Copyright 2002 eMediaMillWorks, Inc.
(f/k/a Federal
Document Clearing House, Inc.)
FDCH Political Transcripts
October 9, 2002 Wednesday
TYPE: COMMITTEE HEARING
LENGTH: 17623 words
COMMITTEE:
TERRORISM AND GOVERNMENT INFORMATION SUBCOMMITTEE,
SENATE
JUDICIARY COMMITTEE
SUBCOMMITTEE: TECHNOLOGY
HEADLINE: U.S. SENATOR DIANE FEINSTEIN (D-CA) HOLDS
HEARING ON IMPLEMENTING ANTI-TERRORISM LAWS
SPEAKER:
U.S. SENATOR DIANE FEINSTEIN (D-CA), CHAIRWOMAN
LOCATION: WASHINGTON, D.C.
WITNESSES: (PANEL 1), GLENN FINE, INSPECTOR
GENERAL, DEPARTMENT OF JUSTICE
ALICE FISHER, DEPUTY ASSISTANT ATTORNEY
GENERAL, CRIMINAL DIVISION
DENNISE LORMEL, CHIEF, FINANCIAL CRIMES SECTION,
FBI
(PANEL 2), SCOTT HASTINGS, ASSOCIATE COMMISSIONER, OFFICE OF
INFORMATION, RESOURCES MANAGEMENT, IMMIGRATION AND NATURALIZATION SERVICE (INS)
MICHAEL CRONIN, ASSISTANT COMMISSIONER FOR INSPECTIONS, INS
STEVEN
EDSON, ACTING DEPUTY ASSISTANT SECRETARY OF STATE FOR VISAS
BENJAMIN WU,
UNDERSECRETARY OF COMMERCE FOR TECHNOLOGY
BODY:
U.S. SENATE JUDICIARY COMMITTEE: SUBCOMMITTEE ON TECHNOLOGY,
TERRORISM, AND GOVERNMENT INFORMATION HOLDS A HEARING
TITLED
"TOOLS AGAINST TERROR: HOW THE ADMINISTRATION IS IMPLEMENTING
NEW
LAWS IN THE FIGHT TO PROTECT OUR HOMELAND."
OCTOBER 09, 2002
SPEAKERS:
U.S. SENATOR DIANNE FEINSTEIN (D-CA), CHAIRWOMAN
U.S. SENATOR JOSEPH R. BIDEN JR. (D-DE)
U.S. SENATOR HERBERT KOHL (D-WI)
U.S. SENATOR MARIA CANTWELL (D-WA)
U.S. SENATOR JON KYL
(R-AZ), RANKING MEMBER
U.S. SENATOR MIKE DEWINE (R-OH)
U.S. SENATOR JEFF
SESSIONS (R-AL)
U.S. SENATOR MITCH MCCONNELL (R-KY)
U.S.
SENATOR RUSSELL D. FEINGOLD (D-WI)
*
FEINSTEIN: Good morning ladies and gentlemen. It's a pleasure for me
to welcome you to this hearing of the technology,
terrorism and
government information subcommittee. I'd like to welcome the ranking member,
Senator Kyl, from Arizona, with whom I have worked now for seven or eight years,
either as chairman or ranking of this subcommittee. And also distinguished
Senator from Wisconsin, Senator Feingold, delighted to have you with us this
morning as well. The September 11 terrorist attacks were a wake-up call for our
country. In the aftermath of those attack, it quickly became apparent that our
approach to combating
terrorism was, to put it simply, broken.
In response to the failures that led up to September 11, Congress passed a
number of key legislative initiatives to beef up. Well, we're working on beefing
up homeland security, giving law enforcement a greater ability to go after
potential terrorists, and improving the protection of our borders.
Two
of the most important of those initiatives were the USA PATRIOT Act and the
Enhanced Border Security and Visa Entry Reform Act, each of which passed just a
few months -- within just a few months of the terrorist attacks. And each of
which contained a number of key provisions and deadlines to enhance homeland
security. It is these pieces of legislation that are the topic of today's
hearing.
We're here to ask a number of questions of some very
distinguished panelists. Are the new laws working? Are there things we left out?
Are there improvements we should make? And most importantly, what progress is
being made by the administration to implement these new items?
The USA
PATRIOT Act was passed by the full committee, the full judiciary committee, with
the knowledge that it had been drafted and negotiated rather quickly. Only six
weeks elapsed between proposal and passage. And the Congress would need to
exercise vigorous oversight to prevent abuses and solve unintended problems.
That's one reason why some of the tools in the USA PATRIOT Act will sunset in a
few years.
If the new tools of this act are working well and effective,
clearly we should keep them and perhaps, if needed, even strengthen them. If
they're being abused, we should eliminate them or add new safeguards.
The reforms in the USA PATRIOT Act were spurred by the fact that key
agencies in our government had information about the hijackers and their plans
before they attacked, but didn't share this information and didn't act on it.
These failures reveal fragmentation of anti-
terrorism efforts
and the need for better information sharing.
The lack of investigative
intelligence authority was another problem. As judiciary and intelligence
committee hearings have revealed, and both Senator Kyl and I sit on these joint
intelligence hearings, the FBI was unable to obtain a search warrant for the
computer of accused terrorist Zacarious Moussaoui, who was detained by the FBI
and the INS in August of 2001 after he enrolled in flight simulator training for
jumbo jets, raised considerable suspicions.
Hearings also demonstrated
that the terrorists made ample use of e-mail and the Internet in planning these
attacks. The government clearly needed and still needs adequate tools to monitor
electronic communications.
Senator Kyl and I worked together on an
encryption issue. And yesterday at the hearing, Senator, you might be interested
to know that I asked the question of former FBI director Louis Freeh as to
whether the informal arrangements that he had made as a product of some meetings
I organized were adequate. And he said clearly, "No. They're not adequate. There
are some voluntary agreements between large computer companies and the FBI and
other security organizations with respect to the key issue, but there were real
problems and this remains a major point of American vulnerability." So I think
this is something that this committee really should take another look at, at a
future hearing.
Finally, the disclosure that hijackers entered the
United States on legal visas, showed a need for immigration reform.
So
the PATRIOT Act was an effort to solve some real problems. One issue is the
ability of agencies to utilize the tools we gave them. The FBI can best use
these new tools if it has a road map to ensure that it knows the nature, the
likelihood and the severity of the terrorist threat we face, as well as
intelligence gaps that still remain. The DOJ inspector general will testify
today that the FBI has not yet performed a comprehensive written assessment of
the terrorist threat facing the United States. That came out yesterday in our
intelligence hearing, as well.
Now, with respect -- and I want to -- I
don't want to go on and on, but with respect to the Border Security Act, there
are some things that are important. First, enhancing our intelligence capacity
is key to increased security. Second, our most effective security strategy is to
keep out those who do us harm, while admitting those who come to build America
and be good residents.
FEINSTEIN: There still are five areas of
vulnerability in our immigration system. We still have an unregulated visa
waiver program in which 23 million people arrived with little scrutiny from 29
different countries. Now there are 28. Argentina is out of the program. Abuse of
the visa waiver program is real and there are examples of it.
Second, we
have an unmonitored non-immigrant visa system, in which 7.1 million tourists,
business visitors, foreign students and temporary workers arrive. To date, INS
does not have a reliable tracking system. We need to know how progress is going,
because this remains a huge loophole. We don't know if people leave. We don't
know where they are in the country. And that's 7 million visitors.
Third, the poorest nature of our borders, along with INS's unreliable
record-keeping, have contributed to the agency's inability to keep out criminals
and terrorists. We need to continue to strengthen the border, and it can be
done.
Fourth, this is an era where terrorist use satellite phones and
encrypted e-mail. The INS, our nation's gatekeeper, is considered by many
observers to still be in the technological dark ages. The agency is still using
paper files, archaic computer systems, often non- functioning. They don't
communicate with each other. And they do not integrate well with other law
enforcement systems.
Fifth, about 50 to 70 percent of the estimated
seven to nine illegal immigrant population are visa over-stayers. So people who
come here legally -- illegally, 50 percent of them come with visas, and then
just simply disappear.
In particular, I'm going to be interested in
learning more about the progress of the State Department, INS and the National
Institute of Standards and Technology in; one, establishing tamper-resistant
visas and passports; two, establishing a non-immigrant tracking system using
biometric data to verify the identity of person seeking to enter the United
States. I very deeply believe this becomes a key and critical tool in deterring
terrorists from entry. And three, upgrading the information technology systems;
and four, building the necessary technology infrastructure so we can better
protect our ports of entry.
So this is a big agenda. And I want to stop
here and see if our distinguished ranking member has some comments that he might
wish to make.
KYL: Thank you very much, Senator Feinstein.
First
of all, I'm very interested in getting answers to the same questions that you
just propounded. Let me add to that, that I'll be asking, at least on the first
panel, some questions about what additional tools law enforcement may need. The
questions you asked about the FBI analysis of the threat, I think is an
important one to get an answer to. I'll be curious about the assessment of the
sunset provisions in the U.S. PATRIOT Act.
And on panel two, we're going
to be talking about the response to the various requirements that we established
in the law. You identified them, but we need to have some very forthright
assessment of the features of the Border Security Act. For example, whether the
deadlines in the act are going to be met, where we are in the process of
creating the interoperable data system that everybody agrees we need. As a
matter of fact, I note that just this month, there's a 171 page report by the
Brookings Institution and Center for Strategic and International Studies that
concludes that we have to have an interoperable data system, the same one that
we actually require in the act. How is the State Department responding to the
new visa issue requirement as it pertains to terrorist-sponsored nations? How
are INS and the State Department responding to the requirement that, upon
notification, stolen passports must be entered into all systems, and to the
requirement that INS must determine that any alien who is to be admitted out of
port under the visa waiver system also be checked against relevant data --
look-out databases? Those, and other questions, we hold this hearing to
determine answers to.
But I also would like to conclude my opening
remarks by referring to a report that was just out today. It's in the national
review magazine, the very latest issue. It's called The Terror Visas. And it
says, "The applications of the September 11 hijackers should have been denied on
their face, but the State Department approved them. Why?" The article goes on to
note that in violation of our own provisions, section 214B, which essentially
provides a presumption against the granting of visa for would-be immigrants, or
puts the burden of proof, I should say, on the non-immigrant visa applicant to
show that he ties to his own country, that he has a stated purpose for the visa,
a reason for coming back to his country so that he won't be staying in the
United States and be one of that 50 percent that you identified.
That
not withstanding, that presumption that -- of the visa application forms of 15
of the 19 September 11 terrorists that were studied, all of the applicants among
the 15 reviewed should have been denied visas under that provision, on their
face. The article goes into a lot of detail. I'll just mention two because their
names we know, Hanni Hanjour was first denied a visa. He conveniently changed
many of the answers on the next application. Just two weeks later, he got a
visa. Khalid Al-Mihdar, one of the terrorists who obtained visas through the
visa express program, simply listed hotel as his U.S. destination, something
that should have prompted personnel in Saudi Arabia to inquire further.
The bottom line is that apparently, according to this report, about
three percent of the visas were denied, not withstanding this presumption
against their granting. Excuse me, two percent -- two percent were denied for
the Saudi-nationals in the 12 months prior to September 11. The world-wide
refusal rate for temporary visas is about 25 percent.
Now, obviously
things have changed. So how about in the 12 months following September 11, Madam
Chairwoman? It's gone from two percent to three percent according to this
article. We'll want to know from our witnesses, why, according to the State
Department's own documents, on letterhead of the embassy in Saudi Arabia, its
refusal rate for Saudi-nationals in the 12 months following September 11 is a
mere three percent. That is something that we've got to get into, so I hope that
those of you who haven't had a chance to review this can do so, and provide us
your comments on it.
Thank you, Madam Chairman.
FEINSTEIN: Thank
you very much, Senator Kyle.
Senator Feingold has indicated that he has
to leave at 10:45, and so I'll ask him to go first for questions. But do you
have a brief opening statement, or?
OK. All right, happy to do it.
Let me quickly introduce the panel. The first panelist is Glenn Fine. He
is the Department of Justice's inspector general. He's a Rhodes Scholar, a
graduate of Harvard Law School. He was an attorney specializing in labor and
employment law prior to going to Justice. He has prosecuted more than 35
criminal jury trials, handled numerous grand jury investigations and argued
cases in the District of Columbia and the United States Court of Appeals. He and
his staff have made a tremendous contribution to the subcommittee's work in
developing the enhanced border security and visa reform act. And I want to thank
you for your cooperation.
The second person is Alice Fisher of DOJ. She
serves at the deputy assistant attorney general of the criminal division. In
that capacity, she supervises several criminal division litigating sections,
including the
terrorism and violent crimes section. That
section has handled all investigations and prosecutions relating to the 9/11
terrorist attacks.
The next person is Dennise Lormel of the FBI. He
joined the FBI 26 years ago as a special agent. And he now serves as chief of
the terrorist financing operations section of the counterterrorism division.
Immediately following the 9/11 attacks, he was given the responsibility for
establishing and coordinating the FBI's comprehensive terrorist financing
initiative. He also oversees the multi-agency terrorist financial review group,
which is responsible for tracking and investigating terrorist financial
abilities. So he can update us on that.
So why don't we begin with you,
Mr. Fine. If you can possibly truncate your statements into five minutes, it
will give us more chance to have a discussion back and forth.
FINE:
Thank you.
Chairwoman Feinstein, Senator Kyle, members of subcommittee,
thank you for inviting me to testify today regarding the Office of the Inspector
General's recent audit of the FBI's counterterrorism program. Last week, our
full 131-page classified audit was provided to the FBI and congressional
committees, including this committee. And we publicly released an unclassified
executive summary that highlighted our major findings and recommendations.
Our audit was part of a series of reviews we have undertaken regarding
department programs that effect counterterrorism and national security issues.
The audit examined aspects of the FBI's management of its counterterrorism
resources, focused specifically on; one, the FBI's progress toward developing a
comprehensive, written risk assessment of the terrorist threat to the United
States; two, the FBI's strategic planning as it relates to counterterrorism. And
three, the amount of resources dedicated to the FBI's counterterrorism program
over the past seven years.
It is important to note at the outset of my
remarks that our audit does not purport to assess all aspects of the FBI's
counterterrorism program or how the FBI handled information that may have been
related to the September 11 attacks. We have initiated a separate review that is
examining aspects of the FBI's handling of certain intelligence information
prior related to those attacks, including the Moussaoui case, the Phoenix
electronic communication and other issues.
The audit that we released
last week contained several important findings. We determined that the FBI has
not developed a comprehensive, written assessment of the risk of a terrorist
threat facing the United States despite its statement to Congress in 1999 that
it would. We concluded that such an assessment would be useful not only to
define the nature, likelihood, and severity of the terrorist threat but also to
identify gaps that need to be addressed. A comprehensive, written threat and
risk assessment would also be useful in determining where to allocate attention
and resources on programs and initiatives to combat
terrorism.
By September 2001, the FBI had developed a draft of what it called a
terrorist threat report. This report described terrorist organizations and state
sponsors of
terrorism, but the draft report did not assess the
threat and risk of a terrorist attack on the United States. Among the reports
many omissions were assessments of the training, skill level, resources,
sophistication, specific capabilities, intent, likelihood of attack, and
potential targets of terrorist groups. Nor did the draft report discuss the
methods the terrorists might use. For example, there was no analysis of
terrorists' progress toward developing or acquiring chemical, biological,
radiological, and nuclear weapons or any discussion of what the FBI had learned
from its past terrorist investigations.
We identified a number of causes
for the FBI not adequately addressing these issues. First, no single individual
at the FBI was accountable for managing the assessment. Second, some FBI
officials said the FBI lacked the analytical capability or resources to complete
such a broad threat assessment. Third, the FBI did not have a system of
management controls that ensured compliance with GAO or OIG recommendations.
Also, FBI counterterrorism managers had a tendency to rely on their experience
and professional judgment regarding the overall terrorist threat and did not
value a formal written assessment that used a structured methodology.
We
believe that completing the national-level, written threat assessment is
critical to the FBI's counterterrorism efforts. This assessment must also
include an evaluation of the likelihood the specific weapons of mass
destructions will be acquired or used against American targets and citizens.
Fully assessing the threat, probabilities and likely consequences of a terrorist
attack by different methods will be of significant benefit, not only to the FBI
in allocating resource, but also for domestic preparedness efforts and
counterterrorism programs at all levels of government.
Our audit also
found that the FBI's strategic planning has not been guided by an overall
strategic-level assessment of the threat and risk of terrorist attacks on the
United States. The FBI's strategic plan has not been updated since 1998 and does
not conform to the counterterrorism priorities that the department's November
2001 strategic plan, the FBI director's new priorities, or the FBI
counterterrorism division's approach to develop the maximum capacity to deal
with the terrorist threat.
We also found that the FBI had not developed
a system for capturing and using lessons learned from past
terrorism incidents and operations to improve the FBI's
counterterrorism capabilities.
In addition, the FBI has not established
a core training curriculum and proficiency standards for these new agents
working in counterterrorism.
FINE: Our report details the level of
resources that the FBI had dedicated to counterterrorism. Our report details the
level of resources that the FBI had dedicated to counterterrorism and related
counterintelligence over the last seven years. While the FBI has indicated the
exact figures are classified, I can say that those resources have tripled
between 1995 and 2002.
I want to be clear that our findings are not
intended to criticize the expertise of FBI employees and managers who work on
counterterrorism matters, or the extensive knowledge they have developed through
their case work and regular discussions with the FBI and the intelligence
community. Our findings also should not be interpreted to mean that the FBI has
not taken important steps during the past year to improve its counterterrorism
program. After the September 11 attacks, the FBI identified, as a critical
weakness, its ability to analyze intelligence, and has begun taking steps to
improve its capabilities in this area.
But we believe the FBI can and
must do more. Our audit report offers a total of 14 recommendations to help
improve the management of FBI's counterterrorism program, including
recommendations that the FBI prepare and authoritative, written, national-level
threat and risk assessment of
terrorism, identify the chemical
and biological agents most likely to be used in a terrorist attack, develop
criteria for evaluating incoming threat information. And establish a guide for
the distribution of threat information; build a core of professional, trained
and experienced intelligence analysts for assessing and reporting on threats at
both the strategic and the tactical levels. And close the gap between planning
and operations by establishing an effective system of performance measures and
holding FBI managers at all levels accountable for achieving those performance
goals.
The FBI responded that it concurred with our recommendations and
they provide constructive guidance. It described its steps it is taking to
address the recommendations. We are pleased that the FBI has agreed with our
recommendations and we look forward to monitoring the FBI's progress towards
implementing them. We believe these recommendations will aid the FBI in making
the changes set in motion by the FBI director to move the bureau from a reactive
post-crime investigatory culture to a more proactive organization that seeks to
identify and deter terrorists before they strike.
This concludes my
statements. And I would be pleased to answer any questions.
FEINSTEIN:
Thanks, Mr. Fine. And again, thanks for your help to this subcommittee. We
appreciate it.
Ms. Fisher?
FISHER: Thank you, Chairman
Feinstein, Senator Kyl, Senator Feingold. Thank you for providing me the
opportunity to testify on behalf of the Department of Justice to inform the
subcommittee about the department's implementation and use of the important
anti-
terrorism provisions in the USA PATRIOT Act. I want to
thank this subcommittee members who helped to develop and enact the USA PATRIOT
Act so swiftly in the wake of last September's attacks on our nations.
As deputy assistant attorney general in the criminal division, I am
personally involved in using the tools myself, and in working with others in the
department in seeing that the tools Congress provided in the act have been used
as intended; to enhance the ability of law enforcement to bring terrorists to
justice.
The unprecedented and heinous attacks on our nation, in which
over 3,000 innocent civilians were killed, occurred just over one year ago. At
that time, the president pledged to the American people that we would not relent
until justice was done and our nation was secure. Members of this committee, and
the Congress in general, joined the president as key partners in this important
undertaking. Congress' swift and comprehensive response was to develop and pass
the USA PATRIOT Act, provided law enforcement with vital new tools, and updated
those tools already at our disposal, that have been instrumental in our efforts
to combat
terrorism in the most extensive criminal deeds in
history.
One year later, I am pleased to report that we have used these
tools effectively, aggressively, and I believe responsibly. As the attorney
general told this committee in July, the department's single and overreaching
goal since September 11 has been to prevent future attacks on the United States
and its citizens. In furtherance of that goal, we have been aggressively
implementing the USA PATRIOT Act from the outset. Law enforcement uses the tools
in our ongoing cooperative effort to identify, disrupt and dismantle terrorist
networks.
We are expending every effort and devoting all available
resources to intercept terrorists and defend our nation. Never was this so
apparent as last Friday, as the attorney general described it a defining day in
the war on
terrorism, when law enforcement neutralized a
suspected terrorist cell in Portland, Oregon, convicted attempted suicide bomber
Richard Reid, and saw John Walker Lindh, an American captured fighting for the
Taliban in Afghanistan, sentenced to twenty years imprisonment.
In the
last six weeks, we have charged 17 individuals involved in terrorist-related
activities. In addition to Portland, we have charged an individual with
attempting to set up an Al Qaeda training camp in Oregon. Tools authorized by
the USA PATRIOT Act, such as information sharing provisions and enhanced penalty
provisions have been critical in all of these cases.
The PATRIOT Act has
aided law enforcement efforts in the war on
terrorism in four
key areas. First, it updated the law to reflect new technology. Second, it
removed obstacles to investigating
terrorism. Third, it
strengthened criminal laws and enhanced penalties. And fourth, it facilitated
increased intelligence sharing, gathering and analyzing.
As examples
over the past year, the department has used the following new important
authorities and tools provided by the act. We have charged a number of
individuals under 18-USC-23-39A and 23-39B, which prohibits providing materiel
support terrorist or terrorist organizations, and now carry enhanced penalties.
We have used newly streamlined authority to use trap and trace orders to track
communications of a number of criminals including the terrorists, kidnappers and
murderers of journalist, Danny (ph) Pearl, as well as identity thieves and a
four time murder.
We abuse new authority to subpoena information about
Internet users, network addresses, to track down terrorists and computer
hackers. We abuse newly authorized nation-wide search warrants for terrorist
investigations at least three times, including during the ongoing anthrax
investigation. We abused, on many occasions, provisions in the act to foster an
unprecedented level of cooperation and information sharing between government
agencies. For example, we have disclosed grand jury information on at least 40
occasions.
We have saved precious time and resources through a provision
that permits officials to obtain court orders for electronic surveillance
pertaining to a particular suspect rather than a particular device. We have used
the provision allowing Internet providers to disclose records to law enforcement
in emergencies preventing risk of life. This authority allowed us to track down
a student who posted electronic bulletin board threats to bomb his high school
and shoot a faculty member. We have also made sure that the prosecutors in the
field know what valuable tools Congress has provided them by training and
through guidance.
I would like to conclude by thanking the members, once
again, of your committee for your efforts in so swiftly giving us these tools.
FEINSTEIN: Thank you very much, Ms. Fisher.
Mr. Lormel, welcome
back to the committee.
LORMEL: Thank you, ma'am.
I also
appreciate the opportunity to participate in this forum today. I've submitted a
formal statement for the record and I would just like to augment that with some
comments, and particularly to stress the importance of interagency cooperation.
And clearly it's important in our mission.
I'd like to commend the
Treasury Department, who aren't here, for their outstanding efforts in
furtherance of methodologies being developed for use of the PATRIOT Act in
working with us, and particularly David Aufhauser for his leadership role in the
policy coordinating committee on terrorist financing.
I'd like to focus
my comments on the progress that we're making in terrorist financing
investigations, and the operational benefits that we specifically derived from
the PATRIOT Act. I think that will be important for your -- for your benefit.
First, our mission is two-fold. We were formed to investigate the events
around the 19 hijackers and identify the financial infrastructure and flows.
We've pretty much completed that. And at the same time, we set up a template for
investigations in the future to be much more proactive and progressive and
predictive. We've adopted a centralized approach, which our methodologies --
we're looking outside the box to develop new methodologies in our approaches.
And clearly, the -- excuse me -- PATRIOT Act really helps us in that regard.
Our strategies are to conduct full financial analysis of terrorist
suspects and their financial support structures, disrupt and dismantle terrorist
funding mechanisms, coordinate the joint participation and liaison and outreach
efforts to exploit financial investigative resources of private, government and
foreign entities, to utilize the FBI and LEGAT expertise in reaching out and
fully exploiting those relationships, work jointly with the law enforcement
regulatory and intelligence and business communities to develop predictive
models based on terrorist cell financial traits, to conduct data mining analysis
to proactively identify terrorist suspects. We're also providing financial
investigative component for the counterterrorism division and the overall
mission. We're a support component of the
terrorism division.
Our investigative initiatives include support to significant
terrorism investigations and deployments, strategic
investigative targets that we're going after, which include Al Qaida cells and
other cells of -- like Hamas and Hezbollah in particular. We're looking at
financial institutions, particularly non-banking financial institutions, the
Hawallas, the money services businesses and others. And clearly in that regard
the PATRIOT Act is a big help to us.
We're looking at NGOs and
charities, fund raisers, facilitators, couriers and donors. We are conducting a
number of data mining initiatives. We're looking at undercover possibilities and
platforms, clearly looking at the Internet. And we've established the 24/7
financial monitoring capability where we've got a network of over 411 financial
institutions involved. Clearly, human intelligence and outreach are important.
We're striving to disrupt the flows of funding to terrorists by going
back to the donors and forward to the strike teams. There are clearly three or
four tracks, and I'll come back to that in questions if you'd like, as to how
we're proceeding on that regard.
And again, I'd like to reiterate the
importance of our cooperation and coordination, particularly with the CIA and
Treasury, and since then, in particular, our important partner for us with
regard to the PATRIOT Act and the utilization of the provisions.
The
benefits that we've derived from the PATRIOT Act, clearly on the financial side,
the enhanced reporting requirements regarding suspicious activities particularly
with the non-banking financial institutions, registration requirements for
licensed money remitters. And this provides us with a broader data mining and
investigative avenue to go after information. The authority to seize terrorists'
assets has been beneficial. The ability to seize foreign banks accounts or funds
in foreign bank accounts through correspondent accounts here in the U.S. has
been helpful. The ability to prosecute unlicensed money remitters is going to be
very important to us. The more timely access to reports on currency transactions
in excess of $
10,000, authority for the service of
administrative subpoenas on foreign bank accounts concerning records of foreign
transactions, clearly the sharing of intelligence information and the criminal
information between us and the CIA, in particular, has been very important. And
the mandated fence-in (ph) establishment of the secure network, that's going to
be a tremendous benefit. I believe that our operation will be the primary
beneficiary from that.
And there are some other things, Senator, but in
deference to time and to Senator Feingold, I'll stop here. And again, I can
expand on this during questioning.
Thank you very much.
FEINSTEIN: Good. Good. We certainly want you to. Thank you.
Senator, we'll turn to you.
FEINGOLD: Thank you, Madame
Chairman. And I want to commend you and Senator Kyl for holding this very
important hearing, and your tremendous courtesy in letting me go first. I really
do appreciate that. My opportunity to speak on the Iraq resolution is at 11:00,
so I am grateful.
One of the most vital tasks Congress has is to ensure
that the powerful tools we give to law enforcement are used effectively and
appropriately. I hope that this hearing will become part of a vigorous and
consistent review of the tools Congress has given law enforcement.
On
July 24, I sent a letter to the attorney general requesting a full report on the
implementation of the USA PATRIOT Act, and asked specific questions about the
business records, computer trespass and FISA (ph) of roving wiretap provisions.
I still have not received answers to my questions about the use of the business
records, computer trespass and FISA (ph) of roving wire tap provisions of the
USA PATRIOT Act. These provisions deserve close Congressional oversight because,
of among other reasons, the enormous potential chilling effect on the first
amendment rights of innocent Americans who simply want to buy a book from an
online retailer, or borrow a book from a local public library.
Nevertheless, I have received the department's unclassified responses to
a house judiciary committee letter that requested information on USA PATRIOT
Act. The department answered in response to many of the questions posed by
Chairman Sensenbrenner and ranking member Conyers that the information would be
shared with the House intelligence committee, but not the judiciary committee.
This is not a response in my view.
FEINGOLD: There is no reason
why the department should not share with me or my colleagues on this committee
or the House Judiciary Committee information, like the number of times the
government has requested records from public libraries, book stores or
newspapers.
Congress has an important responsibility to exercise our
oversight of the department's application of the USA PATRIOT Act, a law that
significantly expands the federal government's power to intrude in the lives of
law abiding Americans. To the extent the responses are classified, of course, we
have well tested procedures for handling that type of information in this
committee.
I am still hopeful that I will receive a full and complete
response to my July letter, as well as copies of the responsive material that
the department has apparently conveyed to the House Intelligence Committee, but
has so far refused to share with the House and Senate Judiciary Committees.
And I would like to just ask a couple of questions. Ms. Fisher, I have
heard that the Justice Department is gathering proposals from various divisions
from within the department for a possible sequel to the USA PATRIOT Act.
Could you please describe what efforts are being made within the
department to seek to broaden the powers of the USA PATRIOT Act through
additional legislation, and what other changes to existing law you anticipate
that the Justice Department will propose?
FISHER: Thank you, Senator.
We have been, internally, within the Justice Department, looking at
potential proposals on following up on the PATRIOT Act for new tools. And we
have also been working with different agencies within the government. And they
are still studying that. And hopefully we will continue to work with this
committee in the future on new tools that we believe are necessary in the war on
terrorism. FEINGOLD: Can you give us some sense of what
you're looking at?
FISHER: At this point, I can't. I'm sorry. They are
studying a lot of different ideas and a lot of different tools that follow up on
information sharing and other aspects.
FEINGOLD: I would ask you and the
department to provide us with some sense of where they are heading on this as
soon as possible so that we're not confronted again -- and it was more
understandable last time, of course -- with such a brief period of time in which
to review such a significant series of proposals.
FISHER: Yes, Senator.
FEINGOLD: Listening to the witnesses, I am struck by the tools being
used in the war on
terrorism that are not being spoken about
today.
Since September 11, the Justice Department has declared and
imprisoned two U.S. citizens as enemy combatants and detained people as material
witnesses. In each of these instances, the Justice Department has opposed
judicial review and refused to answer congressional questions about the affected
people.
Now, I think the rules under the Constitution are pretty simple.
If you have evidence of criminal misconduct, then you should provide people with
attorneys, bring them into a courtroom and prosecute them. And if you don't have
evidence, the Constitution dictates that you cannot hold them indefinitely.
Given the successes that you just, I think, reviewed that DOJ has had in
criminal cases arising from the war against
terrorism, what is
it about the criminal justice system that leads the Justice Department to fear
criminally charging the accused and prosecuting them in a courtroom?
FISHER: I take it that's directed at me?
The...
FEINGOLD: Please -- yes.
FISHER: The Justice Department is not
fearing of criminal charges. But it is important to understand that these are
two separate tracks. Enemy combatant is something that comes under the
president's authority, as commander in chief of our country. And it provides the
military -- and this has been upheld by the Supreme Court -- with the authority
to detain combatants that would cause harm to our country.
So,
therefore, it's made on a case-by-case situation whether someone -- for example,
if you are referring to Mr. Padilla or Mr. Hamdi -- should be detained as enemy
combatants under those powers or should be charged in a Article III court. But I
will say that even if they are held as enemy combatants, they are not held
indefinitely, as you suggest. In fact, they are held for the duration of the
conflict.
FEINGOLD: Well, why was the choice made not to charge them in
a criminal procedure? What is it about them that means that they can't be
charged in a criminal procedure?
FISHER: Well, I wouldn't comment on
saying that they can't be charged. It often may be the case that you could
qualify as both an enemy combatant and be charged in a criminal Article III
proceeding, such as John Walker Lindh.
However, in this case, when the
department and other aspects of the government looked at the facts and looked at
the national security interests and the information available, it was commander
in chief power, utilized by the president to detain these two individuals as
enemy combatants.
FEINGOLD: I understand that's the decision, but let me
just say that I think it's deeply troubling to many Americans to not really
understand why the decision was made. I understand that the decision was made,
but given the lack of rights and procedures that are associated with this rather
startling enemy combatant concept, I think that it would be in the interest of
the administration to provide a better explanation of why this rather unusual
procedure is used.
Finally, Mr. Fine, pursuant to Section 1001 of the
USA PATRIOT Act, your office submitted a report concerning complaints alleging
abuses of civil rights and civil liberties by employees and officials of the
Justice Department covering the period of from October to June 2002. According
to the report, there were 458 complaints suggesting a USA PATRIOT Act-related
civil rights or civil liberties connection.
These complaints included
charges of excessive force, illegal detention and a denial of the right to
counsel.
What is the status of the IG investigation? And what can you
tell us about the merits of the complaints that you have investigated?
FINE: Senator Feingold, I can tell you that we have a number of ongoing
investigations, both criminal and administrative. We have also referred several
of the allegations to other agencies, including the FBI, who is reviewing and
investigating some of them.
In addition to the individual ongoing
investigations, we also have a review that tries to look at it in a systemic
way. So we have looked at the treatment of special interest detainees at two
facilities -- the Metropolitan Detention Center in Brooklyn and the Passaic, New
Jersey, facility -- looking at issues such as their access to counsel; whether
their -- conditions of confinement; the timing of charging decisions.
We
are pretty far along in that review and we hope to have a comprehensive review
done in the near future.
So we are working hard on that and look forward
to having findings...
FEINGOLD: You don't have any comments in the
merits of the complaints at this point?
FINE: I wouldn't want to comment
on an ongoing investigation.
FEINGOLD: My time, I think, has expired,
but I would ask the Justice Department -- Ms. Fisher -- really hoping to get an
answer to my letter of July. And if there is any information that needs to be
presented in a classified manner, so be it. I have that clearance -- others on
my staff do.
I surely think that the members of the Senate and House
Judiciary Committee are entitled to the answers to those questions.
And
I do thank all the witnesses and especially thank the chair for letting me do
this.
FEINSTEIN: Thank you. Thanks, Senator.
My first question
is of Ms. Fisher. And I want to just, sort of, set this question in some
context, if I might. In June, the Department of Justice announced that a man was
being held. His name was Abdulla al Mujahir. He was 31 -- a former Chicago gang
member who Americans said was born Jose Padilla in Brooklyn. He was raised as a
Roman Catholic, but he converted to Islam and began using a new name.
Mr. Padilla traveled to Pakistan, received training from Al Qaida in the
wiring of explosives, intelligence officials have said. While he stayed at an Al
Qaida safe house in Lahore, he conducted research of radiological devices on the
Internet.
Now, in the PATRIOT Act, we changed the definitions of pen
register and trap and trace devices to include devices that track dialing,
routing, addressing or signaling information. And for those that might be
interested, pen registers and trap and trace devices are like caller ID on a
telephone. They record the date, the time and the phone number of outgoing and
incoming calls. But they don't reveal their content.
This change allows
the tracking of e-mail and Internet usage, rather than just phone calls.
However, e-mail routing information and Web addresses provide a lot more
information than a telephone number. The e-mail address John Smith at yahoo.com
identifies a person, not a fixed piece of equipment and a Web address such as
http://www.plannedparenthood.com/
provides information about a person's thoughts and interests.
To solve
this problem, the PATRIOT Act requires that pen registers and trap and trace
devices do not capture the content of any communication.
My question to
you is how extensively has DOJ been using pen registers and trap and trace
devices to track e-mail and Internet usage? And how do you ensure that these
devices do not capture the content of any communication?
FISHER: Thank
you, Senator. We do share your concern about content. And we have not used the
tools, as we should not, to gather content information.
But the pen trap
and trace statute and the tool authorized by the PATRIOT Act has been used on
several occasions, although I don't have the particular number of times at my
fingertips. It was used in the Danny Pearl case. It was used with regard to
other terrorist conspirators; one major drug distributor investigation; identity
thief investigation; to track down a four-time murderer; and as well as a
fugitive who was fleeing using a false passport.
So we have been using
this tool and we have been very cautious not to get into content or the Web
addresses, as you suggest.
FEINSTEIN: So it has been a successful tool?
FISHER: Absolutely.
FEINSTEIN: Do you see any violations of
privacy?
FISHER: No. In fact, I am not aware of any violations of
privacy. This tool has been used very carefully. The deputy attorney general
issued a memo clearly delineating the department's policy with regard to
avoiding over-collection and avoiding the collection of content in the use of
this authority.
FEINSTEIN: Thank you.
Mr. Lormel, I want to give
you an opportunity to expand on the strike aspect that you spoke about in your
opening comments. And this, of course, relates to Title III of the PATRIOT Act,
which focuses on money laundering. And the Title provided for increased
information sharing. It allows suspicious activity reports received by the
Treasury Department to be shared with intelligence agencies and it authorizes
the sharing of surveillance information between law enforcement and intelligence
agencies.
Perhaps you can bring us up to date on any new activities that
you're taking in that regard, how well this is working and what you are finding.
LORMEL: Yes, Senator.
We have -- some of our agents are assigned
over at CIA Counterterrorism Center. And, conversely, they've got people
assigned with us. And, as I mentioned, we work very closely with FinCEN. And in
that regard, the sharing of information back and forth between us and the CIA
has been outstanding.
I don't have any anecdotes that I could really get
into in this forum.
FEINSTEIN: You don't have any nuggets like you had
last time you appeared before us?
(LAUGHTER)
And perhaps I
should ask about that. Have banks done anything about the hijackers?
Ladies and gentlemen, six of the hijackers just went into a bank to open
an account, Mr. Lormel informed us at one of our earlier hearings. And in doing
so, they just made up Social Security numbers.
LORMEL: Well, in regard
with the Social Security numbers, let me clarify that. The numbers that were
used weren't necessarily "made up" numbers, but they were on the application in
the Social Security field, itself. So they are numbers that, for automation
purposes, they had to fill in. and in a couple of instances -- not in the six
instances -- Social Security numbers were listed which may have been FAA
numbers, as opposed to Social Security.
But in the instances where the
banks, themselves, listed the numbers, it was basically for administrative
purposes in the use of those particular numbers.
But going to the
greater question of the cooperation with the banks, in my statement or the
comments I wanted to make were some observations, Senator, that I've seen in
implementations of the PATRIOT Act. And in anticipation of the implementation
between the banking community and, particularly, the non-banking financial
institutions, their concern about consequence and their concern about doing the
right thing in terms of reporting and working closer with us has been
outstanding.
And that includes forms that we've had through FinCEN and
independent of FinCEN, where we're trying to promote the use of the PAC (ph)
system that FinCEN is implementing. We believe that that's going to enable us,
in terms of the data mining, to get information in electronic format that we'll
have more timely access to and more timely responsiveness in terms of following
up on leads and investigations.
FEINSTEIN: So, to date, tell us what
you're able to do with respect to the Hawala method of transferring funds to
terrorist organizations.
LORMEL: In regard to that, let's go beyond the
specific Hawala, but into that whole informal mechanism. And the fact now that
there are licensing or reporting requirements helps us tremendously.
We
are in the process -- we're going to have a conference in the next few weeks
where we're bringing prosecutors together with our agents to determine the best
vehicles out there for proceeding with prosecutions.
We have had some
success in the disruption of money flows. And I think there are intelligence
reports that will support that.
In terms of the actual Hawalas and that
informal networking, the registration requirements through FinCEN, again, are
enabling us to identify who is a licensed money remitter that's outside the
normal banking confines and who are unlicensed and, perhaps, illegal. And it
enables us to set up strategies and methodologies on both of those tracks.
So we're proceeding accordingly.
FEINSTEIN: Thank you.
My time is up.
Senator?
KYL (?): Thank you.
Let
me begin with Mr. Fine. The threat assessment, with regard to
terrorism, that you strongly suggest the FBI should get on with
producing you said was hampered to some extent by, at least according to the
FBI, a lack of analytical capability within the FBI. Is that correct?
FINE: Yes.
KYL (?): What would it take to correct that
deficiency for the FBI?
FINE: I think the FBI needs to focus attention
and energy on developing a core of trained, professional analysts. They have
some, but they need more. And I think the FBI recognizes that.
In the
past, it has not valued it as much as it, perhaps, could have and should have.
There has been a focus in the past on reactive crime solving. Agents work has
been valued, but the more strategic analytical overarching analysis that needs
to be done and should be done hasn't received as much attention in the past. I
think it needs to receive more attention in the future.
KYL (?): I know
the FBI Director Mueller immediately brought some CIA analysts over to the FBI
-- that kind of thing, perhaps -- I mean, I know he doesn't want to raid the
CIA, but that kind of thing could, at least in the short term, help to augment
his cadre, could it not?
FINE: Yes, it could. He has brought over 25 CIA
analysts as detailees that can help in the short term. In the long term, I think
the FBI needs to develop its own permanent, professional analyst capabilities.
KYL (?): And if they were able to engage in this analytical discipline,
it would also require the integration of their field office personnel and the
information that they derive from that with the other aspects of the
intelligence community, including the CIA. Because you can't do analysis without
a full knowledge integration. And so that, in itself, would be a useful exercise
for further analytical capability of the FBI, would it not?
FINE:
Absolutely. The FBI can't do it on its own. It needs to use intelligence and
information from throughout the government and elsewhere to factor into its
analysis.
It did try, as we indicated in our report, to look into the
threat of weapons of mass destruction, but it didn't do it with all the
information that it should have. It has to reach out, outside the FBI, for
expertise that can help them in this area.
KYL (?): I think we're all
aware of the fact that the FBI had some really good nuggets of information, but
they weren't brought together in a central place. And this call that you're
making for an analytical document, which would then, presumably, be ongoing, is
a very important thing.
And I want to ask Mr. Lormel -- I gather the FBI
has acknowledged the need for this. I suspect that you're not in a position to
tell us why it hasn't been fully implemented, but at least, perhaps you could
confirm to us that you will help convey the message to those with whom you work
that we think this is an important thing to do -- to move on with very quickly
and to let us know what you need, if anything -- that Congress can help to
provide in order to get this done.
LORMEL: No. In that regard, Senator,
I am aware that we are taking steps to move forward. For instance, we have, I
believe, 240 analysts in some stage of backgrounds to come on board. And,
clearly, the director deserves a lot of credit for his vision to integrate the
analytical component with the operational component and also the third leg --
the financial component. Our financial analysts and things are going to be
integrated into that process.
There are strategic reports that are now
being drafted that the analytical component -- that the people from the agency
are involved in finalizing, which will be going forward, I believe, in the very
near future.
KYL (?): Well, just to conclude this point, be sure and
convey to those with whom you work our view that this is a very important aspect
of the FBI's contribution to the war on terror. The recommendations of the
inspector general should be closely examined. And if there is any disagreement
with any of that, to let us know. But, otherwise, we'll expect that it will be
done with some alacrity.
LORMEL: Well, again, Senator, if I may -- you
know, we embrace those recommendations. And I know that the director is looking
to continuously improve our performing...
KYL (?): Let me just make one
other point -- we heard testimony yesterday from Louis Freeh. And he documented
how -- and I remember him coming before this very subcommittee three and four
years ago asking us for authority. Senator Feinstein and I supporting those
authorities. We couldn't get total cooperation from other members of the Senate
and House. And, as a result, it wasn't until after September 11 that a lot of
what he was asking for was actually done -- like the trap and trace, for example
-- was a good example -- the roving wire tap. Those are authorities he asked for
long ago.
He also asked for more agents. And he asked for something like
1,800 agents and I think we gave him 76 over a three-year period or at least
numbers in that general realm.
So part of the problem is us not
necessarily providing what is needed. And if there is something needed here to
get this job done, we expect to be told.
Just my -- the red light is on
-- let me just close with one question for Ms. Fisher.
In response to
Senator Feingold, you indicated that there was an ongoing review of needs within
not just the Department of Justice, but other agencies of the government to
augment what has already been done in the USA PATRIOT Act and that study would
produce a set of recommendations hopefully early so that we can act on that very
early next year. That last part is -- I'm adding to your testimony.
But
in this regard, I am especially interested in having you look at the provisions
-- I think there are some 14 of them in the PATRIOT Act -- that will sunset in
three years. And, unless you are aware of specific problems that have arisen
with the application of those provisions, several of which are very important, I
would hope that you could assess the desirability of making those provisions
permanent, as part of the recommendations for legislative reform.
Your
comment?
FISHER: We certainly will. As we all know, we don't expect the
war on
terrorism to sunset in the near future, unfortunately.
And we certainly are using all of the tools. And we don't believe that they
should sunset. We've put them to good use and so making that part of our
recommendations, I think, is a very good idea.
KYL (?): All right. And
then, finally, I'm kind of catching you off guard here, but Senator Schumer and
I have an amendment that we'd like to get adopted sometime before Congress
adjourns that would slightly modify the FISA warrant procedure to add to the
definition a foreign person so that you -- and this, perhaps, would pertain to
Moussaoui, but I don't ask for your comment on that -- where you have an
individual that you don't necessarily -- you believe he's engaged in
terrorism, but you can't necessarily connect him to a specific
terrorist organization or foreign power, would still permit the warrant to be
obtained to investigate further.
Previous witnesses representing the
Department of Justice or the FBI have testified in favor of that. Is that still
the position of the department?
FISHER: Absolutely. The administration
supports your bill on that. We think that it's an important and needed fix.
KYL (?): Thank you.
FEINSTEIN: To you, Ms. Fisher, I need to say
one thing -- I authored legislation that was signed into law in 1999 that
mandates up to 20 years in prison for anyone who distributes bomb-making
information knowing, or intending, that the information would be used for a
violent federal crime -- that's 18 USC 842(p).
Now, this law has been on
the books for three years. It has not been enforced. We know that bomb-making
information has been found. We know that in Afghanistan -- we know that it's
been found from the Internet. We know that it's intent is clearly for terrorists
to use it to violate a federal law.
Federal prosecutors have only
charged a single person under the statute and then these charges were quickly
dropped for lack of evidence.
I see this as a indispensable supplement
for anti-
terrorism tools. Terrorist groups, we know, are not
only actively searching out bomb-making information, but they're even
distributing it for recruitment and instructional purposes.
If they do
that, you've got them for 20 years. Why don't you use the law?
FISHER:
Well, Senator, you raise a good point. Clearly, you're right -- we do know that
there are individuals out there that are doing this kind of activity with regard
to bomb-making materials. I can't speak to the one case where it was used and
dropped.
We can certainly take a fresh look at that statute and where
appropriate, charge it.
FEINSTEIN: I mean, one Al Qaida videotape
consisted of a lab session showing the materials and processes needed to make
TNT and high explosive bombs. So, I mean, you have a cause.
And this
ties in with my second question and I was very surprised to see this. My staff
did some research and, according to an analysis of DOJ records by the
transactional record access clearing house -- that's associated with Syracuse
University -- from October 2001 to March 2002, federal prosecutors turned down
55 percent of referrals in international
terrorism cases and 46
percent of referrals in domestic
terrorism cases.
Now,
what's surprising about this is the likelihood was to decline prosecution for
terrorism cases to a much greater extent that for other cases.
The declination rates for referrals in non-
terrorism cases
during the same period was 32 percent.
Why is that?
FISHER:
Well, Senator, a couple of points on that -- first, over the past year -- and
certainly since September 11, which I think you said the data started -- I have
been involved in overseeing
terrorism prosecutions. And
terrorism prosecutions come up for approval, regardless of
where they are in the U.S. attorney's office, they come up for approval through
main justice. And I am not aware of one
terrorism case that we
have declined.
(CROSSTALK)
FISHER: Putting that aside...
FEINSTEIN: Can I ask that perhaps you, then, research it and give the
committee a response in writing? I'll be happy to give you the question in
writing right now.
FISHER: Sure.
FEINSTEIN: And perhaps you
would answer it in writing within the next week.
FISHER: OK.
I
am aware that there is a definitional issue of how the FBI characterizes what is
a
terrorism case. And I know that the FBI is working with the
executive office of U.S. attorneys on these statistics to figure out what the
definitions are.
It may be that included in those numbers are
intelligence cases, which don't necessarily go to the criminal division because
they are continuing as intelligence operations.
It also may be that
something is cataloged as a terrorist investigation initially, but later it is
determined that it has no links to
terrorism and it is some
other type of charge and so, therefore, it is not pursued as a
terrorism case.
But it is important to note that I am
not aware -- and I don't think that the people at main justice are aware of any
terrorism cases, and certainly no international
terrorism cases, where we have declined prosecution or stepped
away from that. We are very aggressively pursuing those cases.
FEINSTEIN: Well...
FISHER: And I will be happy to look at your
question and get back to you with an answer.
FEINSTEIN: Right. Thanks so
much.
Senator, do you have any?
Well, let me just thank the
panel very much. You've been very gracious with your time and also with your
expertise and we appreciate it.
FISHER: Thank you.
FEINSTEIN:
Thank you.
KYL (?): Thank you very much.
FEINSTEIN: We will now
go to the Visa Reform and Border Entry Act. And I will introduce the witnesses.
We have Scott Hastings from INS. Scott is the associate commissioner for
the Office of Information Resources Management with INS. He is responsible for
the information technology programs, including all electronic enforcement
technology programs. He is also responsible for examining the role of federal
information technology organizations and their future configurations and
structure.
Michael Cronin, also of INS -- he serves as assistant
commissioner for inspections. He is responsible for program and policy
development relating to INS operations at our nation's ports of entry. He is the
principal point of contact between the INS and other government agencies --
active at ports of entry, as well as numerous foreign governments.
FEINSTEIN: Steven Edson, from the State Department, began his work with
State in '81. He now serves as the acting managing director of the visa services
directorate with the department's Bureau of Consular Affairs. He has served the
State Department all over the world, including Thailand, India and Japan.
Mr. Benjamin Wu represents the Commerce Department. He is the deputy
undersecretary for technology at that department. In that role, he supervises
policy development and direction among numerous federal offices that work on
technology policy, including the National Institute of Standards and Technology,
which was directed in the USA PATRIOT Act and the enhanced Border Security and
Visa Entry Reform Act to work with INS and the State Department to develop a
biometric standard for immigration documents.
Clearly, we want to know
where that is today.
So if I might, perhaps I could begin with you, Mr.
Hastings -- if you gentlemen would confine your remarks to five minutes -- go
right down the line. And then we'll be able to ask you some questions.
HASTINGS: Madam Chairman, the INS has prepared a single statement and
Mr. Cronin will summarize, so I will defer to him.
FEINSTEIN: That's
fine.
CRONIN: Thank you, Madam Chairman...
FEINSTEIN: Thank you.
CRONIN: ... -- Senator Kyl.
Thank you very much for the
opportunity to participate in this hearing concerning coordinated information
sharing among federal agencies in the war against
terrorism.
Since September 11, INS has witnessed an unprecedented increase in
information flow among agencies. We strongly recognize our need for vital
enforcement and intelligence data. And we are committed to providing accurate
and timely immigration data to other agencies that require it.
We are
also strongly committed to the use of this data in a fashion that improves the
security of our borders, while limiting disruption to legitimate travel and
trade.
We appreciate the support and leadership of the Congress for this
information sharing effort, especially as embodied in the USA PATRIOT Act and
the enhanced Border Security Act.
The Office of Homeland Security, in
conjunction with the Office of Management and Budget, is leading critical
initiatives to improve and monitor information sharing among key federal
agencies and to ensure the timely provision of critical data to state and local
law enforcement and emergency management agencies. We also are working
internationally to develop new and better ways of sharing information that will
support intelligence and enforcement efforts.
INS has been engaged in
broad-based information sharing efforts since long before the terrorist attacks
of September 11. For more than a decade, INS has joined with the U.S. Customs
Service in development and management of the Interagency Border Inspection
System, or IBIS, which is the principal border lookout system, containing data
from more than 20 federal agencies, as well as real time linkage to the National
Crime Information Center or NCIC.
Since the late 1990s, INS has been
working with the Department of State to develop and expand the datashare project
under which visa data is transmitted electronically through IBIS to our ports of
entry.
In January 2002, the consolidated consular database was made
available to ports of entry. Through use of this system, inspectors can access
non-immigrant visa issuance information, as well as a photograph of the rightful
bearer of a visa.
Before and after September 11, INS has worked with the
U.S. Marshal Service and the Federal Bureau of Investigation to include wanted
persons' fingerprint data in INS' fingerprint system -- IDENT.
For
nearly a decade, INS has received data from the State Department's TIPOFF
database of suspected terrorists.
Each of these systems and projects has
led to significant enhancement of the security of our borders through the
interdiction or apprehension of numerous terrorists and criminals.
Also
related to and supported by the USA PATRIOT Act and the Enhanced Border Security
Act are several key programs designed to manage and track the entry, stay and
departure of foreign visitors. INS has formed an interagency project team with
representative from the Departments of State, Treasury, Transportation and
Justice to effect the creation of the statutorily mandated entry-exit tracking
system.
This effort has lead to implementation of electronic tracking of
the arrival and departure of visa waiver program travelers, as of October 1 of
this year, with full implementation for all foreigners arriving by air
anticipated as of January 1, 2003.
This information will be fed
automatically into the arrival- departure information system -- ADIS -- which
will be the repository for arrival and departure data, eventually replacing the
current non- immigrant information system.
INS has also very quickly
implemented the national security entry-exit registration system, under which
certain non-immigrant aliens, who may potentially pose a national security risk,
are fingerprinted and interviewed upon arrival in the United States and
registered periodically if they remain in the United States for a period
exceeding 30 days and again if they remain for more than one year.
Registration information is also updated in the event of changes of
address, employment or schools and again upon departure from the United States.
The legislation we are discussing today mandates use of biometrics in
various documents and processes. INS is awaiting the results of evaluation and
development of biometric standards by the National Institute of Standards to
proceed to develop approaches to this statutory direction. In the interim, we
are working with the Departments of Justice and State to design and evaluate
processes and technologies which could potentially be used in the integration of
biometric checks and border operations.
Next week, we will begin
deployment of border crossing card readers to selected ports of entry for test
and evaluation prior to a large-scale procurement of readers for all ports of
entry.
The INS has made significant progress in development and
implementation of the student and exchange visitor information system and we are
confident that we will meet the January 1, 2003, deadline for full
implementation established in the USA PATRIOT Act, with gradual incremental
implementation of use of the system by schools throughout 2003.
In May
2000, INS initiated a project to develop a business-driven enterprise
architecture. The result is a multi-year modernization plan which provides a
blue print and build out plan for modernizing information systems and technical
infrastructure. This clearly has been a broad brush over a great deal of
activity in the area of systems development and information sharing.
Once again, we thank the committee for this opportunity to testify on
these important issues. And we welcome any questions.
FEINSTEIN: Thank
you very much -- appreciate it.
Mr. Edson, do you have comments?
EDSON: OK.
Madame Chair, Senator Kyl, thank you for allowing me
to speak this morning concerning the progress of the Department of State's
efforts to implement the provisions of the Enhanced Border Security and Visa
Entry Reform Act of 2002.
In implementing the immigration laws of the
United States, the Department of State has no higher priority than our national
security. We participate with the border security agencies and the broader law
enforcement and intelligence communities in a wide range of activities,
including, but not limited to, the visa process to ensure the greatest possible
cooperation in our joint efforts to secure our borders and fight
terrorism. Although these relationships are
long-standing, they have been significantly expanded in the past year. We are
dedicated to meeting the opportunities provided by the Enhanced Border Security
and Visa Entry Reform Act, both to build on our efforts to date and to break new
ground in our common search for a safer United States.
In my written
remarks, I have provided a comprehensive review of our efforts by section in the
implementation of the act. Now I would like to just provide some highlights.
Significant progress has been made in the past year to increase the
amount of information available to visa officers overseas and, conversely, to
INS and other law enforcement and intelligence agencies in the United States.
The State Department's Consular Lookout and Support System -- CLASS -- is a
principal example of this progress.
We have been able to leverage the
provisions of the Enhanced Border Security Act and the USA PATRIOT Act to make
CLASS an ever more effective tool for fighting
terrorism. CLASS
uses sophisticated search algorithms to match lookout information to individual
visa applicants. Every single applicant is run through this system.
CLASS in only as good, however, as the data it contains. And I'm happy
to report that post-9/11, this situation has improved dramatically. CLASS
records have doubled in the past year. More than seven million names of persons
with FBI records have been added to CLASS by August of 2002, augmenting the 5.8
million name records that we already had from State, INS, DEA and intelligence
sources.
These NCIC records include the FBI's violent gang and terrorist
database, a particularly valuable resource. Twenty thousand Customs serious
violator name records have been added to CLASS since September 11, 2001. CLASS
now has over 78,000 name records of suspected terrorists, up 40 percent in the
past year. Most of this information has entered CLASS through the TIPOFF program
run through the department's Bureau of Intelligence and Research that acts as a
clearinghouse for sensitive intelligence information provided by other agencies.
Since September 11, 2001, approximately 20,000 new terrorist lookouts
have entered CLASS through TIPOFF, alone.
FEINSTEIN: Say that again,
would you? Approximately...
EDSON: Twenty thousand new entries into
CLASS concerning terrorists that we've gotten through TIPOFF in the past year.
The State Department's CLASS lookout system has used, for some time now,
linguistically sensitive algorithms for checking Arabic and also (ph) Slavic
names. A Hispanic algorithm is developed and ready for implementation. And an
algorithm for East Asian languages is under study.
We have been a leader
in the development of linguistic logic for search purposes and we are actively
engaged with other U.S. government agencies to help share this expertise as we
work to expand those language algorithms.
The State Department currently
shares electronic data with other agencies, including INS, and is rapidly
expanding information sharing arrangements throughout the law enforcement and
intelligence communities.
Our CLASS database is already interoperable
with the Interagency Border Inspection System -- IBIS -- that INS uses. In fact,
we've been sharing information between CLASS and IBIS since 1995.
The
department's systems use open, flexible architecture, consistent with industry
standards, in order to facilitate information sharing. All non-immigrant and
immigrant visa activities at all of our posts, worldwide, are replicated back to
a corporate consular consolidated database in Washington at five-minute
intervals, providing the department, INS and other U.S. government agencies with
a near real time window into this work.
We, in the State Department, are
actively participating in the design and the development of the Student Exchange
and Visitor Information System -- SEVIS -- the permanent system that will
contribute to our national security as it adds integrity to the student and
exchange visa issuing process. At the same time we're working on SEVIS
implementation, in response to a separate legislative mandate, the department
has launched the Interim Student and Exchange Authentication System -- ISEAS --
which will provide for electronic verification of student and exchange visitor
visas until SEVIS is fully implemented.
As of October 7, nearly 3,000
educational institutions and exchange programs sponsored had entered
approximately 72,000 records into ISEAS -- 213 visa-issuing posts around the
world had used this system to verify 9,000 cases. ISEAS has provided both the
department and INS a better system to verify incoming foreign and exchange
students until SEVIS becomes fully operational.
This concludes my
testimony. And I would be happy, of course, to take any questions.
FEINSTEIN: Thank you very much.
Mr. Wu?
WU: Good morning
Madam Chairwoman and Ranking Member Kyl.
I appreciate the opportunity to
update you on the Department of Commerce's implementation of the US PATRIOT Act
and the Enhanced Border Security and Visa Reform Act, which the bulk of the work
is performed by our Technology Administration's National Institute of Standards
and Technology. And this is our nation's oldest federal laboratory and the only
laboratory with the express mission in working closely with industry to develop
measurements, standards and a variety of technologies.
Consequently,
NIST has been working with the biometrics industry and other federal agencies
for years and has especially been in very close collaboration over the past year
in meeting the statutory requirements to develop a biometric standard for visas
and passports.
In this Congress, Congress provided by statute
appropriate tools required to intercept and obstruct
terrorism
in our country. These laws call for the Departments of Justice and State,
working with NIST, to develop and certify technology standards to be used in
visa control systems.
NIST has a responsibility to develop and certify a
technology standard that can be used to verify the identity of persons applying
for a U.S. visa or using a visa to enter the country. The Department of Justice
and the Department of State also expect NIST to certify the accuracy of specific
government and commercial systems being considered for use in the visa system.
At this time, biometrics that are included in this studies are face (ph)
and fingerprints, including the 10 finger rolled fingerprint system, the flat
finger print matching system and also a single flat fingerprint for
verification, as well as face-based (ph) verification. And NIST has received
large-scale databases from both the INS and the State Department and is
conducting tests to be used for setting standards for certifying the accuracy of
proposed fingerprint and facial (ph) biometric technologies.
NIST is
also establishing interoperability standards for use between systems for both
identification and verification functions. This is being done jointly with
industries for the...
FEINSTEIN: Could you allow me -- could I just stop
you there?
WU: Yes, ma'am.
FEINSTEIN: We heard testimony -- oh,
maybe a year ago -- about all of these biometric cards that went on to the
border between our country and Mexico -- I think five million, but no readers
for those cards. Is the biometric system that you are now talking about the same
as the system that's on those cards? Or is this a different one?
WU: The
system that we are using could be used -- my understanding is that it would be
or could be used for implementation with the system that we already have. But
I'm not clear as to whether or not it's the exact same system that you're
referring to. But we can certainly check on that.
FEINSTEIN: Seems to me
you'd want one system that's used all over so that all readers can...
WU: Well, that is the goal...
FEINSTEIN: ... jive with the
systems.
WU: ... ultimately to have one system that's interoperable that
can be used with multi-systems and, ideally, even using these standards and
applying them internationally, so we have a worldwide network for verification
and authentication for visas and border control.
FEINSTEIN: Please
continue.
WU: Thank you.
And this is being done jointly with
industry through the International Committee for Information Technology
Standards Biometric Committee in trying to achieve this international
interoperable standards system.
And this has also contributed greatly in
laying the foundation for interoperable data exchange for one of their primary
biometrics technologies and that's fingerprint technology.
NIST, working
closely with the FBI, state and local law enforcement agencies and product
vendors of fingerprint classification systems recently completed a joint
American National Standards Institution -- ANIS -- and NIST standard for the
data format for exchange of fingerprint information. And this standard promotes
the exchange of fingerprint data among different law enforcement agencies using
systems from different vendors.
NIST is also spearheading the Face
Recognition Vendor Test 2002, which is evaluating automated facial recognition
systems that eventually could be used in identification and verification
processes for people who apply for visas who visit the United States. The
significance of the Face Recognition Vendor Test 2002 is evident by its large
number of sponsors and supporters. This includes 16 federal government
departments and agencies. The current evaluation builds on the success of NIST
personnel who have had success in evaluating face recognition systems over the
past decade.
And this evaluation methodology developed for FRVT 2002
will become a standard for evaluating other biometric technology. And we will
learn precisely how accurate and reliable these systems are.
Fourteen
companies are currently participating in FRVT 2002. And we deliberately designed
a tough test that involved matching extremely challenging real world images. It
required participants to process a set of about 121,000 images and match all
possible pairs of images to this image set. In other words, this required about
some 15 billion matches. And as you can imagine, this generated a mountain of
data, and we are crunching all the numbers to see how well this system worked.
Also, open consensus standards, and associated testing, are critical to
providing the higher levels of security through biometric identification
systems. Throughout the years, NIST has worked in partnership with U.S. industry
and other federal agencies to establish formal groups for accelerating national
and international biometric standardization,
The Biometric Consortium,
which NIST is leading, serves as the federal government's focal point for
research, development, testing, evaluation and application of biometric
developed personal identification and verification technology. And this
consortium has grown by more than 900 members, including 60 government agencies.
NIST and the National Security Agency co-chair the consortium. And NIST
has collaborated with the consortium, the biometric industry and other biometric
organizations to create a CBEFF -- the Common Biometric Exchange File Format.
And this format already is part of a requirement for data interchange and is
being adopted by the biometric industry.
The specification is a
candidate for fast-track approval as an ANSI standard and as an international
standard for exchange of many types of biometric data files, including data on
fingerprints, faces, retinas, palm prints and iris and voice patterns.
And later this year also, NIST expects to submit a report, as required
by the act, on our work to the State and Justice Departments for transmittal to
the U.S. Congress. The due date, I believe, is November 10.
And the
report will make a recommendation on which biometric or a combination of
biometrics would best secure the nation's borders. The report will also address
interoperability standards and tamper- resistant standards.
And Madam
Chairman, I want to thank you and the committee, also, for the passage of the
act, not just because of the work that it's been -- that has made our country
safer, but also it allows for NIST to cooperate closely with several government
agencies in the development of biometric standards and testing. And this
cooperation has really been successful and allows for us to determine
appropriate test scenarios for biometrics and exchange of very large datasets of
fingerprints and face images obtained under operational conditions.
And,
as a result, we believe that the underlying science and technology for
biometrics will greatly benefit an overall biometrics industry will also
benefit, as well.
We thank you in Congress for providing legislative
tools to allow us to achieve this goal. And I thank you for the opportunity to
testify this morning.
FEINSTEIN: Thanks very much, Mr. Wu.
I'm
going to try and shorten my questions. And I have a number of them. And I think
I'd like to send them to you in writing, if I might. And hopefully you could
respond within a week.
I have a big concern over the visa waiver
program, largely because it is so huge -- 23 million people a year come in. And
I recognize why it's necessary. On the other hand, I recognize that it's a very
easy thing to abuse.
Now, if I understand it, in our bill, by October
26, 2004, every person participating in the visa waiver program should have a
machine- readable passport, I assume with biometric data. Will you meet that
date?
You were on the record -- Mr. Cronin or Mr. Edson?
EDSON:
Yes. I mean, we are already...
FEINSTEIN: Make that "yes."
EDSON: Yes. Many of the visa waiver countries have had machine- readable
passport programs at varying degrees of implementation for some time now. We
used the passage of the legislation to, sort of, heat up discussions with them
on this issue.
The EU countries have indicated to us that they are
planning on a uniform standard within the European community for the biometric
to be adopted. ICAO is proceeding at pace with work on a, sort of, a triple
standard. And it's our understanding right now that the ICAO members would be
allowed to choose one of those three.
But although no one is committing
to us to definite deployment plans right now in these foreign governments, it
looks as if they will all have some biometric that's accepted by ICAO within the
time allotted.
FEINSTEIN: Well, I might say both Senator Kyl and I
worked very hard on some of these aspects of the bill. And this is very
important to us. So we are going to be watching with glasses on.
To what
extent are you able to develop a pre-screening for visa waiver passport holders
so that you know who is coming into that program ahead of time?
CRONIN:
If I may, Senator, basically that's done through the collection of data on
departure by airlines. When airlines or when flights depart for the United
States, a manifest is provided to the U.S. Customs Service and to INS. We use
the data provided, while the flight is in the air, to screen the names of the
individuals on the flight -- to identify persons who may be the subjects of
lookouts. We do analysis on that data to identify persons who might fit broad
criteria that would indicate that they should be examined more closely for
criminal reasons -- for
terrorism reasons -- for reasons
relating to migration issues or Customs issues.
FEINSTEIN: Does the
manifest, alone, contain sufficient data to do that?
CRONIN: It provides
us the name, the date of birth, the nationality, passport number of the
individuals who are coming, as well as other data.
FEINSTEIN: And that's
in operation now?
CRONIN: Correct.
FEINSTEIN: And is it observed
100 percent of the time?
CRONIN: I can't say we're at -- we're very
close to 100 percent. We're working -- both INS and Customs are working closely
with the carriers to ensure that we are hitting 100 percent as to both the data
in the system and the accuracy of the data. That is going to continue to be an
issue. I mean, we will always be faced with keying errors, to some degree, in
the check-in process or similar aspects of error that can't be avoided. But we
are very, very close to 100 percent in terms of working with the carriers.
FEINSTEIN: Good -- that's good news.
Now, the 7.1 million
non-immigrant visas -- what is being done to assure -- A, that it's properly
filled out -- that it isn't falsified -- and that the exit date is carried out?
CRONIN: In terms of departure data, once -- we're basically using the
same system of gathering data from the airlines to close out the departures of
persons who have arrived.
The data is all coming to us electronically,
based on airline manifests.
The way the system functions, the airline
provides a departure manifest based on check-in information. They provide a
subsequent departure manifest based on boarding gate information to verify that
all persons that have checked in have, in fact, departed.
We are going
to have to continue to work with the airlines in terms of the integrity of the
system to ensure that there aren't elements of fraud introduced into the system
-- persons using other identities.
At this point, we're still relying on
provision of data from the airlines, albeit in electronic form. As this...
FEINSTEIN: But at this point, it could all be fraudulent data.
CRONIN: Sure.
FEINSTEIN: You would have no way of knowing.
CRONIN: We're relying on the data provided at check-in to the airlines.
The airlines are required to check documentation when the individual checks in.
But, by and large, as part of the statutory scheme, they are required to check
that documentation. And we get that data from them.
I would distinguish,
then, the National Security Entry-Exit Registration System where we are tracking
select individuals. Those individuals, on departure, will be interviewed by an
immigration officer. Their biometric will be verified against the data collected
when the arrived and their departure will be recorded by an immigration officer.
But, again, that's that select group of people that are subject to
national security entry-exit registration.
FEINSTEIN: I want to turn to
Senator Kyl. But, can you give me a percent compliance of the airlines with
this?
CRONIN: I would prefer to go back and give that to you for the
record. I am not sure, off the top of my head, that what I would give you would
be accurate. But I would certainly be happy to do that.
FEINSTEIN: Fine.
Thank you.
Senator Kyl? I know you have to leave and...
KYL:
Thank you, Senator Feinstein.
I would like to submit some questions for
the record to the entire panel here.
But because of the time limits of
this article, I would really like to focus that -- and primarily, I suspect, Mr.
Edson, these questions will go to you. You did not choose to be the subject of
my questioning this morning. And I don't mean this in any way personally. But I
would like to start by reading three paragraphs from the beginning of this
article to set the stage for it.
"On June 18, 2001, Abdul Aziz al Omari
filled out a simple two- page application for a visa to come to the United
States. Al Omari was not exactly the ideal candidate for a visa. He claimed to
be a student, though he left blank the space for the name and address of his
school. He checked the box claiming he was married, yet he left blank the area
where he should have put the name of his spouse.
This student indicated
that he would self-finance a two-month stay at the JKK Windom (ph) Hotel. And
evidently provided no proof, as required by law, that he could actually do so.
Despite the legal requirement that a visa applicant show strong roots in
his home country, to give him a reason to return from America, Al Omari listed
his home address as the Alquads (ph) Hotel Jeddah, Saudi Arabia.
Al
Omari didn't even bother filling in the fields asking for his nationality and
sex, apparently realizing that he didn't need to list much more than his name to
obtain a visa to the United States. He was right -- he got his visa.
When he arrived in the United States, he connected with his friend,
Mohamed Atta. And less than three months later, on September 11, he helped smash
American Airlines Flight 11 into the north tower of the World Trade Center."
Al Omari never should have gotten the visa that allowed him to be in the
United States on that day and neither should at least 14 of the other 9/11
terrorists.
Now, I discussed in my opening statement some of the other
facts that are in this story that relied upon the analysis of six experts --
people who were in the business -- State Department or INS -- looking at these
kind of visa applications. And their conclusion was unanimous -- that of those
that they reviewed, none of the individuals should have been granted a visa.
With that as the background, let me just confirm some information and
then ask the questions.
Is it correct that Section 214(b) has always
been determined to create a presumption that the immigrant has the burden of
proof of demonstrating a likelihood of return -- or not a likelihood, but that
he will return to the country of origin and not remain in the United States?
EDSON: Yes -- the non-immigrant visa applicants -- yes.
KYL: And
I should have said -- basic for non-immigrant visas, of course -- yes.
And that that is a relatively high burden that consular officers are
trained to try to cause the applicant to meet?
EDSON: Yes.
KYL:
Ordinarily, with the kind of application that I read to you -- if you assume
those facts to be true, there should have been an oral interview, should there
not, to inquire into the reasons why the information was left blank that was
left blank and to inquire further as to what the applicant could say that would
cause the consular officer to believe that he would return to Saudi Arabia?
EDSON: That's a harder question to answer, just because we cannot tell
from -- well, we can't tell how much of the article is accurate at this point. I
just read it this morning. But we also can't tell from looking at the
applications whether or not an interview took place -- whether or not additional
evidence was submitted with the application and returned to the applicant --
questions asked over the phone -- answered...
KYL: Right. That's
unclear, although, let me get back to my question.
KYL: Ordinarily,
wouldn't an application of the kind that I read you be followed up with an oral
interview -- wouldn't just be -- the visa wouldn't just be granted on the basis
of that information on its face, would it?
EDSON: Not on the basis of
that information on its face.
KYL: OK. If there had been an oral
interview, wouldn't it be probable that that application -- the two pages, or
the face page of it, would have had some notation of an oral interview?
EDSON: It should have. Our instructions would be that the officer should
have annotated the application.
KYL: OK.
So either interviews
were not held or the instructions to annotate the interview application were not
done. In either case, the consular officers should have done something that
apparently was not done. Is that correct?
EDSON: Yes. They could have
done what they did better, it seems.
KYL: Yes. And by the way, let me
say, I'm not blaming any consular officers here. The article, itself, notes that
they are not implicated in the problem. The problem was the culture that had
been created by their superiors.
Let me, since the time is getting
beyond us here, let me turn right to the -- an ultimate point I wanted to make
-- these individuals should be demonstrating that they have a means of financial
support; that they have a destination in the United States that is clear; that
they have a specific reason for being in the United States; and especially if
they are young, single men -- and every one of these applicants were single, and
none was even 30-years- old, by the way -- that they be able to demonstrate to
the consular officers that they will, in fact, return to their country of
origin, in this case Saudi Arabia. Those are all of the kinds of things that the
consular officer should have looked at. Is that correct?
EDSON: Yes.
KYL: Now, the last point that I want to make is this -- according to the
article -- and I'll ask you if you have any reason to believe that this is not
true -- the consulate in Jeddah, where many of the terrorists visas were issued,
refused applications for fewer than 2 percent of the Saudi-nationals in the 12
months prior to September 11, where as the worldwide refusal rate for temporary
visas is approximately 25 percent. Do those numbers sound reasonable to you, or
would you have any reason to know?
EDSON: It's difficult to -- we track
refusal rates based on the source of the application, the nationality of the
applicants, the type of visa being issued, so it's very difficult to speculate.
I'd much rather talk on the -- answer on the record for the -- answer in writing
concerning the refusal rates, because they could be comparing rates against two
different populations.
KYL: Sure.
And one thing I would like to
ask is if you, or someone at the department, could get these statistics for us
and could respond to the allegations in the article as to whether or not these
statistics or true, or if there are some other statistics, what they are. I
think that would be very useful to us.
And that answer, probably then
also applies to the 12 months following September 11 where the article asserts
that according to documents bearing its letterhead, the embassy there, in Saudi
Arabia, claims that its refusal rate for Saudi-nationals in the 12 months
following September 11 is a mere 3 percent. I gather you'd have the same answer
with respect to that.
EDSON: Yes. I'd need to check and see what they
were counting.
KYL: Is it -- just as a matter of visceral reaction, if
these numbers are correct, would it seem to you that they are highly out of
balance with the probability that Saudi-nationals, especially those under 30
years of age, males, could prove a likelihood of returning to Saudi Arabia --
that those numbers do seem to be out of balance?
EDSON: Not necessarily.
Again, without knowing what we're counting, it's difficult to speculate. But
remember that the -- much of the population we're talking about is now subject
to special additional screening procedures that have been put in place since
September 11 -- much of it throughout the U.S. law enforcement and intelligence
communities. So that the ultimate refusal rate might be in that neighborhood
would not necessarily surprise me, but I don't know. We'll have to check on the
numbers for you.
KYL: Well, let me just conclude, then, with this
general question.
Given the fact that all of these people were under 30,
single males, from Saudi Arabia -- we're talking about the hijackers that caused
the terror on September 11 -- and that so many of them, according to this
article anyway, obtained a visa not withstanding those facts, and not
withstanding the kind of omissions that the article reported, on their
applications, would it not suggest to you a need for the State Department to
immediately investigate what the practices of the State Department were at the
time, in that location, as well as other Middle Eastern countries that might be
of concern to us -- and to concur that what the instructions are today to the
consular officers with respect to how they handle such applications as a means
of ensuring us that the State Department is on top of this situation and that
it's officers are making the right kind of decisions with respect to people
coming into this country on temporary non-immigrant visas?
EDSON: Yes. I
think we have some -- I know we do not agree. I do not agree with some of the
conclusions reached by the article, but the important thing is just what you've
just raised. The article raises the question that we have to ask ourselves
constantly, did we do the right thing? And have we made changes since then to
ensure that we are doing the best possible thing now in the visa process?
That's what we do on an ongoing basis and that's what I hope that we do
again, in response to the article as we're looking to it and answering your
questions.
FEINSTEIN: Would you yield? OK.
The Senator is good
enough to yield.
And I would like to associate myself with his comments
because I asked this question informally and I was told that every applicant
goes through a special screening process now. If that is not true, then I would
like to know it because I believe it should be. And if we need legislation to
accomplish it, we should do that.
EDSON: Speaking to Saudi-nationals?
FEINSTEIN: That's correct -- of all these countries where there is a
very real risk to the United States that every visa applicant from those
countries goes through this special screening process.
EDSON: Referring
here to...
FEINSTEIN: Now, Saudi Arabia isn't on our list as a terrorist
state...
EDSON: Right.
FEINSTEIN: ... but, I mean, maybe it
should be.
KYL: Is it not one of the states that are subject to this
special screening requirement, nevertheless?
EDSON: Correct. We're
talking -- I assume we're talking about the visas condor process, which applies
primarily to adult males in all of these states that we're talking about.
FEINSTEIN: But every one should be specially screened.
EDSON: It
doesn't apply to all of them. It applies -- I ran some numbers yesterday and
it's very -- it's in the high 90s. The criteria are driven by intelligence
community concerns and don't cover everyone, as currently constituted.
FEINSTEIN: Well, I think we need to take a look at that and see if we
have some views.
KYL: I concur with Senator Feinstein. I think probably
with some of the questions that we will submit in writing you can clarify some
of this. And we'll probably need to have some additional oral testimony.
And I would also like to conclude, if I could, by making one thing
clear. This Section 214(b) does not relate to
terrorism, per
se. it, rather, is a standard part of our immigration policy to ensure that
non-immigrant visas return to their country of origin.
So this should
have been standard procedure before September 11. It is not a
terrorism-related filter for applicants, but rather one
designed to ensure that people will comply with the laws of the United States
when they seek to be our guests temporarily.
The reason this had such
special meaning to me is that Senator Feinstein and I were the ones that
prepared the border security act. And part of it was based upon testimony that
we received in this subcommittee -- and I'll never forget the testimony of Mary
Ryan, who said, "We didn't have the information we needed to deny these visas."
And she specifically talked about Mohamed Atta. And I remember her saying, "It's
like the person that hits the child who dashes out in front of the car in the
school zone. You feel horrible about it, but there wasn't anything you could
have done about it."
But it appears to me that there was something that
we could have done about it -- not because of anything related to
terrorism, but simply enforcing the laws of the United States
of America. And that had those laws been enforced, it is likely that most of the
terrorists who committed the heinous acts of September 11 would not have been
permitted into the United States at least under the circumstances in which they
were.
They would have had to come back and complete their applications
in a very complete way and demonstrate to consular officers that they were
committed to returning to Saudi Arabia. And, of course, what they would be
trying to prove is something that was utterly false. So that the likelihood is
that consular officers, being the good people they are, would have found this
out, discovered the problem and never granted the visas to these people in the
first instance.
FEINSTEIN: I have...
KYL: If you have any
comment, fine. It's not really a question. And...
EDSON: I think...
KYL: ... again, Mr. Edson, I am in no way casting any aspersions upon
you.
EDSON: Yes.
KYL: You came here to represent the department
-- really to deal with some other questions. But I hope that you'll be a conduit
of information because we need the answers from the State Department with
respect to this. And I don't expect you to have those here this morning.
But I would hope that you would be as upset as I am that when we talked
about being able to prevent September 11, this, perhaps, could have prevented
September 11. If we had just done our job -- having nothing to do with
terrorism, but just abided by the law of the United States. If
our consular officers had done their job, it is quite possible -- and I
shouldn't say "if our consular officers," because I'm, again, not suggesting
that they didn't do their job. If the State Department had had the proper
policies in place to be followed by its employees, it is possible that these
terrorists would never had made it to the United States.
FEINSTEIN:
Thank you, Senator Kyl. And I know you're under time pressure. I am, as well,
but I have four quick questions I must ask.
Let me just make a comment
on this, one of the things that I really believe is true is that, you know,
prior to 9/11, immigration policy in this country was really forged on
humanitarian concerns. And then there were also economic concerns of
facilitating travel.
After 9/11, this has changed dramatically and
national security concerns have to dominate.
So I think from the
perspective of this subcommittee, which oversees technology and
terrorism, and as that technology impacts each of your
departments, the goal clearly has to be that national security it protected. And
if anybody errs, it's got to err toward the conservative, not toward the other
side.
I had taken a position early on in the
student
visa program -- have followed it rather closely. And I have just four
questions.
In the past year, how many schools have you investigated for
fraud or violating the terms of the
student visa program?
CRONIN: I don't know the answer to that, Senator, I would have to get
that for you for the record.
FEINSTEIN: I would like to have the answer.
How many schools have you dropped from the foreign
student
visa program after finding they were either sham operations, had
fraudulently obtained
student visas for persons not intending
to attend classes or had ceased operations?
CRONIN: And, again, I
apologize, that is not data that I have available.
FEINSTEIN: How many
cases of
student visa fraud has the INS referred for further
investigation or prosecution in the past five years?
CRONIN: I'll have
to get that for you for the record.
FEINSTEIN: How many individuals have
you deported in the past five years for foreign
student visa
violations.
CRONIN: Again, an answer I'll have to provide for the
record.
FEINSTEIN: What type of institutions have you identified as high
risk in terms of fraud and lack of compliance with the law?
CRONIN: I
will provide that for the record, Senator.
FEINSTEIN: What is the INS'
timetable for conducting site visits to those institutions?
CRONIN: See,
this is not under my responsibility...
FEINSTEIN: OK.
CRONIN:
... we will provide that answer for the record.
FEINSTEIN: I understand.
But these are the questions that we are going to ask about this program. And
we're going to ask them in the next three months for the next three months.
And I'm going to ask you to come back and I'll give you a list of the
questions. And I would ask you to answer them with specificity three months from
today.
CRONIN: Absolutely.
FEINSTEIN: Thank you very much.
And I thank everybody.
This hearing is adjourned.
END
NOTES: [????] - Indicates Speaker Unknown
[--] - Indicates could not make out what was being
said.[off mike] - Indicates could not make out what was being said.
PERSON: DIANNE FEINSTEIN (92%); JON L
KYL (69%); JOSEPH R BIDEN (57%); JEFF
SESSIONS (55%); MITCH MCCONNELL (54%); RUSSELL
FEINGOLD (51%);
LOAD-DATE: October 14, 2002