[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]



 
                      UNDERSTANDING THE HOMELAND 
                            THREAT LANDSCAPE

=======================================================================

                                HEARING

                               before the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                               __________

                             JUNE 25, 2012

                               __________

                           Serial No. 112-109

                               __________

       Printed for the use of the Committee on Homeland Security
                                     

[GRAPHIC] [TIFF OMITTED] TONGRESS.#13

                                     

      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________


                  U.S. GOVERNMENT PRINTING OFFICE
80-849                    WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202�09512�091800, or 866�09512�091800 (toll-free). E-mail, gpo@custhelp.com.  



                     COMMITTEE ON HOMELAND SECURITY

                   Peter T. King, New York, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Daniel E. Lungren, California        Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Michael T. McCaul, Texas             Henry Cuellar, Texas
Gus M. Bilirakis, Florida            Yvette D. Clarke, New York
Paul C. Broun, Georgia               Laura Richardson, California
Candice S. Miller, Michigan          Danny K. Davis, Illinois
Tim Walberg, Michigan                Brian Higgins, New York
Chip Cravaack, Minnesota             Cedric L. Richmond, Louisiana
Joe Walsh, Illinois                  Hansen Clarke, Michigan
Patrick Meehan, Pennsylvania         William R. Keating, Massachusetts
Ben Quayle, Arizona                  Kathleen C. Hochul, New York
Scott Rigell, Virginia               Janice Hahn, California
Billy Long, Missouri                 Ron Barber, Arizona
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
            Michael J. Russell, Staff Director/Chief Counsel
               Kerry Ann Watkins, Senior Policy Director
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director


                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Peter T. King, a Representative in Congress From 
  the State of New York, and Chairman, Committee on Homeland 
  Security.......................................................     1
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Security:
  Oral Statement.................................................     4
  Prepared Statement.............................................     5

                               Witnesses

Hon. Janet Napolitano, Secretary, U.S. Department of Homeland 
  Security:
  Oral Statement.................................................     6
  Prepared Statement.............................................     9
Mr. Matthew G. Olsen, Director, National Counterterrorism Center:
  Oral Statement.................................................    21
  Prepared Statement.............................................    24

                             For the Record

The Honorable Michael T. McCaul, a Representative in Congress 
  From the State of Texas:
  Image..........................................................    41
The Honorable Loretta Sanchez, a Representative in Congress From 
  the State of California:
  Letter.........................................................    57

                                Appendix

Questions From Chairman Peter T. King for Hon. Janet Napolitano..    71


                      UNDERSTANDING THE HOMELAND 
                            THREAT LANDSCAPE

                              ----------                              


                        Wednesday, July 25, 2012

             U.S. House of Representatives,
                    Committee on Homeland Security,
                                            Washington, DC.
    The committee met, pursuant to call, at 10:05 a.m., in Room 
311, Cannon House Office Building, Hon. Peter T. King [Chairman 
of the committee] presiding.
    Present: Representatives King, Lungren, Rogers, McCaul, 
Broun, Miller, Walberg, Cravaack, Walsh, Meehan, Quayle, Long, 
Duncan, Marino, Turner, Thompson, Sanchez, Jackson Lee, 
Cuellar, Clarke of New York, Richardson, Clarke of Michigan, 
Hahn, and Barber.
    Also present: Representative Crawford.
    Chairman King. Good morning. The Committee on Homeland 
Security will come to order.
    Before we begin the actual proceedings, I would like to 
acknowledge the appearance of a new Member to the Congress, 
Member of the committee, Congressman Ron Barber from Arizona. 
He succeeds our former colleague, Gabby Giffords, for whom he 
served as district director, I believe. He has a long, 
distinguished record in Arizona. I am sure Secretary Napolitano 
is familiar with him. I'm getting ganged up on by people from 
Arizona here.
    But, anyway, Ron, it is good to have you on the committee. 
Look forward to working with you. You know, we appreciate the 
interest and concern you have already shown. So, thank you.
    Mr. Thompson. [Off mike.]
    Chairman King. The gentleman from Mississippi.
    Mr. Thompson. I would also like to welcome Mr. Barber to 
the Democratic side. Your reputation for being a hard worker 
precedes you. We look forward to it. The work is in the rear, 
as soon as the meeting is over. We look forward to you picking 
it up. But thank you very much for being here.
    Chairman King. I will start with the formal notice. The 
Committee on Homeland Security is meeting today to hear 
testimony from Homeland Security Secretary Janet Napolitano and 
National Counterterrorism Director Matthew Olsen on the 
homeland threat landscape. I will recognize myself for an 
opening statement.
    But before I begin the opening statement--and I will defer 
to Secretary Napolitano if she wants to add to the comments--I 
want to acknowledge that we just learned--Secretary Napolitano 
learned yesterday that former Homeland Security employees were 
killed in Afghanistan this week. Our thoughts and prayers, as 
the Secretary said, are with the families of former U.S. Border 
Patrol agent and retired ICE agent Benjamin Monsivais and 
retired CBP Port Director Joseph Perez.
    They were in Afghanistan working with contractors, 
supporting the Afghan border police in their training efforts, 
and also two other individuals wounded in this senseless 
attack. So obviously, our thoughts and prayers go out to them 
and their families.
    Chairman King. If the Secretary wants to comment on that 
now, I will defer to you.
    Secretary Napolitano. [Off mike.]
    Chairman King. All right. Thank him for his service.
    I will now recognize myself for an opening statement.
    This is Secretary Napolitano's fourth appearance before our 
committee in the past 18 months. She has also held a number of 
unofficial meetings and briefings with Members of the 
committee. I know this occurs on both sides of the aisle, and I 
want to thank her for her cooperation on that.
    Matt Olsen is, I guess, just finishing his first year as 
director of the National Counterterrorism Center. He has a long 
distinguished record in Government prior to that. I would just 
say, in a personal capacity, I have had several meetings with 
him, received several briefings from him. Whenever there has 
been an incident and we had to reach him by phone, if I was 
back in the District, he was there. He provided the essential 
information, and has, again, been more than willing to 
cooperate with us in any way, and I thank you for your service 
and look forward to continued working with you.
    When Secretary Napolitano testified before our committee in 
January 2012, she stated that the radicalization of U.S. 
citizens to al-Qaeda's violent and extremist ideology was a 
``game-changer.'' To examine that threat, I convened a series 
of hearings to examine the scope and the severity of that 
threat. That is really what we are faced with today, is what is 
the scope and severity of the threat, both from homegrown 
terrorists, from splinter terrorist groups around the world, 
and from core al-Qaeda?
    In the past year, past 15 months, there have been a number 
of outstanding achievements. There was the killing of bin 
Laden. There was the killing of Awlaki. There was the killing 
of Samir Khan, and other top al-Qaeda leaders.
    Yet there are still real threats. In this 112th Congress 
alone, there have been 10 al-Qaeda plots that we know of 
against the United States. In addition to that now, we have 
plots from Iran, as the attempted assassinations here in 
Washington demonstrated last December. Also with the intensity 
in the Middle East, with Iran and Israel, with the United 
States and Iran, with Iran and her neighbors, we have to be 
concerned about threats to the homeland from Hezbollah. We also 
have hearings on that, but I look forward to any testimony you 
have on that, especially seeing what happened to Bulgaria, to 
the extent that Hezbollah was involved in the killing of the 
Israeli children in Bulgaria.
    Also, there has been an emergence of Boko Haram. 
Congressman Meehan has done an outstanding job in that with his 
subcommittee. We have asked to have Boko Haram designated as a 
foreign terrorist organization. I believe, Congressman Meehan 
and others in the committee believe that is essential, if the 
Justice Department is going to have the powers of enforcement 
that it needs. Again, this is a growing threat, and I look 
forward to any testimony you have on the whole issue of Boko 
Haram.
    There has been another issue, and that is the question of 
leaks, which I believe have a direct impact on the security of 
our homeland. It began last year after the killing of bin 
Laden, which was--the President deserves tremendous credit for 
that, but the leaks that poured out of the administration in 
the days and weeks following that. Then the agreement with Sony 
Pictures to do a film on it.
    Then, after that, we had the--just 2 months ago, the al-
Qaeda in the Arabian Peninsula plot, which was details that 
were leaked to the media, to the Associated Press, before the 
work was completed on that, I believe compromising the effort 
that was in there, not just with the United States, but also 
with several of our very key allies overseas.
    Then we saw the series of leaks in late May or early June, 
involving drones, Stuxnet . . . and, again, these are most 
sensitive information which was being given out--it appears to 
me--it appears to Senator Feinstein and others--from people 
high up in the administration, people within the White House. 
Senator Feinstein said several months ago, these are 
unprecedented leaks.
    I have demanded investigations of all these. I know on the 
arrangements between the administration and Sony Pictures, the 
CIA did an investigation. As a result of that, they have made 
several very significant structural changes in the CIA, and the 
Department of Defense inspector general is still carrying out 
an investigation as to all the details of the arrangements 
between the military and Sony Pictures in the preparation of 
this film. The inspector general only began this investigation 
after a 4-month preliminary investigation as to whether or not 
a full investigation was warranted.
    The FBI is carrying out right now investigations of the 
leaks--well, without going into details--carrying out two very 
significant investigations regarding aspects of the leaks.
    Also, a recent matter was Hani Nour Eldin, who belongs to 
the Islamic group, which is a designated foreign terrorist 
organization, was allowed into the United States, had access to 
the White House and to the United States Congress. I will be 
discussing this with the Secretary. I don't believe the letter 
or the spirit of the law was complied involving visa waivers 
and what procedures have to be followed when we are dealing 
with a designated foreign terrorist organization.
    On a very positive note, I want to commend the Secretary 
for the work that is being done as far as the grant system, 
which are becoming more and more risk-based. I particularly 
support the continuation of the Securing the Cities program, 
which I believe is focused and is very effective at preventing 
attacks against urban areas from areas that are out in the 
suburbs, similar to what happened in Madrid and London, where 
we can foresee terrorists actually planning the attack outside 
the cities and bringing the devices--in this case nuclear 
devices, into large urban areas.
    That program has been going ahead. I want to thank the 
Secretary for the continued support that we have gotten on 
that.
    Again, I look forward to the hearing today. I think the 
issue--while we--obviously, there are philosophical differences 
on the committee, and to some extent perhaps between and among 
us, the fact is, all of us share a common desire to defeat 
terrorism, to win this war, and to do all we can to make sure 
that the counterterror forces have all of the weapons and 
powers that they need and the support of the Congress.
    So, with that, I yield to the distinguished Ranking Member, 
the gentleman from Mississippi, Mr. Thompson.
    Mr. Thompson. Thank you very much, Mr. Chairman, for 
holding today's hearing on understanding the homeland threat 
landscape. I want to thank Secretary Napolitano, Director Olsen 
for appearing here this morning.
    As we meet today to consider the homeland threat landscape, 
we must be mindful that yesterday the leader of al-Qaeda in 
Iraq issued a videotaped message indicating his intentions to 
carry out attacks within the United States. Those new threats 
require an assessment of our ability to meet our known 
challenges and address our known vulnerabilities.
    According to recent reports, this Nation has spent about 
$360 billion on homeland security since September 1, 2001. But 
despite this amount of spending, we have not filled all the 
gaps.
    I think most people would agree that we have made some 
gains. Aviation security, border security, disaster response, 
and information-sharing activities have been improved. For the 
most part, these improvements in security have not required us 
to surrender the Constitutional rights and protections that are 
the cornerstone of this Nation's freedom.
    This Nation cannot sacrifice security or freedom in the 
face of any threat, foreign or domestic. As we look back at the 
last 11 years, we have greatly decreased the Nation's 
vulnerability to attack. I would be remiss if I did not mention 
that this administration's actions abroad, from eliminating a 
threat posed by bin Laden to stiffening our military presence, 
has also contributed to decreasing our vulnerability at home.
    However, we must be candid. Some vulnerabilities remain, 
and the nature of the threat continues to evolve. As we 
continue this evolution process, we must focus on the nature of 
the terrorist actor. The most recent incidents in this country 
have involved lone-wolf actors who are ideologically motivated 
to commit violent acts. We must accept that we will not be able 
to find every lone wolf on terror. But we cannot accept that we 
are powerless to close opportunities and remove the 
instrumentalities of destruction.
    As I stated at a hearing last week, we should not forget 
that the United States--the last person to crash a plane into a 
Federal building, fueled by an anti-Government ideology, was a 
pilot, U.S. citizen, in Texas. GAO has reported that the 
Department has testified that we do not check Americans seeking 
flight training against the terrorist watch list until they 
apply for a pilot's license. The lesson of 9/11 is that we need 
to keep people who seek to do us harm from being trained as 
pilots. We must remove the opportunities and instrumentalities 
of destruction.
    I have introduced a bill that would require everyone who is 
seeking to be trained as a pilot, make sure that they are 
vetted against a terrorist watch list. I hope my colleagues 
will join me in that effort.
    As we consider the vulnerabilities that remain, I am 
disappointed that we have not yet managed to achieve the 
screening of 100 percent of maritime cargo before it reaches 
our shores.
    Madam Secretary, it is my understanding that you have 
recently signed a blanket 2-year waiver of the 100 percent 
screening requirement. I do not understand how the Department 
can ignore a statutory mandate designed to close a known 
vulnerability. Searching the cargo before it reaches this 
country provides us with the best opportunity to remove 
instrumentalities of destruction before they reach this 
country.
    Finally, as we consider threats and vulnerabilities, we 
must also think about likely targets. GAO has introduced 
several reports highlighting the poor state of Federal building 
security. While promises have been made, little changes have 
been.
    I hope we have not forgotten that a lone-wolf terrorist 
blew up a Federal building in Oklahoma several years before the 
events of September 11. Timothy McVeigh used this opportunity 
and created destruction. We did not need to see this happen 
again before we take action.
    In closing, as we began today's discussion about the 
homeland threat landscape, I look forward to hearing about how 
we can move away from merely identifying the problem and move 
toward finding and implementing solutions.
    With that, Mr. Chairman, I yield back.
    [The statement of Ranking Member Thompson follows:]

             Statement of Ranking Member Bennie G. Thompson
                             July 25, 2012

    As we meet today to consider the homeland threat landscape, we must 
be mindful that yesterday, the leader of al-Qaeda in Iraq issued a 
videotaped message indicating his intention to carry out attacks within 
the United States. These new threats require an assessment of our 
ability to meet our known challenges and address our known 
vulnerabilities.
    According to The New York Times, this Nation has spent about $360 
billion on homeland security since September 1, 2001. But despite this 
amount of spending we have not filled all the gaps. I think most people 
would agree that we have made some gains. Aviation security, border 
security, disaster response, and information-sharing activities have 
been improved. For the most part, these improvements in security have 
not required us to surrender the Constitutional rights and protections 
that are the cornerstone of this Nation's freedom. This Nation cannot 
sacrifice security or freedom in the face of any threat--foreign or 
domestic.
    As we look back at the last 11 years, we have greatly decreased 
this Nation's vulnerability to attack. I would be remiss if I did not 
mention that this administration's actions abroad, from eliminating the 
threat posed by bin Laden to shifting our military presence, have also 
contributed to decreasing our vulnerability at home.
    However, we must be candid. Some vulnerabilities remain and the 
nature of the threat continues to evolve. As we consider this evolution 
process, we must first focus on the nature of the terrorist actor. The 
most recent incidents in this country have involved the lone-wolf actor 
who is ideologically motivated to commit violent acts. We must accept 
that we will not be able to find every lone wolf bent on terror. But we 
cannot accept that we are powerless to close opportunities and remove 
the instrumentalities of destruction.
    As I stated at a hearing last week, we should not forget that in 
the United States the last person to crash a plane into a Federal 
building, fueled by an anti-Government ideology, was a pilot in Texas. 
GAO has reported and the Department has testified that we do not check 
Americans seeking flight training against the terrorist watch list 
until they apply for a pilot's license. The lesson of 9/11 is that we 
need to keep people who seek to do us harm from being trained as 
pilots. We must remove the opportunities and the instrumentalities of 
destruction. I have introduced a bill that would require everyone who 
is seeking to be trained as pilot is vetted against a terrorist watch 
list. I hope my colleagues will join me in that effort.
    As we consider the vulnerabilities that remain, I am disappointed 
that we have not yet managed to achieve the screening of 100% of 
maritime cargo that reaches our shores. Madame Secretary, it is my 
understanding that you have recently signed a blanket 2-year waiver of 
the 100% screening requirement. I do not understand how the Department 
can ignore a statutory mandate designed to close a known vulnerability. 
Searching the cargo before it reaches this country provides us with the 
best opportunity to remove instrumentalities of destruction before they 
reach this country.
    Finally, as we consider threats and vulnerabilities, we must also 
think about likely targets. GAO has produced several reports 
highlighting the poor state of Federal building security. While 
promises have been made, little has changed. I hope we have not 
forgotten that a lone-wolf terrorist blew up a Federal building in 
Oklahoma several years before the events of September 11. Timothy 
McVeigh used his opportunity and created destruction. We do not need to 
see this happen again before we take action.
    In closing, as we begin today's discussion about the homeland 
threat landscape, I look forward to hearing about how we can move away 
from merely identifying the problems and move toward finding and 
implementing solutions.

    Chairman King. I thank the Ranking Member. I am going to 
ask if we can recess for a few moments. Apparently, there is a 
problem with the microphones, which should be corrected in the 
next several moments. So the committee stands in recess for 
hopefully just a few minutes.
    [Recess.]
    Chairman King. The hearing will resume, and--Madam 
Secretary, Mr. Director, we regret the inconvenience and the 
delay.
    Mr. Olsen, I was hoping that perhaps, considering your past 
experience with the NSA, you could have had somebody come in 
and, you know, rewire it for us very quickly, but--anyway, I 
would thank the Ranking Member for his opening statement. Other 
Members of the committee are reminded that opening statements 
may be submitted for the record.
    We are pleased to have two very distinguished witnesses 
before us today on this topic, obviously, of homeland security 
and the threats to the homeland.
    Secretary Napolitano was sworn in as the third Secretary of 
Homeland Security in January 2009, previously served as the 
Governor of Arizona and that State's attorney general. As I 
said, just in the past 18 months alone, she has testified 
before this committee four times. I am sure she has loved every 
minute of it.
    With that, we would recognize the Secretary and look 
forward to her testimony.
    Secretary Napolitano.

 STATEMENT OF HON. JANET NAPOLITANO, SECRETARY, DEPARTMENT OF 
                       HOMELAND SECURITY

    Secretary Napolitano. Thank you Chairman King, Ranking 
Member Thompson, and Members of the committee. I thank Director 
Olsen and NCTC for their close partnership and collaboration 
across many areas.
    I am pleased to join you today, and I thank the committee 
for your strong support for the Department of Homeland 
Security, not only over the past 3\1/2\ years, but indeed, 
since the Department's founding. I look forward to continuing 
our work together to protect the American people as we advance 
our many shared goals.
    [Off mike.]
    Chairman King. Excuse me, Secretary. Is the system working? 
It seems to be going in and out.
    Secretary Napolitano. I can speak very loudly. Let me try 
again.
    Today, nearly 11 years after the 9/11 attacks, America is 
stronger and more secure, thanks to the work of the men and 
women of DHS and our Federal, State, local, Tribal, 
territorial, and international partners across the homeland 
security enterprise.
    Yet while the United States has made significant progress, 
threats from terrorists persist and continually evolve:
    We face direct threats from al-Qaeda.
    We face growing threats from other foreign-based terrorist 
groups which are inspired by al-Qaeda ideology but appear to 
have few operational connections to the core al-Qaeda group, 
such as al-Qaeda in the Arabian Peninsula and Al Shabaab.
    Perhaps most crucially, we face a threat environment where 
violent extremism is not defined or contained by international 
borders. Today we must address threats that are home-grown as 
well as those that originate abroad.
    These threats are not limited to any one individual, group, 
or ideology, and as we have seen, the tactics employed by 
terrorists can be as simple as a homemade bomb or as 
sophisticated as a biological threat or a coordinated cyber 
attack.
    While we deal with a number of threats and threat actors at 
any given time, three areas merit special, sustained attention:
    The first is aviation. With respect to our aviation sector, 
the Christmas day 2009 plot, the October 2010 air cargo threat, 
and the more recent AQAP plot that would have targeted a U.S.-
bound airliner with explosives make clear that commercial 
aviation remains a target. Terrorists, especially AQAP, 
continue to seek ways to circumvent existing security measures; 
their methods and tactics are sometimes ingenious and 
increasingly sophisticated.
    A second area is cyber. Cyber threats and incidents have 
increased significantly over the past decade. Our Nation 
continues to confront a dangerous combination of known and 
unknown vulnerabilities in cyberspace, strong and rapidly 
expanding adversary capabilities, and limited threat and 
vulnerability awareness. We remain hopeful that Congress can 
pass strong cybersecurity legislation this year.
    The third area of growing concern is home-grown violent 
extremism. Within the context of U.S.-based violent extremism, 
we know that foreign terrorist groups affiliated with al-Qaeda, 
and individual extremists, are actively seeking to recruit or 
inspire Westerners to carry out attacks against Western and 
U.S. targets.
    Recruitment within the United States spans a variety of 
activities, using social media, personal interaction, and 
publication of magazines, among other things.
    Today, the Department operates with the understanding that 
a significant terrorist risk to the homeland is posed by 
violent extremists inspired by al-Qaeda and its affiliates.
    This threat is real, as evidenced by the multiple recent 
thwarted attacks of domestic violent extremists inspired by al-
Qaeda, including the arrest of Naser Jason Abdo in Fort Hood in 
July 2011 and the arrest of Amine el-Khalifi in February 2012 
in Washington, DC. Importantly, however, we also know that 
violent extremism can be inspired by various religious, 
political, or other ideological beliefs.
    The recent terrorist attack overseas in Bulgaria, as well 
as the shooting last week in Aurora, Colorado, further 
demonstrate that we must remain vigilant and prepared.
    We mitigate these threats in several ways. First and 
foremost, we have worked to build a homeland security 
enterprise that allows DHS and our many partners to detect 
threats earlier, share information, minimize risks, and 
maximize our ability to respond and recover from attacks and 
disasters of all kinds.
    With respect to the aviation sector, we have implemented a 
layered detection system focusing on risk-based screening, 
enhanced targeting, and information-sharing, while 
simultaneously facilitating travel for nearly 2 million 
domestic air travelers every day.
    Following the December 2009 threat, we launched a historic 
global initiative to strengthen international aviation, which 
has improved cooperation on passenger and air cargo screening, 
technology development and deployment, information collection 
and sharing, and the development of security standards.
    We have strengthened information sharing with our 
international partners. For example, our new and historic PNR 
agreement with the European Union allows us to continue sharing 
passenger information so that we can better identify travelers 
who merit our attention before they depart for the United 
States.
    Our Pre-Departure Targeting Program, Immigration Advisory 
Program and enhanced in-bound targeting operations also allow 
us to more effectively identify high-risk travelers who are 
likely to be inadmissible to the United States, and make 
recommendations to commercial carriers to deny boarding before 
a plane departs.
    At home, we have continued the deployment of advanced 
technology at airports, including AIT machines, while at the 
same time implementing new programs to make the screening 
process more efficient for trusted travelers through programs 
such as TSA PreCheck and Global Entry.
    Across the cyber domain, we have continued to partner with 
sector-specific agencies and the private sector to help secure 
cyberspace and critical infrastructure such as the financial 
sector, the power grid, water systems, and transportation 
networks.
    We have taken significant action to protect Federal 
civilian government systems through the deployment of intrusion 
detection systems like EINSTEIN, greater monitoring and sharing 
of threat information, National exercises and incident response 
planning, public awareness and outreach programs, and a cyber 
workforce initiative to recruit the next generation of cyber 
professionals.
    Internationally, we have worked with our partners to share 
expertise, combat cybercrime, and strengthen shared systems and 
networks.
    Finally, we have improved our domestic capabilities to 
detect and prevent terrorist attacks against our citizens, our 
communities, and our critical infrastructure.
    We have increased our ability to analyze and distribute 
threat information at all levels. Specifically, we have worked 
to build greater analytic capability through 77 designated 
fusion centers, resulting in unprecedented levels of 
information sharing at the State and local level.
    We have invested in training for local law enforcement and 
first responders of all types, to increase expertise and 
capacity at the local level.
    For example, we have transformed how we train front-line 
officers regarding suspicious activities, through the 
Nationwide Suspicious Activity Reporting Initiative, in 
partnership with the Department of Justice.
    We are also in the final stages of implementing a 
Countering Violent Extremism curriculum for Federal, State, 
local, and correctional facility law enforcement officers that 
is focused on community-oriented policing, which will help 
front-line personnel identify activities that are potential 
indicators of potential terrorist activity and violence.
    Through the Nation-wide expansion of the ``If You See 
Something, Say Something,'' campaign, we are encouraging all 
Americans to alert local law enforcement if they see something 
that is potentially dangerous.
    DHS has come a long way in the nearly 11 years since 9/11 
to enhance the protection of the United States and engage our 
partners in this shared responsibility.
    Together, we have made significant progress to strengthen 
the homeland security enterprise. But many challenges still 
remain.
    Threats against our Nation, whether by terrorism or 
otherwise, continue to exist and evolve. DHS must continue to 
evolve as well. We continue to be ever-vigilant to protect 
against threats, while promoting travel, trade, and 
safeguarding our essential rights and liberties.
    I thank the committee for your attention as we work 
together to keep our Nation safe.
    [The prepared statement of Secretary Napolitano follows:]

              Prepared Statement of Hon. Janet Napolitano
                             July 25, 2012

    Thank you Chairman King, Ranking Member Thompson, and Members of 
the committee, I am pleased to join you today, and I thank the 
committee for your strong support for the Department of Homeland 
Security (DHS), not only over the past 3\1/2\ years, but indeed, since 
the Department's founding. I look forward to continuing our work 
together to protect the American people as we advance our many shared 
goals.
    Almost 11 years after the terrorist attacks of September 11, 
America is stronger and more secure, thanks to the support of the 
Congress, the work of the men and women of DHS, and our Federal, State, 
local, Tribal, and territorial partners across the homeland security 
enterprise. I thank them all for their service.
    Created with the founding principle of protecting the American 
people from terrorist and other threats, DHS and its many partners 
across the Federal Government, public and private sectors, and 
communities throughout the country have strengthened homeland security 
to better mitigate and defend against evolving threats.
    Additionally, within the Federal Government, many departments and 
agencies contribute to the homeland security mission. The Nation's 
armed forces serve on the front lines of homeland security by degrading 
al-Qaeda's capabilities to attack the United States and targets 
throughout the world. The Office of the Director of National 
Intelligence, the Central Intelligence Agency, and the entire 
intelligence community, of which DHS is a member, are producing better 
streams of intelligence than at any time in history.
    The Federal homeland security enterprise also includes the strong 
presence of the Department of Justice (DOJ) and the Federal Bureau of 
Investigation (FBI), whose role in leading terrorism investigations has 
led to the arrest of numerous individuals on terrorism-related charges.
    But despite considerable progress, the horrific attack last week in 
Aurora, Colorado--and the terrorist attack in Bulgaria--serve as a 
reminder that our work to detect and prevent attacks against Americans 
is never done.
    As I have said many times, homeland security begins with hometown 
security. As part of our commitment to strengthening hometown security, 
we have worked to get information, tools, and resources out of 
Washington, DC, and into the hands of State, local, Tribal, and 
territorial officials and first responders.
    This has led to significant advances. We have made great progress 
in improving our domestic capabilities to detect and prevent terrorist 
attacks against our citizens, our communities, and our critical 
infrastructure. We have increased our ability to analyze and distribute 
threat information at all levels. We have invested in training for 
local law enforcement and first responders of all types in order to 
increase expertise and capacity at the local level. We have also 
supported and sustained preparedness and response capabilities across 
the country through more than $36 billion in homeland security grants 
since 2002.
    As we look ahead, and in order to address evolving threats and make 
the most of limited resources, the administration proposed a new vision 
for homeland security grants in the fiscal year 2013 President's 
budget. The administration's proposal focuses on building and 
sustaining core capabilities associated with the five mission areas 
within the National Preparedness Goal (NPG), helping to elevate Nation-
wide preparedness.
    This proposal reflects the many lessons we have learned in grants 
management and execution over the past 10 years. Using a competitive, 
risk-based model, the proposal envisions a comprehensive process to 
assess gaps, identify and prioritize deployable capabilities, limit 
periods of performance to put funding to work quickly, and require 
grantees to regularly report progress in the acquisition and 
development of these capabilities. The administration looks forward to 
working with Congress and stakeholders on this proposal to enable all 
levels of government to build and sustain, in a collaborative way, the 
core capabilities necessary to prepare for incidents that pose the 
greatest risk to the security of the Nation.
    Our experience over the past several years has also made us smarter 
about the terrorist threats we face and how best to deal with them. We 
continue to expand our risk-based, intelligence-driven security 
efforts. By sharing and leveraging information, we can make informed 
decisions about how to best mitigate risk, and provide security that is 
seamless and efficient.
    We also free up more time and resources, giving us the ability to 
focus those resources on those threats or individuals we know the least 
about. This approach not only makes us safer, it also creates 
efficiencies within the system for travelers and for businesses. In 
other words, our homeland security and our economic security go hand-
in-hand.
    Strengthening homeland security includes a significant 
international dimension. To most effectively carry out our core 
missions--including preventing terrorism, securing our borders, 
enforcing immigration laws, and protecting cyberspace--we partner with 
countries around the world. This work ranges from strengthening cargo, 
aviation, and supply chain security to joint investigations, 
information sharing, and science and technology cooperation.
    Through collaborations with other Federal agencies and our foreign 
counterparts, we not only enhance our ability to prevent terrorism and 
transnational crime; we also leverage the resources of our 
international partners to more efficiently and cost-effectively secure 
global trade and travel, to help ensure that dangerous people and goods 
do not enter our country.
    In my time today, I would like to provide an update on the key 
areas of the DHS mission that fall within the committee's jurisdiction, 
our priorities, and our vision for working with the Congress to build 
on the substantial progress we have achieved to date and must continue 
to sustain in the months and years ahead.

              PREVENTING TERRORISM AND ENHANCING SECURITY

    While the United States has made significant progress, threats from 
terrorists--including, but not limited to al-Qaeda and al-Qaeda-
affiliated groups--persist and continually evolve, and the demands on 
DHS continue to grow. Today's threats are not limited to any one 
individual, group, or ideology and are not defined or contained by 
international borders. Terrorist tactics can be as simple as a homemade 
bomb and as sophisticated as a biological threat or a coordinated cyber 
attack.
    DHS and our partners at the Federal, State, Tribal, and local 
levels have had success in thwarting numerous terrorist plots, 
including the attempted bombings of the New York City subway, foiled 
attacks against air cargo, and other attempts across the country. 
Nonetheless, recent attacks overseas, and the continued threat of home-
grown terrorism in the United States, demonstrate how we must remain 
vigilant and prepared.
    To address these evolving threats, DHS employs risk-based, 
intelligence-driven operations to prevent terrorist attacks. Through a 
multi-layered detection system focusing on enhanced targeting and 
information sharing, we work to interdict threats and dangerous people 
at the earliest point possible. We also work closely with Federal, 
State, and local law enforcement partners on a wide range of critical 
homeland security issues in order to provide those on the frontlines 
with the information and tools they need to address threats in their 
communities.
    Likewise, countering biological, nuclear, and radiological threats 
requires a coordinated, whole-of-Government approach. DHS, through the 
Domestic Nuclear Detection Office, works in partnership with agencies 
across Federal, State, and local governments to prevent and deter 
attacks using nuclear and radiological weapons through nuclear 
detection and forensics programs. The Office of Health Affairs (OHA), 
the Science and Technology Directorate (S&T), and the Federal Emergency 
Management Agency (FEMA) also provide medical, scientific, and other 
technical expertise to support chemical, biological, nuclear, and 
radiological preparedness and response efforts.

Sharing Information, Expanding Training, and Raising Public Awareness
    The effective sharing of information in a way that is timely, 
actionable whenever possible, and that adds value to the homeland 
security enterprise is essential to protecting the United States. As 
part of our approach, we have changed the way DHS provides information 
to our partners by replacing the outdated color-coded alert system with 
the National Terrorism Advisory System, or NTAS, which provides timely, 
detailed information about credible terrorist threats and recommended 
security measures.
    We also have continued to enhance our analytic capability through 
the 77 designated fusion centers, resulting in unprecedented 
information-sharing capabilities at the State and local levels. DHS has 
supported the development of fusion centers through deployed personnel, 
training, technical assistance, exercise support, security clearances, 
connectivity to Federal systems, technology, and grant funding. We 
currently have more than 90 DHS intelligence officers deployed to 
fusion centers, working side by side with their Federal, State, and 
local counterparts.
    We are working to ensure that every fusion center supported by DHS 
maintains a set of core capabilities that includes the ability to 
assess local implications of National intelligence, share information 
with Federal authorities so we can identify emerging National threats, 
and ensure the protection of civil rights, civil liberties, and 
privacy.
    Specifically, we are encouraging fusion centers to develop and 
strengthen their grassroots analytic capabilities so that National 
intelligence can be placed into local context, and the domestic threat 
picture can be enhanced based on an understanding of the threats in 
local communities. We are partnering with fusion centers to establish 
more rigorous analytic processes and analytic production plans, 
increase opportunities for training and professional development for 
State and local analysts, and encourage the development of joint 
products between fusion centers and Federal partners.
    Over the past 3 years, we have transformed how we train our 
Nation's front-line officers regarding suspicious activities, through 
the Nationwide Suspicious Activity Reporting Initiative (NSI). This 
initiative, which we conduct in partnership with the Department of 
Justice, is an administration effort to train State and local law 
enforcement to recognize behaviors and indicators potentially related 
to terrorism and terrorism-related crime; standardize how those 
observations are documented and analyzed; and ensure the sharing of 
those reports with the Federal Bureau of Investigation-led Joint 
Terrorism Task Forces (JTTFs) for further investigation.
    More than 229,000 law enforcement officers have now received 
training under this initiative, and more are getting trained every 
week. The training was created in collaboration with numerous law 
enforcement agencies, and with privacy, civil rights, and civil 
liberties officials. DHS also has expanded the Nationwide Suspicious 
Activity Reporting Initiative to include our Nation's 18 critical 
infrastructure sectors. Infrastructure owners and operators from the 18 
sectors are now contributing information, vetted by law enforcement 
through the same screening process otherwise used to provide 
information to the JTTFs.
    Because an engaged and vigilant public is vital to our efforts to 
protect our communities, we have also continued our Nation-wide 
expansion of the ``If You See Something, Say SomethingTM'' 
public awareness campaign. This campaign encourages Americans to 
contact law enforcement if they see something suspicious or potentially 
dangerous. To date, we have expanded the campaign to Federal buildings, 
transportation systems, universities, professional and amateur sports 
leagues and teams, entertainment venues, some of our Nation's largest 
retailers, as well as local law enforcement. Most recently DHS has 
partnered with sports leagues such as the National Football League, 
Major League Baseball, the National Basketball Association, National 
Collegiate Athletic Association, National Hockey League, U.S. Golf, and 
the U.S. Tennis Association, to promote public awareness of potential 
indicators of terrorism at sporting events.

Countering Violent Extremism
    At DHS, we believe that local authorities and community members are 
often best able to identify individuals or groups residing within their 
communities exhibiting dangerous behaviors--and intervene--before they 
commit an act of violence. Countering violent extremism (CVE) is a 
shared responsibility, and DHS continues to work with a broad range of 
partners to gain a better understanding of the behaviors, tactics, and 
other indicators that could point to terrorist activity, and the best 
ways to mitigate or prevent that activity.
    The Department's efforts to counter violent extremism are three-
fold. We are working to better understand the phenomenon of violent 
extremism, and assess the threat it poses to the Nation as a whole, and 
within specific communities. We are bolstering efforts to address the 
dynamics of violent extremism and strengthen relationships with those 
communities targeted for recruitment by violent extremists. We are also 
expanding support for information-driven, community-oriented policing 
efforts that have long proven effective in preventing violent crime. 
All of this is consistent with the administration strategy released in 
August 2011 and the related Strategic Implementation Plan released in 
December 2011.
    DHS has conducted extensive analysis and research to better 
understand the threat of violent extremism in order to support State 
and Local law enforcement, fusion centers, and community partners with 
the knowledge needed to identify behaviors and indicators of violent 
extremism, and prevent violent crime. This includes over 75 case 
studies and assessments produced by the DHS Office for Intelligence and 
Analysis (I&A) since 2009 on home-grown violent extremist activities, 
including an in-depth study that examined the common behaviors 
associated with 62 cases of al-Qaeda-inspired violent extremists.
    Finally, DHS is in the last stages of implementing a CVE curriculum 
for Federal, State, local, and correctional facility law enforcement 
officers that is focused on community-oriented policing, which will 
help front-line personnel identify activities that are potential 
indicators of potential terrorist activity and violence. The training's 
key goal is to help law enforcement recognize the indicators of violent 
extremist activity and distinguish between those behaviors that are 
potentially related to crime and those that are Constitutionally 
protected or part of a religious or cultural practice. We piloted the 
24-hour State and local training curriculum in San Diego in January 
2012, and we are aiming to finalize the curriculum by the end of 2012. 
DHS is working with the International Association of Chiefs of Police 
to develop shorter CVE training modules for the recruit and field 
training officer level, which will be introduced into Police Academies 
and posted on an internet-based platform before the end of 2012. We are 
also developing a similar curriculum with the Federal Law Enforcement 
Training Center for Federal law enforcement officers, and finalizing a 
CVE awareness training for Correctional Facility, Probation, and Parole 
Officers in collaboration with the Interagency Threat Assessment 
Coordination Group, the Bureau of Prisons, and the National Joint 
Terrorism Task Force.
    Ensuring that State and Local law enforcement have access to 
operationally accurate and appropriate training is a top priority. With 
local communities and the Department of Justice, we have published 
guidance on best practices for community partnerships to prevent and 
mitigate home-grown threats. DHS publicly released the CVE Training 
Guidance and Best Practices, which was sent to all State and local 
partner grantors and grantees thereby tying to grant guidance policy on 
October 7, 2011. DHS also incorporated language into fiscal year 2012 
grant guidance that prioritizes CVE and allows funds to be used in 
support of State and local CVE efforts.

Protecting Our Aviation System
    Threats to our aviation system remain active and continue to 
evolve. Consequently, TSA is working internationally and with the 
private sector to continue to improve security screening, while 
simultaneously facilitating lawful travel and trade. We are continuing 
to strengthen protection of our aviation sector through a layered 
detection system focusing on risk-based screening, enhanced targeting, 
and information-sharing efforts to interdict threats and dangerous 
people at the earliest point possible.
    The Department is focused on measures to shift aviation security 
from a ``one-size-fits-all'' approach for passenger screening to a 
risk-based approach. In doing so, TSA utilizes a range of measures, 
both seen and unseen, as part of its layered security system--from 
state-of-the-art explosives detection, to using Advanced Imaging 
Technology (AIT) units and canine teams to screen passengers and cargo, 
to expediting screening for known travelers. Through Secure Flight, TSA 
is now pre-screening 100 percent of all travelers flying within, to, or 
from the United States against terrorist watch lists before passengers 
receive their boarding passes.
    In our increasingly interconnected world, we also work beyond our 
own airports, partnering with our Federal agencies and countries to 
protect both National and economic security.
    For example, through the Pre-Departure Targeting Program, 
Immigration Advisory Program, and enhanced in-bound targeting 
operations, Customs and Border Protection (CBP) has improved its 
ability to identify high-risk travelers who are likely to be 
inadmissible into the United States and make recommendations to 
commercial carriers to deny boarding before a plane departs.
    Through the Visa Security Program, U.S. Immigration and Customs 
Enforcement (ICE) has deployed trained special agents overseas to high-
risk visa activity posts to identify potential terrorist and criminal 
threats before they reach the United States.
    Through preclearance agreements, CBP Officers deployed overseas 
inspect passengers abroad through the same process a traveler would 
undergo upon arrival at a U.S. port of entry, allowing us to extend our 
borders outward while facilitating a more efficient passenger 
experience.
    Finally, our continued use, analysis, and sharing of Passenger Name 
Record (PNR) data has allowed us to better identify passengers who 
merit our attention before they depart for the United States. On July 
1, 2012, a new agreement with the European Union on the transfer of PNR 
data entered into force, marking an important milestone in our 
collective efforts to protect the international aviation system from 
terrorism and other threats.
    As we have taken these actions to strengthen security, we also have 
focused on expediting trade and travel for the millions of people who 
rely on our aviation system every day. One key way we have done this is 
through expansion of trusted traveler programs.
    For instance, the Global Entry program, which is managed by CBP, is 
allowing us to expedite entry into the United States for pre-approved, 
low-risk air travelers. More than 1 million trusted traveler program 
members are able to use the Global Entry kiosks, and we are expanding 
the program both domestically and internationally as part of the 
administration's efforts to foster increased travel and tourism.
    In addition to U.S. citizens and lawful permanent residents, 
Mexican nationals can now enroll in Global Entry, and Global Entry's 
benefits are also available to Dutch citizens enrolled in the Privium 
program; South Korean citizens enrolled in the Smart Entry Service 
program; Canadian citizens and residents through the NEXUS program; and 
citizens of the United Kingdom, Germany, and Qatar through limited 
pilot programs. In addition, we have signed agreements with Australia, 
New Zealand, Panama, and Israel to allow their qualifying citizens and 
permanent residents to participate in Global Entry. We are continuing 
to expand the program both domestically and internationally as part of 
the administration's efforts to foster travel and tourism, which 
supports the President's Executive Order 13597 on Travel and Tourism.
    U.S. citizen participants in Global Entry are also eligible for TSA 
PreCheckTM--a passenger prescreening initiative. TSA 
PreCheckTM is part of the agency's on-going effort to 
implement risk-based security concepts that enhance security by 
focusing on travelers the agency knows least about. More than 1.7 
million passengers have received expedited screening through TSA 
PreCheckTM security lanes since the initiative began last 
fall. TSA PreCheckTM is now available in 18 airports for 
select U.S. citizens traveling on Alaska Airlines, American Airlines, 
Delta Air Lines, United Airlines and US Airways and members of CBP 
Trusted Traveler programs. TSA has expanded TSA PreCheckTM 
benefits to U.S. military active-duty members traveling through Ronald 
Reagan Washington National and Seattle-Tacoma International airports. 
In addition to TSA PreCheckTM, TSA has implemented other 
risk-based security measures including modified screening procedures 
for passengers 12 and younger and 75 and older.

Visa Waiver Program
    With our partners overseas, we have acted to strengthen the Visa 
Waiver Program (VWP), a program that boosts our economy by facilitating 
legitimate travel for individuals traveling to the United States for 
tourism or business. According to the Commerce Department, tourism 
alone supported 7.6 million U.S. jobs last year, and tourism revenue in 
early 2012 was up 14% from the previous year.
    The VWP is an essential driver of international tourism because it 
allows eligible nationals of 36 countries to travel to the United 
States without a visa and remain in our country for up to 90 days. 
Almost two-thirds of international travelers come to the U.S. from VWP 
countries. Additionally, since its inception in the mid-1980s, VWP has 
also become an essential tool for increasing security standards, 
advancing information sharing, strengthening international 
relationships, and promoting legitimate travel to the United States.
    Over the last several years, DHS has focused on bringing VWP 
countries into compliance with information-sharing agreement 
requirements of The Implementing Recommendations of the 9/11 Commission 
Act of 2007 (9/11 Act), Pub. L. No. 110-53. As of January 2012, all VWP 
countries have completed an exchange of diplomatic notes or an 
equivalent mechanism for the requirement to enter into an agreement to 
share information on lost and stolen passports with the United States 
through INTERPOL or other designated means.
    DHS, in collaboration with the Department of Justice, has concluded 
Preventing and Combating Serious Crime (PCSC) agreements, or their 
equivalent, with 35 VWP countries and two VWP aspirants. DHS, along 
with the Departments of Justice and State, continues to work closely 
with the remaining country to sign a PCSC agreement. These agreements 
facilitate the sharing of information about terrorists and serious 
criminals.
    The U.S. Government has also concluded negotiations on arrangements 
with all VWP countries for the exchange of terrorism screening 
information.
    Additionally, DHS developed the Electronic System for Travel 
Authorization (ESTA) as a proactive on-line system to determine whether 
an individual is eligible to travel to the United States under the VWP, 
and whether such travel poses any law enforcement or National security 
risks.
    We support carefully managed expansion of the VWP to countries that 
meet the statutory requirements, and are willing and able to enter into 
a close security relationship with the United States. To this end, we 
support current bi-partisan efforts by the Congress, such as the 
proposed JOLT Act of 2012, to expand VWP participation and to promote 
international travel and tourism to the United States while maintaining 
our strong commitment to security. Additionally, as part of the 
President's recent Executive Order, we are working with partner 
countries to meet existing requirements and prepare for further 
expansion of the VWP.

Overstays and Exit Capabilities
    Over the past year, we have worked to better detect and deter those 
who overstay their lawful period of admission through the enhanced 
biographic program. The ability to identify and sanction overstays is 
linked to our ability to determine who has arrived and departed from 
the United States. By matching arrival and departure records, and using 
additional data collected by DHS, we can better determine who has 
overstayed their lawful period of admission.
    In May 2011, as part of Phase 1 of the enhanced biographic effort, 
DHS began a coordinated effort to vet all potential overstay records 
against intelligence community and DHS holdings for National security 
and public safety concerns. Using those parameters, we reviewed the 
backlog of 1.6 million overstay leads within the U.S. Visitor and 
Immigrant Status Indicator Technology (US-VISIT) program and referred 
leads based on National security and public safety priorities to ICE 
for further investigation.
    Through limited automated means, DHS cross-referenced additional 
overstay leads with DHS location and immigration holdings, closing 
additional records by confirming changes in immigration information or 
travel history that had not yet been recorded. Previously, these 
records would not have been examined, except in instances when 
resources allowed it. Now, we are vetting all overstays for public 
safety and National security concerns, and DHS is also conducting 
automated reviews for changes in immigration status or travel history. 
This is performed on a recurrent basis.
    In July, Congress approved DHS's plan to continue building its 
enhanced biographic capability. DHS is implementing Phase 2 of this 
effort, and expects to have these enhancements in place by early 2013. 
Once completed, this initiative will significantly strengthen our 
existing capability to identify and target for enforcement action those 
who have overstayed their authorized period of admission, and who 
represent a public safety and/or National security threat by 
incorporating data contained within law enforcement, military, and 
intelligence repositories.
    This strategy also will also enhance our ability to identify 
individual overstays; provide the State Department with information to 
support visa revocation, prohibit future VWP travel for those who 
overstay, and place ``lookouts'' for individuals, in accordance with 
existing Federal laws; establish greater efficiencies to our Visa 
Security Program; and enhance the core components of an entry-exit and 
overstay program.
    Concurrently, the Department's Science and Technology Directorate 
(S&T) is working to establish criteria and promote research for 
emerging technologies that would provide the ability to capture 
biometrics and develop a biometric exit capability at a significantly 
lower operational cost than is currently available. S&T is working 
closely with the National Institute of Standards and Technology (NIST) 
on this initiative.
    Last, as part of the Beyond the Border Action plan signed by 
President Obama and Canadian Prime Minister Harper in December 2011, we 
are creating an exit program on the United States Northern Border. 
Under the plan, the United States and Canada will exchange entry 
records, so that an entry to one country essentially becomes an exit 
record from the other.

Protecting Surface Transportation
    Beyond aviation, we have worked with Federal agencies and other 
Government partners, transportation sector entities, and companies 
across the United States to enhance security of surface transportation 
infrastructure through risk-based security assessments, critical 
infrastructure hardening, and close partnerships with State and local 
law enforcement partners.
    Because of its open access architecture, surface transportation has 
a fundamentally different operational environment than aviation. As a 
result, our approach must be different. To protect surface 
transportation, we have conducted compliance inspections throughout the 
freight rail and mass transit domains; critical facility security 
reviews for pipeline facilities; comprehensive mass transit assessments 
that focus on high-risk transit agencies; and corporate security 
reviews conducted in multiple modes of transportation on a continuous 
basis to elevate standards and identify security gaps.
    We also have continued to support Visible Intermodal Prevention and 
Response (VIPR) teams, including 12 multi-modal teams. VIPR teams are 
composed of personnel with expertise in inspection, behavior detection, 
security screening, and law enforcement for random, unpredictable 
deployments throughout the transportation sector to prevent potential 
terrorist and criminal acts.
    These efforts have been supported by more than $1.9 billion in DHS 
grant funding awarded through the Transit Security Grant Program to 
harden assets, improve situational awareness, and build National 
capabilities to prevent and respond to threats and incidents across the 
transportation sector.

                      GLOBAL SUPPLY CHAIN SECURITY

    Securing the global supply chain system is integral to securing 
both the lives of people around the world, and maintaining the 
stability of the global economy. We must work to strengthen the 
security, efficiency, and resilience of this critical system. Supply 
chains must be able to operate effectively, in a secure and efficient 
fashion, in a time of crisis, recover quickly from disruptions, and 
continue to facilitate international trade and travel.
    We know that a crisis or vulnerability in any part of the world has 
the ability to impact the flow of goods and people thousands of miles 
away. Beyond loss of life and physical damage, these events can cause 
large economic consequences. Therefore, our economy is dependent on our 
ability to secure and facilitate the flow of people and goods to and 
from our shores.
    Within the American economy, trade with our international partners 
accounts for roughly one-quarter of our GDP. This year alone, DHS will 
help facilitate about $2 trillion in legitimate trade, while enforcing 
U.S. trade laws that protect the economy, the health, and the safety of 
the American people.
    Earlier this year, the administration announced the U.S. National 
Strategy for Global Supply Chain Security to set a Government-wide 
vision of our goals, approach, and priorities to strengthen the global 
supply chain system. The National Strategy establishes two explicit 
goals: Promoting the efficient and secure movement of goods and 
fostering resilient supply chain systems. As we work to achieve these 
goals, we will be guided by the overarching principles of risk 
management and collaborative engagement with key stakeholders who also 
have key supply chain roles and responsibilities.
    DHS is now working in close partnership with other Federal 
departments and agencies to translate the high-level guidance contained 
in the Strategy into concrete actions. We are focusing our immediate 
efforts on the priority action areas identified in the Strategy.
    In addition to the National Strategy for Global Supply Chain 
Security, DHS continues to advance a range of other measures and 
programs to strengthen different components of this vital system in 
partnership with multilateral organizations such as the International 
Maritime Organization (IMO), the International Civil Aviation 
Organization (ICAO), the World Customs Organization (WCO), and the 
Asia-Pacific Economic Cooperation (APEC) as well as bilaterally with 
trading partners.
    We are also working closely with industry and foreign government 
partners to identify and address high-risk shipments as early in the 
shipping process as possible by collecting and analyzing advance 
electronic commercial data. This allows DHS to make risk-informed 
decisions about what cargo is safe to be loaded onto vessels and 
aircraft prior to their departure from a foreign port and facilitates 
the clearance of those shipments upon their arrival in the United 
States.
    Through the Container Security Initiative (CSI), CBP works with 
host government customs services to examine high-risk maritime 
containerized cargo at foreign seaports, before they are loaded on-
board vessels destined for the United States. CSI teams currently 
operate at a total of 58 ports in North America, Europe, Asia, Africa, 
the Middle East, and Latin and Central America--covering approximately 
80 percent of all maritime containerized cargo imported into the United 
States.
    In the aviation environment, we are working with leaders from 
global shipping companies and the International Air Transport 
Association (IATA) to develop preventive measures, including terrorism 
awareness training for employees and vetting personnel with access to 
cargo. We are reviewing our foreign partners' cargo screening to 
determine whether their programs provide a level of security 
commensurate with U.S. air cargo security standards. Those who meet 
these requirements are officially recognized to conduct screening for 
cargo traveling to the United States. We are also building 
partnerships, through mutual recognition arrangements, with foreign 
governments maintaining industry partnership programs comparable to the 
Customs-Trade Partnership against Terrorism. We concluded such an 
agreement with the European Union in May which will give us better 
visibility into the security applied early in the supply chain for 
shipments from all 27 Member States of the European Union.
    DHS is also focused on preventing the exploitation of the global 
supply chain by those seeking to use the system to transport dangerous, 
illicit, contraband, contaminated, and counterfeit products. For 
example, under Program Global Shield, we are working with more than 90 
countries to prevent the illegal theft or diversion of precursor 
chemicals that can be used to make Improvised Explosive Devices, or 
IEDs. Through these efforts, we have already seized more than 62 metric 
tons of these deadly materials.
    DHS, through ICE and CBP, also continues to investigate U.S. export 
control law violations, including those related to military items, 
controlled ``dual-use'' commodities, and sanctioned or embargoed 
countries. We are committed to ensuring that foreign adversaries do not 
illegally obtain U.S. military products and sensitive technology, 
including weapons of mass destruction and their components, or attempt 
to move these items through the global supply chain. In fiscal year 
2011, ICE initiated 1,780 new investigations into illicit procurement 
activities, made 583 criminal arrests, and accounted for 2,332 seizures 
valued at $18.9 million. ICE also manages and operates the Export 
Enforcement Coordination Center (E2C2), an interagency hub for 
streamlining and coordinating export enforcement activities and 
exchanging information and intelligence.

                   SECURING AND MANAGING OUR BORDERS

    DHS secures the Nation's air, land, and sea borders to prevent 
illegal activity while facilitating lawful travel and trade. The 
Department's border security and management efforts focus on three 
interrelated goals: Effectively securing U.S. air, land, and sea 
borders; safeguarding and streamlining lawful trade and travel; and 
disrupting and, in coordination with other Federal agencies, 
dismantling transnational criminal and terrorist organizations.
Southwest Border
    To secure our Nation's Southwest Border, we have continued to 
deploy unprecedented amounts of manpower, resources, and technology, 
while expanding partnerships with Federal, State, Tribal, territorial, 
and local partners, as well as the government of Mexico.
    We have increased the number of Border Patrol agents Nation-wide 
from approximately 10,000 in 2004 to more than 21,000 today with nearly 
18,500 ``boots on the ground'' along the Southwest Border. Working in 
coordination with State and other Federal agencies, we have deployed a 
quarter of all ICE operational personnel to the Southwest Border 
region--the most ever--to dismantle criminal organizations along the 
border.
    We have doubled the number of ICE personnel assigned to Border 
Enforcement Security Task Forces, which work to dismantle criminal 
organizations along the border. We have tripled deployments of Border 
Liaison Officers, who facilitate cooperation between U.S. and Mexican 
law enforcement authorities on investigations and enforcement 
operations, including drug trafficking, in coordination with the Drug 
Enforcement Administration. We also have increased the number of 
intelligence analysts working along the U.S.-Mexico border.
    In addition, we have deployed dual detection canine teams as well 
as non-intrusive inspection systems, Mobile Surveillance Systems, 
Remote Video Surveillance Systems, thermal imaging systems, radiation 
portal monitors, and license plate readers to the Southwest Border. 
These technologies, combined with increased manpower and 
infrastructure, give our personnel better awareness of the border 
environment so they can more quickly act to resolve potential threats 
or illegal activity. We also are screening southbound rail and vehicle 
traffic, looking for the illegal weapons and cash that are helping fuel 
the cartel violence in Mexico.
    We also have completed 651 miles of fencing out of nearly 652 miles 
mandated by Congress as identified by Border Patrol field commanders, 
including 299 miles of vehicle barriers and 352 miles of pedestrian 
fence.
    To enhance cooperation among local, Tribal, territorial, State, and 
Federal law enforcement agencies, we have provided more than $203 
million in Operation Stonegarden funding to Southwest Border law 
enforcement agencies over the past 4 years.
    Our work along the border has included effective support from our 
partners at the Department of Defense (DOD). In addition to continuing 
support from DOD's Joint Task Force--North, in 2010, President Obama 
authorized the temporary deployment of up to 1,200 National Guard 
troops to the Southwest Border to contribute additional capabilities 
and capacity to assist law enforcement agencies as a bridge to longer-
term deployment of border surveillance technology and equipment that 
will strengthen our ability to identify and interdict the smuggling of 
people, drugs, illegal weapons, and money.
    Beginning in March 2012, DOD's National Guard support to CBP began 
to transition from ground support to air support, essentially moving 
from boots on the ground to boots in the air with state-of-the-art 
aerial assets equipped with the latest detection and monitoring 
capabilities.
    These aerial assets, which include both rotary and fixed-wing 
aircraft, supplement the CBP Office of Air and Marine aerial assets and 
support the Border Patrol's ability to operate in diverse environments, 
expand our field of vision in places with challenging terrain, and help 
us establish a greater visible presence from a distance, which 
increases deterrence. And this year, CBP introduced an extremely 
effective new aviation surveillance technology to monitor the border. 
The U.S. Army has loaned CBP a new electronic sensor system. CBP flies 
Predator B unmanned aircraft systems (UASs) with this new system on the 
Southwest Border. This system provides DHS with the first broad-area, 
electronic sensor system, with capabilities that far exceed those of 
the ground-based fixed or mobile systems.
    The results of these comprehensive and coordinated efforts have 
been significant. Border Patrol apprehensions--a key indicator of 
illegal immigration--have decreased 53 percent in the last 3 years and 
have decreased 80 percent from what they were at their peak. Indeed, 
illegal immigration attempts have not been this low since 1971. Violent 
crime in U.S. border communities has also remained flat or fallen over 
the past decade, and statistics have shown that some of the safest 
communities in America are along the border. From fiscal years 2009 to 
2011, DHS seized 74 percent more currency, 41 percent more drugs, and 
159 percent more weapons along the Southwest Border as compared to 
fiscal years 2006 to 2008.
    To further deter individuals from illegally crossing our Southwest 
Border, we also directed ICE to prioritize the apprehension of recent 
border crossers and repeat immigration violators, and to support and 
supplement Border Patrol operations. Between fiscal years 2009 and 
2011, ICE made over 30,936 criminal arrests along the Southwest Border, 
including 19,563 arrests of drug smugglers and 4,151 arrests of human 
smugglers.
    In addition to our efforts to strengthen border security, we made 
great strides in expediting legal trade and travel, working with local 
leaders to update infrastructure and reduce wait times at our Southwest 
Border ports of entry. Along the Southwest Border, new initiatives have 
included outbound infrastructure improvements and port hardening, which 
when completed, will expand our outbound inspection capabilities, 
enhance port security, and increase officer safety. We also have 
implemented Active Lane Management, which leverages Ready Lanes, 
Dedicated Commuter Lanes, and LED signage to dynamically monitor 
primary vehicle lanes and re-designate lanes as traffic conditions and 
infrastructure limitations warrant.
    These efforts are not only expediting legitimate trade, they are 
also stopping contraband from entering and leaving the country. In 
fiscal year 2011, DHS interdicted goods representing more than $1.1 
billion in Manufacturer's Suggested Retail Price. Further, the value of 
consumer safety seizures including pharmaceuticals totaled more than 
$60 million, representing a 41 percent increase over fiscal year 2010.

Northern Border
    To protect the Northern Border, we have continued to deploy 
technology and resources, invest in port of entry improvements to 
enhance security, and deepen our strong partnership with Canada.
    For instance, CBP expanded unmanned aerial surveillance coverage 
along the Northern Border into eastern Washington, now covering 950 
miles of the Northern Border. In 2011, CBP Office of Air and Marine 
provided nearly 1,500 hours of unmanned aerial surveillance along the 
Northern Border.
    In 2011, CBP opened the Operations Integration Center in Detroit--a 
multi-agency communications center for DHS, and other Federal, State, 
local, and Canadian law enforcement agencies. The Operations 
Integration Center increases information-sharing capabilities leading 
to seizures of drugs, money, and illegal contraband along the Northern 
Border within the Detroit Sector.
    ICE has four Border Enforcement Security Task Force (BEST) units 
along the Northern Border. These units, including representatives from 
the Royal Canadian Mounted Police, Canadian Border Services Agency, and 
numerous other provincial Canadian police departments, enhance 
coordination of U.S.-Canada joint interdictions and investigations, 
resulting in increased security for both countries.
    To support the Beyond the Border Action Plan, in June we released 
the DHS Northern Border Strategy, the first unified strategy to guide 
the Department's policies and operations along the U.S.-Canada border. 
Through this strategy, we will continue to work to improve information 
sharing and analysis within DHS, as well as with our partners. We will 
enhance coordination of U.S.-Canada joint interdictions and 
investigations, deploy technologies to aid joint security efforts along 
the border, and continue to update infrastructure to facilitate travel 
and trade. We also look forward to continuing to deepen partnerships 
with Federal, State, local, Tribal, private sector, and Canadian 
partners that are so critical to the security, resiliency, and 
management of our Northern Border.

Maritime
    With more than 350 ports and 95,000 miles of coastline, the U.S. 
maritime domain is unique in its scope and diversity.
    The Coast Guard provides maritime security using a major cutter and 
patrol boat fleet to respond to threats, and launch boats and aircraft 
to maintain a vigilant presence over the seas. Closer to shore, Coast 
Guard helicopters small cutters and boats monitor, track, interdict, 
and board vessels. In the Nation's ports, the Coast Guard and CBP, 
along with our Federal, State, local, and Tribal partners, working in 
concert with other port stakeholders, monitor critical infrastructure, 
conduct vessel escorts and patrols, and inspects vessels and 
facilities.
    The U.S. Coast Guard plays an integral role in DHS' border 
enforcement strategy through its maritime operations as part of Joint 
Interagency Task Force (JIATF)--South, the U.S. Southern Command entity 
that coordinates integrated interagency counter drug operations in the 
Caribbean Sea, Gulf of Mexico, and the eastern Pacific. In fiscal year 
2011, Coast Guard major cutters and other assets removed over 75 metric 
tons of cocaine, more than 17 metric tons of marijuana, detained 191 
suspected smugglers, and seized 40 vessels. Additionally, Coast Guard 
Law Enforcement Detachments are deployed aboard U.S. Navy and Allied 
assets to support detection, monitoring, interdiction and apprehension 
operations. CBP Office of Air and Marine P-3 and Coast Guard fixed-wing 
aircraft have also been an integral part of successful counter-narcotic 
missions operating in the Source and Transit Zones in coordination with 
JIATF-South. Collectively the efforts to interdict drugs in the Source 
and Transit Zones helped to control the flow of drugs to the Southwest 
Border.
    Robust interagency cooperation and strong international 
partnerships also helped the Coast Guard interdict 2,474 migrants at 
sea in fiscal year 2011.

                  SAFEGUARDING AND SECURING CYBERSPACE

    Our daily life, economic vitality, and National security depend on 
a safe, secure, and resilient cyberspace. A vast array of 
interdependent IT networks, systems, services, and resources are 
critical to communication, travel, powering our homes, running our 
economy, and obtaining Government services. While we are more network-
dependent than ever before, increased interconnectivity increases the 
risk of theft, fraud, and abuse.
    Cyber incidents have increased significantly over the last decade 
and the United States continues to confront a dangerous combination of 
known and unknown vulnerabilities in cyberspace, strong and rapidly 
expanding adversary capabilities, and limited threat and vulnerability 
awareness. There have been instances of theft and compromise of 
sensitive information from both Government and private-sector networks. 
Last year, the DHS U.S. Computer Emergency Readiness Team (US-CERT) 
received more than 100,000 incident reports, and released more than 
5,000 actionable cybersecurity alerts and information products.
    DHS is the Federal Government's lead agency for securing civilian 
government computer systems and works with our industry and Federal, 
State, local, Tribal, and territorial government partners to secure 
critical infrastructure and information systems. DHS analyzes and 
mitigates cyber threats and vulnerabilities; distributes threat 
warnings; provides solutions to critical research and development 
needs; and coordinates the vulnerability, mitigation, and consequence 
management response to cyber incidents to ensure that our computers, 
networks, and information systems remain safe. DHS also works with 
Federal agencies to secure unclassified Federal civilian government 
networks and works with owners and operators of critical infrastructure 
to secure their networks through risk assessment, mitigation, and 
incident response capabilities.
    With respect to critical infrastructure, DHS and the sector-
specific agencies work together with the private sector to help secure 
the key systems upon which Americans rely, such as the financial 
sector, the power grid, water systems, and transportation networks. 
Protecting critical infrastructure requires taking an integrated 
approach toward physical and cybersecurity and ensuring that we can 
utilize our established partnerships with the private sector to address 
cybersecurity concerns. We do this by sharing actionable cyber threat 
information with the private sector, helping companies to identify 
vulnerabilities before a cyber incident occurs, and providing forensic 
and remediation assistance to help response and recovery after we learn 
of a cyber incident.
    In addition, DHS S&T works collaboratively across Federal agencies, 
private industry, academic networks and institutions, and global 
information technology owners and operators to research, develop, test, 
and transition deployable solutions to secure the Nation's current and 
future cyber and critical infrastructures.
    To combat cyber crime, DHS leverages the skills and resources of 
the U.S. Secret Service and ICE, who investigate cyber criminals and 
work with the Department of Justice, which prosecutes them. Cyber crime 
investigations are directly led by the USSS and involve numerous 
partners at the Federal, State, and local level as well as the private 
sector. In fiscal year 2011 alone, USSS prevented $1.6 billion in 
potential losses through cyber crime investigations. Additionally, ICE 
HSI cyber crime investigations relating to child exploitation in fiscal 
year 2011 resulted in 1,460 criminal arrests, 1,104 indictments and 928 
convictions. One significant child exploitation investigation conducted 
by ICE HSI was Operation Delego, which resulted in prosecutors bringing 
charges against 72 individuals for their alleged participation in an 
international criminal network that sought the sexual abuse of children 
and the creation and dissemination of child pornography.
    DHS recognizes that partnership and collaboration are crucial to 
ensuring that all Americans take responsibility for their actions on-
line. To that end, we are continuing to grow the Department's 
Stop.Think.Connect.TM Campaign, which is a year-round 
National public awareness effort designed to engage and challenge 
Americans to join the effort to practice and promote safe on-line 
practices.
    The Department of Defense is a key partner in our cybersecurity 
mission. In 2010, I signed a Memorandum of Understanding with then-
Secretary of Defense Robert Gates to formalize the interaction between 
DHS and DOD, and to protect against threats to our critical civilian 
and military computer systems and networks. Congress mirrored this 
division of responsibilities in the National Defense Authorization Act 
for fiscal year 2012. We are currently working with the Defense 
Industrial Base to exchange actionable information about malicious 
activity.
    As much as we are doing, we must do even more. To this end, 
Congress has before it several pieces of proposed legislation designed 
to address emerging cyber threats. The proposal the administration has 
supported is a bipartisan bill sponsored by Senators Lieberman, 
Collins, Rockefeller, and Feinstein, and is known as the Cyber Security 
Act of 2012.
    Under current law, Congress gave DHS significant cyber authorities, 
and we inherited a patchwork of others. But we have reached a point 
where the current threat outpaces our existing amalgam of laws, and so 
we are working with Congress to make some changes to the law. 
Specifically, the Cyber Security Act of 2012 would require the 
establishment of baseline cybersecurity practices for the Nation's 
critical core infrastructure.
    It removes barriers to information sharing between the Federal 
Government, industry, and State, local, Tribal, and territorial 
governments so that we may more quickly respond to and mitigate any 
cyber threat or intrusion. And, importantly, the legislation would help 
us attract and retain cybersecurity professionals to execute this 
complex and challenging mission by adding flexibility to the current 
personnel laws. I understand that Senator Lieberman has recently 
introduced a new version of this legislation. The administration is 
currently reviewing this version of the bill and looks forward to 
working with the Congress as the bill moves through the legislative 
process.

ENSURING ROBUST PRIVACY AND CIVIL RIGHTS AND CIVIL LIBERTIES SAFEGUARDS

    The Department builds privacy, confidentiality, and civil rights 
and civil liberties protections into its operations, policies, 
programs, and technology deployments from the outset of their 
development.
    The DHS Privacy Office--the first statutorily-required privacy 
office of any Federal agency--partners with every DHS component to 
assess policies, programs, systems, technologies, and rulemakings for 
privacy risks, and recommends privacy and confidentiality protections 
and methods for handling personally identifiable information.
    DHS's Office for Civil Rights and Civil Liberties (CRCL) plays a 
key role in the Department's mission to secure the Nation while 
preserving individual freedoms and represents the Department's 
commitment to the idea that core civil rights values--liberty, 
fairness, and equality under the law--are a vital part of America, and 
that these values provide a bulwark against those who threaten our 
safety and security.
    Since its inception, CRCL has expanded its participation in 
programs and activities throughout the Department and continued its 
efforts to promote civil rights and civil liberties. For example, CRCL 
collaborates with U.S. Immigration and Customs Enforcement on detention 
reform and other immigration-related efforts, and works with TSA to 
ensure that evolving aviation security measures are respectful of civil 
rights and civil liberties.
    CRCL's community engagement efforts include a wide variety of 
stakeholders and organizations through regular roundtables across the 
country. CRCL has also expanded its training capacity and worked 
closely with the DHS Privacy Office and the Office of Intelligence and 
Analysis to offer civil rights and civil liberties training for fusion 
centers, as well as training to a number of the Department's Federal, 
State, and local partners.

                               CONCLUSION

    While America is stronger and more resilient as a result of these 
efforts, threats from terrorism persist and continue to evolve. Today's 
threats do not come from any one individual or group. They may 
originate in distant lands or local neighborhoods. They may be as 
simple as a homemade bomb or as sophisticated as a biological threat or 
coordinated cyber attack.
    As threats to our Nation evolve, DHS must also evolve. Thus, we 
continue to remain vigilant, protecting our communities from terrorist 
threats, while promoting the movement of goods and people and 
maintaining our commitment to civil rights and civil liberties.
    I thank the committee for your continued partnership and guidance 
as together we work to keep our Nation safe. I look forward to your 
questions.

    Chairman King. Thank you, Secretary Napolitano. Thanks for 
working through the technical problem with us.
    I will ask the staff--okay. It is--okay.
    Our next witness is Matthew Olsen, who served as the 
director of the National Counterterrorism Center, the NCTC, 
since August of last year. Prior to joining NCTC, Mr. Olsen 
served as the general counsel for the National Security Agency, 
where he served as the chief legal officer for NSA. He also has 
served in Government with the FBI and the Department of 
Justice, and it is a pleasure to have him testify here before 
this committee for the first time.
    Director Olsen.

       STATEMENT OF MATTHEW G. OLSEN, DIRECTOR, NATIONAL 
                    COUNTERTERRORISM CENTER

    Mr. Olsen. Chairman King, Ranking Member Thompson, Members 
of the committee, thank you very much.
    I appreciate this opportunity to be here with the committee 
today to discuss the terrorist threat facing our country and 
our efforts to combat it. I am particularly pleased to be here 
with Secretary Napolitano. The Department of Homeland Security 
and NCTC are strong partners in the fight against terrorism.
    As you mentioned, Chairman, I have now served as the 
director of NCTC for almost a year. During that year, we have 
continued to make steady progress in the fight against 
terrorism. At the same time, acts of terror and acts of 
violence still threaten us here at home and abroad.
    As you know, just last week in Bulgaria, seven people were 
killed in a brazen terrorist attack on a bus filled with 
Israeli tourists. While there is no suggestion that the 
shooting last week in Colorado was connected to international 
terrorism, the attack is a tragic reminder that a lone, 
calculating shooter can inflict devastating damage.
    Over the past year, with the guidance and support of 
Congress and of this committee, we have placed relentless 
pressure on the core of al-Qaeda. We have denied that group 
safe haven and the ability to plan and to train. Following the 
death of Osama bin Laden last year, several of his top 
lieutenants have been eliminated.
    The leaders that remain lack experience, and they are under 
siege. They have a very limited ability to recruit and to 
communicate with other operatives. In short, the intelligence 
picture shows that al-Qaeda core is a shadow of its former 
self. The overall threat from al-Qaeda in Pakistan is degraded.
    While these gains are significant and enduring, al-Qaeda 
and its affiliates and its adherents around the world, as well 
as other terrorist organizations, continue to pose a 
significant threat to our country. As al-Qaeda's core 
leadership struggles to remain relevant, it has turned to other 
groups to carry out attacks and to advance its ideology.
    These groups are from an array of countries. They include 
Yemen, Somalia, Iraq, and Iran. The men and women at the 
National Counterterrorism Center are confronting this threat 
and working with resolve to prevent a terrorist attack.
    In the balance of my remarks, I would like to further 
describe briefly the threat landscape and then discuss the role 
of NCTC and some of the ways that we are responding to this 
threat.
    First, beginning with al-Qaeda in Pakistan, as I mentioned 
over the past year, sustained pressure has degraded Pakistan-
based al-Qaeda's leadership and its operational capabilities, 
leaving the core of al-Qaeda at its weakest point in over a 
decade.
    The death of bin Laden, the subsequent losses of other top 
lieutenants and senior planners, have eroded the group's bench 
of potential leaders and have shaken the group's sense of 
security in Pakistan's tribal areas. Al-Qaeda is placing a 
greater emphasis on smaller, simpler plots that are easier to 
carry out and more difficult to detect.
    We remain concerned that individuals like the alleged Fort 
Hood shooter, Nidal Hasan, and the Toulouse shooter, Mohamed 
Merah, may inspire other like-minded individuals to conduct 
attacks in the name of al-Qaeda.
    Beyond the core of al-Qaeda, we face a diverse set of 
affiliated groups, enabled in part by political instability and 
unrest in areas such as Yemen and Somalia. To varying degrees, 
these groups coordinate their activities and follow the 
direction of al-Qaeda leadership in Pakistan.
    The single most capable affiliate today is al-Qaeda in the 
Arabian Peninsula, AQAP, based in Yemen. This group remains the 
affiliate most likely to attempt and to carry out a 
transnational attack, including against the United States. The 
death of Anwar al-Awlaki last September temporarily slowed 
AQAP's external plotting efforts, but the group maintains the 
intent and the capability to conduct U.S. attacks with little 
or no warning. AQAP demonstrated this intent last May, when it 
plotted to bring down an airliner bound for the United States.
    We monitor other key al-Qaeda affiliates and related groups 
in the Middle East, in South Asia, and in Africa. These groups 
remain primarily focused on local and regional plotting. Al-
Qaeda in the Lands of the Islamic Maghreb, or AQIM, and Boko 
Haram are active in countries like Mali and Nigeria, and are 
focused on targeting Western and U.S. interests in that region.
    Al-Shabaab, which formally merged with al-Qaeda just this 
past February, is principally concerned with combating Kenyan 
and Ethiopian incursions into Somalia, which are eroding the 
group's safe haven in Somalia. It also remains intent on 
conducting attacks against regional and Western targets in East 
Africa, having carried out a number of recent low-level attacks 
in Kenya.
    Pakistani and Afghan militant groups, including the 
Pakistani Taliban, or TTP, the Haqqani network, Lashkar-e-
Taiba, or L.T., continue to pose a direct threat to U.S. 
interests and our allies in South Asia. We continue to watch 
for signs that any of these groups or networks or individuals 
is pursuing operations outside of that region as a strategy to 
achieve their objectives.
    Al-Qaeda in Iraq continues to carry out high-profile, 
coordinated attacks against government and civilian targets in 
Iraq. Just this past weekend, more than 100 people were killed 
in terrorist attacks across Iraq. In a video a couple days ago, 
AQI, al-Qaeda in Iraq's leader, forecast a new offensive 
against individuals in Iraq and threatened to carry out attacks 
in the United States.
    In the past 2 years, American and Canadian law enforcement 
authorities have arrested North American-based AQI operatives, 
highlighting the potential threat posed by U.S.-based AQI 
associates.
    I would like to take a moment to discuss the terrorist 
threat from Lebanese Hezbollah and Iran. Lebanese Hezbollah has 
intensified its terrorist activities around the world. Since 
2008, it has engaged in an increasingly aggressive terrorist 
campaign, seeking to carry out attacks in places like Egypt, 
Israel, and Thailand. Israel has blamed Hezbollah for the 
attack last week on an Israeli tourist bus in Bulgaria, taking 
the lives of seven people.
    Iran remains the foremost state sponsor of terrorism. Since 
9/11, the regime has expanded its involvement with terrorists 
and insurgent groups, primarily in Iraq and in Afghanistan, 
that target U.S. and Israeli interests. Iran has been linked to 
plots elsewhere, as well. As the committee is aware, the 
disrupted Iranian plot to assassinate the Saudi ambassador to 
the United States last fall demonstrated that Iran is willing 
to conduct terrorist attacks inside the United States.
    Then finally, Mr. Chairman, with regard to HVEs, the 
homegrown violent extremists who are inspired by al-Qaeda's 
ideology continue to pose a threat to the United States, as 
Secretary Napolitano discussed. AQAP members Anwar al-Awlaki 
and Samir Khan created propaganda specifically for an American 
audience. Even after their deaths, that propaganda remains 
accessible on-line.
    Lone actors or small insular groups posed the most serious 
HVE threat to the homeland. They are difficult to detect. They 
may carry out their attacks without travel and without 
consulting others.
    Now, briefly, if I could turn to the role that the National 
Counterterrorism Center is playing. Our analysts review all 
terrorism intelligence, collected both inside and outside of 
the United States. We have access to the full catalogue of 
reporting, both foreign and domestic, on terrorism issues, and 
our workforce includes representatives from across the 
government, including from the Department of Homeland Security. 
They reflect a wide range of viewpoints and perspectives.
    Today, we are facing a dynamic and complex threat 
environment, and we are seeking to adapt to that threat. I 
would like to focus on a couple of key initiatives that we have 
adopted to, in particular, focus on the threat to the U.S. 
homeland.
    In 2010, NCTC created the Pursuit Group. This group is 
designed to develop tactical leads and to pursue terrorist 
threats. The Pursuit Group analysts at NCTC help ensure that 
terrorism cases are examined thoroughly, focusing on the 
details and connections that could yield relevant information. 
These analysts provide leads to operational organizations, like 
DHS and the FBI and the CIA.
    Second, we continue to implement important reforms in the 
watch listing process. We have improved our processing and 
information-sharing in support of that mission. As the threat 
continues to evolve, our experts on watch listing work closely 
with the rest of the CT community to expedite the sharing of 
information and to build more complete terrorist identities.
    Additionally, we have implemented several improvements to 
our information technology. Our counterterrorism data layer is 
being developed to process relevant information and to allow 
analysts to search and correlate terrorism information in a 
single environment.
    Later this week, Mr. Chairman, the London Olympics begin. 
For the past 2 years, NCTC, in coordination with our 
intelligence community and British partners, has been leading 
the U.S. effort to make sure that we are collecting and 
analyzing and sharing all potential threat information relating 
to the Olympics and that we are in a position to respond 
quickly to prevent any possible plotting tied to the games.
    Finally, if I may say, that all of these activities must be 
consistent with the protection of privacy and civil liberties 
of the American people. As NCTC's director, I am committed to 
making sure that we retain the trust and the confidence of our 
citizens.
    I would like to close these opening remarks by identifying 
our single most important resource, and that is our people. As 
we bolster our efforts to meet the challenges posed by the 
threat I have described, our progress is dependent on 
maintaining and developing a diverse workforce, much of which 
comes from other agencies like the Department of Homeland 
Security. I am proud to lead such a committed group of 
professionals.
    Mr. Chairman and Ranking Member Thompson and Members of the 
committee, thank you for this opportunity. Thank you for your 
continued support of our mission and the men and women of the 
National Counterterrorism Center. I am happy to answer your 
questions.
    [The statement of Mr. Olsen follows:]

                 Prepared Statement of Matthew G. Olsen
                             July 25, 2012

    Thank you Chairman King, Ranking Member Thompson, Members of the 
committee. I appreciate this opportunity to be here today to discuss 
the terrorist threat against the United States and our efforts to 
counter it.
    I also want to express my appreciation to the committee for your 
steadfast leadership and your support of the National Counterterrorism 
Center (NCTC). I am particularly pleased to be here today with 
Secretary Napolitano. The Department of Homeland Security and NCTC are 
strong and vital partners in the fight against terrorism.
    I have now served as Director of NCTC for close to 1 year. During 
this year, with the support and guidance of Congress, we have made 
significant progress in the fight against terrorism. Our Nation has 
placed relentless pressure on al-Qaeda's leadership. We have denied the 
group safe havens, resources, and the ability to plan and train. 
Following the death last year of Usama bin Ladin, several of his top 
lieutenants have been eliminated. The leaders that remain lack 
experience and are under siege. They have limited ability to recruit 
and communicate with other operatives. In short, the intelligence 
picture shows that al-Qaeda core is a shadow of its former self, and 
the overall threat from al-Qaeda in Pakistan is diminished.
    Further, the Government has disrupted terrorist attacks in the 
United States and abroad. Our intelligence officers have worked to 
identify and stop terrorist plots before they are executed. And we have 
investigated and prosecuting individuals who have sought to carry out 
and supported terrorist operations.
    In addition, we have continued to build an enduring 
counterterrorism framework--including institutions like NCTC and DHS--
dedicated to analyzing and sharing terrorism information across the 
Government and to the mission of detecting and preventing terrorist 
attacks against our citizens and interests around the world.
    The credit for these successes belongs to the men and women in our 
military, law enforcement, and intelligence communities.
    While these gains are real and enduring, al-Qaeda, its affiliates 
and adherents around the world--as well as other terrorist 
organizations--continue to pose a significant threat to our country. 
This threat is resilient, adaptive, and persistent.
    More than a decade after the September 11 attacks, we remain at war 
with al-Qaeda, and we face an evolving threat from its affiliates and 
adherents. America's campaign against terrorism did not end with the 
mission at bin Ladin's compound in Abbottabad, Pakistan. Indeed, the 
threats we face have become more diverse. As al-Qaeda's core leadership 
struggles to remain relevant, the group has turned to its affiliates 
and adherents to carry out attacks and to advance its ideology. These 
groups are from an array of countries, including Yemen, Somalia, 
Nigeria, Iraq, and Iran. To varying degrees, these groups coordinate 
their activities and follow the direction of al-Qaeda leaders in 
Pakistan. Many of the extremist groups themselves are multi-
dimensional, blurring the lines between terrorist group, insurgency, 
and criminal gang.
    Confronting this threat and working with resolve to prevent another 
terrorist attack is NCTC's overriding mission. We continue to monitor 
threat information, develop leads, work closely with domestic and 
international partners, and develop strategic plans to combat our 
terrorist adversaries. Today I can report that, while we have taken 
important steps against al-Qaeda and other terrorist groups, much work 
remains. And the dedicated professionals at NCTC, along with our 
partners across the Government and overseas, remain steadfast, and 
committed to sustaining and enhancing the effort to protect the Nation.
    In my statement, I will begin by examining the terrorist threats to 
the homeland and to U.S. interests. I will then describe NCTC's role in 
addressing these threats and some of the key reforms and initiatives we 
have adopted.

                   THE TERRORIST THREAT IN TRANSITION

Pakistan-based al-Qaeda Core
    Over the past year, sustained CT pressure has systematically 
degraded Pakistan-based al-Qaeda's leadership and operational 
capabilities. These efforts have left the group at its weakest point in 
the last 10 years. Although core al-Qaeda remains committed to its 
overarching goals, it is clearly a group in decline.
    The death of Usama bin Ladin on May 2, 2011 removed al-Qaeda's 
founder and leader and its staunchest proponent of spectacular attacks 
against the U.S. homeland. The subsequent losses of several of bin 
Ladin's top lieutenants and senior operational planners--including 
general manager Atiyah Abd al-Rahman last August and his replacement 
Abu Yahya al-Libi this June--have eroded the group's bench of potential 
leaders and have shaken al-Qaeda's sense of security in Pakistan's 
tribal areas. Remaining leaders have been driven underground to varying 
degrees and the group has shifted a substantial portion of its 
attention from terrorist plotting to security and survival.
    Operationally, core al-Qaeda has not conducted a successful 
operation in the West since the 2005 London bombings. The group, 
however, remains committed to striking Western targets, including the 
United States. Its degraded capabilities almost certainly will compel 
operational planners to place a greater emphasis on smaller, simpler 
plots that are easier to carry out.
    Since bin Ladin's death, multiple al-Qaeda leaders have publicly 
endorsed the concept of individual acts of violence. We remain 
concerned that individuals like alleged Fort Hood shooter Nidal Hassan 
and Toulouse shooter Mohammed Merah may inspire other like-minded 
individuals to conduct attacks in al-Qaeda's name.
    Despite its shrinking leadership cadre, al-Qaeda continues to issue 
propaganda and media statements specifically focused on the Arab 
unrest. Persistent conflict in places such as Yemen, Libya, and Syria, 
and the impending withdrawal of U.S. forces from Afghanistan, may 
provide core al-Qaeda a propaganda opportunity to claim victories over 
the United States and reinvigorate its image as the leader of the 
global movement. Senior leaders almost certainly recognize that the 
Coalition drawdown in Afghanistan presents an opportunity for the group 
to reconstitute in parts of the country and in propaganda declare a 
major victory.

Al-Qaeda's Affiliates: A Persistent and Diversifying Threat to the U.S. 
        and Overseas Interests
    AQAP.--Al-Qaeda in the Arabian Peninsula (AQAP) remains the 
affiliate most likely to attempt and carry out transnational attacks, 
including against the United States. Despite Anwar al-Aulaqi's death, 
the group maintains the intent and capability to conduct anti-U.S. 
attacks with little to no warning.
    In its three attempted attacks against the U.S. homeland--the 
airliner plot of December 2009, an attempted attack against U.S.-bound 
cargo planes in October 2010, and an airliner plot this May--AQAP has 
shown an awareness of Western security procedures and demonstrated its 
efforts to adapt. The death of al-Aulaqi probably temporarily slowed 
AQAP's external plotting efforts but did not deter the group from 
attempting another aviation attack in May. We are also concerned by 
AQAP's efforts to exploit the security vacuum associated with the Arab 
Spring, although the group has suffered recent setbacks in these 
efforts.
    AQAP also remains intent on publishing the English-language Inspire 
magazine--previously spearheaded by al-Aulaqi and now-deceased Samir 
Khan--in order to mobilize Western-based individuals for violent 
action. While the deaths of al-Aulaqi and Khan have affected the 
quality of the magazine, the publication endures and continues to reach 
a global audience of violent extremists.
    AQIM and Boko Haram.--Al-Qaeda in the Lands of the Islamic Maghreb 
(AQIM) and Boko Haram remain focused on local and regional attack 
plotting, including targeting Western interests in Nigeria. The groups 
have shown minimal interest in targeting the U.S. homeland.
    AQIM is actively working with local violent extremists in northern 
Mali to establish a safe haven from which to advance future operational 
activities. While Boko Haram is primarily focused on plotting against 
targets in Nigeria, in April a spokesman for the group publicly 
threatened to find a way to attack a U.S.-based news outlet if its 
coverage of Islam did not change.
    Al-Qaeda in Iraq.--Since the withdrawal of U.S. forces from Iraq 
late last year, al-Qaeda in Iraq (AQI) has conducted numerous high-
profile attacks there and this year has carried out coordinated 
country-wide attacks against government, security, and Shia civilian 
targets. During the past 2 years AQI has continued to release media 
statements supporting global extremism.
    AQI's propaganda statements have cited its support for uprisings 
against secular governments in the Middle East and North Africa and, in 
a June statement, the group expressed solidarity with the Syrian Sunni 
population. In January 2011 it published an explosives training video 
that called for lone-wolf attacks in the West and against so-called 
apostate regimes in the Middle East.
    During the past 2 years, American and Canadian authorities have 
arrested several North America-based AQI associates, highlighting the 
potential threat posed by to the United States. The FBI in May 2011 
arrested Kentucky-based Iraqi nationals Waad Alwan and Shareef Hamadi 
for attempting to send weapons and explosives from Kentucky to Iraq and 
conspiring to commit terrorism while in Iraq. Alwan pled guilty to 
supporting terrorism in December. In January 2010, Canadian authorities 
arrested dual Iraqi-Canadian citizen Faruq Isa who is accused of 
vetting individuals on the internet for suicide operations in Iraq.
    Al-Shabaab.--We continue to monitor al-Shabaab and its foreign 
fighter cadre as a potential threat to the United States, although the 
group is mainly focused on combating the on-going Kenyan and Ethiopian 
incursions into Somalia which have eroded its territorial safe haven 
since late last year.
    The group, which formally merged with al-Qaeda in February, also 
remains intent on conducting attacks against regional and Western 
targets in East Africa, especially in countries supporting Transitional 
Federal Government (TFG) and allied forces in Somalia. Probable al-
Shabaab sympathizers recently conducted several low-level attacks in 
Kenya. Al-Shabaab leaders publicly have called for transnational 
attacks, including threatening to avenge the January death of British 
national and al-Shabaab senior foreign fighter Bilal Berjawi.

                        OTHER TERRORIST THREATS

    Lebanese Hizballah.--Lebanese Hizballah has intensified its 
terrorist activities around the world and we remain concerned that the 
group's activities endanger U.S. interests and citizens, as well as our 
allies.
    Since May 2008, Hizballah plots against Israeli targets in 
Azerbaijan, Egypt, and Israel have been disrupted, and additional 
operational activity in Turkey has reportedly been uncovered. The 
Government of Israel has cited possible Hizballah involvement in the 
July 18 terrorist attack in Burgas, Bulgaria. Hizballah has engaged in 
an increasingly aggressive terrorist campaign since the end of its 2006 
war with Israel and probably accelerated by the death of its operations 
chief Imad Mughniyah in Syria in 2008.
    In Thailand this past January, a dual Lebanese-Swedish citizen and 
suspected Hizballah facilitator was arrested by the Royal Thai police 
at the Bangkok airport as he prepared to leave the country. Following 
his arrest, the individual gave the location of two buildings where 
Thai authorities found a large supply of explosive precursors. The 
disrupted attack may have targeted Israelis in an area popular with 
tourists from many countries, including the United States.
    Iranian Threat.--Iran remains the foremost state sponsor of 
terrorism. Since 9/11 the regime has expanded its involvement with 
terrorist and insurgent groups--primarily in Iraq and Afghanistan--that 
target U.S. and Israeli interests.
    Iran's Islamic Revolutionary Guard Corps-Qods Force and Ministry of 
Intelligence and Security have been involved in the planning and 
execution of terrorist acts and the provision of lethal aid--such as 
weapons, money, and training--to these groups, particularly Lebanese 
Hizballah. Iran's relationship with Hizballah since 9/11 has evolved 
from a traditional state sponsor-proxy relationship to a strategic 
partnership that provides a unified front against Israel and the United 
States.
    The disrupted Iranian plot to assassinate the Saudi Ambassador to 
the United States last fall demonstrates that Iran is more willing to 
conduct terrorist operations inside the United States than was 
previously assessed. As part of the plot, the Islamic Revolutionary 
Guard Corps-Qods Force attempted to use a dual Iranian-U.S. national to 
recruit Mexican criminal organizations to conduct the assassination, 
raising our concerns that Iran may seek to leverage other Mexican 
contacts for activities in the United States.
    South Asia-Based Militants.--Pakistani and Afghan militant groups--
including Tehrik-e Taliban Pakistan (TTP), the Haqqani Network, and 
Lashkar-e Tayyiba (LT)--continue to pose a direct threat to U.S. 
interests and our allies in the region, where these groups probably 
will remain primarily focused. We continue to watch for signs that any 
of these groups, networks, or individuals are actively pursuing or have 
decided to incorporate operations outside of South Asia as a strategy 
to achieve their objectives.
    TTP's recent claim of responsibility for the beheading of 17 
Pakistani soldiers and its threat to attack Coalition supply lines 
through Pakistan underscore the threat the group poses in the region. 
TTP leaders have repeatedly threatened attacks against the United 
States, including after the death of bin Ladin in May 2011. TTP's claim 
of responsibility for the failed Times Square bombing in May 2010 
demonstrates its willingness to act on this intent.
    The Haqqani Network has orchestrated and carried out multiple 
attacks against NATO and Afghan Government targets in Afghanistan, 
notably the 18-hour multi-pronged assault against military, security, 
and government facilities in Kabul and three other cities in April.
    LT leaders have maintained a regional focus. LT leaders almost 
certainly recognize that an attack in the United States would bring 
intense international backlash upon Pakistan and endanger the group's 
safe haven there. LT provides training to a wide range of Pakistani and 
Western militants, some of whom could plot terrorist attacks in the 
West without direction from LT leaders. LT members frustrated with the 
group's focus on South Asia likewise could leave LT to join a more 
globally focused group like al-Qaeda.
    LT has demonstrated a willingness to attack Western interests in 
South Asia in pursuit of its regional objectives, as it did through a 
high-profile operation targeting hotels frequented by Westerners during 
the Mumbai attacks in 2008.

Homegrown Violent Extremists
    Homegrown violent extremists (HVEs), including those who are 
inspired by al-Qaeda's ideology, continue to pose a threat to the 
United States. HVEs inspired by al-Qaeda are almost certainly entering 
a period of transition as U.S.-based violent extremists adjust to the 
deaths and disruption of influential English-language figures who 
helped al-Qaeda's ideas resonate with some in the United States.
    Now-deceased AQAP members Anwar al-Aulaqi and Samir Khan were 
probably best positioned to create propaganda specifically for an 
American audience and mobilize HVEs. Their propaganda remains easily 
accessible on-line and will likely continue to inspire HVE violence.
    The growth of on-line English-language extremist content during the 
past 3 years has fostered a shared identity--but not necessarily 
operational collaboration--among HVEs. Plots disrupted during the past 
year were unrelated operationally, but may demonstrate a common cause 
rallying independent violent extremists to plot against the United 
States.
    Lone actors or insular groups pose the most serious HVE threat to 
the homeland. HVEs could view lone-offender attacks as a model for 
future plots in the United States and overseas. The perceived success 
of previous lone-offender attacks combined with al-Qaeda and AQAP's 
propaganda promoting individual acts of terrorism is raising the 
profile of this tactic.
    The arrests last year of Texas-based Saudi Khalid Aldawsari and 
U.S. Army Private First Class Naser Abdo, as well as the successful 
attack in France, underscore the threat from lone offenders who are 
able to adapt their plans quickly by rapidly changing time lines, 
methods, and targets to meet existing circumstances--all without 
consulting others.

                            THE ROLE OF NCTC

NCTC's Core Missions
    The overarching mission of the NCTC is to lead the effort to combat 
international terrorism. In 2004 the 9/11 Commission observed that, 
``the United States confronts a number of less visible challenges that 
surpass the boundaries of traditional nation-states and call for quick, 
imaginative, and agile responses.'' That observation--as true today as 
it was in 2001--led the Commission to recommend the creation of a 
National Counterterrorism Center: ``Breaking the mold of national 
government organization, this NCTC should be a center for joint 
operational planning and joint intelligence.''
    In 2004 Congress established NCTC. The Intelligence Reform and 
Terrorism Prevention Act set forth NCTC's key responsibilities as 
detailed below. These responsibilities are captured in NCTC's mission 
statement: ``Lead our Nation's effort to combat terrorism at home and 
abroad by analyzing the threat, sharing that information with our 
partners, and integrating all instruments of National power to ensure 
unity of effort.''
    Intelligence Integration and Analysis.--NCTC serves as the primary 
organization in the U.S. Government for analyzing and integrating all 
intelligence possessed or acquired by the Government pertaining to 
international terrorism and counterterrorism. NCTC has a unique 
responsibility to examine all international terrorism issues, spanning 
geographic boundaries, and allowing for intelligence to be analyzed 
regardless of whether it is collected inside or outside the United 
States.
    NCTC has access to the catalogue of reporting--both foreign and 
domestic--on terrorism issues. NCTC's strategic analyses are vetted and 
coordinated throughout the intelligence community, which adds multiple 
analytic perspectives. NCTC produces coordinated assessments on such 
critical terrorism issues as terrorist safe havens, state sponsors of 
terrorism, counterterrorism cooperation worldwide, and regional 
terrorism issues and groups. NCTC also regularly prepares intelligence 
assessments that are integrated into NCTC's Directorate of Strategic 
Operational Planning to inform policymakers on the progress of U.S. 
counterterrorism efforts.
    NCTC's analytic cadre includes detailees and assignees from across 
the intelligence community and Government, ensuring NCTC products 
reflect the diversity of the entire intelligence community and not the 
analytic view of one group or agency.
    Watchlisting.--NCTC hosts and maintains the central and shared 
knowledge bank on known and suspected terrorists and international 
terror groups, as well as their goals, strategies, capabilities, and 
networks of contacts and support. NCTC has developed and maintains the 
Terrorist Identities Datamart Environment (TIDE) on known and suspected 
terrorists and terrorist groups. In this role, NCTC advances the most 
complete and accurate information picture to our partners to support 
terrorism analysts. We also support screening activities that 
ultimately help prevent terrorist plans and operations against U.S. 
interests.
    Situational Awareness and Support to Counterterrorism Partners.--
NCTC provides direct support to counterterrorism partners at both the 
Federal and State and local levels.
    In particular, our unique, centralized access to intelligence 
information on terrorist activity enables our analysts to integrate 
information from foreign and domestic sources and to pass that 
information in a timely manner to domestic agencies. Below are several 
examples:
   NCTC provides around-the-clock support to domestic 
        counterterrorism activities through the NCTC Operations Center, 
        which is collocated with FBI Counterterrorism Division Watch. 
        NCTC produces and disseminates daily situational awareness 
        products and chairs thrice-daily secure video teleconferences 
        to facilitate timely information exchanges between all 
        counterterrorism partners.
   The Interagency Threat Assessment and Coordination Group 
        (ITACG), located at NCTC and led by DHS and FBI, brings 
        together Federal and non-Federal intelligence, law enforcement, 
        and first responder detailees, who are dedicated to bridging 
        the intelligence information gap between traditional 
        intelligence agencies and State, local, Tribal, and private-
        sector partners. ITACG ensures that shared information is both 
        timely, relevant, and transformed into situational awareness 
        products for public safety officials--including police officers 
        and firefighters--enhancing their capabilities to quickly 
        assess and effectively respond to suspected terrorist 
        activities.
   NCTC expedites the dissemination of information at 
        unclassified levels to support DHS and FBI efforts to inform 
        law enforcement and local officials of potential dangers to 
        include near-real-time export of watch-list data to the FBI's 
        Terrorist Screening Center.
   NCTC provides threat information to DHS regarding 
        individuals who have been identified as overstaying their visas 
        in the United States, and we work regularly with DHS and FBI to 
        provide briefs to Federal, State, and local officials at Fusion 
        Centers regarding counterterrorism matters.
   NCTC ensures the timely dissemination of finished 
        intelligence and situational reporting via the NCTC Online 
        CURRENT--the premier classified website and repository for 
        counterterrorism reporting and analysis. The site is available 
        on JWICS with more than 10,000 monthly users from 45 different 
        organizations and on DHS's Homeland Secure Data Network to 
        certain State and local officials in the Fusion Centers and at 
        FBI-led Joint Terrorism Task Forces (JTTFs).
    Strategic Operational Planning.--NCTC is charged with conducting 
strategic operational planning for counterterrorism activities, 
integrating all instruments of National power, including diplomatic, 
financial, military, intelligence, homeland security, and law 
enforcement activities. In this role, NCTC looks beyond individual 
department and agency missions toward the development of a single, 
unified counterterrorism effort across the Federal Government. NCTC 
develops interagency counterterrorism plans to help translate high-
level strategies and policy direction into coordinated department and 
agency activities to advance the President's objectives.
    These plans address a variety of counterterrorism goals, including 
regional issues, weapons of mass destruction-terrorism, and countering 
violent extremism. The strategic operational planning process 
integrates all phases of the planning cycle--developing a plan, 
monitoring its implementation, and assessing its effectiveness and 
resource allocations--and creates communities of interest to coordinate 
and integrate implementation.
    For example, NCTC is joining with the Department of Homeland 
Security and the Federal Bureau of Investigation to conduct workshops 
across the United States that enable cities to better develop and 
refine their response plans to evolving terrorist threats. These 
``Joint Counterterrorism Awareness Workshops'' increase the ability of 
Federal, State, local, and private-sector partners to respond to a 
threat by discovering gaps in capabilities, planning, training, and 
resources; and identify existing programs or resources that can close 
those gaps. The workshops also provide a venue to share best practices 
at the State and local levels and serve as a basis for identifying 
issues and gaps that may subsequently be addressed Nation-wide.

                          KEY NCTC INITIATIVES

    Facing a dynamic and complex terrorist environment, NCTC is 
changing and adapting to build on the past several years of experience 
to meet these threats and the challenges they present. With lessons 
learned from AQAP's December 2009 failed airline bombing and other 
plots, NCTC has implemented several key initiatives to advance our 
ability to identify and prevent terrorist attacks.
    Pursuit Group.--NCTC created the Pursuit Group to develop tactical 
leads and pursue terrorism threats. The formation of the Pursuit Group 
has provided the counterterrorism community with a group of co-located 
analysts that have unparalleled data access and expertise, enabling the 
Pursuit Group to focus exclusively on information that could lead to 
the discovery of threats aimed against the homeland or U.S. interests 
abroad.
    With teams comprised of personnel from across the intelligence 
community, with access to the broadest range of terrorism information 
available, Pursuit Group analysts are able to identify actionable leads 
that could otherwise remain disconnected or unknown. Pursuit Group 
analysts can ensure that terrorism cases are examined as thoroughly as 
possible by pursuing non-obvious and unresolved connections, 
identifying unknown, known, or suspected terrorists, and focusing on 
seemingly unimportant details that could yield relevant information. 
The Pursuit Group provides investigative leads, collection 
requirements, and potential source candidates to operational elements 
like the FBI, CIA, or DHS for intelligence purposes or action.
    Watch-listing and TIDE Enhancements.--NCTC has adopted important 
reforms in the watch-listing process and has improved NCTC's receipt, 
processing, and quality of information sharing in support of the 
Center's watch-listing and screening responsibilities. One of the key 
gaps we identified in the watch-listing process was the need to enhance 
existing TIDE records with additional information. NCTC is now taking a 
more aggressive and innovative approach to seek methodologies and data 
repositories to ingest biographic, biometric, and derogatory 
information. As the threat continues to evolve, our watch-listing 
experts are proactively working with NCTC's Pursuit Group and the 
counterterrorism community to expedite the sharing of information to 
build more complete terrorist identities. We have also enhanced our 
ability to store, compare, match, and export biometrics such as 
fingerprint, facial images, and iris scans.
    The community watch-listing guidance was revised in 2010 to provide 
flexibility to push forward information that previously had not met the 
requirements. Nevertheless, nominations of U.S. persons to a watch list 
must still be supported by ``reasonable suspicion'' that the person is 
a ``known or suspected terrorist,'' and a person cannot be watch listed 
based solely upon a First Amendment-protected activity, or based solely 
upon race, ethnicity, or religious affiliation.
    Information Sharing.--NCTC is promoting information integration and 
sharing across the counterterrorism community with the development of 
the Counterterrorism Data Layer (CTDL). The CTDL provides users a 
single access point to millions of pieces of Government 
counterterrorism-related data gathered from multiple data sets. Prior 
to December 2009 analysts were required to manually search multiple 
networks and integrate information. Now, NCTC's CTDL is being developed 
to ingest relevant data and to allow NCTC analysts to identify, search, 
exploit, and correlate terrorism information in a single environment.
    Thanks to the support of our key counterterrorism partners, 
including DHS and the FBI, NCTC is acquiring priority data sets for 
ingestion. For the first time, NCTC analysts can search across key 
homeland security and intelligence information and get back a single 
list of relevant results. Moreover, sophisticated analytical tools are 
in place to permit analysts to conduct analytic searches, conduct link 
analysis and data visualization, and triage information.
    Finally, we are committed to handling data in a manner that retains 
the trust of the American people and remains true to the oaths we have 
taken to support and defend the Constitution. Specifically, we protect 
information relating to United States persons through procedures 
approved by the Attorney General under Executive Order 12333, and we 
adhere to the requirements of the Privacy Act. Compliance with these 
protections is reviewed at several levels--including NCTC's Civil 
Liberties and Privacy Officer, ODNI's Office of General Counsel, ODNI's 
Civil Liberties and Privacy Office, and the Intelligence Community 
Office of Inspector General.
    NCTC Domestic Representatives.--NCTC has developed a domestic 
representative cadre, deploying officers to serve as counterterrorism 
liaison representatives in seven cities around the country. These 
officers are embedded with FBI joint terrorism task forces and with 
fusion centers where they bring the National counterterrorism 
intelligence picture to regional Federal, State, and local officials. 
The NCTC representatives engage with counterterrorism partners, at all 
levels, and provide analytic insights drawn from the full catalogue of 
counterterrorism intelligence collection. Based on the positive 
feedback we have received about this program, we are sending 
representatives to two additional cities and will be aligned with the 
DNI domestic representative program to provide Nation-wide coverage.
    Countering Violent Extremism.--As our understanding of the threat 
evolves, so too must our approach to defeating it. Over the past 10 
years, the Government has expanded its counterterrorism efforts to 
include a focus on preventing al-Qaeda and its adherents from 
recruiting and radicalizing to violence the next generation of 
terrorists. We recognize that al-Qaeda's recruitment is not constrained 
by geographical boundaries, which is why we are working closely with 
U.S. Government partners both overseas and at home. We also recognize 
that communities are best placed to identify and prevent recruitment 
efforts.
    Therefore, working side by side with FBI, DHS, DOJ, State, and DoD, 
we are building whole-of-Government approaches focusing on expanding 
Government and community understanding of all forms of violent 
extremism, including al-Qaeda-inspired radicalization to violence. 
Domestically, in partnership with DHS and FBI, NCTC developed a 
``Community Awareness Briefing'' to inform members of American 
communities about the threat of terrorist recruitment and to facilitate 
discussions with those communities about their role in to catalyzing 
efforts to counter the al-Qaeda narrative. NCTC is working with 
Federal, State, and local partners to broadly disseminate the briefing 
to communities around the country. Internationally, NCTC works with our 
colleagues at the State Department to support CVE work in embassies 
across Europe, North Africa, and South Asia.
    NCTC continually examines al-Qaeda-inspired violent radicalization 
in order to understand and track this dynamic threat. NCTC's 
Directorate of Intelligence published the Radicalization Dynamics 
Primer, which includes a new framework that conceptualizes the process 
of radicalization, mobilization, and engagement in violent action for 
al-Qaeda-inspired individuals. The Primer was coordinated throughout 
the intelligence community, and is intended as a reference guide for 
U.S. policymakers, law enforcement officers, and analysts--including 
civilian and military personnel--who assess or take action on 
radicalization to violence trends in their areas of responsibility. 
NCTC, in collaboration with FBI and DHS, also developed a training 
curriculum to enable law enforcement and Government agencies to more 
effectively identify, counter, and report on violent extremists in the 
homeland. Several hundred Federal, State, local government, and law 
enforcement representatives across the country have received the 
training and given it positive reviews.
    Support to the London Olympics.--NCTC, in coordination with the 
U.S. intelligence community, is leading the effort to coordinate U.S. 
intelligence integration as we approach 2012 Olympic Games in London. 
The Olympics present a potential target for terrorists and other 
disruptive groups. We are working closely with our British counterparts 
to ensure that we are collecting, analyzing, and sharing all potential 
threat information relating to the Olympics and that we are in a 
position to respond quickly to prevent any possible plotting tied to 
the Games. In particular, NCTC, with our intelligence community 
partners, established a Threat Integration Center, designed to operate 
around the clock providing real-time situational awareness and threat 
analysis.
    Chairman King, Ranking Member Thompson, and Members of the 
committee, thank you for the opportunity to testify before you this 
morning.
    The talented men and women who work at NCTC perform a unique and 
vital service to the Nation, and we benefit from the integration of 
analysts and planners from across the intelligence community, the U.S. 
military, and other Federal, State, and local partners. As NCTC 
bolsters its efforts to meet the challenges ahead, our progress is 
dependent on our diverse and dedicated workforce. Maintaining this 
diversity through continued commitment from intelligence agencies and 
other organizations is a priority for the Center.
    The men and women I am privileged to represent appreciate the 
intelligence committee's bipartisan interest and support as they work 
around the clock to identify and disrupt potential terrorist threats. 
And while perfection is no more possible in counterterrorism than it is 
in any other endeavor, NCTC, in partnership with DHS and the rest of 
the counterterrorism community, continues to work day and night to 
reduce the likelihood of a successful attack.
    Thank you for your continued support of our mission, and I would be 
happy to answer any questions the Members of the committee may have.

    Chairman King. Thank you, Director Olsen. I understand you 
are accompanied today by one of your main advisers, Nate Olsen, 
who is sitting here in the front row. I want to welcome him, 
your son, to the hearing.
    Mr. Olsen. That is right. Thank you very much.
    Chairman King. Thank you.
    Secretary Napolitano, I would like to discuss the whole 
issue of Hani Nour Eldin, who is the Egyptian member of the 
Islamic Group who was here in the country, and what this 
portends for the future, as we go forward, with representatives 
coming from the Middle East.
    My understanding of the Immigration and Nationality Act is 
anyone who belongs to a designated foreign terrorist 
organization, before receiving a visa, must apply and receive a 
waiver from the Secretary of State and the Secretary of 
Homeland Security. I know we have seen a number of them--for 
instance, you and Secretary Clinton signed one for a member of 
the Iraqi National Congress, and this has been the procedure, I 
guess, since 1996, 1997. If you are designated FTO--if you 
belong to it, you cannot come into the country without getting 
a waiver.
    Now, my understanding is that Eldin, who is an elected 
official in Egypt, was a part of a delegation that came to 
Washington, went to the White House, went to the National 
Security Council, and also met with Members of Congress. He is 
a member--according to his own Facebook page--of the Islamic 
Group, which is a designated foreign terrorist organization. 
Yet he was given a visa, never applied for a waiver. No waiver 
was given. When he arrived at Kennedy airport, he did not go 
through any secondary inspection.
    He was at the White House, he asked for the release of the 
Blind Sheikh, I understand; met with Members of Congress, who 
were never told he is a member of a designated foreign 
terrorist organization.
    Now, the reason I ask this question, it appears as if the 
law was not complied with, in that he did not apply for a 
waiver. Congress was not notified, which was also required, 
that whenever a waiver is given, Congress has to be notified 
that one of these individuals is in the country.
    My understanding, also--and I take only information that 
was provided by your Department in a letter to me--but the 
reason that said that no waiver was required is because there 
was no derogatory information found. Yet his own Facebook page 
says he belonged to a terrorist organization.
    The concern I have is, this individual case is one thing. 
But as we see the results of the Arab Spring, whether it is 
Egypt, whether it is Libya, hopefully Syria, and other 
countries in the Middle East, we are going to have people 
coming to this country or attempting to come to this country 
who may have had involvement in the past, peripheral or real, 
with various terrorist organizations.
    The administration, whether it is this administration or 
another administration, may feel that some of these people can 
be dealt with, can be worked with, but if that is to be done, 
to me, it would seem to me, it would have to be an open 
process--a transparent process where Congress and the people 
would know who was being let into this country, what were the 
factors that went in to giving this person a waiver, and also 
at what level that decision is made.
    I mean, we went through the situation in the 1940s where 
people in the State Department said that Mao was an agrarian 
reformer; or the 1950s, that Castro was a Jeffersonian 
Democrat. So you can have people making bad decisions.
    My question to you is: Who in the State Department, who in 
the Department of Homeland Security would initiate allowing 
someone from one of these organizations into the country? For 
instance--and even if they are not designated as an FTO, as a 
foreign terrorist organization, you could have the Muslim 
Brotherhood, without going into details, which may be 
considered one way in Egypt but another way in Syria, and 
members of it may have different types of relationships with 
the organization.
    Who is going to be making those decisions? Who is going to 
give the waiver? Is Congress going to be informed so we will 
know who is being allowed into the country and who is not and 
why a waiver is being issued?
    Again, I say in this case, with all respect, it does not 
appear that either letter or the spirit of the law was complied 
with, with Eldin, who was a self-proclaimed member of a 
designated foreign terrorist organization.
    Secretary Napolitano. Thank you, Mr. Chairman. I think a 
couple of things. One is, I think you are right in pointing out 
that, as we move forward, we are going to continue to have 
visitors to this country that the State Department and others 
feel are useful to bring to the country, to have discussions 
moving forward, who in the past--or who say they are members of 
a political party that in the past has been so designated.
    In the particular case you refer to, this was a State 
Department-selected group. It originated there. He was vetted 
before he got a visa against all known terrorists and other 
databases for derogatory information. None was found.
    As he entered the United States, we, too, vetted him 
against all of our holdings, including terrorists and 
information from a variety of sources. No derogatory was found.
    Before he entered the White House, he was vetted a third 
time by the Secret Service. No derogatory information was 
found. So then we can have some confidence that this was not a 
security breach in that sense.
    With respect to notification to Congress about this, that 
is something I will have to look into. I don't know what the 
status of that was.
    Within our organization, when we get a visitor like that--
and we have had some in the past--it is usually a combination 
of our counterterrorism group and CIS that reviews the 
information, and then oftentimes--not oftentimes, but 
occasionally, it will actually come up to the Secretary.
    Chairman King. But with all this vetting, the fact is, on 
his own Facebook page, he said was a member of the Islamic 
Group, which is a designated foreign terrorist organization. 
Now, how did that escape the entire vetting process?
    Secretary Napolitano. Again, Mr. Chairman, I think we have 
to add more nuance to that. We have to know, you know, what the 
group was. Is it now a political party that is running the 
government of a country that has strong ties with the United 
States? If that is so, what is the actual derog information? 
What was the content of the relationship, the substance of the 
relationship?
    In the particular instance you raise, I think everyone who 
looked at this individual felt confident that he was not a 
security risk to the White House or to the United States.
    Chairman King. But I think you are proving my point. That 
was a policy decision. It may or may not have been right. I am 
not even quibbling with the policy decision. I am saying, under 
the law, if he belonged to a foreign terrorist organization, a 
formal process had to be gone through, reasons given why the 
waiver was going to be granted, and then Congress notified of 
it. That is the concern I have.
    If he was able--even though he had it on his own Facebook 
page, that he belonged to a foreign terrorist organization, we 
could have hundreds of people in the situation over the next 
several years coming in who may not all brag on their Facebook 
page that they are a member of a foreign terrorist 
organization.
    So it raises serious questions to me, really, as to then 
how effective the vetting process is. Or if a policy decision 
was made, and it was made without Congress intending to be 
notified, because under--again, if he had applied for a waiver, 
and it had been granted, you would have had to notify Congress. 
So Congress was left out of it. He was allowed in without a 
waiver. I have a real concern.
    Director Olsen, do you want to--
    Secretary Napolitano. Well, if I might, Mr. Chairman, if I 
might give you--separate it into substance and process. On the 
substance, there was no derogatory information. He was vetted 
multiple times by multiple departments. But on the process, 
that is a fair point to make.
    Chairman King. Okay. I would say that it is a significant 
point here, because I made it, but a significant point because, 
again, if a person belongs to an organization and he is allowed 
in without applying for the waiver, it is bad enough it 
happened in this instance, but we could be faced with this 
situation many times over the next several years, especially 
involving, for instance, Libya, Syria, hopefully sometime, 
Egypt is going to be a work in progress.
    So I would really ask that that be looked into. I hope the 
decision is not being made at a policy level with the intention 
of keeping Congress excluded, which, again, on the face of it, 
appears to have happened here.
    Also, in closing, in the letter I sent to the Department, I 
understand that Eldin at the White House asked if the Blind 
Sheikh could be released. He was told the answer is no. But 
when I asked, what is the position of the Department of 
Homeland Security regarding any potential transfer or release 
of Omar Abdel-Rahman, the Blind Sheikh who was the architect of 
the first World Trade Center attack, quite frankly, your 
Department didn't answer it. They said he is in the custody of 
the Justice Department.
    Well, the fact is, if he is going to be released, Homeland 
Security has a real role to play in that. I mean, the Justice 
Department and the Department of Homeland Security--and, again, 
it appears as you are not answering--the Department is not 
answering the question about whether or not there is any 
intention at any time to release the Blind Sheikh.
    Secretary Napolitano. Well, let me just say this. I know of 
no such intention.
    Chairman King. Okay.
    The gentleman from Mississippi.
    Mr. Thompson. Thank you very much, Mr. Chairman. Madam 
Secretary, in a hearing in one of our subcommittees last week, 
we were told that American citizens can be trained to fly 
planes and not be vetted against a no-fly list. We were told 
that foreigners are vetted through a robust process that would 
only start once they are cleared.
    The question was whether or not a process could be put 
where anyone before they are admitted to a flight school would 
be vetted. Testimony from the Department at that time was it 
couldn't be done. Have you looked at that since that testimony 
was presented to this committee?
    Secretary Napolitano. I have.
    Mr. Thompson. What is your position on it?
    Secretary Napolitano. Well, the answer is, yes, there is a 
distinction between U.S. citizens and foreign persons who are 
seeking to get flight training. With respect to U.S. citizens 
who may be on one of our watch lists, there are a variety of 
ways that we can and do keep abreast of their activities. I 
don't want to go into those in an open setting.
    But the law is somewhat unclear as to whether we can vet a 
U.S. citizen prior to their application for certification from 
the FAA. So the Department historically is taking the position 
that we cannot formally vet them--any U.S. citizen before that 
application.
    Mr. Thompson. Well, then I will say that we introduced a 
bill last week to close that gap. Do you support such 
legislation?
    Secretary Napolitano. Absent an opportunity to see the 
exact language, I don't want to say support, but I would say 
the idea behind the bill is something we support, yes.
    Mr. Thompson. But right now, you also admit that that is a 
problem?
    Secretary Napolitano. It can be a gap, but, again, let me 
just say, it is a gap that would be easily filled a number of 
ways. Those for whom we actually have watch list information, 
there is a variety of ways we receive information about 
possible flight school training. But it would be nice to tidy 
up the law a little bit.
    Mr. Thompson. Thank you. Taking on the Chairman's questions 
about intent of Congress, Congress passed a law mandating 100 
percent cargo screening for inbound containers. You indicated 
that it can't be done, but that some other things are being 
done to do that. I think the question for some of us is that 
this was an act Congress said the Department should do.
    I would like to hear where we are on a percentage of 
screening of containers based on whatever system you are using 
at this point. Are we 20 percent, 30 percent? Where are we 
along the goal toward 100 percent?
    Secretary Napolitano. Well, we have looked at containers 
from different angles, as you know, and as we have discussed 
before--high-risk versus low-risk. We have actually done quite 
a bit to form and strengthen the international partnerships and 
the industry partnerships necessary to know and to secure 
containers and freight as it leaves foreign ports, to the 
extent we can. There are a lot of foreign ports, it is just 
physically not available to us to do that.
    With respect to inbound, we have an algorithm and other 
algorithms we use to evaluate high-risk cargo. We do a random 
selection of a small percentage of other containers.
    I would say, Representative Thompson, this is an area that 
I know that the Department and some in the Congress are at odds 
about, but there are a lot of ways to protect the ports of the 
United States and the interior of the United States from 
dangerous cargo. As we keep in mind the 100 percent law, which 
we understand is the law, sometimes those laws are very 
difficult standards to attain, and we have had to move in other 
directions in the near term to make sure that we are doing 
everything we can with respect to cargo.
    Mr. Thompson. So what percentage screening are you at right 
now?
    Secretary Napolitano. I will get you the exact numbers, but 
I would differentiate between high-risk and low-risk cargo, and 
we are very high percentage on the high-risk cargo. Low-risk, 
as I said, is very small.
    Mr. Thompson. So you can't give us a number?
    Secretary Napolitano. No, I can. I can't give you it at 
this precise hearing. That number is available.
    Mr. Thompson. But, Madam Secretary, you know, Congress said 
you shall do it. They didn't say look at it and come back to 
us. What I am saying to you is, if the Department differs, you 
instituted the waiver, but I think you should come back to us 
and say, you asked for 100 percent, we are at 20 percent. But I 
think it is not a good omen that we can't get the numbers.
    Can you provide us with any task orders that have been 
issued by the Department, looking for new technology to get us 
to 100 percent, or anything like that?
    Secretary Napolitano. Representative Thompson, we are happy 
to brief you and your staff again on where exactly we are. All 
that has been done. The numbers are available. I just don't 
have them at my fingertips at this hearing.
    Let me also say, however, that as we move forward--we have 
to recognize Congress also gave the Secretary the power to 
waive that requirement. I think implicit in that is if it is 
not feasible, practicable, affordable; whether it would have 
undue interference with all of the cargo that needs to transit 
into American ports for real-time inventories by the American 
manufacturers of our country. Those are all things taken into 
account. Whether that interference with lawful and legal trade, 
we get enough of a benefit that it makes it worth it. We 
believe that there are other ways currently available to get 
there.
    Mr. Thompson. Well, I am aware of information that you have 
shared from time to time. What I would ask, that if you have 
the current rationale for not doing it, and whatever data 
supporting it, I think some on the committee would be 
interested in seeing it.
    The last question--Mr. Chairman, I appreciate your 
indulgence. Also, can you tell us how much of this cargo that 
Congress said should be screened before it comes to this 
country is actually screened when it gets here?
    Secretary Napolitano. Yes, I can give you those numbers. I 
will be happy to provide those numbers to you.
    Mr. Thompson. So your testimony is that some of this cargo 
is already here before we look at it?
    Secretary Napolitano. It may be. It depends on the source, 
but, again, there are multiple layers that go into examining 
and knowing what is in the containers that are on ships bound 
for the United States. Some of those layers begin before it 
gets to the point of exit. It has to do with trusted shippers. 
It has to do with other initiatives we have, particularly in 
some of the large ports of the world.
    Others have to do with what in particular the Coast Guard 
does before cargo is allowed to enter a port of the United 
States. In between, there is the exchange of a lot of the 
manifest and other information necessary to evaluate whether 
cargo is high- or low-risk.
    So there is a whole system set up--I don't want to leave 
the public or the committee with the idea that not only we are 
not doing 100 percent, we are not doing anything. We are doing 
quite a bit. But the 100 percent as the standard is not yet 
attainable.
    Mr. Thompson. Yield back.
    Chairman King. I recognize the gentleman from California, 
the Chairman of the Subcommittee on Cybersecurity, 
Infrastructure Protection, Security Technologies, Mr. Lungren--
5 minutes.
    Mr. Lungren. I thank the Chairman. I thank both of our 
witnesses.
    I might just say at the beginning that some discussion 
about application of lone wolf. While it would not have 
assisted in the terrible case in Colorado, we did have a debate 
on the floor of the House about whether we should have the 
lone-wolf provisions allowed for the Patriot Act, and we won 
that on the floor. It was consistent with what the 
administration was supporting. So I appreciate the fact that it 
is now recognized as a current and continuing threat to us, 
that is, the operation of a lone wolf.
    Madam Secretary, I want to thank your Department for the 
excellent classified briefing we received on the subcommittee 
yesterday on Domestic Nuclear Detection Office. I think some of 
the questions asked with respect to the last issue were 
addressed there, and I appreciate that. I appreciate the work 
that is being done there. We are going to have a subcommittee 
open hearing on that and other issues with DNDO tomorrow.
    I was very interested in your prepared testimony with 
respect to DHS implementing a curriculum for Federal, State, 
local, and correctional facility law enforcement officers with 
respect to community-oriented policing. In California, for 
instance, we have the post officer standards and training 
commission that establishes the curriculum for all law 
enforcement officers who are allowed to carry weapons, and 
community-oriented policing is a part of that. So I look 
forward to see exactly what your Department has.
    I would be most interested in an elaboration on exactly 
what the indicators of violent extremist activity are that you 
mention or reference in your prepared testimony. The reason I 
ask that is this: In the aftermath of the Fort Hood situation, 
it was very difficult to get some to admit that we had missed a 
whole lot of red flags with respect to Major Hasan. When we had 
a joint hearing asking a representative of the administration 
with DOD about what those indicators or red flags would be and 
how they would have actually been implemented with respect to 
Nidal Hasan, it was difficult to get a response.
    What I am trying to figure out is, if you are preparing a 
curriculum that is to assist local and State law enforcement 
officials as to those signs that hopefully will help us 
identify before violent behavior takes place, what are those 
signs?
    Secretary Napolitano. Well, a couple of things. One is the 
curriculum is based on the community policing idea, with the 
idea that police officers, deputy sheriffs, whatever, are 
normally in the best position to witness something, tactics, 
techniques, other indicators. Without spelling in an 
unclassified setting what all those indicators are, let me just 
say that we have involved local law enforcement, including 
California, in the development of this curriculum.
    Part of it includes taking 62 cases of home-grown terrorism 
or purported terrorism from a variety of ideologies and mapping 
them out as to what happened so we can precisely look at, well, 
what were some of the things that--early warning signs, early 
tripwires, things that should have alerted law enforcement. It 
can be as simple as communication with known terrorists that 
becomes available, all the way to unusual purchases of guns and 
unusual purchases of explosives, explosive materiel.
    Mr. Lungren. How do you distinguish between the area of 
protected Constitutional speech versus that which is an 
indicator of potential violent acts? What I mean is, in Major 
Hasan's case, we have evidence of the fact that at a setting in 
which he was supposed to lecture on a medical issue; instead, 
he went into a rant about the justification for radical 
Islamists attacking those in the West. Yet that was not 
reported. That was not acted upon. I would consider that an 
indicator.
    Is that such an indicator in the curriculum that you are 
presenting to law enforcement, including my State of 
California?
    Secretary Napolitano. Perhaps. I don't want to get into 
Hasan, the FBI, DOD issues there. I think Judge Webster has 
issued a report on that now.
    But all of these things taken together--so when you 
actually look at the Department's efforts on CVE, countering 
violent extremism, they actually are a number of things. No. 1 
is, we need to get a better understanding of the roots of 
violent extremism. What is it that is going on in society that 
leads to the creation of a violent extremist? Can we get at 
some of those root causes?
    No. 2, how do we partner with nongovernmental agencies, 
NGOs, other groups that may come into contact with someone who 
is moving from your espousal of beliefs to actually becoming 
pre-operational and operational?
    Then No. 3 is, how do we better train our local law 
enforcement to be aware of tactics and indicators? I think one 
of the best ways we can do that is to provide case studies and 
analysis either from events that happened within the United 
States or like Merah that happen in other countries.
    Chairman King. The time of the gentleman is--Director 
Olsen, you want to----
    Mr. Olsen. Yes, if I could just add a couple of points. 
DHS, under Secretary Napolitano's leadership, is taking the 
lead on this, along with FBI and Department of Justice and us 
at NCTC.
    One way that we contribute to this effort is analytically. 
We have a group of analysts that look at the question of 
radicalization. We have generated a number of analytic products 
to help understand exactly what you are talking about, 
Congressman, in terms of the pathway from radicalization to 
mobilization to violence, helping to explain what those 
identifiers are so that we can then use that in training to 
sensitize local law enforcement and first responders to 
recognize those signs, and then to take action when somebody is 
on that path. We can stop that person before they do take 
action.
    Mr. Lungren. I appreciate that. I am just very concerned 
about this. I mean, Tony Blair said just 2 days ago that the 
West is asleep on this issue--that even he underestimated the 
power of the narrative of the violent Islamists.
    Chairman King. The time of the gentleman is expired.
    Mr. Lungren. It is a powerful statement, and I just hope 
that we have learned from our----
    Chairman King. The gentle lady from Texas, Ms. Jackson Lee, 
is recognized for 5 minutes.
    Ms. Jackson Lee. I thank the Chairman and the Ranking 
Member for this hearing and acknowledge the witnesses and thank 
them for their presence this morning. Good morning.
    First, let me acknowledge the passing and funeral of 
Inspector Phillip Prater, who was assigned to the Houston 
division of the Federal Protective Service. His on-going 
service indicated the stellar record of service, and I am 
grateful that Director Patterson was able to attend, Madam 
Secretary. I hope we will have a dialogue over the next couple 
of days.
    Let me thank you for your letter of sympathy to the family. 
I would just like to put on the record, there is a need for a 
more responsive H.R., human resources. If you could look into 
that, I would appreciate it, in terms of working with the 
family.
    Let me ask a question that--if the Homeland Security 
Department was operable in 1993--I think it was--1993, 1994--in 
the action of the Oklahoma bombing----
    Secretary Napolitano. Nineteen ninety-five.
    Ms. Jackson Lee [continuing]. Nineteen ninety-five. Thank 
you. Would that have been considered domestic terrorism and 
under the Homeland Security Department?
    Secretary Napolitano. Yes, I actually worked on that case. 
I would say, Representative, that, yes, that had all the 
hallmarks of domestic terrorism.
    Ms. Jackson Lee. Do we as a Department--your Department, 
our opportunity in review--concern ourselves with domestic 
terrorism, meaning actions that may be driven by American 
citizens?
    Secretary Napolitano. Yes, Representative. As I testified, 
I think Matt testified, we look at terrorism from abroad and 
from within. It can be Islamist. It can be motivated by other 
ideologies, but yes.
    Ms. Jackson Lee. So would a situation that would have wired 
and set booby traps and others in a residential dwelling, that 
has now left dwellers outside of their home for a period of 
time, and if it had been triggered, could have caused massive 
loss of life, would that warrant homeland security involvement? 
Does a local jurisdiction have to call you for that?
    Secretary Napolitano. Well, the Aurora tragedy--and a true 
tragedy--is under investigation. I don't want to get too much 
into the comment on that, because there is a lot we still don't 
know. But I would say that, with respect to the response--and 
the local police, by the way, if I might make this point--one 
of the things we have been doing is doing a lot of training 
around the country on how to respond to different types of 
terrorist potential attacks.
    One of the scenarios we have been training across the 
country for is something along the lines of a Mumbai-style 
attack, where you have multiple shooters, organized. We had 
actually coincidentally----
    Ms. Jackson Lee. Right. I have another----
    Secretary Napolitano [continuing]. Just done that training 
in Colorado.
    Ms. Jackson Lee. I have another question, so if you can--go 
ahead. Finish.
    Secretary Napolitano. Yes. The Aurora police were there, 
and their response last week is to be commended. But with 
respect to, is there a Federal process and so forth in an 
investigation of an incident of that type? Yes.
    Ms. Jackson Lee. Let me express my sympathy to those and 
applaud for those law enforcement first responders. Of course, 
this was a very difficult time. I would encourage that Homeland 
Security be present, because I do believe there are issues of 
domestic terrorism.
    Let me move quickly to another issue on--five Members of 
Congress attacked a staff person in the State Department on the 
grounds of being associated with the Muslim Brotherhood--the 
mother, father, and brother. I do not want to call that staff 
person's name. I know that staff person as an outstanding 
American. But they sent a letter to the State Department 
inspector general.
    My question is, broadly, their letter suggests that there 
are Muslim Brotherhood operatives in the United States 
Government. To me, that is a Homeland Security issue. My 
question to you, barring classified information, and if we have 
to have a classified response at a later time, are you engaged, 
or have you been notified, or are you investigating the idea of 
present staff being associated with the Muslim Brotherhood in 
the United States of America?
    They cited the Tariq Ramadan decision, where there was 
civilization jihad. They cited de facto U.S. recognition of 
some entities. Where is Homeland Security in this? This is our 
jurisdiction, if that is a truthful accusation.
    Secretary Napolitano. We have looked into this. The FBI has 
looked into this. We have found no credible evidence that such 
activity is going on.
    Ms. Jackson Lee. Could you repeat that again, Madam 
Secretary? Maybe we have not heard you clearly.
    Secretary Napolitano. We have looked into it. The FBI 
looked into it. We have found no credible evidence that such 
infiltration is going on.
    Ms. Jackson Lee. The FBI, being the component that would 
have an intelligent component, would it be necessary for the 
CIA, which we look internationally with their work, but the FBI 
would have used their intelligence resources? Is that what you 
are suggesting in their investigation?
    Secretary Napolitano. I would assume so, yes. I don't know 
precisely who they use, but that is what would be my 
assumption.
    Ms. Jackson Lee. Both the U.S. Department of Homeland 
Security and the FBI have found no evidence of this?
    Secretary Napolitano. That is correct.
    Ms. Jackson Lee. I thank the Chairman.
    Chairman King. The time of the gentle lady is expired.
    The gentleman from Texas, Mr. McCaul.
    Mr. McCaul. Thank you, Mr. Chairman.
    I want to thank the witnesses. First, Madam Secretary, let 
me compliment you on your recent attention to the Caribbean. We 
chaired an oversight hearing on the Caribbean being the third 
border. I know that I got reports back from Governor Fortuno 
and Representative Pierluisi that you did a great job going 
over there. I certainly appreciate that.
    I also chaired a hearing just recently on the use of 
drones. Now, as you know, Congressman Cuellar and I have been 
strong advocates for the use of DHS drones down on the border. 
There is another issue with respect to drones being used 
throughout the United States in the interior.
    I bring this up because the GAO 4 years ago said that the 
TSA, under DHS, had a role to play with respect to security 
assessments and a National policy. Then less than a year ago, 
we had a man who attempted to use this drone, but was thwarted 
by the FBI, in an attempt to blow up the Pentagon and the 
United States Capitol.
    I have to tell you, I was surprised at the response from 
your Department was that you had no role with respect to these 
drones and that you were not going to send witnesses to testify 
at that hearing. So I just want to register my disappointment.
    I personally think that DHS does have a role. In fact, 
every Member sitting on the subcommittee, both Republican and 
Democrat, agreed with that assessment. In fact, the witnesses--
I mean, it is rare that you have a privacy expert and a law 
enforcement expert agreeing on the same issue, and that was 
that DHS has a role through the Office of Privacy and also 
through Science and Technology and other departments within DHS 
to deal with this issue.
    Can you explain to me why this is not given any attention?
    [The information follows:]

    
    
    Secretary Napolitano. Well, I think--and I can't speak to 
exactly how the role was expressed last week, but here is what 
is going on. Yes, you are right. Yes, you are right. We use the 
drones on the border extensively. With respect to the 
regulation of drone use in the interior of the United States, 
which is a relatively new phenomenon--and I think this was the 
focus of the committee--the regulatory authority is with the 
FAA, in part because it is an air traffic control issue. But we 
are working and will be working with the FAA to make sure that 
Homeland Security equities are protected.
    With respect to science and technology, that directorate, 
we do have a funded project--I think it is in California--
looking at drones that could be utilized to give us situational 
awareness in a large public safety or disaster such as a forest 
fire and how they could give us better information----
    Mr. McCaul. Excuse me. My time is limited, but I appreciate 
that comment. I hope that you--you know, the Ranking Member is 
prepared to offer legislation with me. I would prefer to see 
this happen administratively by either Executive Order or 
within your Department, to coordinate with the Justice 
Department and the FAA. I do think FAA controls the safety of 
the airwaves, but doesn't really focus on security, per se. I 
think that is an appropriate role for the Department.
    Director Olsen, Fort Hood occurred not too far from my 
district. I went to the memorial service. The Webster report 
just recently came out. Well, since the tragic incident, it has 
been downplayed. First, it was a workplace violence incident. 
Senior intelligence officials, including your predecessor, 
downplayed the e-mail exchanges between Mr. Hasan and Awlaki, 
which always concerned me.
    Since then, we have found out that the San Diego Joint 
Terrorism Task Force pleaded with the Washington field office 
to respond to this, as they saw it--threat. The WFO responded 
that he is doing research; we can't investigate everybody 
looking at websites; and in one documentation, that this was a 
politically sensitive issue. I think that failure to contact 
the DOD resulted in the deaths of 13 soldiers, and next to 9/
11, the biggest terrorist attack on American soil.
    Real briefly, one of these e-mails particularly, literally 
outlines exactly what Major Hasan did. It is the one on May 27, 
2009. At the end of it, he says, ``So I would assume that 
suicide bombers whose aim is to kill enemy soldiers or their 
helpers, but also kill innocents in the process, is 
acceptable.''
    I mean, there is a huge red flag in this e-mail. You know, 
as a former DOJ prosecutor, working with JTTFs, I can't 
imagine--I can see San Diego's concern, and I can't imagine why 
WFO did not give that greater attention. Do you have any 
response?
    Mr. Olsen. I can say, Congressman, you know, obviously, the 
Webster report, an extensive study of exactly how--focused on 
the FBI, how the FBI responded. I know that the director of the 
FBI has indicated that a number of the recommendations from the 
Webster report are being implemented, in terms of changes to 
information sharing, technology, and policies.
    I mean, I can say, at a personal level, also as a former 
prosecutor, at NCTC, the Fort Hood shooting, along with the 
2009 Abdulmutallab attempted attack, are sort of seminal events 
for us, as far as trying to learn what we can from those 
lessons. I mean, those are hard-learned lessons. But we need to 
continue to be vigilant to do better at spotting those types of 
indicators and sharing that information appropriately.
    Mr. McCaul. Oh, I would sure hope so, when you get a major 
on a major base in the United States talking to a No. 2 
terrorist in the world, and that is not transmitted to the 
general and the commanding officer in charge of Fort Hood? I 
think that is absolutely unacceptable.
    In particular, after reading these e-mails, I feel misled 
that senior intelligence officials misled the Congress by 
downplaying the extent and the importance and significance of 
these e-mails. I see my time has expired.
    Chairman King. The time of the gentleman has expired.
    The gentlelady from--Mr. Cuellar is not here--the 
gentlelady from California, Ms. Richardson, is recognized for 5 
minutes.
    Ms. Richardson. [Off mike.]
    Chairman King. Ms. Richardson, it is not working. It is 
probably not being picked up. Maybe Ms. Clarke can let you----
    Ms. Richardson. Will you give me a little more time?
    Chairman King. You have got it. Start over. Oh, that is a 
new one.
    Ms. Clarke of New York. Try this.
    Ms. Richardson. Okay. All right.
    Chairman King. You can start the clock over.
    Ms. Richardson. Thank you, sir.
    Madam Secretary, as I was explaining, my role here on the 
committee and also having where I live--Congressman Rohrabacher 
actually represents the port of both Los Angeles and Long 
Beach. However, throughout my whole district is all the traffic 
and the impacts of the port and that part that we both benefit 
and we also have challenges.
    My question to you is as follows, and I want to build upon 
the questions of Ranking Member Thompson: When you submit the 
information that you promised for the record, would you also be 
willing to include in that--and it may require a briefing or a 
classified briefing to this committee--what do you view as the 
continuing vulnerabilities within our Nation's ports? What 
resources might you need to be able to address these gaps in 
the security of our ports? Because we would like to assist you 
with that.
    No. 3, what is being done to look at specifically the small 
vessel threats that are now becoming of great concern to us, as 
well?
    I should let you know that, for the record, I did submit a 
letter to the GAO, and I believe it was provided to you, as 
well, at the time back on May 7, 2012. So I just wanted to, 
one, give you an opportunity to respond to your willingness to 
provide us that information.
    Secretary Napolitano. We are always willing, 
Representative, to work with you on issues of the ports. They 
are obviously a critical infrastructure for the country. We 
work with a variety of partners on them. They are complicated 
entities, particularly large ports like Los Angeles, but, yes, 
we would be happy to work with you.
    Ms. Richardson. And supply the information, too?
    Secretary Napolitano. Yes. It may have to be--some of it 
will undoubtedly be classified, but yes.
    Ms. Richardson. Yes, madam. Thank you.
    Also, being a part of the Emergency Communications and 
Preparedness Committee, we recently had an update regarding the 
reforms that have been done due to the grant program. I want to 
commend you and your staff for establishing transparency with 
those who utilize those programs within State and local 
government and getting their thoughts.
    I would like to, though, ask you, what do you expect to do 
in terms of continuing to address how we can make sure that 
those funds are, in fact, risk-based, versus by traditional 
formula? Specifically, I am referencing the minimum requirement 
amount that I believe is in statute that allows, for example, 
well over $2 million, I think, to various cities that certainly 
don't rise to the risk that we see in others.
    Secretary Napolitano. Well, I think as the Chairman noted 
in his opening remarks, we have moved more and more to a risk-
based approach to a lot of things, I mean, from how TSA looks 
at the traveling public to how we deal with containers, to how 
we award grant monies. There is a little bit of a policy issue, 
I think, for the Congress to consider; which is to say, at a 
certain amount, you know, risk evaluation is not perfect. It is 
somewhat of an art, not a science, and spreading some of the 
monies around might make sense.
    But on the other hand, where we have high-risk areas and 
known risk areas, we need to be sure to address those.
    Ms. Richardson. Okay. Would you be willing, though, to 
consider working with this committee to establish those policy 
changes that would give you the ability to ensure that more of 
those funds are, in fact, risk-based, especially given the 
tremendous reduction that your Department has, unfortunately, 
suffered?
    Secretary Napolitano. Yes, absolutely. In our fiscal year 
2013 budget request, we proposed that the Congress take up all 
of our grants and look at merging them, reconfiguring them in 
such a way as to maximize our ability to use risk-based 
criteria. So we have that proposal before the Congress, and we 
will be happy to provide you with a copy.
    Ms. Richardson. Okay. My other question is, in your 
response regarding the ports, one of the things that you 
mentioned of the difficulties of implementing 100 percent cargo 
inspection is potentially the cost and the international 
relationships.
    Could you describe to the committee what you are doing in 
conjunction with the trade ambassador to establish these 
agreements so that we could go forward and have a more 
stringent system, similar to what we have internationally with 
passengers?
    Secretary Napolitano. Well, I have not personally dealt 
with the trade ambassador, the trade representative on this. I 
know our staffs have had discussions. We also have had 
discussions simply port to port, not with respect to the trade 
representative, but with respect to the actual shippers, 
consigners, and forwarders, and the like. So there has been a 
broad variety of approaches to this issue.
    Ms. Richardson. Would you consider meeting with the trade 
ambassador? Because when we had the trade agreements that came 
before this Congress, four of them, I asked the trade 
ambassador specifically, had he worked with you to establish 
these agreements, so at least for those going forward, we could 
eliminate this problem? The answer was no.
    Secretary Napolitano. Always happy to work with the trade 
rep.
    Ms. Richardson. Okay, thank you.
    Mr. Chairman, would you allow me to ask one question to Mr. 
Olsen?
    Chairman King. Yes, if we can just try to keep it within 
30--because Director Olsen has to leave about 12:30, so, yes, 
go ahead and ask him.
    Ms. Richardson. Thank you, sir.
    Mr. Olsen, I am sure that you are aware that in this 
committee, there are many discussions about terrorism 
intelligence. Could you share with this committee what you 
would view would be the percentage of intelligence that you 
receive that implies that the terrorism that this country is 
facing is based upon those being directed by their Islamic 
faith?
    Mr. Olsen. A percentage that is directed by--you know----
    Ms. Richardson [continuing]. That is motivated by----
    Mr. Olsen [continuing]. I think the way to answer that 
question is, in terms of our work, certainly a substantial 
majority of our work focuses on al-Qaeda and its affiliates. So 
certainly, a substantial majority of NCTC's focus, which is 
international terrorism, focuses on al-Qaeda and the al-Qaeda 
ideology.
    Chairman King. The time of the gentlelady is----
    Ms. Richardson. But do you--could I just ask a follow-up 
question, sir? You are very kind.
    Chairman King. Oh, I know that. It is part of my 
personality.
    [Laughter.]
    Also, you do bring out the best in me.
    Ms. Richardson. Oh, you just might get a hug, sir.
    Just a follow-up question. But would you view that that al-
Qaeda direction is directed and motivated strictly by the 
Islamic faith? Or is it based upon the perspectives of the work 
that they do?
    For the record, I will submit other questions specifically 
to this for the record, if you could----
    Mr. Olsen. It is certainly much broader than just faith, so 
it is a particular brand of ideology that is associated 
specifically with al-Qaeda and its ideology.
    Ms. Richardson. Okay.
    Thank you, sir.
    Chairman King. Okay. The time of the gentle lady has 
expired.
    The gentleman from Georgia, Dr. Broun, is recognized for 5 
minutes.
    Mr. Broun. Thank you, Mr. Chairman.
    Madam Secretary, right after the Fort Hood massacre, 
members of your Department came here and talked about an 
alleged attack after 13 soldiers were killed and many were 
injured. I stated at that time that political correctness was 
going to kill people. I think it did in that case. The more we 
have learned about that particular incident, the more there 
were gaps in communications between your Department and the FBI 
and other entities, as Mr. McCaul has brought up, and my friend 
from California, Mr. Lungren has brought up.
    It is certainly something that just really concerns me. I 
think the blood of those dead soldiers falls on the head of 
members of this Executive branch because they did not do their 
work and because political correctness prevented Major Hasan 
from carrying out the attack that was blatantly obvious to many 
people.
    I hope we change all that, because I think political 
correctness is going to kill more people if we don't stop it. 
But had it existed at the time of the Fort Hood incident, how 
would this new curriculum that you have proposed or described 
in your written testimony have prevented the tragedy from 
happening at Fort Hood?
    Secretary Napolitano. Representative, first the Webster 
report goes into the FBI-DOD issues. To my knowledge, and I 
haven't read the full report, but DHS was not there. But I must 
take exception to the way the question was worded, because the 
men and women I work with, the men and women at the FBI, the 
men and women at NCTC----
    Mr. Broun. Madam, I am asking you about how your 
curriculum----
    Secretary Napolitano [continuing]. They spend 100 percent 
of their time trying to protect the American people----
    Mr. Broun. Madam Secretary, I apologize I just have a short 
time and I have got----
    Secretary Napolitano. Well, you asked a long question with 
a lot of insinuation in it, and I--I don't think it is fair to 
the men and women who work in this area all the time every day.
    Mr. Broun. Well, I asked a question about the new 
curriculum that you have described. Would it have prevented--if 
it had been in place at the time prior to the Fort Hood 
massacre, would it have prevented Major Hasan of carrying out 
that terrorist attack?
    Secretary Napolitano. It is difficult to give you a firm 
yes or no, but I can tell you the curriculum does go into the 
indicators of someone who is moving from extreme ideology to 
operational. We would be happy to provide you a briefing on it.
    Mr. Broun. I would like that. Mr. Lungren, I think, also 
asked for the similar kind of briefing. I would be very 
interested in hearing that.
    Also, how would the curriculum that you have described in 
your testimony prevent home-grown terrorist attacks without 
singling individuals or groups due to their religious or 
political beliefs?
    With that question, I want to remind you that your 
Department--some individuals in your Department have described 
anybody who is military--or a military veteran, a gun owner, a 
Christian conservative, pro-life individual--that is me--as a 
terrorist. How would you prevent me being singled out as a 
terrorist, but then find out people like Major Hasan not being 
a terrorist?
    I don't think I am a terrorist, frankly.
    Secretary Napolitano. Well, I think, Representative, as you 
know, the--the report to which you refer was prepared under the 
prior administration and issued under ours very early on. We 
have since taken corrective measures to make sure these things 
are precisely identified.
    It is something that requires all of us to continue to look 
at what are the root causes of terrorism, what are groups that 
can help us that are outside the Government? As I said before, 
the public at large can have a role under kind of a ``see 
something-say something'' aspect of things.
    So this is a very difficult area. We have to be very 
cognizant of civil rights and civil liberties and privacy 
interests. We are very cognizant of those. But on the other 
hand, we are trying to learn lessons after every incident as to 
what could have been done better. We are not static.
    Mr. Broun. Thank you, madam. My time is about expired and I 
have got a previous engagement. But I just want to say in 
closing that we have got to get past this political 
correctness. We have got to start focusing on those who want to 
harm us. I think it is going to take intelligence gathering, 
boots on the ground to do so, within the Department, as well as 
within the CIA, FBI, as well as the military, to try to prevent 
these kind of attacks.
    Mr. Chairman, I yield back.
    Chairman King. The time of the gentleman has expired.
    The gentleman from Michigan, Mr. Clarke, is recognized for 
5 minutes.
    Mr. Clarke.
    Excuse me, Hansen. I don't think your microphone is working 
either, so maybe----
    Secretary Napolitano. I can hear you, but----
    Chairman King. I don't think it is being picked up, though, 
that is what I am saying.
    Secretary Napolitano. Oh, I am sorry.
    Chairman King. You might want to try the other mike.
    [Laughter.]
    Chairman King. Actually, Hansen, you could use over here--
the one that was just used by Ms. Richardson. I guess that was 
yours. Yes--Ms. Clarke's microphone. We will go from Clarke and 
Clarke.
    Mr. Clarke of Michigan. Thank you, Mr. Chairman.
    Secretary Napolitano, thank you again for recognizing and 
protecting our aviation system as being a key priority in your 
administration. As you are well aware, metro Detroit is a known 
high-risk area. If the underwear bomber had been successful, a 
huge commercial aircraft could have blown up right over 
metropolitan Detroit.
    My concern is this: How to best warn the public about an 
imminent danger like this so they can take cover immediately. I 
feel that one of the most reliable ways to do so would be to 
alert the public through the free local broadcasting media such 
as local TV and radio.
    While many people in Detroit rely on local television, such 
as seniors and also just to mention some economic issues facing 
the region, a lot of people are struggling financially. I mean, 
just this week I have been working with Fannie Mae to help stop 
some evictions of homeowners that are currently in foreclosure.
    Many households, they can't afford cable, but they have 
free local commercial TV broadcasting accessible to them. Many 
folks do have cell phones. The unfortunate issue is that when 
we had our power grid shutdown and we had a blackout in metro 
Detroit, the wireless networks got overloaded and we could not 
communicate with our cell phones.
    That is why I think it is important at least to have access 
to radio broadcasting through cell phones. I will be soon 
asking the Subcommittee on Emergency Communications 
Preparedness and Response to hold a hearing to examine these 
issues on how we can best alert the public by continuing free 
local TV broadcasting and enhance the public's access to radio 
broadcasting.
    If you have any thoughts on how we can best alert the 
public so they can take cover in the event of an attack or 
other emergency by continuing to offer free local TV 
broadcasting and enhance free radio broadcasting, I welcome 
your comments.
    Secretary Napolitano. Yes, and we have done quite a bit of 
work in this area. The plain fact of the matter is you have to 
use multiple media to get your message out quickly. FEMA has 
actually done the most work here. But as you note, cell phones 
go out, but texting may work. Radio, TV, other ways that people 
receive information through. So there has been quite a 
developed project, and quite a lot of work done here.
    Mr. Clarke of Michigan. Well, thank you. I look forward to 
working with FEMA to make sure that our public has access free 
local broadcasting through TV and radio. I will address this 
before the FEMA subcommittee as well.
    Thank you very much.
    Mr. Olsen. Chairman, if I could add one more point in 
response to the Congressman's question----
    Mr. Clarke of Michigan. Sure.
    Mr. Olsen [continuing]. About media. Secretary Napolitano 
referred to training that is being done--DHS, FEMA in the 
lead--in local communities and how to respond to a shooter or 
Mumbai-style attack.
    Part of that training does involve not only the law 
enforcement response to a shooter-type incident, but also is 
there public messaging that must go on in the event of an 
attack, and how that would play out. The actual workshops run 
through an exercise, so that exercise helps build capability in 
those communities. That is something we are working together 
on.
    Mr. Clarke of Michigan. Okay, thank you Mr. Olsen.
    Mr. Chairman, I yield back my time.
    Chairman King. The gentleman yields back.
    The gentlelady from Michigan, the Chairwoman of the Border 
Maritime Security Committee, Mrs. Miller. Mrs. Miller is 
recognized for 5 minutes.
    Mrs. Miller. Thank you, Mr. Chairman. Hopefully, this 
microphone is working.
    Secretary, you have been asked a number of excellent 
questions today about the cargo screening. I would just mention 
that the subcommittee that I am chairing, Border and Maritime, 
have had a number of hearings about this. I think you will find 
at least the testimony that we had from your agency was that 
the percentage of screening right now is in about the 5 
percentile.
    So it is in the one-digit numerals and it has also been 
explained to our subcommittee that the estimated cost of 
compliance of 100 percent would be $15 billion to $20 billion--
rough guesstimate. So actually, the House recently passed a 
piece of legislation I sponsored, the Smart Port Act, which 
really talks about the risk-based assessment, et cetera. But 
that is not my question.
    My question is--I want to talk a little bit--or ask you a 
question about visa overstays. Again, in the subcommittee, some 
of the things that have been rather startling as we think about 
the amount of illegal aliens that are in the country. Everybody 
always thinks that somehow that all of them came across the 
desert.
    You know, the truth is in the 40 percentile of all of the 
illegals that are in the country currently came literally 
through the front door, through visa overstays. We saw that 
with the recent Capitol suicide bomber who had been here on a 
visa overstay for over a decade. Certainly in the case of 9/11, 
at least four of the terrorists and murderers were here on visa 
overstays.
    In regards to the secure communities now, which I am a huge 
supporter of, I am just wondering if you could talk a little 
bit about the criteria for your department for when you 
apprehend, or when you--when you pull over, for instance, a 
visa overstay, that may not be here--somebody that you think is 
a high-level risk, and so we don't deport them because of some 
of the criteria.
    That could have happened even in the case of the 9/11 
hijackers that might have been pulled over for routine traffic 
stop. Maybe had nothing else and then we decided they weren't a 
high-risk priority.
    So I do have some concerns about that, and I wonder if you 
could address that?
    Secretary Napolitano. Well, as I think I have explained in 
many settings, we are in the immigration enforcement area 
setting priorities in part because we have resources. We don't 
have an endless pocketbook. So we have focused on criminals, on 
recent border crossers, on repeat violators, and others who may 
be a National security risk. That process is going very well.
    With respect to visa overstays, beginning in May 2011, I 
directed that we go back and see if we could re-identify that 
population and vet it against law enforcement and intelligence 
community holdings, and DOD battlefield holdings. As we did 
that vetting, we actually learned that quite a few of them--
almost 50 percent, actually had left the country, that just the 
documents weren't linked up.
    But we have now completed that re-vetting and the priority 
cases have been referred to ICE for removal. We are current on 
vetting on visas now.
    Mrs. Miller. Yes, I appreciate that. Actually, there was a 
backlog of several hundred thousand which I think has been 
significantly----
    Secretary Napolitano. I think the backlog has been 
eliminated.
    Mrs. Miller. Good to hear that. Good to hear that.
    One other question I would have. I mentioned about Secure 
Communities and, you know, as it has rolled out and now it is 
almost everywhere really around the country, which has been a 
tremendous assist, I think, for the first responders, 
particularly when you look at them as a force multiplier for 
your various agencies under your umbrella as well in 
eliminating or deporting, I should say, deporting many of the 
detainees through the Secure Communities by using your 
database, et cetera.
    But yet, we still see that there are several areas, couple 
of them in the State of California, couple of cities in the 
State of California, and I think Alabama as a State, but that 
is going to be rectified by October, now with the Supreme Court 
ruling about the immigration law. I think the people of Alabama 
look forward to that.
    But in particular, of course, it has gotten a lot of 
attention--Cook County, which is essentially a sanctuary city. 
They have declined to participate by our Federal law with 
Secure Communities.
    I am just wondering if you have had conversation with, for 
instance, the Department of Justice about that?
    I don't think we should allow it to continue. Certainly a 
hammer that we would have initially is the State Criminal Alien 
Assistance Program, SCAP dollars which is tremendous. I mean, 
it is several million dollars a year.
    So, on the one hand, they are saying, we are not going to 
comply with Secure Communities; on the other hand, they are 
saying, would you mind giving us all the Federal money so we 
can pay for whatever they want to pay for in their system 
currently. That would seem to me would be a place to start.
    If you do intend to continue to give them the funding they 
are asking for, at the same time they are violating this, I 
guess I would look for respectfully how can we do that? Why 
would you do that?
    Secretary Napolitano. Well, SCAP is a Department of Justice 
program, and we are evaluating all options with Cook County. 
Their ordinance is not just they can't cooperate with Secure 
Communities, it even precludes them from sharing any 
information with us, so that we could put a detainer on an 
individual and make sure they are not released back in the 
community before we look at them for possible removal.
    So it is a very, very broad ordinance. As I said before, we 
are evaluating all options.
    Mrs. Miller. I appreciate that. I hope that you do that. 
Again, I think that is a very bad message to be sending out to 
everybody else in the country to look at those kinds of things. 
I would hope that you and Attorney General Holder would work 
together to bring that to a resolve to the satisfaction of 
everybody who has a mutual constituency which is every American 
to make sure that if there are violators in the system, they 
need to be deported.
    Secretary Napolitano. Indeed.
    Mrs. Miller. Thank you.
    Chairman King. The time of the gentle lady is expired.
    I now recognize the new Ranking Member for the moment, 
gentlelady from California, Ms. Hahn.
    Ms. Hahn. Thank you, Chairman King. I moved up quickly. I 
just passed my 1-year anniversary in Congress last week and 
look at me now.
    Thank you, Chairman.
    You know I think there is a theme going on here in this 
hearing this morning and I know you are aware of that and that 
is port security and the issue of cargo scanning and screening. 
Certainly it is an issue that I think still concerns a lot of 
us. You know Los Angeles and Long Beach are America's port--44 
percent of all the cargo that comes into this country comes 
through that port complex.
    Congress did pass a law that required 100 percent scanning 
by this July 14. That date clearly has come and gone. You have 
indicated pretty strongly that that is not probably going to 
happen even with the 2-year waiver.
    Well, my first committee that I sat in here, we had the 9/
11 report card. I remember specifically asking, you know, were 
we doing enough in port security and the panel pretty much 
unanimously said that was an area where we were still lacking. 
On that, with the Chairman's help, I was able to actually pass 
a bill a couple weeks ago--it is awaiting passage in the 
Senate--that will ask the Department of Homeland Security to 
take a comprehensive look again at our Nation's ports, the gaps 
that may exist in port security and then come back and tell us 
in a classified setting, you know, where are gaps, what can we 
do in the future to close those?
    So I know you have spoken about this a lot, but again, 
could you discuss--elaborate on--give us a little comfort on 
where you see us going with particularly the scanning of our 
containers?
    I know a big issue is the economy, jobs, commerce, you 
know, we don't want to slow that down and yet one major 
disaster at one of these ports could actually cripple our 
economy.
    So where do you see us going, particularly if there is new 
technology that emerges that maybe makes this more possible 
without slowing down Congress?
    Secretary Napolitano. Well I think as Representative 
Lungren's subcommittee heard with respect to the detection of 
nuclear-type materiel, there are new technologies and things 
that are in play. I won't go into that in an unclassified 
setting.
    Obviously, we pay a lot of attention to ports. Obviously, 
we think the 100 percent rule, which does give the Secretary 
the authority to waive, is not the only way to reach the goal. 
There are multiple ways.
    We also are more than willing to work with you and with the 
committee on trying to give you a greater comfort level about 
the safety of America's ports.
    But interestingly enough, Representative, one of the things 
you said is well, if there is one thing that happens, 
Armageddon is going to occur and we will see a total crash of 
the market. I think one of the hallmarks of really being 
prepared for any kind of incident is the ability to respond and 
to be resilient, and to get right back to work.
    So you will see that a lot of our work has to do with 
precisely the resilience point.
    Ms. Hahn. I agree with that and I hope that is part of 
maybe what you bring back to Congress is, you know, a better 
plan for all of our ports to recover in the event of a 
disaster.
    Let me switch quickly to airports. I know at L.A. 
International Airport, we had a big issue with an unacceptable 
high wait time for people entering into this country which I 
think presented a potential security threat at our airports.
    We were able to get 20 more CBP officers at LAX. I think 
several of us specifically requested that. But could you speak 
to long-term staffing shortage of our CBP agents at our 
airports and how we can address that in the future?
    Secretary Napolitano. Right. We are spending some 
significant time as we look at the fiscal year 2014 budget now 
within the confines of all the other restrictions about what we 
can do to increase the number of hours that we have for 
inspectors, the number of personnel; looking at our staffing 
model--seeing if we can adjust that.
    We have had a problem at LAX. We have had a problem at some 
of our other big international airports. All I can tell you, 
Representative, we are doing everything we can think of to do 
to rectify that situation.
    Ms. Hahn. Thank you very much.
    Chairman King. The time of the gentle lady has expired.
    If I could just add on to what the gentle lady said. I know 
that a number of airlines coming in and out of JFK made the 
same request to me--the fact that there does seem to be a 
shortage of customs people at the----
    Secretary Napolitano. Yes. Mr. Chairman, one of the things 
we have requested in connection with the fiscal year 2013 
budget is the authority for us to receive participation and 
payments from port authorities, from airlines, to help 
subsidize the cost of additional inspectors.
    So say for example, an airline in New York wants to bring 
in a 3:00 a.m. flight from China, they help subsidize the cost 
of having to have that shift of inspectors there. There are 
other ways it can work, but it is something I would hope the 
committee can help us with.
    Chairman King. Thank you, Secretary.
    Gentleman from Michigan, Mr. Walberg is recognized for 5 
minutes.
    Mr. Walberg. Thank you, Mr. Speaker, and thank you to our 
panel today.
    Chairman King. Don't let John Boehner hear that.
    Mr. Walberg. Well, I was hoping that your kind goodness 
would produce something for the future for me, as well. But 
thank you, Mr. Chairman.
    Let me go back to leaks. There have been leaks in this 
administration. We don't know who. We don't know why, but there 
have been. Just to rehearse a non-exhaustive list, these leaks 
have included information about drone strikes against al-Qaeda 
in Pakistan, Somalia, Yemen.
    We have leaks concerning reported cyber campaign against 
Iran's nuclear arms program. Leaks that included terrorist 
plans to destroy American airliners. Leaks and details of CIA 
and Special Operations Forces efforts to kill Osama bin Laden 
and others.
    I guess what I want to ask, Madam Secretary and Director 
Olsen, were DHS or NCTSC consulted in advance of these 
disclosures?
    Mr. Olsen. We certainly weren't consulted. In other words, 
there was no--as far as I know, nothing within NCTC were we 
involved in any of the leaks that you have referred to.
    I mean, I think the main point for us, Congressman, is 
that, you know, without getting into the specifics of the 
allegations, that this is something that we take very seriously 
within the National Counterterrorism Center.
    I know that the director of national intelligence, Director 
Clapper, has made a number of comments publically about the 
importance of this issue and the reality that leaks have the 
potential to interfere with on-going operations, and it is not 
an exaggeration to say to endanger lives of American 
intelligence officials and others.
    So it is something that I know within the intelligence 
community, we take extraordinarily seriously.
    Mr. Walberg. I assume that would be your same position, 
Madam Secretary?
    Secretary Napolitano. Yes, and I have spoken with the 
Director Clapper and promised our full cooperation in whatever 
investigations occur and also with the FBI in the same vein.
    Mr. Walberg. What is your position on--have these 
disclosures impacted our National security?
    Secretary Napolitano. They are certainly not helpful. I 
will just leave it at that for now.
    Mr. Olsen. Yes, that is what I would say as well. 
Obviously, leaks, as I said, can be very damaging. In this 
instance, these leaks are now the subject of investigations and 
I wouldn't want to comment any further.
    Mr. Walberg. Well, let me move on to that.
    You are both former senior Federal prosecutors. Attorney 
General Holder has refused bipartisan requests, and I would 
note bipartisan request, to appoint special counsel to 
investigate these disclosures relying instead on line 
prosecutors to do the job.
    In your professional opinion, is it realistic to expect a 
U.S. attorney to question senior members of the administration 
regarding these disclosures?
    Madam Secretary.
    Secretary Napolitano. Yes, as a former United States 
attorney, they are not line prosecutors in that sense, they are 
Presidentially-appointed and Senate-confirmed. They act 
independently in a number of matters. So I think that is an 
appropriate way to proceed.
    Mr. Olsen. I agree completely with that.
    Mr. Walberg. So, you don't see that it would be a challenge 
for a person in this position, a line or whatever you would 
call them, U.S. attorney, to question senior members of the 
Obama administration regarding these disclosures?
    Secretary Napolitano. No, I anticipate that there will be 
several investigations and they will involve members of the 
administration. As I said before, we have pledged our full 
support.
    Mr. Olsen. We are also cooperating with the investigation 
and I also would say, again, these questions probably are 
better posed to the Attorney General. Without knowing the----
    Mr. Walberg. I have asked questions of the Attorney General 
on a number of subjects and gotten no answer.
    So, I would appreciate getting answers, but we can only 
work with what we have.
    Mr. Olsen. I don't know the specifics of the investigation, 
but do have confidence in the U.S. attorney's offices to carry 
these investigations out completely.
    Mr. Walberg. So when you served as a U.S. attorney, or the 
National Security Division, you would have authorized an 
assistant to take sworn testimony from the President's National 
security adviser?
    Mr. Olsen. I am not sure it is appropriate for me to 
comment on a hypothetical like that, Congressman.
    Mr. Walberg. I thank you. My time has expired.
    Chairman King. Gentleman's time has expired.
    The gentleman from Arizona, Mr. Barber, is recognized for 5 
minutes. Once again, welcome to the committee.
    Mr. Barber. Thank you, Mr. Chairman. Thank you for the 
welcome.
    Madam Secretary, Mr. Olsen, thank you so much for your 
testimony. Particularly, I was appreciative of the Secretary's 
very thorough report on the evolving and emerging threats to 
our country's security. It is absolutely my honor to be here, 
not only to be on this committee, but to add another Arizona 
voice to an important issue that we all share; and that is: How 
do we increase the security of our citizens and of our border?
    As you know, Madam Secretary, there have been anecdotal 
reports about material evidence of the presence of terrorists 
along our Southern Border. My question is: Is there any 
credible evidence that these reports are accurate and that 
terrorists are, in fact, crossing our Southern Border with the 
intent to do harm to the American people?
    Secretary Napolitano. Representative, first, welcome to the 
committee. It is good to see you here in Washington, DC.
    With respect, there have been--and the Ababziar matter 
would be one I would refer to that is currently being 
adjudicated in the criminal courts from time to time. We are 
constantly working against different and evolving threats 
involving various terrorist groups and various ways they may 
seek to enter the country.
    What I can tell you, however, is that the Southern Border, 
the U.S.-Mexico border, is heavily, heavily staffed at record 
amounts of manpower, materiel, infrastructure and the like, and 
we are constantly making sure we are doing all we can to make 
that border as safe as possible.
    Mr. Barber. Thank you, Madam Secretary.
    Mr. Chairman, I have no further questions.
    Chairman King. The gentleman from Arizona yields back.
    The gentleman from Minnesota, Mr. Cravaack, is recognized 
for 5 minutes.
    Mr. Cravaack. Thank you. Can you hear me? Thank you, Mr. 
Chairman. I am not going to give you a hug. So there you go.
    [Laughter.]
    Chairman King. I thank the gentleman.
    [Laughter.]
    Mr. Cravaack. You are welcome.
    Thank you for being here today, Madam Napolitano. I have 
got a question for you. Last time we had a little exchange 
regarding FFDOs. I said the last line of defense was the FFDO. 
Would you care to comment any further on that position?
    Secretary Napolitano. Well, I think FFDOs play a valuable 
part in airline security, aircraft security, which involves 
multiple layers. I think in that exchange, we talked about the 
FFDO. We talked about the cockpit door. We talked, I think, 
about----
    Mr. Cravaack. Which you classified as the last line of 
defense.
    Secretary Napolitano. Well, last line of physical defense 
in that regard. But I would say that trained personnel aboard 
aircraft, you know how to respond to events, is always, always 
a very, very important factor.
    Mr. Cravaack. Okay. In testimony today, you said, regarding 
risk-based analysis--what we talked about last time as well--
you said it is not perfect. It is an art. It is not a science.
    With that said, given the different layers of security that 
you just talked about, where a clean person can come through 
the normal security process. Just in this hearing room we heard 
not too long ago about the various holes that are around the 
aircraft, in the shadow of the aircraft, the people that can up 
and touch the aircraft and possibly place a device or a weapon 
on-board the aircraft.
    With that understanding, that a person coming through clean 
through the airport, can hook up with a device on the aircraft 
and plant it from the tarmac, which we see as a lot of 
problems, I see the FFDO program as being absolutely vital, 
with a 1.5 million sorties being flown annually, at the cost to 
the American taxpayer for $15 a flight.
    So I think that is probably one of your chief defenses. As 
a pilot--I flew for 17 years--as a former Federal flight deck 
officer, I can assure you, madam, that the Federal flight deck 
officer is not only the last line of defense, but a chief 
deterrent for those that wish to use an aircraft as a human-
guided missile.
    The House also recently passed a homeland security 
appropriations bill that would increase the FFDO funding. Now, 
the proposals that were brought out by the administration 
basically cut the program in half--would in essence eliminate 
it.
    If the funding level stands, will this administration work 
to clear the backlog--and I am saying the increased funding--
increase the backlog of pilots that are waiting to join the 
program?
    Secretary Napolitano. Representative, first of all, the 
reason that the administration submitted the budget request it 
did is because, as you all know, we are working under severe 
budget constraints. The FFDO program, as compared to the air 
marshal program, is not a risk-based program. So that is why 
that decision was made.
    Regardless, however, certainly if that appropriation goes 
through and that is added back into the budget, we will work to 
make sure the program is well-run and backlogs are relieved.
    Mr. Cravaack. So is your intent then not to phase out the 
program if you get this funding?
    Secretary Napolitano. Well, I don't speculate. I don't play 
``what ifs.'' We will see what happens.
    Mr. Cravaack. I ask you again--make sure I understand what 
you are telling me. If the program is brought up to the level 
of funding that the Congress approved, that it is your intent 
not to phase out the program?
    Secretary Napolitano. If there is funding for the program, 
we will carry out the program, yes, sir.
    Mr. Cravaack. Thank you.
    Switching gears, servicemembers at Fort Hood that we were 
just talking about today have been denied purple heart medals 
and related compensations on the basis of the judgment that 
these shootings were workplace violence and not terrorism.
    In your opinion, were the Fort Hood shootings by Nidal 
Hasan--I will not give him the rank--who described himself as a 
soldier of Allah on his business card, who was in active 
correspondence and direction from al-Qaeda, and who cried 
``Allah Akbar'' at the beginning of the attack, a terrorist 
act?
    Secretary Napolitano. I am not going to get into the 
decisions of the Department of Defense. They have their own 
criteria. But I would say, Representative, that an act can be 
both workplace violence and a terrorist act at the same time. 
This has all the hallmarks of both.
    Mr. Cravaack. Do you think these servicemembers deserve the 
medal--purple heart?
    Secretary Napolitano. Again, I don't know the decision 
making of the Department of Defense, but I have described how 
we would look at that act.
    Mr. Cravaack. So you classify it as a terrorist act?
    Secretary Napolitano. As both.
    Mr. Cravaack. One being a terrorist act. Okay.
    In regards to recently----
    Chairman King. The time of the gentleman has expired.
    Mr. Cravaack. My time has expired. I will yield back. Thank 
you.
    Chairman King. The gentleman yields back.
    The gentlelady from California, Ms. Sanchez, is recognized 
for 5 minutes.
    Ms. Sanchez. Thank you, Mr. Chairman.
    Thank you, Madam Secretary and Director, for both being 
here today before us.
    Madam Secretary, I wanted to ask you a question and 
actually ask you to help us and work through a problem that I 
am sure you are aware of and somehow the buck keeps getting 
passed around to different people. Madam Secretary, this has to 
do with a border crossing between Mexicali, Mexico, and 
Calexico, which is on the border of California and Mexico. A 
very big crossing. My mother grew up in Mexicali, so I am very 
well aware of that area. It has the best Chinese food in the 
world, by the way.
    There is a new border crossing or an expanded border 
crossing--land crossing going between the two. One of the 
things about Mexicali, Mexico and Calexico is that in the 
summer it can get easily to 110 degrees. People are waiting to 
cross the border there for up to 3 hours, with no shade, 
standing in line, and that is a pedestrian crossing.
    So there is an effort to make a new land crossing. Almost 
all the Mexican side of that crossing has been built. 
Meanwhile, we have failed to move from our end to meet it and 
get this land bridge open.
    Part of the problem is that it is a GSA facility. I 
understand this. But how do we do what we need to do, which is 
to get this built, so that we can meet the Mexican side, so 
that commerce can move at a faster pace than 3 hours in line, 
and that people crossing back and forth, many of them for work 
and for family purposes and for purchasing purposes, also, so 
that we can move forward and get this done?
    How do we do that? Will you work with us? Will you help me? 
Will you get us a meeting with the GSA administrator? Can we 
all sit down? I mean, this is a very big and frustrating 
problem for the people who live in that area.
    Secretary Napolitano. I concur, and I think, you know, the 
physical ports along the Southwest Border, many of them are 
inadequate for the amount of people and cargo that needs to go 
back and forth.
    As you identify, it is GSA. Probably the No. 1 thing you 
can do is provide the funding to GSA for the projects. If they 
don't have the funding, they can't build the projects.
    But we will be happy to work with you.
    Ms. Sanchez. Great.
    I would like, Mr. Chairman, to submit a letter from the 
Board of Supervisors of Imperial Valley, where Calexico sits 
there on the border, asking for some resolution, hopefully a 
positive resolution to this. It is incredibly embarrassing to 
see a brand-new built facility from Mexico, having done their 
part, and nothing happening on our side.
    Chairman King. Without objection, the letter will be made 
part of the record.
    [The information follows:]

        Letter Submitted for the Record by Hon. Loretta Sanchez
                                      July 3, 2012.

Secretary Janet Napolitano,
Department of Homeland Security, U.S. Department of Homeland Security, 
        Washington, DC 20528.
    Dear Secretary Napolitano: The Board of Supervisors of Imperial 
County, California desperately requests your assistance and direct 
involvement in helping us solve a health and safety emergency that 
continues to exist as a direct result of Department of Homeland 
Security (DHS) inaction along the U.S.-Mexico border between Calexico, 
CA and Mexicali, Mexico.
    Calexico is a small city of 38,000 that is separated only by a 
fence from the city of Mexicali, the capital of the State of Baja 
California with a population in excess of 1 million persons. Since the 
establishment of these communities 100 years ago, Calexico and Mexicali 
have been linked economically, culturally, educationally, and both have 
significant familial ties.
    Calexico and Mexicali are linked by two major ports of entry that 
are administered by DHS through the Customs and Border Protection 
Administration. Although the communities have been promised that the 
major Port of Entry (POE) at downtown Calexico would soon undergo a 
major remodel that would bring this 40-plus-year-old outmoded facility 
up to modern standards to better facilitate the movement of people and 
commerce, the necessary Federal appropriations have been stalled, 
apparently indefinitely. In the mean time border waits for persons 
wishing to cross into Calexico to work; shop; go to school; or visit 
family, regularly exceed 2 hours. We are already in the summer season 
where we can expect in excess of 130 days where the average 
temperatures will exceed 100 degrees and often reach as high as 115 
degrees. The lines are particularly dangerous for pedestrians who must 
endure these 2-hour waits while standing unprotected from the excessive 
heat.
    We understand the difficulty the Federal Government is facing in 
trying to find funding for the $300 million reconstruction of the 
entire POE and we are actively seeking solutions including local 
participation in a public/private, leaseback arrangement to help find a 
local solution. In the mean time, we face an imminent public health 
emergency that requires your immediate attention.
    We urge your direct involvement in implementing a solution to 
expedite the passage of northbound pedestrians before the intense heat 
of this coming summer season causes more health and safety issues for 
the pedestrian crossers, including elderly persons and young school 
children. Regional CBP officials have looked into temporary solutions 
to provide more northbound pedestrian turnstiles to help facilitate the 
northbound inspection of pedestrians that we believe can be quickly 
implemented to help solve this impending health emergency. Their plan 
would involve relocating the southbound passage for pedestrians and 
moving some office space within the pedestrian port to nearly double 
the number of inspection gates at downtown Calexico. The Board of 
Supervisors request that you immediately provide funds to Customs and 
Border Protection (CBP) to implement these changes or any similar 
reconfigurations or operational changes that will shorten the exposure 
of these vulnerable populations from the extreme weather conditions 
that will soon be upon us.
    While the Board has not yet declared the existence of a State of 
Emergency as a result of these increasingly long waits to cross into 
the United States, we intend to have our health and environmental 
officials continuously monitor the situation and, when warranted, we 
are prepared to make such a declaration.
    We would welcome a prompt response to this request so that we may 
quickly engage in a dialogue that will lead to prompt action to rectify 
the untenable conditions that have resulted from many years of Federal 
inattention to the needs of the border-crossing communities along the 
Southwest Border in general and in Calexico in particular.
            Sincerely,
                                              John Renison,
                                                        District 1.
                                             Jack Terrazas,
                                                        District 2.
                                         Michael W. Kelley,
                                                        District 3.
                                                Gary Wyatt,
                                                        District 4.
                                          Raymond Castillo,
                                                        District 5.

    Ms. Sanchez. Thank you, Madam Secretary.
    Chairman King. The gentleman from Pennsylvania, Mr. Meehan, 
Chairman of the Terrorism Subcommittee, is recognized for 5 
minutes.
    Mr. Meehan. Thank you, Mr. Chairman.
    Let me thank both of the panelists for your distinguished 
service to our country. I appreciate that when you come here 
you get the tough questions. But I also appreciate the 
tremendous service that you perform each and every day on 
behalf of our Nation. But I am going to ask as well some 
questions that I know have been a great importance to me.
    Let me start with you first, Mr. Olsen. I want to ask you, 
you know, because you are at the NCTC every day, you see the 
global information. Do you believe that Boko Haram should be 
designated a foreign terrorist organization?
    Mr. Olsen. We certainly have seen, Congressman, the rise of 
Boko Haram as a significant threat in Nigeria over the last 
couple years, and in particular, a dramatic rise in the amount 
of violence that that group has caused in Nigeria, particularly 
over the last year.
    If you recall, last August, the attack on the U.N. 
headquarters----
    Mr. Meehan. I am aware. We know. The record reflects. I 
just want to know your opinion. Do you believe it should be a 
foreign terrorist organization?
    Mr. Olsen. That is a question, the question of whether to 
designate that group----
    Mr. Meehan. Yes.
    Mr. Olsen [continuing]. That is within the province of the 
Department of State to make that----
    Mr. Meehan. I am aware that it is the Department of State, 
but what do you believe? Because I am having trouble getting an 
answer from the Department of State.
    Mr. Olsen. Our role is to provide the intelligence on that 
group to the--ultimate policy decision about whether to 
designate. From the pure perspective of the definition of 
terrorism and whether that group engages in terrorism the 
answer is it does. It engages in acts of terrorism in Nigeria 
and has.
    Mr. Meehan. Well, let me take a second--let me just ask, 
Madam Secretary, what is your opinion on that?
    Secretary Napolitano. Well, I think I would concur with the 
director and all that he has said. That is a policy decision 
ultimately for the State Department.
    Mr. Meehan. Well, let me go through because I am not 
getting the ability for the State Department to make a 
decision. The facts, we are attorneys and we talk about the 
criteria, the elements. Are they a foreign organization? 
Question No. 1--that is clear. Do they engage in terrorist 
activity? Without a question. I think we can stipulate both of 
those.
    Really, the third question is, is the organization's 
terrorist activity a threat to the security of the United 
States or National security of the United States, either the 
foreign relations or their economic interests?
    Now, Mr. Olsen, you have testified here today that Boko 
Haram remains focused on local and regional attack plotting, 
including Western interests in Nigeria. You further testified 
that Boko Haram is primarily focused on plotting against 
attacks in Nigeria, but in April a spokesman for the group 
publicly threatened to find a way to attack a U.S.-based news 
outlet if its coverage of Islam did not change.
    According to my interpretation of your testimony and each 
of those elements, it meets all the criteria of designation for 
a foreign terrorist organization. Would you agree with that?
    Mr. Olsen. I would agree that the acts of that group meet 
those criteria in terms of its activities, and the intelligence 
supports that. Ultimately--and as you may know, sir, that a 
number of the members of that group have been designated as 
terrorists. Ultimately, the decision of whether to designate 
the group is a policy call----
    Mr. Meehan. But why, Madam Secretary, why would we not do 
that? Because I think you appreciate, as I do, the ability to 
have enhanced activities for investigation on our part. Let me 
suggest that there is testimony, as well.
    I think most significantly the letter from the Department 
of Justice requesting that this be done, one of your, you know, 
colleague agencies, from Deputy Attorney General Monaco, 
specifically requesting.
    I have met with the CIA, and I would represent to you their 
genuine concern and hope that this would be accomplished.
    General Ham himself of the African Command has talked 
himself about the concern that AQIM and others are 
collaborating with the--you know, al-Qaeda's collaborating with 
Boko Haram.
    So given all of those facts, why would the State Department 
not designate them as a foreign terrorist organization if you 
have an opinion?
    Secretary Napolitano. Representative, I think that is a 
question to address to the State Department.
    Mr. Meehan. Okay, well, I appreciate that. I think the 
facts speak for themselves on that.
    I am fearful and, here, let me just go for the record. My 
concern is we took the same stance with TTP. We took the same 
stance with AQAP after--we did not designate them until after 
they attempted to carry out acts of terrorism within the United 
States. So I am very concerned about this issue.
    Madam Secretary, let me just ask one quick, sort of 
overarching question: Those visa overstays here in the United 
States, are we doing enough to try to deal with the issue of 
visa overstays, or can we do more? Or are we concerned about 
that?
    Secretary Napolitano. We have gone back and revetted the 
backlog. We are current with visas coming in. Doesn't mean that 
there aren't overstays in the country that are problematic, and 
we should always be concerned about that. We are open to ideas 
or suggestions on other things we could do. But I think from a 
Departmental standpoint, in the last 13 months--12, 13 months, 
quite a bit has been done from a security standpoint to look at 
those visa overstays.
    Mr. Meehan. Well, thank you.
    Thank you, again. My time is expired. But I am tremendously 
grateful for your service. Thank you.
    Chairman King. The time of the gentleman is expired.
    Madam Secretary, I have just been informed that you have to 
leave by 12:30, 12:35. We will do our best to expedite it, but 
we do have four Members left.
    The gentleman from Arizona, Mr. Quayle, is recognized for 5 
minutes.
    Mr. Quayle. Thank you, Mr. Chairman.
    Madam Secretary, last week we talked a lot in the Judiciary 
Committee about your June 15 memo. One of the things I wanted 
to talk about is not part of that. I have been hearing a lot 
of--I have talked with a number of sheriffs down in 
southeastern Arizona, and they have been talking about CBP 
reports about--where they have a new policy where they just 
turn illegal entrants back south if they don't pose a threat 
either criminally or violently.
    With the onset of the Morton memos, your June 15 memo--and 
then I recently got a copy of a CBP memo that says, ``CBP 
guidance for exercising discretionary authority and 
prosecutorial discretion in the enforcement of immigration 
laws.'' what it states is that they, again, are prioritizing 
people who have ties to terrorist organizations or those that 
could present a threat or smuggling.
    Then they also say that you can exercise discretion when it 
is confirmed that the alien does not--well, actually, 
generally, when it is confirmed that the alien does not fall 
within the categories. Then they list a number of different 
examples or key factors where they actually take into account 
of whether they just turn them back south rather than 
processing them, one of them being the likelihood that the 
alien will be granted temporary permanent status or other 
relief from removal, or the alien's ties to their home country 
and conditions in that country.
    One of the things that they are allowed to do is just have 
the voluntary return at the time that they are actually 
encountered along the border.
    How are the CBP agents actually going to be able to 
determine all of these different factors if they are just 
encountering them when they are making that illegal entry in 
between the ports of entry?
    Secretary Napolitano. What they do--and I think, 
Representative, we can provide you with a briefing off-line. 
But what they do is they bring the immigrant, the illegal 
alien, to a central center.
    I think we need to distinguish between when they make a 
referral to ICE for removal versus apply the consequences that 
we apply along the border with respect to detention and 
movement back to the country of origin. That is different than 
I think you are thinking of like a turnaway or something of 
that sort. We don't do turnaways at the Southern Border.
    Mr. Quayle. It actually does say that they have--``in the 
enforcement context exercising discretion applies to a broad 
range of discretionary enforcement decisions, including but not 
limited to the following between the ports of entry: voluntary 
return.'' So that is----
    Secretary Napolitano. That is right.
    Mr. Quayle. Yes. Voluntary----
    Secretary Napolitano. Voluntary return is not turnaway. 
Voluntary return means you stay in Border Patrol process for 
purposes of being handled versus going into the immigration 
court context.
    Mr. Quayle. But this actually says with the language--and 
language does matter within these memos. It says, ``Although 
the initial exercise of discretionary review should be made at 
the second line supervisor level''--it doesn't say ``must be 
made.''
    So that gives actually the discretion to the CBP agent at 
the time of the apprehension not to actually process the 
individual and take them into custody, but actually have the 
voluntary return to where they came from.
    So that is the disturbing thing that I have seen from this 
memo, along with your June 15 and along with the Morton memos 
is that they have this ability where they have discretion that 
wasn't actually given within the statutory authority.
    Secretary Napolitano. No, I think that is inaccurate. We 
will be happy to provide you with a specific Border Patrol 
briefing on that point.
    Mr. Quayle. So it is inaccurate, but it says that, 
``Although the initial exercise of discretionary review should 
be made.'' I mean, you are an attorney. You know language 
matters. That is some of the other things that you have, you 
know, within your June 15--it also uses ``should'' not 
``must.'' These are the things that are troubling when we are 
trying to draft legislation here to not allow and actually have 
enforcement of laws.
    We have your June 15 memo. You believe you have 
prosecutorial discretion. HHS believes that they have the 
ability to waive the work requirement for welfare, even though 
it specifically states that that section can't be waived.
    We are in a situation--we discussed this last week--where 
we need to be able to write laws and make the Executive branch 
actually enforce them. Even when we put these ``you can't waive 
it,'' or, ``you must do it,'' it seems the Executive branch 
continues to say, ``Oh, well, we have the discretion,'' even 
though the statute doesn't state that you do.
    So if you could just answer, you know--CBP, where did they 
get this discretion to have the ability to allow the voluntary 
removal of illegal entrants when it doesn't state that within 
any statutory authority?
    Secretary Napolitano. It is hard for me to follow your 
question, Representative, but I cannot identify a prosecutor or 
a former prosecutor who would sit at a table before you and 
tell you they don't have discretion. It is why U.S. attorneys' 
offices typically don't do check-cashing cases, even though 
there is a law there.
    You have to enforce the law in a strong and sensible 
manner.
    As you know, we have actually removed more people from this 
country in the last 3\1/2\ years than any prior administration. 
We have removed more felons. We have removed more aggravated 
felons. So the enforcement record is quite strong.
    Mr. Quayle. All right, thank you, Madam Secretary.
    Chairman King. The time of the gentleman has expired.
    Now I will ask unanimous consent, the gentleman from 
Arkansas, Mr. Crawford, be allowed to sit on the dais and 
participate in the hearing.
    Without objection.
    Just have to say, Mr. Crawford, the witnesses may have to 
leave before we get to you, but you are certainly welcome to 
join us.
    The gentleman from Missouri, Mr. Long, is recognized for 5 
minutes. He will be followed by Mr. Duncan and Mr. Rogers, and 
then Mr. Crawford if we are still here.
    Mr. Long. Thank you, Mr. Chairman.
    Thank you all for being here for your testimony today.
    Madam Secretary, I just stepped out of the room a few 
minutes ago to talk to a couple of college students from my 
area that go to Drury University and one of them happens to be 
from Joplin, Missouri. I just want to thank you for all of your 
efforts after our horrendous event, the tornado that took 161 
of my constituents' lives down there a year ago in May.
    You all were exemplary and unwavering and steadfast with 
your efforts down there, and I want to thank you for that.
    I do have a question--a couple of questions on today's 
issue.
    Representative Lungren a while ago was asking you about the 
Fort Hood shooting, Madam Secretary. In his questioning about 
the Fort Hood shooting and point out that Major Hasan was e-
mailing probably the second-leading terrorist. His question to 
you, if I understood the question was: How was this missed? How 
did all of this be missed that people couldn't look into it, 
when you have got a major e-mailing jihadist ideas and things 
to the second-leading terrorist in the country?
    I hope I was wrong in understanding your answer, but to me 
your answer was, what is going on in society--we need to be 
concerned with what is going on in society that leads to the 
violent extremism.
    Secretary Napolitano. No, Representative, first of all, I 
continue to watch the progress in Joplin and your constituents 
are amazing.
    With respect to that, what I was saying is that, within the 
whole universe of violent extremism, we need to understand 
better what causes it. We need to work with non-governmental 
organizations, NGOs. We need to have a very strong community 
base policing curricula that looks at early warnings, tactics, 
behaviors, techniques, that could be employed.
    So, I hoped you didn't interpret my answer as suggesting 
that this is a sociology issue. There were clearly lessons to 
be learned about the communication between FBI and the 
Department of Defense with respect to that Fort Hood shooting, 
that Fort Hood tragedy. I think all of us, even if we were not 
directly involved are going to read--are reading the Webster 
report with great attention.
    Mr. Long. Has this been thoroughly gone through to see 
where the dots were not connected or why--if San Diego was 
saying, ``Hey, we have got a huge problem here, this guy is 
talking about jihadist ideas and he is talking to the second-
leading terrorist, has anyone gone back to the people in the 
middle that made the decision not to pursue it?'', and said, oh 
no we can't get into that, because it is a civil rights, civil 
liberty?
    I am concerned about the civil rights and civil liberty 
about the 13 people that were killed.
    Secretary Napolitano. Representative, again DHS was not in 
that Fort Hood shooting situation, per se, but we all have 
copies now of the Webster report. We are all going to read it 
and are reading it with great attention.
    Mr. Long. Okay, one other----
    Secretary Napolitano. NCTC wants to answer.
    Mr. Olsen. If I could add to that? The Fort Hood tragedy 
continues to be a touch point for us at NCTC as an event that 
we need to learn from on how to share that type of information 
and to make sure that as NCTC represents the hub of much of 
that information, whether it is reporting from the FBI or from 
CIA, from DHS, from DOD. We need to continue to make sure that, 
that information that is of threat nature and those types of 
communications find their way into the hands of the individuals 
who can take action.
    So, again, the Webster report is one of the after-action 
reports, but there have been others. Those are all part of the 
overall effort of the National intelligence community to 
respond----
    Mr. Long. All right, I have got limited time. Let me get 
back into my second question for the Secretary.
    On the Egyptian Hani al Deen, or however you pronounce the 
name, the visit to the White House last month. Apparently, you 
testified that he had been through three vetting processes and 
no information was found indicating anything was wrong. But the 
Chairman mentioned that on his own Facebook page, he had that 
he belonged to a known terrorist organization.
    My question is this, when he has been vetted and re-vetted 
and vetted a third time, I believe you said with the Secret 
Service at the White House, do those people that did that 
vetting, are we going to hold them accountable?
    Is anybody going to go back and say: Look, who did this 
vetting? This guy had on his Facebook page that he is in a 
known terrorist organization. Do we do that? Do we go back to 
those people and say, how did you miss this little item?
    Secretary Napolitano. Representative, as I said to the 
Chairman, he was vetted multiple times. What happens, and what 
we will see out of the Arab Spring, among other developments, 
is that organizations that have been named as terrorist 
organizations in the past may or not be--all of the members may 
or not be--may or may not be terrorists themselves. That is 
what needs to be looked at, because these organizations and 
parties have evolved considerably over the last several years.
    We have seen this historically--Representative, we have 
seen this historically, as well. So, if the question is: Did 
someone get into the United States--did somebody get into the 
White House who was not vetted? The answer is no.
    Should we look at the process, as the Chairman pointed out 
to me? We can absolutely look at that.
    Mr. Long. I am not interested in the process. I am 
interested in the individuals that looked at the vetting. If my 
friend Mr. Duncan did the vetting, I would like for someone to 
go to Mr. Duncan and say, I don't care if it was an evolving 
terrorist organization, if it is one that used to be on and now 
it is not on the list. I would like to hear that from Mr. 
Duncan.
    I would like to hear that from the guy that did the 
vetting, to tell me, ``Well, the reason I didn't flag that he 
had on his Facebook page that he was a member of a known 
terrorist organization is because after the Arab Spring, we 
have kind of taken that group off.'' I think that is going to 
prevent my friend Rick here who sat next to Mr. Duncan in this 
vetting process, if Mr. Duncan is held to accountability----
    Secretary Napolitano. I think----
    Mr. Long [continuing]. Then when something like this comes 
up, Rick might be a little more careful, and protect our 
citizens a little more. Does that not make sense?
    Secretary Napolitano. Representative, that particular case 
has been looked at, and there were no mistakes made in the 
vetting. I will just leave it at that.
    Mr. Long. Three separate vettings, and no mistakes----
    Secretary Napolitano. None that we can----
    Mr. Long [continuing]. On a guy that had on his Facebook 
page, that he belonged to a terrorist organization that was at 
the White House a couple weeks ago.
    Secretary Napolitano. Well, again, Representative, I think 
I have discussed this long enough this morning. I will be happy 
to provide you more detail off-line.
    Mr. Long. You know, and I appreciate--I wouldn't want to 
see a flowchart on all your responsibilities, because you have 
got an extremely, extremely complicated and tough job. I do 
appreciate what you do. But sometimes it is the little things 
that matter. If we could go back and look at these three--I 
just can't get through my head that three groups of people 
vetted this fellow and on his Facebook----
    Secretary Napolitano. Well and it began with--and the State 
Department, because this was a State Department-sponsored trip 
to bring individuals who are now going to be potentially part 
of the leadership of a country with whom we have dealings to 
Washington, DC. It was vetted at every appropriate process--
every appropriate side----
    Mr. Long. I would like to hear that again from the people 
who did the vetting say, ``Hey, that is why we did it.''
    So again, thanks for your testimony. Thanks for being here. 
I know you have got a very complicated job.
    Chairman King. Time of the gentleman is expired.
    I would just add again, though, that the law does not allow 
him into the country unless there is a visa waiver. It may be a 
noble purpose if the organization may have evolved, but right 
now it is on the foreign terrorist organization list. He is a 
member of it. He should not have been allowed in without a 
waiver, which would have had your name and Secretary Clinton's 
name on it giving the reasons why.
    Gentleman from South Carolina, Mr. Duncan, is recognized 
for 5 minutes.
    By the way, Mr. Duncan is not on the terrorist watch list, 
despite references by Mr. Long.
    Mr. Duncan. Well let me just say, I appreciate the 
gentleman from Missouri continuing down that path, because I 
think it is very important. You know I would like to once hear 
somebody from this administration admit they made a mistake, 
and own up to it, and see some disciplinary action, if 
necessary.
    Madam Secretary, you are the Secretary of Homeland 
Security. Somebody as a member of a foreign terrorist 
organization coming into this country is absolutely your 
responsibility. Absolutely. The buck stops right there. 
Homeland Security is something that I know you take a grave 
responsibility for, and we take very seriously on this 
committee and in Congress. So, let me just say that is not the 
path I wanted to go down, and I am going to stop right there.
    In the final report of the Webster Commission on the FBI 
and the events at Fort Hood that was recently released, at the 
time of the Fort Hood attack, the FBI did not have access to 
all the relevant DOD databases. Even though there MODs for that 
sharing of information, they didn't have access to that to 
search for relevant information on Hasan.
    The FBI agents were not checking all of the FBI databases 
because there were so many of them, and the agents had not 
received formal training on how to use them. Some agents didn't 
even know that certain databases existed.
    Even when putting in a query for information on Major 
Hasan, or his e-mail exchanges with Awlaki, the databases did 
not produce all the relevant information necessary for clarity 
on that case. Now I know that FBI is a separate organization, 
but.
    In 2009, you all broke ground on a $3.4 billion facility 
housing 15,000 employees, the largest building project in the 
District of Columbia region, 68 years since the Pentagon was 
built. At that time, you said we are going to have a One DHS 
atmosphere. DHS has a large amount of databases. Each of these 
databases do not appear to be linked in one central database 
with a Google-like interface, allowing the simultaneous 
searching of all the relevant databases within DHS's wide 
system.
    In January 2010, the FBI deployed the data-integration 
visualization system, DIVS, allowing authorized users to search 
more than 50 FBI and non-FBI databases simultaneously. The 
Webster report points out very clearly that ``the Washington 
field office and TFO''--I am not sure which field office that 
was--``did not search the DWS, EDMS, IDW, or the DALAS, 
although he was a member of a blank''--that has been redacted--
``counter-terrorism squad, he says he did not know that DWS and 
EDMS even existed.''
    It goes on to say that--let me find this--``at the time of 
the Fort Hood shootings, however, with few exceptions, users 
accessed each database using a discreet interface, discreet 
password, and discreet search engine.'' From what I understand, 
there are so many different databases. You have got a different 
password for every one of them. You are not supposed to write 
those passwords down. It is a frustrating system for everyone 
involved at every level--not just in your agency, but every 
agency within the Federal Government.
    It goes on to say that the historical evolution of the 
multiple FBI and other U.S. intelligence community databases as 
discreet platforms had impeded the FBI and the USIC's ability 
to access, search, organize, manage electronically stored 
information in an efficient manner.
    So, under this One DHS mindset that you talk about, does 
DHS have any plans to expedite a process similar to DIVS for 
normalizing, consolidating, and integrating the information?
    What I mean by that is, you know, we have got folks coming 
into this country on visas and we don't know when they leave 
the country, because there is no information sharing between 
the State Department or other agencies. This is a serious 
problem of information sharing that goes back to the 9/11 
Commission report that talks about the stovepipe aspects of 
information between agencies.
    The territorial disputes, the turf wars of agencies 
responsible for protecting this country has got to end. As 
Secretary of the Department of Homeland Security, it is your 
responsibility. I will wait for an answer.
    Secretary Napolitano. Well, Representative, first of all, 
as you correctly note, those are comments made by the Webster 
report as to FBI.
    Let me comment as to DHS and extend an invitation to you. 
Because we actually have done a massive amount of work over the 
last 3\1/2\ years, particularly since the Christmas day bomber 
attempt in 2009, to unify databases in such a fashion. Because 
data comes in from all over the place, so you need the data, 
but you also need some analytics with it or else the data is 
just--it is just there. There is so much of it. Matt Olsen can 
talk to that, I suspect.
    But if you were to go out, for example, to our National 
Targeting Center, you would see how we are now able to process 
and analyze 1.8 to 2 million passengers per day as they seek to 
fly into this country or around this country.
    So you know, data can always be improved. It is never 
perfect. I am not saying it is. But what I am saying is I don't 
think there is a recognition by the committee yet of how much 
work has actually been done with the committee's support.
    Mr. Duncan. Do I have to get into another system and look 
there? Are there no cross-references and sharing of the----
    Chairman King. The time of the gentleman has expired.
    The reason I am saying that is that Director Olsen said he 
had to leave by 12:30, 12:35. We will be finished in 10 
minutes, if you could both stay. Okay.
    The gentleman from Alabama, Mr. Rogers, the Chairman of the 
Transportation Security Subcommittee is recognized.
    Mr. Rogers. I thank the Chairman.
    Secretary Napolitano, it is good to see you here today and 
appreciate your service and appreciate your recent visit to 
Alabama, the Center for Domestic Preparedness. We really do 
know it is difficult for you to make those kind of visits, so I 
appreciate it.
    You are aware that last Wednesday this committee--
subcommittee I chair, the TSA Subcommittee, had Mr. Wilson, the 
head of TSA's General Aviation Department, along with Mr. Lord 
of the GAO, testify before us about a study the GAO had just 
completed on foreign flight school training or training in our 
flight schools of illegal individuals in this country.
    The report was pretty upsetting. It showed that over a 
period of years, this has been a very--I won't go into the 
number because I can't--but not an unusual occurrence. It made 
several recommendations. The gentleman from the TSA 
acknowledged all those recommendations were accurate and that 
his department had already started working on repairing several 
of them.
    What I am asking you about is the very next day, on 
Thursday, you testified before the Judiciary Committee and Mr. 
Lungren brought this up. I have seen the videotape and you 
disagreed with that. Can you tell me why you disagree with the 
GAO report and Mr. Wilson's testimony?
    Secretary Napolitano. I think the disagreement with the TSA 
witness was on another point, Representative. But with respect 
to the GAO report, the flight school that it was focused on and 
those were as of 2010 and before. What I was taking note of was 
that we had already fixed that problem moving ahead.
    What we had not done and which is what the GAO recommended 
is institutionalize it in a way with memorandums of 
understanding. Those are in process right now.
    Mr. Rogers. But you are talking about with regard to that 
one school, not across the flight school system.
    Secretary Napolitano. No, with respect to the flight school 
system----
    Mr. Rogers. Well, the GAO, after your testimony, we reached 
out to them and they came back and said that is flatly not 
provable. That is what disturbs me. We are 10 years----
    Secretary Napolitano. It is not provable because what we 
have done is a practice. It was not committed to writing. It 
now is. It will be. It is in the process of being drafted.
    Mr. Rogers. Well, that was not their observation. I would 
love to get that reconciled because it is disturbing. You know, 
we are 10 years after 9/11 and we have evidence that on a 
regular basis, people who are in this country illegally can get 
flight school training.
    The other thing----
    Secretary Napolitano. Well, if I might, respectfully, if 
you have such evidence, please share it with us. Because if we 
have any problems, we want to fix them.
    Mr. Rogers. I agree and we will share it with you. Because 
I would like these things reconciled. I take this stuff very 
seriously, as you know.
    Also, earlier in this hearing--I was in Armed Services and 
couldn't be here--but I understand Mr. Thompson raised this 
issue with you about U.S. citizens and those who are here 
legally being able to get flight school training without being 
bumped against the no-fly list. He has introduced a bill to 
change that.
    I agree with the effort to remedy that, but I want to take 
a little bit more time to study, you know, what we need to do. 
So I have asked the CRS to look at this, and they say you 
already have the power; that the Secretary can designate an 
individual or category of individuals that must be vetted under 
current statute. But I understood you told Mr. Thompson that 
you probably do need some additional statutory authority.
    Secretary Napolitano. I think what I told Representative 
Thompson is it would be nice to tidy it up, because there is a 
lack of clarity there. But with respect to this, when somebody 
that is actually on the no-fly list and is a U.S. person, we 
have a variety of ways of knowing what they are doing before 
they apply for certification, but they are not formally vetted 
or pinged against the system until they are applying to the 
FAA.
    Mr. Rogers. But see, that is the problem. That is what we 
want to get remedied, because you are right, once they apply 
for their license, they are bounced against that list. But as 
we found from the 9/11 terrorists, they just want to learn how 
to take off and fly. They weren't interested in landing or 
getting a license.
    So we want to get it fixed so that if somebody is applying 
for training, whether they are in this country or not, legally, 
they should, at a minimum, have to be bounced against the no-
fly list.
    We want to work with you to that end, so I would urge you 
to get us any proposed language that you would like to see 
happen. I am going to be working with Mr. Thompson and the rest 
of this committee to get it done for you.
    Secretary Napolitano. Indeed.
    Mr. Rogers. Thank you, Mr. Chairman.
    Chairman King. The gentleman yields back.
    The gentleman from Arkansas is recognized for 5 minutes, 
and that will end the hearing.
    Mr. Crawford. Thank you, Mr. Chairman. I appreciate your 
flexibility in allowing me to come and participate in the 
hearing.
    Secretary Napolitano, I am a former Army EOD tech, so I am 
very concerned about the threat to our National security with 
respect to IEDs, remote-controlled particularly. I am a co-
founder of the House EOD Caucus, and that is one of our main 
concerns is that we address that on an on-going basis.
    Despite repeated requests, State and local police bomb 
squads remain without the electronic counter-measures, also 
called ``jammers,'' that are used to protect from these R.C. 
IEDs. The FBI techs with jammers may be hours away from an 
incident site. At the same time, we spend tens of millions of 
dollars to give hundreds of jammers to Afghanistan and 
Pakistan, where according to a GAO report, half of those 
jammers will simply collect dust in storage.
    What is your plan to help State and local police bomb 
squads here in the United States?
    Secretary Napolitano. I will tell you, Representative, that 
is a new one. I mean, we meet with State and locals all the 
time and I meet with them also when I travel around the 
country. I have never heard the issue about jammers raised. I 
will be happy to look into it.
    Mr. Crawford. Okay. I hear that issue a lot. Because of 
being the chairman of the EOD Caucus here in the House, they 
have raised that to me and that is why I am here today is to 
make sure that you are aware of it, and what a critical tool 
that is in helping to prosecute the war on terror with respect 
to IEDs. So your attention would be greatly appreciated on 
that.
    Secretary Napolitano. Thank you for raising it.
    Mr. Crawford. I yield back.
    Chairman King. The gentleman yields back.
    I want to thank Secretary Napolitano and Director Olsen for 
your time, for your testimony, for the answers you gave. Again, 
we look forward to working with you.
    I want to just say for the record, Members of the committee 
may have some additional questions for the witnesses and we 
would ask you to respond to those in writing. The hearing 
record will be held open for 10 days.
    Without objection, unless either of you object, the 
committee stands adjourned.
    [Whereupon, at 12:45 p.m., the committee was adjourned.]


                            A P P E N D I X

                              ----------                              

    Questions From Chairman Peter T. King for Hon. Janet Napolitano

    Question 1. How do you assess the threat from domestic improvised 
explosive device attacks from terrorists and narco-traffickers? Why has 
DHS not issued a regulation securing a main IED component, ammonium 
nitrate?
    Answer. A review of overseas attacks since 2009 aligns with our 
assessment that IED attacks by a transnational terrorist group continue 
to pose a threat to homeland security. Al-Qaeda's stated goals remain 
consistent and focused on targets that maximize economic damage and 
loss of life. Al-Qaeda-affiliated groups, including al-Qaeda in the 
Arabian Peninsula (AQAP), Tehrik e-Taliban Pakistan (TPP), and al-
Shabaab have all publicly stated that the United States is a legitimate 
target for terrorist attack and each group has successfully employed 
IEDs overseas.
    AQAP, the affiliate that represents the greatest near-term threat 
to the homeland, was the first al-Qaeda affiliate to attempt an attack 
in the United States with their effort to detonate an IED on-board an 
aircraft on Christmas day 2009. AQAP continued to pursue artfully 
concealed IEDs by advancing in Yemen, the October 2010 printer plot.
    In addition to planning operations against the West, AQAP also has 
sought to radicalize and inspire others to conduct attacks. AQAP's 
English-language on-line magazine Inspire, a sophisticated propaganda 
publication geared to a Western audience, provides information on 
manufacturing explosives, constructing an IED, and building a remote-
controlled IED trigger to encourage Homegrown Violent Extremists (HVEs) 
to stage independent attacks.
    Drug trafficking organizations (DTOs) have not conducted an IED 
attack directly against U.S. officials, citizens, or interests in 
Mexico or in U.S. Southwest Border States. DTOs have employed IEDs to 
target commercial and government security interests in Mexico and to 
intimidate rivals and law enforcement.
    DTOs first employed Vehicle Borne Improvised Explosive Devices 
(VBIEDs) in 2010, but have not demonstrated a desire to execute the 
type of large-scale explosive attacks that have been a driving factor 
in plotting by terrorist organizations. Analysis of recovered IEDs in 
Mexico does not provide indicators of direct sharing of technology, 
devices, or training between DTOs and terrorist organizations.
    The Department continues to work on developing comprehensive 
regulations on the sale and transfer of ammonium nitrate, as required 
by section 563 of Division E ``Department of Homeland Security 
Appropriations Act, 2008'' of the Consolidated Appropriations Act, 
2008, Pub. L. No. 110-161 (adding subtitle J ``Secure Handling of 
Ammonium Nitrate'' to title VIII of the Homeland Security Act of 2002). 
This has included extensive consultation with Federal and State 
security partners with a vested interest in securing the sale or 
transfer of ammonium nitrate, as well as with private-sector 
stakeholders.
    The Notice of Proposed Rulemaking for the Ammonium Nitrate Security 
Program was published in the Federal Register on August 3, 2011, and 
the public was given 120 days to provide comment(s) concerning the 
proposed rule. See Ammonium Nitrate Security Program, 76 Fed. Reg. at 
46908. Additionally, the Department held 12 public meetings during the 
120-day comment period to inform the public on the proposed rule, 
listen to their concerns, and gather comments provided during those 
forums.
    The Department continues to move forward with the rulemaking 
process, and expects to develop a final rule in a time frame that 
ensures that DHS can consider and respond appropriately to the concerns 
raised during the public comment period while enabling DHS to comply 
with applicable Federal rulemaking requirements and procedures. The 
final rule must comply with the Secure Handling of Ammonium Nitrate 
provisions of the Homeland Security Act, ensure continued access by the 
public to ammonium nitrate for legitimate purposes, and improve the 
security of ammonium nitrate with minimal economic impacts. The 
Department must also plan, develop, and field information technology 
systems necessary to support the Ammonium Nitrate Security Program, 
which will impact the time frame for implementation of a final rule.
    In addition to the authority granted to DHS by the Secure Handling 
of Ammonium Nitrate provisions of section 563 of the Consolidated 
Appropriations Act of 2008, the Department also has authority under 
section 550 of the Homeland Security Appropriations Act of 2007, Pub. 
L. No. 109-295 (2006), to issue the Chemical Facility Anti-Terrorism 
Standards (CFATS) regulations governing the security of high-risk 
chemical facilities. CFATS addresses hundreds of chemicals including 
ammonium nitrate.
    In developing the Ammonium Nitrate Security Program, DHS intends to 
draw on information gained under the CFATS program about ammonium 
nitrate, and will work to ensure that CFATS and the Ammonium Nitrate 
Security Program complement each other.

    Question 2. What has DHS done to secure sensitive critical 
infrastructure information submitted to DHS by industry?
    How does DHS alert critical infrastructure operators about leaks of 
such information?
    Answer. The Department of Homeland Security (DHS) uses several 
mechanisms to protect sensitive critical infrastructure information, 
including the Protective Critical Infrastructure Information (PCII), 
Sensitive Security Information (SSI), and Chemical-terrorism 
Vulnerability Information (CVI) programs, and other For Official Use 
Only regimes.
    DHS established the PCII Program to implement the provisions of 
Critical Infrastructure Information (CII) Act of 2002, subtitle B of 
Title II of the Homeland Security Act (Pub. L. No. 107-296, 116 Stat. 
2135, sections 211-215), and regulates the use and disclosure of 
information submitted to the Department of Homeland Security (DHS) 
about vulnerabilities and threats to critical infrastructure. Operating 
on authority given by the CII Act, the PCII Program protects critical 
infrastructure information voluntarily submitted to the Federal 
Government by critical infrastructure owners and operators. CVI, a 
category of sensitive, unclassified information established under 
Section 550(c) of the DHS Appropriations Act of 2007 (Pub. L. No. 109-
295) and the Chemical Facility Anti-Terrorism Standards (CFATS) 
regulation, protects certain information developed or submitted as part 
of the CFATS process.
    To date, no leaks or misuse of PCII have been identified. In the 
event that a leak of PCII is identified, the PCII Program Office, 
located within the National Protection and Program Directorate's (NPPD) 
Office of Infrastructure Protection (IP), would notify the owner or 
operator that submitted the critical infrastructure information that a 
leak has occurred and that an assessment of the potential impact of the 
release is underway. While the initial notification may be verbal, the 
PCII Program Manager would also send the submitter a written 
notification.
    DHS safeguards sensitive information by retaining it in systems of 
records associated with each submitter, which allow information 
relating to the compromise of data to be shared with the submitter or 
with those that might be harmed from the loss of data. How this 
information is shared is determined based on the context and the need 
for responding to the loss of the information.

    Question 3. How do DHS expenditures fit in with a National bio-
defense strategy? Does DHS plan to build the Nation Bio and Agro-
defense Facility?
    Answer. In 2009, the National Bio and Agro-defense Facility (NBAF) 
was expected to be fully offset by the proceeds from the sale of Plum 
Island. However, due to the current fiscal climate, the sale of Plum 
Island is not likely to provide adequate funds in the foreseeable 
future. In addition, estimated construction costs for NBAF have 
increased by more than 30 percent as a result of construction delays 
and safety engineering requirements. Furthermore, the Department faces 
significant funding constraints from the Budget Control Act of 2011 
(Pub. L. No. 112-25). At the same time, Congressional appropriations 
have not kept pace with the costs to build the facility expeditiously 
and the aging facility on Plum Island is well past its life expectancy, 
resulting in increased maintenance costs and risk to operate.
    Given current fiscal challenges, and in light of evolving threats 
to U.S. agriculture, in fiscal year 2012, DHS asked the National 
Academy of Science (NAS) to convene a committee of experts to conduct a 
comprehensive assessment of the requirements for a large foreign animal 
and emerging disease research and diagnostic laboratory facility in the 
United States. The Mission Need Assessment was recently completed by 
NAS and provided to the Department of Homeland Security for review.
    The Department looks forward to working with Congress on the future 
of NBAF while maintaining critical research at Plum Island.

    Question 4. The Council on American Islamic Relations (CAIR), the 
Islamic Society of North America (ISNA), and the North American Islamic 
Trust (NAIT) are unindicted co-conspirators in a terror fundraising 
case. What are DHS' relationships with CAIR, ISNA, and NAIT, or their 
members?
    Answer. The Department works with many diverse community groups and 
organizations to build crucial channels of communication, both 
educating DHS about the concerns of communities and giving those 
communities current, accurate information about DHS policies and 
procedures. The Department has worked with CAIR, ISNA, and NAIT in 
community engagement and outreach efforts conducted by a number of DHS 
offices and components around the country.

    Question 5. Please update us on DHS' countering violent extremism 
programs.
    Answer. The Department has responsibility for implementing a range 
of CVE initiatives outlined in the administration's National CVE 
Strategic Implementation Plan (SIP) for Empowering Local Partners to 
Prevent Violent Extremism in the United States. This role includes 
leveraging the Department's analytic, research, and information 
capabilities, engaging State and local authorities and communities to 
bolster pre-existing local partnerships, and supporting State, local, 
Tribal, and territorial law enforcement and communities through 
training, community policing practices, and grants. DHS works closely 
to coordinate and collaborate on these efforts with the National 
Counter Terrorism Center (NCTC), the Department of Justice (DOJ), the 
Federal Bureau of Investigation (FBI), and other interagency and 
community partners.
    The Department is working with its Federal, State, local, Tribal, 
and territorial partners to fully integrate CVE awareness into the 
daily activities of law enforcement and local communities Nation-wide. 
Specifically, DHS has made substantial progress in CVE in three key 
areas:
    1. Better understanding the phenomenon of violent extremism through 
        extensive analysis and research on the behaviors and indicators 
        of violent extremism;
    2. Enhancing operational partnerships with local communities, State 
        and Local law enforcement, and international partners; and
    3. Supporting community policing efforts through curriculum 
        development, training, and grant prioritization.

Better Understanding the Phenomenon of Violent Extremism
    DHS has conducted extensive analysis and research to better 
understand the threat of violent extremism. This includes over 75 case 
studies and assessments produced by the DHS Office for Intelligence and 
Analysis (I&A) since 2009 on home-grown violent extremist activities 
and potential material support activities in the United States on 
behalf of violent extremist groups or causes, including an in-depth 
study that looks at the common behaviors associated with 62 cases of 
al-Qaeda-inspired violent extremists. DHS has also produced numerous 
unclassified homeland security reference aids analyzing domestic 
violent extremist groups.

Enhancing Operational Partnerships and Best Practices with Local 
        Communities, State, and Local law Enforcement, and 
        International Partners
    DHS has made significant advancements in operational CVE exchanges 
with international partners. We have international CVE partnerships 
with Australia, Belgium, Canada, Denmark, Germany, the Netherlands, 
Spain, and the United Kingdom, as well as partnerships with 
international law enforcement organizations such as Europol. For the 
past year, DHS, Europol, and E.U. partners have exchanged information 
on U.S.- and E.U.-based fusion center best practices, CVE training 
standards, and research and case studies, including a joint case study 
on the 2011 Norway attacks. These exchanges help us support State and 
local law enforcement by equipping them with up-to-date analysis on the 
behaviors and indicators of violent extremism, so they can prevent 
potential future violent extremist incidents from occurring in their 
communities. In addition, DHS has coordinated with the Department of 
State to train field-based U.S. Government officials, both domestically 
and internationally, on how to engage and partner with local 
communities to build community resilience against terrorist recruitment 
and radicalization to violence.
    The Department has also significantly expanded outreach to 
communities that may be targeted for recruitment by violent extremists 
and promote a greater awareness of Federal resources, programs, and 
security measures available to communities. For example, the DHS Office 
of Civil Rights and Civil Liberties (CRCL) has held over 72 roundtable 
events Nation-wide since 2011, which have helped to address grievances, 
increase awareness of CVE resources, and build partnerships between 
State and local law enforcement, local government, and community 
stakeholders.

Supporting Community Policing Efforts Through Curriculum Development, 
        Training, and Grant Prioritization
    Over the past year, DHS has worked closely with the State and 
Provincial Police Academy Directors, the International Association of 
Chiefs of Police, the Major City Chiefs Association, the Major City 
Sheriff's Association, NCTC, DOJ, and the FBI to develop CVE training 
for Federal, State, local, and correctional facility law enforcement. 
DHS has hosted seven workshops to receive feedback from front-line 
officers on the training materials, including workshops in Columbus, 
OH, San Diego, CA, Washington, DC, and Minneapolis, MN and the recent 
``Train-the-Trainer'' CVE Workshop in San Diego, CA during the last 
week of September 2012. Two workshops were also conducted for 
correctional facility officers in Sykesville, MD and in Orange County, 
CA.
    DHS launched a new CVE web portal through the Homeland Security 
Information Network (HSIN) for CVE law enforcement training 
practitioners Nation-wide on September 28, 2012. This web portal serves 
as an efficient and easy resource to access CVE training materials, 
which can be incorporated into existing training programs and contains 
over 160 CVE training resources.
    DHS expanded fiscal year 2012 grant guidance to include funding for 
training and local CVE efforts, including participating in CVE training 
workshops, developing CVE training curriculum, participating in the new 
CVE web portal, and incorporating CVE training resources into existing 
training programs.

    Question 6. In Inspire magazine, al-Qaeda member Anwar al-Awlaki 
admitted that he was radicalized in 1991 and traveled to Afghanistan 
for jihad, and that he rebuffed FBI requests to become a source. Now 
that we know Awlaki was a radical and an ``Arab-Afghan'' at the time of 
his interactions with the 9/11 hijackers, should the Government re-
examine the roles of Awlaki and his associates in 9/11?
    Answer. DHS defers to FBI and other investigative partners for 
determinations as to precisely when Anwar al-Awlaki first became 
formally associated with al-Qaeda, and whether or not al-Awlaki had any 
foreknowledge or pre-operational role in the September 11, 2001 
attacks. DHS I&A continues, however, to assess the credibility and 
value of any new information involving the role that now-deceased al-
Awlaki's public statements play--particularly through Inspire 
magazine--in radicalizing subjects to commit acts of violence against 
the United States.

       Questions From Hon. Robert L. Turner for Janet Napolitano

    Question 1. Given that Islamic terror groups are decentralized 
organizations and non-traditional enemies, what do we know about the 
underlying principles of Islamic terror groups and how are we using 
that information to prevent further attacks?
    Answer. Within the context of U.S.-based violent extremism, we know 
that foreign terrorist groups affiliated with al-Qaeda, and individual 
violent extremists, are actively seeking to recruit or inspire 
Westerners to carry out attacks against Western and U.S. targets via 
social media, personal interaction, and publication of magazines.
    The Department operates with the understanding that we face 
significant risk of terrorism from violent extremists who have either 
been recruited by al-Qaeda or its affiliates or inspired by their 
ideology. This threat is real, as evidenced by the recent thwarted 
attacks of domestic violent extremists inspired by al-Qaeda's ideology, 
to include the arrest of Naser Jason Abdo at Fort Hood in July 2011 and 
the arrest of Amine el-Khalifi in February 2012 in Washington, DC.
    Recognizing that communities across the country may face such 
threats, DHS has designed a community-based Countering Violent 
Extremism (CVE) approach that applies to all forms of violent 
extremism, regardless of ideology. We have conducted significant 
analysis and research on multiple types of threats in order to equip 
law enforcement with the tools needed to detect and mitigate all forms 
of violent extremism. This analysis and research is being shared with 
Federal, State, local, Tribal, and territorial authorities, fusion 
centers, local communities, and international law enforcement partners 
to empower, support, and equip them with the knowledge to better detect 
and identify potential behaviors associated with violent extremism to 
prevent violent crime in their communities. All of this information is 
also being integrated into all of the Department's CVE training for 
Federal, State, local, Tribal, territorial and correctional facility 
law enforcement; it is also available on the DHS CVE Training Resources 
web portal for law enforcement training practitioners.

    Question 2. Clearly, terrorists are radicalized early in their 
lives. What specifically is being done to prevent radicalization among 
Muslim youth?
    Answer. Research and analysis suggests that there are multiple 
pathways to violent extremism and that while there may be common 
behaviors that are exhibited prior to an attack, no one factor can 
explain why youth radicalize to violence. It is also important to note 
that the vast majority of Muslim-Americans living in the United States 
do not subscribe to violent extremist ideologies and are actively 
working with local authorities, the FBI, DOJ, and DHS to protect their 
local communities from violence.
    As mentioned in the White House's Strategic Implementation Plan for 
Empowering Local Partners to Prevent Violent Extremism in the United 
State (SIP), partnerships with community members are vital to our 
security, as evidenced by the fact that of the 86 foiled terrorist 
plots against the United States, between 1999-2009, almost half of the 
plots were thwarted with help and participation from communities.\1\ 
The SIP recognizes the importance of forming strong partnerships with 
communities and lists the actions the U.S. Government will take in 
support of a community-based approach to CVE. The DHS Office for Civil 
Rights and Civil Liberties (CRCL) conducts regular roundtable meetings 
across the United States and dozens of community meetings at the 
request of community leaders. CRCL has also conducted youth engagement 
with in cities such as Minneapolis, San Diego, Portland (ME), and 
Columbus (OH) to build trust and to discuss issues such as preventing 
violent extremism.
---------------------------------------------------------------------------
    \1\ ``Building on Clues: Examining Successes and Failures in 
Detecting U.S. Terrorist Plots, 1999-2009,'' Institute for Homeland 
Security Solutions, October 2010.
---------------------------------------------------------------------------
    In 2012, DHS's Science and Technology Directorate (S&T) sponsored a 
study conducted by the National Consortium for the Study of Terrorism 
and Responses to Terrorism (START), a DHS Center of Excellence at the 
University of Maryland. The study identified a range of risk and 
protective factors that may have impacted the involvement of some 
Minneapolis-St. Paul Somali-American youth in violent extremism and, 
based on these factors, provided recommendations on how preventative 
efforts could be developed at the individual, family, community, and 
Government levels. DHS's CVE efforts focus on ensuring that these and 
other findings from research and analysis are made widely available 
through training and workshops to law enforcement training 
practitioners via the DHS CVE Training Resources web portal.

    Question 3. Within the Muslim community there is an internal 
struggle, one leading toward destruction and violence, the other side 
seeking to join the global community and embrace the freedoms of a 
democratic society. Are we conveying all viable alternatives to radical 
Islam, to mainstream Muslims, before moderate are radicalized?
    Answer. Research and analysis suggests that there are multiple 
pathways to violent extremism and that while there may be common 
behaviors that are exhibited prior to an attack, no one factor can 
explain why individuals radicalize to violence. It is also important to 
note that the vast majority of Muslim-Americans living in the United 
States do not subscribe to violent extremist ideologies and are 
actively working with local authorities, the FBI, DOJ, and DHS to 
protect their local communities from violence. Recognizing this, DHS 
has designed a CVE approach that applies to all forms of violent 
extremism, regardless of ideology. DHS has been highly involved in 
implementing the 2011 White House Strategic Implementation Plan (SIP) 
for Empowering Local Partners to Prevent Violent Extremism in the 
United States. The goals of the SIP include: (1) Enhancing engagement 
with and support to local communities; (2) building Government and law 
enforcement expertise; and (3) countering violent extremist propaganda 
while promoting our ideals.
                                 ______
                                 
    [Note.--The response to Questions for the Record which were 
submitted to the Director of the National Counterterrorism Center, the 
Honorable Matthew G. Olsen, necessitated a classified response. These 
were provided to the committee and retained in committee files.]