranking Member Turner, and the Members of the House Select Committee on Homeland Security. I appreciate the opportunity to join my colleagues from the Departments of State and Homeland Security, and the Federal Bureau of Investigation, to discuss progress made, lessons learned, and areas that might be strengthened regarding information sharing and associated activities to protect U.S. interests at home and abroad from the terrorist threat. Significant progress has been made on information sharing throughout the Federal government and beyond since the tragic events of September 11, 2001. The implementation of streamlined processes and procedures, enhanced partnerships bridging organizational boundaries, and the deployment of new technologies have enabled the integration and dissemination of information on terrorist threats to U.S. interests at home and abroad in a more timely and comprehensive manner than ever before. Likewise, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) are expediting the provision of terrorist threat-related and associated information to state and local government officials, the private sector, and law enforcement entities. As we collectively continue efforts to improve information sharing, as well as move toward implementing recommendations made by the 9/11 Commission, I offer some core concepts as well as lessons learned based on the experience establishing the multi-agency joint venture known as the Terrorist Threat Integration Center (TTIC). It is my personal opinion that in order to minimize the potential for dangerous seams in coverage as well as to optimize the use of finite analytic resources, we must continue building and implementing a national framework for terrorism analytic responsibility in the U.S. Government. The delineation of substantive responsibilities for terrorism analysis among the various members of the Intelligence Community must be as unambiguous and as straightforward as possible, while still allowing alternative views to be heard. An unambiguous delineation of roles and responsibilities is critical to ensure that we continue building an information-sharing architecture--both horizontal and vertical--that is based on a clear understanding of who has responsibility for analytic ``output.'' With well-defined responsibilities, we will have a system that identifies ``who'' is responsible for providing ``what'' to ``whom.'' We must continue progress already made in clarifying roles and responsibilities and the building of an information-sharing architecture, with particular emphasis on establishing: An overall Intelligence Community business model framework to ensure comprehensive, robust, and, as appropriate, redundant terrorism analysis capability. A national information-sharing framework based on increased clarity of mission roles and responsibilities, with a common understanding of the information requirements of individual U.S. Government components and beyond. This information-sharing framework should extend beyond the Intelligence Community and where appropriate, include linkages to state and local officials and law enforcement; commercial industry; foreign entities; and other non-traditional partners. An overall blueprint for information technology systems, including strategic prioritization, implementation schedules, as well as establishment of a ``sunset'' list for legacy systems that impede interoperability. Community-wide standards for reporting formats, dissemination requirements, and interoperable hardware and software, with an information technology architecture for role- based data access. There are some relevant lessons from the establishment of TTIC. Assignees to TTIC carry the authorities of their home organizations with them, such that in TTIC there is the ability to access more information than in any single independent agency or department. In fact, TTIC has direct access connectivity with 26 separate U.S. Government networks, enabling access to terrorism-related information systems and databases spanning the intelligence, law enforcement, homeland security, diplomatic, and military communities. This unprecedented information access allows for a more comprehensive understanding of terrorist threats to U.S. interests at home and abroad and, most importantly, enables the provision of this information and related analysis to those responsible for detecting, disrupting, deterring, and defending against terrorist attacks. A key TTIC objective is to develop an integrated information technology architecture so that sophisticated analytic tools and federated search capabilities can be applied to the many terabytes of data available to the Federal Government. We must be able to cross check these different data sets, which are collected by departments and agencies statutorily authorized to do so, in a manner that allows us to identify terrorists and their supporters before they reach our shores or when they emerge within our midst. Simply put, we need to create new knowledge from existing information currently resident in a distributed architecture. We must also implement the appropriate controls to ensure security and privacy of information. Progress has been made toward this end. Our approach, called the ``Sanctum Architecture,'' is expected to reach initial operating capability later this month, allowing analysts to search against data sets resident on 6 separate networks. Over time, the goal for the Sanctum architecture is to expand this capability to enable federated searches across multiple data sets--in other words, one query against the holdings of multiple systems and databases on multiple networks. An additional challenge is that of disparate information technology systems and non-standardized information technology practices, processes, and procedures, including a plethora of legacy information systems and networks that impede interoperability. This is not to say that there should be a single, integrated database of all terrorism information in the U.S. Government. However, overall guidelines for U.S. Government information technology systems and enforced community- wide standards (metadata tagging, security practices and procedures, etc) would go a long way toward implementing an overall national framework that promotes interoperability and information sharing. In conclusion, as we move forward with information sharing initiatives as well as address the broader issues associated with intelligence reform, integration of effort should serve as an important organizing principle. In particular, we need to enhance orchestration of the broad array of counterterrorism activities across the U.S. Government and beyond. In this regard, I support the concept of establishing a National Counterterrorism Center to orchestrate and integrate, as appropriate, the myriad of activities working to protect U.S. interests at home and abroad from the scourge of international terrorism. We all have a shared responsibility to continue implementing a new information sharing paradigm and an overall national counterterrorism system that maximizes the security and safety of all Americans, wherever they live or work. I look forward to continue working with my colleagues here today and with the Members of this committee toward this end. Chairman Cox. Ms. Baginski, I should note for members, the title Executive Assistant Director refers to the Bureau and you are in fact the Director of the Office of Intelligence. STATEMENT OF MAUREEN BAGINSKI, EXECUTIVE ASSISTANT DIRECTOR FOR INTELLIGENCE, FEDERAL BUREAU OF INVESTIGATION Ms. Baginski. Thank you very much. It is a pleasure to appear before you and I will make my remarks brief. We applaud--at the FBI we applaud the work of the 9/11 Commission. We are grateful for their fine work. We are pleased they have embraced our reforms to date, and we agree with them wholeheartedly that we have additional work to do. The adversary we face today is networked and enabled by information technology that allows it to have a shared view of the objective, a clear understanding of roles and responsibilities in carrying out the objective and very tight decision loops in taking action. To defeat this adversary, we, the intelligence and homeland security communities, have to look just like it. Each of us sitting here at this table represents a node on the Federal network. Our job is to interoperate with each other, but also ensure that we can interoperate with other information networks, particularly those at the State and local and tribal level, who will be the first to encounter threats and the first called upon to defend against them. At the FBI, we define intelligence very simply. We call intelligence vital information about those who would do us harm; and we see the only true measure of intelligence, good intelligence, is whether or not it helps someone make a better decision. The decision makers who have to defend our Nation are varied indeed, and they range from the President to the patrolman. So our first commitment on the intelligence side is to invest very substantial resources in understanding the decisions that have to be made and ensuring that we provide the proper information to do that. Over 2 years ago, Director Mueller recognized this and appointed an Assistant Director of the FBI for Law Enforcement Coordination. That Assistant Director is sitting behind me, Mr. Louis Quijas, who comes to us from High Point, North Carolina, where he was a police chief, and before that, the Kansas City chief. Everything we have done since 9/11 in the FBI and across the Federal, State, local and tribal governments has been designed to create this information network, and it has been an evolutionary process. We began, I think, immediately after 9/11 with bringing foreign and domestic intelligence about the terrorist threat together in the Oval Office in the President's briefings. That evolved into the creation of a TTIC where we institutionalized the bringing together of information around the threat. And we brought together intelligence and operations in the counterterrorism strategy security group headed by the National Security Council. We stood up the Department of Homeland Security designed to really overlay those threats, over our critical infrastructure, and to ensure that we were protected. And the reforms that the President has announced, the ones he has accepted from the creation of the National Counterterrorism Center and the creation of a National Intelligence Director are embraced as logical next steps. There is great parallel to that progression in the course we have taken with intelligence at the FBI, a very evolutionary path, beginning immediately after the events of 9/11 and standing up a very robust intelligence capability within our counterterrorism directorate focused basically on raw intelligence production and finished analysis; and then gradually, over a 3-year period, migrating to the creation of an enterprise-wide intelligence program led by an Executive Assistant Director. And I was pleased and honored to join the FBI in that position in May of 2003. Our intelligence program is actually built on four key principles. We want an independent collection and requirements management system. What we can do and what we can collect should not be driving what we collect. What we must collect should be driving what we need to know and have to know to defend the country has to be defining it. So that process is managed in my office. Another core principle is centralized management of intelligence. The power of the FBI intelligence process is in its distribution geographically in its 56 field offices, 400 resident agencies and worldwide legal attache offices. My trick is to ensure that that process is managed against common threats, but not micromanaged from headquarters so we unleash the power that is out in the field. The third principle is focused strategic analysis. If all of our attention is on current reporting, then we are failing to devote the resources we need to step back from the threat so that we understand what we don't know and need to know, to put all of that information so we can make better decisions. And finally: the core principle of integration of intelligence with law enforcement operations. Those are our four principles. I am the FBI official responsible for information sharing. So if there are problems with information sharing and information policy, you are looking at the person who has to put in place the proper policies to do that. I come before you today to tell you we have made a very good step and we have more work to do. So that there is no confusion for you, it is my responsibility both within the FBI and outside of the FBI to ensure that the proper information is delivered to key decision makers, and with the timeliness they need it and at the classification level that they need it. In the interest of brevity, I want to share with you some of the key accomplishments we have made, because they are substantial and they are a good start, but they are not yet enough. First, we have issued our first-ever FBI intelligence requirements and collection tasking documents. These requirements are completely lined up with the national intelligence priorities framework and emanate from it. We have, in addition, issued an unclassified version for our partners in State, local and tribal law enforcement who continue to ask me, we will give you whatever it is you want: just tell us what it is you need from us. We have become full members of the DCI's National Intelligence Collection Board and National Intelligence Analysis and Production Board, and we are participating in the drafting of national intelligence estimates. We have created a collection capabilities database that tells us what sources we have and could bring to bear on all threats facing the Nation. Most importantly, this database allows us to identify where we have critical gaps and need to develop new sources. I chair a daily intelligence board every day to ensure that critical decisions are made about information sharing and that cross-programmatic analysis is done so all information is brought to bear on threats. We completed our first-ever FBI dissemination manual. It is based on the principle ``right to release'' and requires a new classification requirement, ``required to release.'' We write to the lowest classification. We separate sources from methods. And we have just developed a Web-based intelligence authoring tool that requires the author to write their first version at the lowest classification level. We have set unified standards and policies for training intelligence analysts. We are in the process of changing the critical performance criteria for agents to include emphasis on source development and production of intelligence. We have tripled our raw intelligence production this year and doubled our production of Presidential assessments--of intelligence assessments. I want to tell you the final thing we have done is to develop metrics to tell you, ourselves and others whether these changes are making any difference. And with that, I will be happy to take any of your questions. [The statement of Ms. Baginski follows:] Prepared Statement of Maureen A. Baginski Introduction Good afternoon, Mr. Chairman and Members of the Committee. It is my pleasure to come before you today to discuss the recommendations of the 9-11 Commission, specifically information sharing issues that face the Federal Bureau of Investigation and other members of the Intelligence and Law Enforcement communities. As Director Mueller has said, the FBI has worked closely with the Commission and their staff throughout their tenure and we commend them for an extraordinary effort. Throughout this process, we have approached the Commission's inquiry as an opportunity to gain further input from outside experts. We took their critiques seriously, adapted our ongoing reform efforts, and have already taken substantial steps to address their remaining concerns. We are gratified and encouraged that the Commission has embraced our vision for change and has recognized the progress that the men and women of the FBI have made to implement that vision. Our work to date has been on strengthening FBI capabilities so that we can be a strong node on the information network of those who defend the nation. Vital information about those who would do us harm is not produced by the federal government alone. We are proud to also be part of an 800,000 strong state, local, and tribal law enforcement community who are the first to encounter and defend against threats. On August 2nd, the President announced his intention to establish a National Intelligence Director (NID) and a National Counter Terrorism Center (NCTC). We look forward to working with you on these vital reforms. Our core guiding principle at the FBI is that intelligence and law enforcement operations must be integrated. Under the direction of Director Mueller, the FBI has moved aggressively forward in this regard by implementing a comprehensive plan that has fundamentally transformed the FBI. Director Mueller has overhauled our counterterrorism operations, expanded our intelligence capabilities, modernized our business practices and technology, and improved coordination with our partners. A prerequisite for any operational coordination is the full and free exchange of information. Without procedures and mechanisms that allow information sharing on a regular and timely basis, we and our partners cannot expect to align our operational efforts to best accomplish our shared mission. Accordingly, we have taken steps to establish unified FBI-wide policies for sharing information and intelligence both within the FBI and outside it. This has occurred under the umbrella of the FBI's Intelligence Program, and is my personal responsibility as the FBI executive for information sharing. We have made great progress and we have much work ahead of us. Intelligence Program The mission of the FBI's Intelligence Program is to optimally position the FBI to meet current and emerging national security and criminal threats by (1) aiming core investigative work proactively against threats to US interests, (2) building and sustaining enterprise-wide intelligence policies and human and technical capabilities, and (3) providing useful, appropriate, and timely information and analysis to the national security, homeland security, and law enforcement communities. Building on already strong FBI intelligence capabilities, Director Mueller created in January 2003 the position of Executive Assistant Director (EAD) of Intelligence and an Office of Intelligence. I was honored to join the FBI in May 2003 as the first EAD Intelligence. Core Principles We built the FBI Intelligence Program on the following core principles: Independent Requirements and Collection Management: While intelligence collection, operations, analysis, and reporting are integrated at headquarters divisions and in the field, the Office of Intelligence manages the requirements and collection management process. This ensures that we focus intelligence collection and production on priority intelligence requirements and on filling key gaps in our knowledge. Centralized Management and Distributed Execution: The power of the FBI intelligence capability is in its 56 field offices, 400 resident agencies and 56 legal attache offices around the world. The Office of Intelligence must provide those entities with sufficient guidance to drive intelligence production effectively and efficiently, but not micro-manage field intelligence operations. Focused Strategic Analysis: The Office of Intelligence sets strategic analysis priorities and ensures they are carried out both at headquarters and in the field. This is accomplished through a daily production meeting that I chair. Integration of Analysis with Operations: Intelligence analysis is best when collectors and analysts work side-by-side in integrated operations. Concept of Operations Concepts of Operations (CONOPs) guide FBI intelligence processes and detailed implementation plans drive specific actions to implement them. Our CONOPs cover the following core functions: Intelligence Requirements and Collection Management; Intelligence Assessment Process; Human Talent for Intelligence Production; Field Office Intelligence Operation; Intelligence Production and Use; Information Sharing; Community Support; Threat Forecasting and Operational Requirements; and Budget Formulation for Intelligence. Accomplishments What follows are some of our key accomplishments: We have issued the first-ever FBI requirements and collection tasking documents. These documents are fully aligned with the DCI's National Intelligence Priorities Framework and we have published unclassified versions for our partners in state, local, and tribal law enforcement. We are full members of the National Intelligence Collection Board and the National Intelligence Analysis and Production Board, and soon will be participating in the drafting of National Intelligence Estimates and the National Foreign Intelligence Board. We have created a collection capabilities database that tells us what sources we can bring to bear on intelligence issues across the FBI. We have created FBI homepages on INTELINK, SIPRNET, and Law Enforcement Online (LEO) for dissemination and evaluation of our intelligence product. We have established a daily Intelligence Production Board to ensure that timely decisions are made regarding the production and dissemination of all analytical products. The Board reviews the significant threats, developments, and issues emerging in each investigative priority area, and identifies topics for intelligence products. We have completed the first-ever FBI intelligence dissemination manual. We have proposed and are building an Intelligence Officer certification program for Agents, Analysts, Surveillance Specialists and Language Analysts. Once established this certification will be a pre-requisite for advancement to Section Chief or Assistant Special Agent in Charge, thus ensuring that all FBI senior managers will be fully trained and experienced intelligence officers. We have completed and begun to implement the CONOPs for Intelligence Analysts. We have set unified standards, policies, and training for intelligence analysts. In a new recruiting program veteran analysts are attending events at colleges and universities throughout the country and we are offering hiring bonuses to analysts for the first time in FBI history. We are in the process of changing the criteria on which Agents are evaluated to place more emphasis on intelligence-related function. We are on course to triple our intelligence production this year. We have placed reports officers in our Joint Terrorism Task Forces (JTTFs) to ensure vital information is flowing to those who need it. We have developed detailed metrics to judge the results of our intelligence initiatives and are prepared to regularly report performance and progress to Congress and other stakeholders, partners, and customers. We have established Field Intelligence Groups (FIGs) to integrate analysts, Agents, linguists, and surveillance personnel in the field to bring a dedicated team focus to intelligence operations. As of June 2004, there are 1,450 FIG personnel, including 382 Special Agents and 160 employees from other Government agencies. Each FIG is under the direct supervision of an Assistant Special Agent in Charge. From October 2003 to April 2004, the FBI participated in more than 10 recruitment events and plans to add at least five additional events through September 2004. A marketing plan also was implemented to attract potential candidates. In February 2004, an advertisement specific to the Intelligence Analyst position at the FBI was placed in The Washington Post, The Washington Times, and the New York Times, and has since been run several more times. Our National Press Office issued a press release that kicked off an aggressive hiring campaign. The College of Analytic Studies (CAS), established in October 2001, is based at the FBI Academy in Quantico, Virginia. Since FY 2002, 264 analysts have graduated from the College's six-week Basic Intelligence Analyst Course. 655 field and headquarters analysts have attended specialty courses on a variety of analytical topics. 1,389 field and headquarters employees have attended specialized counterterrorism courses offered in conjunction with CIA University, and 1,010 New Agent Trainees have received a two-hour instructional block on intelligence. The Basic Intelligence Course currently offered by the CAS is being revised and updated to incorporate key elements of our intelligence program. Upon completion of this effort, the course will be retitled: Analytical Cadre Education Strategy I (ACES I) as outlined in the Human Talent CONOPS. An intermediate course entitled ACES II is anticipated in the future that would target more experienced analysts. Practical exercises and advanced writing skills will be emphasized, as well as advanced analytical techniques. The ACES I course will incorporate seven core elements of intelligence relevant for new agents and new analysts. Additionally ACES I will focus on assimilation, analytic tradecraft and practice, thinking and writing skills, resources, and field skills. Complementing ACES I and ACES II, the Office of Intelligence, in coordination with the FBI Training and Development Division, will identify, facilitate, and exploit training partnerships with other government agencies, academia, and the private sector to fully develop the career choices of FBI analysts. Whether an analyst chooses the specialized, interdisciplinary, or managerial career path, s/he will have the opportunity to attend courses offered through the Joint Military Intelligence Training Center, other government training centers, and private companies. The Office of Intelligence is also establishing education cooperative programs where college students will be able to work at the FBI while earning a four-year degree. Students may alternate semesters of work with full-time study or may work in the summers in exchange for tuition assistance. In addition to financial assistance, students would benefit by obtaining significant work experience, and the FBI would benefit through an agreement requiring the student to continue working for the FBI for a specific period of time after graduation. This program will be implemented in FY 2005. An Analyst Advisory Group has also been created specifically to address analytical concerns. I established and chair the advisory group--composed of Headquarters and field analysts. The group affords analysts the opportunity to provide a working-level view of analytic issues and to participate in policy and procedure formation. They are involved in developing promotional criteria, providing input for training initiatives, and establishing the mentoring program for new FBI analysts. The Career Mentoring Working Group of the Analyst Advisory Group is creating a career mentoring program to provide guidance and advice to new analysts. Once implemented, all new Intelligence Analysts will have a mentor to assist them. The career mentor will have scheduled contact with the new analyst on a monthly basis throughout the analyst's first year of employment. As of this year, the Director's Awards will feature a new category: the Director's Award for Excellence in Intelligence Analysis. Nominees for this award must display a unique ability to apply skills in intelligence analysis in furtherance of the FBI's mission, resulting in significant improvements or innovations in methods of analysis that contribute to many investigations or activities, and/or overcoming serious obstacles through exceptional perseverance or dedication leading to an extraordinary contribution to a significant case, program, threat, or issue. Turning to intelligence training for our agents, we are now working to incorporate elements of our basic intelligence training course into the New Agents Class curriculum. We expect that work to be completed by September. A key element of this concept is that agents in New Agents Training and analysts in the College of Analytic Studies will conduct joint training exercises in intelligence tradecraft. The first offerings to contain these joint exercises are expected in December of this year. In addition to this, we are in the process of changing the criteria on which agents are evaluated to place more emphasis on intelligence-related functions and information sharing. On March 22, 2004, Director Mueller also adopted a proposal to establish a career path in which new Special Agents are initially assigned to a small field office and exposed to a wide range of field experiences. After approximately three years, agents will be transferred to a large field office where they will specialize in one of four program areas: Intelligence, Counterterrorism/ Counterintelligence, Cyber, or Criminal, and will receive advanced training tailored to their area of specialization. In our Special Agent hiring, we have changed the list of ``critical skills'' we are seeking in candidates to include intelligence experience and expertise, foreign languages, and technology. Our language specialists are critical to our intelligence cadre as well. The FBI's approximately 1,200 language specialists are stationed across 52 field offices and headquarters, and are now connected via secure networks that allow language specialists in one FBI office to work on projects for any other office. Since the beginning of FY 2001, the FBI has recruited and processed more than 30,000 linguist applicants. These efforts have resulted in the addition of nearly 700 new linguists with a Top Secret security clearance. In addition, the FBI formed a Language Services Translation Center to act as a command and control center to coordinate translator assignments and maximize its capacity to render immediate translation assistance. Information Sharing--Our Relationship with the Intelligence and Law Enforcement Communities The FBI shares intelligence with other members of the Intelligence Community, to include the intelligence components of the Department of Homeland Security (DHS), through direct classified and unclassified dissemination and through websites on classified Intelligence Community networks. The FBI also shares intelligence with representatives of other elements of the Intelligence Community who participate in Joint Terrorism Task Forces (JTTFs) in the United States or with whom the FBI collaborates in activities abroad. FBI intelligence products shared with the Intelligence Community include both raw and finished intelligence reports. FBI intelligence products shared with the Intelligence Community include Intelligence Information Reports (IIRs), Intelligence Assessments, and Intelligence Bulletins. To support information sharing, there is now a Special Agent or Intelligence Analyst in the JTTFs dedicated to producing ``raw'' intelligence reports for the entire national security community, including state, municipal, and tribal law enforcement partners and other JTTF members. These reports officers are trained to produce intelligence reports that both protect sources and methods and maximize the amount of information that can be shared. It is the responsibility of the FIGs to manage, execute and maintain the FBI's intelligence functions within the FBI field office. FIG personnel have access to TS and SCI information so they will be able to receive, analyze, review and recommend sharing this information with entities within the FBI as well as our customers and partners within the Intelligence and law enforcement communities. In addition, classified intelligence and other sensitive FBI data are shared with cleared federal, state, and local law enforcement officials who participate in the JTTFs. The JTTFs partner FBI personnel with hundreds of investigators from various federal, state, and local agencies, and are important force multipliers in the fight against terrorism. Since September 11, 2001, the FBI has increased the number of JTTFs from 34 to 100 nationwide. We also established the National Joint Terrorism Task Force (NJTTF) at FBI Headquarters, staffed by representatives from 38 federal, state, and local agencies. The mission of the NJTTF is to enhance communication, coordination, and cooperation by acting as the hub of support for the JTTFs throughout the United States, providing a point of fusion for intelligence acquired in support of counterterrorism operations. The FBI will continue to create new avenues of communication between law enforcement agencies to better fight the terrorist threat. The FBI has also established a robust channel for sharing information with the Terrorist Threat Integration Center (TTIC) by providing direct electronic access to classified and unclassified internal FBI investigative and operational databases, with narrow exceptions for certain types of sensitive domestic criminal cases unrelated to terrorism. TTIC also has direct electronic access to internal FBI headquarters division websites and e-mail capabilities on the FBI's classified intranet system. Both FBI and non-FBI personnel assigned to TTIC have access to this information. The FBI has agreed to provide a substantial permanent staff to TTIC. TTIC's mission is to enable full integration of terrorist threat- related information and analysis. It creates a structure to institutionalize sharing across appropriate federal agency lines of terrorist threat-related information in order to form the most comprehensive threat picture. Although the FBI retains authority to approve dissemination of raw FBI information by TTIC to other agencies, the FBI authorizes the TTIC to share FBI intelligence products by posting them on the TTIC Online website on Intelink-TS. The TTIC Online website provides additional security safeguards, and access is granted to Intelligence Community users who have a need-to-know for more sensitive classified intelligence on international terrorism from the FBI and other agencies. The FBI also authorizes the National Counterintelligence Executive (NCIX) to share FBI counterintelligence products on the Intelink-CI(iCI) website with similar safeguards and access by users who have a need-to-know for more sensitive classified counterintelligence products. In addition to this, the Bureau also fully contributes intelligence analysis to the President's Terrorist Threat Report (PTTR). These products are coordinated with the Central Intelligence Agency (CIA), DHS, and other federal agencies. In addition to the PTTR, the FBI provides Presidential Intelligence Assessments directly to the President and the White House Executive Staff. The FBI is also committed to providing those tools which assist law enforcement in intelligence-led policing--from the National Crime Information Center, the Integrated Automated Fingerprint Identification System, and the Interstate Identification Index, to Law Enforcement Online (LEO), a virtual private network that reaches federal, state, and law enforcement agencies at the Sensitive but Unclassified (SBU) level. LEO user's total nearly 30,000 and that number is increasing. That total includes more than 14,000 state and local law enforcement members. LEO makes finished FBI intelligence products available, including Intelligence Assessments resulting from analysis of criminal, cyber, and terrorism intelligence. Our LEO Intelligence Bulletins are used to disseminate finished intelligence on significant developments or trends. Intelligence Information Reports also are available on LEO at the Law Enforcement Sensitive classification level. The FBI also recently posted the requirements document on LEO, which provided state and local law enforcement a shared view of the terrorist threat and the information needed in every priority area. LEO also has secure connectivity to the Regional Information Sharing Systems network (riss.net). The FBI Intelligence products are disseminated weekly via LEO to over 17,000 law enforcement agencies and to 60 federal agencies, providing information about terrorism, criminal, and cyber threats to patrol officers and other local law enforcement personnel who have direct daily contacts with the general public. The FBI will use an enhanced LEO as the primary channel for sensitive but unclassified communications with other federal, state and local agencies. LEO and the DHS Joint Regional Information Exchange System (JRIES) will also be interoperable. In the spring of 2002, the International Association of Chiefs of Police (IACP) met and agreed that a collaborative intelligence sharing plan must be created to address the inadequacies of the intelligence process that, in part, led to the failure to prevent the events of September 11. In response, the Global Justice Information Sharing Initiative (Global), which is a Federal Advisory Committee to the U.S. Attorney General, formed the Global Intelligence Working Group (GIWG). The GIWG is comprised of experts and leaders from local, state, and federal law enforcement, including members from the FBI. Their efforts resulted in the creation of the National Criminal Intelligence Sharing Plan (NCISP). On February 11, 2004 the Attorney General announced the creation of the Justice Intelligence Coordinating Council (JICC). I currently chair this Council, which is comprised of the heads of Department of Justice (DOJ) agencies with intelligence responsibilities. The Council works to improve information sharing within DOJ, and ensures that DOJ meets the intelligence needs of outside customers and acts in accordance with intelligence priorities. The Council will also identify common challenges (such as electronic connectivity, collaborative analytic tools, and intelligence skills training) and establish policies and programs to address them. On February 20, 2004 the FBI formed the Information Sharing Policy Group, comprised of Executive Assistant Directors, Assistant Directors, and other senior executive managers. I serve as the co-chair. This group is establishing the FBI's information and intelligence sharing policies. At the same time, we have intelligence analysts from other agencies working in key positions throughout the Bureau. The Associate Deputy Assistant Director for Operations in the Counterterrorism Division is a CIA detailee. This exchange of personnel is taking place in our field offices as well. We have also worked closely with DHS to ensure that we have the integration and comprehensive information sharing between our agencies that are vital to the success of our missions. The FBI and DHS share database access at TTIC, in the National JTTF at FBI Headquarters, in the Foreign Terrorist Tracking Task Force (FTTTF) and the Terrorist Screening Center (TSC), and in local JTTFs in our field offices around the country. We worked closely together to get the new Terrorist Screening Center up and running. We hold weekly briefings in which our Counterterrorism analysts brief their DHS counterparts on current terrorism developments. The FBI and DHS now coordinate joint warning products to address our customers' concerns about multiple and duplicative warnings. We designated an experienced executive from the Transportation Security Administration to run the TSC, a DHS executive to serve as Deputy Director of the TSC, and a senior DHS executive was detailed to the FBI to ensure coordination and transparency between the agencies. In order to improve the compatibility of information technology systems throughout the Intelligence Community and increase the speed and ease of information sharing and collaboration, the FBI's information technology team has worked closely with the Chief Information Officers of DHS and other Intelligence Community agencies, to develop our recent and ongoing technology upgrades to ensure the interoperability of the various information systems. To facilitate further coordination, the FBI Chief Information Officer (CIO) sits on the Intelligence Community CIO Executive Council. The Council develops and recommends technical requirements, policies and procedures, and coordinates initiatives to improve the interoperability of information technology systems within the Intelligence Community. The CIO is also working with DOJ on interfaces between the Intelligence Community System for Information Sharing (ICSIS) and the Law Enforcement Information Sharing (LEIS) initiative, with the FBI's Criminal Justice Information Services (CJIS) Division, to increase the sharing of intelligence-related information to and from state and local officials. In conclusion, the FBI has a responsibility to the nation, Intelligence Community, and federal, state, and local law enforcement to disseminate information, and to do so is an inherent part of our mission. Sharing FBI information will be the rule, unless sharing is legally or procedurally unacceptable. Next Steps We have made great progress, but we have much work to do. Our plan is solid and we believe we are heading in the right direction. We have enjoyed much support from your committee and we are very appreciative of the time your staff has spent in learning about our initiatives and giving us advice. What we need more than anything else is your continued support and understanding that a change of this magnitude will require time to implement. With your help, we will have that. Thank you for allowing me the opportunity to testify before you today and I will be happy to entertain any questions you may have. Ms. Dunn. Thank you, each of you, for your statements. We will begin the questioning with the gentleman from Florida, Mr. Diaz-Balart. Mr. Diaz-Balart. Thank you, Mr. Chairman. I would like to thank you for testifying before us today. The first question I would like to address is to Mr. Brennan. The 9/11 Commission report recommended expanding TTIC, enabling it to share foreign and domestic intelligence and conduct joint operational planning. So what I would like to ask you about is, in your opinion, what legal changes would be needed to accomplish that? Mr. Brennan. Congressman, I think there is still a lot of discussion going on right now to determine exactly what the NCTC should do. The President has announced support for it and there have been important meetings over the past several weeks to look at the details on that. And depending on the extent of the change and the NCTC's responsibilities, I think there would have to be a careful look at whatever types of legislative action or executive order language that would need to be put forward. I think that is open to discussion; and as you point out rightly, it is talking about a new dimension to provide to TTIC in terms of this joint operational planning. And I think the 9/11 Commission report says that decisions would have to be made about how much authority should, in fact, be vested in the NCTC on that score. Mr. Diaz-Balart. Ms. Baginski, I appreciated very much your testimony, and as an admirer of the FBI, as I am--and you have a very solid team in south Florida dealing with multiple challenges on a daily basis--the community is very proud of the FBI. The criticism in the Commission's report of the FBI was perhaps stinging, not only of the FBI, but as an admirer of the FBI, I noted it with much interest. You explained in some detail, and I appreciate you having done so, steps that the FBI has taken since September 11 with regard to the very specific criticisms by the Commission. And so I don't want you to expand more on those steps. But what I would ask you is to facilitate the steps you are taking, because some of them are continuing obviously. Especially with regard to information sharing, how can we in Congress be of help to you, to the FBI in the efforts being taken to improve information sharing?. Ms. Baginski. The first dimension is the recognition that it is going to take some time. There are dimensions in this that are information technology, that are people, that are training issues. So that would be helpful to recognize. It is a combination of things. And then, from our perspective, our biggest needs are for secure communications to our field offices and for secure compartmented information facilities. And these are not small requests. In order to join this large Intelligence Community and to be a healthy node on this network, we have to be able to operate in their information environment. So those are the two areas. And I think third is to foster the debate that is necessary on important issues that people are raising about civil liberties as this work is done. Mr. Diaz-Balart. Look forward to continuing to work with you. Ms. Dunn. The gentlelady from California, Ms. Lofgren. Ms. Lofgren. Thank you and thanks for your service to our country. You know, as I have been listening both to the Chair and to the Vice Chair of the Commission before you and the questions of my colleagues, my thoughts have really turned to a broad question, which is the deployment of technology in the Federal Government. And we have talked about information sharing, but it is not just information sharing, it is the deployment of technology generally. Listening to one of my colleagues talk about enforcement of the immigration laws, I was mindful of Commissioner Ziglar telling us that they didn't catch the terrorist who applied for a student visa because the application was on a piece of microfiche in a bucket in Florida and you couldn't do a data search of the microfiche in the bucket. Listening to Mr. Andrews' hypothetical about a hazardous material truck on its way to blow up the Capitol, there is technology that Lawrence Livermore Labs has today that could be inserted on HAZMAT trucks that would allow those trucks to be stopped remotely, and yet we don't deploy that technology. Why not? I am interested, obviously--have been on the Judiciary Committee since I became a Member of the House in January of 1995, and I have complained for nearly 10 years now about the lack of technology in the immigration function. And when our markup was interrupted before we recessed, I had several amendments that I had planned to offer and I shared with the majority to automate the I-94 entry-exit form, which is something that Director Mueller told me was a high priority for him and yet has not occurred, to require a study on digitizing all immigration applications and petitions with a mind towards cataloging all immigration applications by a unique biometric identifier such as a fingerprint and have the NIST biometric study go forward. I understand since that time, US VISIT has ditched the idea of a broad biometric that would be cross-platformed and cross- agencied and instead is proposing to use the IDENT system, which uses a nonstandard fingerprint format. And maybe we need to do that because we need something in place. I voted to continue that, as a matter of fact, for that very reason, but it looks like we have now stopped the deployment of the broader effort. So I guess my question to all of you is, in the Homeland Security--in the 9/11 Commission report, there is a recommendation that DHS take on the lead for integrating the larger network in terms of entry-exit. And the question I have is, is DHS capable of actually getting the technology deployed? If so, how are they going to do it? They haven't shown any capacity to do it yet. If not, how do we get technology identified and deployed on a Federal Government-wide basis to keep our country safe here? Any of you who can answer. General Hughes. I am the representative from the Department of Homeland Security. I think the answer is that we can and are deploying technology across the board for many biometric and sensory missions to include on the borders and to include in ports of entry. Ms. Lofgren. Can I interrupt? I recently did some study on what technology is actually along the borders and interviewed a team that had been out from the national labs, had gone out to the borders. And this is 2 weeks ago. Basically, no technology has been deployed. They are short of gasoline for the trucks. They don't have any of the cutting-edge technology that America owns through our very excellent science centers. Why is that? General Hughes. May I ask which part of the border? Ms. Lofgren. They went to the southern border with the Lawrence Livermore National Lab. It has a whole unit to establish this technology. General Hughes. I am not familiar with which border site they went to, but if they covered the entire southwest border, they talked to the wrong people. There are, of course, some problems. I am not sure what-- some border areas being not directly covered by technology, but much of it is covered. We are flying unmanned aerial vehicles over the southwest border. We have placed sensors at border control points. We have a variety of checks against the immigration documents, persons coming across the border--there are a large number of illegal immigrants coming across the border every single day. Ms. Lofgren. I see that my time has run out, but we are still issuing paper on I-94s. General Hughes. That is true. We have not yet digitized the entire system. We are in the process, however, of trying to upgrade to a digital environment. Ms. Dunn. The gentleman from New York, Mr. Sweeney. Mr. Sweeney. I thank the Chair. We have limited time and I want to thank our witnesses. I have about eight questions, two for each of you, so I am going to try to give them to you in ``machine gun'' fashion. Before I do that, I want to look back to the last panel and correct the record if I could regarding the contention by some that the Administration's proposal for funding on interoperability zeroed out the budget, as I am on the Appropriations Committee. That didn't happen. There was a different set of priorities established and, in fact, $2.5 billion first responder grant monies was put in the budget for those communications, and $20 million specifically for DHS. I wanted the record to reflect that because I think it is important we have the facts. The 9/11 Commission report says a lot of things. One of the things I think it says is that there is a general sense, an overwhelming sense, that we still don't have it right and what we effectively need, as Vice Chairman Hamilton said, is some superior authority over the information sharing part of this process. And, that is the reason why there is the call for the National Intelligence Director. I have a real concern about it all, because as we all know, the IAIP directorate was set by Congress and the Executive branch to address the information sharing issues. What I have seen is that in a year and one half, we are at the point where it is all starting to come together. The right people have been hired, and we are beginning to set up protocols and standards that are beginning to be used. And I am worried about starting over, and I am worried about layering bureaucracies on top of each other. General Hughes and Mr. Brennan, you two are going to be the ones who are going to probably most directly be impacted. I know the President has said he supports the idea of the national director. I don't expect you are going to be able to tell me as definitively or not whether you are, as well, concerned, but it is a concern I have in the creation of that position or any others. And I just don't know how it is going to work. I think it is important that we deliberate this in the next couple of weeks. Mr. Black, can you guarantee that relevant information we receive from foreign partners gets to the FBI? Mr. Black. The systems are in place. As an example, we have communications connectivity where the FBI has access to the traffic that we produce. We spent a lot of our time supporting the various elements, the practitioners of counterterrorism, whether it be intelligence, FBI and the rest. So we have an FBI officer in my office whose sole job is to facilitate this process. Mr. Sweeney. Ms. Baginski, that is happening? You are getting it into the threat integration center networks and it is getting out there? Ms. Baginski. Yes, sir. But I wouldn't be passing it to threat integration. That actually happens from Cofer's organization itself. Mr. Sweeney. So that is happening? Mr. Black. Sure. Mr. Sweeney. One hundred percent capacity? How much improvement? How do we measure that? Mr. Black. In terms of all of our cable traffic, it has full connectivity with the screening elements. So that, as an example, everything that we have, Visa Viper mechanism, which is a retrievable terrorist information system, is made available, 100 percent of it, to the Terrorist Threat Integration Center and the Terrorist Screening Center. And we have plugged in the system that we started off and contributed--TIC, the tip-off program, has been moved, so I think we are well ahead of the curve in making the information collected by the Department of State-- Mr. Sweeney. Are we fully exchanging information with India, who has had hundreds of years of fighting Islamic extremists? Are we fully engaged in the exchange of information? Mr. Black. We are fully engaged. I am always queasy when we use figures like 100 percent. There is not much in life that I would raise my hand to 100 percent on. But I could tell you-- Mr. Sweeney. That is why you want us to quantify things? Mr. Black. In all professional candor, this process has gone forward tremendously and that the impetus is on making all of the information that we have available to the practitioners of counterterrorism. Mr.Sweeney. Okay, Mr. Brennan, do all the analysts at TTIC receive full access to databases which TTIC has access to, or do providing agencies limit distribution of that information? Mr. Brennan. As I mentioned, we have over 22 networks that come into TTIC. Access within TTIC is based on what the role and the function of the analysts are, and so many analysts have access to many--most all of the information streams. All of them don't need all of the access. Mr. Sweeney. Could I follow up and have a real sense of the protocols that are in place there? Mr. Brennan. Sure. Mr. Sweeney. Last question to you--have a couple more I am going to ask others for the record--but do you believe that some terrorist organizations have the intention, organizational capabilities, or technical acumen to produce and deliver a nuclear weapon to U.S. cities? Mr. Brennan. I do not believe at the current moment that any terrorist organization has the capability to do that. I believe that terrorist organizations are pursuing a nuclear capability to include radiological devices, nuclear devices and other types of materiel. But I don't believe they have the capability right now to do that right now. No. Mr. Sweeney. Thank you. I thank the Chair. Chairman Cox. [Presiding.] The gentlelady from Texas, Ms. Jackson-Lee. Ms. Jackson-Lee. I thank the Chair very much and the Ranking Member for both convening this meeting, and I thank him for allowing me to pursue the line of questioning relating to the importance of the work of this body and the need to reconvene with the two members of the 9/11 Commission. I must say, Mr. Chairman, that in conversations with both the Governor and the Co-Chair Hamilton both agreed to welcome both an invitation and to return before this committee. Because, as I said in the open session and as I have said in this direct conversation with them, this is ours, and our work is securing the homeland. Abbreviated hearings, mixed with no congressional and executive action, giving no legislative direction to the securing of the homeland is playing with fire. It almost reminds me of Rome burning while music plays. So I would just start out by saying then that I call upon the Speaker of the House to convene a session in Congress so that the legislative matters that need to be acted upon the 9/11 Commission Report can be done now and can be done immediately. Mr. Chairman, I ask unanimous consent to submit into the record the first page of the legislation that I have offered giving Cabinet status to the National Intelligence Director-- Chairman Cox. Without objection, so ordered. Ms. Jackson-Lee. --which would oversee budget operations and personnel of the entire Intelligence Community. [The information follows:] [GRAPHICS NOT AVAILABLE IN TIFF FORMAT] Ms. Jackson-Lee. Let me qualify it is Cabinet status without the responsibilities of policy. It will be operational, but that individual will have budgetary responsibility and control. It is crucial that these legislative initiatives be able to be filed and that we act upon them immediately. Let me thank the panel, and I realize that we may be at a disadvantage for some of the concerns that I have, because, as I indicated, I frankly believe that Rome is burning and that we are literally playing with fire. In conversations that have gone on that have evidenced themselves in the press, it is well-known that some terrorist act is expected before the elections. It is also well-known that we as Americans will not be intimidated, but certainly Congress has a crucial responsibility to be able to be part of the firewall, if you will, in protecting the American people. We cannot do that in an abbreviated framework, albeit with respect to our committee leadership, and with a Congress that is not in session. So, first of all, I think that we must frame this in a way that Co-Chair Hamilton said, and that is to smash the stovepipe on intelligence. Because the very core of the disaster of 9/11 was the lack of transferring intelligence as it was needed. So I would clearly like to hear from this group your sense of smashing the stovepipe and whether or not you believe it will interfere with competitive analysis. I say that straightforwardly, because I believe that our previous director, certainly a distinguished public servant, failed us in the inability to see the big picture, as did our other agencies pre-9/11. Likewise, there was a failure in oversight in the intelligence disseminated on Iraq, and there was no objectivity as I perceived it in our Intelligence Community. It was only a ``yes, sir, yes, boss'' attitude in terms of taking America to war. That is my first question. The second is, any impressions, Mr. Brennan or General Hughes on a national I.D. card? My understanding is the Commission, has not, has not, has not confirmed or recommended such. Your view of that. Civil liberties, I would like your view on the implementation of a board inside of the intelligence center that will be created that will oversee the protection of civil liberties. And I would appreciate, Ms. Baginski, your comment on the FBI's seeming siege on peace activists in the United States and whether that has anything to do with protecting the homeland. And lastly, the need for border security to be combined with intelligence, meaning to enhance the capabilities of border personnel in securing intelligence. If I could get an answer to at least one of those questions since the Nation is at crisis. Mr. Brennan. Mr. Brennan. I will start. First of all, smashing the stovepipes and competitive analysis, I think we are all committed to smashing any stovepipes that remain. It is not sufficient though just to share hard copy information. It is important to have an information technology architecture that allows institutions to share information with institutions so that in fact you can search, retrieve that information in a systemic manner, as opposed to having a lot of different hard copy files. That is not what we need, because there are so many different elements of the U.S. government that need that information. We need to put in place that architecture. Competitive analysis, I am fully supportive of competitive analysis but done thoughtfully, as opposed to unnecessary redundancy that wastes resources. And, as I said in my statement, what we need to do is have a framework that allows for allocation of roles and responsibilities to include the assignment of competitive or alternative analysis. Regarding national ID cards, I would refer to DHS on that, but what I would do is say the administration is looking at different standards and biometrics that in fact makes sense to apply at borders in other orders. Civil liberties, since TTIC has access to so much data, we take very seriously the protection of U.S. citizens' rights and privacy obligations and we are committed to working with the rest of the government as far as having some type of board that in fact look at those issues very seriously. General Hughes. And I will have my views that we definitely believe in breaking or ending any barriers that exist. The term stovepipe is a little bit emotional, as far as I am concerned. We are in favor of horizontal and vertical integration at every part of the government, if we can get it. We are in favor of protecting civil liberties at every opportunity. I personally am and so is the Department. We are in favor of a board to oversee if this is a necessary development. We are also working on the national I.D. card issue. It is more complex than simply saying, yes, we are in favor of it or, no, we are not. It has great implications for the United States, and one of the implications is the civil liberties of individuals. We have to deal with that, and so we are considering the issue. Ms. Jackson-Lee. Well, obviously, General Hughes, you will do that with the consent of Congress, because there are those of us who are not conceding a national I.D. card and particularly I do not sense and did not read that the Commission recommended a national I.D. card, and that is correct? General Hughes. That is correct. Ms. Jackson-Lee. Thank you, sir. Ms. Baginski. Yes, ma'am, on two issues. Stovepipes are not necessarily all bad. A stovepipe around an area of expertise, an analytical area of expertise, a center, if you will, is not something that necessarily would be negative. But what I would say is we have done a remarkable job unifying our disparate collection resources against threats, and I think that is the core of the progress that we have made over time. In response to your question about the articles that appeared in the New York Times, the--both the Democratic National Convention and the Republican National Convention have been designated national security special events. In accordance with that, every effort is made to insure that any threat to the security of that event is taken care of within the confines of the Constitution and the law as we always do. There is absolutely no truth to the allegation that any of these things were undertaken outside of predication and outside the bounds of the Constitution. I understand the press article. I did read it. I understand the concerns of citizens. But I also know the organization that I work in, and these were all done with regard for specific intelligence that caused us to have concerns about attempts to disrupt this event, and we had a similar series of events for the Democratic National Convention. Ms. Jackson-Lee. Well, I would ask that any peace activist that believes that they have been intimidated just for their opposition and first amendment rights need to be contacting both Members of Congress who are concerned, and I hope that you will be responsive to our calls regarding this intimidation. Ms. Baginski. Yes, ma'am. Ms. Jackson-Lee. Security is one thing, but intimidation and oppression is another thing. Chairman Cox. The gentlelady's time has expired. Ms. Baginski. We would be very anxious, ma'am, to have those reports and deal with that. Ms. Jackson-Lee. I thank you very much, thank you. I thank the gentleman. Chairman Cox. Are there other members of the panel that would like to address any of the questions that have been put? Mr. Black. I would just add one concluding remark. I think the stovepipe issue is very important. We are trying to institutionalize this. I think, Congresswoman, it is not only institutional but employees and individuals involved in this process don't have to put in Herculean efforts all the time. I think in the past we have been relying on the work ethic of people working around the clock in defense of this country. What we are trying to do is put in a system that lends itself to people routinely doing their job in a more productive way. We no longer the have the luxury to rely upon people working around the clock with no sleep, and I think we are heading in that direction. I would also underscore that my exposure to this issue in terms of civil liberties is that we are very and profoundly interested in this. We are in the business of defending America, and America is based upon civil liberties. They go together. You can't have one without the other. Chairman Cox. The gentleman from Oklahoma, Mr. Istook. Ms. Jackson-Lee. Thank you. Mr. Istook. Thank you, Mr. Chairman. I would like to address to the panel the issue of blind spots. We are all concerned, of course, realizing that terrorists want to attack us where we are not expecting it. We recognize the great symbolic value of attacks upon icons such as the World Trade Center, the U.S. Capitol or the Pentagon. Yet, being from Oklahoma City, I am certainly aware that terrorism can strike in the heartland. It can strike where it is unexpected. In fact, that is the goal of terrorists is to do so. I am also aware that terrorism does not necessarily come totally from foreign nationals. Again, I cite the Oklahoma City example, although it was for different motives than Al-Qa'ida is pursuing. But I would like the members of the panel to address these aspects. For example, in the testimony this morning, when we are talking about the great desire of people to blend into the landscape and to acquire documentation that will help them to escape detection--Mr. Kean certainly testified that terrorists are most vulnerable when they are traveling. So we have established networks, and we are trying to make them more robust, with the entry and exit programs focused mostly again on foreign nationals. Yet we have not only a great number of people who are in the country illegally, but we also have people who are American citizens that are involved in things, not just a Tim McVeigh. We have the American Taliban we have arrested that have been made up of American citizens in connection with foreign activities. One thing that I did not see, and perhaps I overlooked it, but did not see among the Commission's recommendations was focusing on better screening in the naturalization process where someone wishes to become an American citizen, wishes to acquire a U.S. passport, to enable them to escape some levels of scrutiny. We had several years ago a situation where some people said it was 50,000, some will say it was 100,000, people who applied to become American citizens were not put through the routine criminal background screenings. I do not know, and you perhaps can tell me, of any access to these information systems that is part of the naturalization process currently to make sure that the same level of screening that we are applying to people that want to come in and out of the country freely applies to people who want that great credential of U.S. citizenship and thus access to U.S. passports. So I would appreciate the panel addressing how much of a potential blind spot we have when we either do not put enough focus on the soft targets or fail to recognize that some of the targets may have American citizenship or may be pursuing American citizenship. General Hughes. Perhaps I will start, since primary responsibilities lies with the Department of Homeland Security for these issues. I think I have got two questions here. Mr. Istook. Yes. General Hughes. The question of blind spots, especially dealing with documentation of proof of who you are and what you are doing, there are a variety of issues at work here, but the primary one is to focus on those persons that either have documentation that is questionable or illicit more--or on those persons who have a history or record we have now recorded in databases and in other ways that tells us that there are terrorists or terrorist-connected persons. That testimony is not perfect, sir--and I would be the first one to admit that--but working; and it is being improved all the time. The good news is that once again I think something that began before the Commission and the 9/11 report is--continues until this day is attempting to coordinate, collate and interact with all of the databases and all of the repositories of information. Mr. Istook. Is that being done in the naturalization screening processes? General Hughes. Yes, it is. Yes, it is. Our Office of Citizenship and Immigration Services is the office that undertakes that. They are not as fully integrated yet into the system as they will be in the future because when we absorbed them they were an analog organization largely. They are making rapid process to bring themselves into the digital environment, as Ms. Lofgren and others have remarked on here earlier, and that is an ongoing process. I would like to just mention that the idea of blind spots is of great importance certainly to all of us here, I think, and we have detected instances where American citizens, where people with very, very good documentation who were indeed terrorists or terrorist connected have been able to travel or transit in some way across our borders. We regret that. We are trying hard to figure out how to solve it. I think in the case of the American citizens who do want to do ill to the United States, we are not dealing there with identity, mirror identity. We are dealing also with their belief system, their values and their actions, and that is a more difficult kind of thing to reduce to a data entry that will show that in every case. So we are trying to come to grips with that, but it is at that time primarily an interface process where we come to those persons, understand their actions or their professions, the views and ideas that they give, and then we deal with them on that basis. But their documentation or their previous identity may not show anything else at all that is wrong. Mr. Istook. Other panelists. Mr. Brennan. The issue of blank spots is a very important one, and that is why I am a strong advocate of making sure that there is an allocation of responsibilities. Because there is a vast horizon of issues that need coverage from an analytic as well as a collection perspective, and the more that we can identify that universe and that horizon and assign responsibilities the better chance we are going to be able to cover that horizon. On the issue of individuals here in the States who may in fact be part of transnational terrorist groups, the Homeland Security Presidential Directive 6, HSPD-6, that was promulgated last September streamlined the whole watchlisting and database process. It is still in the process of being streamlined and overhauled, but in the past when there were 12 different databases and nine different departments and agencies, that no longer is the case. There is the terrorist screening center. That falls on the FBI that has responsibilities for and in fact providing the support to those screeners and watchlisters. TTIC now has the national responsibility to maintain the national database on known and suspected transnational terrorists to include U.S. citizens who are here in the United States. So we have absorbed from the State Department the tip-off program that has been in existence for close to 20 years. We are putting into that the names of U.S. citizens who are known or purported to be part of transnational terrorist groups, and we work very closely with the FBI on domestic terrorism responsibilities. Mr. Istook. And would that show up on a background check for someone seeking U.S. Citizenship? Chairman Cox. The gentleman's time has expired. Mr. Istook. Thank you. Chairman Cox. But the panel may address the question further if you choose to do so. If not, the gentlelady from the Virgin Islands. Mrs. Christensen. Thank you, Mr. Chairman. I am going to go right into my questions. Welcome, panelists. I wanted to follow up on the question on the board to protect civil rights and liberties, because my understanding is that the recommendation is that the board would insure that the government is adhering to guidelines and protocols for protecting civil rights and civil liberties. Can one person answer for me? Are there guidelines and protocols in place at this time for the government to adhere to? Ms. Baginski. Speaking from the FBI perspective, there clearly are those guidelines. We conduct all of our intelligence activities and all of our investigative activity under the attorney general guidelines that were just recently updated; and they give us those guidelines, clear guidelines, for predication for when one can collect information on U.S. citizens and under what circumstances. So those guidelines are in place and have been in place for many years, yes. Mrs. Christensen. OK. Unless we get good-quality intelligence, the best organization and collaboration won't help to give the people of this country the kind of protection they deserve. I wanted to raise an issue that I wanted to ask the last panel about, which is diversity within the Intelligence Community, and it also speaks to how the data will be analyzed. We are dealing with people from a faraway country, different cultures, different ways of approaching things. What is the level of diversity, for example, within the FBI, TTIC? My experience in speaking with people within the Intelligence Community, from the African American point of view, is that they are few and far between and even rarer at the top of the spectrum. So what is it and to what extent are you seeking actively to bring diversity into the Intelligence Community? Ms. Baginski. I think the DCI--former DCI Tenet in fact led a very, very focused study of this issue; and I know that I in fact testified in front of this group on behalf of the FBI. Within the FBI, there is very great diversity among our intelligence analyst program. So I will just speak for that portion, not for the law enforcement portion. What I would say is that your observation is correct in terms of African Americans and leadership positions, but we have a very healthy diversity, both in terms of gender--what Director Mueller's guidance to me is is to bring in people who understand the cultures, that we are actually--that we are actually analyzing that and that we are actually studying, as that is part of a very focused recruiting process, 33 recruiters focused on universities to be able to bring that kind of diversity thinking. Mrs. Christensen. So that focused somewhat also on HPCUs and Hispanic surveys of Americans? Ms. Baginski. Yes, ma'am. Mrs. Christensen. Anyone else? TTIC want to answer? Mr. Brennan. TTIC doesn't have direct hiring authority. We rely on the different agencies and the departments. But integration by definition is diversity, and so what we are trying to do is make sure we have that diversity perspective which includes diversity in terms of background. Mrs. Christensen. OK. One of the other recommendations is on incentive for information sharing. Personally, I don't see incentives as being the answer, because I believe that we should have a centralized system and one director. But if there were incentives for information sharing, what would you envision them to be? Mr. Brennan. I agree with you completely that the reference in the 9/11 Commission to creating incentives to better balance security with information sharing, I believe it should be institutionalized, not incentivized. You want to make sure that you are able to facilitate that flow of information and require and mandate, in fact, that information be shared and so not leave it discretionary. What you need to do is put together a framework, though, that is sensible, that you can protect information as well as get it out. Mrs. Christensen. Can I just follow up with you? Mr. Brennan, because you talk about--you said--talked several times about the architecture that needs to be in place to facilitate this, to what extent is any of it in place at this point? Where are we in having the kind of infrastructure to facilitate the collaboration and the sharing of information? Mr. Brennan. I think there are many pieces of an architecture in place. But when we talk about a national architecture, you are talking about a very complicated multidimensional architectural system that in fact is trying to take shape right now. The FBI and DHS and other departments and agencies have their systems and networks that they are trying to interact with. Mrs. Christensen. But some of them don't talk to each other. Some of them are not able to talk to each other. Mr. Brennan. That is a question in terms of interoperability. That is why we have to look from a government-wide perspective across all the departments and agencies. But then it is complicated by the fact you are bringing in State and local entities and local law enforcement that have their own systems, and so this is a challenge of, you know, enormous magnitude, and I think-- Mrs. Christensen. So are we at the beginning of that process? Are we just at zero? Ms. Baginski. No, actually, ma'am, I don't think that we are at zero at all. In fact, in terms of the Intelligence Community classified architecture, that is very well established and we have been joining it. I think in terms of the secret level and then in the sensitive but unclassified level there have been enormously positive efforts between DHS and the FBI to take the existing sensitive but unclassified infrastructure and join it with the DHS architecture so that they interoperate and so that information appears seamlessly to the users so that they don't have to actually worry about whose network that was actually carrying on. So I think there is very positive work going on there. And in terms of incentives for information sharing, I happen to agree with John. I don't think he can do this through incentives, so we have actually done it through rules, which is essentially--we have created a category of information that is required to share, and our authoring tool for reports requires the first version to be written at a low classification. General Hughes. Would you mind if I gave a brief follow-on? Chairman Cox. Please do. General Hughes. I would like to tell you last week we convened 324 persons from States, the territories and possessions, from a few localities here in D.C. and began in the process of training them in the handling of U.S. Federal Government information up to the Secret level. The system that will provide that information to them is also being fielded now. It is almost complete, called the Homeland Security Information Network, which was complementary and parallel with the JTTF structure from the FBI and other systems that are in use throughout the country. So we are definitely more than talking about or thinking about this. We are doing it, and we are some distance into it. Chairman Cox. The Chairman will recognize himself for 5 minutes. Ms. Baginski, as the person responsible within the FBI for information sharing and also as part of a bureau that has nearly 100 JTTFs operating, not to mention the field offices and so on, do you see it as the role of the FBI to take the lead on information sharing with State and local governments? Ms. Baginski. We actually see it as the responsibilities of DHS and the FBI to speak from the Federal level to the various components of State and local government. In our case, we are focused on the law enforcement community. In DHS's case, they are focused on the municipal and the private sector. Chairman Cox. I am not quite sure I understand how that works. What you are saying is that information that is finished intelligence, analytical product, is in some cases shared by DHS with State and local government and some cases shared by FBI, but there isn't anyone with a lead on it? Mrs. Baginski. Actually, what General Hughes and I have done--and I think we are both enormously proud of it--when those communications occur, we have been doing them in the form of bulletins. I think you probably recognize those. Before, we were in a position where the FBI was issuing its own to the local law enforcement community and the DHS was issuing its own to the municipal and government and private sector. What we have done is we issue now one bulletin, one set of information with both seals, so that the Federal voice to the local community is a single voice, and I think that is a very positive step forward that we have worked as a personal partnership and that our folks have executed very, very well over the past couple of months. Chairman Cox. So there isn't a customer that is getting information from FBI that is not under the aegis of DHS? Ms. Baginski. Yes, there is. Chairman Cox. There is. What customers are those? Ms. Baginski. The Intelligence Community is one of those customers. We, I think, as you know-- Chairman Cox. I am sorry, talking within the realm of State and local governments in the private sector? Ms. Baginski. Uh-huh. Chairman Cox. Any customers within that realm? Ms. Baginski. Yes, I think it is fair to say in the State and local law enforcement community, we are, in fact, producing a number of intelligence assessments to include the raw intelligence that we produce that the Director of the FBI is actually responsible for producing; and through a number of mechanisms, to include our law enforcement online sensitive but unclassified Web-based network, we are posting intelligence assessments and raw intelligence for passage for our State and local partners at the same time that we are passing it to our partners at the Department of Homeland Security. Chairman Cox. We have simultaneously the bulletins going out which are jointly produced by DHS and FBI and we have things going directly from FBI that don't go through DHS? Same customers? Ms. Baginski. That is correct. And I think it is important to note here that you might be thinking about just terrorism, but you understand that we have three other missions as well, and there is the traditional criminal mission, where we produce a lot of intelligence that is of direct use to State and local law enforcement. Chairman Cox. Could be, but I am not addressing my question to that. Ms. Baginski. I am sorry. Chairman Cox. I am addressing my question entirely to the-- Ms. Baginski. Counterterrorism. Chairman Cox. --issue that we have been focused on this in this hearing. Ms. Baginski. I am sorry, this is actual information that goes to State and local law enforcement and, of course, our JTTF constructs which is, of course, our operational arm. Information is in fact going in there to the JTTFs to take action on as well as the DHS, and the elements of DHS are partners in that. But when you ask me the information--is there specific information, State and local, not going to DHS, our answer is yes. Our bulletins are putting threat information in perspective and giving State and local authorities a sense of what countermeasures they can take and be on the lookout for. Chairman Cox. I am sorry. My time is just about running out. I want to get to one other aspect here. My question is that I don't think we have yet licked the problem of complete coordination between the Federal Government, certainly not through DHS and the State and local governments and the private sector customers for finished intelligence products. That raises then the question about the National Counterterrorist Center and the degree to which it might be viewed by some people, now that it is in the planning stages, as acquiring the responsibility that I think by statute now in section 201 under the Homeland Security Act is given to DHS. General Hughes, since my time has expired, let me leave that question in your lap. What do you think we are headed for in terms of the executive branch's points of view on this? Is the National Counterterrorism Center going to be in the role of distributing information to State and local governments? Is DHS going to want to continue to do this, FBI or TTIC, or is TTIC going to be subsumed in this? We don't know any more than what we read in the newspapers about this right now. While you are at it, what do you think will happen to IA in all of this process? General Hughes. I think the process and the point we were discussing, these issues, I don't think decisions have been made. If they are, I am not aware of them. With regard to the idea that supposed that information will flow from the National Counterterrorism Center out to the States and localities, there is some discussion about that, how it will go, whether it goes through DHS or through law enforcement channels or through a direct channel. Because we certainly could do it directly. And, by the way, probably concurrently to not only the respondents of the State and local but also to Federal partners, much as Ms. Baginski just described, that has yet to be determined. That is one of the many--I would say many thousands of details we have to work through here. But certainly it is intended for the National Counterterrorism Center to be the focal point for threat assessments regarding terrorism for the United States. So I can assume from that title, that idea, that concept, that if the NCTC embraces that mission, they will be issuing products that one way or another through a variety of conduits will go to the State and local level in our country. Chairman Cox. Mr. Etheridge. Mr. Etheridge. Thank you, Mr. Chairman. Folks, we are here today because of this report. We would not have a meeting in August if it weren't for this 9/11 Commission, a Commission that many people in this body opposed and people in high office didn't want to happen. But because the families pushed hard and some Members did, we are here, and I want to thank them and the families, because they more than anyone else bear a lot of the burden of 9/11, and we want to fix that problem. The previous testimony from two speakers talked about a problem that we face, one of many. I am going to ask my question, and I want each of you to comment on it, because they discussed the inordinate amount of classification of intelligence data, data and information that no one has any doubt about what it is, not really sure that it is secret, classified, et cetera, and that information is then out of the public domain. Over the last couple of weeks I have had the opportunity to visit with a lot of police officers, police departments, fire departments, rescue squads and people that we say we really want to be in touch with, that we really need their help and their input. We are now just talking about the information that we are going to get to them. The problem is we don't get them the information quickly and we classify stuff that shouldn't be classified that would help. I remember in the last several weeks--whether it comes to anything or not--a police officer just doing his duty saw someone in Charlotte filming buildings, may not mean anything. But that is how we get the job done. But if we classify everything that crosses our desk, they won't get the information. So my question is this--and I don't think there is an adequate flow of information getting to locals, either that or the people I am talking with are not being honest with me, and I think they are being honest with me. I just think they are not getting the information. I would like for each of you to discuss any attempt that your organizations are making to coordinate and revise the classification strategies that would make the accuracy, the collection and the effective information available to the first responders across this country and what is being done to put the stamps of classification to the side when it doesn't have to be put there. I think this is a huge problem that no one is doing any talking about yet. Because if we move all the blocks and the chairs we want to on the decks of the Titanic, if we keep doing that, we never get the information out in time no matter how many people we move and change. Whoever would like to go first. Mr. Black. I guess I have been elected to start. I think you have asked one of the most profound questions for the future of this issue. I think it is important to note that essentially we are in a different environment than we were in the past. This is not the Cold War. The Cold War was slow and ponderous. It rewarded attention to detail. It rewarded secrecy. It rewarded keeping secrets from as many as possible to protect the source. Immediate response to the high-velocity threat of terrorism requires accurate information, yet it requires speed. So I think the correct solution is to move away from where we were in the past. Speed counts, information has to be disseminated quickly so that people can take action to protect, especially since we are not interested in writing a intelligence report for its own sake. We are interested in using this information so it can protect people. In the overall context, this is where we are going. This is the future. There is the caveat that has to be the preserve of the Intelligence Community and the FBI, and that is to protect those sources that do need protection. Sometimes sources that are highly significant are rare. They need to be protected. But I think the community is working on that, and I would have to defer to Mr. Hughes and Mr. Brennan. But there is an effort in this direction. So I think the answer--the response to your question would be, in the past everything was classified because it was slow and ponderous. Now you require speed for action purposes, yet at the same time we have to increasingly identify those several sources of those limited numbers of sources that need to be protected, because they are so hard to replace. Ms. Baginski. Yes, sir. I would like to comment on that. I think you have asked a very, very important question. Our initiatives are twofold. The first is to separate the information from the source; and we think that can, in fact, be done. As long as you try to merge those two things, you are often dealing in a very difficult classification situation. At the same time, when you separate those two things, we do require from the FBI analyst a source commentary that attests to the pedigree of the information, which generally can be described as the degree of separation of the source from the actual information itself and some characterization about its reliability. So there are two things, separation that allows us to write it to release it at the lowest classification in accordance with a DCI directive, I might add, a DCI directive that has been on the books since 1989 or before, requiring us to alternate at the lowest possible classification level. Mr. Brennan. It is not just an issue regarding classification. It is the entire way that data is originated within the U.S. government. We need to reengineer that origination process. And, as Maureen said, right to release, so that the technology exists right now that the thread of information that is required overseas can move at the speed of light all the way down to the police chief in a local jurisdiction where the thread of information focuses on. But the policies and practices and procedures have to be put in place to reduce the number of human interventions that are required as the case exists right now. So what we need to do is--the natural default over the years in the intelligence business has been to declassify something. It is changing that mindset to make sure that the first piece out of the box in fact goes to the classified level that can go to the first responder or somebody else. Then you can follow with the more detailed, sensitive information. General Hughes. I will just give three short bursts here. We are routinely producing in this community highly- classified information with tearlines or excerpts out of the information that are either at a reduced classification level or at unclassified level, sensitive but unclassified or law enforcement sensitive, that can be sent out to the field. That is an ongoing mechanism, and it seems to be working very well. It may not be yet where we would like it to be, but it is certainly a big improvement over the past. Second, we have direct automated communications that are or were at the unclassified level every day going to all of the States. Many of the localities in this country are also receiving that information. It is not all-inclusive. We are Federal officers. We are bound to protect according to the law, the information we invest so much in and worked so hard to get. So we are doing the best we can right now with this effort. I would also mention telephone calls, sir. Many of us make telephone calls. I personally make them to persons who are not--who do not have available to them some other kind of communication system that works. Sometimes those calls are secure, over classified telephone systems. Sometimes they are unclassified over the regular telephone system. Depends on the information. But that is happening now. And the last point I would like to make to you is classification is really not a barrier to the communication of information if indeed the information indicates an impending act or a crisis or some kind of a problem that needs to be acted upon immediately. I can look you and any Member here in the eye and tell you that we will get that information out of its classified restricted environment and give it to the people who need it as rapidly as possible. Chairman Cox. Thank you. The gentlelady from Washington. Ms. Dunn. Thank you, Mr. Chairman. Welcome to our panel today. It is very helpful, your testimony. We have appreciated it. I have a couple of questions. I was very happy to hear Ms. Baginski talk about metrics being involved. Now measurements of success, those are vitally important, and we take them seriously, but we also all know that structural change such as the sort of change we have gone through with the Department of Homeland Security can be as rational as possible and yet not really work because of cultural problems. I am interested in asking you, first of all, what sort of challenges have you run into in terms of the culture of the organizations that you lead. In two of the cases, General Hughes, Mr. Brennan, you are leading new agencies since 9/11. You are dealing with details from legacies, responsibilities. Some of you are having problems attracting talent to come to work in your departments. What have you done within your departments since 9/11 to make sure that we can meet some of the--that we already have some of the shortcomings that were listed in the 9/11 Commission's report, and what do you have left to do? Mr. Brennan. First of all, as far as we in TTIC have different representatives, there are assignees in the different organizations, people have asked how do you bring those different cultures? Quite frankly, we haven't had to work at it. Because if you give people an important mission like terrorism, you give them access to information across the U.S. Government. You find that they will work together seamlessly and collaboratively in a way that they haven't done before. So we feel as though there is a real benefit of the integration and colocation of these individuals with information systems. This has been working in concert with FBI, DHS, CIA and others to bring together this--what I refer to as an architecture that is not just information technology architecture, it is also the business practices and interactions. So I think one of the things that we represent up here is that we have regular interaction. And if we have the interaction at senior levels, the individuals who are working on the challenges really feel at liberty to be sharing this information among themselves to find the ways that they can in fact facilitate that sharing of information. General Hughes. I would like to give you just two quick answers here. First is what we have done since 9/11, and in my case we are a couple of months beyond a year old, in organizational terms. Our mere--the mere fact that we have come into being is a response to the need for some organizational entity to provide an umbrella for many disparate organizations to work under the Department of Homeland Security and then to use the power of those organizational elements that were legacy organizations to feed information into a central repository, a central location and interact in the Federal and the State and local environment to make sure that information has utility. That is the single biggest thing I can think of. We have many other issues, but I think that is enough on that topic. I would like to say that the idea that it was hard to get legacy organization personnel to work together, in my case, is the same as John Brennan has characterized it. If you give them a mission and if you give them an identity, especially that goes with that mission, an organizational identity or even perhaps a philosophical identity, they will do the job very well. They are, in fact, patriots as much as they are any other members of an organization. So on behalf of the country, I haven't encountered any problems with people working together. Once they come into the Department of Homeland Security, they do very, very well together. Mr. Black. I would just say that personally the threat of terrorism is not foreign to the State Department. We all know we have had our embassies overseas and Foreign Service personnel being blown up and dying in large numbers over the years. So this is not anything new to us under the leadership of Secretary of State Powell. He has reinforced in the minds of our employees but also the mission. When we talk about counterterrorism, things come to mind like the FBI, CIA and the rest. The reality is that the Department of State has the privacy to be able to enable these other agencies, these practitioners of counterterrorism, to be able to do their work overseas and to prepare for that. To facilitate it, we have changed completely how we do our business. New officers coming in receive training in counterterrorism. Our consular programs receive pro forma counterterrorism training, how to contribute to the system. New ambassadors coming in, whether they are career with years of experience or new political appointees, get training programs. They are provided education in counterterrorism and the like. We also have diplomatic security that does for us our threat assessments globablly around the world. We also, through diplomatic security, have programs that reach out to the business and private sector around the world. We have 81 different offices overseas. So--I mean, I have only been in the State Department a couple of years, having come from intelligence. The great thing about the State Department in the past was to protect U.S. persons overseas, to conduct diplomacy and to facilitate the process of containing the Soviet Union under the Cold War. Secretary Powell has completely changed that. Counterterrorism is one of our primary missions, and our success is important to the country, and we are determined to be successful in that regard. Ms. Baginski. Ma'am, if I might, I think what is more interesting to me is I haven't found the challenge--I think what I hear is what you have probably all heard, that there is something that is inherently incongruous between law enforcement operations and intelligence operations, and I can honestly say from the day I arrived there, I found just the opposite to be true. Just like my time working in DOD where we had fully integrated military operations and intelligence, what I have seen is fully integrated law enforcement operations and intelligence. I have also seen two very strong strengths that actually come from intelligence being in the law enforcement community, and they are very important, the first being that there is enormous attention paid to the pedigree of the source. That comes from the heritage of the law enforcement culture that says that they would have to appear in court, therefore, they must be credible, and we must check them out. It is incredibly important to our intelligence capability. That kind of attention to pedigree of sourcing is critical to a good intelligence capability. And the second I would say there is an enormous rigor and discipline in intelligence analysis that I find very comfortable for me, coming from the second world, which is that facts are facts and conjecture is marked as conjecture, and that also comes from the law enforcement community. My challenges, though, have to do with an organization that has long been optimized for one of its missions, its law enforcement mission, and not as optimized for its overall intelligence mission. So in terms of infrastructure, hiring, training, recruiting, those kinds of issues, those are where I have had to spend the majority of my time. Chairman Cox. Mr. Langevin, the gentleman from Rhode Island. Mr. Langevin. Thank you, Mr. Chairman. I want to thank the panel for being here today and for your testimony. I could probably follow up on Ms. Dunn's question in the area of organizational culture, start with that. It is clear from the findings of the 9/11 Commission report and subsequent things that we have heard in testimony, both on my work in Armed Services and also here at Homeland Security, that the way that we were fighting the war on terrorism, both before 9/11 and in many ways after 9/11, was according to the way we fought the Cold War, using the Cold War battle plan, if you will. And clearly that plan may have been successful in winning the Cold War, but it is not going to work in fighting this war on terrorism. Now, Public Administration 101 will teach you that bureaucracies by their very nature are intransigent and that one of the most difficult things in changing the mission of an organization is changing its organizational culture. People basically keep doing things the way they have always done them because that is the way they have always done them. I really do want to hear more about and I want to focus on the issue of incentives and what is being done to encourage information sharing. Mr. Brennan, you said that you want to institutionalize this effort to information share. Ms. Baginski, you said you have done it basically through rulemaking. I have found in my experience that it doesn't work that way. You have got to have incentives to get people to buy into this. You either have to terminate people that are there-- bviously, you are not going to do that across all lines and terms of the various agencies that deal with this--or you have to incentivise people to buy into changing the mission. Clearly, patriotism is a major incentive. I will concede that. But there are also going to have to be additional things done to change the mission. So we need to focus on that, and I would like to hear more about that. The other thing I wanted to ask, my second question, is that the Commission's recommendations for a National Intelligence Director have received a great deal of attention. In particular, I would like to ask about the recommendation that there be a Deputy of Homeland Intelligence, one of three deputies who would serve under the DNI. Basically, the Commission suggests that this role should be filled by either the Executive Assistant Director for Intelligence at FBI or the DHS Undersecretary of Information Analysis and Infrastructure Protection. I would like to hear your thoughts on which of these two would be the best option and how we can insure cooperation between the FBI and IAIP, if only one of the two were directly represented in the Office of the National Intelligence Director as a deputy. A related question, is it even necessary or advisable to create these dual roles for certain intelligence officials? Ms. Baginski. I will go to your first question and then the second one. I think the notion of incentives is very powerful, and I hope I didn't misspeak. Rulemaking actually is a very strong incentive in the FBI through an inspections process, and what people get measured on is what they get evaluated on. So when you create those rules that say you must do the following and you follow that up by inspecting them and ensuring that they are doing it, that actually becomes my incentive. So I didn't mean to suggest I was just writing manuals and hoping that they would-- Mr. Langevin. So pay measurements are in some way associated with-- Ms. Baginski. Yes. Yes. And then I think the other big incentive for us is to actually change the critical elements on which agents are judged to include performance in source development and intelligence production, and those are going to be very, very strong incentives in our culture. So I think you and I are in violate agreement on what needs to be done, and we are searching for those things that actually work within a very proud and wonderful culture, actually, that the FBI has. To your second issue of the deputies, I think as you know, nothing is off the table in the discussions. There are very high-level discussions occurring now. The three of us have been involved in them, and there is a lot of discussion about what is--what are the details surrounding the implementation of this particular model and the President's support for the NID, the national intelligence director. The more important question is, organization or not, how do the two of us ensure that we are actually sharing the information so that--in coordinating, so that we are providing the information. And I think that General Hughes and I did have an agreement--and I know that he will tell me if we do not. I have a responsibility to produce raw information on all kinds of threats. So there are many missions where my path is very, very focused on the terrorism mission, and my job is to get him the dots and to get John Brennan the dots, frankly, so that they can produce the all-source analytic work and path in particular. General Hughes can then overlay them on the territory of the United States so that he can do the very hard analysis he has, which is to do vulnerability assessments and to provide countermeasures. So a good deal of our interaction is getting those relationships right. I have to serve John Brennan, and I have to serve Pat Hughes in order for both of them to be successful. So our 12,000 collectors of information out there are passing that information in such a way that it reaches all who have to act on it. Pat acts in a certain domain. John Brennan acts in a certain domain, and Cofer Black acts in a certain domain, as well as do our State and local and tribal partners. I hope that made some sense. Mr. Langevin. Thank you. Mr. Brennan. Maybe it is a difference in terms of our interpretation of the world scene, but I will stick with my earlier position that I don't think settlements work. I believe enforcement and compliance of standards, rules, regulations and the law--and if you look at the memorandum of information signing that was signed by Attorney General Ashcroft, Secretary Ridge and DCI Tenet in March of 2003, it lays out very clearly what the obligations are, the very positive obligations on the part of the law enforcement and the intelligence community, and those obligations need to be enforced and complied with; and so therefore--whether it is not--you know, an evaluation of somebody's performance, again, I don't see incentives, because I see that as more discretionary. I want to have compliance enforcement and make sure that the obligations--the positive obligations on individuals are being fulfilled. As far as the deputy's issues, I will defer to FBI and DHS on this, but I just don't think that the model that is proposed by the 9/11 Commission is workable. Chairman Cox. The gentleman from Connecticut, Mr. Shays. Mr. Shays. Thank you. All of you obviously are intricately involved in homeland security. I would like to know what you agreed with most with the 9/11, the recommendation that you thought was the soundest, the one you supported the most and the one you had the greatest reservation about. Why not the gentleman from Stamford, Connecticut answer first. Mr. Black. I think that is a good choice. I think in reading the report, the recommendation that jumps to mind is what I recall would have been the advantage of centralization in terms of leadership and resources. In this and other hearings, oftentimes you hear a lot of emphasis on an organizational chart, how essentially units would be integrated among themselves. I think in the past, we had very good people working very hard. I think it was over time from the 1990's underresourced. So I personally have put the greatest weight on the centralization of having a director of national intelligence. I think that is a very good idea. I also like the idea of a director of national counterterrorism. As a customer now being at the State Department, because I think there is great advantage to have essentially one-stop shopping. Otherwise, it invariably puts me as the customer and the State Department into the business of having to evaluate competing analyses. Competition is good. I think competition is good among the collectors and those that analyze information. It is not necessarily good in terms of the customers. The recommendation--maybe a little outside of the reserve of this--that I am a bit apprehensive about is that the idea of having the Department of Defense assume complete responsibility for paramilitary affairs. On the one hand, I like this very much, the greatest fighting force known to man. These are the people to go to, but I also at the same time think the Central Intelligence Agency is very adept at the use of clandestinity and that type of activity. So what I would encourage would be a solidification, a merger, not necessarily one subsuming the other. Mr. Shays. Thank you. Mr. Hughes. In my case, I agree with the recommendations on information sharing. I support everything they advocate. I think actually I would like to go further perhaps in achieving information transparency inside this community so that the professional persons who work in this community under a common security standard know everything that they ought to know in order to accomplish their mission. The thing that I like the least--there are two or three things I don't agree with, but I think the one that I will mention here is the organizational chart for the national intelligence director on page 413. I don't believe that they got that right in several ways, and I believe that the administration and leadership here in Congress should carefully review the ideas regarding that structure and the missions and functions that a national intelligence director would have. That is my view. Mr. Shays. Thank you. Mr. Brennan. I agree with what my colleagues have talked about as far as conceptually I agree with a national intelligence director and a national counterterrorism center. There is so much engineering that needs to go on in order to make both of those very successful, and I think that is what we are seeing right now. Quite frankly, the recommendation about having more streamlined congressional oversight I think is a good one. I think that is the way the executive branch needs to reshape itself so it does the legislative oversight function. The reference here that the President should lead a governmentwide effort to bring the major national security institutions into the information revolution, it is tremendously important that if we are going to achieve a national framework of sharing of information, that there needs to be this overarching effort on the part of the nation, not just the Federal Government, to ensure that we are moving together in concert as opposed to separate initiatives that are not in fact finding a way to meld together. Ms. Baginski. From our perspective, we were pleased with the FBI recommendations, I am sure as would surprise you. We were. But for us, the key recommendation is the director of the national intelligence director to allow the fusion of domestic and foreign intelligence. We are very excited about that. Like Cofer, my personal reservations are with the recommendation to transfer all paramilitary activity to DOD. I think there is some complexity there that probably needs study. Mr. Shays. Thank you. Thank you, Mr. Chairman. Chairman Cox. Mr. Meek. Mr. Meek. Thank you, Mr. Chairman. I want to thank our panelists that are here today. I just have an observation. I know we had the last panel with 9/11 Chairman and Vice Chairman Mr. Kean and Mr. Hamilton, and I just couldn't help but think about their experience in this area. I mean, you have a past governor, past speaker of the New Jersey House, and majority and minority leader Mr. Kean and Mr. Hamilton spent 34 years in this body, several of those years on the Intelligence Committee serving, doing this kind of work. You had 78 staff members on this 9/11 Commission that worked very hard over a period of 18 months, took a lot of testimony from everyday individuals, victims, families, also those that were injured in 9/11, professional staff, even in some of your own offices. Probably some of you came before the Commission. And, you know, I couldn't help but take an opportunity to look at and go through the 9/11 book and really read some of the--I just wanted to just talk about chapter 8, where it says the system was blinking red, and then you go on to page 254, and it said, the summer of threat. And then you can go to chapter 13 and it says, how do you do it? A different way of organizing the government. You know, that is the most, I think, interesting chapter in the whole book when you start talking about how do you reorganize a government. That is just something that doesn't happen overnight. General Hughes, I know you know that we had an opportunity and you were before our subcommittee, and it was maybe about 4 months you were on the job, and there is a lot of positive--and I want to commend you for your honesty, because a lot of the members on the Homeland Select Committee was, like, oh my God, we are in real trouble here, because this man doesn't have what he needs. You know, we talked about your clearance versus your No. 2 persons--or person clearance. If you caught a cold, he wouldn't have the clearance to be able to hear what you could hear, and you are the guy, you are the gate to getting information out. We have this commission that is saying that we have a problem, and I will tell you many Members of Congress, I was a Member of Congress when they passed the PATRIOT Act. They couldn't tell you what was in the PATRIOT Act. They just voted for it, and that is dangerous. And I feel--and I agree with you, Director, when you said we need enforcement and we need oversight. Well, you are testifying in front of a committee that is not even a committee. We are a Select Committee. We are temporary. We are like a syndication pilot that is out there right now, and we are here to hear you, but we don't even know if we are going to exist in the 109th Congress. So we can, you know, go through and talk about what we agree and what we don't agree with, but the bottom line and the final analysis, it is people like yourselves that are sitting on this panel, the panel before you, the Commission and vice chairman and the commissioners don't demand a professional committee in this Congress to be able to become professionals in what we are talking about here, then we are just spinning our wheels. And as far as I am concerned, with all due respect to my colleagues, to be able to pass something without a standing committee to say report to 88 committees so when something happens, the Congress can just do this, you know, is really inadequate and a disservice to those that have lost their lives and all this time that we are spending. So I hope as we start to bubble things up to the director's office and to other folks that are making major decisions, even to the White House as they start talking about who is going to have power and who doesn't have power, that there is some discussion about sharing some of the decision making and also some of the thought as it relates to protecting the homeland with the Congress. And some folks are going to have to give up power in this Congress, and for folks to start doing the Potomac two-step saying we have done something when we really haven't in the final analysis, it is really a disservice. So I would hope--I am not asking you to make a career decision, but I am making a statement here today. But what I am saying is that we have to man-up, woman-up and leader-up to be able to let folks know that it is imperative that we have this kind of oversight, because if we don't have it, you can go before 100 committees before you circle back around to this one, but we can say can we pick up where we left off. And we have this 9/11 report out, and we are not the only ones reading it. I guarantee you that it is in the hands of terrorists abroad and domestic looking at where they can see through our lines of what we feel the defense that they know is not defense and take advantage of it. So to move fast and quick is important, but to also have what we need is also important. I share that. I am on the Armed Services Committee that meets in this room. I shared that with the panel that came before us. I am sharing it with you, because I think it is the most important thing that we can do in correcting the oversight and making this Congress aware of what is going on and paying a service to those of you that are working professionally in this area to have members that understand the issues and are able to get you what you need as it relates to oversight and authority and all of those things what comes along with it. So I just want to--Mr. Chairman, I am sorry for going over the time, but I just want to share with the panel if they can please pass that on to their superiors and colleagues. Chairman Cox. The gentleman's time has expired. The gentleman from Virginia, Mr. Goodlatte. Mr. Goodlatte. Thank you, Mr. Chairman. Mr. Brennan, currently the Terrorist Threat Integration Center, TTIC, does not collect intelligence. That function remains among the various other agencies within the intelligence community. TTIC analyzes the information provided by the community. How can a TTIC analyst trust raw data when he or she is not provided with some analysis on the background of the information, and how would the National Counterterrorism Center that is been proposed avoid this stovepiping that the report describes is a problem? Mr. Brennan. Well, first of all, TTIC has access not just to the raw data, but the information that sort of underlies that in terms of information on sources. We have real-time access to the FBI's information system so that when an electronic communication comes in from New York into FBI headquarters, we see it at the same time the FBI headquarters sees it. When an operational cable comes in from the CIA, from overseas into CIA headquarters, we see it at the same exact time. So we have full insight, full transparency into that, which really helps to educate the analysts and inform them about the nature of the information that they are seeing so they can, in fact, tell us where it came from, how it was acquired, and as Ms. Baginski said, the pedigree of the information and the sourcing. The national counterterrorism-- Mr. Goodlatte. Let me ask you, with regard to that, do you feel that then that TTIC is already serving some of the functions of this suggested National Counterterrorism Center, then, if you are already-- Mr. Brennan. By all means. In fact, the Commission says that the National Counterterrorism Center shall be built upon the foundation of TTIC, because TTIC right now has been charged with the responsibility to access the information and provide all-source analysis that will integrate the information that is collected domestically as well as from abroad; so yes, we are far down this road to the National Counterterrorism Center analytic responsibilities. Mr. Goodlatte. Will the Center add another layer of bureaucracy, or will it enhance the process? In other words, in other words, we don't want information--the problem we had in the past is information would be gathered and it would lie on somebody' desk in somebody's computer and not get in the hands of people who can act upon it. The more people who can lay their hands on the information it could mean more people are aware of the problem and get to address it, or it could mean it has got to go through one more channel before it actually arrives where it is needed. Mr. Brennan. Our obligation is to make sure we leverage that information to make it available to the different departments and agencies, and I talk about the architecture that is required in order to allow different departments and agencies to search against the largest volume of information so they can bring up the information that they need in order to fulfill their missions. So what we are trying to do right now and the administration is to determine exactly what this National Counterterrorism Center should, in fact, include and involved. The 9/11 Commission talks about basically two distinct functions that TTIC does not do right now. One is joint operational planning and the second is doing net assessments, which is, you take the threat and the capabilities of the terrorist organizations and you apply it against the vulnerabilities and the infrastructure that is going against. We don't do that kind of assessment now. Mr. Goodlatte. As I understand it, TTIC is overseen by the CIA; is that correct? Mr. Brennan. No, it is not. It is a direct report to the Director of Central Intelligence. So I don't have anybody in the CIA to go through, directly report to the DCI. Now, the DCI is dual-hatted as well as the director of CIA as well. Mr. Goodlatte. And how will this new--in your view. I don't know if it is specified in any of the discussions you have had already, but how will the new National Counterterrorism Center fit into that framework? Is it going to be overarching above all of the different intelligence agencies, or will it also be under the direction of the director of the CIA? Mr. Brennan. Since it doesn't exist yet, I can talk about what the 9/11 Commission recommends, which is that the National Counterterrorism Center would be a direct report to the national intelligence director, so that it would not, in fact, go through any individual department or agency, but those digs are yet to be made about that-- Mr. Goodlatte. Would that alter--in your view, would that or should that alter who you report to and where your organization lies in that framework? Mr. Brennan. I think the reporting chain right now from TTIC to the Director of Central Intelligence is the appropriate reporting chain of command, and if, in fact, a national intelligence director position is established, I believe that the director of the National Counterterrorism Center should report to the national intelligence director. Mr. Goodlatte. So you think it should or should not be changed if that entity were created? Mr. Brennan. I don't think that the--well, you will have a different person at top if the national intelligence director position is, in fact, legislated. Mr. Goodlatte. And you would report directly to them or continue to report to the director of Central Intelligence, in your opinion? Mr. Brennan. Well, the national intelligence director would take the place of the director of Central Intelligence, and so in the future, if what they are proposing here, the director of CIA would be separate from the national intelligence director, so you would have two people there. Right now you just have one. Mr. Goodlatte. I understand, but which of those do you think you should be reporting to? Mr. Brennan. The national intelligence director. We should not be embedded in one single department or agency since that transcends those individual mission responsibilities of individual departments and agencies. Mr. Goodlatte. Very good. Thank you, Mr. Chairman. Chairman Cox. Mr. Turner. Mr. Turner. Thank you, Mr. Chairman. Mr. Brennan, you have been a very active proponent of an integrated information- sharing architecture, and you have talked a lot about your efforts to get us there. You mentioned in your statement that as of the end of this month, you will have six separate networks that will be integrated in such a way that searches can be done on all six separately accessing those networks as you do now at TTIC. What networks are those going to be that are now going to be integrated? Mr. Brennan. Believe it or not, it is different and distinct CIA networks. There is the CIA classification-- classified system. There is the unclassified system. There is the open-source information system, the FBIS. And I will get back to you with precisely which of those networks, in fact, will be ready by the end of this month. Mr. Turner. When you make the effort to get integration, who leads in that? Who provides the necessary leadership, as you have said, to basically say this has got to be done, we have got to integrate these databases? Who does that? Mr. Brennan. Right now there is an information program sharing office that TTIC chairs that includes the Department of Homeland Security and the FBI. It is to fulfill obligations that are contained in the MOU and information sharing in March of last year, and so there are a number of individuals who are a part of this information-sharing program office and a number of groups that have been established to address issues such as third-party rule, originated control, tear line standards and other types of things. So it runs across the different agencies and departments, these there is nobody at the top. Mr. Turner. Governor Kean this morning, in his oral statement, as well as his written statement, said, ``Only presidential leadership can develop the necessary governmentwide concepts and standards,'' referring to information sharing. Do you agree with that? Mr. Brennan. I think looking across the different departments and agencies and based on the statutory authorities, vested in those departments and agencies, it would then go to presidential leadership to initiate an effort on the part of the executive branch to work with the Congress, to be able to transcend those different bureaucratic boundaries. Mr. Turner. Do we have any timetable that has been set forth by the President for integrating these databases? Mr. Brennan. There is a timetable that we are operating within in the intelligence community structure to try to bring those different elements of the intelligence community architecture together, and I believe that the administration said that every one of the commission's recommendations are being followed up on and acted upon, and I know that there are efforts underway to try to address that specific recommendation here. Mr. Turner. But do we have timetables? Do we have benchmarks, goals that we are trying to integrate a certain number of databases by a certain date? Do we have an overall objective that is expressed as a time frame within-- Mr. Brennan. Across the U.S. Government? Mr. Turner. Yes. Mr. Brennan. I don't believe. I would defer to the Office of Management and Budget on this issue since it, again, goes across them. We have one for TTIC internally. Mr. Turner. All right. When I look at the changes that are recommended by the 9/11 Commission in the area of the counterterrorism center, it seems that TTIC would be absorbed into that new organization and that this new responsibility of planning, joint planning, as they refer to it, would be an additional responsibility. Is it your view that this new counterterrorism center is the best entity for carrying out that kind of joint operational planning? Mr. Brennan. There is a lot that is to be defined by the term ``joint operational planning'' and what would actually be done within the center and what would be done outside in those individual agencies, departments that actually carry out those operations, and that is what the discussions have been taking place over the past two or three weeks have been, to try to define that appropriately to make sure that we continue to have chains of command between cabinet officers and the President, the White House and the Security Council. So I am a strong opponent of a National Counterterrorism Center, but, again, like other things, the devil is in the details here, and you have to make sure that you understand what you want to invest in that entity and what you want to leave outside. Mr. Turner. One of the comments that was made, I believe by General Hughes, expressing some concern about the proposed structure of the National Counterterrorism Center, am I correct to assume, General Hughes, that your concern relates to that portion of the proposed counterterrorism center that requires a deputy national intelligence director to oversee the operations of DHS and specifically the operations of your particular directorate? General Hughes. Sir, I believe that I don't think they have got the organization for the national intelligence director right, not the National Counterterrorism Center. Mr. Turner. Oh, all right. I am sorry. General Hughes. Sure. Mr. Turner. You agree with the proposed organizational chart on page 413 that you refer to? General Hughes. I do not think it is what we ought to do. Mr. Turner. Well, so specifically, what on that chart on page 413 do you disagree with? General Hughes. As a personal view, not representative of the DHS consolidated view, my personal view is that there should be three principal deputies, one for foreign intelligence, one for domestic intelligence and one for community management; and beneath those three principal deputies--and there could be other principal deputies, too, though. I am not sure, but I think the division of labor between foreign and domestic is an important issue to keep in mind in a bureaucratic sense. Beneath those principal deputies, I personally think that there are to be an array of organizations and entities. Some of them would be the departments and their intelligence organizations that currently exist. Some of them would be offices and functional areas of the intelligence community that currently exists or may need to exist in the future, and of course there would be centers like the National Counterterrorism Center reporting directly to the national intelligence director. So it is kind of a mixture of issues here, and I personally do not think the three-deputy mechanism that is portrayed on this chart is the right approach. It doesn't incorporate all of the issues that the national intelligence director is going to be faced with. So I have a different hierarchical, organizational view than that portrayed by this chart. Mr. Turner. All right. Thank you, sir. Is my time up? Chairman Cox. The gentleman's time has expired. The gentleman from New York, Mr. King. Mr. King. Thank you, Mr. Chairman. I want to thank, again, all of the members of the panel for their appearance here today, and I would like to direct my question to Ms. Baginski. On the question of sharing intelligence and sharing information, I would like to focus on the issue of sleeper cells in this country. For instance, if you could give any detail on the extent of cooperation that you are receiving from the Muslim community, and when you do get information, how quickly would you share raw data, for instance, with the local police? I am thinking of the NYPD, for instance, where they have a number of mosques, where they received information that maybe isn't actionable but may be of some means to the NYPD who has its own operations going. How quickly in real-time would that type of information be made available to the NYPD, and how closely is the level of cooperation at that level? Ms. Baginski. I would characterize the level of cooperation maybe three months ago and the level of cooperation today, and I personally have been involved in a lot of very hard work to close some of those seams. What we did for the Republican National Convention was actually to accomplish an information architecture that made us actually write down the protocols for passing this information quickly, beginning with what it was the NYPD wanted from us, and this is just a first step, but we have, I think, very, very good working relationships when we are in a crisis situation and when it is identified as such. I think we have work to do to make that the way we do business every day, and in a ready sense, we pass information to them, but also my talks with Dave Cohen have been about them passing that information to us and through the JTTF construct. I am very encouraged. With the working with a foundation who is actually helping us pull this together and engineering what the information sharing should be, and I have this responsibility myself given to me by the Director to make sure that we smooth this out in concert with Pat D'Amuro and Chuck Frahm, who is now up there, and I think we are making enormous strides, but we still have much work to do. Mr. King. Now, David Cohen, the one you deal with from-- Ms. Baginski. Yes. David is the one I will deal with. We are going to do intel to intel so that we have the strength in that relationship that we have always had ops to ops. Mr. King. How concerned are you with the issue of sleeper cells, and I am concerned particularly with the city of New York, but nationwide. Ms. Baginski. I think we are always concerned about what we don't know. What I am encouraged by is that we have begun to attack that issue as an analytic problem, which is to say if there were, how would you find out, and then finding clues from intelligence reports that tell us they will use these kind of operatives, they want to come in from this kind of area and actually begin a full-court intelligence press to try to locate such cells. So I am encouraged with our methodology, and I am encouraged--I am concerned just as any citizen is with what we don't know. Mr. King. Do you believe you are making progress in developing sources in the community? Ms. Baginski. I do indeed. Mr. King. And without going into much detail, is much of the information you are getting overseas from overseas relating to operations here in the United States? Ms. Baginski. I think that is fair to say, sir. Mr. King. Thank you very much. Chairman Cox. The gentleman from Mississippi, Mr. Thompson. Mr. Thompson. Thank you, Mr. Chairman. Based on the 9/11 report and everything you have learned to date--and I am speaking specifically about Iraq--what additional steps can we take to ensure that the mistakes of the past won't be repeated? And it is based on this issue of faulty intelligence and the notion of weapons of mass destruction and a lot of other things. What have we done since the invasion of Iraq from an intelligence standpoint to get better intelligence from the field? Ms. Baginski. I can take a stab at it, and this would apply to, I think, all threats, not just Iraq. There may be a difference between faulty intelligence and faulty intelligence analysis or insufficient intelligence analysis, but for us it is actually the core approach that we are taking to the whole business of intelligence, which is to understand at the base what information is necessary to make decisions but also accurately report what we know and what we don't know in terms of doing the analysis and then dedicating resources that specifically have the full-time job of positing hypotheses and then interacting with the data to prove or disprove certain theories. So we have issues of analytic bias. We have issues of reporting only that which we have information on but not necessarily stepping back and saying, well, these are pieces of information that we have, but what are the pieces we don't have that would be necessary to actually help us make those decisions. So mine are less about Iraq than analytic methodology is what I am actually responding to. Mr. Thompson. Well, I guess in layman's terms, help me out. Who would make the call in terms of the intelligence that was being reviewed? Are the agencies now talking to each other so it would be a joint decision as to what this intelligence really means, or are we still separate and apart? Ms. Baginski. No, sir. I do not think we are separate and apart. I think that under the existing DCI, there have been processes and procedures that begin with national intelligence requirements and joint community assessments on issues that are actually performed, and all of us are, I think, very keen to improve the analytic methodology, the analytic discipline and the analytic trade craft that goes into providing those assessments to include competitive analysis and what others might call contrarian analysis. Mr. Brennan. The whole concept of TTIC is to bring together those different agencies that have a shared responsibility to make sure they are sharing information, that they understand each other's assumptions, to make sure that there is a full transparency into sources and methods and so that there is no mistakes made or to minimize the chance of mistakes. You want to put a rigor in analytic effort, an think that is what we have done in the terrorism environment, and so TTIC, which is very innovative within the U.S. Government, is basically the embodiment of FBI and Department of Homeland Security, State Department, CIA working collaboratively together to share that information and provide integrated assessments, working with them to identify if there are differences of view, you don't want to have just group think. You want to make sure that you are able to present different hypotheses and different perspectives, so this, in fact, is giving birth to trying to do this in other areas as well such proliferation, and so there are initiatives underway to try to have a proliferation, in fact, integration center. So I think the lessons of 9/11, the lessons of Iraq have really propelled the government as a whole to try to find ways that you can share this information and have the best darn analysis and output possible, and that has to be fueled then by enhanced complex and TTIC doesn't do collection, but, you know, the FBI and CIA and others are, in fact, trying to improve their entire collection effort as well. So it is a cycle of collection, analysis, dissemination, the entire system. Chairman Cox. The gentleman from Oklahoma, Mr. Istook. Mr. Istook. Thank you, Mr. Chairman. Before I ask another question, I would like to go back to what was hanging out there when my time expired earlier. I would like to make sure that I understand clearly, against what lists or databases currently are people checks when they are either, one, seeking to become a citizen, or they are seeking an adjustment in immigration status, whether it be permanent residency, entry-exit visas? What are those lists against which they are currently checked? Is there a difference between the lists against which they are checked depending upon whether it is naturalization status and so forth? And the last part of that is when will any differences be resolved? When are other cross-checks supposed to be coming online? General Hughes. If you don't mind, I would like to get you a written answer to that question. I think it is a very good question, and we ought to give you the right information. It is a little too complex for me to relay all of the databases or lists that are now used and whether or not there are some problems with one check being made with one group of knowledge bases and another check being made with another group of knowledge bases. So I would like to reserve an answer to writing, and we will provide it to you as soon as we possibly can. Mr. Istook. I would appreciate that definitive answer, because obviously what I am concerned with, as I expressed earlier, is potential blind spots, and we know that this is part of the overall data integration that we are seeking to resolve. Let me go on to the second topic. There was a lot of discussion about culture changes when you have the different information agencies, the consolidation of the homeland security, the potential further consolidations or revisions. According to the 9/11 Commission. And we have had discussion about culture changes among the Federal agencies, but culture changes are not confined to those agencies. You have a huge country, and if we want to take advantage of the citizenry, of the private sector, of the local and State, the law enforcement officials and take their knowledge of and put this to work, then we have to understand the culture of the country. I think Governor Kean certainly made that point this morning, when he said that if we have everybody focused upon homeland security and we are able to use their input, then we are going to achieve the results that we want. We have more people helping. But when there is constant change in the lines of authority, in the organizational structure, you confuse those potential people. A private citizen, if they see some sort of suspicious activity, typically will think of calling one of two law enforcement agencies, I believe. They will contact their local police, or if in their mind they say, well, this is something bigger, they are going to think of the FBI. They are not going to think of any of the alphabet soup of other agencies which we are discussing about the reorganization. I am concerned that further reorganization may create problems with culture change that requires a culture change of the entire Nation if we do not give easy-to-understand lines of authority that the private citizens can understand so that they can therefore be active helpers in our war against terrorism. I would appreciate your comments and feedback on that concern. Ms. Baginski. Yes, sir. I would actually like to start with that. I take your point, and I think it is a very, very important point about passage of information to State and locals. What I would like to highlight here is our agreement with you that this is terribly complex, and what we actually think is the solution, which is the Joint Terrorism Task Forces that we have had for many years, but I think as we have said earlier today, we are up to almost a hundred of them, which are literally that, joint task forces, State, local, tribal, DHS, intelligence community personnel, all in one area so that when that information is received that you are talking about, there is one place to go, into that task force, information is received, and there is the network that can pass it on to all of the people who need to know and to the appropriate people to act. So I think in the operational construct what we have hit upon is a JTTF, and I think those things are some of the best operational paradigm I have ever seen. Whichever-- Mr. Istook. A private citizen is not going to think of a joint task force. Ms. Baginski. But that is the FBI is the point I am saying, they would call the FBI, and that is done under their-- Mr. Istook. They are the clearinghouse. Ms. Baginski. Yeah. And so General Hughes and I, our work is about ensuring that 99 know what the 100th is doing and getting that information passed between them for analysis, and that is what we are working on. General Hughes. Well, I think, first, I agree with your sentiments, and I think it is a concern. It is something we are going to have to work on. I am not sure if a single agency or a single organizational element can do the complete job. I am not positive of that, because there are differences between providing information to a law enforcement organization, providing information to a homeland security organization, providing information to an intelligence organization, specifically, and then providing information to other organizational entities that respond to the people of the United States. Those differences have to be accounted for. I, indeed, think they are a part of our culture. We haven't got it right yet, but I think we have a lot of ideas and possibilities, and out of the 9/11 Commission report, this issue is being discussed and considered. As I think Chairman Cox asked me a question earlier about how the possible changes would affect the Department of Homeland Security, and I think there will be some changes coming to our Department out of the 9/11 Commission recommendations, as there probably should. We need to adapt and find the right pathway toward the future. Just what those are, it is premature to say, but if you could just accept the idea of that I personally agree with your concerns. I think the Department of Homeland Security has your concerns in mind, and we are going to try to achieve the right answer for our country and our culture. Mr. Istook. Thank you. Thank you, Mr. Chairman. Chairman Cox. The gentlelady from California, Ms. Sanchez. Ms. Sanchez. Thank you, Mr. Chairman, and thank you all for being before us today. I have three quick questions. The first one is to Mr. Brennan. When my colleague, Mr. Meek, was questioning you, you said TTIC has been charged to analyze what has been collected. Who gave you that charge? Mr. Brennan. I am sorry. Could you repeat that question? Ms. Sanchez. You said that you had been charged to analyze the information that had been collected who gave you your charge? Who gave you your charter? Who put you up? How did we create you? Where did you get that charge from? Mr. Brennan. First of all, the President announced in January of 2003 in the State of the Union address that was directing the director of Central Intelligence and the director of the FBI to form an integration center to deal with the terrorist threat. I was appointed in March of 2003. In May 1st we stood up. The Director of Central Intelligence issued a Director of Central Intelligence directive in May of 2003 that laid out under the DCI's authorities what the responsibilities would be of the Terrorist Threat Integration Center and what my charge and the charge of the TTIC would be. Ms. Sanchez. What would you say to some of my colleagues here in the Congress who believe that as a joint sort of situation, really not under the jurisdiction of any particular statute or place in the Congress to have set you up, that, you know, they are not very happy, they don't feel that they have much oversight, much control or much ability to bring you forward and sort of figure out what you all are doing? What would you say to that comment? Mr. Brennan. I would say it would be incorrect, because I have appeared in many different committees and subcommittees over the past year and a half. I think this is the third or fourth time I have appeared here. I also hope your colleagues would say that it is very good that the executive branch has found a way to bring together those different systems and agencies with shared statutory authorities and work together collaboratively in an integrated environment. I hope that is what they would say. Ms. Sanchez. And then I have two other questions that I would ask of any of you or all of you. The first is what do you say to--you know, we are not the only ones who hopefully are reading this report, but there are a lot of Americans out there, and one of the things I am struck by when people ask me this, you know, we want to create this big position of a guy or gal overlooking intelligence. They are going to be in charge of these 15 agencies or departments or pieces or there might even be more, as some of us know. What would you say to the question about don't you think a lot of these agencies are duplicating effort or have the same information or why didn't the Commission address getting rid of some of these or really rearranging things? What would you say, you know, to those people who say we just don't need to put somebody at the top and then put everybody underneath? Why don't we really make a reorganization? That would be that question, and then the next question would be what role did each of your agencies play in the analysis of the information that Al-Qa'ida was trying to target the financial buildings in DC, New Jersey and New York City? And do you agree that Secretary Ridge should have issued that warning? Mr. Brennan. On reorganization issues, I think it is a very worthwhile question to take look at all of those different intelligence agencies and what the responses are, and the ones that have been in fact set up by individual statutes. So I think that is an appropriate question for a review to take a look at ultimately. Regarding the role of TTIC in this analysis, we, in fact, were working very closely with the Department of Homeland Security, FBI and others, as that information was coming in, and we had to integrate the information and put it in a context for the Department of Homeland Security. And we worked very closely with Secretary Ridge as he moved forward with his announcements and decisions. General Hughes. And I will chime in now and say I agree with the idea that these are very good questions to ask, and we should consider them in the future. With regard to the duplication of effort, the plethora of organizational entities and functions, we ought to try to more carefully consolidate and focus our efforts in some way. With regard to the role that DHS played, we were the recipient of information from others. We examined that information in the cold light of day. We determined that we had a duty, and in fact, a promise to the American people to warn them about information that rose to the level of detail and importance that would generate an action on our part. The Secretary made a final decision in consultation with the other secretaries of the government and the leaders of the executive branch and went forth with the more precise raising of the alert level, focused on specific facilities that you know occurred. Not a generalized alert, not a broad warning but a very specific kind of function based upon the information. I, as his intelligence officer, advised him on that, supported him on that. I believe that it was the right decision, and we did the right thing in this case with regard to our duties to the American people. Ms. Baginski. We received and reviewed a lot of the raw intelligence, shared it immediately with both of these gentleman and with Cofer as well and are fully supportive of the action that the Secretary of Homeland Security took in issuing the warning. In terms of a duplication of effort, I think you are absolutely right to raise this issue, that it is a very fair thing to do, and I think as the President has made very clear, nothing is off the table as we look at intelligence reform. Mr. Black. Lastly, I would just add having a strong national director of intelligence would allow this man or woman to rationalize the intelligence system so there would be some economies. One would hope along those lines. I think the warning was appropriate. The Department of State was a recipient of this information, and our function was to communicate it overseas to our embassies and see if there is anything that is applicable to U.S. interests overseas. Chairman Cox. The gentleman from Indiana, Mr. Souder. Mr. Souder. Thanks. I first want to say to Mr. Brennan, I agree with you. I am glad the President didn't sit around waiting for Congress to act. He needed to act far faster than we are going to get legislation done, and I appreciate that he attempted at least to bring as much fusion as possible. I also want to thank all the men and women in your agencies, because, in fact, we have intercepted at least many potential incidents, and that is because of our increased efforts. It is not perfect. We clearly are moving far ahead, but we should thank the patriots on the line who have risked their lives and who have, in fact, averted continual incidents. But one thing that really troubles me about today's hearing. I raised it in the first panel. We go there this big report and we talk about new information systems. I spent 3 years doing hearings on our borders and sitting in the booths with our people, but, you know, if they don't have an accurate ID, we put them into a system, and we don't know whether it is the same person. So it isn't going to pop up if they are a terrorist that they have a fake ID. I have been at the State Department desks and other places. If the ID changes, they get false ones, they use different names, hey, our whole system, the idea of intelligence is that you are pooling, having a whole bunch of meetings about people who may have 16 different names in common with a hundred or thousands of other people in the United States. We have already had cases of identity theft where people have stolen people's IDs, and then one of the most common questions I get from Republicans, Democrats, all kinds of people in my district, is how do I get off a watchlist? Well, if we had a biometric indicator, whether it is an eye or a fingerprint or a watermark so that you can't be duplicated, then we wouldn't have this problem. How in the world do we justify to the taxpayers not doing this type of thing and investing millions of dollars in new border equipment, millions of dollars at the airport? Every airport screener I talked to says it is so hard to match any kind of ID with the ticket. People's pictures don't look the same. You are guessing. These people have multiple names. How can we even be discussing all of this investment, billions of dollars, if everybody is afraid to go on record and say, look, this whole system isn't going to work unless we know the person we are dealing with is the person we are looking for? Any comments on this? General Hughes. Well, first, I think your characterization of this is right. It is a very difficult job, and we are not doing it perfectly in all cases. That is for sure. I will have to tell you, sir, that there are others who have a differing view. They view a biometric identification as a controlled by the government as a potential for misuse. There are other issues involved here, collecting the biometric, placing it in an identification medium that could be relied upon, suffering the cost of doing this across the country. That sort of thing is all the problems that we are trying to come to grips with. On the face of it, emotionally, I agree that we ought to have a reliable form of identification for persons who come into the United States and those who reside here, but for the reasons that I mentioned and many others, it is proving harder than mere sentiment. Mr. Souder. Let me follow up on that. Let me ask for the record--and you can just say yes or no--do you all agree, because certainly in material that has been released, that American citizens are included among the terrorist risks. It isn't just people who are foreigners. Let the record show do you agree with that, Mr.Black, that there are American citizens who are on terrorist watchlists as well? Mr. Black. I think it would be prudent to assume that, yes, sir. Mr. Souder. And do you agree that we have had some reports now of people being contracted as mules like in narcotics where people could bring money in for terrorists, people could bring other things in who are American citizens, who get contracted like they do in narcotics. They might not even realize they are part of a bigger plot but can do that. In other words, this just isn't about foreigners, and furthermore, it isn't just about American citizens who go across the borders. It is about--and even for those foreigners, they can get false U.S. IDs. I have been against the national ID card. I am one of the conservatives who had a fear about this, but I don't hear anything that you are telling me today that gives me any comfort if you don't know who the individual is, and that the civil rights question, it can be done with a watermark. There are other ways to do it other than something completely invasive, and besides that, if you are following the law and you have an eyeball scanner or a fingerprint, what is invasive about it if you are following the law? You have a social security number already, or you are supposed to in the United States. We have driver's licenses. What is the difference between a number with a picture--and a picture on your driver's license and a picture that actually is proven to be yourself as opposed to a phony picture? I don't understand why a picture on a driver's license--I have a lot of Amish in my district. They are objecting to the pictures religiously, because they don't believe in a photograph, a graven image. OK, that is a problem on a spiritual way, so then they should have a fingerprint, but we actually require a picture of people, a number of people. I don't understand what exactly the civil liberty question here is and what is evasive--invasive about a fingerprint or an eye print as opposed to a picture and a number. That is the part I don't understand, and it is important, I believe, for the people who are doing this to let the American people know that we are dependent on the stupidity of the terrorists to use their real name. That is basically what we are right now. That is what we are dependent on, to use the same ID with the real name. We just took down two fake IDs places in one of my mid- sized counties that were producing fake IDs. We are completely vulnerable unless we address this question. General Hughes. Would you mind if I just gave a very brief reply to the last issue? Chairman Cox. Please do. General Hughes. We do use fingerprints very successfully, sir, to identify persons. We do it at the borders, and we do it internal to the country. Mr. Souder. Thank you. Chairman Cox. The gentleman from Massachusetts, Mr. Frank. Mr. Frank. Ms.Baginski, I apologize. I took about 20 minutes off to do business, and I missed your colloquy with Ms. Jackson-Lee, and I apologize for that and I want to go back to it. I will tell you why I am disturbed. I was at the Democratic Convention, and the way the protesters were treated there was simply wrong. We had a case, for example, in South Carolina of a man who is now being prosecuted federally because he was carrying the wrong sign in a free speech zone, not that he was carrying a sign but it was the wrong sign. And I understand the need for security. I also think too much attention is being given to our desire not to have our feelings hurt and that it isn't always easy for you to sort out, but I am troubled by this, and I am troubled again by the preemption doctrine. I don't want people to commit violent acts, but I don't think law enforcement should be spending a great deal of time--preventing violent acts, yes. If you have got intelligence, fine, but questioning people, questioning people about what they know, asking them what their plans are and then getting into their politics, which I am told sometimes happens, seems to me entirely inappropriate. And the opinion or quote in The New York Times dismissing the chilling effect as being outweighed as the potential for cutting out grounds, yeah, you have a right to cut out grounds, but I think the chilling effect ought to be a fairly high barrier. I am told you said there were legitimate needs. I would like to ask this and get it back in writing. How many inquiries did the FBI make with regard to the two conventions? How many different individuals were questioned? And I would like--and I appreciate what you said about getting out information and sources. So forget the sources and methods. What kind of crimes were you trying to forestall? You mentioned a couple, but what were the leads, and so I would like to know how many people were questioned, how many leads were there, and of what sort of crimes? Because I really am troubled. Now, you tell me that nobody was questioned unless there was a reason to think that he or she--let me ask this, that they were going to engage or violence or they knew someone who would? Which is it? Ms. Baginski. I think it is both, but I would be loath to comment. I think your solution is the right one. This is a very reasonable request. Mr. Frank. I will tell you in the interim one of the things I did when I went off was to write to the Director to tell him that I was troubled by the New York Times article; if it was accurate, it seemed to be an overreach. So I would really like to know how many people were questioned? And it is hard--I know the people in charge don't--we don't like to be yelled at, some of us. Some of us don't mind. I find if you don't like being yell at, then you lose your right to yell. I would rather preserve both. But the other point we have is this: I know it has sort of been ramped up since September 11, but they are unrelated. September 11, the terrible tragedy of September 11, the murdered innocent people, it is no reason to interfere with what people say, and I am troubled by what seems to me to be a crossing of that line. Ms. Baginski. We appreciate your concern. We do not consider that article to be accurate, but we will provide the information. [The information follows:] [GRAPHICS NOT AVAILABLE IN TIFF FORMAT] Mr. Frank. Let me ask you while I have a couple of minutes left, you heard Mr. Kean and Mr. Hamilton talk about this proposal for a board that would look into privacy and civil liberties. Do you all endorse that? Are you familiar with that recommendation? It would be particularly relevant to General Hughes and Ms. Baginski, but to everybody, do you endorse that, and what kind of powers would that board have? Would you agree that such a board ought to be able to commandeer any information from you it would want, the government officials? I would hope that if we had such a board, they would have a pretty firm right to go to any of your agencies and get the information with appropriate secrecy that they had. Would you be supportive of such a concept? We will start with Ms. Baginski. Ms. Baginski. I am sorry. Yes. I think that that kind of concentrated look and responsibility at the whole civil liberties issue as we-- Mr. Frank. I am talking specifically about their right to go to you and say we--you know, really full investigative powers, almost like an inspector general across the board with a civil liberties mandate. Ms. Baginski. There are many bodies that have that responsibility now. Mr. Frank. I am asking about this one. Ms. Baginski. I wouldn't hesitate to give that kind of information to any of the investigative bodies. If such a body were created, we would certainly do the same. Mr. Frank. General, you would be relevant as well. General Hughes. I think the answer is, as I tried to express earlier, if such a board is needed-- Mr. Frank. Is such a board needed, General? Let me ask you a question. You have had a lot of opinions. I have been impressed by a lot of them. It is a little late for ``if.'' Do you think such a board is needed? General Hughes. Yes, I believe it is. Mr. Frank. Thank you. And you think it should have then the full powers? General Hughes. I think it should have full powers, but it should follow the same rules as the government officials whom they are asking information from with regard to the safeguarding of the-- Mr. Frank. Absolutely. Thank you. Chairman Cox. The gentlewoman from California Ms. Harman. Ms. Harman. Thank you, Mr. Chairman. Chairman Cox. I am sorry, Ms. Harman. I did not see that Mr. Shadegg was here. So we are going back and forth. The gentleman from Arizona Mr. Shadegg. Mr. Shadegg. Thank you, Mr. Chairman. I appreciate all of your being here, and I appreciate your testimony. I think you have given thoughtful input to us on which of the recommendations are most valuable and which you have concerns about. I have some concerns about some of them. I particularly have concerns about the issue of whether or not a clandestine military effort should be, in fact, handed over to the Department of Defense. I am not certain that it isn't important to preserve that capability within the CIA. But the issue I want to focus you on is one that orients itself towards human nature. The 9/11 Commission has recommended that the current spoke-and-wheel structure of our intelligence network where each agency cannot look at the other's database needs to be replaced with one where each agency can look at the other's database. While I see an advantage to that in terms of making sure that the information is out there for everyone to see, I am worried that human nature will cause that to cause perhaps a diminution in the value of the information that is put into the database. It seems to me that human nature might cause an agency to put on the database--I don't want to be harsh about this, but there might be a tendency to put on there only things that were not particularly valuable, only things that they knew everybody else already knew, or only things that they were willing to let others know, and if it was this key bit of information that they wanted to take advantage of, it might not be put on the database. Short of--when I asked the Commissioners, the two vice chairs, cochairs, who were here earlier this question, their response was, well, that is why we have a singular czar overhead--I guess ``czar'' is a word not to be used--a singular person in charge over top to lay down edicts to force that data to be placed into the information network so that it can be accessed by everybody. I am interested in, since you deal with this kind of data all the time and these kinds of incentives, your thoughts on how we approach that problem, or perhaps it is not a legitimate concern. We can start with whoever has strong feelings on it. Mr. Brennan. The term ``database'' is used in different ways by different people. You can be talking about one set of data that is all together, that is just melded together, and everybody has access to that big soup, or you can talk about a database in terms of the distributed architecture where you have connectivity between the different data holdings that reside in different networks. And I think what the Commission is looking for is to have some type of overall architecture where there are connections between those different data holdings and data networks so you can pulse them to bring up the information. That doesn't mean that everybody has access to everything, because I think that would be just a disaster. You want to make sure you maintain compartmentation for those things that need to be compartmented, but you want to make sure you make available to those individuals who need the information everything that should be made available to them. So I think it is more of an architecture as opposed to a single database. General Hughes. I will just add that some elements of the information should not be visible to everybody, but the essence of the information between databases I believe should be available generally. We should figure out a technical way to compartment sensitive sources, methods, and other identifying data that would give too much information to the broad user; but the essence of the data can be somehow provided to the larger audience. And I think that is a direction we ought to go in. Mr. Shadegg. Ms. Baginski, did you have-- Ms. Baginski. Very similar to my colleagues, I think the truth of the matter is that when we each built our individual databases, there was never any thought about their utility outside of us. So what has happened is we have mixed things that are legal and things that are source and method, and so sometimes it looks to you like we are always saying no, but really you either have an all yes or all no answer. I mean, we haven't set these up to be flexible. So my view is the solution is what you want to be able to do is essentially what you do in your living room, right, or wherever you might do your own Internet work, which is to do federated queries across disparate databases that are structured similarly so that they provide you results and answer questions that you may have. And what that is going to require is for each of us to agree to different standards, data standards, flagging, tagging, and the separation of the source and method so that we can provide that access, and I think-- that is where I think we are moving. Mr. Shadegg. If you move in that direction, will there then not be a problem with agencies withholding data from that database which is accessible to other agencies? Ms. Baginski. There will be less of a problem. I guess we learn to never say never, right? But there will be less of a problem if the sourcing material is not automatically linked to the data. I think there will be less of a problem. Mr. Shadegg. So one agency would be able to get the data, but not necessarily the source of that information? Ms. Baginski. Exactly. I mean one example is to look at what State and local law enforcement have done for years with things like NCIC. There is a price of admission. It is called flagging and tagging data in certain ways, and you are able to ask questions of it and get answers back. And I think there is actually a lot the Intelligence Community could learn from the law enforcement community on this one. Chairman Cox. The gentlelady from California Ms. Harman. Ms. Harman. Thank you, Mr. Chairman. I was happy to defer my time to a USC parent. Chairman Cox. That makes at least three of us up here on the panel. Ms. Harman. I would like to welcome our panel and make a couple of comments about several of them, whom I have known for some years. Ambassador Black's last incarnation was as head of the CTC at the CIA. He was there after 9/11 and before 9/11. His response to 9/11 is, I think, an example of the response of the hard-working men and women of the Intelligence Community, and his response was basically to camp out in his office for some weeks or months to make absolutely certain that he let nothing slip. And many of us worried about his health. He knows this. And all of us are very grateful for his dedication. And on behalf of those in Congress who knew you then and have watched you since, thank you very much personally for your service, and thank you to all of the men and women of the CTC for everything they have done and are doing. Mr. Black. Thank you very much. You are awfully gracious. I appreciate it. Ms. Harman. There are others on this panel, too, Mr. Chairman, who have done a great deal. Mr. Brennan runs a very interesting operation. I have been there. I don't know whether one can describe where it was or is, so I won't. But I have been to someplace called TTIC, and one of the interesting metaphors is that under the desks of the people that work there are all these hard drives lined up next to each other. Those are the stovepipes. I mean, you can visually see the fact that we don't have an integrated database. We have had a lot of conversation about this, and I guess we are getting there, but it has been a very hard slog. I think everything would agree. And to Ms. Baginski, who worked at the NSA before this, that agency and her present agency, the FBI, have made enormous progress. I like to say that the FBI has transitioned from the abacus and the smoke signal in the 14th century to the late 20th century. You have only got about 5 years to go and you will be up to date, but it has been a huge transition. So many of us appreciate what you do. Having said that, Mr. Chairman, we are the Homeland Security Committee. It may be that we don't have all the jurisdiction we need, but we are the Homeland Security Committee. So my one question to all these witnesses is what in your personal view is the likelihood that we will be attacked again? What is the time frame? And if you could just tell us on the public record to the extent you can what is the basis for your view? Mr. Brennan. There will be inevitable attempts, I believe, including this year that try to carry out an attack by Al- Qa'ida. Since we are talking about anytime, anyplace, anywhere by Al-Qa'ida, I think Al-Qa'ida will succeed in penetrating certain security defenses whether it be overseas, potentially here in North America and the United States. I think that the Bureau, the Agency, Department of Homeland Security, have done a tremendous job as far as making this a very inhospitable environment. Ms. Harman. I appreciate, that Mr. Brennan, but I asked you what the likelihood is that we will be attacked, and I mean in the homeland, again; not what you have done to protect it-- Mr. Brennan. Ever by any transnational group, I think it is probably inevitable that at some point in the future there will be a transnational terrorist attack here in the United States. Ms. Harman. Others? Mr. Black. I think the use of the word ``inevitable'' is good. I think from a standpoint of counterterrorism, we must consider it to be probable unless we work against in that process--we reduce the threat as much as possible to defeat them and, should they become successful, minimize the damage as much as possible. General Hughes. I don't think it is inevitable at all. I personally believe that we can succeed against the terrorists, and we are so far doing that. Ms. Harman. Ms. Baginski. Ms. Baginski. I think Cofer said it the best. I think it is probable, and we are doing the best we can to make it inhospitable, but I do think it is likely. Ms. Harman. I agree. I think it is likely, and I think the time frame is short, and I think the need to act is urgent, and I certainly hope that this committee gets real jurisdiction and that this Congress gets it and we move ahead on very careful recommendations to provide us the kind of interoperable communications and information sharing that are absolutely critical to making us aware of a threat in advance and hopefully preventing the next attack. Thank you all. Thank you, Mr. Chairman. Chairman Cox. The gentleman from Maryland Mr. Cardin. Mr. Cardin. Thank you, Mr. Chairman. Let me ask also thank our witnesses not only for their testimony today--this has been a long hearing--but for your service to our country. And what Ms. Harman said I would just like to underscore, particularly to the men and women who work in your agencies day in and day out at a great personal sacrifice under very difficult circumstances. If you would express our appreciation to the type of work they are doing for our country, I think every member of the committee would appreciate that. Many of the areas that I was interested in inquiring have been asked, so I want to spend my time on one area that has been continuously brought to my attention by local law enforcement. I hear over and over again that, yes, things are much better than they were before September 11; however, it is still not where it should be. And part of it, they believe, is the culture of a resistance to consider local law enforcement full partners in the war against terrorism, and that there is not a view that there is really a willingness to totally share information, although they know under the current scrutinies that they will get access to some information. So I really want you to go through for me where we are in this. If I am a detective in a Palmer City Police Department, and I am working on an investigation perhaps unrelated to terrorism, but I have reason to believe that there may be some connection to terrorist organizations, what do I have to go through in order to complete my investigation to make sure that there is not a terrorist contact here? Can I get the type of access to all the information I need, or do I have to send this to a third party, go through my Joint Terrorism Task Force? What have I got to do in order to be able to fully access in a realistic time frame to complete my investigation? Ms. Baginski. I think you have raised a very, very important point, so let me be the first to say I think we have a lot of work to do. I think there are three dimensions, but the most inhibiting is the technology dimension, and that is the actual connection of our various systems, the State and local systems, the systems at the JTTFs. They are, in fact, different, and we do have plans to actually work on that. I think there is a cultural issue. My personal belief is that initiatives like the global--the criminal intelligence information-sharing plan that I am sure you have heard of is the notion that in terms of State and local, we have to allow State and local to lead and to dictate State and local needs as opposed to sort of coming in there like Big Brother and saying, we will tell you when you need to know something. So there is an interaction that needs to occur that has our State and local and tribal partners sitting at the table as a full partner expressing their needs from the Federal family. That is actually--I am watching that develop in certain areas, and I am actually fairly encouraged by that. And the day-to-day operational level, what would have to happen for us to resolve the issue I think you laid out is if there were some suspicion, it would be into the JTTF, and the answer to the question would come from the JTTF, and I think what you are suggesting is that might not be the most efficient way to get the information. Mr. Cardin. Exactly. I understand that. And our Joint Terrorism Task Force is working, I think, very effectively, and I am very pleased by the way it is working. But to expect that a first responder needs to go through another layer of bureaucracy when they already are pressed for time and time might be of the essence, and then they have to fight with the priorities within the Joint Terrorism Task Force, I am not sure that is the most efficient or the best way for that information to be handled. Again, I think there is a view among the first responders that there is not really a trust in letting them have access to the type of information they need. Ms. Baginski. I can honestly tell you it is not a trust. It is not malice. It is incompetence perhaps sometimes or ineffective execution, and it definitely is not helped by a very difficult information technology issue. Mr. Cardin. On the technology point, let me point out that under our current system, of course, almost all of the funding has to go through the State. Now, our State, again, is working very carefully with local governments, but there are many local governments, and we don't always get the same degree of attention to the technology compatibilities for local law enforcement dealing directly with Federal agencies because it needs to go through the State as far as approval process is concerned. One of the issues came out again with the 9/11 Commission's recommendations on the funding issues, I think, also may play into making it a more cost-effective way for local law enforcement to access this information. Ms. Baginski. From our perspective, getting the Federal family sort of information act in order is job one so that we can interoperate with the State and local and tribal families systems, which they actually must have a voice in and lead in. We cannot be dictating hardware and software and business process to them. It is not effective. Mr. Cardin. Thank you very. Thank you, Mr. Chairman. Chairman Cox. I thank the gentleman. We have two Members who have not yet had the opportunity to question the panel, and with the indulgence of the panel, I know we are keeping you here an awfully long time, but if you will bear with us, I will give every Member here the opportunity to put questions. The Chair recognizes the gentlelady from New York, Mrs. Lowey. Mrs. Lowey. Thank you, Mr. Chairman, and I want to add my appreciation to the panel for spending so much time with us here today. Mr. Brennan, I wanted to follow up on a couple of things that were said. Lee Hamilton was here earlier, as you know, and he said TTIC is the right concept, but needs to be strengthened. And then in your presentation you said the model of the 9/11 Commission is not workable. You also referenced the memo of 2003 where you said there was an encouragement of cooperation and sharing of information, and in further remarks you said that that is improving. Then there was some discussion about upgrading computer technology and how it is so very essential. What I am trying to understand is can TTIC and all the other agencies which you coordinate do the job that is recommended by the 9/11 Commission? What will be different by the institution of the NCTC if all the agencies are already willing to share and there isn't some embedded, shall we say, determination not to share? Why couldn't it be done right now with TTIC? Along with that, I am concerned, and I would appreciate it if Mr. Brennan or each of you could answer, are there enough good intelligence people around? How do we encourage more people to enter the field? Should we be doing more training? I believe it is estimated that the new recommended agency will require over 100 new personnel. So back perhaps to Mr. Brennan, given the fact that Lee Hamilton and the Governor both said that the concept is based on TTIC, from your perspective why can't you accomplish the goals of the new recommended agency? Is it that there isn't an adequate directive from on high? Is it that you haven't been given the authority on high? Is it that the President, as the Markle Foundation has stated, has to have a direct connection to this agency in order to make it succeed? So perhaps I am throwing several questions, but after listening here all day, I am trying to understand whether it is structure or personnel, whether it is practice or it is policy, or whether it is inadequate directives? Why can't you do the job? I mean that seriously, obviously. Mr. Brennan. First of all, when I made reference before to the model of the 9/11 Commission not being workable, that was the reference to the overall reform of the Intelligence Community, the National Intelligence Director, and the diagram that is on page 14 of their Commission report. That is what I said is not workable, and General Hughes did a good job of explaining some of the concerns that we have with that. As far as the National Counterterrorism Center itself, the concept that is put forward by the 9/11 Commission, again, it calls for two things differently--two things that the NCTC would do that TTIC does not necessarily do. First is the joint operational planning, and second is net assessments, taking the threat and basing it against the vulnerabilities of a target. Mrs. Lowey. Why don't you do that, and could you do it? Mr. Brennan. We can do anything that we are directed to do and we get the appropriate resources to do. Right now what the arrangement is within the Federal Government is that in the Department of Homeland Security there is the Information Analysis and Infrastructure Protection Directorate that this committee was instrumental in setting up. The infrastructure protection element has the responsibility for assessing the vulnerabilities of U.S. critical infrastructure-- Mrs. Lowey. Should it be there, or should it be in TTIC? Mr. Brennan. Right now it is there by statute, and what we do is we work very closely with the Department of Homeland Security so that the information is shared back and forth. There is a lot of work that needs to be done on the information protection side in terms of identifying those targets, assessing what the potential vulnerabilities are and what weaknesses that the terrorists could exploit. So what we are trying to do, I think, with this National Counterterrorism Center is try to identify all the responsibilities that need to be carried out and then have the right framework that can fulfill them. Mrs. Lowey. I don't mean to cut you off, but I see the yellow on. I just want to say I am a New Yorker. I lost hundreds of constituents on 9/11. It is 3 years later that we are still getting organized and the Department of Homeland Security is still getting organized. Although I believe we have to act expeditiously to implement the recommendations, I wonder if some of these recommendations couldn't be implemented by personnel or different personnel or additional personnel at the current structures. And I think this is a very important discussion, and it is unfortunate that my red light is on. The Chairman is not paying attention, so you can respond. Mr. Brennan. Just a quick comment on that. I think the secret is that a lot of the recommendations included in here are already being implemented. A lot of work has gone on as far as information sharing and making structural change. So there is still more work to be done, but a lot of things that are entrained already will, in fact, give us a lot of things that are called for in here. I am not opposing the idea of intelligence transformation. I am one of the biggest advocates of it, in fact a maverick within my own home organization, but I think there have been a number of things that have been done. We represent here on the panel TTIC, the Office of Intelligence, and the IAIP, a clear manifestation of all the changes that have taken place. So what they are calling for here is a continued sort of strategic path that we need to be on, but a lot of things that are called for here are already done. Mrs. Lowey. Mr. Brennan, just in conclusion, with the indulgence of the Chair, I read it a little differently, and as a New Yorker, when I hear from several people on this panel that another attack is imminent, we don't have the luxury, and I keep asking why the current structure can't move more quickly, and why we keep creating bigger structures, and where are we going to get all those people to fill those positions? And this is probably another hour conversation. So I just wish you good luck, and I hope that you move to implement these plans, frankly, before another attack, and I hope that you take an aggressive role in reporting to somebody that they had better take action on recommendations that don't need structure changes, such as having airport workers, all of them who are going into a sterile secure area, go through a metal detector. There are things that have to be done now, and I, frankly, representing my constituents, am quite worried that we are not doing the obvious. So at the same time I want to thank you, but I hope that will speed up the normal pace of the bureaucracy and make us all safer now, and, as Mr. Hughes said, hopefully avoid another attack. Thank you very much. Chairman Cox. The gentlelady from the District of Columbia. Ms. Norton. Thank you, Mr. Chairman, and I apologize to the witnesses. Just as it came my time to speak, I was called away on a matter that I will take as a kind of case in point. I am working with security officials of the Capitol and of the District of Columbia concerning the present orange alert and its effects around this Capitol and on this city. And I take it as a case in point, and my question is really based on what amounts to a case study on how much integration is occurring and how it is implemented in the field. In a real sense it may be the best evidence. I have now had two meetings with security officials in the Senate, the House, the District of Columbia. One of the first agreements we reached, I think, would astound the public. We reached agreement that the executive branch, the congressional branch, and District of Columbia security officials would develop a citywide plan for protecting the Nation's Capital. That means there was none, gentlemen. What we had and what we have had and what was all too clear following this orange alert is that the executive moved to do what it believed was appropriate, the congressional officials moved quickly and with astounding reaction, and the city believes overreaction, and they moved in very different ways. And this is why I want to put the question to you, for example, Mr. Hughes, is the information analysis and infrastructure protection at the Department of Homeland Security, they moved in very different ways. This is right here in the Nation's Capital where I would think that attention and planning and integration of threats and how to respond would be at their best. They moved in very different ways. The executive along 15th Street where the Treasury Department is, a few blocks from the IMF and the World Bank, moved obviously with-- first of all, there was some consultation with the District of Columbia. There was almost none on the congressional side--with some calculation of risk in deciding what to do. Already trucks don't go up 17th Street, so virtually nothing was done on 17th Street. 15th Street is where the Treasury Department is. What they did on 15th Street was to decide to close the sidewalk on the Treasury Department side of 15th Street. It makes good sense to us; some inconvenience to walk on the other side of the street, but be my guest. They may be doing what they have been doing all along, some randomizing of trucks and larger vehicles, but they calculated that you had to continue to have traffic up 15th Street unless the risk was so great that you wanted to take more severe actions. It is the kind of sensible, but we think assessment--somebody was doing some analysis. Somebody was thinking through all of the factors that had to be considered. Go to the other side of town, further away from at least the targeted threat, but certainly a place where you would better take some action. One of the reasons why you would better take some action is that terrorists know enough how to play chess rather than checkers and how to move around what they are going to do. So if there is a threat on one side of town, they will ride on this side of town to begin to take action. But the action was very different from the action taken closer to the threat. The Treasury Department is closer to the IMF, is closer to the World Bank and is arguably more related to those institutions than we are, at least as related. No check points on that side of town. The only reason this city isn't closed down is because it is August, and nobody is here but you all and the few of us who are left. No closing of streets. This is anathema to any big city, absolutely anathema, and the one thing the city will not tolerate is the last-resort measure that you would expect on a red alert, a closing down of a street leading to the major transportation hub of the District of Columbia, Union Station, rail, Metro, light rail, the whole kit and caboodle. You can't get there from there; the streets to that hub already closed down, the next street down, which is the Senate street, closed down. You have got to go all the way back up and get down. This is not a matter of convenience. We had to even have consultation on making sure emergency vehicles, fire, police, EMS, could get through. I mean, this is a case study, gentlemen, it seems to me, in whether or not there is any integration of terrorist threat going on and any analysis of response is occurring from the absence of a plan to what appeared to be kind of seat-of-your- pants reactions. I have to ask you what is your role here? Do you have any relationship to the people on the ground? Is your threat analysis conveyed in such a way that Federal officials on the ground have some basis to take reasonable and coordinative action related to the threat that has been identified? And I would like to know the role of your agency in that regard, particularly here in the Nation's Capital where it seems to me it would be paramount. General Hughes. I will start by saying that the Department of Homeland Security gives advice and assistance in these matters. We also provide threat information, and in this case we did provide threat information directly to the many officials involved. There are quite a few. As you know, this is a somewhat complex jurisdictional issue here in the District of Columbia and the two States that encompass it, Maryland and Virginia. We try to inform everyone involved, and in this case it may not have been a perfect job, but we did the best we could at the time. I have to say that the actions, the decisions and actions, are left to local authorities. In this case that would be both-- Ms. Norton. I am quite aware of that. That is not my question. I know who did it. I am not accusing you of doing it. I am trying to find out whether or not the nature of the analysis of the threat as conveyed to the people on the ground is such that they are doing anything but acting in an ad hoc and uncoordinated manner. And my question really isn't meant to be recriminatory to you. I am just trying to make a link here to an actual case in point because I think we might learn from it. And by the way, if I may say so, we are the one jurisdiction that does have a coordinator. It is in the statute. So if anything, it is easier here than it would be elsewhere because there is a paid coordinator who is in the Office of the Secretary himself precisely because this is the Nation's Capital, and yet this is what has happened here only within the last 2 weeks. General Hughes. The answer in this case is that the threat information regarding the International Monetary Fund and the World Bank buildings were communicated directly to appropriate authorities here in Washington, DC. Ms. Norton. Does anybody else have anything to say about the relationship between the analysis and how those on the ground who are not experts at analysis and therefore have to depend upon the analysts, about that link which is the link I am trying to get at? Ms. Baginski. Yes, ma'am. General Hughes and my organization have, in fact, done a series of joint advisories and bulletins for State and local authorities to share as much specificity as we can about the nature of this particular threat that would allow them to take countermeasures. So in this case we have a unique situation in that we have detail. I think the frustration in other cases is there is that lack of specificity to begin with, there isn't a lot of detail, and so the analysis that you can do on an isolated threat is-- Ms. Norton. But I congratulate you that for the first time you really did have, and we are all grateful for the fact that you had, the most specific information we have had since 9/11, and yet we see this seat of your pants all over the city, do as you care to do without much guidance in the analysis of the threat from somebody who knew more than they knew. That is my-- that is what I am focusing on. Ms. Baginski. We actually think that we did provide this analysis, but I think it is worth our going back and taking a look at it for you. Ms. Norton. I would appreciate it. Chairman Cox. The gentlelady's time has expired. Each member of the committee having had the opportunity to ask questions of this panel, I want to at last excuse you long after our intended departure time. I know that several of you had to in real time change your schedules today. I know what is going down at the White House concurrently, and we very much appreciate your being with us here for such a long period of time here today. At this point I would yield to the Ranking Member. Mr. Turner. Thank you, Mr. Chairman. I, too, want to thank the witnesses for your patience and indulgence today. We had obviously such a broad scope of issues to delve into, I am sure we could spend many more hours on these subjects, and I hope we will, in fact. And I want to thank each of you for your dedication, for your service and your commitment to making America safe. Ms. Jackson-Lee. Will Mr. Turner yield for a question, please? Mr. Turner. Yes, I will yield. Ms. Jackson-Lee. I heard Mr. Frank's questioning regarding the peace activists and others. I would appreciate it if the same responses or written answers that you might give to him that you would forward to me as well. And also I wanted to make sure that the questions dealing with the power of the board governing civil liberties, if you were going to give written answers, if you will include me as well. I know you might be giving them to the committee. I wasn't sure, and I wanted to make sure that those questions came in. Thank you. Ms. Baginski. Yes, ma'am. Mr. Turner. It would be helpful if you would just send that to all members of the committee. Ms. Baginski. We will. Chairman Cox. I thank the gentleman. Again, I thank each of our witnesses for your valuable testimony. The members of the committee may have some additional questions, as Ms. Jackson-Lee indicated. We would ask you to respond to these in writing. The hearing record will be held open for this purpose for 10 days. [The information follows:] FOR THE RECORD Questions and Responses for the Record Questions from the Honorable John Sweeney for Ms. Maureen Baginski 1. Does the FBI have real time secure digital communication networks capable of handling Top Secret SCI level information connected to all 84 JTTFs? Response: The FBI is connected to the rest of the United States Intelligence Community (USIC) at the Top Secret Sensitive Compartmented Information (SCI) level via the new SCI Operational Network (SCION). SCION is currently available to over 1,000 users at FBI Headquarters (FBIHQ). The FBI has initiated a pilot project whereby SCION will be deployed to the FBI's Field Offices in New York, Boston, and Kansas City, with plans to deliver SCION to all FBI Field Offices as funding becomes available. While in most Field Offices there are two Intelligence Information System Network (IISNET) workstations, which permit communications to the USIC's Intelink system, these are difficult to use and are housed in small SCI Facilities (SCIFs) that are not located near the IISNET users. An impediment to field expansion of SCION is the current lack of SCIF space for Field Intelligence Group and Joint Terrorism Task Force (JTTF) personnel, who are the most likely users. Currently, SCION is available to six of the 100 JTTFs. 2. Will the Integrated Data Warehouse be fully functional and available to state and local analysts by the end of December as Director Mueller promised? Response: Yes. The Integrated Data Warehouse (IDW) is currently fully functional with approximately 6,000 users, including approximately 2,500 users in state and local law enforcement and numerous federal government agencies. Although IDW can only be accessed from the FBI's internal network, it is available to users in all Field Intelligence Groups (FIGs) and all JTTFs and, through these users, IDW is available to the thousands of federal, state, and local officials assigned to these entities. IDW contains more than 30 million FBI terrorism-related documents and bi11ions of database records relevant to counterterrorism and intelligence. Questions from the Honorable Edward J. Markey 3. On page 380 of the Commission's report, the Commission recommended that ``The United States should engage its friends to develop a common coalition approach toward the detention and humane treatment of captured terrorists.'' (emphasis added) The Commission further recommends that these ``new principles might draw upon Article 3 of the Geneva Conventions on the law of armed conflict'' which notes ``was specifically designed for those cases in which the usual laws of war did not apply'' and is generall accepted throughout the world as customary international law. As you know, Article 3 deals with conflicts that are not of an international character, such as civil wars, and it includes a specific prohibition on ``violence to life and person, in particular murder of all kinds, mutilation, cruel treatment and torture'' and ``outrages upon personal dignity, in particular, humiliating and degrading treatment.'' Can I conclude, based on these passages in its report, that the Commission is recommending that captured terrorists should be afforded these types of protections--protections against murder, mutilation, torture and degrading treatment? Response: The FBI respectfully defers to the 9/11 Commission regarding the recommendations contained in the Commission's report. With regard to the FBI's participation in the interrogation of terrorists outside the United States, FBI agents deployed outside the United States in connection with the war on terrorism have been directed not to participate in the use of interrogation techniques that would not be permissible if used within the United States. 4. There is another Convention that the Commission did not specifically mention in its report--the UN Convention Against Torture. The U.S. is a signatory to that Convention. Article 3 of the Torture Convention provides that ``no state party shall expel, return, or extradite a person to another State where there are substantial grounds for believing that he would be in danger of being subjected to torture.'' Do you also believe that the U.S. should follow this prohibition in dealing with captured terrorist suspects? Response: It is my understanding that it is the policy of the United States to comply with the United States' obligations under the Convention Against Torture. 5. The Bush Administration unfortunately appears to be pursuing policies that are inconsistent with the Commission's recommendation. Specifically, instead of ensuring that the prisoners captured are treated humanely, the Administration continues to practice a process called ``rendition,'' in which it sends suspected terrorists to be interrogated in third countries. such as Syria or Saudi Arabia. that our government has determined, within the context of the State Department's Country Reports on Human Rights Practices. are known to practice torture. This practice is very difficult to reconcile with President Bush's own declaration, following the exposure of abuse at the Abu Ghraib prison, that: ``We do not condone torture. I have never ordered torture. I will never order torture. The values of this country are such that torture is not a part of our soul and our being.'' Perhaps there are some who would argue that as long as we ask others to do the torturing for us, the U.S. is not, strictly speaking, doing the torturing. Do you agree that if we are to realize the Commission's goal of having the U.S. serve as an example of moral leadership in the world, we should renounce the policy of rendition, which amounts to ``outsourcing torture''? Response: Your question assumes a number of facts that do not involve the FBI. The FBI respectfully defers to entities in the Executive Branch in a better position to respond. 6. If we are to ``develop a common coalition approach toward the detention and humane treatment of captured terrorists''--as the Commission has recommended, do you agree that the U.S. should comply with Article 3 of the Torture Convention and train our service men and women so they understand what is required to comply with Article 3? Response: It is my understanding that it is the policy of the United States to comply with the United States' obligations under the Convention Against Torture. 7. I have recently introduced H.R. 4674, a bill to stop the rendition to countries that torture prisoners. My bill has been endorsed by Amnesty International, Human Rights Watch, the World Organization for Human Rights, USA, and the New York Bar Association. Do you think it would be consistent with the Commission's recommendations regarding torture for the Congress to enact this type of bill into law? Response: The FBI defers to other, more directly concerned parties regarding this question. Chairman Cox. I would like to thank all the members of this committee as well as the witnesses on the first panel, the Chairman and Vice Chairman of the 9/11 Commission for an extraordinary piece of business today which required Members to travel from all over the country to be here, and in some cases from other countries. There being no further business before the committee today, committee stands adjourned. [Whereupon, at 4:15 p.m., the committee was adjourned.]