[House Hearing, 113 Congress] [From the U.S. Government Publishing Office] VISA SECURITY AND OVERSTAYS: HOW SECURE IS AMERICA? ======================================================================= HEARING before the SUBCOMMITTEE ON BORDER AND MARITIME SECURITY of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION __________ MAY 21, 2013 __________ Serial No. 113-18 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PRINTING OFFICE 85-614 PDF WASHINGTON : 2013 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Michael T. McCaul, Texas, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Peter T. King, New York Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Paul C. Broun, Georgia Yvette D. Clarke, New York Candice S. Miller, Michigan, Vice Brian Higgins, New York Chair Cedric L. Richmond, Louisiana Patrick Meehan, Pennsylvania William R. Keating, Massachusetts Jeff Duncan, South Carolina Ron Barber, Arizona Tom Marino, Pennsylvania Dondald M. Payne, Jr., New Jersey Jason Chaffetz, Utah Beto O'Rourke, Texas Steven M. Palazzo, Mississippi Tulsi Gabbard, Hawaii Lou Barletta, Pennsylvania Filemon Vela, Texas Chris Stewart, Utah Steven A. Horsford, Nevada Richard Hudson, North Carolina Eric Swalwell, California Steve Daines, Montana Susan W. Brooks, Indiana Scott Perry, Pennsylvania Vacancy Greg Hill, Chief of Staff Michael Geffroy, Deputy Chief of Staff/Chief Counsel Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director ------ SUBCOMMITTEE ON BORDER AND MARITIME SECURITY Candice S. Miller, Michigan, Chairwoman Jeff Duncan, South Carolina Sheila Jackson Lee, Texas Tom Marino, Pennsylvania Loretta Sanchez, California Steven M. Palazzo, Mississippi Beto O'Rourke, Texas Lou Barletta, Pennsylvania Tulsi Gabbard, Hawaii Chris Stewart, Utah Bennie G. Thompson, Mississippi Michael T. McCaul, Texas (Ex (Ex Officio) Officio) Paul L. Anstine, II, Subcommittee Staff Director Deborah Jordan, Subcommittee Clerk Alison Northrop, Minority Subcommittee Staff Director C O N T E N T S ---------- Page Statements The Honorable Candice S. Miller, a Representative in Congress From the State of Michigan, and Chairwoman, Subcommittee on Border and Maritime Security................................... 1 The Honorable Sheila Jackson Lee, a Representative in Congress From the State of Texas, and Ranking Member, Subcommittee on Border and Maritime Security: Oral Statement................................................. 3 Prepared Statement............................................. 5 Witnesses Mr. John Wagner, Acting Deputy Assistant Commissioner, Office of Field Operations, Customs and Border Protection, U.S. Department of Homeland Security: Oral Statement................................................. 7 Joint Prepared Statement....................................... 9 Mr. James Dinkins, Executive Associate Director, Homeland Security Investigations, Immigration and Customs Enforcement, U.S. Department of Homeland Security: Oral Statement................................................. 15 Joint Prepared Statement....................................... 9 Mr. Shonnie Lyon, Acting Director, Office of Biometric Identity Management, National Protection and Programs Directorate, U.S. Department of Homeland Security: Oral Statement................................................. 17 Joint Prepared Statement....................................... 9 Ms. Rebecca Gambler, Director, Homeland Security and Justice, Government Accountability Office: Oral Statement................................................. 18 Prepared Statement............................................. 20 VISA SECURITY AND OVERSTAYS: HOW SECURE IS AMERICA? ---------- Tuesday, May 21, 2013 U.S. House of Representatives, Subcommittee on Border and Maritime Security, Committee on Homeland Security, Washington, DC. The subcommittee met, pursuant to call, at 10:05 a.m., in Room 311, Cannon House Office Building, Hon. Candice S. Miller [Chairwoman of the subcommittee] presiding. Present: Representatives Miller, Duncan, Palazzo, Barletta, Stewart, Jackson Lee, O'Rourke, and Gabbard. Also present: Representative Bilirakis. Mrs. Miller. The Committee on Homeland Security the Subcommittee on Border and Maritime Security will come to order. The subcommittee is meeting today to examine our Nation's visa security efforts. Our witnesses today are John Wagner, who is acting deputy assistant commissioner from Customs and Border Protection; James Dinkins, who is the executive associate director of Homeland Security Investigations; Shonnie Lyon, who is the acting director of the National Protection and Programs Directorate Office of Biometric Identity Management; and Rebecca Gambler, director of Homeland Security and Justice Section for the Government Accountability Office. I will make a more formal introduction after the opening statements. Our Nation is in the midst of a debate on how to best reform our broken immigration system. As we explore potential changes to our immigration processes, we must also strengthen our border security efforts. A key part of both of those efforts must be serious reforms to our visa process. According to a widely-circulated 2006 Pew Hispanic Center study, as much as 40 percent of all illegal aliens who come into our country do not cross the desert. They actually come in through the front door. They come in through our land, our sea, and air ports of entry, with permission, and then they overstay their visas. If we are serious about border security, the Congress needs to look beyond just the traditional borders--the Northern, the Southern maritime borders--and must reduce the ability of people to overstay their visas. Visa security is by no means a new challenge. We have known for some time that our visa process is vulnerable to exploitation by terrorists and others who seek to do us harm. We all recall that at least four of the 9/11 hijackers were here on visa overstays or were out of status. Among the most important weaknesses the attackers exploited was the porous outer ring of border security. The hijackers passed through U.S. border security a combined total of 68 times without being detected. The man who attempted to conduct a suicide attack on the Capitol just last year had been in the country since 1999; was here on a tourist visa overstay. Another individual arrested in the aftermath of the Boston Marathon bombings, who may have helped destroy evidence, was able to return to the United States despite being out of status on his student visa. These events highlight the fact that vulnerabilities in our visa processing system can have catastrophic consequences. The American people need to know how many more visa overstayers are out there who pose a serious threat to the security of our homeland. Clearly, more must be done to ensure the integrity of the visa system, including enhancements to Immigration and Customs Enforcement's ability to identify and to promptly remove those who overstay their visa. Pushing out the border and conducting more vigorous, more rigorous vetting of VISIT applicants overseas thru the Visa Security Program, which stations ICE agents overseas, as well as the inclusion of fingerprints into the visa application process, have made the visa process more secure than it was, certainly, before 9/11. But as well, we are also very concerned with our ability to track and to promptly remove overstays who remain in our country. ICE does not have a way to identify and track down overstays who entered the country prior to 2003, before US- VISIT was created, and we are concerned that we do not even have a good handle on the total number of overstayers in the country right now. I understand that the Department has plans to release some of the overstay data by the end of the year. However, we are debating these issues right now, and I would like to see the data while we are discussing immigration reform, not after. I look forward to hearing from our witnesses today on progress made since the creation of US-VISIT, now called the Office of Biometric Identity Management, identifying overstays, especially those that pose National security and public safety threats. I think that Members will be most interested in how the Department of Homeland Security plans to implement a comprehensive exit system that will prevent terrorists from successfully exploiting the visa system; a requirement, I might add, that was first mandated in 1996. If we are serious about controlling who comes into the Nation and preventing another attack we need to get serious about an exit program, a robust exit program. Biometric might not be the right solution until the technology is mature enough to not interfere with passenger flow. But we certainly want to be interested--we will be interested in hearing from the witnesses on how we can move forward with a workable plan in the interim. I certainly don't want to discount the progress that has been made especially over the last 2 years in connecting many of the DHS's databases to the arrival and departure information system, which has helped to narrow down the number of people we are concerned about. But we cannot have vulnerabilities that we have known about for some time remedied only after a high- profile incident like that that happened, that tragedy in Boston. Last Congress, this subcommittee held several hearings on the backlog of unvetted records that numbered more than 1.6 million. Those have been screened for terrorism and public safety concerns, but a persistent backlog of unmatched records remains. According to the preliminary findings of the GAO report, there are more than 1 million of these records; a million people that we cannot confirm whether or not they have left the country. ICE's prioritization scheme virtually ensures that a large backlog will continue to exist well into the future. Visa security is a critical component of our border security efforts, and we really cannot reform our immigration system without taking a hard look at the Department's efforts to develop a robust exit system. The American people need to be confident that all of the holes in the border are as secure as possible. So we will be very interested in hearing from the witnesses on that point. With that, I would like to yield to the Ranking Member, the gentlelady from Texas, for her opening statement. Ms. Jackson Lee. Thank you, Madam Chairwoman, and thank you for having--holding this hearing. I am glad to join you in holding this hearing today to examine the issue of visa overstays--those who enter this country through the proverbial front door, but fail to depart in a timely way--and their effect on our Nation's security. I know it goes without saying, and it has been said over and over again, and it is a reminder that I think--however, that is very important. That those who were engaged in the 9/11 horrific and heinous terrorist act were, in fact, some of them, visa overstays. We have had that scar for, now, 12 years going on 13 years. It should be a very important reminder. However, we know that people who are visa overstays are, by and large, individuals who seek an opportunity in this country, are students, family members. But even beyond that, knowing that most of these are innocent and desirous of good things, this is an important process. So I want to thank the gentlelady from California and the gentleman from Pennsylvania in their discussion of the mark-up, who mentioned the idea of a concept to deal with visa overstays, which I asked to join them. I look forward to my staff working with them so that we can present an idea that will be constructive. I think this hearing, overall, will be enormously constructive as we move the Homeland Security border bill, border security bill, to the floor. We had a very active bipartisan discussion about visa overstays, as I have just said, in our recent subcommittee mark-up H.R. 1417, the Border Security Results Act of 2013. Last week, I was pleased to support an amendment at the full committee mark-up of the bill to require the Department of Homeland Security to develop an implementation plan for a biometric exit capability at ports of entry, which is an essential part of our effort to address overstays. I am committed to working with my colleagues on this very important issue. So far, this Congress' subcommittee has focused much of its oversight in legislative efforts on what DHS must do better--to better secure our land borders, and the Southern Border in particular. While this is a critically important matter, it represents only one part of broader border security and immigration enforcement issue. Addressing visa overstays is certainly equally important. Indeed, finding a way to deal with the overstay issue will likely be essential to any immigration reform and border security package considered in Congress. It is my hope that as the great work of this subcommittee, Madam Chairwoman, continues, and the moving of the border security bill, that we will be in front of any question to be able to answer such so that no obstacles stop us from doing what really will make this country safer. That is, comprehensive immigration reform. I want all the questions answered, and I want us to have solutions. Yes, I think it would be very important to put in new processes for this effort of visa overstays. Finding a way to deal with the overstay issue will be very important. Just this week, an amendment to address this issue was accepted at the mark-up of the Senate immigration bill. We have examined this issue regularly in Judiciary Committee, where I am also a member. It is important to note that overstays are one of the reasons for many questions on the immigration control system. A small handful of those who overstay their visas may also pose a threat, as I mentioned earlier, as it relates to the 9/11 hijackers. There are many important questions to be answered regarding visa overstays, and I hope we can have a productive dialogue about some of those questions here today. For example, what security issues do individuals who overstay their visas pose to the United States? Frankly, I believe that an inventory of these overstays is important, even as we try to craft our legislative fix. Is there an ability for DHS to know, by having a list and date of entry and date of departure? Is that inventory, is that digitized, is it on a computer, can it be pulled up by birth date? So what is DHS doing to identify and locate individuals who are visa overstays, but also may pose a threat? What are the indicia that are used to be able to track individuals, even now, without a better construct? What can be done to prioritize enforcement resources and enhance efforts to address overstays? I will say that I am encouraged by the recent shift of overstay analysis and exit operation responsibilities from US-VISIT to ICE and CBP. I am hopeful that this new configuration of responsibilities will help ICE and its DHS partners address potential overstays in a more efficient way. I want to qualify and say that I am mindful that these individuals are mostly harmless and that they are here because our immigration system does not provide them a pathway. That is why we must match these two processes together. I know that we have a very active business community on the Southern Border, active business community on the Northern Border. I know that business is done. I know that people come over with visas. Who knows what part of businesses, what part of families, what part of tourists, what part of students? We know that DHS currently has over a million unmatched records representing potential overstays. While these individuals have been, and continue to be, vetted against National security and criminal database, we hope, we have no record of them exiting the country. DHS has reduced the number of unmatched records significantly from just a couple of years ago, but the problem persists. I do want to take note of the work that DHS has done. I want to hear from ICE and GAO today about what more can be done to reduce the number of unmatched records allowing DHS to focus on locating individuals who we have confidence are still in the country. I am curiously optimistic--cautiously optimistic that, given CBP responsibility for developing and deploying, a biometric exit system will help DHS make progress on this long overdue mandate. I know as CBP and ICE come before these committees, sometimes they ask the question: What are we expected to do? I want to qualify, for the last time, as I close my remarks, to indicate that we know that there are provisions such as prosecutorial discretion that ICE uses. I want to make sure that my comments do not in any way undermine my enthusiasm about that process when it is needed, when it is necessary, and when it is warranted. I also want to make note that we are running into, Madam Chairwoman, some difficulties in a badging issue in my very large airport, in Houston, Texas. I am thinking that that is an issue of sequestration and the lack of dollars. I hope that we will have that matter resolved. So when CBP comes and ICE comes, I hope they know that we respect what they do. We want to hear about the concerns that they have. We want to make sure that the laws that they have to be merciful are not countered because we want them to be efficient and right. Congress first mandated an entry-exit system for visitors to the United States in 1996. While DHS has made significant progress by implementing biometric entry system, a solution for biometric exit has been far more difficult. Let me just close by indicating that there has been a troubled history with the system of kiosks. We need to find a clear path forward on the biometric exit system. I want to hear more today. I want to know what we can--how do we work with the biometric system. I am pleased to see the improvements, but I believe it is very important for this discussion today to ensure that we have a very secure border and that we work hand-in-hand with the idea of comprehensive immigration reform. I thank the gentlelady for her yielding, and I yield back my time. [The statement of Ranking Member Jackson Lee follows:] Statement of Ranking Member Sheila Jackson Lee May 21, 2013 I thank Chairman Miller for holding this hearing today to examine the issue of visa overstays--those who enter this country through the proverbial front door but fail to depart in a timely way--and their effect on our Nation's security. We had a very active, bi-partisan discussion about this issue during our recent subcommittee mark-up of H.R. 1417, the Border Security Results Act of 2013. Last week, I was pleased to support an amendment at the full committee mark-up of the bill to require the Department of Homeland Security to develop an implementation plan for a biometric exit capability at ports of entry, which is an essential part of our effort to address overstays. I am committed to working with my colleagues on this very important issue. So far this Congress, the subcommittee has focused much of its oversight and legislative efforts on what DHS must do to better secure our land borders, and the Southern Border in particular. While this is a critically important matter, it represents only one part of the broader border security and immigration enforcement issue. Addressing visa overstays is certainly equally important. Indeed, finding a way to deal with the overstay issue will likely be essential to any immigration reform and border security package considered in Congress. Just this week, an amendment to address this issue was accepted at the mark-up of the Senate immigration bill. We have examined this issue regularly in the Judiciary Committee, where I am also a Member. It is important to note that overstays are more than an immigration control concern. A small handful of those who overstay their visas may also pose a threat to our homeland security, like several of the 9/11 hijackers. There are many important questions to be answered regarding visa overstays, and I hope we can have a productive dialogue about some of those questions here today. For example, what security issues do individuals who overstay their visas pose to the United States? What is DHS doing to identify and locate individuals who may pose such a threat? What can be done to prioritize enforcement resources and enhance efforts to address overstays? I will say that I am encouraged by the recent shift of overstay analysis and exit operations responsibilities from US-VISIT to ICE and CBP. I am hopeful that this new configuration of responsibilities will help ICE and its DHS partners address potential overstays in a more efficient way. We know that DHS currently has over a million ``unmatched records'' representing potential overstays. While these individuals have been and continue to be vetted against National security and criminal databases, we have no record of them exiting the country. DHS has reduced the number of unmatched records significantly from just a couple of years ago, but the problem persists. I want to hear from ICE and GAO today about what more can be done to reduce the number of unmatched records, allowing DHS to focus on locating individuals who we have confidence are still in the country. I am cautiously optimistic that giving CBP responsibility for developing and deploying a biometric exit system will help DHS make progress on this long-overdue mandate. Congress first mandated an entry-exit system for visitors to the United States in 1996. While DHS has made significant progress by implementing a biometric entry system, a solution for biometric exit has been far more difficult to come by. We have seen the troubled history of this effort, from a system of kiosks located in inconvenient and inconsistent locations in airports, to two pilots involving CBP and TSA, each of which had advantages and disadvantages. What is needed now is a clear path forward on biometric exit, and I hope to hear more from our witnesses today on what that path will be. While not a substitute for biometric exit, I am pleased to see recent efforts to enhance biographic exit, particularly for individuals crossing the Northern Border. However, addressing biographic exit at the Southern Border is more problematic and will take more resources and ingenuity to develop a workable solution. America's borders will only be secure when we address not only those who walk through the desert to come here, but also those who arrived in this country through our front door. Mrs. Miller. I thank the gentlelady for her comments. Other Members of the committee are reminded that opening statements might be submitted for the record. I would just say, before I introduce the witnesses, that immigration reform is of interest, as our country debates this, by other countries as they are watching what we are doing in relation to border security. It is interesting to note that that is particularly so with visa securities, as evidenced by the presence of a media outlet here today from Russia, who is covering these proceedings. I just point that out for the Members. We have four distinguished witnesses before us today for this important topic. First of all, Dr.--or, excuse me, Mr. John Wagner--you could be a doctor--is the acting deputy assistant commissioner from the U.S. Customs and Border Protection. Mr. Wagner formerly served as the executive director of admissions and passenger programs, with responsibility for all traveler- related policies and programs, including the Trusted Traveler Program, the electronic system for travel authorization, and the Immigration Advisory Program. And the Fraudulent Document Analysis unit. Mr. James Dinkins, who has been here on other occasions--we welcome you back, sir, as well--is the executive associate director of Homeland Security Investigations. Prior to assuming his current position, Mr. Dinkins held a number of key leadership positions within ICE, including acting director for the Office of Professional Responsibility, chief of ICE's Financial Investigation Programs, and assistant special agent in charge for HSI Michigan. Mr. Shonnie Lyon is the acting director of the National Protection and Programs Directorate Office of Biometric Identity Management, OBIM, formerly known as the US-VISIT program. It is the lead entity in the Department of Homeland Security for Biometric Identity Management Services across the Government. Mr. Lyon is also responsible for overseeing the day-to-day operations of that program. Ms. Rebecca Gambler, again, has been before our committee on a number of occasions in this Congress and the last Congress, is the acting director in the U.S. Government Accountability Office's Homeland Security and Justice Team. Ms. Gambler leads the GAO's work on border security and immigration issues. The witnesses' full written statements will appear in the record. The Chairwoman now recognizes Mr. Wagner for his opening comments for 5 minutes. STATEMENT OF JOHN WAGNER, ACTING DEPUTY ASSISTANT COMMISSIONER, OFFICE OF FIELD OPERATIONS, CUSTOMS AND BORDER PROTECTION, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Wagner. Good morning, Chairwoman Miller, Ranking Member Jackson Lee, and distinguished Members of the subcommittee. Thank you for the opportunity to appear before you on behalf of the dedicated men and women of U.S. Customs and Border Protection to discuss our role in addressing visa overstays. CBP is responsible for securing our Nation's borders while facilitating the flow of legitimate international trade and travel that is so vital to our Nation's economy and prosperity. Within this broad responsibility, our priority mission remains to prevent terrorists and terrorist weapons from entering the United States. We recognize that those who pose a National security or public safety threat may seek to commit immigration fraud by way of overstaying a visa in order to remain in the United States. CBP operates at more than 320 ports of entry and processes nearly 1 million travelers each day as they enter the United States. About 30 percent of those, about 100 million people a year, and travelers who arrive via commercial aviation. DHS and CBP have developed and strategically deployed resources to detect, assess, and, when necessary, mitigate risks, including potential overstays at the earliest possible point and throughout the travel continuum. Prior to a foreign national traveling to the United States, they must either obtain a visa from the Department of State or an Electronic System for Travel Authorization, also known as an ESTA, if they are traveling under the visa waiver program by air or sea. When applying for a visa, travelers must submit an application and provide fingerprints for enforcement screening. These fingerprints are submitted to IDENT, maintained by the Office of Biometric Identity Management, OBIM, to determine if there is any adverse action, and adverse information, available. VWP travelers apply for an ESTA on-line prior to travel, and the biographical application data is correlated against and maintained in CBP's text database. CBP utilizes the visa and the ESTA information, as well as passenger name record data and Advance Passenger Information Manifests, also known as APIS, to assess the risks of all passengers, regardless of citizenship, on all inbound and outbound international flights before they depart. CBP's National Targeting Center, or the NTC, analyzes traveler data through the advantaged targeting system and uses advanced software to apply intelligent-driven targeting rules to conduct a risk assessment. For air travelers, some persons of interest are referred for further questioning prior to boarding the plane. CBP has officers located in 11 airports in 9 foreign locations as part of the Immigration Advisory Program to identify and address passengers of concern long before they reach the physical border of the United States. These CBP officers work in partnership with foreign law enforcement officials to evaluate potential risks, including potential possible overstays, and then work in coordination with commercial airlines to issue no- board recommendations to the airline to keep the suspected high-risk or inadmissible passengers from traveling to the United States. In locations where we do not have immigration advisory officers stationed, we also work through our National Targeting Center and our regional carrier liaison groups to contact airlines directly in order to advise of no-board recommendations. The NTC vetting process for international passengers continues while the flight is en route to the United States in order to identify any travelers who, although not necessarily National security risks, may need a more thorough inspection on the first port of entry upon arrival in the United States. At the land border ports, advanced information is generally not available unless the passengers are enrolled in a Trusted Traveler Program, like NEXUS or SENTRI, or if they are arriving by rail or chartered bus and that company is voluntarily submitting APIS data to CBP. On the land border, we are well- positioned to address admissibility and overstay risk. The Western Hemisphere Travel Initiative reduced the number of acceptable documents from more than 8,000 to a core set of six, allowing CBP--through the application of RFID technology--to increase the percentage of documents verified and queried from CBP from 5 percent in 2005 to over 97 percent today. The ability for CBP officers to access real-time and reliable information about non-immigrants seeking administration to the United States is critical to our anti- terrorism and anti-fraud efforts. Upon arrival in the United States, all persons are inspected by CBP officers. This inspection begins with the officers scanning the traveler's entry document and performing a query of several databases. Most foreign nationals arriving at U.S. airports, CBP officers will capture their fingerprints and photographs, which is used to verify identity against the information provided by the Department of State at the time of visa application. In addition, each traveler is interviewed by a CBP officer to determine the purpose and their intent to travel, and whether any further inspection is necessary. Outbound inspection, namely the collection of exit data for persons departing the United States, is crucial in order to match entry records and, therefore, determine who is lawfully abiding by the terms of their administration and to sanction those who are not. The exit system in the air environment is similar to inbound targeting, in that CBP obtains advanced outbound manifest information through the APIS system from air and sea carriers prior to departure. As soon as APIS indoor becomes available, CBP immediately begins the screening and vetting process of the outbound flight for possible matches to the terrorist screening database as well as other law enforcement records. At the land border, the standard mechanism for gathering departure information is the collection of the form I-94 or I-94W on the traveler's exit. CBP is working with the Canadian government under the Beyond the Border Plan also to facilitate the exchange of entry information so that the entry into one country is considered an exit from the other in the land border environment. A pilot of this exchange was completed in January of this year, and phase two will commence at the end of next month, where both countries will exchange data on third-country nationals. All arrival and departure information collected by CBP is submitted to the Arrival and Departure Information System, also known as ADIS, which is available to ICE and Department of State and other agencies to assist with the determination and enforcement of overstays. DHS has made significant progress in preventing terrorists from exploiting the visa process, and further technological investments will enhance DHS and CBP's ability to address threats in a more effective and efficient manner than before. We will continue to work closely with our partners to combat visa fraud and identify potential travelers to the United States who may pose a threat. Thank you for allowing me the opportunity to testify today, and I look forward to answering any of your questions. [The joint statement of Mr. Wagner, Mr. Dinkins, and Mr. Lyon follows:] Joint Prepared Statement of James A. Dinkins, John Wagner, and Shonnie Lyon May 21, 2013 introduction Chairman Miller, Ranking Member Jackson Lee, and distinguished Members of the subcommittee. Thank you for the opportunity to discuss the efforts of the U.S. Department of Homeland Security (DHS) to prevent the exploitation of our non-immigrant visa system by terrorists and criminals. Every day, Federal, State, local, and Tribal government officials verify the identities of individuals for a variety of purposes to determine whether they pose a risk to the United States and whether they meet the requirements for a specific Government benefit or credential. Aliens who violate their immigration status and overstay their authorized periods of admission implicate critical areas of DHS's mission to protect National security and promoting the integrity of our immigration system. dhs overseas presence and coordination with the u.s. department of state (dos) Stopping threats before they reach our shores is one of DHS's most important priorities. The U.S. Immigration and Customs Enforcement (ICE) Office of International Affairs has personnel in 75 offices in 48 countries who collaborate with international counterparts and Federal partner agencies in joint efforts to disrupt and dismantle transnational criminal organizations engaged in money laundering, contraband smuggling, weapons proliferation, forced child labor, human rights violations, intellectual property rights violations, child exploitation, human smuggling and trafficking, and many other violations. Additionally, ICE facilitates the repatriation of individuals with final orders of removal, returning violators and those unlawfully present to their home countries. Effective border security requires broad information sharing and cooperation among U.S. agencies. In October 2006, ICE entered into to a memorandum of understanding (MOU) with the DOS Bureau of Consular Affairs in order to exchange visa and immigration data. The agreement has allowed ICE and DOS to exchange information contained in each other's electronic databases pertaining to foreign persons seeking entry into the United States. This exchange of information allows DOS Consular Affairs personnel to query and access ICE and U.S. Customs and Border Protection (CBP) immigration violator records contained in ICE's Enforcement Integrated Database. DOS Consular Affairs personnel can then take into consideration prior immigration violations when adjudicating visa applications for foreign persons who have applied to enter the United States. The exchange of information between DOS and ICE also allows ICE enforcement personnel to query the DOS Consular Consolidated Database and access visa application information for foreign persons who are being investigated by ICE. In January 2011, ICE signed an MOU outlining roles, responsibilities, and collaboration between ICE and the DOS Bureaus of Consular Affairs and Diplomatic Security. The MOU governs the day-to- day operations of ICE agents conducting visa security operations at U.S. embassies and consulates abroad. To facilitate information sharing and reduce duplication of efforts, ICE and DOS conduct collaborative training and orientation prior to overseas deployments. Once they are deployed to overseas posts, ICE and DOS personnel work closely together in working groups, meetings, training, and briefings, and engage in regular and timely information sharing. ICE continues to evaluate the need to screen and investigate additional visa applicants at high-risk visa-issuing posts beyond the 19 such posts at which the agency currently operates. ICE will continue to conduct joint site visits with DOS to identify locations for deployment based on emerging threats. We look forward to continuing to report back to you with updates on this process. In addition, CBP uses advance information and a select overseas footprint to address concerns long before they reach the physical border of the United States. Using its Automated Targeting System, CBP leverages all available advance passenger data, including the Passenger Name Record (PNR) and Advance Passenger Information System data, United States-bound travel reservations, Electronic System for Travel Authorization applications, visa applications, passenger manifests, previous crossing information, intelligence, and law enforcement information, as well as open-source information in its anti-fraud and anti-terrorism efforts at the National Targeting Center (NTC). Immigration Advisory Program officers work in partnership with foreign law enforcement officials to evaluate potential risks, including possible overstays, and then work in coordination with commercial air carriers to issue no-board recommendations to the airline to keep suspected high-risk or inadmissible passengers from traveling to the United States. In fiscal year 2012, CBP made more than 9,500 no-board recommendations to carriers. The NTC vetting process for international passengers continues while the flight is en route to the United States in order to identify any travelers who, although not necessarily National security risks, may need a more thorough inspection at the first port of entry upon arrival in the United States. dhs visa security program The Homeland Security Act directs DHS to assist in the identification of visa applicants who seek to enter the United States for illegitimate purposes, including criminal offenses and terrorism- related activities. The visa adjudication process often presents the first opportunity to assess whether a potential non-immigrant visitor or immigrant poses a threat to the United States. The Visa Security Program (VSP) represents ICE's front line in protecting the United States against terrorists and criminal organizations by preventing foreign nationals who pose as a threat to National security from entering the United States. ICE deploys trained special agents overseas to high-risk visa adjudicating posts in order to identify potential terrorist and criminal threats before they reach the United States by conducting targeted, in-depth reviews of individual visa applications and applicants prior to visa issuance, and making recommendations to consular officers to refuse or revoke visas when warranted. DHS actions complement the consular officers' screening, applicant interviews, and reviews of applications and supporting documentation. In March 2010, the NTC implemented a program to conduct continuous vetting of valid U.S. nonimmigrant visas. Recurrent vetting ensures that changes in a traveler's visa status are identified in near real- time, allowing CBP to timely determine whether to provide a ``no-board recommendation'' to a carrier, to recommend that DOS revoke the visa, or to notify the appropriate domestic ICE office regarding individuals determined to be within the United States. Since the program's inception, DOS has revoked more than 4,852 visas based on requests from CBP on information uncovered after a visa was issued. In support of the VSP, ICE, and CBP, in collaboration with DOS, have initiated an automated pilot program to enhance on-going visa security efforts. The Pre-Adjudicated Threat Recognition Intelligence Operations Team (PATRIOT) initiative is the automated screening of visa application information against DHS holdings prior to interview. The process includes in-depth vetting of applicants identified as having potential derogatory information, who may be of investigative interest, or ineligible to receive U.S. visas. The PATRIOT initiative takes a risk-based approach and uses interagency resources from ICE, CBP, DOS, and the intelligence community to identify National security, public safety and other visa concerns. In 2012, Visa Security Program special agents screened more than 1.3 million visa applicants in collaboration with the DOS. In 2014, VSP will enhance visa vetting by increasing automated data exchange with DOS and CBP's NTC so that the flow of on- line visa information to DHS systems will be automated and information will be sent back to DOS also using an automated interface. ICE will leverage modernization efforts to increase investigations of visa applicants who pose the greatest threats to National security such as terrorism, counter-proliferation and export violations, and human rights and war crime violations. student and exchange visitor program The Student and Exchange Visitor Program (SEVP) is funded by fees collected from non-immigrant students, exchange visitors, and participating schools. It manages information on non-immigrants whose primary reason for coming to the United States is to study at U.S. institutions certified for inclusion in the Student and Exchange Visitor Information System (SEVIS) database. SEVIS tracks non-immigrant students, exchange visitors, and their dependents during their authorized stays in the United States. Over the past several months, DHS has taken steps to upgrade SEVIS. Earlier this month, DHS implemented a technological solution that ensures that CBP inspectors at our ports of entry have the most current information regarding a student visa holder's status at the time of their entry and exit from the United States. On a daily basis CBP's TECS database will be updated with a record of individual status changes to an individual's I-20. Thus, if that individual presents themself for inspection before a CBP Officer, the officer would see that there was a status indication change and the I-20 should be checked/validated via SEVIS to assist in a proper admissibility decision. These improvements will be supplemented later this month through a system upgrade that improves SEVIS's interface with the Arrival Departure Information System (ADIS), which displays critical travel data such as those found on the form I-94 (admission number, passport expiration date, and visa expiration date). This upgrade will automate the lookout for SEVIS violators and improve communication between the two systems in order to better identify overstays using internal reporting capabilities and security control remediation for authorized users including CBP Officers. An additional upgrade allows DOS to also access and record information in SEVIS records, which further enhances our situational awareness of foreign students. SEVIS contains the records of more than 1.1 million active non- immigrant students, exchange visitors, and their dependents, as well as information on approximately 10,000 SEVP-certified institutions. SEVP regulates schools' eligibility to enroll non-immigrant students for academic and vocational training purposes, and manages participating schools as well as students in the F (academic) and M (vocational) visa classifications and their dependents. DOS manages the Exchange Visitor Program for non-immigrants in the J visa classification, which enables foreign nationals to come to the United States to teach, study, conduct research, demonstrate special skills, or receive on-the-job training for periods ranging from a few weeks to several years. SEVP is responsible both for certifying schools and for withdrawing certification from non-compliant schools. The certification process supports the law enforcement functions of furthering National security and protecting the integrity of our Nation's borders by providing consistent, comprehensive oversight while preserving the Nation's tradition of welcoming non-immigrant students and exchange visitors. SEVP collects, maintains, and provides information to interagency partners so that only legitimate non-immigrant students and exchange visitors gain entry to, and remain in, the United States. The SEVP program provides timely information to support the Department's mission and facilitates the sharing of data with our Federal partners. Additionally, the data maintained by SEVP in SEVIS supports the DOS's Bureau of Consular Affairs visa process by providing advanced electronic data on non-immigrant visa applicants prior to visa issuance. The non-immigrant student and exchange visitor programs that bring F, J, and M visa holders to the United States are of immense value to all countries involved, as they serve to strengthen relations between our Nation and others while fostering intercultural understanding. These programs produce economic benefits as well with the U.S. Department of Commerce estimating that non-immigrant students, exchange visitors, and their dependents contributed more than $21 billion to the U.S. economy through their expenditures on tuition and living expenses during the 2011-2012 academic year. SEVP has been working diligently to address the Government Accountability Office (GAO) recommendations contained in a report issued last fall entitled ``Student and Exchange Visitor Program: DHS Needs to Assess Risks and Strengthen Oversight Functions.'' As part of this effort, SEVP has partnered with the Federal Aviation Administration (FAA) to ensure proper certification for flights schools. As a result of this collaboration, SEVP has issued new guidance clarifying that all flight schools must have final FAA Part 141 certification and has completed identifying and notifying all flight schools that do not meet this standard that they will be withdrawn. Additionally, even prior to the GAO recommendation to focus more on risk, SEVP has also taken on several risk-management initiatives to identify and analyze programmatic risk over the past 2 years. This includes the development of a school risk scorecard, a risk-informed compliance methodology, and an analysis of characteristics associated with high-risk schools. the counterterrorism and criminal exploitation unit The Counterterrorism and Criminal Exploitation Unit (CTCEU) is the first National program dedicated to the enforcement of non-immigrant visa violations. Each year, the CTCEU analyzes records of hundreds of thousands of potential status violators after preliminary analysis of data from SEVIS and the Overstay Analysis Unit (OAU) along with other information. After this analysis, CTCEU determines potential violations that warrant field investigations and/or establishes compliance or departure dates from the United States. Between 15,000 and 20,000 of these records are analyzed each month and, since the creation of the CTCEU in 2003, over 2 million such records have been analyzed using automated and manual review techniques. Today, through the CTCEU, we proactively develop cases for investigation in cooperation with SEVP and OAU. These programs enable special agents to access information about the millions of students, tourists, and temporary workers present in the United States at any given time, and to identify those who have overstayed or otherwise violated the terms and conditions of their admission. ICE special agents and analysts monitor the latest threat reports and proactively address emergent issues. This practice, which is designed to detect and identify individuals exhibiting specific risk factors based on intelligence reporting, including travel patterns, and in-depth criminal research and analysis, has contributed to DHS's counterterrorism mission by initiating or supporting high-priority National security initiatives based on specific intelligence. In order to ensure that the potential violators who pose the greatest threats to National security are given priority, ICE uses intelligence-based criteria, developed in close consultation with the intelligence and law enforcement communities. ICE assembles the Compliance Enforcement Advisory Panel (CEAP), which is comprised of subject matter experts from other law enforcement agencies and members of the intelligence community, who assist the CTCEU in keeping targeting methods in line with the most current threat information. The CEAP is convened on a tri-annual basis to discuss recent intelligence developments and update the CTCEU's targeting framework, in order to ensure that the non-immigrant overstays and status violators who pose the greatest threats to National security are targeted. To further strengthen the Nation's enforcement efforts concerning overstays and other status violations, DHS is currently assessing various approaches to sharpen the focus of programs that address vulnerabilities exploited by visa violators. overstay analysis unit DHS is focused on enhancing its vetting initiatives across the full mission space of homeland security by providing real-time biometric functions to its front line operational components while continuing to set Government-leading biometric policies and standards. To this end, the OAU analyzes biographical entry and exit records stored in the National Protection and Programs Directorate's (NPPD) Office of Biometric Identity Management (OBIM) Arrival and Departure Information System (ADIS) to further support DHS's ability to identify international travelers who have remained in the United States beyond their authorized periods of admission. DHS's Automated Biometric Identification System (IDENT) and ADIS provide person-centric information by searching biometric and biographic data against Government databases to establish and confirm the identities of individuals that DHS has already encountered. OBIM supports DHS components by providing matching services against its databases and returning any linked information when a match is made as they vet those identities of individuals already encountered by DHS to identify known or suspected terrorists, National security threats, criminals, and those who have previously violated U.S. immigration laws. The OAU analyzes and validates two types of non-immigrant overstay records: Out-of-country overstays (OCO) and in-country overstays (ICO). OCO records pertain to visitors who stayed beyond their authorized admission period and subsequently departed the country. The OAU validates these violations based on their reported departure dates and creates biometric and biographic lookouts for these subjects. The lookouts are posted in two separate databases: The OBIM Automated Biometric Identification System (IDENT) Secondary Inspection Tool and CBP's TECS, respectively, to alert and notify DOS consular officers and CBP Officers of a subject's violation before he or she is granted a visa or re-entry to the United States. ICO records pertain to visitors with no evidence of departure or adjustment of status upon expiration of the terms of their admission. The OAU reviews and validates these ADIS system identified violations based upon ICE identified categories of interest. The OAU makes overstay and status violation referrals from three unique sources, which apply respectively to typical overstay violators, admitted watch list subjects, and Visa Waiver Program (VWP) violators. The first source, non-immigrant overstay leads, is used to generate field investigations by identifying foreign visitors who violate the terms of their admission by remaining in the United States past the date of their required departure. The second source, admitted watch list leads, monitors records for individuals who, at the time of admission to the United States, were the subject of a watch list record containing derogatory information that did not render the individual inadmissible to the United States, but did warrant monitoring their visit. The third source is CTCEU's Visa Waiver Enforcement Program (VWEP). Visa-free travel to the United States builds upon our close bilateral relationships and fosters commercial and personal ties among tourist and business travelers in the United States and abroad. The VWP, the primary source of non-immigrant visitors from countries other than Canada and Mexico, currently allows eligible nationals of 37 countries \1\ to travel to the United States without a visa and, if admitted, to remain in the country for a maximum of 90 days for tourist or business purposes. Prior to the implementation of the VWEP in 2008, there was no National program dedicated to addressing overstays within this population. Today, ICE regularly scrutinizes a refined list of individuals who have been identified as potential overstays who entered the United States under the VWP. One of the primary goals of this program is to identify those subjects who attempt to circumvent the U.S. immigration system by obtaining travel documents from VWP countries. --------------------------------------------------------------------------- \1\ The list of designated VWP countries can be found at 8 C.F.R. 217.2, with the most recent designation being that of Taiwan in October 2012. The Taiwan Relations Act of 1979, Public Law 96-8, Section 4(b)(1), provides that ``[w]henever the laws of the United States refer or relate to foreign countries, nations, states, governments, or similar entities, such terms shall include and such laws shall apply with respect to Taiwan.'' 22 U.S.C. 3303(b)(1). Accordingly, all references to ``country'' or ``countries'' in the Visa Waiver Program authorizing legislation, Section 217 of the Immigration and Nationality Act, 8 U.S.C. 1187, are read to include Taiwan. This is consistent with the United States' one-China policy, under which the United States has maintained unofficial relations with Taiwan since 1979. --------------------------------------------------------------------------- creation of the office of biometric identity management The Consolidated and Further Continuing Appropriations Act, 2013 (Public Law 113-6) enacted on March 26, 2013, transferred the core of United States Visitor and Immigrant Status Indicator Technology (US- VISIT) Program staff to stand up OBIM under NPPD. Biometric identity management plays a critical role in supporting the DHS mission to secure the Nation, and this office will leverage its experience and expertise to provide biometric and associated biographic identity verification and analysis services to current and existing customers within DHS, and with our Federal, State, local, the intelligence community, and foreign partners. The act also aligns operational capabilities and realizes efficiencies by transferring US-VISIT's overstay analysis functions to ICE and moves entry/exit policy and operations to CBP. As the lead entity within DHS responsible for biometric identity management services, OBIM is focused on improving biometric and associated biographic data sharing through system interoperability with the U.S. Departments of Defense, Justice, and State towards a ``whole-of- Government'' approach to identity services, and with trusted international partners to increase National and global security. By storing, matching, and analyzing biometric data linked to biographic information, OBIM provides homeland security decision makers with person-centric, actionable information on immigration violators, criminals, and known or suspected terrorists to enhance the Nation's safety and resiliency. Biometric information sharing between the Federal Bureau of Investigation's Criminal Justice Information Services and OBIM is the foundation of the use of IDENT/Integrated Automated Fingerprint Identification System (IAFIS) interoperability under ICE's Secure Communities. Through the use of IDENT/IAFIS interoperability under Secure Communities, aliens--including those who have overstayed or otherwise violated their immigration status--who are encountered by law enforcement after arrest for the commission of a crime may be identified as immigration violators when fingerprints are submitted to IAFIS. Once individuals are identified, ICE officials determine what enforcement action is appropriate and consistent with ICE's enforcement priorities. Currently, the use of this technology is deployed to 3,181 jurisdictions in 50 States, five Territories, and the District of Columbia. conclusion DHS has made significant progress in preventing terrorists from exploiting the visa process. Technological advances have created an opportunity for law enforcement to identify and mitigate National security and public safety threats on an efficient basis that otherwise would have required hundreds of employees. These new technologies enable us to address these threats in a more cost-effective and expeditious manner than ever before. We will continue to work closely with our international, Federal, State, local, and Tribal partners to combat visa fraud and protect the integrity of our visa security system. Thank you again for the opportunity to testify today and for your continued support of DHS and its law enforcement mission. We would be pleased to answer any questions. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Mrs. Miller. I thank the gentleman for his comments. The Chairwoman now recognizes Mr. Dinkins for his 5 minutes. STATEMENT OF JAMES DINKINS, EXECUTIVE ASSOCIATE DIRECTOR, HOMELAND SECURITY INVESTIGATIONS, IMMIGRATION AND CUSTOMS ENFORCEMENT, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Dinkins. Good morning, Chairman Miller and Ranking Member Jackson Lee and distinguished Members of the subcommittee. Thank you for the opportunity to discuss our collective efforts to prevent the exploitation of non-immigrant visas by terrorists and other criminal organizations. We have had great collaboration with our partners at CBP and throughout DHS, as well as the State Department, to effectively combat visa fraud and mitigate National security and public safety threats. ICE and security investigations plays a critical role in the U.S. Government's layered approach to visa security. The process begins overseas with the submission of a non-immigrant visa application, extends throughout multiple layers of vetting and review during the application process, as well as after the visa is actually issued. Today, I would like to highlight three programs: The HSI Visa Security Program, our Student Exchange Visitors program, and the HSI Counterterrorism and Criminal Exploitation Unit. The HSI Visa Security Program represents DHS's front line in protecting the homeland by preventing foreign nationals who could pose a threat from actually obtaining a visa in the first place. To accomplish this, we rely upon highly-trained HSI special agents deployed to 19 high-risk visa-issuing posts overseas, combined with sophisticated technology developed in partnership with CBP at the National Targeting Center. As a result of today's increasingly sophisticated technology, we have the ability to vet more visa applicants against more data sets--has grown faster than ever before. Since fiscal year 2011 alone, HSI special agents screened over 3 million visa applications through a manual review that identified over 10,000 individuals who could pose a potential threat to the United States. As a result, we recommended that they not be issued a visa. These are 10,000 individuals who could have posed a threat to our Nation, but were never afforded the opportunity to do so. With the State Department's transition from a paper visa application system to an on-line entrance process, we began collaborating with CBP to take advantage of this technological milestone. This year, we started piloting an automated vetting program. This program, known as Patriot, is revolutionizing the screening of electronically-submitted visa applications. Patriot automates an in-depth vetting of non-immigrant visa applications, a process that previously was done manually and took weeks to do. But with Patriot, the initial screening can be done electronically in a matter of seconds. With the help of Patriot, in the near future we will not only be able to screen visa applications filed at the 19 high- risk posts, but virtually every HSI special non-immigrant visa application submitted from around the world within seconds of the person hitting the ``submit'' button and well in advance of them ever being considered by the State Department for a visa. The security and investigative benefits of this new program are immense, and will have a direct impact on our National security. I would also like to take the opportunity to discuss international students. While the vast majority of these students came to the United States in search of a quality education, there are those who choose a different path and seek to exploit the system for their nefarious purposes. As you know, HSI manages the Student Exchange Visitor Program as well as the Student Exchange Visitor Information System, known as SEVIS, which is a database that tracks HSI special non- immigrant students, exchange visitors, and their dependents. Today, SEVIS contains the records related to more than 1 million active students as well as information of approximately 10,000 certified institutions for education. While overseeing this program, the men and women assigned to the Student Exchange Visitor program monitor both the institutions and the students for compliance as well as potential criminal activity, immigration fraud, and status violations. When such activity is detected, the information is referred to the HSI Counterterrorism and Criminal Exploitation Unit. This unit is a National program dedicated to investigating non-immigrant visa violations, and is responsible for identifying and targeting those HSI special non-immigrant visa holders who could pose a National security or public safety threat to our Nation. Each year, the unit analyzes hundreds of thousands of potential visa status violators. These intelligence-based screening criteria, developed in close consultation with our law enforcement partners as well as the intelligence community, ensure that the latest information is incorporated into our targeting process. When potential threats are identified, they refer the cases for investigation to HSI field special agents located throughout the United States. In all, the unit has the support of over 450 men and women dedicated to this important mission. Again, we have collectively made great strides in preventing terrorist and National security threats from exploiting the visa process. Technological advances have created an unprecedented opportunity for law enforcement to identify and mitigate National security and public safety threats in a more efficient and expeditious way. I appreciate the opportunity to be here today, and I look forward to answering any questions you may have. Mrs. Miller. I thank the gentleman. The Chairwoman now recognizes Mr. Lyon for his 5 minutes of testimony. STATEMENT OF SHONNIE LYON, ACTING DIRECTOR, OFFICE OF BIOMETRIC IDENTITY MANAGEMENT, NATIONAL PROTECTION AND PROGRAMS DIRECTORATE, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Lyon. Chairman Miller, Ranking Member Jackson Lee, and distinguished Members of the subcommittee, I am pleased to appear before you today with my colleagues to discuss the progress we continue to make to secure the Nation and address the challenge of visa overstays. Shortly after the Department was created, DHS established the United States Visitor and Immigrant Status Indicator Technology Program, know as US-VISIT, a critical component of the Department's strategy to prevent terrorist attacks on the United States and facilitate the movement of legitimate travel and trade. US-VISIT represented a major achievement in creating an integrated border screening system that enhanced our Nation's security. Through US-VISIT, DHS increased its ability to manage information collected about foreign nationals during the pre- entry, entry, status management, and departure processes, allowing us to conduct better analysis of that information and thereby strengthen the integrity of our immigration system. In 2007, DHS created NPPD and a realigned US-VISIT under that directorate. Expanding rapidly beyond its original mandate, US- VISIT evolved in its mission space, providing advanced biometric and biographic identification services to front-line decision-makers so that they can accurately identify people and assess whether they pose a risk to the United States. The Consolidated and Further Continuing Appropriations Act of 2013 transferred the US-VISIT overstay mission to ICE, the US-VISIT entry-exit policy and operations mission to CBP, and the biometric identity functions of US-VISIT to the newly- established Office of Biometric Identity Management. The aforementioned legislation designates the Office of Biometric Identity Management as the lead entity within DHS responsible for biometric identity services and retains responsibility for US-VISIT's identity systems, the Biographic Space Repository, known as ADIS, and the Biometric Space System, known as IDENT. Although most people are familiar with the Office of Biometric Identity Management's role in identifying visa applicants and travelers arriving at ports of entry, the behind-the-scenes work to identify visa overstays is less well- known but equally important to the integrity of our immigration system. ADIS is used to biographically match entry information, changes in status and exit data, on foreign nationals to help determine possible overstays. ADIS processes arrival and departure information from CBP, changes in immigration status from USCIS, and changes in student status from ICE. Additionally, IDENT provides biometric identifiers for identity verification, along with biometric encounters related to apprehensions, visa applicants, and status updates that assist in resolving overstays. The IDENT and ADIS systems provide permit-centric information by searching biometric and biographic data to establish and confirm the identities of individuals that Homeland Security decision-makers encounter and to identity known or suspected terrorists, National security threats, criminals, and those who have previously violated U.S. immigration laws. The Office of Biometric Identity Management is focused on improving biometric and associated biographic data sharing through system interoperability with the Departments of Defense, Justice, and State towards a whole-of-Government approach to identity services. With trusted international partners to increase National and global security. By storing, matching, and analyzing biometric data linked to biographic information the Office of Biometric Identity Management provides Homeland Security decision-makers with person-centric actionable information on immigration violators, criminals, and known or suspected terrorists to enhance the Nation's security and resiliency. Thank you again for this opportunity to testify. I look forward to working with this committee as we continue to improve the biometric and biographic identification services our front-line decision-makers rely on to identify and deter human threats. I am pleased to address the committee's questions. Mrs. Miller. I thank the gentleman for his testimony. The Chairwoman now recognizes Ms. Gambler for her 5 minutes of testimony. STATEMENT OF REBECCA GAMBLER, DIRECTOR, HOMELAND SECURITY AND JUSTICE, GOVERNMENT ACCOUNTABILITY OFFICE Ms. Gambler. Good morning, Chairwoman Miller, Ranking Member Jackson Lee, and Members of the subcommittee. I appreciate the opportunity to testify at today's hearing to discuss GAO's work on overstay enforcement issues. My statement is based on GAO's April 2011 report and our on-going work for this subcommittee and others on DHS's programs and efforts to address overstays. Overstays are generally defined as foreign nationals who were legally admitted to the United States on a temporary basis, but then overstayed their authorized periods of admission. Most overstays are likely motivated by economic reasons to stay in the country. However, overstays can pose homeland security concerns. Today, I would like to focus my remarks on three key areas. First, I will discuss DHS's efforts to address a prior backlog of potential overstay records and our preliminary observations on the file of unmatched arrival records that DHS continues to maintain. Second, I will discuss DHS's steps to strengthen its data on potential overstays and report overstay estimates. Finally, I will discuss DHS's planning efforts for a biometric exit capability. First, as of January 2011, DHS had a backlog of potential overstay records that totaled 1.6 million. Since that time, DHS completed a review of those records against various National security and law enforcement databases. Based on that review, DHS closed those records for which information indicated that individuals had departed or changed status. DHS also identified any National security or public safety threats for possible investigation. DHS has continued to review all potential overstay records against National security and law enforcement databases. However, DHS continues to have more than 1 million unmatched arrival records. Some of these individuals are likely overstays, while others have departed or changed status without a record of them doing so. Our preliminary analysis of these 1 million records indicates that about 44 percent are for non-immigrants who traveled to the United States on a tourist visa, while about 43 percent are for tourists who were admitted under the visa waiver program. In addition, our preliminary analysis indicates that the average amount of time elapsed since travelers with unmatched arrival records were expected to depart was about 2.7 years. We are continuing to analyze these records for additional categories or trends. With regard to my second point, DHS has taken steps to enhance the connections among component databases to reduce the need for manual exchanges of data used to help identify overstays. While these changes have resulted in efficiencies, they have not addressed some of the underlying data quality issues we previously identified, such as incomplete data on land-based departures. DHS is implementing the Beyond the Border Initiative with Canada to exchange entry data on travelers crossing the Northern Border at land ports of entry. This initiative should help address the issue of missing departure data by providing a new source of information on travelers departing at land ports. This new data could also help DHS in determining and reporting overstay estimates, which DHS has announced plans to do by the end of this year. DHS has not reported overstay estimates since 1994 due to concerns about the reliability of its data. DHS initiatives for improving data on potential overstays are in the early stages of implementation. Thus, it is too soon to assess their full effect on helping to strengthen the reliability of DHS's overstay data for reporting purposes. Finally, DHS has not yet implemented a biometric exit capability, but has plans underway to assess options for such an exit capability at air and seaports. DHS has faced long- standing challenges in determining how to implement an exit capability, such as identifying efficient mechanisms for collecting biometric data that do not disrupt passenger flow. DHS has plans to finalize goals and objectives for biometric air exit, and test various scenarios for collecting biometric data in the airport environment going forward. In closing, since we last reported on overstay issues in April 2011, DHS has made progress in its overstay enforcement effort. However, a number of DHS's changes have been recently implemented or are in the process of being implemented. Further, other efforts are planned for the future. Thus, it is not yet clear what all of DHS's--what impact all of DHS's efforts will have on improving its processes and data for identifying potential overstays. We are continuing to assess DHS's efforts, and plan to report our final results later this summer. This concludes my oral statement. I am pleased to answer any questions Members may have. [The prepared statement of Ms. Gambler follows:] Prepared Statement of Rebecca Gambler May 21, 2013 immigration enforcement.--preliminary observations on dhs's overstay enforcement efforts gao-13-602t Chairman Miller, Ranking Member Jackson Lee, and Members of the subcommittee: I am pleased to be here today to provide our preliminary observations on the actions that the Department of Homeland Security (DHS) has taken since April 2011 to address overstays.\1\ Each year, millions of visitors come to the United States legally on a temporary basis either with a visa or, in some cases, as visitors who were allowed to enter without a visa.\2\ Overstays are individuals who were admitted into the country legally on a temporary basis but then overstayed their authorized periods of admission.\3\ We have reported that most overstays are likely motivated by economic opportunities to stay in the United States beyond their authorized periods of admission.\4\ However, overstays could pose homeland security concerns--for example, 5 of the 19 September 11, 2001, hijackers were overstays. --------------------------------------------------------------------------- \1\ GAO, Overstay Enforcement: Additional Mechanisms for Collecting, Assessing, and Sharing Data Could Strengthen DHS's Efforts but Would Have Costs, GAO-11-411 (Washington, DC: Apr. 15, 2011). \2\ Visitors who are allowed to seek admission without a visa include citizens of Canada and the British Overseas Territory of Bermuda (and certain residents of other adjacent islands, such as the Bahamas) under certain circumstances, as well as Visa Waiver Program participants. This program allows nationals from certain countries to apply for admission to the United States as temporary visitors for business or pleasure without first obtaining a visa from a U.S. consulate abroad. Currently, there are 37 participants in the program. \3\ In this statement, we include out-of-status students--student visa holders who fail to meet certain requirements, such as enrolling in a qualified education program--in our definition of overstays. In general, foreign students remain in status and therefore eligible to stay in the United States under their student visas as long as they are enrolled in and attending a qualified education program. \4\ GAO, Visa Waiver Program: Limitations with Department of Homeland Security's Plan to Verify Departure of Foreign Nationals, GAO- 08-458T (Washington, DC: Feb. 28, 2008). --------------------------------------------------------------------------- DHS has primary responsibility for identifying and taking enforcement action to address overstays. Within DHS, U.S. Customs and Border Protection (CBP) is tasked with, among other duties, inspecting all people applying for entry to the United States to determine their admissibility to the country and screening Visa Waiver Program applicants to determine their eligibility to travel to the United States under the program. U.S. Immigration and Customs Enforcement (ICE) is the lead agency for enforcing immigration law in the interior of the United States and is primarily responsible for overstay enforcement. Within ICE, the Counterterrorism and Criminal Exploitation Unit (CTCEU) and the Overstay Analysis Unit are primarily responsible for overstay investigations. The Office of Biometric Identity Management (OBIM), within DHS's National Protection and Programs Directorate, supports the identification of overstays by managing the Arrival and Departure Information System (ADIS), which tracks and matches arrival and departure records for the purpose of identifying potential overstays, and the Automated Biometric Identification System (IDENT), which maintains biometric information, such as fingerprints, collected from non-immigrants upon their entry into the United States.\5\ --------------------------------------------------------------------------- \5\ The Automated Biometric Identification System (IDENT) also contains fingerprints collected by the Department of State to establish and verify the identities of visa applicants. Both the Overstay Analysis Unit and OBIM were formerly part of the U.S. Visitor and Immigrant Status Indicator Technology Program (US-VISIT) within DHS's National Protection and Programs Directorate. DHS initiated US-VISIT in 2002 to develop a comprehensive entry and exit system to collect biometric data from aliens traveling through U.S. ports of entry. In 2004, US-VISIT initiated the first step of this program by collecting biometric data on aliens entering the United States. Pursuant to the fiscal year 2013 DHS appropriations act and its accompanying explanatory statement, DHS realigned US-VISIT's overstay analysis function into ICE and created OBIM effective March 27, 2013. --------------------------------------------------------------------------- In April 2011, we reported on DHS's actions to identify and take actions to address overstays and made recommendations to the Department to strengthen these efforts.\6\ DHS concurred with our recommendations and has taken or is taking steps to address them. Further, since April 2011, DHS has reported taking additional actions to strengthen its processes for identifying and taking enforcement action against overstays. --------------------------------------------------------------------------- \6\ GAO-11-411. --------------------------------------------------------------------------- This testimony discusses our preliminary observations on DHS's efforts since April 2011 to: (1) Review potential overstay records for National security and public safety concerns, (2) improve data on potential overstays and report overstay rates, and (3) plan for a biometric exit system. My statement is based on preliminary analyses from our on-going review of overstay enforcement for this subcommittee and other Congressional requesters. We expect to issue a final report on this work in July 2013. To conduct this work, we analyzed DHS documents and data related to overstays and interviewed relevant DHS officials. Specifically, we analyzed DHS planning documents and reports on processes to review potential overstay records and collect additional data to improve overstay identification. We analyzed DHS's unmatched arrival records as of November 2012, the most recent date for which DHS had compiled the records at the time we began our review. We also reviewed statutory requirements and a May 2012 DHS report on the status of efforts to implement biometric exit capabilities at airports. To analyze the reliability of data on previously unreviewed potential overstay records and DHS's current set of unmatched arrival records, we reviewed documentation regarding the databases used to collect these data and interviewed DHS officials familiar with the data. We determined that the data were sufficiently reliable for our purposes. We conducted this work in accordance with generally accepted Government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We provided a draft of this statement to DHS for review and incorporated its comments where appropriate. dhs continually reviews potential overstay records, but unmatched arrival records remain DHS Reviewed a Backlog of 1.6 Million Potential Overstay Records DHS has taken action to address a backlog of potential overstay records we previously identified in April 2011. Specifically, in April 2011, we reported that, as of January 2011, ADIS contained a backlog of 1.6 million potential overstay records, which included prior non- priority overstay leads that had not been reviewed, non-priority leads that continued to accrue on a daily basis, and leads generated in error as a result of CBP system changes.\7\ DHS uses ADIS to match departure records to arrival records and subsequently close records for individuals with matching arrival and departure records because either: (1) The individual departed prior to the end of his or her authorized period of admission and is therefore not an overstay or (2) the individual departed after the end of his or her authorized period of admission and is therefore an out-of-country overstay. Unmatched arrival records--those records in ADIS that do not have corresponding departure records--remain open and indicate that those individuals are potential in-country overstays.\8\ --------------------------------------------------------------------------- \7\ ICE prioritizes potential overstay leads for possible investigation. The specific criteria ICE uses to rank the priority level of overstay leads are determined triannually based on current threat information by the Compliance Enforcement Advisory Panel, an interagency panel of intelligence experts assembled by ICE for the purpose of determining these criteria. CBP system changes had resulted in multiple arrival and departure records being inadvertently created for a single individual. \8\ Enforcement actions for in-country and out-of-country overstays differ in that the focus of enforcement against in-country overstays is to remove them from the country if they pose a threat, whereas enforcement against out-of-country overstays is to prevent possible readmission to the United States. --------------------------------------------------------------------------- In the summer of 2011, DHS completed a review of the 1.6 million records against various National security and law enforcement databases to determine if the subjects of these records had already left the United States and to help identify if the subjects posed any potential National security or public safety threats.\9\ As a result, DHS closed approximately 863,000 records for individuals who had departed, were in status, or had adjusted status, and removed them from the backlog. Second, DHS reviewed the remaining 757,000 records against National security and law enforcement databases to identify potential National security or public safety threats. As part of this National security and public safety review, DHS also reviewed approximately 82,000 additional records identified by CTCEU that were unresolved or had not yet undergone full review because they did not meet ICE's enforcement priorities (a total of approximately 839,000 combined records). As a result of these reviews, DHS reprioritized 1,901 of the 839,000 records because the subjects of the records could pose National security or public safety concerns and provided them to CTCEU for further review and consideration for enforcement action. Table 1 describes how CTCEU resolved these leads. --------------------------------------------------------------------------- \9\ To determine whether an unmatched arrival record is likely to be an in-country overstay, DHS agencies review multiple databases to determine if any information is available to document a departure or a change in immigration status. For example, the review process includes both automated searches, such as searching for immigration benefit application information through a U.S. Citizenship and Immigration Services database, and manual searches, such as determining whether the individual applied for refugee or asylum status. TABLE 1.--PRELIMINARY ANALYSIS OF RESULTS OF DHS'S 2011 REVIEW OF BACKLOG OF POTENTIAL OVERSTAY RECORDS ------------------------------------------------------------------------ Number of Records (Percentage Outcome of Total) ------------------------------------------------------------------------ Individual had departed the United 711 records (37.4 percent). States. Records forwarded to ICE's Enforcement 481 records (25.3 percent). and Removal Operations (ERO) as potential public safety threats*. Individual was in status (e.g., the 302 records (15.9 percent). subject filed a timely application to change his or her status or extend his or her authorized period of admission in the United States). Individual could not be located**....... 266 records (14.0 percent). Individual was arrested................. 9 records (0.5 percent). Other***................................ 132 records (6.9 percent). ------------------------------- Total............................. 1,901 records (100 percent). ------------------------------------------------------------------------ Source: ICE CTCEU. * CTCEU refers information on non-priority potential overstays to ICE's ERO, which is responsible for identifying and apprehending aliens who are subject to removal from the country, detaining these individuals when necessary, and removing aliens subject to removal from the United States. ERO personnel may encounter overstays in the course of their work but they do not directly focus on overstay enforcement. ** An ICE contractor's system automatically queries these records against various databases on a weekly basis for new information relating to the location of the suspected overstay. If such information is identified, CTCEU will reopen the investigation. *** Other includes the following outcomes: (1) ICE determined that information indicating a possible National security or public safety threat was false (73 leads, 3.8 percent); (2) the subject of the lead was in removal proceedings, previously arrested, or the subject of an investigation (43 leads, 2.3 percent); (3) the lead is open for continuous review (13 leads, 0.7 percent); and (4) the subject of the lead is the subject of an on-going investigation at an ICE Homeland Security Investigations field office (3 leads, 0.2 percent). Since completing this review of the backlog of potential overstay records in the summer of 2011, DHS has continued to review all potential overstay records through National security and law enforcement databases to identify potential threats, regardless of whether the subjects of the records meet ICE's priorities for enforcement action. This occurs on an on-going basis such that DHS may identify threats among individuals who were not previously identified as such when new information becomes available in various National security and law enforcement databases. DHS Has More Than 1 Million Unmatched Arrival Records As of April 2013, DHS continues to maintain more than 1 million unmatched arrival records in ADIS (that is, arrival records for which ADIS does not have a record of departure or status change). Some of these individuals are overstays, while others have either departed or changed immigration status without an ADIS record of their departure or status change. For example, the individual may have departed via a land port of entry without providing a record of departure or the individual may have applied for immigration benefits using a different name. In addition, these records include those from the previous backlog of unmatched arrival records that were not prioritized for enforcement in the summer of 2011 and have not subsequently been matched against a departure or change of status record. As part of our on-going work, we are analyzing these data to identify various trends among these unmatched arrival records. For example, our preliminary analysis shows that 44 percent of the unmatched arrival records are non-immigrants traveling to the United States on a tourist visa, while 43 percent are also tourists but were admitted under the Visa Waiver Program. Figure 1 presents our preliminary analysis of the breakdown of unmatched arrival records by admission class. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] We also analyzed the records to assess the amount of time that has elapsed since travelers were expected to depart the country, based on travelers' ``admit until'' date. CBP assigns certain nonimmigrants an ``admit until'' date, by which they must leave the country to avoid overstaying.\10\ Figure 2 presents our preliminary analysis of the breakdown of the amount of time elapsed, as of November 2012, since the ``admit until'' date. The average amount of time elapsed for all unmatched arrival records was 2.7 years. --------------------------------------------------------------------------- \10\ In general, foreign students remain in status and therefore eligible to remain in the United States as long as they are enrolled in and attending a qualified education program. Individuals traveling on student visas are generally not issued a specific date until which they are authorized to remain in the United States, but instead are admitted for what is referred to as duration of status. This means that they may remain in the country until they complete their approved program of study, provided they otherwise maintain their student status. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] As of April 2013, DHS has not analyzed its unmatched arrival records to identify whether there are any trends in these data that could inform the Department's overstay enforcement efforts. We will continue to evaluate these data as part of our on-going work. dhs has actions completed and under way to improve data, but the effect of these changes is not yet known DHS Has Begun Collecting Additional Data and Improved Sharing of Data Among Its Databases to Help Identify Potential Overstays Since April 2011, DHS has taken various actions to improve its data on potential overstays. In April 2011, we reported that DHS's efforts to identify and report on overstays were hindered by unreliable data, and we identified various challenges to DHS's efforts to identify potential overstays, including the incomplete collection of departure data from non-immigrants at ports of entry, particularly land ports of entry, and the lack of mechanisms for assessing the quality of leads sent to ICE field offices for investigations.\11\ Since that time, DHS has taken action to strengthen its processes for reviewing records to identify potential overstays, including: (1) Streamlining connections among DHS databases used to identify potential overstays, and (2) collecting information from the Canadian government about those exiting the United States and entering Canada through northern land ports of entry. --------------------------------------------------------------------------- \11\ GAO-11-411. --------------------------------------------------------------------------- First, DHS has taken steps to enhance connections among its component agencies' databases used to identify potential overstays and reduce the need for manual exchanges of data. For example:In August 2012, DHS enhanced data sharing between ADIS and IDENT. This improved connection provides additional data to ADIS to improve the matching process based on fingerprint identification. For example, when an individual provides fingerprints as part of an application for immigration benefits from U.S. Citizenship and Immigration Services or a visa from the State Department, or when apprehended by law enforcement, IDENT now sends identity information, including a fingerprint identification number, for that individual to ADIS. This additional source of data is intended to help allow ADIS to more effectively match the individual's entry record with a change of status, thereby closing out more unmatched arrival records. Beginning in April 2013, ICE's Student and Exchange Visitor Information System (SEVIS) began automatically sending data to ADIS on a daily basis, allowing ADIS to review SEVIS records against departure records and determine whether student visa holders who have ended their course of study departed in accordance with the terms of their stay.\12\ Prior to this date, DHS manually transferred data from SEVIS to ADIS on a weekly basis. According to DHS officials, these exchanges were unreliable because they did not consistently include all SEVIS data--particularly data on ``no show'' students who failed to begin their approved course of study within 30 days of being admitted into the United States. --------------------------------------------------------------------------- \12\ SEVIS contains biographical and immigration status information for nonimmigrant foreign students and exchange visitors. --------------------------------------------------------------------------- Also in April 2013, DHS automated the exchange of potential overstay records between ADIS and CBP's Automated Targeting System (ATS), which is intended to allow DHS to more efficiently: (1) Transfer data between the systems for the purpose of identifying National security and public safety concerns, and (2) use matching algorithms in ATS that differ from those in ADIS to close additional records for individuals who departed. These changes have resulted in efficiencies in reviewing records for determining possible overstay leads; however, they do not address some of the underlying data quality issues we previously identified, such as incomplete data on departures through land ports of entry. Furthermore, because many of these changes were implemented in April 2013, it is too early to assess their effect on the quality of DHS's overstay data. Second, DHS is implementing the Beyond the Border initiative to collect additional data to strengthen the identification of potential overstays. In October 2012, DHS and the Canada Border Services Agency began exchanging entry data on travelers crossing the border at selected land ports of entry. Because an entry into Canada constitutes a departure from the United States, DHS will be able to use Canadian entry data as proxies for U.S. departure records. We have previously reported that DHS faces challenges in its ability to identify overstays because of unreliable collection of departure data at land ports of entry.\13\ This effort would help address that challenge by providing a new source of data on travelers departing the United States at land ports on the Northern Border. In the pilot phase, DHS exchanged data with the Canada Border Services Agency on third-country nationals at four of the five largest ports of entry on the Northern Border.\14\ These data covered entries from September 30, 2012, through January 15, 2013. DHS plans to expand this effort to collect data from additional ports of entry and to share data on additional types of travelers. According to DHS officials, after June 30, 2013, DHS plans to exchange data for third-country nationals at all automated ports of entry along the Northern Border.\15\ At that time, DHS also plans to begin using these data for operational purposes (e.g., taking enforcement action against overstays, such as revoking visas or imposing bars on readmission to the country based on the length of time they remained in the country unlawfully).\16\ After June 30, 2014, DHS plans to exchange data on all travelers, including U.S. and Canadian citizens, at all automated ports of entry along the Northern Border. --------------------------------------------------------------------------- \13\ GAO-11-411. \14\ These ports were Pacific Highway (Blaine, Washington), Peace Arch (Blaine, Washington), Lewiston-Queenston Bridge (Lewiston, New York), and Rainbow Bridge (Niagara Falls, New York). For the purposes of this pilot, third-country nationals are individuals who are not citizens of Canada or citizens or nationals of the United States. The pilot phase included the exchange of biographic data on permanent residents of Canada and lawful permanent residents of the United States. \15\ For the purposes of the Beyond the Border initiative, an automated port of entry refers to a port of entry on the shared Canada- U.S. land border with a primary processing capacity to capture traveler (land, ferry, and pedestrian) passage as an electronic record. This does not include large cruise vessels deemed to be sea crossings under the laws of Canada and the United States. \16\ Since these data include only individuals who have departed the United States, all of the overstays identified would be out-of- country overstays. In general, non-immigrants, such as those traveling under temporary visas for business or pleasure, who were unlawfully present in the United States for a period of more than 180 days but less than 1 year and voluntarily departed the United States prior to the commencement of legal proceedings to remove them from the country, are inadmissible for 3 years. In addition, aliens who were unlawfully present in the United States for 1 year or more, and who again seek admission within 10 years of the date of their departure or removal from the United States, are inadmissible. For non-immigrants whose overstay violations fall below 180 days, their visas are void and the State Department has the discretion to determine whether to issue them new visas, and CBP has the discretion whether to readmit them into the country. --------------------------------------------------------------------------- DHS Continues to Face Challenges in Reporting Reliable Overstay Rates, and Recent Changes Have Not Yet Been Fully Implemented DHS has not reported overstay rates because of concerns about the reliability of its data on overstays. According to Federal law, DHS is to submit an annual report to Congress providing numerical estimates of the number of aliens from each country in each non-immigrant classification who overstayed an authorized period of admission that expired during the fiscal year prior to the year for which the report is made.\17\ Since 1994, DHS or its predecessors have not reported annual overstay rates regularly because of its concerns about the reliability of the Department's overstay data. In September 2008, we reported on limitations in overstay data, such as missing data for land departures, that affect the reliability of overstay rates.\18\ In April 2011, we reported that DHS officials stated that the Department had not reported overstay rates because it had not had sufficient confidence in the quality of its overstay data. DHS officials stated at the time that, as a result, the Department could not reliably report overstay estimates in accordance with the statute.\19\ Although the new departure data DHS is collecting as part of the Beyond the Border initiative may allow DHS to close out more potential overstay records in the future, these data are limited to land departure at Northern Border ports of entry, and as the initiative has not yet been fully implemented, it is too early to assess its effect on helping strengthen the reliability of DHS's overstay data for reporting purposes. In February 2013, the Secretary of Homeland Security testified that DHS plans to report overstay rates by December 2013.\20\ As of April 2013, DHS was working to determine how it plans to calculate and report these overstay rates. As part of our on-going review, we are assessing how the changes DHS has made to its processes for matching records to identify potential overstays may affect the reliability of overstay data and DHS's ability to report reliable overstay rates. --------------------------------------------------------------------------- \17\ 8 U.S.C. 1376(b). \18\ GAO, Visa Waiver Program: Actions Are Needed to Improve Management of the Expansion Process, and to Assess and Mitigate Program Risks, GAO-08-967 (Washington, DC: Sept. 15, 2008). \19\ GAO-11-411. \20\ See statement of Janet Napolitano, Secretary, Department of Homeland Security, before the Committee on the Judiciary, United States Senate, Washington, DC: February 13, 2013. --------------------------------------------------------------------------- dhs faces challenges planning for a biometric exit system at air and sea ports of entry Developing a biometric exit capability has been a long-standing challenge for DHS. Beginning in 1996, Federal law has required the implementation of an integrated entry and exit data system for foreign nationals.\21\ The Intelligence Reform and Terrorism Prevention Act of 2004 required the Secretary of Homeland Security to develop a plan to accelerate full implementation of an automated biometric entry and exit data system that matches available information provided by foreign nationals upon their arrival in and departure from the United States.\22\ Since 2004, we have issued a number of reports on DHS's efforts to implement a biometric entry and exit system. For example, in November 2009, we reported that DHS had not adopted an integrated approach to scheduling, executing, and tracking the work that needed to be accomplished to deliver a comprehensive exit solution. We concluded that without a master schedule that was integrated and derived in accordance with relevant guidance, DHS could not reliably commit to when and how it would deliver a comprehensive exit solution or adequately monitor and manage its progress toward this end.\23\ We have made recommendations to address these issues, including that DHS ensure that an integrated master schedule be developed and maintained.\24\ DHS has generally concurred with our recommendations and has reported taking action to address them. For example, in March 2012, DHS reported that the US-VISIT office was adopting procedures to comply with the nine scheduling practices we recommended in our November 2009 report and has conducted training on our scheduling methodology. --------------------------------------------------------------------------- \21\ Pub. L. No. 104-208, div. C, 110, 110 Stat. 3009-546, 3009- 558 to 59. \22\ 8 U.S.C. 1365b. \23\ GAO, Homeland Security: Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed, GAO- 10-13 (Washington, DC: Nov. 19, 2009). \24\ GAO-10-13; GAO, Homeland Security: U.S. Visitor and Immigrant Status Program's Long-standing Lack of Strategic Direction and Management Controls Needs to Be Addressed, GAO-07-1065 (Washington, DC: Aug. 31, 2007); and Homeland Security: First Phase of Visitor and Immigration Status Program Operating, but Improvements Needed, GAO-04- 586 (Washington, DC: May 11, 2004). --------------------------------------------------------------------------- DHS has not yet implemented a biometric exit capability, but has planning efforts under way to assess options for such a capability at airports and seaports. In 2009, DHS conducted pilots for biometric exit capabilities in airport scenarios, as called for in the Consolidated Security, Disaster Assistance, and Continuing Appropriations Act, 2009.\25\ In August 2010, we reported on the results of our review of DHS's evaluation of these pilot programs. Specifically, we reported that there were limitations with the pilot programs--for example, the pilot programs did not operationally test about 30 percent of the air exit requirements identified in the evaluation plan for the pilot programs--which hindered DHS's ability to inform decision making for a long-term air exit solution and pointed to the need for additional sources of information on air exit's operational impacts.\26\ According to DHS officials, the Department's approach to planning for biometric air exit has been partly in response to our recommendation that DHS identify additional sources for the operational impacts of air exit not addressed in the pilot programs' evaluation and to incorporate these sources into its air exit decision making and planning. As of April 2013, the Department's planning efforts are focused on developing a biometric exit system for airports, with the potential for a similar solution to be rolled out at seaports, according to DHS officials. However, in October 2010, DHS identified three primary reasons why it has been unable to determine how and when to implement a biometric air exit solution: (1) The methods of collecting biometric data could disrupt the flow of travelers through air terminals; (2) air carriers and airport authorities had not allowed DHS to examine mechanisms through which DHS could incorporate biometric data collection into passenger processing at the departure gate; and (3) challenges existed in capturing biometric data at the point of departure, including determining what personnel should be responsible for the capture of biometric information at airports. --------------------------------------------------------------------------- \25\ Pub. L. No. 110-329, 122 Stat. 3574, 3668-70 (2008). \26\ GAO, Homeland Security: US-VISIT Pilot Evaluations Offer Limited Understanding of Air Exit Options, GAO-10-860 (Washington, DC: Aug. 10, 2010). --------------------------------------------------------------------------- According to DHS officials, these challenges have affected the Department's planning efforts. In 2011, DHS directed its Science and Technology Directorate (S&T), in coordination with other DHS component agencies, to research ``long-term options'' for biometric exit.\27\ In May 2012, DHS reported internally on the results of S&T's analysis of previous air exit pilot programs and assessment of available technologies, and the report made recommendations to support the planning and development of a biometric air exit capability.\28\ In that report, DHS concluded that the building blocks to implement an effective biometric air exit system were available. However, DHS reported that significant questions remained regarding: (1) The effectiveness of current biographic air exit processes and the error rates in collecting or matching data, (2) methods of cost-effectively integrating biometrics into the air departure processes (e.g., matching arrival and departure records based on biometric information like fingerprints rather than based on biographic information, such as names and dates of birth), (3) the additional value biometric air exit would provide compared with the current biographic air exit process, and (4) the overall value and cost of a biometric air exit capability. The report included nine recommendations to help inform DHS's planning for biometric air exit, such as directing DHS to develop explicit goals and objectives for biometric air exit and an evaluation framework that would, among other things, assess the value of collecting biometric data in addition to biographic data and determine whether biometric air exit is economically justified.\29\ --------------------------------------------------------------------------- \27\ In our previous reviews of DHS's efforts to pursue biometric exit capabilities, DHS's plans have approached development of a biometric exit system through a phased approach that involved conducting pilots to inform eventual planning for long-term solutions. Different pilots were created to inform solutions at air/seaports and land ports. See GAO-10-13. \28\ DHS, DHS Biometric Air Exit: Analysis, Recommendations, and Next Steps, draft final report (Washington, DC: May 2012). \29\ The report recommended that DHS take the following actions: (1) Develop explicit goals and objectives for biometric air exit, (2) leverage improvements in passenger facilitation and biometric technology to support a concept of operations, (3) use developmental scenario testing instead of pilot programs to validate a concept of operations, (4) establish collaborative relationships with airports and airlines, (5) use operational tests to validate performance and cost estimates, (6) develop an evaluation framework for biometric air exit, (7) employ a holistic approach to assess the costs and benefits of comprehensive biometric entry and exit processes, (8) determine whether biometric air exit is economically justified, and (9) incrementally deploy biometric air exit to airports where it is cost-effective to do so. --------------------------------------------------------------------------- DHS reported that, by May 2014, it planned to take steps to address the recommendations in its report; however, according to DHS Office of Policy and S&T officials, the Department has not yet completed actions in response to these recommendations, although DHS officials reported that DHS has plans to do so to help support development of a biometric air exit concept of operations. For example, DHS's report recommended that DHS develop explicit goals and objectives for biometric air exit and use scenario-based testing rather than operational pilot programs to inform the concept of operations for biometric air exit. As of April 2013, DHS officials stated that they expect to finalize goals and objectives in the near future and are making plans for future scenario- based testing. In addition, DHS's report stated that new traveler facilitation tools and technologies--for example, on-line check-in, self-service, and paperless technology--could support more cost- effective ways to screen travelers, and that these improvements should be leveraged when developing plans for biometric air exit. However, DHS officials stated that there may be challenges to leveraging new technologies to the extent that U.S. airports and airlines rely on older, proprietary systems that may be difficult to update to incorporate new technologies. Furthermore, DHS officials stated they face challenges in coordinating with airlines and airports, which have expressed significant reluctance about biometric exit because of concerns over its effect on operations and potential costs. To address these concerns, DHS is conducting outreach and soliciting information from airlines and airports regarding their operations. DHS officials stated that the goal of its current efforts is to develop information about options for biometric exit and to report to Congress in time for the fiscal year 2016 budget cycle regarding: (1) The additional benefits that biometric exit provides beyond enhanced biographic exit, and (2) costs associated with biometric exit. As part of our on-going work, we are assessing DHS's progress in meeting its goals for addressing the recommendations in its biometric exit report by May 2014. We plan to report on the results of our analysis in July 2013. Chairman Miller, Ranking Member Jackson Lee, and Members of the subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. Mrs. Miller. Thank you very much, Ms. Gambler. Thanks to all the witnesses. Excellent testimony by all of you. I will now recognize myself for my 5 minutes of questioning. I think I will start with Mr. Wagner, who talked about how DHS is collecting all this information--the number of visa overstays from each country--but couldn't share the information until the end of this year. I am just wondering whether or not DHS--why we can't have that information before the end of the year, understanding that you are going through your processes now. But as we have talked on this committee, we think we have sort of a moment in time, politically perhaps, where the Congress is willing to have a--and is having, currently engaged in a very intensive debate about comprehensive immigration reform. In fact, this subcommittee passed our border security bill out of our subcommittee just last week, then passed a border security bill out of full committee. We will see if it goes to the floor, hopefully. But a big concern that was raised by many Members here was this whole visa overstay and what we are gonna do with the visa issue? You know, that--in the 40 percentile of everybody who was here illegally is here on some sort of visa overstay. I am just wondering: How can the DHS help us better go through our debate by giving us all of the pertinent information as the debate is occurring? By the end of the year, we may not need that information quite as badly. Mr. Wagner. Thank you for the question. So CBP collects the arrival and the departure data. You know, we are validating the inbound data with our inspection process at the port of entry. We are working with the carriers to--a similar process we call document validation. Where, when they send us the advanced information pre-departure, we are looking into our system to make sure it is actually correct and complete data and sending them a confirmation message back. We're in the initial phases of starting to roll that out. Then on the departure, you know, for commercial air and sea we do get the APIS data. You know, we are relying on to airlines to transmit accurate and complete data to us. Of course, they are subject to fines if that is not the case. We take that information and then we provide it into the ADIS system, the Arrival and Departure Information System, so the other agencies can take and then start to match up the arrival and the departure records and look for exactly what those gaps are. There are a lot of reasons as to why it is just not so easy to match the departure with the arrival. People can enter and depart using different documents for very valid reasons. If they, you know--maintain they come in as a permanent resident, using the permanent resident card, and then they depart using a foreign passport because they are still a citizen of that country. It is a little challenging sometimes to match up those records. People come in on commercial air and will drive across the land border when they depart so it is tough for us to--not having the departure data from the land to match up those biographical records, as well. Or people come in, and then get into our immigrations benefits system and either extend their stay or apply for benefits or adjust their status. It is a matter of having our systems go through and pull all those different records, and then linking them up so we can close out those arrival records and not report as an overstay or someone that hasn't left. So we are making progress at the land border, at least on the Northern Border. We ran a successful pilot with the Canadian government, exchanging data on third-country nationals, meaning non-U.S. or non-Canadian citizens, whereas the entry into one country would serve as the exit and close out that arrival record from that other country. We exchanged, during a pilot phase, about 400,000 records. We were able to close out about 97.5 percent of those. Mrs. Miller. If I could, where was that pilot program? Mr. Wagner. That was along the U.S.-Canada land border. Mrs. Miller. Where? Mr. Wagner. I will have to look up the exact sites, but it was a handful of locations where we did that exchange. Mrs. Miller. So based on that pilot program, do you expect--what is your anticipated--I mean, are you looking to roll that out, then, along the entire border at all the POEs, or---- Mr. Wagner. Yes. At the end of June we will expand that across just almost the entire Northern Border, where we will exchange data with--on third-country nationals between the United States and Canada. Then about a year later, so thinking June 2014, we will also look to start to include U.S. and Canadian citizen records, as well, into that. So the sort of strategic plan is it will be on the border if it is good. So it is a matter of us collecting and validating the accurate data, putting it into ADIS, and then allowing the systems to link it up to provide those types of overstay numbers that we all have confidence in. Trying to do that in a timely basis, but understanding that the challenge is before you, too. Mrs. Miller. Okay, thank you. Mr. Dinkins, I know you had previously testified that you were using about 3 percent of your resources to look at some of these visa overstays. I don't know if that statistic is still current, or what. I understand you have a lot of other things going on. But, you know, we--again, it is obviously a critical component, we think about 40 percent, of some of the situation that we have here. Then only 3 percent of your resources. I understand the financial constraints that we find ourselves in. I guess I would just ask you: Do you think that that is an adequate amount of your resources? Sort of in a perfect world, by your standards where you would have adequate resources, what would you really be--I mean, the Congress, we are really relying on all of you to tell us what you really need. Then we will have to decide within the confines of our existing fiscal constraints of where we want to prioritize our appropriations process. But it is a big part of what these hearings are about, as we try to get our arms around how we prioritize, as I say, within the existing revenues, of what we think we can do. But, obviously, this whole immigration reform is a huge debate right now. We want to make sure we try to get it right here. What is your thought about the amount of resources, if it is only 3 percent? If that is correct? Mr. Dinkins. Yes, ma'am. That is about correct. This is the challenge. So right now, as you had mentioned, is we do prioritize our leads. So we get tens of thousands of potential overstays and--each week, and we vet them out. We look for anybody that is gonna pose that National security or public safety threat. Those are the ones that we specifically send out and target. The ones that do not pose any threat that we do not actually actively go out and pursue those individuals. If we did, and this is the thing--so it is not just like ICE resources. It is actually the entire immigration system resources. So the system is equipped to remove so many people from the country as it is. If we were to go out and get more than the system can put in, it just--you know, it wouldn't be an effective use of resources at all. Because there is only so many immigration courts, only so many judges and so forth. So I think--you know, going back to your question is, that would depend on what the immigration reform actually does. Because then, it would--you know, you would not necessarily end up with the same number of visa overstays, as you both had mentioned in your opening remarks. Because there would be other paths for people to come here and want to stay in the country. So I would presume that those numbers would drop down. So you would have to look at the bill to see. But right now, if we go out and we were to target every single one of those--and we do, do--we look for the public safety. They are continuously being monitored through secured communities. So if the visa overstay were to get arrested they would be prioritized, and then sought after. But for using more resources right now, it would end up just clogging the system up of--that would not be able to handle it. Then criminals would be the ones left behind not being dealt with. Mrs. Miller. The Chairwoman now recognizes the gentlelady from Texas for her questions. Ms. Jackson Lee. Thank you very much. Let me thank the witnesses very much. I have a number of questions, so you can help me by giving brief, or yes-or-no, answers. Before I even start, I wanted to just publicly acknowledge the horrific tragedy that occurred yesterday in Oklahoma and to offer our collective sympathy and concern for those who have lost their lives and those who are facing devastation now. Mrs. Miller. We all join with that, and certainly for the unbelievable devastation. Ms. Jackson Lee. Unbelievable. Mrs. Miller. It is difficult to even understand it as you are watching it, but a time when all Americans come together for our fellow Americans. Ms. Jackson Lee. Thank you, Chairwoman. As we have homeland security before it, I know that--hopefully that we will be having some briefing for the entire committee to make sure that we can be as helpful as we possibly can. So I thank the Chairwoman for allowing me to say that, and to the Members, as well. Let me start off by just a quick question as to whether reduced resources--I think DHS's facing sequestration and reduced resources are impacting your work. Mr. Wagner. Mr. Wagner. Yes, the reduced resources impact us. But we are also--have a very concerted effort to look at our operations and ensuring they are as critical as they can be. Changing things and procedures in places where we are getting the most efficient and secure---- Ms. Jackson Lee. But you are responding to the lack of resources. Is that what you are saying? You are being creative and efficient, but you are responding to the lack of resources. Mr. Wagner. Yes. Ms. Jackson Lee. You are doing things differently. Mr. Dinkins. Mr. Dinkins. Absolutely, ma'am, it has definitely had a major impact on our operations. Ms. Jackson Lee. Let me go directly to the matter in Boston, the Boston Marathon. As you well know, the younger bomber had three of his friends arrested. One of the students, one of his friends, was a student from Kazakhstan and had had an expired I-20 certificate of eligibility. And came back into the country, and had a student visa but did not have the current I-20. However, the CBP Officer was unaware his I-20 was terminated and admitted him into the country in error. I guess we have established that he admitted him in error. I understand that there is a lack of interoperability between the tech and SEVIS, and that we have known about this vulnerability since 2007. First, I would like--I am just gonna go to Mr. Wagner and Mr. Dinkins. Be as brief as you can. Why do you think this happened? I mean, I articulated that the I-20 was not in place, but my understanding that they carry that around and he did not have it, or it was expired. What are our CBP trained to do? Then if this was a known vulnerability since 2007, why hasn't it been fixed? Mr. Wagner and Mr. Dinkins. Mr. Dinkins. Yes, ma'am. In fact, we have known about this vulnerability. This is kind of what--I will give you in a nutshell real quick on how that happens. So he had actually left the country. So you get--your visa is good for up to 5 years, but it requires you to have an I-20 to actually attend school. It is a two-piece type of verification process. Ms. Jackson Lee. Correct. Mr. Dinkins. So he had--was out of status, left school. But he actually left the country. So when we got the records indicating that he was out of status and left the country we did not send out a lead or put out any type of alert for him because he had left the country. The vulnerability there, as you had mentioned, is that it is a paper form. The I-20 is a paper form. So it is never canceled as a hard form. So actually, starting in April of this year we had actually made the progress to start piloting a fix for that. We ran it through April, to where even if those records were closed out we were using a batch input of anybody that had that---- Ms. Jackson Lee. Do you have any other database inoperabilities that you are trying to deal with, and have you dealt with them? Mr. Dinkins. We are dealing with them--either electronically solutions or through an export and import, you know, mass. Ms. Jackson Lee. What--from 2007, really from 2001, what took so long? We are now 2013. Mr. Dinkins. It is--the technology, ma'am, is so old--is very old, and---- Ms. Jackson Lee. So are we going away from the paper I-20, or we are still--and when will we hit the non-paper I-20? Mr. Dinkins. That is a good question. I am not for sure exactly when. But we have worked around that to make sure that--right now is, if you were to come back in and you had been out of status on an I-20, and now you will have to go to-- Customs and Border Protection will validate that when you come in that you have a good I-20, and---- Ms. Jackson Lee. Okay, this is as of today, May 21, 2013? This is since the Boston tragedy. Mr. Dinkins. Yes, we had started doing that in April. Started running a pilot program, where we were doing the checks and balances of those, yes. Ms. Jackson Lee. Let me just--the GAO just stated that you have gone down from 1.6 to 1 million overstays, 44 percent are non-tourists. The others are under visa waiver. What are you doing to get down past the 1 million, and how fast can we get down past the 1 million? Mr. Dinkins. We had originally been referred to--and there are two things here. There is the original, the IG report, which indicated there was about 1.6 million. Which we whittled down to about 800,000. Ms. Jackson Lee. Okay, your number is 800,000? Mr. Dinkins. Yes. But there is--but that is in this one particular instance. So there is a--I guess, as Ms. Gambler had mentioned, about a million in the system that are unmatched. Those are coming through different ways. As we go under the Canadian system and doing that checks and balances, those could whittle out some of those, as well. But it is an incremental process, so each type of advance that we get can actually whittle those down. Ms. Jackson Lee. Let me just put something on the record, Madam Chairwoman, and I will yield back to Mr.--thank you--to Mr. Wagner of a problem of badging at the IAH Airport. I think I mentioned that in my testimony. So do you have a quick answer of your fixing it, or---- Mr. Wagner. Yes, we would be happy to discuss afterwards some of the details. We did review it. Ms. Jackson Lee. I will put my complaint on the record, which is that my legitimate workers are being prevented from getting to their job because of the badging problem. With that, Madam Chairwoman, I will yield back. I thank you for your courtesy. Mrs. Miller. I thank the gentlelady. I would ask unanimous consent, as well, if the gentleman from Florida, Mr. Bilirakis would--a former Member of the committee--be allowed to sit in our hearing and participate. Without objection, so ordered. The Chairwoman now recognizes the gentleman from South Carolina, Mr. Duncan. Mr. Duncan. Thank you, Madam Chairwoman, and thanks for having this hearing. I think it is timely, with the immigration debate that is raging on the Hill and with the Senate taking up the immigration reform legislation. We do have an illegal immigration problem in this country. I will note for the record that 40 to--roughly 40 to 50 percent, almost half, of all the illegal aliens in this country came here legally. They came through an airport or a port through a visa system. They were students, they were tourists, and they were here on a work visa. Decided they loved America as much as I do, and decided to stay. We know who these people are. They have had an interview at a consulate, they filled out an application. We probably have a last known address, we probably know where they were going to school, where they were working or the hotel they were staying at. So that is low- hanging fruit as far as I am concerned with regard to immigration enforcement. Because these aren't chasing footprints in the desert. These are people that we know about. It is a little different when you talk about an illegal alien that just walked across our Southern Border or across our Northern Border, or got off a merchant ship and decided to enter this country illegally. These are folks that willfully came to this country, and we gave them permission. By issuing that visa, America is saying come on in to our country, experience what we have in--here in America. Work for an employer, go to school, or enjoy our country as a tourist. I was doing some research about student visas. I understand that they have got to go through an application process and they have to have an interview at the consulate. In fact, everyone that comes for a visa has to have an interview unless you are of certain ages. If you are 13 or younger you generally don't require an interview. If you are 80 and older an interview is generally not required. But if you are 14 to 79 you went to a consulate or you went to an embassy in your home country, and you sat down in front of a customs enforcement officer or a CBP Officer or somebody from the Department of State and y'all had an interview. It says here, on student visas, we gave a thumbprint. You are gonna give--an ink or non-ink digital fingerprint scan will be taken as part of your application process. I think that is vital, as we talk about an exit system, that we do have that information. But as we look back at what happened in Boston, with the bombing there, according to reports one of the individuals arrested in connection with the aftermath of the Boston Marathon bombing was able to return to the United States despite the fact that he lacked proper documentation associated with his student visa. So I have got to ask myself, when he came into this country and he walked in front of that customs enforcement officer at that airport--which I have done at Dulles and Atlanta and other places--that little interview, when they ask you that question that, as Americans coming into our own country, I am intimidated, I am nervous. This guy was coming into our country without the proper documentation. Yet we stamped his documents and let him come into the country. That alarms me as a United States citizen. According to the reports, the lapse occurred in part because the Customs or Border Protection Officers at primary inspection currently do not have access to ICE's Student Exchange Visitor Information System, SEVIS, database to verify whether a student has an active I-20 and is eligible to be admitted to the United States. So we are granting the visa over, but we are not telling the proper authorities that are doing that interview in that line at Dulles International Airport or at Boston airport or in Atlanta, Georgia. They are not having access to the information they need to determine the eligibility of that guy's status coming into this country. Wow. We have had numerous hearings in this committee in the last Congress, and already one in this Congress, where we have talked about this failure to communicate between systems, across agency lines. We had the 9/11 Commission report, talked about security information being stovepiped. But we are talking about folks that we allow to come in this country, visas that we issue, and we are not allowing the guys that are the front line defense of our country that are standing in that booth or sitting in that booth, interviewing those folks coming into this country, they don't have access to the information that they need to determine the status of that individual coming in. It is no wonder we don't have more people like the gentleman that came in from Boston, that went to Russia and came back. It is no wonder we don't have more of that if y'all aren't allowing those computer systems to talk to one another, if the information isn't being shared with the vital front line components in this Nation. So I am alarmed about that. America is alarmed about that, and they are looking to us as Members of Congress to ask the hard questions about why. Why aren't those computer systems talking? Why doesn't his personnel that are standing in those booths have the information that they need to determine whether that person can or cannot come into this country? Those are the questions that we need to ask. Those are the questions America is asking. When we look that we have spent hundreds of billions of dollars, established DHS and 225,000 employees. We have spent a lot of money in this country to try to make this country safe, and these seem like simple components that have been either overlooked or neglected. I think about the first suspect or person of interest, the Saudi national that was in the hospital. He was supposed to be going to college in Ohio. A text file was created on that individual because they couldn't determine that he was ever enrolled in college in Ohio. But yet he had sent his paperwork in to go to a college in Massachusetts and so he was original suspect because there was a failure of communication there. Guys, we have got to get it right. We have got to address this, and we have got to address it fairly rapidly to get it right to secure this country. That is what this committee is charged with, that is what you guys are charged with. Madam Chairwoman, I hope we have another round of questions. Because on my rant I didn't get to my question. So I yield back. Mrs. Miller. We are gonna try to have another round of questions, depending on our time. I thank the gentleman. The Chairwoman now recognizes the gentleman from Texas, Mr. O'Rourke. Mr. O'Rourke. Thank you, Madam Chairwoman. Thank you for holding this hearing and assembling this panel. I want to actually follow up on the comments made by the gentleman from South Carolina about the need to share information, and the interoperability of systems between CBP and ICE. To illustrate the problem a different way, in El Paso, the community I represent, the University of Texas at El Paso treats its students from Ciudad Juarez as though they are in-State tuition students. So it is as though they are in El Paso living in our community because, in many ways, we are one community. Thousands of those University of Texas at El Paso students start their day, every day, in Juarez and cross our ports of entry to come into El Paso to attend classes. Following the Boston bombing, these students were sent into a primary and secondary inspection process that, at times, lasted up to 8 hours for these students to cross. I want to say that both CBP and ICE were very responsive to our office when we brought this issue to their attention. But our understanding was, there was a lack of communication between the computer systems at ICE and CBP. So with that being the case, and the facts that Mr. Duncan just laid out, before we invest in new systems, new biometric systems, how do we get the systems we already have working the way they should be? I will address that to Mr. Wagner and Mr. Dinkins. Mr. Dinkins. Yes. The situation you mentioned was--while we were piloting the program to validate this process in the interim we started doing--you know, CBP started doing a hard inspection, basically, of the I-20s going back into secondary, and then querying the system to make sure that it was valid, and SEVIS and directly into the system. Since that time, though, however the only people that would have to go back to secondary are people who had been--an I-20 canceled. So they are attending school and had it canceled for some reason. They were still on their original visa. Then now they are coming back in, when they actually should have already left and not returning. So those are the only ones that are gonna be returning. Now, they could be coming back in because they have a new I-20. But our systems are actually now communicating. So that is what we had started in April. So now we have--you know, we are doing batch runs for exporting that data and importing it in. A record will only be created for the people that we actually want to talk to, rather than having to look at the whole pool and narrowing it down, actually, on the front lines. Mr. O'Rourke. It seems like there was some fundamental breakdown in the week following Boston. I can't tell you how many phone calls our office received. And a breakdown that your Department has fixed subsequently. So it does seem like there are still some problems within the system. Related to that, I want to ask Mr. Lyon, my understanding is that we began in earnest on this biometric entry-exit system in 1996. Since then, how much have we spent on this system? Mr. Lyon. We actually really started in--even though the first law was passed for an integrated entry-exit system in 1996. It wasn't until 2003 that we actually built the biometric entry system. Then we--that was at the air and seaports. Then we rolled it out to the land border ports on the Northern Border and the Southern Border in 2004-2005. Since that date, when you talk about the--to maintain and operate both the IDENT biometric system and ADIS, Arrival and Departure Information System, I believe since 2003 the number through fiscal year 2012 is about $3 billion. But I can get you that exact number. But you have to remember, IDENT supports more than just entry. It supports ICE Investigation, it supports the Department of State overseas. It supports CIS, when someone applies for legal permanent residence or to become a U.S. citizen we house those prints in our system. The IDENT system houses about 154 million unique individuals in that system of foreign nationals. Mr. O'Rourke. Mr. Lyon, how much more do we need to spend to fully complete this system? Mr. Lyon. There was an estimate. DHS did a proposed rule back in 2008 to implement a biometric exit system. The cost ranged, over a 10-year period, anywhere from $3 billion to $9 billion depending on what you wanted to do. But right now, what the Department is doing, CBP--I don't want to speak for them, but they are working very closely with S&T looking at a biometric exit solution. They are putting a lab together, and actually are going to be looking to build a cost-effective biometric system. I think the challenge that we have is--and having worked in this field for over 12 years now, looking at entry and exit, exit is a huge challenge because of the infrastructure problem. For arriving in the United States, obviously we have done--over the years, we have, you know, great facilities to actually be able to inspect everyone. But we have an open society, as we all know. So the issue is, we have never built any exit infrastructure, whether that is at an airport, whether that is at a seaport or a land border. So that is why that cost is so expensive. Mr. O'Rourke. My time is up. If there is a second round of questions I would like to know, from Ms. Gambler, if there is a way to do a cost-benefit assessment on programs like these. So I yield back. Thank you. Mrs. Miller. I thank the gentleman. The Chairwoman now recognizes the gentleman from Pennsylvania, Mr. Barletta. Mr. Barletta. Thank you, Madam Chairwoman, and I want to personally thank you for this hearing today. These overstays-- has been my main focus since I got on this committee. I believe it is very important. Because there is so much focus on the Southern Border, when we talk about border security. I believe that these overstays are a much, much more serious National threat. Furthermore, I don't even believe we should be talking about any type of immigration reform for a claim--or make a claim that our borders are secure, 90 percent secure or 100 percent secure unless we fix this visa overstay problem. Until we understand that this is just as serious as someone crossing one of our borders and include that in whether or not our borders are secure, then we are creating an illusion to the American people that we can now move forward with immigration reform until that is done. As I said many times, any State that has an international airport, being that 40 percent of the people enter the country legally, with a visa, any State that has an international airport is a border State. One of the 9/11 hijackers, as you on the panel know, entered the country on a student visa. Two other of the 9/11 hijackers had their student visas approved years after they were dead. Student visas are one of the most preferred methods for terrorists to gain entry into our country. Now, within the United States ICE's Student and Exchange visa--Visitor Program, SEVP, certifies universities that wish to admit foreign students; once a university has been enrolled in SEVP they can offer a student admission. Now, Congress has required that SEVP schools be recertified every 2 years. But as of last year, ICE has recertified only 19 percent of more than 10,000 schools that participate in this program. Mr. Dinkins, can you describe the process for recertifying universities in an SEVP program? Given the power that these universities have to bring foreign students to our country, why has ICE been so lax in recertifying universities? Also, why does ICE not conduct background checks on school officials who participate in this program? Mr. Dinkins. Sir, great question. Historically, we did not have the resources, or a unit set up, to go and validate each university every 2 years. Now we do do that. We have built a unit. I don't have the exact month, but I believe it is by the end of the year, we will have completed the first go-round of reviews of the--each university or institution that has foreign students. Mr. Barletta. If I could just jump in there a second. Mr. Dinkins. Yes, sir. Mr. Barletta. Being the fact that is the most preferred way for terrorists to enter the country, wouldn't it make sense to reallocate funds within the Department? Mr. Dinkins. Yes, and now it is not a funds issue anymore, sir. We have built this program, and we have that capability to do it. We are on-going through it. Now, what we are finding, too, is that before, you might have 10,000 universities that would be willing to do it because it was a paper exercise. But now that they know that they have to go through this process and be reviewed, some of those are dropping out. So we have had a few hundred actually, I believe, that is dropped out of the process. But it is now a rigorous process, that they go in. We need to make sure that they are allowing-- that they are capable of handling the number of students that they are actually allowing and enrolling. Because you can have fraud, institutional fraud, as well as just the threat of the individual students themselves. Mr. Barletta. According to your testimony, DHS responded to a recent GAO report by partnering with the FAA to ensure proper certification for flight schools. Why is this happening 11 years after 9/11, when we know several of the hijackers exploited the flight school loophole? Mr. Dinkins. Historically, sir, I can't answer--have not been here, knowing that for sure. I am sorry, I can't answer that. However, now we do--we built that in there, and we are using our system to actually compliment FAA, who didn't--rather than them try to build an entire SEVIS type of structure, as well, for the flight schools. Mr. Barletta. I also understand that beginning last month, DHS began updating its arrival-departure database with SEVIS on a daily basis. Why did it take the Boston tragedy to make this happen? Mr. Dinkins. Sir, we actually had known, and been working for, that technological solution for quite some time. It was prior to the Boston situation that we actually had done that. The individual that Boston highlighted actually was in January. We rolled this out in April. But we had been working on that technological solution for some time. Mr. Barletta. Thank you, Mr. Dinkins. Hopefully, we will have a second round. Mrs. Miller. I thank the gentleman. The Chairwoman now recognizes the gentlelady from Hawaii, Ms. Gabbard. Ms. Gabbard. Thank you, Madam Chairwoman. I have some questions for Mr. Dinkins with regard to the estimated 40 percent of people who are here unlawfully who came on valid visas, that many of my colleagues have already touched on. You spoke briefly about prioritizing resources based on security threat. Would like you to speak to how you--basic--what is the criteria, and what is your process for identifying these security threats? Mr. Dinkins. So there is two-fold. So overall, in general, we have the prioritization for all immigration violations. But specifically related to the students program and the visa overstays, we work with the intelligence community and law enforcement. We come up with a criteria, and I don't want to talk about the criteria in open forum. Because then next thing you know, somebody is adopting the new criteria and trying to work around our system. But we vet that information against virtually every type of intelligence community or law enforcement database; from criminal, to intelligence, to National survey, public safety, or border security threats. Based on that, we screen out the number of hits. Then we actively go after those. As well as--so that leaves the population that would actually not be known to us, pose any threat to the country, specific threat to the country. However, it is a continuous process. So that gets re-done all the time. I think it is daily that those--anybody with a visa gets re-ran through the system each day. So if that were to change, and now we have new intelligence or new information, they would be captured in that and prioritized out. Ms. Gabbard. How effective is the interoperability in sharing that information, the analysis, between not only Federal agencies, but also the State and local law enforcement? Mr. Dinkins. Very good. Because if you become out of status, and you are a priority, we put you on a list of-- basically a hot list, right? It is getting ran every day. So we may not know where you are at today, and maybe not be able to find you, but if you do any type of--register a new car or get a phone account in your name, we are gonna get an alert and we are gonna to be able to now know where you are at. Also, it gets put into the databases for NCIC for--State and locals would actually know that this person is subject out of status. Ms. Gabbard. What about with regards to no-fly lists? You talk about prioritizing those who have overstayed. You know, we have heard reports of how many--the large number of people who are on no-fly lists and how many of those people actually present a security threat, or those who should be on the list who have a security threat and are not, and how many--whether they are U.S. citizens or otherwise, people who are on the list who don't pose a security threat, and basically taking up valuable--limited resources that should be addressed to those who actually pose a threat. Mr. Dinkins. Yes. I mean, you are bringing up a good point. Many times, we will have intelligence on a name-specific--you know, Jim Dinkins could be attending a camp, for example, in Afghanistan for a terrorism camp, but that is all we have. So when that person comes in--now I am traveling and my name is a match--you know, it can be distracting. Now, we go through and try to add that information in, and we--and the nominating agency is asked, whoever nominates, that they be on a no-fly list specifically in your situation that your brought up--would be asked to come back with more information on that. Also, Jim Dinkins--you know, the head of HSI, would eventually--may be stopped once or twice, but eventually be able to work out of that system once they were able to come up and validate that information. But it is a continuous process. So as we validate, for example, on our side, the F-1 students or the visas that come in from the State Department for visa applications, if we come up with data on that, or CBP or ICE or whoever has that data, we can--that we think somebody should be on the no-fly list, then we can actually nominate that person for the no-fly list. Ms. Gabbard. Thank you. Just one follow-up for Mr. Lyon with regards to the biometric exit program. Ms. Gambler mentioned in her testimony the necessity for a master schedule. It is mind-boggling that we have put so much money towards this effort already, and still don't appear to be making very much progress, and still a long road ahead of us. What is the status of creating a master schedule and a time line for actually implementing a biometric exit program that will allow us to track how many people actually are overstaying their visas? Mr. Lyon. Thank you for that question. The Department, last May, submitted a report to Congress about the status of biometric exit. In that report, it lays out the schedule that we have. A lot of the steps that we have taken over the last 18 months are in that plan. So the idea of making the--some of our systems more interoperable as we enhance the biographic exit system we have, those are steps that we are actively working right now. I believe we are on--there were three phases set up for the enhanced biographic exit. We have finished phase two and we are actually working on phase three. On the biometric exit piece, one of the things that is in the report, it talks about, really, a cost-benefit analysis and the idea of having a system that would be cost-effective. That is one thing that our science and technology director, working with CBP, is actually looking at. I believe, right now, if I remember the schedule correctly, that they are planning to actually do some lab tests. This year, they are setting up the lab, and then they are going to be starting some further tests in the future. But I believe fiscal year 2016 was in the schedule for actually doing operational tests. I will refer to Mr. Wagner, if he has any more information on that one. Mr. Wagner. Thank you. So we have been working closely with the science and technology branch in DHS. So we are out currently, right now actually, doing some of the baseline logistics and measurements of the outbound process at the major airports to look at, you know, what is the process, what are the logistics, what is the infrastructure, how does the passenger flow work, and getting a lot of those baseline measurements. Now, we are also looking at setting up a test lab with the science and technology branch. I believe we are scheduled for early next calendar year to have that operational, to start to test the current biometric capabilities against what some of those sort-of real-life situations are and what those real logistics are. Looking at the impacts to introducing, you know, the current biometric capability into the existing logistics of how travelers exit the United States either at--land or air. Because, again, like Mr. Lyon had mentioned earlier, you know, a lot of our transportation infrastructure was not set up to handle any outbound or exit-type processing. You know, it is like at airports--you know, airlines you don't come to one area just to depart the United States like they do on the inbound. They leave from any type of multiple gates or terminals. Ms. Gabbard. Thank you. Mr. Wagner. So it just adds to the complexity of it. Ms. Gabbard. Thank you. Thank you very much. Mrs. Miller. The Chairwoman now recognizes the gentleman from Utah, Mr. Stewart, for his questions. Mr. Stewart. Thank you, Madam Chairwoman. Like all of us, we thank the panel for your service, for your expertise, for being with us today. The other Members of the committee, Madam Chairwoman, we all believe that this is an important issue. It has some urgency to many of us. As has been said here over and over today, 40 percent is not an insignificant figure. We are not talking about a small problem. We are really talking about a significant problem. The importance in this committee and being able to help to address that, I appreciate. I think I share some of the frustrations that have been expressed today with the pace of our progress in that. Again, to the witnesses, thank you for your expertise. But I think we all agree that we can do better, and that we probably have to do better, on this. I would like to address quickly, if I could, some of the lim-facs, some of the limiting factors, that you are encountering. One of is, I suppose, with airlines. Airlines would like passengers to show up, very quickly move through security, get their tickets, be on board the aircraft without a lot of delay. It seems that that is where you are getting some pushback is the airlines helping to implement your being a partner with you. Is that true? If that is true, can you shed some light on maybe how we could incentivize them or prod them along, or how we could help with that process? Mr. Wagner, would you mind? Mr. Wagner. Sure, thank you. Thank you for the question. Yes, the airlines have been pretty vocal in what they see, really, as a Government responsibility being placed on them and their business to collect biometrics for exiting travelers. They do, however, provide the biographic information a number of years now on all inbounds and all outbound passengers. It is looking at the logistics and the impact to how airports are designed and how the airline business practices operate, and not being a big roadblock in travelers' navigating through the different components of leaving the United States. As the airlines, you know, look to move away from checking in at an airline counter or checking in at a kiosk, and removing some of the stops of that currently take place at an airport to board a flight, they look to automate that. I think they are very concerned about us injecting a new process into that. Mr. Stewart. Are we making progress towards that, though? Are are we breaking down some of their concerns and actually moving forward in implementing some of the--you know, these things that you would like to do, from your end? Mr. Wagner. Well, we continue to work with them. We are enhancing the biographical collection of the data. We are starting to validate when they transmit the manifest data to us in advance. We are validating that that document is on record and that it is accurate. They have been very good partners in working with us on that. But also, it is where do we put the technology collection in that process to ensure the person really left, and got on a plane and boarded and left? You know, if we put it at a place in the airport where someone can go check out, and then turn around and walk right out of the airport, it kind of defeated the purpose of what we set out to do. So it is do you put it on the jetway, do you put it on the plane? At what point in the process are we gonna capture people that actually are leaving in a place where we are not really gonna shut down air travel for people leaving. Mr. Stewart. Yes. It would seem to me that putting it on the jetways, is probably your only viable option, wouldn't you agree? Mr. Wagner. It is looking like that. That is why we are working with our science and technology branch about building a jetway and looking at the capacities and the infrastructure. What would the best biometric be to support that in, I will say, the less-intrusive manner to not slow down or shut down air travel. Mr. Stewart. Okay. Let me address, if I could, one more concern that I have as far as the limiting factor. That was perhaps some of the training or the vetting with the school officials who are responsible for updating these student visas, or the SEVPs. Is that a concern of only mine, or do some of you share that concern, as well? Because clearly, there have been some breakdowns in that area. Mr. Dinkins. It definitely, sir, has been an on-going process. But now, we have actually increased the number of designated school officials, as well. I believe that they are carrying that responsibility, the legitimate ones. Because there are some institutions that are created just literally-- legitimately for fraud purposes. You know--but those reputable ones that we are not criminally investigating actually, I think, do take that responsibility very seriously. We have a very continuous dialogue with them, on-going, each day. Mr. Stewart. So you are comfortable that if someone were here on a student visa, and they were expelled from school or withdrew from school for some reason, that that information would be passed on and that would be noticed now? Is that your testimony? That we have made progress in that? Mr. Dinkins. Absolutely, sir. Mr. Stewart. Okay. All right, thank you again. Madam Chairwoman, I yield back. Mrs. Miller. I thank the gentleman. The Chairwoman now recognizes the gentleman from Florida, Mr. Bilirakis. Mr. Bilirakis. Thank you, Madam Chairwoman. Thank you for allowing me to participate again today. I have been focusing on this student visa issue, closing these loopholes, since I have been in Congress. I have some questions for the panel, if I may. What can we do to ensure that foreign students abide by the terms of their student visas? That if foreign students leave school for any particular reason, they are not followed? Again, not--there is no oversight. We want to make sure that they do not remain in the country. Because I understand there are over 7,300, at least, overstays per year. I also want to focus on the interview process. My good friend talked about that. How many--what percentage of these applicants are interviewed as far as the screening process over there? I would like to know that. How comprehensive are the interviews? Mr. Dinkins. So I will work backwards in your question. So the interviews--so right now, and this is--I mean, this is great progress, and I am very excited about it. Is the fact that as when the State Department went to electronic visa, and with Patriot what we will be able to do with the new automated system, so they apply. They are sitting on their couch or in a cave in Afghanistan or wherever they may be. They hit ``submit'' on a visa application, that is gonna be transmitted through the system over CBP's National targeting center, where ICE and CBP sits. That information is gonna be churned way before--months, in some cases--before the State Department even sets up that interview. So we will have that lead time well in advance so if there--you know, if there is a red light because they are a known suspect, and there is no sense of doing an interview unless maybe for law enforcement purposes to gather some intelligence. But if it is a green light, they still have to sit down--every single one of those students sit down-- someplace, except for, as was mentioned, if they are young--you know, children or very senior individuals. They are gonna sit with an interviewer, and it is a pretty in-depth process. So that is the process as far as validating that they are coming here for legitimate purposes. Now, I do want to point out, as the economy and, you know, it is probably one of the factors. But I also do believe that some aggressive enforcement has played a role in this. Is that what we are seeing is that the number of out-of-country--so those people who may have not left exactly on time, but they have still departed when we start screening it--that number of folks has started increasing, that percentage is increasing. So we definitely have deincentivized, short of using, you know, the stick and going out and putting cuffs on them, them remaining in the country. So the numbers of people that we are getting that may stay over when they are supposed to, but ultimately do leave, is a growing number of population. Mr. Bilirakis. Could I ask you for maybe the contents--you are at liberty to give us the contents--of maybe an example interview? Tell me how long are those interviews, time-wise, in the average, would you say? Mr. Dinkins. I couldn't say how long exactly, on the average. But they are several minutes, at least, and longer. Because they sit down, they have to go through and validate the stuff on there that they have the economical--and it is with a consulate officer that they do the interviews with. So they have to validate that they have the economic means to actually sustain their--themselves at school and in the United States and so forth. So it is--I don't want to say it is a full-fledged background investigation, but it is definitely an in-depth interview that they go through with a consular office, who is trained to identify potential fraud. Mr. Bilirakis. Okay. You say that all applicants are interviewed, with the exception of the younger children. Is that correct? Mr. Dinkins. Yes, sir. Mr. Bilirakis. Okay. Let me ask you, with regard to the visa security units, I understand that there are nine. However, the State Department and Homeland Security have identified 50 high-risk areas in the world. I believe we have, currently, 19 in 15 countries. But I understand 11 of the top 20 posts are not covered. What is--why are they not covered? Why haven't we made more progress with regard to visa security units? How many have we put in place in the last couple of years? Mr. Dinkins. That is another good questions, is some of the highest-ranking threat locations that are identified between ICE and on the State Department for visa-issuing posts are in parts of the world where they are very geographically- challenged because of space, because of the security conditions. They are not building new embassies, and so forth. So in many of those cases, there is simply no space for us to actually get into to do it. With that said--as we are continuously going and chipping away at those top priorities as we have gotten new money. I believe that we opened up three this year, and we have plans to open up another one. So we will have 20 soon. But with Patriot, we are gonna be able to do with what we are doing with those pre-deployed people and actually expand that out. So I have, right now, 75 international offices, I believe it is, in 48 different countries. With Patriot, no matter where you are applying it--right now, our visa security, our special agents, are running those names manually. We are still doing the background and running it in the back, through the automated Patriot system for validation. But they are sitting down and bringing those people's names in. Soon, no matter in the entire world where you are at and you submit that application, we basically have the first line of visa security defense. Then the reason we will need people overseas will be to coordinate doing those interviews. Because now that we know that Jim Dinkins, a suspected terrorist, has applied to come into the United States for a visa the question shouldn't end there. The question should be, well, what is the plans for Jim Dinkins coming to the country. We need boots on the ground to be able to help turn that. Because if we just say no to Jim, no to Mr. Wagner--and they will eventually find somebody that we don't know about if we don't actively look at the reason why they are actually trying to get to the country in the first place. What type of plot, what type of criminal scheme they are doing. So we are covering the blanket much broader with a computer solution which will be able to give a red light, green light right off the bat. Then the yellow lights are the ones that we are gonna actually have to have boots on the ground to deal with. Mr. Bilirakis. Madam Chairwoman, thank you very much. I want to yield back. Can somebody, maybe someone else on the panel, address these issues? Or maybe we can wait until the second round of questions. Mrs. Miller [continuing]. So got to go. Mr. Bilirakis. All right, and---- Mrs. Miller. Yes, we are gonna go to a second round here. Mr. Bilirakis. Okay. Thank you so much. I yield back. Mrs. Miller. Thank you. Thank you. Mr. Bilirakis. Thanks for allowing---- Mrs. Miller. We are gonna obviously go to a second round of questions here. We appreciate the witnesses being here. Obviously, there is a huge amount of interest in this. I have to ask a--perhaps a naive question. But I am listening to all of this, and just trying to understand. When people actually get a visa--and somebody talked about the electronic visas, what is going on with that. So your visa is expiring. How do we notify, or do we even notifiy, people that their visa is expiring? Or we just leave it up to them to notify us? I mean, and if that is so, it would seem to me that everybody that gets a visa we would require them to have an e- mail address, for instance. Or we would just e-mail them, and say, look, your visa is about to expire. Tell us, you know, how--when do you expect to be leaving here? Are you gonna be leaving on time? Or if not, recognize we are watching you. I know it sounds ridiculously simple, but how do we tell people, if we do at all? Mr. Dinkins. Ma'am, I am not aware if the State Department has any type of communication with them on that, on the issuing date. Other than when they get it issued and they know that they have X amount of time in the country. Then when they get admitted, then they know that is reinforced at the port of entry upon admittance. But I am not for sure if the State Department has any type of communication with them as far as that it is a--I don't know of any. Mrs. Miller. I am not aware of any either. So it just would--I mean, it seems, like I say, ridiculously simple. But wouldn't it seem that we would at least e-mail then and say: Hey, time is up, and apparently you are gonna be leaving. Or if not, you better let us know, or, we are watching you. Anybody else have a comment on that? Mr. Wagner. So as part of the administration process at the port of entry, I mean, the visa has a date on it. We will grant them administration for a prescribed period of time, depending on the type of visa. A visa waiver traveler is gonna get 90 days. A person with a visa, depending on the type of visa and the purpose and their intent, or their visit here, we are gonna stamp the passport and write down the admit-until-date. Some of those admit-until-dates are the duration of status, like in the case of, you know, certain visa types: While they are in school, they are in status, and it gets a little more complex. But, you know, we are generally going to look at, and make our decision based, at the port of entry. Do we feel this traveler is going to comply with the terms of their admission and what they are saying they are doing, and what that visa is. But we are gonna grant their administration date until the date that we think they are gonna take care of what their purpose of their intent here. But there is a date on that visa. Mrs. Miller. Okay. I guess I am just throwing this out here. There seems to be such an easy, at least first step of trying to fix some of this. There has got to be communication on both sides. Just requiring anybody to get the visa, to have an e-mail address so that we can keep in constant contact with them without chasing them down if they move post offices, what have you. I would like to ask a question of Ms. Gambler, who has been sitting there. We think about a million visa overstays that are here currently, with the backlog, approximately, the number, 1 million unmatched records, as we call it. From the Government Accountability Office, what is your observation on the accountability of that kind of a number? Ms. Gambler. As we reported in our statement, DHS has not yet assessed that set of unmatched arrival records to look for trends in those records. We are continuing to analyze that set of records to identify additional trends, or categories. But it certainly might make sense for DHS to have a look at the different categories of populations that make up those records. Because that kind of information could help them better target their efforts to identify overstays and take enforcement action. Mrs. Miller. Thank you. In the interest of time, I will now recognize the gentlelady from Texas. Ms. Jackson Lee. Madam Chairwoman, I thank you. As indicated to the witnesses, I appreciate you. I may be stepping away. I am right in the middle of a mark-up in the Judiciary Committee, and being called for my amendments. But both of us, the Chairwoman and myself, agree that this is an enormously vital hearing and will generate, I think, a positive response for what our tasks are before us. I want to be very clear on the record that I do not see, or foresee, this being an obstacle to comprehensive immigration reform. But I do see the urgency of picking this up and quickly moving to give comfort to the American people, to give a framework, and to give an answer to this committee about how we tackle this now and on-going. I want to ask Mr. Dinkins, we say about 40 percent of the persons that are unlawfully present have overstayed their visa. About--and that these are millions of individuals. What would you estimate are the numbers that would likely pose a security threat? Mr. Dinkins. Very small, ma'am. We get those numbers--those in. So, for example, we vetted so far this year about 480,000 names of potential new visa overstays. Of that 480,000 names, about 3,000 of them actually hit a potential National security or public safety threat. So---- Ms. Jackson Lee. You have the--of those 3,000, do they get in a separate area? Do they get sent out to local law enforcement, fusion centers, joint terrorism task force, et cetera? Mr. Dinkins. Yes, those actually get criminal cases opened up on each and every one of those in our field offices to go track them down and arrest them. Ms. Jackson Lee. All right. Let me--thank you very much. On CBP, you--will CBP be working with DHS and S&T to evaluate technology as efficiently as possible in order to expedite the eventual deployment of a biometric exit? This is for you, Mr. Wagner. Are you all in the midst of really getting to the nuts and bolts to get the kind of technology that is necessary? Mr. Wagner. Yes, we are out there currently baselining the existing operations and looking at the existing exit, or outbound, processes at the airports with S&T and looking at what are those logistics and what are those operational capacities and constraints on how we would do it. Then we will set up a demo lab to look at the current states of biometric technology and how we can fit that into the existing logistics or right existing constraints to find out: What is the best biometric to deploy out there to capture the exiting biometrics? Ms. Jackson Lee. Mr. Evans--I am sorry, Mr. Lyons, how fast can this pace go? Mr. Lyon. Ma'am, it is--I think it is going at the pace that was in our plan that was released last year. Then---- Ms. Jackson Lee. What is your plan--when do we think we are gonna be there? Mr. Lyon. As in the plan, I believe that we are looking at fiscal year 2016. Like Mr. Wagner said, they are setting up the lab to allow them to do lab tests. Then from there, they can actually then start doing some operational pilots. Ms. Jackson Lee. Is there a resource question impacting your time frame? Money question impacting how fast you can move? Mr. Lyon. I would have to defer that to---- Ms. Jackson Lee. Mr. Wagner? Mr. Lyon [continuing]. To Mr. Wagner. Mr. Wagner. Yes, because it will be expensive to deploy---- Ms. Jackson Lee. All right, so let me--I am going to do, in the interest of time, too. Let me conclude. Gentlemen, I got your answers. I am not cutting you off. I just thank you very much for your answers. What I see here is that you have laid out the problem and the answer, or the answer and the problem. You have laid out that you are working--and I would say this, Madam Chairwoman. First of all, I think we should have some on- going briefings, continued hearings. Probably briefings may be faster. I would like to get an updated time line on what you think can be expedited that would move you further in from 2016; further going this way. Meaning 2014, 2014-\1/2\, et cetera. The other thing that I think is very important, I am gonna put on the record. Our airlines have to be part of this effort. This is a business, I understand it, they make profits. But the United States Government is providing them with their infrastructure of security. I do believe, with all of our Constitutional protections, we should look at a framework that would fit the United States, Madam Chairwoman that would be an exit infrastructure that would not infringe upon our Constitutional values and principles. I believe a briefing with the airlines would be very helpful, try and understand what their issue is. I would also ask for any of you to provide me with any work that you have done with Israel in looking at Israel's system of exit visas. I would like an answer in writing on that, Madam Chairwoman. I yield back. Mrs. Miller. I thank the gentlelady. The Chairwoman recognizes the gentleman from South Carolina, Mr. Duncan. Mr. Duncan. Thank you, Madam Chairwoman. Thank you guys for your service. But I must say I am alarmed by something I just heard when the Chairwoman was asking you a question. We are relying on the honesty of visa holders to look at that date and say, ``Oh, no. I got to get out of here by March 31.'' We are not notifying them? We don't--you know, after, say, June 31 go, ``We gave him a little bit of a grace period. Let's go knock on their door.'' We are relying on them to understand--I mean, my license expires on my birthday, and I still let it go beyond the expiration date before I go get it renewed. Wow. Did I understand you right, that we are relying on them to look at that date? Mr. Wagner. It is an assessment of the traveler to make a determination are they going to comply with what their exit date is intended. It may be a question of looking at their airline ticket and their return ticket for when they intend to leave. It may be a case of, you know, visa waiver travelers restricted to 90 days here. We ask them where they are going, why they are going, what they are gonna be doing. We make that assessment and we make that call. If we feel they are not going to comply with the terms of that administration or that visa we are not going to admit them to the United States. We are going to restrict them in how long they can be here. But by and large, yes, you are correct. It is up to that traveler, once they are released from that port of entry and admitted, if their plans change there are mechanisms where they can go and engage with citizenship and immigration services to extend the terms of their administration or they can change status. But by and large, we are not following each one of these people around to ensure that they do actually comply with it. We--a lot of it is left up to them. We do stamp their passport and tell them which date they are admitted until. But you are correct, in that by and large it is up to them. Mr. Duncan. Let me ask you this, then. How do we know when they leave the country? Mr. Wagner. So if they fly out by commercial air---- Mr. Duncan. You are looking at manifests---- Mr. Wagner. We will get the manifest. Mr. Duncan [continuing]. For either travel by boat, or manifest. In Canada, we have got some data-sharing. I read about that, but---- Mr. Wagner. Correct. So that information will feed into the arrival-departure information system. If it is then matched up, and we find that the person did overstay and the person is out of the country, an alert will be placed in our database. So either the Department of State, when the person applies for a visa again---- Mr. Duncan. What if the name is put in differently? Mr. Wagner. If it--well, if it---- Mr. Duncan. What if they leave out a middle initial or the name is spelled differently? Mr. Wagner. It depends on the variations and how wide our algorithms are casting a search to find up those names. When they apply for ESTA, when we get the APIS manifest from the airline that this person's intending to travel, if we see they are a prior overstay they are going to be inadmissible to the United States. We are going to call that airline and recommend they don't board that person because they are gonna have to fly him right back. If we have our immigration advisory on-site at those 11 locations overseas, working at the gate with the airline personnel as people board, they are going to wait for that person to check in, and interview them, and march them over to the airline desk and tell them we do not recommend this person flies because they are more than likely inadmissible to the United States because they overstayed previously, or we don't feel this person is going to comply with the terms of the admission. But it is a matter of collecting that exit information, piecing it back together, placing an alert in our system so our various stages we can catch these people and prevent them from coming back. Mr. Duncan. I appreciate what you are trying to do there. The Department of State is involved in this. So the gentleman said a minute ago--Mr. Lyon said about the Department of State not communicating with you guys as well with--and notification of visa overstay. So I think we got some issues here. I want to shift gears. Ms. Gambler, do you agree with the assessment of the Pew Institute? I think in 2006 they said there were about 4\1/2\ million overstays here. Do you think that number is accurate? Ms. Gambler. Congressman, we have not specifically assessed the reliability of that estimate. I think what will be telling is when DHS reports overstay estimates at the end of this year, which they have announced plans to do so. I think then we will need to look at the methodology that DHS is using to report those overstay estimates and what, if any, limitations they identify with that methodology. Mr. Duncan. What do you project the number to be, today, 2013? Ms. Gambler. Congressman, GAO is not in a position to make an estimate because DHS does not have--or DHS itself has not reported estimates of overstay rates. We previously identified challenges the reliability of the data that they used to identify potential overstays. That data would feed into their estimating of overstay rates. Mr. Duncan. Right. Mr. Wagner, you are--DHS currently collects the information regarding the number of visa overstays from each country. However, to date it has refused to share such information with Congress. They say they are gonna share this by the end of the year. Why hadn't they released the information? What are we waiting on here? Mr. Wagner. I believe the offices that are working on that information are still validating the accuracy of it and piecing together people that might not have just arrived and departed via commercial air. But some of the more complexities I discussed earlier about why someone might not have a readily apparent departure from the United States, and going through those different systems and finding if there is a departure record. Or if there is a legal way that they adjusted their status and they are still here legally. Or, in the case if they are not here, you know, if they are here but they are in overstay, in fact. So it is a matter of verifying the accuracy of that information and making sure it is complete and accurate before it is released. Mr. Duncan. Thank you. Madam Chairwoman, when you fly to Mexico they give you a little card that you have to keep with your passport. When you leave the country, you turn that back in and they keep that. It seems like a fairly simple system to me. I yield back. Mrs. Miller. I thank the gentleman. For the last questions, for Mr. Barletta, from Pennsylvania. Mr. Barletta. Thank you, Madam Chairwoman. According to the Department of Justice, 10 percent of individuals who have been convicted of terrorism, terrorism-related charges, have entered the United States legally and overstayed their visas. Unless this is addressed, I see this as a major stumbling block to immigration reform. We are talking about giving amnesty to 11 million people in the country illegally, and 40 percent of them overstayed their visas and are a possible threat to our National security. Now, ICE devotes approximately 3 percent of its resources to investigating visa overstays. Federal law requires that DHS report overstay estimates, but DHS has not done this since 1994. Mr. Dinkins, being the fact that 40 percent of illegal immigrants are visa overstays, and the Morton memorandum only prioritizes criminal aliens for deportation, so how can this administration claim that they are serious about securing our borders? Mr. Dinkins. So we have--there are multiple areas that we prioritize our work. As you mentioned, criminal aliens is definitely our priority to remove. But we are dealing with the confines of funding. But not just for ICE and not for special agents and deportation officers and so forth. We are dealing with a system. The system can only handle about 400,000 that we put into a year. We are trying to make sure that those 400,000 make up the greatest threat for public safety and National security and border security that we can, to make sure that we are not collapsing the system to make it even, you know, less efficient than what it is designed to do. Mr. Barletta. You know, without enforcement, our laws mean nothing. I am very concerned that what we are doing is really just creating a paper tiger. I will give the definition of a paper tiger. It is something that gives the appearance of strength, but is actually weak and ineffective. Thank you. I yield back. Mrs. Miller. I thank the gentleman. Again, I want to thank the witnesses. It has been an excellent hearing, I think. We have got a lot of good information and have a lot of ideas from a Congressional standpoint of things that we may want to be legislating to improve our visa system. I appreciate all of your service to the country as we work toward our common goal of securing the homeland. Pursuant to committee rule 7(e), the hearing record will be held open for 10 days. Without objection, the committee stands adjourned. [Whereupon, at 11:53 a.m., the subcommittee was adjourned.]