[House Hearing, 108 Congress] [From the U.S. Government Publishing Office] IMPROVEMENTS TO DEPARTMENT OF HOMELAND SECURITY INFORMATION SHARING CAPABILITIES--VERTICAL AND HORIZONTAL INTELLIGENCE ======================================================================= HEARING of the SUBCOMMITTEE ON INTELLIGENCE AND COUNTERTERROSIM before the SELECT COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED EIGHTH CONGRESS FIRST SESSION __________ JULY 24, 2003 __________ Serial No. 108-21 __________ Printed for the use of the Select Committee on Homeland Security Available via the World Wide Web: http://www.access.gpo.gov/congress/ house __________ U.S. GOVERNMENT PRINTING OFFICE 98-599 WASHINGTON : 2005 _____________________________________________________________________________ For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800 Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�0900012005 SELECT COMMITTEE ON HOMELAND SECURITY CHRISTOPHER COX, California, Chairman JENNIFER DUNN, Washington JIM TURNER, Texas, Ranking Member C.W. BILL YOUNG, Florida BENNIE G. THOMPSON, Mississippi DON YOUNG, Alaska LORETTA SANCHEZ, California F. JAMES SENSENBRENNER, JR., EDWARD J. MARKEY, Massachusetts Wisconsin NORMAN D. DICKS, Washington W.J. (BILLY) TAUZIN, Louisiana BARNEY FRANK, Massachusetts DAVID DREIER, California JANE HARMAN, California DUNCAN HUNTER, California BENJAMIN L. CARDIN, Maryland HAROLD ROGERS, Kentucky LOUISE McINTOSH SLAUGHTER, SHERWOOD BOEHLERT, New York New York LAMAR S. SMITH, Texas PETER A. DeFAZIO, Oregon CURT WELDON, Pennsylvania NITA M. LOWEY, New York CHRISTOPHER SHAYS, Connecticut ROBERT E. ANDREWS, New Jersey PORTER J. GOSS, Florida ELEANOR HOLMES NORTON, DAVE CAMP, Michigan District of Columbia LINCOLN DIAZ-BALART, Florida ZOE LOFGREN, California BOB GOODLATTE, Virginia KAREN McCARTHY, Missouri ERNEST J. ISTOOK, JR., Oklahoma SHEILA JACKSON-LEE, Texas PETER T. KING, New York BILL PASCRELL, JR., New Jersey JOHN LINDER, Georgia DONNA M. CHRISTENSEN, JOHN B. SHADEGG, Arizona U.S. Virgin Islands MARK E. SOUDER, Indiana BOB ETHERIDGE, North Carolina MAC THORNBERRY, Texas CHARLES GONZALEZ, Texas JIM GIBBONS, Nevada KEN LUCAS, Kentucky KAY GRANGER, Texas JAMES R. LANGEVIN, Rhode Island PETE SESSIONS, Texas KENDRICK B. MEEK, Florida JOHN E. SWEENEY, New York JOHN GANNON, Chief of Staff UTTAM DHILLON, Chief Counsel and Deputy Staff Director DAVID H. SCHANZER, Democrat Staff Director MICHAEL S. TWINCHEK, Chief Clerk ______ Subcommittee on Intelligence and Counterterrorism JIM GIBBONS, Nevada, Chairman JOHN SWEENEY, New York, Vice KAREN McCARTHY, Missouri Chairman EDWARD J. MARKEY, Massachusetts JENNIFER DUNN, Washington NORMAN D. DICKS, Washington C.W. BILL YOUNG, Florida BARNEY FRANK, Massachusetts HAROLD ROGERS, Kentucky JANE HARMAN, California CHRISTOPHER SHAYS, Connecticut NITA M. LOWEY, New York LAMAR SMITH, Texas ROBERT E. ANDREWS, New Jersey PORTER GOSS, Florida ELEANOR HOLMES NORTON, PETER KING, New York District of Columbia JOHN LINDER, Georgia JAMES R. LANGEVIN, Rhode Island JOHN SHADEGG, Arizona KENDRICK B. MEEK, Florida MAC THORNBERRY, Texas JIM TURNER, Texas, ex officio CHRISTOPHER COX, California, ex officio (ii) C O N T E N T S ---------- Page STATEMENTS The Honorable Jim Gibbons, a Representative in Congress From the State of Nevada, and Chairman, Subcommittee on Intelligence and Counterterrorism Oral Statement................................................. 1 Prepared Statement............................................. 3 The Honorable John Sweeney, a Representative in Congress From the State of New York, and Vice Chairman, Subcommittee on Intelligence and Counterterrorism.............................. 3 The Honorable Christopher Cox, a Representative in Congress From the State of California, and Chairman, Select Committee on Homeland Security Oral Statement................................................. 38 Prepared Statement............................................. 6 The Honorable Jennifer Dunn, a Representative in Congress From the State of Washington 4 The Honorable James R. Langevin, a Representative in Congress From the State of Rhode Island................................. 41 The Honorable Nita M. Lowey, a Representative in Congress From the State of Rhode Island...................................... 44 The Honorable Edward J. Marky, a Representative in Congress From the State of Massachusetts..................................... 56 The Honorable Karen McCarthy, a Representative in Congress From the State of Missouri Oral Statement................................................. 60 Prepared Statement............................................. 9 The Honorable Kendrick B. Meek, a Representative in Congress From the State of Florida........................................... 5 The Honorable Jim Turner, a Representative in Congress From the State of Texas Oral Statement................................................. 4 Prepared Statement............................................. 8 WITNESSES Mr. Darin Daniels, Preparedness Planning and Training Manager, Maricopa County, Arizona Oral Statement................................................. 34 Prepared Statement............................................. 36 Mr. George W. Foresman, Deputy Assistant to the Governor on Counterterrorism Oral Statement................................................. 29 Prepared Statement............................................. 30 Mr. James Kallstrom, Senior Adviser to the Governor on Counterrosim Oral Statement................................................. 14 Prepared Statement............................................. 17 Mr. V. Phillip Lago, Deputy Executive Director, Central Intelligence Agency Oral Statement................................................. 20 Prepared Statement............................................. 22 Mr. Steven McCraw, Assistant Director Office of Intelligence, Federal Bureau of Investigations Oral Statement................................................. 24 Prepared Statement............................................. 25 Mr. William Parrish, Acting Assitant Secretary, For Information Analysis, Department of Homeland Security Oral Statement................................................. 9 Prepared Statement............................................. 12 APPENDIX Questions and Responses for the Record Questions and Responses for the Record from Mr. William Parrish.. 73 Questions and Responses for the Record from Mr. Steven C. McCraw. 75 Questions and Responses for the Record from Mr. James K. Kallstrom...................................................... 78 IMPROVEMENTS TO DEPARTMENT OF HOMELAND SECURITY INFORMATION SHARING CAPABILITIES VERTICAL AND HORIZONTAL INTELLIGENCE COMMUNICATIONS ---------- Thursday, July 24, 2003 U.S. House of Representatives, Subcommittee on Intelligence and Counterterrorism, Select Committee on Homeland Security, Washington, D.C. The subcommittee met, pursuant to call, at 2:10 p.m., in Room 2318, Rayburn House Office Building, Hon. Jim Gibbons [chairman of the subcommittee] presiding. Present: Representatives Gibbons, Sweeney, Dunn, Cox (ex officio), McCarthy, Langevin, Markey, Lowey, Meek and Turner (ex officio). Mr. Gibbons. The House Subcommittee on Intelligence and Counterterrorism for the House Select Committee on Homeland Security will come to order. I would like to begin by welcoming everybody here to our hearing today. We are going to start, and hopefully my colleague and friend Karen McCarthy from Missouri will be here shortly for our statement as well, and what I will do is begin my statement and then allow for Ms. McCarthy to enter her statement. Hopefully she'll be here by then and then we will open it up for other members of panel statement and then we will turn to our witnesses. This looks like it is going to be a great hearing for us, very interesting panel we have before us today, and we are all looking forward to the information we are going to receive. Let me begin by saying that since September the 11, 2001, terrorist attacks, Congress has focused on the performance of the Intelligence Community and whether intelligence and other information are effectively shared to prevent or respond to a terrorist attack. Today governments at all levels recognize that they have a greater role to play in protecting the Nation from terrorist attacks, and to achieve this collective goal, homeland security stakeholders must effectively work together to strengthen the process by which critical information can be shared, analyzed, integrated and disseminated to help prevent or minimize terrorist activities. The success of a homeland security strategy relies on the ability of all levels of government to communicate and cooperate effectively with one another. Activities that are hampered by organizational fragmentation, technology impediments or ineffective collaboration blunt the Nation's collective efforts in this matter. As it is with so many other homeland security areas, it is also the case for intelligence and information sharing that there are many stakeholders who must work together to achieve common goals. Effective analysis, integration and dissemination of intelligence and other information critical to homeland security requires the cooperative involvement of the Department of Homeland Security, the Central Intelligence Agency, the Federal Bureau of Investigation and a myriad of other agencies. State and local governments have critical roles to play as well. Information is shared--is already being shared between and among numerous government agencies, information sharing practices benefit critical infrastructure protection by establishing trust relationships with a wide variety of Federal and nonFederal entities that may be in a position to provide potentially useful information and advice on vulnerabilities and incidences, to develop standards and agreements on how information will be used and protected. It also establishes effective and appropriate secure communication mechanisms and finally takes steps to ensure that sensitive information is not inappropriately disseminated, which may require a statutory change in some cases. Clearly, these practices are applicable to intelligence and information sharing in the broadest sense. To optimize such an information sharing network, it is important to have a strong strategic planning framework and a supporting policy structure. The national homeland security strategy describes a number of incentives to better develop opportunities for leveraging information sharing among stakeholders, including integrated information sharing across the Federal Government, integrated information sharing across State and local governments, improved public safety emergency communication and reliable public health information and communications, all of which needs to be shared both horizontally and vertically. Improvements in efficiency and effectiveness are rapidly occurring and are expected to continue for the long term, but there are costs and requirements as the new department faces communications, human capital, information technology and other integration challenges. All of these changes of course will take time to fully implement. Today we focus on how effective the Department of Homeland Security is in information sharing, both vertically and horizontally. I would like to welcome the following witnesses from the Department of Homeland Security, acting Assistant Secretary for Information Analysis, Mr. William Parrish. From the Central Intelligence Agency, deputy executive director Philip Lago. From the Federal Bureau of Investigation, assistant director, Office of Intelligence Steven McCraw. From the State of New York, senior adviser to the governor on counterterrorism, James Kallstrom, which I will turn for further introduction to my cochairman here in a minute. And from the State of Virginia, senior adviser to the governor for commonwealth preparedness George Foresman. And from Maricopa, Arizona, preparedness planning and training manager Darin Daniels. That looks exactly like the number of people I have in front of me, and I will turn now to the vice chairman of the subcommittee, Mr. Sweeney from New York, for any comments he may have and an introduction of his special guest. [The statement of Mr. Gibbons follows:] PREPARED STATEMENT OF THE HONORABLE JIM GIBBONS, A REPRESENTATIVE IN CONGRESS FROM THE STATE OF NEVADA Since the September 11, 2001, terrorist attacks, Congress has focused on the performance of the intelligence community and whether intelligence and other information are effectively shared to prevent or respond to a terrorist attack. Today, governments at all levels, recognize that they have a greater role to play in protecting the nation from terrorist attacks. To achieve this collective goal, homeland security stakeholders must effectively work together to strengthen the process by which critical information can be shared, analyzed, integrated and disseminated to help prevent or minimize terrorist activities. The success of a homeland security strategy relies on the ability of all levels of government to communicate and cooperate effectively with one another. Activities that are hampered by organizational fragmentation, technological impediments, or ineffective collaboration blunt the nation's collective efforts. As it is with so many other homeland security areas, it is also the case for intelligence and information sharing that there are many stakeholders who must work together to achieve common goals. Effective analysis, integration, and dissemination of intelligence and other information critical to homeland security require the cooperative involvement of the Department of Homeland Security, the Central Intelligence Agency, the Federal Bureau of Investigation, and a myriad of other agencies. State and local governments have critical roles to play. Information is already being shared between and among numerous government organizations. Information sharing practices benefit critical infrastructure protection by: - Establishing trust relationships with a wide variety of federal and nonfederal entities that may be in a position to provide potentially useful information and advice on vulnerabilities and incidents; - Developing standards and agreements on how information will be used and protected; - Establishing effective and appropriately secure communications mechanisms; and - Taking steps to ensure that sensitive information is not inappropriately disseminated, which may require statutory change. Clearly, these practices are applicable to intelligence and information sharing in the broadest sense. To optimize, such a information sharing network, it is important to have a strong, strategic planning framework and a supporting policy structure. The national homeland security strategy describes a number of initiatives to better develop opportunities for leveraging information sharing among stakeholders, including: - Integrated information sharing across the federal government. - Integrated information sharing across state and local governments. - Improved public safety emergency communications. - Reliable public health information and communications. Improvements in efficiency and effectiveness are rapidly occurring and are expected to continue for the long term, but there are costs and requirements, as the new department faces communications, human capital, information technology, and other integrationchallenges. All of these changes of course, will take time to fully implement. Today we focus on how effective the Department of Homeland Security is in information sharing, both vertically and horizontally. Mr. Sweeney. Thank you, Mr. Chairman. Let me first say that--congratulate you on your leadership and thank you for your leadership in putting together this fine panel and say that in a year and a half's time, I have been, in one form or the other, whether it is the appropriations process or the authorization process, participating in a variety of hearings and oversights into the questions of homeland security, the questions of intelligence gathering and counterterrorism, the linkages, the connecting of the dots that needs to happen, and I don't think I have ever been as excited about a panel as I am about this one, because I think that this panel and opportunity we have here today is really to do some constructive planning forward by virtue of the testimony that each of you have already submitted and that is all be submitting. I am going to use my statement to introduce a friend and a fellow New Yorker and someone that we are very proud of, and I am particularly proud that he is here, because Jim Kallstrom is a model for the country to help us win the war on terrorism. He served in the Marine Corps. He has had a distinguished career at the FBI and was stationed in New York on three tours in 1971, 1976 to 1990, 1993 to 1997, including a special agent in charge and assistant director in charge of the largest bureau in the country, and including in that, overseeing the operations of a Joint Terrorism Task Force in one of the most critical areas of this Nation. He has worked in the private sector as a senior vice president for security and management, committee member of the MBNA of America, and this is the part that I am most particularly proud of Jim Kallstrom. He was asked by Governor Pataki to be New York's first director of the Office of Public Security. He has left his private sector responsibilities and dedicated himself once again to public service. He is still serving his State and his country as a senior adviser for counterterrorism to the governor, and most importantly, he was ahead of the curve on the terrorist threat and knows from the inside what is needed to strengthen the intelligence and information sharing, and he will share with us today his realistic initiatives that I believe the country should accept and I think this is a good--as is the case with each of you, this is a good opportunity to start down a very constructive path, and I thank you. Mr. Gibbons. Thank you very much, Mr. Sweeney, and let me turn to the vice chairman of the full committee, Jennifer Dunn from Washington, if she has any remarks or opening statement. Ms. Dunn. Thank you very much, Mr. Chairman. While I too am looking forward to your testimony, we have heard Mr. Parrish most recently, I think. He gave excellent testimony and answers, and today is a chance for us to investigate how we communicate all this information that you all have access to. Unfortunately, we are going to be interrupted by a series of eight votes, and so don't know how the chairman is going to handle that, but we will have to leave you hanging for a while. Please understand it is not our choice. It is the last couple of days of our session, and a lot is being accomplished in these days. A lot of it I think is going to be helpful to us if we get our appropriations right and make sure that homeland security is funded to the degree it should be. Thanks for being with us. Mr. Gibbons. Thank you very much, Ms. dunn, and I will turn to the ranking member of the full committee, Mr. Turner of Texas, for any remarks he may have, opening remarks. Mr. Turner. Thank you, Mr. Chairman. I will try to be brief, because I do know we have votes. In the nearly two years that have expired since September 11th, I think we have identified a number of things that we all can agree we must do to protect our homeland, but it seems at the heart of the effort has to be an improved effort to share information about the terrorist threat. Our committee has had a lot of hearings on this particular subject, and it seems to me that we could do a lot better job than we are doing defining our responsibilities and determining who it is at the Federal level that our State and local law enforcement and other officials, as well as the private sector, is supposed to be communicating with, whether providing information up the chain or receiving information back from the Federal Government. So I am pleased today, Mr. Chairman, that we have on this panel officials from three different States who can talk to us about the information flow issue and how we can improve it. It seems to me that there is some confusion here that we ought to be able to easily clear up. I have no doubt that everyone involved at the State, Federal and local level has good intentions, but I think it is our responsibility as a committee to be sure that we ask the right questions and help you accomplish the tasks that I know each of you are jointly committed to achieving for us. So thank you, Mr. Chairman. Mr. Gibbons. Thank you very much, Mr. Turner. Mr. Gibbons. And Mr. Meek of Florida for any opening remarks he may have. Mr. Meek. Thank you, Mr. Chairman, and it will definitely be brief. I am excited about being here and getting an opportunity to hear all of your perspectives as it relates to intelligence. As you know, the great debate here on the Hill and in Washington is good intelligence, what is good and what is bad. I am hoping as we go through that struggle of finding out what is good and bad, that it doesn't jeopardize the security of the homeland, and State, Federal, me being a creature from the State Legislature in Florida myself, being able to share information, being a past law enforcement person myself, is sometimes very difficult as it relates to the different entities and agencies; but I am interested to hear the camaraderie that you have now, and hopefully the camaraderie that you will have in the future in the times of doing a good job and being able to seek out and find out and flush out individuals that are going to harm the homeland. Thank you so very much, Mr. Chairman. I look forward after our series of eight votes to hear from our witnesses. Mr. Gibbons. Thank you very much, Mr. Meek. And to our witnesses, first of all, let me extend the apology of the subcommittee, because as you realize, the series of votes that are being called call us away from our duty here, and all of us are here to hear your testimony, and we know that this is going to inconvenience you by delaying your ability to communicate with our panel. I want to advise the committee here we have a series of eight votes. There is about 8 minutes remaining or 7 minutes remaining on the first vote followed by seven 5-minute votes. So as we can see, that is about--it is going to be about 40-some minutes, 45 minutes from now before we can get back here. So I would like to apologize once again and just recess the committee until we return from this vote. And we ask for your patience and your indulgence in the process here today, and we will be right back. Thank you very much. [Recess.] Mr. Gibbons. The subcommittee will come back to order and first again let me apologize to our witnesses. There were three dilatory motions that were held that cost an additional 15 minutes per vote, and there were three of them. So it took an extra 45 minutes, and I do apologize for that. PREPARED STATEMENT OF THE HONORABLE CHRISTOPHER COX, CHAIRMAN, SELECT COMMITTEE ON HOMELAND SECURITY Good afternoon. I join Chairman Gibbons and Ranking Member McCarthy in welcoming our witnesses this afternoon to what should be a significant and informative discussion. Our topic today--``Improvements to DHS Information Sharing Capabilities--Vertical and Horizontal Intelligence Communications''--has a variety of dimensions--and could be no more timely than to fall on the very day the intelligence committees have released their joint report on the 9/11 attacks. [Our own committee looks forward to exploring aspects of that topic in a hearing later this year.] We are, today, first talking about information sharing. If it is true that, as the tragedy of the 9/11 attacks teaches, information-- good intelligence--is the lifeblood of homeland security, then it is also true that information must move, must circulate. Sadly, that hasn't always happened. An article in this morning's New York Times states that the 9/11 investigation found that ``key National Security Agency communications intercepts never were circulated.'' We must, today, talk about the timely sharing of all relevant information--about where it goes and how it gets there. The purpose of today's hearing is to look forward. We want to ensure that key information, regardless of its origin, now can and will get to the right place at the right time. We are here to probe, not to politicize; to point the way, not to point fingers. We are focusing on the Department of Homeland Security and its capabilities--both human and technical. The Department is the very core of the solution to the 9/11 information sharing problem. It is the tool Congress and the President devised soon after the 9/11 attacks in order to make absolutely certain that all information that might shed light on terrorist capabilities, intentions, plans, and activities is comprehensively analyzed and moves in the ways and to the places it must go, if we are to frustrate the intentions of those who seek to mount the next massive terrorist attack. The Department--in particular, its Information Analysis and Infrastructure Protection directorate-- must, in short, succeed. And, on behalf of the President and the Congress, this committee will do everything in its power to make sure that it does. I will say again: What we don't know empowers our enemies--and what we do know will help defeat them. In this new war--the ongoing battle for our future--knowledge is the very essence of power. If information doesn't move, people may die--it's that simple--that's the lesson of 9/ 11. We simply must get key information to those who need it most, and we cannot be satisfied with inefficiency or delay. What must happen must be made to happen. We in the Congress and on this committee will also do our part. We will insist on breaking down barriers, on revising the ill-fitting regulations of the past so as to enable, rather than impede, the flow of information. Our ability to defend the American people, our homeland and interests, our economy and way of life depend on it. We have learned the lesson of 9/11. We will insist on effective information sharing. There is no acceptable alternative. Let me be clear. In this new world--in this great battle to protect our people, homeland, and way of life--we cannot tolerate parochialism. We cannot allow the information taxpayer dollars have bought to be held by Government agency collectors as their exclusive property, protected behind a wall of antique regulations. All the information we have must be used to protect us all. The President recognized that long since, and we in the Congress have acted upon it in passing the Homeland Security Act and the USA-PATRIOT Act. Barriers are coming down--but stove-piped cultures and proprietary habits die far harder. Today's witnesses represent both ends of a new spectrum, a new two- way information sharing partnership in which federal agencies that collect and provide information--through the new Department--to their new state and local government customers also wait eagerly to receive the information those same customers provide to them. In this new war, federal, state and local officials are equal players. We must overcome the notion that the federal Government is the source of everything worth knowing--federal agencies must learn to listen. State and local governments, as well as businesses may also be sources of key information. That, of course, makes sense, since they are where the action is, out where the rubber hits the road--as they will always be. Federal government agencies must support them. State, local, and private sector officials are now among the Intelligence Community's key customers--and each federal agency represented here today must learn to serve them well--largely through the Department of Homeland Security and the FBI. Where homeland security is concerned, it is not an act of largesse for the federal government to share threat- related information with state and local officials; it is essential-- and the Homeland Security Act requires it. We must also discard the common assumption that the most important information is classified--because in this new world, it may not be. The long-haul trucker in the small hours of the night may be the only one who sees the critical, anomalous act that indicates a possible terrorist attack--and we must have a system to ensure that what that trucker sees moves upstream quickly and reliably to the local, state, and federal government officials for whom it may be the critical, missing piece of a complex puzzle. Information sharing is not, in short, some grand gesture of noblesse oblige by a privileged coterie of federal agencies. To indulge the assumption that the federal Government--including CIA and FBI--has collected, and therefore knows, all that is most worth knowing at any given time is dangerous paternalism. But where state and local officials--including our ``first responders'' and law enforcement officers--do need access to classified information in order to protect us, they must have it--period. We must speed the clumsy clearance processes that keep them from the information that they need. Each of today's federal government witnesses represents a member agency of the Intelligence Community. Each is involved in the federal government's effort to implement the Homeland Security Act. It was, in fact, last October, testifying before joint intelligence committees during their investigation into the 9/11 attacks, that the Director of Central Intelligence expressed the critical new commitment we stress today. He said: ``We must move information in ways and to places it has never before had to move. . . We need to improve our multiple communications links--both within the Intelligence Community and now in the Homeland Security community. . . . Now, more than ever before, we need to make sure our customers get from us exactly what they need--which generally means exactly what they want--fast and free of unnecessary restrictions.'' He was right. And we need to make sure that the implications of that statement are well understood. Because the implications of full commitment to information sharing in the homeland security context--the kind of commitment Congress intended and the Homeland Security Act requires--are enormous. It may even mean that an agency must, to protect the American people from attack, ``lose control of'' the information it originates--for example, in a networked environment where each recipient of a piece of information can, in turn, augment it--as the Markle Foundation suggested in a report last year. The good news is that we're not starting from scratch. In early March, the Attorney General, the Secretary of Homeland Security, and the Director of Central Intelligence took a major step towards implementing the information sharing requirements of the Homeland Security Act. They signed a Memorandum of Understanding binding all Intelligence Community and federal law enforcement agencies, as well as the disparate entities that comprise the Department of Homeland Security. They didn't blink; they knew the stakes. They stated that: ``Providing all timely and relevant [homeland security-related information] to those who have a need-to-know it in order to assist them in meeting their homeland security-related responsibilities is fundamental to the success of the Department and [to] all other efforts to ensure the security of the homeland from terrorist attack. Delay in providing such information risks frustrating efforts to meet these critical responsibilities and could result in preventable attacks against U.S. persons or interests failing to be preempted, prevented, or disrupted.'' [MOU at sec. 3(h)] The information sharing MOU commits intelligence, law enforcement, and homeland security agencies alike to certain core principles and specific actions to implement the Homeland Security Act. It provides, for example, that those entities must generally disclose homeland security-related information--and intelligence is just relevant information--``free of any originator controls or information use restrictions.'' (3(k)] It says that providing homeland security-related information to one organization does not discharge or diminish the originating agency's obligation to share that same information with any other entity that has responsibilities for protecting the homeland. (3(m)] The MOU goes on to say that ``homeland-security related analytic efforts. . . must be informed by the most comprehensive, accurate, and timely information available, regardless of its nature and source,'' and it recognizes that ``the Federal government must, to the greatest extent possible, speak with one voice to state and local officials, private industry, and the public, in order to prevent confusion, mixed signals, and, potentially, dangerous operational conflicts.'' (4(b)] It requires that classified homeland security-related information ``reaches DHS promptly with accompanying high-content `tear lines' suitable for onward passage at an unclassified level.'' (6(a)(i)] And the MOU states that if this new mission requires ``more expansive'' information sharing than existing departmental policies and procedures do, then the MOU's more expansive information sharing mandates will prevail. These are new standards for our new, post-9/11, reality. They recognize that the irreducible minimum any government owes its citizens is to protect them--that homeland security is now everyone's number-one priority. To prevent the unthinkable, we must, in short, reach beyond the limits we have tolerated in the past. It is a message worth stressing today, as we absorb the report of the intelligence committees' investigation into the 9/11 attacks. And I am grateful to our witnesses for giving us their agencies' status report today--and grateful to Chairman Gibbons and Ranking Member McCarthy for convening this important hearing. PREPARED STATEMENT OF THE HONORABLE JIM TURNER, CHAIRMAN, SUBCOMMITTEE ON INTELLIGENCE AND COUNTERINTELLIGENCE Today's hearing of the Subcommittee on Intelligence and Counterterrorism continues the Committee's focus on how we are sharing information about terrorists intending to attack America. In the nearly two years following the attacks of September 11, we have identified a number of things we need to do to protect the homeland, such as improved border security and preparing first responders. But even if we make these improvements, we will not be safe unless we are effectively sharing information about the terrorists' intentions against us. The Committee has held a number of hearings to address whether terrorism information is being provided to all those who need it, whether they serve at the Federal, State or local level. Earlier this week, the Committee heard from the Department of Homeland Security, the Terrorist Threat Integration Center, and the FBI. My impression from the hearing was that while the federal agencies were working hard to improve performance, their roles were not clearly defined. This was especially true with respect to the responsibilities for communicating information to state and local officials. Both the FBI, through its Joint Terrorism Task Forces, and the Department of Homeland Security are providing terrorism information to state and local governments, but there did not appear to be a clear division of responsibility or established mechanisms for coordinating the flow of information. Today we have the opportunity to find out from officials from three different states whether the information really is flowing, and whether it is useful. According to one of our witnesses, Mr. Foresman, there is currently more confusion than clarity. As a Cabinet-rank state homeland security official for Virginia, he has found a lack of clarity in the coordination of information and intelligence flow, and that the current confusion only adds to the dangers we face. For example, he finds that the Department of Homeland Security has become a new layer in the communication between the federal agencies and the states. But this new layer has not been coordinated with existing channels of communication, and has resulted in more confusion. He is receiving information from the Joint Terrorism Task Force, and then finding that Department of Homeland Security officials are unaware of the information. On other occasions, he has received information about potential security threats from the Department of Homeland Security and then finding that other federal officials in the field did not have the same information. The confusion sometimes extends to the quality of the information. Mr. Foresman's written testimony relates one instance when he received information from the Department of Homeland Security, only to have another federal agency attack that information as ``old news'' and unreliable, having been over taken by events. As a state homeland security official, Mr. Foresman was then left to try to determine whether this was a case of ``turf war'' or whether there were substantive problems with the information. As we have learned from the report released today from the congressional intelligence committees, one of the contributing factors to 9/11 was the failure of federal agencies to share and act upon information about the hijackers in their possession. We know that we are a nation still at risk, as terrorists could be plotting another attack on the United States. In order to thwart the next attack, we must ensure that information about terrorist threats gets to every official with homeland security responsibilities. That can only happen if everyone involved has a clear understanding of standards that define the movement of information across all levels of government. I am very pleased that we have the officials representing the federal agencies as well as the state and local homeland security offices here with us today to speak on this vital issue. I look forward to your testimony. PREPARED STATEMENT OF THE HONORABLE KAREN McCARTHY, RANKING MEMBER, SUBCOMMITTEE ON INTELLIGENCE AND COUNTERERRORISM, SELECT COMMITTEE ON HOMELAND SECURITY Thank you Mr. Chairman. I am very pleased that we have the opportunity today to examine the issue of information sharing within the federal government and with state and local officials. One of the many tragic aspects of the attacks of September 11 is that the federal government did have some information about the hijackers in the files of various agencies. Although we cannot be sure that we could have prevented the attacks by connecting these dots, we must do everything in our power to make sure that information about the next plot does not slip through the cracks. We as a nation have taken a number of steps to get at this problem. We have created a Department of Homeland Security, and the President ordered the creation of the Terrorist Threat Integration Center. We have also emphasized the importance of the federal government sharing terrorism information with the officers at the state and local level who have responsibilities for the security of their communities. But do we actually have improved information sharing, as we approach the second anniversary of 9/11? That is what I hope this hearing will answer. On Tuesday, we heard during the full Committee hearing on the Terrorist Threat Integration Center that threat information is being fed to both the TTIC and the Department of Homeland Security. We did not get a clear answer on what TTIC and the Department of Homeland Security do with the information. As for sharing with the state and local officials, we heard that the FBI shares information through its Joint Terrorism Task Forces, and that Homeland Security also pushes information to its state and local ``customers.'' What we did not learn was whether the FBI and Homeland Security are coordinating what they provide to state and local governments, or if there is a clear understanding of the roles of each agency. The basic problem is very simple. If all the players in homeland security, at whatever level of government, do not have the same understanding of their roles and responsibilities, it will be all too easy for another failure in information sharing to occur. The consequences of such a failure, as we know, are grave. I am very pleased to have representatives from the Federal, State, and local levels of government with us today so they can inform us on the status of information sharing and to alert us to problems that remain. Hearing from those on the front lines will assist us to do our part in breaking down barriers to sharing information critical to our homeland security. Thank you. Mr. Gibbons. I am going to turn now to the witness statements and I will begin with Mr. William Parrish from the Department of Homeland Security. Welcome, Mr. Parrish. The floor is yours. We look forward to your testimony. And to all our witnesses, your full complete and written statement will be entered into the record. If you wish to summarize and shorten your statement, that is okay too, because we realize the time is short and you have been here a while, and it is only getting longer each day. So Mr. Parrish, welcome. STATEMENT OF WILLIAM PARRISH, ACTING ASSISTANT SECRETARY, FOR INFORMATION ANALYSIS, DEPARTMENT OF HOMELAND SECURITY; Mr. Parrish. Good afternoon, Mr. Chairman. I appreciate that, and distinguished members of the subcommittee, I am delighted and honored to be here this afternoon. This hearing is very important to the Department of Homeland Security, as I too believe it presents an opportunity to provide the status of a critical element within the Department, and that is the information analysis directorate. It is also a special hearing, as it represents the 100th Congressional hearing for the Department of Homeland Security, since our beginning on March 1st, something I will proudly be able to share with my grandson. I am the Acting Assistant Secretary for information analysis in the Information Analysis and Insfrastructive Protection Directorate. Prior to assuming that position on July 3rd of this year, I was the senior Department of Homeland Security representative to the Terrorist Threat Integration Center. In this capacity, I served in the senior leadership position as the Associate Director for Homeland Security, and prior to my assignment with DHS, I served as the first Executive Director for the Office of Antiterrorism at U.S. customs. During my tenure with Customs, the importance of information sharing became more evident. What I saw firsthand was the amount of information that Customs inspectors were able to acquire on the movement of people, goods and materials entering into our country. Information that when analyzed could produce critical pieces of intelligence that may lead to connecting the dots and the detection or prevention of terrorist attacks to our homeland. Today, within the Department of Homeland Security, we have the operational organizations that have access to potentially valuable information, such as that acquired by Customs. For example, today with the integration of the Customs and Border Protection Organization, the opportunity to acquire critical pieces of information enhances the analytical process within the information analysis directorate. Our ability to assess and then correlate this information against other agencies' information both within the Department and external to the Department supports our ability to connect the dots. For example, on a daily basis, the Customs and Border Protection entities process over 1.1 million passengers arriving into our Nation and seaports, inspecting over 57,000 trucks daily and 580 vessels, 2,500 aircraft and over almost 325,000 vehicles across our borders. Significant amounts of information could be acquired through each and that data could provide information that may tie it to potential terrorist nexus. The Immigration and Customs Enforcement entities investigate cases involving alien smuggling, terrorist financial operations and other crimes associated with terrorist organizations, and the Transportation Security Administration screening approximately 1.5 million passengers aboard commercial aircraft. To further enhance the process of correlating information from other agencies, we have within IAIP the Homeland Security Operations Center, with representation from over 15 Federal agencies. Their presence, their connectivity back to their parent agencies, provides a very robust and comprehensive exchange of information, both horizontally and vertically. IA has initiatives underway to reach out to another very important and relevant source of information, and that is our customers and our partners at the State and local government, as well as the private sector receiving reports from these organizations regarding suspicious activities, surveillance operations or stopping suspect individuals with potential terrorist nexus. As these reports are received into Homeland Security Operations Center, they are passed to the information analysis directorate where we analyze the information and coordinate with other agencies including the FBI in order to identify any possible correlation or ties to terrorist activities. For example, a report of a suspicious person videotaping the entrance to a nuclear power facility in one location and two days later a similar description is reported at another facility 100 miles away. In order to assess if there is a correlation to these incidents, the information analysis directorate will coordinate with appropriate State, local and Federal agencies to assess any and all information that may be related to these two incidents. IAIP is working aggressively to implement the necessary information technology connectivity as well as the associated logistics requirements for this initiative to begin. Currently within our Homeland Security Operations Centers, we are communicating with members of the State, and local governments as well as the private sector as our IT program continues to expand. The processes and procedures that I have described will further enhance our efficiency and analysis and assessment of potential terrorist activities. I am confident, sir, that the procedures and the process that I have described ensures that IAIP is in full compliance with the legislation passed by Congress in the Homeland Security Act of 2002. Each day we are making further progress to enhance our capabilities in the 19 functions outlined in the Homeland Security Act. Secretary of Homeland Security has placed the highest priority on expeditiously completing the new home for IAIP, and when completed will give us more personnel, and appropriate electronic connectivity. However, in the meantime, we have identified procedures to ensure we are meeting our tasks and accomplishing our mission. Procedures such as employing liaison personnel from other agencies, bringing in members into our Homeland Security Operations Center, as well as into the information analysis directorate. I have recently initiated a program for our analysts to be able to coordinate directly with analysts of the FBI, the Terrorist Threat Integration Center, and other members of the Intelligence Community. This exchange of personnel and direct access to other analysts will provide the face-to-face and the voice-to-voice connectivity that provides essential connectivity to ensure that all information is shared. I am confident that these work-around measures are succeeding in ensuring a timely and efficient flow of information both into as well as out of the Department of Homeland Security. Hearings such as yours today provides each of us an opportunity to look back at where we have come from since the Nation's dark day in our history on September 11th. We need to recognize and extend thanks to you, to your staffs, our Federal agencies to include our law enforcement and intelligence agencies, the dedicated State and local authorities and the private sector and the American people in general. We have all risen to the challenges of combatting the new enemy threatening our security. Because of the coordinated efforts of all of us in sharing challenges as well as the responsibilities, we have made a difference in our Nation--and our Nation has not suffered another attack. However, we must not become complacent nor tired nor weary. The dedication and commitment must continue and above all, continue as prayers for the safety and security of this great Nation. Sir, I thank you and I look forward to your questions. Mr. Gibbons. Thank you very much, Mr. Parrish, and we do appreciate your testimony. It is always a pleasure to have you before the committee, and especially your agency, and we have always felt that it has contributed to our better understanding of how the progress is going of this important agency as we move along. [The statement of Mr. Parrish follows:] PREPARED STATEMENT OF WILLIAM H. PARRISH Good morning Mr. Chairman and distinguished members of the Committee. I am delighted to appear before you today to discuss The Department of Homeland Security's responsibility in information sharing both vertically and horizontally. I am currently the Acting Assistant Secretary for Information Analysis in the Information Analysis and Infrastructure Protection Directorate (IAIP). Prior to assuming this position on July 3rd of this year I was the Senior DHS representative to the Terrorist Threat Integration Center (TTIC). In this capacity I served in a senior leadership position as the Associate Director for Homeland Security. My tenure in US Customs as the Executive Director of Anti-terrorism provided the opportunity to gain an appreciation for the criticality of information sharing and the necessity for recognition and understanding of individual agencies' capabilities in the fight against terrorism. Although only four months old, I can assure you that IAIP is moving forward in carrying out our statutory responsibilities, and the key missions of Information Analysis which include:Providing the full range of intelligence support to senior DHS leadership With IP, mapping terrorist threats to the homeland against our assessed vulnerabilities in order to drive our efforts to protect against terrorist attacks Conducting independent analysis and assessments of terrorist threats, including competitive analysis, tailored analysis, and ``red teaming'' Integrating the work of all of DHS' components as well as managing the collection and processing of information into usable and actionable information from DHS' intelligence components, e.g., the Bureau of Customs and Border Protection, Immigration and Customs Enforcement, Transportation Security Administration Coast Guard, and Secret Service Working closely to maintain transparent information exchange between those DHS/IA officers assigned to work on DHS' behalf at the TTIC, IA officers conducting the threat analysis mission at DHS Headquarters, our TTIC partners and Federal Agencies, state and local officials governments and the private sector Disseminating time sensitive alerts and advisories to federal, state, local governments and private sector infrastructure owners and operators IAIP is unique among U.S. intelligence and law enforcement elements in authority, responsibility, and access to information. IAIP has robust, comprehensive, and independent access; as mandated by the President and in the law, to information relevant to homeland security, raw and processed, collected domestically and abroad. Accessing the information and intelligence from this mosaic of programs and systems of federal, state and local agencies supports our mission to analyze data and take action to protect against terrorist attacks directed at the U.S. homeland. IA has the ability to conduct its own analysis and to leverage the information of the FBI, CIA, and the remainder of the Intelligence Community and federal government, plus state and local law enforcement and private sector entities, to protect of the homeland. Central to the success of the DHS mission is the close working relationship between the Office of Information Analysis (``IA'') and the Office of Infrastructure Protection (``IP'') to ensure threat information is correlated with critical infrastructure vulnerabilities and protective programs. This threat and vulnerability information can then be used to recommend preventative and protective measures. The integration of information access and analysis on the one hand, and vulnerabilities analysis and protective measures on the other, is the fundamental mission of the IAIP Directorate. Beyond the unique IA-IP partnership; the Homeland Security Operations Center (HSOC) serves as a focal point for the Nation's efforts to protect our homeland. The HSOC is a 24 x 7 x 365 days a year Watch Center and is comprised of members from over thirteen federal agencies from the Intelligence Community, Law Enforcement Agencies, emergency preparedness organizations and entities focused on infrastructure protection. Given the information provided from the parent organizations of these entities, and the all-source data provided by other DHS partners; information and intelligence relating to threats to the homeland is analyzed from multiple arenas. This all- source data-fusion performed at IAIP allows products to be tailored to address a specific threat to allows DHS constituents to prioritize resource allocations in the enhancement of their security posture to counter potential terrorist acts. IAIP is the central information nerve center of DHS' efforts to coordinate the protection of U.S. homeland security. As such, IA supports DHS's law enforcement components through timely and integrated analytical support. For example in a single day: In coordinating with BCBP which process over 1.1 million passengers arriving in our Nation's airports and seaports, inspection of over 57,006 trucks and containers, 580 vessels, 2,459 aircraft, and 323,622 vehicles coming into this country, IA has immediate access to valuable information of potential terrorist activities which further enhances our ability to develop threat plot lines--connecting the dots In coordinating with BICE; which investigates cases involving alien smuggling, terrorist financial dealings and other crimes associated with terrorist operations, IA analysis and assessments have the ability to identify potential trends of terrorist related activity In coordinating with the Transportation Security Administration; which screens approximately 1.5 million passengers before they board commercial aircraft, IA assists in determining individuals to be entered on the ``No-Fly list'' and Watch Lists IA ensures that homeland security products derived from the fusing of disparate types of information is shared with Federal, state, and local governments, as well as the private sector. Recent products include; Information Bulletin discussing July 4th General Awareness issues Advisory on the Potential Al Qaeda Threats to the U.S. Water Supply Advisory on reconnaissance tactics and techniques operatives have employed in attacks overseas; i.e. Riyadh Bombing of 12 May Information Bulletin discussing Compromised Private Branch Exchange (PBX) and Telephone Voicemail systems Information Bulletin speaking to Chemical, Biological, Radiological and Nuclear (CBRN) Materials and Effects Information Bulletin speaking to Potential Indicators of Threats Involving Vehicle Borne Improvised Explosive Devices (VBIEDs) Additionally, IA coordinates with the Federal Bureau of Investigation in publishing combined DHS-FBI Intelligence Bulletins. In addition to mapping terrorist threats to the homeland, and carrying out its many other intelligence-support and analytic functions, IA is a full participant in the TTIC, with IA personnel physically located at the TTIC. The assignment of IA analysts to assist in the carrying out of DHS' analytic mission as full partners in TTIC ensures the timely and relevant information flow to and from the IAIP directorate. This is not a substitute for the receipt of information directly at DHS Headquarters, but rather represents a recognition that, as provided by Congress and the President, authorities and capabilities to deter and disrupt terrorist threats, particularly overseas, are shared among a number of departments and agencies and such activities often must be undertaken in concert with state, local, and foreign governments. Recent experience has shown that terrorist groups may attempt to coordinate multiple attacks, both overseas and within the United States, and that threats that appear to be directed overseas may actually be directed towards the homeland, and vice versa. The threat information integration and analysis that is the beginning, not the end, of DHS' protective mission, will most effectively be carried out, as Congressional and other reviews have recommended, when all terrorism threat-related activities of the U.S. Government work together seamlessly. This includes counter-terrorism activities directed against threats overseas, as well as criminal investigation and prosecution activities, which the President and Congress did not, and, as a matter of effective government and common sense, should not, direct be carried out exclusively by DHS. The direct receipt at DHS Headquarters of information provided by statute and Presidential direction to DHS, the complimentary work of IA personnel assigned to TTIC, IA analysts detailed to other Intelligence Community partners, coupled with the multi-agency representation in the HSOC, ensures IA a robust, comprehensive, and independent access to information; raw and processed, collected domestically and abroad; relevant to analyzing terrorist threats to the homeland I come before you today to tell you that progress has been, and continues to be made on a daily basis in the IAIP Directorate. As with any new organization, there is work to be done. I will be the first to admit that we are not where we wish to be, but we are moving rapidly in a well-conceived and strategic way to get there in the very near future. IAIP is building a strong team of professionals and assigning dedicated and knowledgeable individuals in key liaison positions within our partnering agencies. This will further enhance the timely access to critical information that when placed in the hands of the dedicated and competent members of DHS serving at our borders, airports, seaports across America, will increase our ability to detect, prevent and deny terrorists from striking our Homeland. With the continued support of Congress, I am confident that IAIP and our partners in the war against terrorism can succeed in meeting the challenges presented before us. As Secretary Ridge has stated on numerous occasions, ``When our hometowns are secure, our homeland will be secure.'' That is not merely rhetoric, but a fundamental principle of the nation's homeland security effort. Everyone is a partner in the effort. We must be aggressive in connecting and staying connected with our partners to provide an extraordinary and unprecedented exchange of information. This information must be actionable by local law enforcement and first responders, but must also empower the average citizen to do their part in assisting with securing our homeland. Mr. Chairman, and Members of the Subcommittee, this concludes my prepared statement. I would be happy to answer any questions you may have at this time. Mr. Gibbons. Gentlemen, if I may, I have been advised that Mr. Kallstrom has a time constraint that is going to affect his time that he can be before us, and with that and your concurrence, I would like to invite Mr. Kallstrom to submit his testimony right now, and then we will move back for the rest. So Mr. Kallstrom, I apologize for the delay in getting to you. I appreciate the fact that you have come down to testify and would welcome you to speak now, and we are looking forward to hearing what you have to say. STATEMENT OF JAMES KALLSTROM, SENIOR ADVISER TO THE GOVERNOR ON COUNTERTERRORISM Mr. Kallstrom. Thank you, Mr. Chairman. Thank you for your great service. I was reading your bio. It is quite impressive. Mr. Gibbons. Well, Mr. Kallstrom that and about $3.50 at any Starbucks Coffee will buy you the regular decaffeinated version. So thank you. Mr. Kallstrom. Thank you Congressman Sweeney, who I have had a great year and a half working with in New York, and Congressman Meek, thank you for being here. Good afternoon. I would like to begin by thanking you for inviting me to participate I think in this very important hearing. From those terrible moments on September 11th, the security of the United States and its interests has become our Nation's highest priority. Some 22 months later, our country's most urgent objective remains the prevention of another devastating terrorist attack. In meeting this immense responsibility, we must immediately recognize that the extraordinary security challenges we face, in large part, can best be met by implementing an effective and workable intergovernmental approach. We must align the walls separating Federal intelligence and law enforcement agencies and State and local law enforcement. We must redefine the appropriate roles for authorities at all levels of government and in so doing, give State and local law enforcement the tools they need, timely and relevant counterterrorism information to partner in the national effort to protect our country and our citizens. We must find ways to empower State and local police and others to identify indications and warnings of potential terrorist activity. Although many challenges lie ahead, much has been accomplished since September 11th. Within weeks of the attacks, Governor Pataki created one of the Nation's first State homeland security offices, the New York State Office of Public Security. He asked me to become the Office's first directorate and tasked us with developing a comprehensive statewide strategy to prevent, deter and respond to terrorist threats and events. He asked us to do everything we could do as a State to, in his words, never let this happen again. Our first order of business was to more fully engage the State's 75,000 sworn law enforcement officers. Our eyes and ears in our neighborhoods and communities in the war on terrorism. To do this, we divided our State into 16 counterterrorism zones. Within each zone, law enforcement agencies now operate in a coordinated manner to best share resources, information, training and best practices relevant to counterterrorism. In addition, we developed and deployed a New York State counterterrorism network throughout these zones. This network has effectively linked all of our State's police and sheriffs in a secure stand-alone counterterrorism information-only communications system. In a little over a year and a half, more than 350 dedicated counterterrorism network computer terminals have been installed in virtually every corner of the State. To date, almost 200 terrorist-related advisories and alerts have been disseminated to local law enforcement and related health, education, fire, first responder and private sector communities. In August, New York State will open its Counterterrorism Center. The Center will serve as a central State clearinghouse for information sharing and in particular, counterterrorism information at all levels. As we recognize in our State, the inclusion of the country's 700,000 sworn State and local police officers and sheriffs in a systematic information-sharing loop is critical for us to succeed in the national war on terrorism. But in the loop, it is not necessary that all police officers receive access to everything, including classified documents within secure Federal databases. Rather, the Federal Government must provide the police officer on patrol with the ability under controlled and orderable circumstances to request a comprehensive search of Federal databases, including outstanding warrants and intelligence indices, including terrorist watchlists in order to receive a green light, yellow light, red light indication regarding a subject of interest as a possible link to terrorist activity. By means of connectivity with a central clearinghouse like the New York State Counterterrorism Center, the cop on the street could receive focused and vetted guidance as to the immediate action he or she should take with respect to the individual in question. This can be done without providing the details of sensitive information or the methods and sources of collection. Better decisions can and will be made on the street in realtime. We advocate the creation of a green light, red light, yellow light system that would make lawful use of the information currently maintained by relevant Federal agencies coupled with State information, and thus provide local law enforcement with the timely answer to a very basic question, does this individual have a known or suspected relationship to terrorism? And if so, what are my next steps? The September 11th hijackers lived among us before they perpetrated their lethal attacks. Several of those hijackers had interception with State and local law enforcement officers during traffic stops. If the officers involved in these incidents were fully aware of the patents and indications of the terrorist threat to the United States and had appropriate and timely access to the Federal Government's various databases and watchlists, the September 11th attacks just might have been uncovered. We will never know this for sure, but one lesson learned is that local and State law enforcement officers in the field must have access to a one-stop shopping resource where in realtime they can query an individual's name or identity against all terrorism-related databases. We are well aware that this system must be appropriately tailored to be used only in connection with counterterrorism efforts. Comply with existing law and be subject to audit and review. I must stress that the FBI Joint Terrorism Task Forces have been at the forefront and instrumental in handling terrorism- related investigations on a nationwide basis and have successfully apprehended individuals with a nexus to terrorism or organized terror groups on many, many occasions. I can speak from personal experience that these task forces are absolutely vital in the war against terrorism. However, we have found important information obtained from these national investigations does not reach the offices responsible for patrolling the cities, towns, highways, villages and neighborhoods of our country in all cases. State and local police officers comprise far less than 1 percent of these task forces. Their scope and breadth of mission and their ability to learn what they now do not know mandates the use of State and local police as eyes and ears in their support. To use a military metaphor, State and local police can be effective listening posts and forward observers for the task forces. Our concern is not only what the task forces do not know. It is what we as State and local communities have not been empowered to do to assist these task forces. With means readily and routinely at our disposal, they will know more and be better positioned to protect our country. Almost one year ago, the ten northeastern States from Delaware to Maine, including New York form the northeast region of homeland security agreement as a consortium to combine the homeland security efforts of our States. The northeast regional agreement has focused on developing, among other things, regional information and intelligence sharing strategies. We have worked diligently with the Department of Homeland Security on these concerns, and strongly believe the northeast regional agreement would make an excellent starting point for a pilot project envisioned in the recently passed Intelligence Authorization Act of 2004, H.R. 2417. At the State level, intelligence centers like the New York State Counterterrorism Center can be created, either within each State or as appropriate on a regionalized basis. A staff of cleared personnel assigned to the center while maintaining a direct secure line of communications with a Federal coordination center would interact both with State police and all local police departments. Partnering with the Federal Government effective counterterrorism information sharing could be almost immediately accomplished on a regional basis. As the Department of Homeland Security becomes increasingly operational, we must continue to connect the counterterrorism pipes to enable interagency and both international and national information on intelligence sharing on a regular basis. America's State and local police officers are one of our country's first lines of defense against another terrorist attack. They are our forward observers. They are our boots on the ground. In this extraordinary and historic effort, they must be fully empowered and given the necessary tools to wage this great fight of our times. We look forward to continuing to work with you to meet this challenge. Thank you. Mr. Gibbons. Thank you very much, Mr. Kallstrom, and I appreciate that. [The statement of Mr. Kallstrom follows:] PREPARED STATEMENT OF JAMES KALLSTROM Good afternoon Mr. Chairman and members of the Committee. I would like to begin by thanking you for inviting me to participate in this important hearing. From those terrible moments on September 11th, the security of the United States and its interests has become our nation's highest priority. Some twenty-two months later, our country's most urgent objective remains the prevention of another devastating terror attack. In meeting this immense responsibility, we must immediately recognize that the extraordinary security challenges we face in large part can best be met by implementing an effective and workable intergovernmental approach. We must realign the walls separating federal intelligence agencies and state and local law enforcement. We must redefine the appropriate roles for authorities at all levels of government and in so doing, give state and local law enforcement the tools they need--timely and relevant counter-terrorism information--to partner in the national effort to protect our country and citizens; we must find ways to empower state and local police and others to identify indications and warnings of potential terrorist activity. My remarks today will concentrate on the significantly enhanced function state and local law enforcement must assume in matters related to homeland security. In addition, I will outline the need to expeditiously build a bridge over the information-sharing gap that exists between the federal and state and local governments. I will share several positive and innovative steps New York State has already taken to close that gap. But because the states cannot do this alone, I will ask your support to enable a unified and workable plan for the prevention of terrorism in our country, states, cities and neighborhoods. Although many challenges lie ahead, much has been accomplished since September 11th. Within weeks of the attacks, Governor Pataki created one of the nation's first state homeland security offices, the New York State Office of Public Security. He asked me to become the Office's first Director and tasked us with developing a comprehensive statewide strategy to prevent, deter and respond to terrorist threats and events. He asked us to do everything we could do as a state to, in his words, ``Never let this happen again.'' Our first order of business was to more fully engage the state's 75,000 sworn law enforcement officers, our eyes and ears in our neighborhoods and communities, in the war on terrorism. To do this, we divided our state into 16 Counter-Terrorism Zones. Within each zone, law enforcement agencies now operate in a coordinated manner to best share resources, information, training and best practices relevant to counter-terrorism. In addition, we developed and deployed the New York State Counter-Terrorism Network throughout these zones. This Network has effectively linked all of our state's police and sheriffs in a secure, stand-alone counter terrorism information-only communications system. In a little over a year and a half, more than 350 dedicated Counter-Terrorism Network computer terminals have been installed in virtually every corner of the state. The Counter-Terrorism Network has become a national model for counter-terrorism information sharing among state and local law enforcement authorities. To date, almost 200 terrorism-related advisories and alerts have been disseminated to local law enforcement and related health, education, fire and first responder and private sector communities. In August, New York State will open its Counter-Terrorism Center. The creation of this Center is part of an integrated program that will provide for the routine and coordinated exchange of information and intelligence between federal, state and local law enforcement. The Center will serve as a central state clearinghouse for information sharing and in particular counter-terrorism information. As we recognized in our state, the inclusion of the country's 700,000 sworn state and local police officers and sheriffs in a systematic information-sharing loop is critical for us to succeed in the national war on terrorism. By ``in the loop,'' it is not necessary that all police officers receive access to everything, including classified documents, within secure federal databases. Rather, the federal government must provide the police officer on patrol with the ability, under controlled and auditable circumstances, to request a comprehensive search of federal databases, including outstanding warrants and intelligence indices (including terrorist watch lists) in order to receive a ``green light--yellow light--red light'' indication regarding a subject of interest's possible link to terrorist activity. By means of connectivity with a central clearinghouse like the New York State Counter-Terrorism Center, the cop on the street could receive focused and vetted guidance as to the immediate action he or she should take with respect to the individual in question. This can be done without providing the details of sensitive compartmented information or the methods and sources of collection. Better decisions can and will be made on the street in real time. We advocate the creation of a ``green light--yellow light--red light'' system that would make lawful use of the information currently maintained by relevant federal agencies coupled with state information and thus provide local law enforcement with the timely answer to a very basic question--``Does this individual have a known or suspected relationship to terrorism and if so, what are my next steps?'' With guidance and information already maintained by the government and provided through contact with such a center, a state or local police officer could then be guided to take appropriate action. The September 11th hijackers lived among us before they perpetrated their lethal attacks. Several of those hijackers, including Mohammed Atta, Hani Hanjour, and Ziad Jarrah had interaction with state and local law enforcement officers during traffic stops. If the officers involved in those incidents were fully aware of the patterns and indications of the terrorist threat to the United States and had appropriate and timely access to the federal government's various databases and watch lists, the September 11th attacks just might have been uncovered. We will never know this for sure, but one lesson learned is that local and state law enforcement officers in the field must have access to a "one stop shopping" resource where in real time they can query an individual's name or identity(s) against all terrorism-related databases. We are well aware that this system must be appropriately tailored to be used only in connection with counter terrorism efforts, comply with existing law and be subject to audit and review. At the Federal level it is essential that various agencies that constitute the intelligence community create one central repository for terrorist-related information or a method to rapidly check these repositories. The post September 11th investigation has exposed examples where critical information was ``stovepiped'' in the hands of one agency failing to get to appropriate people in another agency. The most telling example of such a case is information collected on September 11th hijackers Khalid al-Midhar and Nawaf Alhazmi Midhar. Sectors of the federal intelligence community had determined the two men were al Qaeda operatives. One carried a U.S. multiple-entry visa and there were indications the two might attempt travel to the United States. However, other relevant federal agencies were not fully enlisted in the effort to track these individuals. In hindsight, it is evident that agencies like the FAA and INS might have been able to thwart entry of the hijackers into this country if there had been broader knowledge and access to just a portion of this information. I must stress that the FBI-Joint Terrorism Task Forces have been at the forefront and instrumental in handling terrorism-related investigations on a nationwide basis and have successfully apprehended individuals with a nexus to terrorism or organized terror groups on many, many occasions. I can speak from personal experience that these Task Forces are vital in the war against terrorism. However, we have found important information obtained from these national investigations does not reach the officers responsible for patrolling the cities, towns, highways, villages and neighborhoods of our country. State and local police officers comprise far less than one percent of these Task Forces; their scope and breadth of mission and their ability to learn what they now do not know mandates the use of state and local police as eyes and ears in their support. To use a military metaphor, state and local police can be effective listening posts and forward observers for the Task Forces. Our concern is not what the Task Forces cannot do; it is what we, as a state and local community, have not been empowered to do to assist these Task Forces. With means readily and routinely at our disposal they will know more and be better positioned to protect our country. The Department of Homeland Security is now the cabinet-level agency responsible for coordinating the protection of America's citizens and infrastructure from the threat of terrorist attacks. Charged also with coordinating state and local government efforts for that purpose, it is logical that the DHS take the initiative in accomplishing this mission. Under whose auspices the system would fall should not be the crucial issue - the quick creation of such a system and the capacity to render it fully functional must be our ultimate goal. The Intelligence Authorization Act for Fiscal Year 2004 (H.R. 2417), which recently passed the House by an overwhelming margin, moves toward the goal of greater information sharing between the federal, state and local governments. Section 336 of the bill would amend the Homeland Security Act of 2002 to authorize the DHS Undersecretary for Information Analysis and Infrastructure Protection (IAIP) to conduct 3 year pilot projects in several cities to encourage state and local governments, and representatives of various industries with critical infrastructure in the project areas, to collect and pass on counter- terrorism information to the federal government. As part of the proposed pilot projects, DHS would be allowed to share with state and local governments intelligence information in its possession through the use of tear-line reports. The bill would also allow the Director of Central Intelligence to establish an orientation and training program for certain state and local officials. The Director of the Terrorist Threat Integration Center would be mandated to establish two advisory councils, one of which would have as its primary focus privacy and civil liberties and the other would focus on the information needs of state and local governments. While this bill and its companion, S.1025, will need further strengthening, it provides a suitable template for airing the concerns of the intelligence communities of both state and local governments and would greatly facilitate the exchange of information between the different levels of government. Almost one year ago, the ten northeastern states from Delaware to Maine, including New York, formed the Northeast Regional Homeland Security Agreement as a consortium to combine the homeland security efforts of our states. The Northeast Regional Agreement has focused on developing, among other things, regional information and intelligence- sharing strategies. We have worked diligently with the Department of Homeland Security on these concerns and strongly believe the Northeast Regional Agreement would make an excellent starting point for a pilot project envisioned by this bill. At the state level, intelligence centers like the New York State Counter-Terrorism Center can be created, either within each state or as appropriate, on a ``regionalized'' basis. A staff of cleared personnel assigned to the center, while maintaining a direct, secure line of communication with a federal coordination center, would interact both with state police and all local police departments. Partnering with the federal government, effective counter-terrorism information sharing could be almost immediately accomplished on a regional basis. In preparation for effective and meaningful sharing of sensitive information, New York State agencies have been working with the Department of Homeland Security to obtain varying levels of security clearances to appropriate personnel. It is imperative that selected and cleared individuals on a state level receive tear line intelligence reports relevant to terrorist activity so they can prepare appropriate response action plans and overlay them with the ``fabric of their community.'' Working in tandem with select local officials awarded the same security clearance will help coordinate counterterrorism efforts from the federal level down to police officers on the street. Currently, a top-secret clearance issued by the Department of Defense may not be recognized or deemed comparable by the Federal Bureau of Investigation, thus halting the flow of vital and often timely intelligence. Therefore, New York State supports federal efforts to streamline and standardize security clearances among all Federal agencies. Just as the federal government relies on state and local communities to be the primary first responders to a scene, we must continue to work toward the empowerment of state and local police to play a necessary role in assisting the Task Forces in the prevention of future acts of terrorism. Simply stated, we must have the ability to share what we gather on the streets and thereby materially bolster JTTF counter-terror investigations. As the Department of Homeland Security becomes increasingly operational, we must continue to connect the counter-terrorism pipes to enable interagency and both international and national information and intelligence sharing on a regular basis. America's state and local police officers are our country's first line of defense against another terrorist attack. They are our forward observers, and our ``boots on the ground'' in this extraordinary and historic effort. They must be fully empowered and given the necessary tools to wage the great fight of our times. We look forward to continuing to work with you to meet this challenge. Mr. Gibbons. We have been joined on the panel on the dais today by the ranking member, Karen McCarthy from Missouri, and the chairman of the full committee, Mr. Chris Cox of California. Welcome, and we appreciate their being here as well. Ms. McCarthy indicated that she will submit her opening remarks for the record, and they will be entered into the record. Right now we will turn to--back to the schedule of witnesses, and thank you, Mr. Kallstrom, for your remarks. Very helpful and enlightening as well. We are pleased to see New York is out there on the leading edge in doing what they are doing, and we certainly look forward to studying more of what you are doing an how it is working out and--. Mr. Kallstrom. Thank you, Mr. Chairman. Mr. Gibbons. We will turn now to Mr. Lago for your comments. STATEMENT OF V. PHILLIP LAGO, DEPUTY EXECUTIVE DIRECTOR, CENTRAL INTELLIGENCE AGENCY Mr. Lago. Good afternoon, Chairman Gibbons, Ranking Member McCarthy, Chairman Cox and members of the subcommittee. I thank you for the invitation to come here and speak with this distinguished panel. The discussion on the information flow and how it gets to the people who need it most is at the heart of defending the homeland. I also thank you for the break we have had. We have managed to get a lot of business done while you were gone. Mr. Gibbons. That is making lemonade out of lemons. Right? Mr. Lago. We do the best we can, sir. I also appreciate the fact that you really want to get to the question and answer period, and since I have submitted a detailed written statement, I am going to keep my opening comments very brief. I believe we have some good-news stories. I believe we are clearly not there yet. We have a long way to go, and we have a lot of challenges ahead of us. I believe that the information flow between the CIA and the Department of Homeland Security is good. It is getting better, and it will continue to get better. We are working with our colleagues in the Department and the Bureau to work with the State and locals to ensure that we get the information flowing both ways to get the right information to the right people at the right time. If I accomplish nothing else today, I would like to leave you with three messages. First--and let me be clear on this-- the CIA is committed to providing all of the information required by the Department of Homeland Security to do the mission that it was asked to do in the Homeland Security Act of 2002. Second, we are working with our partners to ensure that the flow of information goes both ways to ensure that we have the maximum amount of usable, actionable information at the right place, at the right time. And third, the CIA and the Department of Homeland Security have a unique relationship. The missions are complementary. The relationship has been interactive. We will not simply throw information across a transom and walk away. We are going to work with them. We have been working with them from the beginning to ensure that the flow of information is as best as we can get it. We supported then-Governor Ridge when he was made the special assistant to the President. We sent CIA officers immediately to help him. When you enacted the Homeland Security Act of 2002, we immediately sent officers to the transition teams to support the transition to the Department of Homeland Security. We have CIA officers embedded into the Department of Homeland Security today. These people have been there to facilitate the flow of information back and forth. We were there at the beginning. We are going to be there now, and we are going to be there in the future. We believe we are off to a good start. You could argue it is not fast start and you could argue it was not a pretty start, but it is a good start. We have had interactions at all levels of the organizations. We are working desperately to find the seamless movement of communications from all Federal entities to the State and local entities. We clearly are smarter today than we were 6 months ago. We are going to be smarter 6 months from now. I tell you the only thing with certainty that I can project in the future is we are going to make changes. The way we look today is going to be different tomorrow. If we are good, it will keep evolving until we get a seamless mechanism to make this second nature to us. As you know, to the Central Intelligence Agency, this is a new mission, to have mission partners in a domestic entity has been something that is very, new to us. Before it was very difficult to find foreign information and understand that the information could be used to defend New York, Reno, Kansas City. It was very important for us to turn our direction. We have turned. Our director has been very clear to us. We will lean as far forward as possible. We will make sure that we work with the Department of Justice and make sure we protect the civil liberties and don't get caught in those issues, but we will lean as far forward as possible to ensure that the right information is with the right people at the right time. I look forward to this process. I look forward to the rest of this hearing today, and I again appreciate the invitation. I thank you for your time. Mr. Gibbons. Thank you very much, Mr. Lago. We appreciate your consideration of all this, and we also appreciate your taking time to share with us those highlights. They will be very helpful. [The statement of Mr. Lago follows:] PREPARED STATEMENT OF V. PHILLIP LAGO Good afternoon Chairman Gibbons, Ranking Member McCarthy and the Members of the Subcommittee on the Intelligence and Counterterrorism of the House Select Committee on Homeland Security. I appreciate the opportunity to join my colleagues from the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the state and local law enforcement community to discuss information sharing with the Department of Homeland Security. At the outset, let me be clear that the Central Intelligence Agency (CIA) is committed to providing all of the information required for the Department of Homeland Security to execute the mission assigned to it by the Homeland Security Act of 2002. In fact, there are significant initiatives underway within the CIA and across the intelligence Community aimed at providing intelligence support to the national effort to protect our homeland. This support is evolving over time, and through an interactive partnership, we are all learning as we go. The CIA and DHS have a very unique relationship. While our mission has always been to collect information upon foreign threats to our nation and, as directed by the President, take appropriate action to negate or reduce that threat, we now also have the responsibility to support DHS in its new mission to protect the homeland. Our missions are complimentary, and reflect the intent of Congress in both the National Security Act of 1947 and the Homeland Security Act of 2002. We work together to ensure that no gaps exist in our defenses. For many years, the CIA has had relationships with several of the major organizations that were brought together to form DHS. As DHS stands up and evolves, our relationship with it is also evolving. Under Secretary Libutti and Acting Assistant Secretary Parrish have already made great strides in defining the type of information that the department needs to ensure it can perform its mission. We have been addressing those issues, we are addressing those issues today, and we will continue to address them in the future. One of the truths about the future that I am sure of is that this relationship will continue to evolve and change over time as we, as a nation, continue our discussions on how to keep the homeland secure while protecting civil liberties. Let me quickly walk you through the evolution of our relationship with DHS. Shortly after the attacks of 11 September 2001, Director Tenet designated a focal point for coordinating DCI support to this vital mission. CIA has taken an active interest in identifying the needs of the homeland security community and improving the availability of information on terrorism. For example, the CIA significantly increased the number of reports and products that not only had compartmented information but also versions that could be released in collateral or unclassified formats. The CIA sponsored numerous, non Intelligence Community individuals for expedited security clearances to ensure that critical personnel in high-risk areas could have access to information. We provided officers to certain FBI Joint Terrorism Task Forces to help prevent the terrorists from finding a seam in our defenses. When the President named, then Governor Ridge as his Homeland Security Advisor, and established the Office of Homeland Security, we made immediate contact with Governor Ridge and contributed personnel and resources to help stand up this vital office. We went through our next budget cycle projecting the need for us to support Governor Ridge and an Office of Homeland Security that would have about 300-400 officers. In early 2002, we announced the creation of the position of Associate Director of Central Intelligence for Homeland Security (ADCI/HS) including a small staff to help focus CIA and Intelligence Community support to this Office. Shortly after the announcement, the nation evolved in its planning and established a Department of Homeland Security with over 170,000 officers. Clearly we had to resize our efforts. Initially, CIA officers were assigned to both the former Office of Homeland Security and the transition team for the new Department. Since the activation of DHS on 1 March, CIA has expanded the range of products and services provided to DHS. CIA officers are assigned to the Directorate of Information Analysis and Infrastructure Protection (IAIP) and other elements of DHS, working to provide both a core analytic capability and establish an infrastructure for the care and feeding of the new Department. These officers have supported tasks as diverse as information analysis, information system management, security oversight, and watch center operations management. In addition, CIA provides DCI Representatives to both the Homeland Security Advisor and Secretary Ridge. The representatives are senior officers who serve as the primary conduits for the Homeland Security Advisor, Secretary Ridge, and their staffs to raise issues of concern and identify topics of special interest for the Intelligence Community to address, as well as providing a mechanism for providing DHS requirements to the Intelligence Community. Secretary Ridge and his senior advisors receive daily intelligence briefings. The Senior Executive Intelligence Brief (SEIB) is also available to numerous officers at the department. CIA is responding to intelligence requirements issued by DHS in addition to the standing intelligence requirements received from several organizations and components that were incorporated into DHS. We will continue to provide information directly to DHS/IAIP, in addition to information provided via the DHS representatives at TTIC and to DHS component agencies, while working with the Department to better synchronize and streamline the disparate requirements that were generated from legacy agreements. DHS is on the distribution list for all of CIA's raw terrorism reporting, which it began to receive directly immediately upon the implementation of their communications system. Prior to that capability existing, CIA reporting was sent via indirect channels. In addition, all subordinate organizations continue to receive CIA reporting based on their requirements--as they did prior to the creation of DHS--via their existing communication chains, to ensure that the information is received by the action elements as well as DHS headquarters. Finished intelligence products and analysis are also shared with DHS and their components. CIASOURCE provides direct, immediate access to the Directorate of Intelligence's finished intelligence products. Access to these products is determined by the reading requirements established by the requesting organizations. In the case of DHS, we are providing intelligence products based upon two distinct categories of requirements. Prior to the creation of DHS, CIA had established relationships with a number of organizations that were incorporated into the new Department. These organizations included the U.S. Secret Service, the U.S. Coast Guard, the old U.S. Customs Service, the Transportation Security Administration, the Federal Protective Service, the Federal Emergency Management Agency, and the Immigration and Naturalization Service. Although these organizations are now part of DHS, we continue to satisfy their intelligence requirements that were established before the activation of DHS. In some cases, such as the new Bureau of Immigration and Customs Enforcement (BICE) and FEMA, these requirements lists are more than 80 pages in length. In addition, the Intelligence Directorate of the U.S. Coast Guard is separately a member of the Intelligence Community and has access to intelligence products available to the Intelligence Community. We are committed to providing all necessary and relevant intelligence to the Department of Homeland Security. It is our intent to create a dialogue with DHS and help drive out a meaningful, manageable way to flow information, in both directions. We will not simply throw information over the wall and walk away declaring that our job is done. Our goal is to develop a full and interactive partnership with the DHS. In addition to our multiple avenues of support to DHS Headquarters elements, we also support the work of the Terrorist Threat Integration Center (TTIC), a shared partnership including DHS, CIA, FBI, DOD and the Department of State, by providing: CIA staff officers assigned to TTIC--including managers, analysts, and support personnel--the CT-Link information system, personnel positions, and funding, as legally permissible. The TTIC partner elements use these resources, in part, to carry out the mission of directly supporting DHS and other organizations. Also, the Community Counterterrorism Board and its community warning function, with eight staff positions, has been transferred from the DCI's Counterterrorist Center to TTIC. The mission of TTIC does not transfer our responsibilities to report directly to DHS. Thank you for this opportunity to describe CIA's role in the evolution and support of DHS. I would be pleased to answer your questions. Mr. Gibbons. We will turn now to Mr. McCraw from the FBI and ask for your testimony. And welcome before the committee. We look forward to hearing what you have to say. STATEMENT OF STEVEN McCRAW, ASSISTANT DIRECTOR, OFFICE OF INTELLIGENCE, FEDERAL BUREAU OF INVESTIGATIONS Mr. McCraw. Thank you, Mr. Chairman. It is an honor to be here today and I will dispense even with my prepared oral testimony and just get to the--first, I want to commend Mr. Parrish's agency and certainly the CIA. I did in my written testimony. I meant it. It is earnest. At the horizontal level, there is unprecedented sharing of information. I would contend that it is seamless. I mean, we are side by side, whether it is out in the field or whether it is at FBI headquarters, the CTC, TTIC, that day-to-day information sharing is happening, and it is nice to see. It is critical that we do it, because as I pointed out in my written testimony, I mean, the greatest force multiplier unquestionably is the sharing of information. As Mr. Kallstrom pointed out, which I will kind of divert to the vertical sharing--I just came back from an assignment as SAC in San Antonio, Texas and had, you know, three JTTFs working under me, and of course, I would like to state for the record some of the best investigators I have ever supervised in counterterrorism weren't necessarily FBI agents. They were State and local officers. They were Customs, INS analysts from the agency, and they do a tremendous job. And clearly it requires a combined effort. One of the things when I was out there, it was obvious to me was that we weren't doing the type of work that we needed to do to get information into State and local, the vertical side of it. Tommy Davis, the head of the Texas Department of Public Safety, former agency before I got into my bureau, made it quite clear to me in terms that he didn't have a shared comprehensive view of the threat, and it is important to note that it is these men and women that are charged and responsible for protecting the community. So they need information, and they need it fast. They need security clearances, because they don't need just unclassified information. They need it up to certainly the top secret level many times, because they are charged with protecting public safety in their cities. Also as Mr. Kallstrom pointed out, which I think is absolutely right on target, you know, we are blessed in this Nation to have an army of dedicated professionals, men and women--the army is up to 700 authorization, or it is over 700,000 now, and if we can arm them, they need to be armed with information, because they need to know about trade craft. They need training, and that training needs to incorporate in terms of the latest trade craft, and the more we can do, the better we can do, the better educated that we can use them out on the particular streets because they are collectors of information. Not only the first line of defense. Moreover, the advantage of plugging into them is that if they know what the requirements are, what the collection requirements are, then guess what, they are going to be better armed to collect that type of information that goes back and gets integrated, again, into that shared threat. And we need to leverage them. Now, the FBI, I am proud to say, has always been great collectors of information. In fact, I would argue that we have always had a great intelligence program that has been organic to our investigative mission. What we haven't done, though, however, there has never been a core competency to sharing information. We have never had an enterprise-wide plan to share information in the FBI. It has been done on a case-by-case basis. It has been done with the JTTFs person to person. However, we have not mastered that process. Right now we are in a 10-week program. We fortunately stole someone from a--a 24-year veteran from the Intelligence Community, because we are not afraid to take advice. We are working right now instituting in the FBI an enterprise-wide intelligence program, and of one of the core, basic principles that you have to address, and it is critical, is information sharing, which is forcing us to look at and where we need to be is at a customer driven or customer centric place. Now, I have laid out a number of things that the FBI has done. Certainly I am a big believer in the reports officers function that we have got trained professionals to extract the essential elements of information, get it out, intelligence reports back to the community, but also we need to put those people out in the field so they are also supporting that customer at the State and local level. And chiefs of police and sheriffs and heads of State police departments, they need a global view of the particular threat, because if you happen to be the chief of police in San Francisco, and there is a global threat that includes bridges in New York, you need to know that too. You need to see it. I mean, the world has changed. Events that happen in Pakistan and Yemen can make a difference to a chief of police in Paducah, Texas and also the sheriff. That is just the way it is now. So the director is clearly committed to doing that, and thankfully with the support of Congress, we have been blessed in a situation now to transform our entire information technology system, because that is an important part of information sharing, finding the information, the critical information that has to be shared and also pushing it to the community and pushing it to State and locals, leveraging the Internet, leveraging the technology that is out there. Post that information. Let them have access to it, because they are going to put a tremendous center--and I am very impressed with the testimony here in this 10-state initiative, and they are going to dedicate full-time resources into the intelligence process. That is good for the Nation. That is great. The FBI has to come through and deliver on feeding their requirements in terms of information and us letting them know what our requirements are so they can collect information. And, again, thank you, Chairman. It is a pleasure to be here. Mr. Gibbons. Thank you very much Mr. McCraw. [The statement of Mr. McCraw follows:] PREPARED STATEMENT OF STEVEN C. McCRAW Good afternoon Chairman Gibbons and members of the Subcommittee. On behalf of the Federal Bureau of ITIvestigation (FBI), I would like to thank you for affording us the opportunity to speak to you today on this very important matter, Information Sharing. First, I would like to publicly acknowledge the outstanding support the FBI receives from the Department of Homeland Security, the Intelligence Community, and our nation's over 17,000 local and state law enforcement agencies. Our ability to share information with all of our partners has been and will continue to be a key factor in neutralizing many threats through a variety of means. Mr. Chairman, your Subcommittee is evidence that the threat to our homeland is far different than ever before. Worldwide economic, political, social, and technological changes have resulted in a more dispersed, complex, asymmetric threat to our nation. Terrorists, criminals, and foreign intelligence collectors have significantly benefitted from these rapid changes, which have permanently shrunk the world. Yesterday, the most significant threat to the homeland was from nation states that were geographically distant and contained. Today, global networks (terrorism, organized crime, drug trafficking and foreign intelligence operations) are no longer distinct activities, but rather fluid enterprises that pose a significant threat to the security of our homeland. 1As you are aware, Director Mueller is reshaping the FBI to meet these new threats. The FBI has always been a great collector of information; however, the sharing of information was primarily case oriented rather than a part of an enterprise-wide activity. Prior to 9/11/2001, statutory and other legal restrictions limited to some extent the degree of information sharing between the FBI and our Intelligence Community partners. Thanks to the enactment of the Patriot Act, the FBI now can clearly share information much more robustly than ever before. Moreover, in today's threat environment, cooperation rather than competition must be the guiding principle and the recognition that the benefits of sharing information far exceed the risks. We and our partners must have transparency in our knowledge of terrorist threats to the United States. In fact, it is Director Mueller's view that information sharing is the greatest force multiplier in the defense of our nation. For example, the globalization of crime and terrorism poses unique challenges to local and state law enforcement agencies. Chiefs of Police and Sheriffs need access to information far beyond their jurisdictional boundaries to protect the citizens of their communities. Today, events in Pakistan and Yemen can have a public safety dimension in San Antonio, Texas, that the Chief of Police, the Sheriff, and the Director of the Texas Department of Public Safety must know about in order for them to effectively discharge their responsibilities. Since 9/11/2001, the FBI has implemented several information sharing initiatives and others are underway. Collectively, when fully operational, these initiatives will provide an integrated system to quickly deliver information to our law enforcement and Intelligence Community partners. All who are involved in the war on terrorism are continuing to work through very real problems, without preventing in any way the full sharing of terrorism threat-related information. We must not only collect and share more, we much collect and share smarter. Collecting and sharing vast amounts of information without any thought being given to the usefulness of the information collected is counterproductive and wastes precious collection resources, while at the same time drowning the end user, whether he or she is a Chief of Police, Department Head, or Intelligence Community Analyst. The Intelligence process when properly executed ensures that the information shared is useful and meets the needs of the customer. Intelligence has always been a core competency of the FBI and organic to the FBI's investigative mission. The Patriot Act has created new opportunities to strengthen and expand the FBI's Intelligence capability and allowed us to move from thinking about ``intelligence as a case'' to finding ``intelligence in the case'' and sharing it widely with our Intelligence and Law Enforcement Partners. The collection and timely dissemination of the right information to the right people as part of an enterprise-wide business process is so critically important, the Director has elevated intelligence to program status in the FBI and hired a senior intelligence professional from the National Security Agency. Under her leadership, the FBI has embarked on a 10-week program to develop and implement Concepts of Operations for all nine key intelligence functions. We have already completed a concept of operations for dissemination that focuses on both the form and substance of FBI raw intelligence reports. Our aim is to move from individual production processes to a single process that will be imbedded throughout the FBI. One of our first improvements to our already strong Intelligence Program will be to explicitly link the requirements to the raw product and produce metrics to measure our performance against the information requirements of local and state law enforcement agencies, the Department of Homeland Security, the Intelligence Community, and those of DHS officers, our Special Agents, and other Intelligence Community officers assigned to the newly established Terrorist Threat Integration Center (TTIC), in which we, DHS, CIA and others are full partners. Before I proceed with the remainder of my testimony, I would like to take this opportunity on behalf of every FBI employee to thank you Mr. Chairman, members of the subcommittee and your colleagues for the support you have provided the FBI that is enabling us to overhaul its information technology infrastructure. When completed, every aspect of FBI operations including the sharing of information will be significantly improved. The most productive exchange of information occurs at the people level working side by side. Currently, there are 84 Joint Terrorism Task Forces throughout the United States with participation from 25 different Federal gencies and hundreds of local and state law enforcement agencies in the 84 Task Force locations. Every JTTF Officer, Agent, and Analyst has a Top Secret clearance and unfiltered access to all of the information. The National Joint Terrorism Task Force located in the Strategic Information and Operations Center at FBIHQ is comprised of representatives from 35 different Federal agencies. Like the JTTFs, the NJTTF benefits from the combination of experience, diversity of mission and access to the databases of each member agncy. Even prior to 9/11/2001, the FBI benefitted from the assignment of Special Agents to the CIA's Counterterrorism Center and the CIA assignment of case officers and analysts to the FBI's Counterterrorism Division. Since 9/11/2001, the exchange of personnel has dramatically increased as has the timely flow of information. The benefits of co- location cannot be overstated. This is why the Administration made the extraordinary decision to co-locate the FBI's Counterterrorism Division, the CIA's Counterterrorism Operations and TTIC in the same facility next year. The TTIC has already had a positive impact on information sharing throughout the community. As the Subcommittee is aware, TTIC is an interagency joint venture of its partners. The TTIC members include, but are not limited to, the Department of Justice/FBI, DHS, CIA, National Security Agency, National Imagery and Mapping Agency, Defense Intelligence Agency, and the Department of State. Through the input and participation of these partners, TTIC integrates and analyzes terrorist threat-related information, collected domestically and abroad, in order to form the most comprehensive possible threat picture, and disseminate such information to appropriate recipients. TTIC, through its structure, draws on the particular expertise of its participating members, thereby ensuring that the terrorist analytic product takes advantage of, and incorporates, the specialized perspectives of relevant federal agencies. In addition, TTIC will have access to, and will aggressively seek to analyze, information from state and local entities, as well as voluntarily provided data from the private sector. TTIC will work with appropriate partners to ensure that TTIC's products reach not only federal customers, but also state and local, as well as private sector, partners. TTIC provides comprehensive, all-source terrorist threat analysis and assessments to U.S. national leadership. Mr. John Brennan, the Director of the TTIC, and his staff have done a tremendous job in quickly standing up this vital center. The FBI is proud to be full partners in this effort. I would now like to provide you a quick overview of other FBI information sharing initiatives. In 2002, the FBI established the position of Reports Officer whose job is to extract pertinent information from FBI investigations and analysis and disseminate it to the widest extent possible. Currently, the FBI has 18 Reports Officers that have already disseminated nearly 2,000 Intelligence Information Reports to the Intelligence Community. We are in the process of hiring 120 more Reports Officers 90 of whom will be assigned to the field, where they will support both local law enforcement and Intelligence Community information needs. Since 2002, the FBI has sent to approximately 17,000 law enforcement agencies a weekly bulletin concerning terrorism-related information. However, the FBI is not yet satisfied with its ability to provide our law enforcement partners a comprehensive view of the threat. As a result, we are currently establishing an executive briefing capability in the field to ensure senior law enforcement officials receive more detailed threat briefings tailored to their needs. In addition, senior law enforcement officials need access to classified U.S. Governmnt information and to do so they are required to have a security clearance. As you are aware, security clearances are both costly and time consuming. Nevertheless, since 9/11/2001, the FBI's Security Division has favorably adjudicated over 2,686 security clearances for local and state law enforcement personnel and another 823 are pending approval. This is so important the FBI established an entire Unit to focus solely on the security clearances of local and state law enforcement executives and JTTF members. Prior to the Winter OlYmpics, Director Mueller mandated that all domestic and international subjects of FBI terrorism investigations be entered into the National Crime Information Center, providing the over 700,000 police officers in the U.S. query access to the names of known and suspected terrorists. This information is also available to Federal law enforcement agencies and the Department of State. Training must also be considered as an important mechanism for the sharing of essential information. The better we educate ourselves and our colleagues about the enemy the better we are able to defend against them. All JTTF members receive specialized counterterrorism training; however, local, state, and Federal officers not in the JTTFs also need this type of information including knowledge about the latest trade craft employed by terrorists. We have expanded our counterterrorism training to include another estimated 27,000 local and state officers and are currently evaluating other training initiatives to further increase training opportunities. An essential component of the FBI's information sharing strategy occurs overseas with our law enforcement allies. Only by sharing information and working directly with law enforcement abroad will we have the opportunity to stop criminal and terrorist threats before they reach our shores. The FBI has 46 offices overseas where we have established solid cop-to-cop information sharing and working relationships, and provided training and forensic support. The internet provides a cost-effective means to quickly share unclassified information. The FBI's Law Enforcement Online (LEO) provides a secure and easily accessible gateway to this information. Using individual log on accounts, dual certificate authentication, and point to point encryption, LEO will provide a host of information services and enable the FBI to push information over the internet in a cost-effective manner. To further expand its reach, LEO connects to the Regional Information Sharing System (RISS) which is widely used by local and state law enforcement agencies. Furthermore, through LEO, users will soon have access to OSIS.4 Certain information must be immediately brought to the attention of senior local, state, and federal law enforcement officials. The FBI is now implementing a National Alert Notification System which provides us the ability to instantly send text page messages throughout the nation alerting law enforcement agency heads or their designees through their cell phones and two way pagers. The Criminal Justice Information Services (CJIS) is working with local and state law enforcement to capitalize on pre-existing data agreements to address its crime statistics reporting mission while at the same time provide a national indices that will enable police officers to link subjects and modus operandi throughout the U.S. Another information gap is the inability to access wide information on suspicious surveillances. The counterterrorism Report System on Suspicious Surveillance (CROSS) was developed by Department of Defense and is being piloted in the National Capitol Region. CROSS will be accessible through LEO and it enables police officers and Agents to report hostile surveillance activity in a Web environment and receive instant notification on similar activity elsewhere in the U.S.4 The St. Louis Gateway project was conceived by the local law enforcement leadership in the St. Louis area to provide law enforcement investigators and analysts easy access to unclassified criminal and terrorism investigative reports from multiple agencies. This initiative will employ link analysis tools and geo-spacial mapping. During the testing phase, previously unknown links between criminal and terrorism reports were identified demonstrating the efficacy of this concept. When successfully completed, this project will be expanded to other parts of the country based upon previously arranged agreements with law enforcement leaders in different areas of the country. The FBI is also in the process of establishing FBI web pages on Top Secret and Secret Intelligence Community and Department of Defense systems so that it can ``post'' information on FBI web pages that is easily accessible to the entire community. The FBI also has several ongoing classified information sharing initiatives with its partners in the Intelligence Community that are providing tangible results. Finally, it is critically important that the FBI leverage the outstanding work that has already been done in the intelligence and information sharing arena. Long before 9/11/2001, the International Association of Chiefs of Police (IACP) were working on intelligence led policing and the information sharing issue. In August 2002, the IACP published a report recommending the creation of a national criminal intelligence sharing plan. As a result, the Global Intelliqence working group comprised of leaders from local, state, and Federal law enforcement agencies was formed to address the goals and objectives outlined in the IACP report. The FBI is essentially a small but determined organization and we recognize that our future success will in large part be as a result of our ability to leverage one of our nation's greatest assets, the over 700,000 dedicated men and women who serve in local and state law enforcement. Again, thank you for the opportunity to speak to you today and I look forward to any questions you may. have. Mr. Gibbons. And we will turn now to Mr. Foresman. Commonwealth of Virginia, thank you and the floor is yours. STATEMENT OF GEORGE W. FORESMAN, ASSISTANT TO THE GOVERNOR FOR COMMONWEALTH PREPAREDNESS, COMMONWEALTH OF VIRGINIA Mr. Foresman. Thank you. Mr. Chairman, vice chairman, members of the committee, thank you for the opportunity to appear today. I currently serve as a cabinet ranked State homeland security official in Virginia and was responsible for directing State-level response and recovery actions to both the Pentagon and anthrax attacks that directly impacted the commonwealth in 2001. I am also completing my fifth year as a member of the advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, the Gilmore Commission, created by the Congress in 1999 to advise both this body and the President on strategies to improve America's preparedness for terrorism. I also am a former first responder. My detailed testimony has been submitted, and I will attempt to be brief and within the time constraints. Since the attacks of September the 11th, America has made great progress in our collective preparedness for emergencies and disasters of all kinds, including terrorism. Much work remains. There is no more fundamental obligation for government than to protect its citizens. Our collective ability to meet that obligation to prevent and deter terrorism and if required, to rapidly respond and recover requires new and innovative thinking coupled with good old fashioned commitment no nowhere is this more evident than in the areas of intelligence and information sharing. We have merged entire or parts of 22 Federal agencies into a single organization and now named it the Department of Homeland Security. With the goal of improving coordination of effort to make America more secure. The Department of Homeland Security mission continues to evolve. However, one thing is clear. There appears to be ambiguity across the entire Federal Government about the DHS role when it comes to the intelligence sharing responsibility. This is evidenced in almost the daily news articles and my discussions with officials from all levels and areas of government, the media and the private sector. But this ambiguity about intelligence and information sharing frankly is not limited to the Department of Homeland Security. It extends across and within a multitude of Federal agencies with intelligence responsibilities. It affects how effectively they work with each other, equally important it affects how well they work with local, State and private sector players. I would highlight three points in my written submission. The problem is not with the people, and clearly the testimony today underscored that, and interestingly enough the discussions during the break further emphasized that for me. Clearly, there is a commitment on the part of individuals across the Federal agencies to achieve synchronization of effort, but it is clear we are not achieving that as part of a national focus. We have no macro strategic view of how our intelligence and information sharing needs can and should be accomplished with all relevant stakeholders irrespective of the level or function of government. This is a government-wide strategic-wide issue. The confusion among Federal agencies filters to the State and local level and into the private sector. This confusion is not the fault of any one person, agency or branch of government. It comes from years of ad hoc fixes and changes to many individual components of the Nation's intelligence enterprise without having viewed them as part of a whole. The result is unintended, but very real patchwork approach that is a threat to the security of the Nation and our ability to move information to relevant officials at the local, State, Federal level. Second, technology, new statutes or even organizations are not the end-all answer to the problems we face. We need to commit our Nation, that is Federal State and local officials and certain private sector elements, to defining what intelligence needs to be shared and identify existing and new pathways to make it happen. In short, we need a set of business rules with supporting planning effort. We must then focus on clarifying everyone's expectations and focus on achieving improved movement of information and intelligence among all levels, branches, disciplines, functions, areas of government in key private sector entities. Third and finally, we must always preserve the democracy and our core civil liberties. Security at the expense of personal freedoms and rights will accomplish exactly what the 19 hijackers intended. From my way of thinking, for our way of thinking in Virginia and in parting with 49 other States, 6 territories and thousands of Federal officials, we cannot allow this to happen. I thank you for the opportunity to appear today and I will be happy to take your questions. Mr. Gibbons. Thank you very much, Mr. Foresman, for your enlightened comments. They are very helpful indeed. [The statement of Mr. Foresman follows:] PREPARED STATEMENT OF GEORGE FORESMAN Mr. Chairman, Madame Ranking Member and Members of the Committee thank-you for the opportunity to appear today to discuss the issue homeland security related intelligence and information sharing with state and local officials. Three perspectives inform my comments today. I currently serve as a Cabinet-rank state homeland security official in Virginia and was a senior state emergency management official at the time of the September 11, 2001 attacks and subsequent anthrax incidents. I also am completing my fifth year as a member of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, created by Congress in 1999 to advise this body and the President on strategies to improve America's preparedness for terrorism. Finally, I should note I am a former first responder. We are approaching several milestones in the next several months. We will soon commemorate the second anniversary of the tragic events of September 11, 2001 and the one-year anniversary of Congress having passed legislation to create the Department of Homeland Security. Congress has already held joint hearings to examine intelligence issues surrounding the attacks and the independent September 11th Commission is expected to deliver its final report in May of next year. I remind you of these to make the point that in the context of having just celebrated our 227th anniversary as a nation, two years is a narrow window in time. I would like to address three issues to the Committee today. First, has the flow of information from the federal government to states and communities improved since the creation of the Department of Homeland Security. Secondly is the quality of information sufficient to support the daily efforts of thousands of local and state officials who are on the front line of making our nation safe and secure. Finally, I want to offer some perspective as to whether we are we making progress. The great challenge we face in the post September 11th environment is achieving common definitions of homeland security and intelligence. In response to the extraordinary events of September 11th, we have merged entire or parts of 22 federal agencies into a single organization called the Department of Homeland Security. Their mission continues to evolve reflective of statutory language and the National Strategy for Homeland Security. However, there appears to be great ambiguity about their roles within the entire federal family, especially when it comes to the intelligence sharing responsibilities. This is evidenced in the almost daily news articles about competing intelligence activities within the federal government. Each day states and communities are confronted with a multitude of sources of so called intelligence information. This is information that may originate at the federal level from within the intelligence, defense, law-enforcement or other federal communities. Some methods for passing information to communities and states were well established prior to the September 11th attacks and worked well, while others are less than efficient. Among the cornerstone arguments articulated in creating the Department of Homeland Security was to provide ``one stop shopping'' for states, communities and the private sector. In my opinion we have not achieved the most fundamental agreement and education concerning what is ``homeland security'' or ``intelligence''. Does the term homeland security describe our response to the threat of terrorism or is it something more. Today the Federal Emergency Management Agency is a core element in the Department of Homeland Security Emergency Response and Recovery Directorate. FEMA's role in responding to natural disasters and other emergencies is clear. However, is disseminating precautionary information in advance of a hurricane making landfall a homeland security or an emergency management function. Is the data they utilize from the National Weather Service intelligence in the context of homeland security. If so what ``pathways'' should it follow in being disseminated to state and local officials. Are the pathways and business rules for moving the data sufficiently clear that critical information is being moved in a timely fashion. Today there appear to be no clear answers to these questions. The same challenge remains true when we discuss those things that tend to more accurately fit into the category of intelligence. But again, defining intelligence tends to be in the eye of the beholder. Each day law enforcement agencies at all levels of government investigate crimes amassing volumes of data. Is this data intelligence, especially when it may have tangential relationships to the threats we face from our enemies. If the information potentially has direct or indirect relationships to America's war on terrorism is there a well organized structure that provides for the integration, passing and analysis of this data by responsible local, state and federal officials in a comprehensive fashion. I do not believe that is the case. I offer both of these examples to make the point that the creation of the Department of Homeland Security and its intelligence responsibilities add yet another layer to the communication process between federal agencies and with states, communities, the private sector and citizens. This new layer, especially if it improves and better coordinates the flow of information and intelligence, is not the problem. The major obstacle that we face is adding these new responsibilities without first de-conflicting them with the long- standing communication pathways between the federal government and states and communities. I believe we have unintentionally added confusion because of the ambiguity of the Department of Homeland Security's intelligence function as it relates to other federal agencies as well as state, local and private sector stakeholders. One would hope that among the successes we might obtain from lessons learned of the events of September 11th is that we must rethink our approach to defining the intelligence enterprise. Between elements of our federal intelligence, law enforcement and defense community's primary responsibilities for components of our ``national intelligence enterprise'' exist. Throughout history the Congress and Administrations have made adjustments to pieces and parts, usually in response to real and perceived shortcomings, without a seemingly comprehensive analysis of how these individual changes impact on the enterprise as a whole. The result is a patchwork approach that has created often times conflicting responsibilities, ambiguity and further intensified turf between responsible organizations at the federal level. Furthermore, prior to the events of September 11th, state and local agencies were not viewed by federal agencies as part of America's ``national intelligence enterprise''. In the aftermath of the attacks leaders proclaimed the critical importance of police officers, firefighters, public health officials and other state and local officials being key to our war on terrorism. There have been great proclamations about the need to get critical intelligence to those who are on the front lines of keeping our communities and states safe. These same ideals have not been embraced by the rank and file staff in federal agencies. My experience tells me that it is not because of a lack of desire, but rather it again comes back to the ambiguity that exists within the federal intelligence enterprise as it relates to the role of the Department of Homeland Security and what needs to be communicated to local and state agencies. This is not a criticism of any one federal organization. Rather it points to the larger issue of overall federal coordination. There does not appear to be any overall federal vision and coherent plan across the entire federal government that articulates exactly what we are trying to accomplish in terms of information and intelligence fusion, analysis and sharing, especially related to the involvement of state and local government. My perception is that it does not appear to be clear within and between federal headquarters offices as well as with field personnel on the front lines of moving critical information and to us at the state and local level. In short there is no clear plan and direction. Let me be clear. These challenges at the federal level are replicated at the state and local level. Agencies and entire disciplines at the state and local level have managed the flow of information and intelligence for years in a manner that best suits their purposes. Law enforcement agencies tend to focus on ensuring the quality of intelligence more for the purpose of prosecution. Public health agencies have a focus that is on preventing the spread of disease and protecting patient confidentiality. Other emergency response agencies use information and intelligence to ensure rapid response to and recovery from emergencies and disasters. Each is legitimate within their individual context. However, when viewed as part of a larger enterprise these current approaches have the potential to create confusion and conflict. It is clear that state and local level government has a responsibility to effectively integrate information from federal intelligence, defense, law enforcement and other federal communities for its use. A single pathway is not going to work and is not appropriate. Whether it is the threat of terrorist groups, disease outbreak or even a severe storm our continuing focus is on the maintenance of a well-defined set of business rules at the state and local level that outline the pathways for moving information between those who will respond. We are seeking to enhance this in Virginia through the integration of multiple information sources into a single multi-agency center. But our efforts are challenged by the lack of clarity at the federal level among other issues. My impression is that the Department of Homeland Security is making every attempt to capture significant intelligence currently available at the federal level and, where needed, putting the material in a useable form that can be passed to local, state and private sector organizations. My experience tells me that they are inhibited in their efforts by being a new organization that is still working through start-up, merger and acquisition issues. Furthermore, I get the impression that cooperation of other federal agencies is superficial. But this misses the larger point of coordination. The Department of Homeland Security's most important function may be to bring the multitude of federal players together with state and local stakeholders are develop a comprehensive approach to defining what is meant by information and intelligence sharing. This must be a priority. The products are not the answer. A clear set of business rules for describing the vertical and horizontal flow of information across the national enterprise--local, state, federal and private sector is the essential first step. This has not yet to my knowledge been done. Technology and methods of protecting classified information can then be applied to meet defined objectives for rapid transfer and protection of critical national security data. When I began my state career nearly 20 years ago doing contingency plans for nuclear attack there was a two-page description of how information should flow in the aftermath of an attack, taking into account the three levels of government and the multitude of disciplines. I have not seen a similar plan today. Effectively sharing intelligence is less an issue of technology and more good old-fashioned planning and commitment. The flow of information must be vertical between federal headquarters offices, field and or regional offices, states, communities and the private sector and of course citizens. It is imperative that federal information reflects a coordinated and not conflicting approach, less we add to the confusion. When we evaluate the flow of federal information we see clear disconnects between that received directly from Washington headquarters and what is known by field personnel of the various federal agencies. In Virginia's case our proximity to the District of Columbia and presence of key federal operations necessitates a close working relationship with a wide range of agencies and their field personnel. It remains surprising how many times data is received from the Department of Homeland Security, or other federal headquarters functions, that is unknown to the its personnel in the field. This again points to an enterprise wide analysis and defining of who needs to get what and how. More is not necessarily better. Clearly the flow of information increased since the attacks of September 11th. With each passing day more information flows from federal agencies into communities and state agencies. But the simple flow of more information does not equate to better intelligence sharing. I would offer that the almost reactive nature of sharing information may be leading to a well intentioned push by federal agencies that floods state and local officials with often times conflicting data, or so much volume, that reasonable analysis is impossible. This type of visceral reactive approach often adds confusion rather than clarity to the efforts of state and local officials to meet their homeland security responsibilities. Ensuring the quality of information, assignment of priority for its movement and training and education of those who are to receive it remains critical. We have had mixed experiences with the quality of data received. In one case critical information being passed to us through the Department of Homeland Security was almost immediately attacked by field personnel from another federal agency as being ``old news'' and, therefore, unreliable having been over taken by events. We were then confronted with the challenge of validating through unofficial channels what had been provided to us to determine if the disagreement was based in ``turf'' or substance. In another case, the Department of Homeland Security provided us information in advance of Operation Iraqi Freedom concerning potential security concerns on selected sites. This information was passed to local officials but it was clear from discussions with federal field personnel in the affected area that they had not been made aware of these same concerns. Again it posed a vexing question for us as to its authenticity and quality. Most recently, I am pleased to report, that limited knowledge was made available to state and local law enforcement officials concerning an on-going investigation with alleged terrorism related ties. This occurred within the context of one of our Joint Terrorism Task Forces. But unfortunately the information was not disseminated within the federal agency community and when we inquired with an official at the Department of Homeland Security they seemed unaware of the investigation. These types of events, while understandable given the complexity of the issue, leave significant room for doubt about the quality of any intelligence received. I would suggest it is to early to make wholesale judgments if the quality of information we are receiving is sufficient. Anecdotal evidence suggests that we have much more work to do and that we must place a premium on ensuring integration between disciplines, organizations, levels of government, the private sector. If the Department of Homeland Security is to be at the forefront of intelligence and information sharing with states and communities several actions will be needed. First they must continue their efforts to capture and move critical federal information and intelligence to communities and states. This effort must separate they inevitable general information flow and time sensitive intelligence into two distinct categories. Information and intelligence that demands immediate attention must not be sent in the same manner as ``good to know'' data. Secondly, a clear set of business rules must be established that defines the movement of information horizontally and vertically across all areas and levels of government and with appropriate private sector elements. Right now each agency, and in some cases elements within agencies, acts very much on their own and there appears to be no centralized authority for ensuring the development of a strategic approach, that takes into account existing pathways, the multitude of disciplines and organizations, the levels of government and the private sector. This must be an effort free of the day-to-day crunches of moving information and with sufficient authority to make it happen. Agencies and organizations need not give up their individual ``turf'' but rather all of these components must be deigned to operate in harmony. This effort, whether led by the Department of Homeland Security or other federal agency must have the active involvement of knowledgeable local, state and private sector stakeholders. This, I believe, will have profound positive impact on our national intelligence structure including local, state and private sector entities. Finally, we must begin to educate. There is a fine line between our intelligence and information sharing needs and our desires. I note with interest virtually every day a new technology initiative designed to speed and empower the movement of intelligence and information. While these efforts may reflect the technological opportunities of today, they do not always reflect a comprehensive understanding of the significant policy implications of how information and intelligence is gathered, stored and used, especially as it relates to ordinary law abiding Americans. More importantly, we find that federal agencies are operating under antiquated assumptions about sharing classified information with state and local officials. There has been only minimal progress in obtaining security clearances for state and local officials. We seem compelled to operate in an environment that seeks to empower restrictions to effectively sharing critical intelligence and information rather than promoting best practice solutions that get needed information and intelligence to those who must act to save lives. Our experience has been that when the chips are down and the crisis is at its highest point the information will be shared irrespective of clearances. But this point is too late. This approach precludes state and local officials from having digested the complexity of information and developed well-formulated response strategies. Right now the release of secure information and intelligence is built upon individuals rather than a well-defined process with auditable standards that lay a clear framework for sharing sensitive information. If we can quickly share sensitive information with our Allies then we can surely find a way to share it with state and local officials who are responsible for keeping our citizens safe and secure. We cannot underestimate the cultural challenges of having thousands of officials in differing fields change the mentality about the sharing of information and intelligence. But this is essential to our ultimate success. The most significant impediment we face in this regard again goes back to the lack of a clear national strategic approach, one that describes what information needs to be shared and pathways for accomplishing its movement. Virtually every official that I have spoken to understands that they are part of a larger need, but in an absence of a global understanding of the enterprise or their part in it, they find it difficult to adjust their thought process. If I were to point to a major failing to date in our national reaction to the events of September 11th it is that we have not taken the time and energy to train and educate everyone from first responders to elected officials about the critical importance for effectively sharing information and intelligence. We have chosen to think of our enterprise as thousands of separate organizations with a similar intelligence and information requirements rather than a single enterprise with thousands of components. Consequently, each continues to look at its own and not the whole. I need to underscore that my comments do not mean centralizing all responsibilities in a single agency. But there should be clarity regarding the coordination of information and intelligence flow and better methods for ensuring accountability among federal agencies that needed information is being appropriately shared. Core in our national belief is the preservation of civil liberties. One could argue that current vexing confusion only adds to the dangers we face. Our inability to produce a comprehensive set of business rules about what information should be shared and how, inhibits our ability for appropriate oversight and increases the potential that we may unintentionally undermine our core national values in the name of security. The zeal of securing our nation must not trample on the ideals of living as a democracy with individual rights. Thank you for the opportunity to appear today and I will be happy to address any questions you may have. Mr. Gibbons. And finally, we have gotten to Mr. Daniels who has come a long way and has waited patiently for his opportunity to speak and all the way from Arizona. We want to welcome you to Washington, D.C., and we look forward to your testimony. Mr. Daniels, the floor is yours. STATEMENT OF DARIN DANIELS, PREPAREDNESS PLANNING AND TRAINING MANAGER, MARICOPA COUNTY, ARIZONA Mr. Daniels. Thank you, Mr. Chairman. Mr. Chairman and members of the subcommittee, I thank you for the opportunity to address this committee today. I share the subcommittee's concerns about the preparedness of public agencies charged with protecting the security of our Nation and our communities and offer my comments and insights from the local public health perspective. The most critical issue in preparedness today relates to the need to share information openly and on a timely basis. This must be done both vertically and horizontally, vertically between governments at the Federal, State and local level and horizontally across local public and private agencies. Indeed open and timely sharing of information is essential to the ability of State and local medical personnel to respond effectively as a principle line of defense against a disease outbreak, regardless of whether the outbreak is an act of nature or an act of terrorism. Unfortunately historically, this has not been the case for Maricopa County. Prior to the historic events of September 11th, 2001, communications were, at best, spotty and uncoordinated. Thankfully that has changed for the better. Now with the assistance of Federal funds, Maricopa County has been able to build programs and manpower dedicated to surveillance and response to any emergency situation. At Maricopa County Department of Public Health, we believe the key to successful information sharing is trust, respect and shared goals. These elements are the foundation of the partnerships and cooperative spirit needed to ensure community preparedness. To that end, we have focused on developing strong partnerships with a wide variety of Federal, State and local agencies, including the fire departments of the cities of Phoenix, Glendale, and Mesa, local hospitals, tribal governments, the Arizona Department of Health Services and the United States Department of Health and Human Services. As a result of our efforts, we have achieved a high level of interagency cooperation. Examples of this cooperation include shared training and table-top and field exercises. Examples which were the statewide strategic national stockpile exercise, a full-scale chemical and biological table top exercise. This was made possible through the full cooperation of the four metropolitan medical response system cities in Arizona. These joint exercises have resulted in open lines of communication and more responsive decision making. At public health, we understand the agencies must work together on an organized regular basis to create and maintain the communication links needed to share information. The Federal MMRS program has enhanced the relationship-building process by bringing together various agencies within the region and fostering their cooperation in creating a sense of inclusiveness among our partners. These relationships enhance the 24-7 response capabilities locally by allowing leaders and decision makers to know who their partners are prior to any event. Public health has benefitted directly from Arizona's statewide communication system that has been developed to send information through secure and unsecured channels. The secured Internet-based communications network allows sharing of information among local governments and health care facilities. We have focused on changing the dynamics of information sharing. An example is the sharing of epidemiological disease surveillance information. During the past few months, the public has lived with the threat of sudden acute respiratory syndrome, monkey pox, West Nile virus and the potential threat of smallpox. Combatting these diseases requires an effective disease surveillance program and the sharing of the results through all vertical and horizontal channels. The electronic disease surveillance system being developed in cooperation with the State and CDC will be integrated into the statewide health alert network system. This system relies on the cooperation of agencies at State and local level, including county public health departments, hospitals and infection control practitioners. When this system is fully operational, surveillance data will be collected from these multiple sources, permitting early identification of potential public health threats and coordination of an effective response for disease control. In conclusion, Maricopa County Department of Public Health is committed to building and maintaining the partnerships and the vertical and horizontal communication links needed to ensure open and timely sharing of information. The funds we have received from the Centers for Disease Control and Prevention through the State of Arizona have improved communications. More importantly, the funding has allowed us to rebuild an infrastructure that has been allowed to deteriorate and to respond more effectively to public health emergencies. Mr. Chairman, this completes my prepared statement. I thank you for the privilege of addressing the subcommittee, and would be happy to respond at this time to any questions you or any other members have. Mr. Gibbons. Mr. Daniels, thank you very much for your testimony as well. Bringing in a perspective from your point of view is just critically important for how this committee learns more and understands more about information sharing. [The statement of Mr. Daniels follows:] PREPARED STATEMENT OF DARIN DANIELS Mr. Chairman and Members of the Subcommittee: It is an honor and a privilege to address this Subcommittee. My name is Darin Daniels. I am the Preparedness Planning and Training Manager for the BioDefense Preparedness and Response Division of the Maricopa County Department of Public Health, in Phoenix, Arizona. I share your concerns about the preparedness of public agencies charged with protecting the security of our communities and our nation and offer my comments and insight on this matter from the local public health perspective. The most critical issue in preparedness today relates to the need to share information openly and on a timely basis. This must be done vertically and horizontally--vertically between governments at the federal, state, and local level and horizontally across local public and private agencies. Indeed, open and timely sharing of information is essential to the ability of state and local medical personnel to respond effectively as a principal line of defense against a disease outbreak, regardless of whether the outbreak is an act of nature or an act of terrorism. The state of Arizona has 5.6 million people, most of whom reside in either Maricopa or Pima County. Maricopa County, located in the central part of the state, has 3.3 million people or about 60 percent of the state's population. The majority of the county lives in the Phoenix metropolitan area which is the state's population, economic, and political center. Pima County, located in the southern part of the state, has about 1 million people, the majority living in the Tucson metropolitan area. Arizona has the distinction of having four cities that are part of the Metropolitan Medical Response System (MMRS), which was created in 1996. These cities are Mesa, Glendale, Phoenix, and Tucson. Maricopa County Department of Public Health, which established its BioDefense Preparedness and Response Division one year ago, is active partner with these MMRS cities and other public and private agencies in building a high quality emergency medical response system. Unfortunately, however, partnerships and good communication have not always been the case in Maricopa County. Prior to the historic events of September 11, 2001, communications were at best spotty and uncoordinated. An incident occurred in late 1997 that demonstrates this point. An aircraft returning from Mexico arrived at Sky Harbor Airport with 28 very sick passengers. The airport emergency medical staff responded properly, and all the ill passengers were triaged and transported to local hospitals. There was a large failure in communications as no call was placed to Public Health. Without notifying Public Health and properly screening passengers on that flight, a very infectious and contagious disease could have been transmitted to the next city by that aircraft and its unknowing passengers. Thankfully, that has changed for the better. Now, with the assistance of federal funds, Maricopa County has been able to build programs and manpower dedicated to surveillance and response to any emergency situation. At Maricopa County Department of Public Health, we believe information sharing--vertically between governments and horizontally across local public and private agencies--requires three things: Trust that information will be shared appropriately and without impediments; Mutual respect between individuals and the organizations they represent; and Shared commitment to the goals of preparedness and protecting the public. These three elements are the foundation of the partnerships and cooperative spirit needed to ensure community preparedness. To that end, we have focused on building and maintaining strong partnerships with a wide variety of federal, state, and local agencies--including the fire departments of the cities of Mesa, Glendale, and Phoenix, local hospitals, tribal governments, Arizona Department of Health Services, and the U.S. Department of Health and Human Services. As a result of our efforts, we have achieved a high level of interagency cooperation, reinforcing the fundamental concepts of emergency response and incident and consequence management. Examples of cooperation include shared training, tabletop drills, and field exercises; these are illustrated by the following: Joint incident management systems training is provided regularly to Maricopa County Department of Public Health, MMRS cities, law enforcement, fire departments, emergency medical response, emergency management, hospitals, and public schools. Since many agencies function as secondary responders, the MMRS cities have brought valuable information to the table, expanding the understanding of the secondary responder agencies. A statewide Strategic National Stockpile exercise was held in November 2002. This event incorporated training, tabletop drills, and field activities and provided an opportunity for the different levels of government to interact and coordinate vertically and horizontally. The exercise involved the state's two largest counties (Maricopa and Pima), and included Maricopa County Department of Public Health, Pima County Health Department, Arizona Department of Health Services, Arizona Department of Emergency Management, the Tucson MMRS, the Mesa MMRS, the Mesa public school system, the Red Cross, and other private and volunteer agencies. This exercise provided the participating agencies with a hands-on experience in a real-time multi-agency emergency response situation. The city of Glendale sponsored a full-scale chemical exercise to replicate the interagency response capabilities that would be needed in the event of a deliberate release of sarin with an explosive device. Communication between the hospitals and the Department of Public Health was evident at the outset of the exercise; information sharing from the infection control practitioners and the Department of Public Health reinforced the routine communications that occur regularly. The city of Glendale also sponsored a biological tabletop drill with the Maricopa County Department of Public Health to test leadership actions and the responses to the decision-making process. . The benefits of this joint exercise were opened lines of communication and more responsive decision-making. With all exercises, we learned many lessons and our systems were tested on many levels. The most important lesson learned from these exercises is that some agencies communicated well with one another, but others did not--either they did not receive needed information or did not know where to send it. As a result, Maricopa County Department of Public Health and its partner agencies now have a better understanding of the role of various agencies in incident management and what information must be communicated. This understanding is key to the information sharing and relationship building that is now on-going in Maricopa County and throughout the state. Maricopa County Department of Public health has also benefited directly from Arizona's statewide redundant communication system that has been developed to send information through secure and unsecured channels. The secured Internet-based communications network, developed by Arizona Department of Health Services as part of the Health Alert Network, enhances the notification and information sharing process used by local agencies and healthcare facilities. This system will provide security, secure messaging, a public health directory, and some data translation while serving as the gateway for a statewide system with direct access by local health departments. In addition, the MMRS notification network is a system that provides immediate notification of events to the necessary agencies at a moment's notice. This system has the capability to provide critical information and directives for a collaborative and coordinated response regardless of the event. The technical side of communication would not be effective without a strong connection between the users of the system, and the federal MMRS program has enhanced that connection. Advisory committees, subcommittees, task forces, and planning groups have served to build a response network and good relationships among public and private agencies by creating a sense of inclusiveness. These networks enhance the local 24/7 response capabilities by allowing leaders and decision- makers to know who their partners are prior to an event. These systems, alone or combined, allow for the exchange of information vertically and horizontally. In partnership with the state, we have worked aggressively to change the dynamics of information sharing, based in part on a new understanding and respect for roles and responsibilities. An example is the sharing of epidemiological disease surveillance information.. Epidemiological investigations and disease surveillance conducted by the Maricopa County Department of Public Health have only recently received the attention they deserve. A prior lack of understanding of the critical nature of this work resulted in diminished resources and reduced capacity within the public health system. As the role of surveillance has become better understood, public and private agencies have better acknowledged how this everyday function protects the public from the silent invasion of diseases. This is evidenced in new support for epidemiology and surveillance. Recent events have shown the importance of open and timely information sharing between agencies. During the past few months, the public has lived with the threat of Sudden Acute Respiratory Syndrome (SARS), monkeypox, West Nile virus, and the potential threat of smallpox. Combating these diseases requires an effective disease surveillance program and the sharing of results through vertical and horizontal channels. The electronic disease surveillance system being developed in cooperation with the state and CDC will be integrated into the statewide Health Alert Network system. This system relies on the cooperation of agencies at the state and local level, including county public health departments, hospitals, and infection control practitioners. When this system is fully operational, surveillance data will be collected from these multiple sources permitting early identification of potential public health threats and coordination of an effective response for disease control. In conclusion, preparedness for a terrorism event requires solid partnerships and open, timely communication. Maricopa County Department of Public Health is committed to building and maintaining the communication links needed vertically between federal, state, and local government and horizontally across public and private agencies. The funds we have received from the Centers for Disease Control and Prevention through the state of Arizona have improved communications. More importantly, the funding has allowed us to rebuild an infrastructure that had been allowed to deteriorate and to respond more effectively to public health emergencies. Mr. Gibbons. What I am going to do now is turn to the members of the committee for 5 minutes each for questioning and I will do so in the order of their arrival with one exception. I am going to turn now to the chairman of the full committee and yield my 5 minutes to Chairman Cox so that he may have the first round of questioning. Mr. Cox. Mr. Cox. Thank you very much, Mr. Chairman. Welcome again to our witnesses. Thank you very much for your participation on this panel. Mr. Parrish, thank you again for coming twice this week. I would like to begin with Mr. Foresman and Mr. Daniels, because I think you might be able to help us with questions we have about how the Washington system is working in disseminating information. When you get threat information, this question is for both of you, for example, concerning change in the threat level, where exactly does that come from in each of your cases? Mr. Foresman. Mr. Cox, I would like to be able to say that it has been the same every time it has happened, but even as recently as in the last 24 hours we had yet a new process which was used to communicate information to us. Typically we find our best notification coming directly through the Department of Homeland Security into the Governor's office into the Homeland Security function. Mr. Cox. How does that work? Who is contacting you from--. Mr. Foresman. Typically what is happening is the watch center is making notification to us of a conference call in the case of something that is a nationwide alert and we are doing it in conference call fashion. In the case of specific intelligence relating to the Commonwealth of Virginia we typically will receive a call from the Secret Service and they will then be the relayer of critical intelligence from the Department of Homeland Security to our office which creates a little bit of a conundrum because frequently we get that information prior to the Joint Terrorism Task Forces having it over at the FBI. Mr. Cox. Do you have any contact with the Under Secretary for Information Analysis, or with the Directorate for Information Analysis and Infrastructure Protection? Mr. Foresman. No, sir. Typically the direct relationship has been through the Office of State and Local Coordination up to this point. Mr. Cox. Okay. Mr. Daniels. Mr. Daniels. Mr. Cox, the information that we receive in Maricopa County comes directly from the Arizona Department of Health Services and we actually have a very good relationship with our State partners as well as our local Federal representatives. Mr. Cox. So you don't have any contact directly with the Federal Government when it comes to threat advisories? Mr. Daniels. We have limited contact with the Federal Government. Mr. Cox. I ask these questions because the Homeland Security Act gives the Department of Homeland Security Under Secretary for IAIP primary responsibility for public advisories related to threats to homeland security, and it requires that he provide specific warning information and advice to State and local government agencies and authorities as well as the private sector and the public. And, Mr. Parrish, I wonder if you could explain why that isn't happening exactly that way. Mr. Parrish. Sir, if I may, let me just explain a little bit about the organizational structure. Certainly the State and local advisor to the Secretary is a separate position. Within the Operation Center of Homeland Security there is a desk which is part of the operation center that is titled State and Local. The operations center belongs to the Under Secretary for Information Analysis and Infrastructure Protection. The message, the report, the information that is received by the Commonwealth of Virginia is coming from the operation center in the form of a document that is prepared in the Information Analysis and Infrastructure Protection Directorate, so I think it is a little bit of just an organizational understanding of how the process works. Mr. Cox. I want to jump to something that is very topical. It is in the news today. I am not going to rely on this open hearing for purpose of the questioning on an Associated Press and New York Times account of the 9/11 report that you are all aware is now released. One of the things we have learned in this report is that NSA intercepts that were in hindsight relevant to what happened on September 11 were not translated, not only were they not disseminated but they weren't translated, and I wonder, Mr. Lago, if you can address that question. I know you are not here to represent NSA. But this is not the first time this has been a problem. In another capacity at another select committee chairmanship I ran into this problem of untranslated intercepts that were materially relevant to things that we cared about, and part of it was we didn't have the trained linguists, we didn't have the translators. Is this still a problem? Mr. Lago. Sir, there is always going to be a problem for that skill set. There is a finite number of people who can perform that service and there is a large body of us trying to go after these individuals. We have a number of programs in place. We are better than we were then. To get into more detail we would have to take this for the record and get back to you in another session, and we would be happy to do that. Mr. Cox. And let's quickly switch to dissemination. This stark example that for that reason made the news was an illustration of both failure to translate and failure to disseminate. But let's assume that it had been translated and now the only remaining problem is that we didn't disseminate it, and that of course is one of the reasons we formed the Homeland Security Department. We want to make sure that we have shared all of this information. At CIA, at FBI, how far along are we to building IT systems that will permit the Department of Homeland Security to have access to what you have got and how much are we reliant today still on people flagging information that DHS might be interested in? We have a statutory system that contemplates that it is all shared. We have real life and we are getting there in real life, but how far along are we? Mr. Lago. Yes, sir. First of all, if it wasn't translated it would not be disseminated. I mean that is just a given. Mr. Cox. I didn't ask that question but I am not sure that needs to be the case. We have a lot of resources in the Federal Government and, you know, to the extent that for years now, and at least in my oversight experience it has been years, we keep bumping into the same problem. I wouldn't want to foreclose an agency giving up ownership of something that it doesn't have the resources to translate. But that is not the question I asked you. Mr. Lago. Yes, sir. We have developed a couple of parallel processes to share information with the Department of Homeland Security. One, if you will, is a push process where the information is in mass pushed over to the Department and they hold their hands out with a system try to catch it and put it in the proper bins. The second, which is probably going to be more beneficial in the long run, is the pull capability where the analysts and the Department can pull the information. We have given--we are giving analysts in Homeland Security access to CIA source, a database that they can pull from. They have the same user profile capability as the CIA analysts and they can go in and pull information, it is a more manageable process. They are both up and running as we are defining the profiles and we are providing the clearances for the analysts. They will have the same access that the CIA analysts have who work in the Directorate of Intelligence. Mr. Cox. Mr. McCraw. Mr. McCraw. Yes, sir. From--I can't give you the exact date when Trilogy will be fully implemented, because I am new on the design, and one of the exciting things about the design is the investigative data warehouse of XML tagging of data, and the normalization of data. We can actually take all the information that is legally allowable and, with the protocols that Mr. Lago pointed out, push that information not just to the CIA, but also the Department of Homeland, because sometimes they don't know what information it is that they want, but actually provide them investigative data, investigative reports, 302s, things that can go back, all of that stuff we are allowed to and push it to it. Moreover, you know, often it is the FISA take or it is the stuff that has been translated and sometimes not been translated and be able to get multi-media and to be able to allow, you know, them access to that as well is also part of the Trilogy buildout, and of course it is exciting for anybody that has been in the FBI as long as I have and having to do without and to be able to have that capability and then maximize, to actually pushing information, giving information out is also exciting because it certainly does--what we are moving to is a more customer concentric type of model where we are actually, you know, putting performance metrics on how well we are doing and pushing information out. Mr. Cox. I thank you, Mr. Chairman. These are important questions, but as much as I would like to pursue them beyond the time allotted I think I should yield in favor of the other members and seek possible questions on a second round. I think that is as long as I can talk before getting the chairman's attention. Mr. Gibbons. Thank you very much, Mr. Cox. Mr. Cox. Thank you, Mr. Chairman. Mr. Gibbons. Mr. Langevin. Mr. Langevin. Thank you, Mr. Chairman, and, gentlemen, I want to thank you for being here today for your testimony. If I could, I would like to start with Mr. Parrish. And just so you know, one of my very first meetings with Secretary Ridge I had the opportunity to introduce him to a regional information sharing network that is used in Rhode Island and surrounding States known as RISSNET, and it is ostensibly a tool that law enforcement uses to securely share information about criminal activity. Information that is going to be on RISSNET doesn't rise to the level of the information that would be on, for example, BCI or NCIC records, but it ostensibly is an intelligence sharing network among law enforcement. And I provided the Secretary with a pretty detailed memo on what the system is, and I also provided a copy to Chairman Gibbons and I note that he has had an opportunity to review it. I guess if I could, Mr. Parrish, I would just ask you, I would like to know--actually I do know that you briefly mentioned the RISSNET system during Tuesday's hearing in response to a question from Mr. Etheridge about the Department's efforts to provide information to and gather information from State and local first responders, and I have to say that I am a very big fan of RISSNET and I am excited about the demonstration project that is going on between RISSNET and the Department of Homeland Security. And I guess if you could provide my colleagues with a description as you understand RISSNET to be and the ways in which DHS is working with the network, I would be interested to hear about what has been learned from the partnership thus far because I believe that RISSNET could be an excellent model for regional cooperation across the country. And I would just like to hear your thoughts on that. Mr. Parrish. Congressman, I am indebted to you then for bringing that to the Secretary's attention. I think the RISKNET program does offer a capability that we are excited about in the pilot program. In April of this year the Global Intelligence Working Group met here in Virginia, in Alexandria I believe, and my predecessor Paul Redmond spoke to that group. That is comprised of numerous organizations throughout the law enforcement community, International Association of Chiefs of Police, Sheriffs Association, major city police chiefs, a wide audience of the law enforcement community across the country. One of the things we discussed in that, I should say that Paul Redmond discussed along with the FBIs in attendance was the RISSNET program, and as we got into that, looking at could we develop a pilot program that might enhance the information both from the Department of Homeland Security as well as getting the information back, as Mr. Kallstrom said earlier, the listening posts, the eyes and the ears that are out there 24/7 across this great country. So we have a pilot program beginning and we are going to start with--any time you do a pilot we want to start a little small and not get too large. But essentially we are going to connect with the nuclear power facilities in six States. What we will get from that then is a potential surveillance operation that may come in and, as you indicated, RISSNET provides--it is not a classified system but it is a secure Internet program. It also has a great backbone that we look upon possibly building a Web-based site which would be password protected of which now IAIP could then put out its daily intelligence bulletin that would go across the country to all of its subscribers. I think the significance about RISSNET is that it reaches out in addition to your major metropolitan areas, but more critically to your small rural areas, areas that sometimes are overlooked when we get into some of these big programs. So your small police departments that may not be on a system would be able to get this critical information. So again, sir, we appreciate you bringing that to our attention and we look forward to this pilot program. We hope to turn a switch August 15. I am not big on long, elaborated tests. I want to see quick results and then let's move on with this and hoping we will have that program, the pilot over with by the first of October, to press on. And again, sir, we thank you for your bringing that to our attention. Mr. Langevin. Thank you. I appreciate your comments and I look forward to monitoring the program to see how it progresses. I know that our first responders across the country are hungry, are anxious to be as connected with the Department of Homeland Security and both share and receive as much information as possible, and it is obviously going to be critical to the success of the Department of Homeland Security and ultimately our ability to protect the country from terrorists. So thank you for the work that you are doing and I look forward to working with you. Mr. Parrish. Thank you, sir. We will certainly get back to you and keep you informed on the pilot program. Mr. Langevin. Thank you, Mr. Chairman. Mr. Gibbons. Thank you, Mr. Langevin. Turn now to Mr. Sweeney of New York. Mr. Sweeney. Thank you, Mr. Chairman, and let me note that Mr. Kallstrom is staying here for as long as he can, running the risk of not being able to get back home because of flight pattern problems. Jim, if you need a place to stay tonight you are always welcome at my place. And I will get the questions to you as quickly as I can. We have had a lot of discussion, in particular leading up to this hearing, about the horizontal system. It is a great challenge. I salute you folks for all of your work. It is what the President talked about when he talked about the need for America to remain vigilant, and I think some of the work that you have done is the best example of the successes we have had. I want to talk a little bit more about the vertical system, and therefore I will start with my friend Mr. Kallstrom. And as it relates to your idea about the Northeast Regional Consortium, it sounds to me to be a very solid proposition that offers us great opportunity on this dual track to really try to expedite the kind of dissemination and a two-way process. I am wondering if you have ever asked Secretary Ridge to obtain DOD authority to let individuals who have DOD clearances use them once a State has given individuals a formal need to know authorization for the purposes of homeland and maybe just very quickly tell us what the status--what the response you are getting from DHS on the idea. Mr. Kallstrom. Well, yes, sir, we have. First off let me say our number one priority is the same as everyone else here, and that is to stop the next event. Clearly it is important to clean it up if it happens. And that has to all happen. But I believe that we could, together, have a much higher percentage of chance of stopping the next event. We have worked greatly with Governor Ridge when he was the adviser to the President and now that he is the Security Secretary. I can't--we have had hundreds of meetings on this issue. He has been very supportive. But like this big aircraft carrier we are trying to turn around in this country, now that we are all pretty much awake as to what we have to do, it is going to take some time. We have got a lot of this put together. What hasn't been put together in fact, the recess you took to vote I think was incredibly important, because we solved about 90 percent of our problems right here while you were voting, at least at his level. Mr. Sweeney. We might keep you here a little longer. Mr. Kallstrom. But there has been great cooperation. The Department has only been stood up for what, two or 3 months or whatever it is. So I think now we are in the position to connect the pipes to the States in the test bed or in a regional or however we want to do it. I can tell you the cops are ready to play a role, and a focused role, a role that is sensitive to our privacy, the privacy that we fight and die for in this country. But they are ready to play an important role and we have the hooks and the wires hooked up in New York State to do that. And what we really need to do now is have that pipe and have that ability to pick up the phone and talk to people that are in the know about actions that we are seeing in front of our eyes and some training that we can give. And I think, you know, in the next few months if we can put this together we will add another whole layer of protection for our society. Mr. Sweeney. Is there interest among the other States? Has there been an exchange of ideas among States? Mr. Kallstrom. Well, the 10-State consortium is just totally, totally interested in doing this. We sent a letter to Governor Ridge signed by all 10 States, and I would guess if we talked to 50 States, the 50 States would all be interested in having, you know, a better hookup, a better arrangement so that we can vet and train and be better eyes and ears. Mr. Sweeney. Mr. Foresman, I was interested in something you said just a second ago that typically primarily that the information on threats comes from DHS and that was actually good news, I think, for those of us here. And I am wondering, Mr. Parrish, Mr. Lago and Mr. McCraw, and maybe Mr. McCraw the most, by virtue of sort of the interaction with general law enforcement and such, have you developed similar kinds of models, or are you in the process of developing models that, you know, relate to that issue of the vertical transference and I am interested in your response and your thoughts on the Northeast Consortium. Mr. McCraw. Well, first of all, my thoughts. I think it is outstanding. In fact the more of groups that set up intelligence components in those types of arrangements, fantastic. The Bureau's job has been strictly to address local and State law enforcement and feed them intelligence and we have done it in a number of ways. We are not satisfied that we have met our obligation to provide them the type of information that they need to do their jobs, and we have got a number of initiatives that I detailed in my testimony. But I am convinced that when we take this as the whole and look at it from an integrated standpoint it will do the job. Now we have to, you know, we have to make it--you know obviously not treat it as just a by-product of what we do, but actually make it a core function and have performance metrics and talk to the customer and treat, you know, individuals like Mr. Kallstrom and treat others that are involved in the State and local law enforcement as customers, whether it is a briefing program, whether we are pushing information, whether it is LEO, whether it is RiskNet, which finally surprisingly we have actually for good government's sake combined or provided connectivity between LEO and RiskNet so that customer on RiskNet has access to the same information, and I can assure you in week seven of our concept of operations it will become an enterprisewide activity. Mr. Sweeney. Let me thank you. I have to go preside over the House. Let me say I am glad we were productive, at least bringing you together. I look toward to working with each of you and all of you and I thank you for your service. I thank the chairman. Mr. Gibbons. Thank you, Mr. Sweeney. And Ms. Lowey. Mrs. Lowey. I am delighted to welcome the panel, and I guess Mr. Kallstrom is the man of the hour. We are two New Yorkers here today and thank you so much for appearing before us. And I apologize, we are all running from one hearing to another. But I would like to pick up on where our Chair Chris Cox left off and I think because I have 5 minutes, and I know you are a quick study, I am going to just go through a series of questions and then if you can respond to the whole issue I would be most appreciative, Jim. That would be great. One of the questions was, number one, who provides you with information about terrorist threats? The Department of Homeland Security, the FBI, another agency? And if you receive the information from both, can you determine what types of information are being channeled through DHS or the FBI? And is it a problem to receive--I don't want you to take notes, but I think you can kind of get it as I am going down. Is it a problem to receive terrorism information from the Federal Government through more than one channel? Following up on that--. Mr. Kallstrom. No, it is not. Mrs. Lowey. Then we can go back to the other, and if you can compare as you are talking about this. Can you compare the status of information sharing prior to the passage of the Homeland Security Act to the present situation? Has anything changed? Do you have a sense that the information you receive from the Federal Government is coordinated? Do you ever receive conflicting information from different Federal agencies? If you care to provide some examples, you certainly can. And how do you do deal with it, and has the Information Analysis Office ever contacted you to coordinate training for your employees regarding information sharing? Has another Federal agency provided such training? Maybe I will stop at that point. You get what I am trying to say. Mr. Kallstrom. We work a lot together so> Mrs. Lowey. Well, I appreciate it. Mr. Kallstrom. We love getting information from multiple sources. We would like it by the wheelbarrow full. I have to congratulate the Federal Government and maybe it is a function of the fact that I spent my whole life in the FBI and have personal relationships and have maintained a security clearance. But the CIA, for instance, has been incredibly responsive. George Tenet sent someone to New York--maybe I shouldn't say that--but for the sole purpose of sharing information with us, and it couldn't be better. Mrs. Lowey. On a regular basis? Mr. Kallstrom. On a regular basis. Of course it doesn't solve the bigger problem, but the cooperation has been great. The people trying to, you know, hook up the wires in a system that isn't quite organized yet the way it needs to be. Everyone is interested in doing that. The three FBI task forces in New York State have been great in sharing information about their investigations although they don't have, in my view, the bigger picture that they need. So we have had those great relationships. What I--and Homeland Security has been great. I mean since they have been stood up, since Bill Parrish has been over there, Frank Libutti is a 20-year friend of mine back from the Marine Corps, we talk almost every day. And we talk about the issues, the priorities that were faced. So I think the intent, the human heart throb intent emotion to fix this thing is there. What we have to do now with the help of Congress is figure out a way of more systematically and routinely and real time--I mean, yes, there is a need to go to a Web site and look at stuff and that is all part of training. But I need a cop on the Taconic Parkway tonight that has got a car pulled over with a potential terrorist in it. We don't know. But for whatever reason his suspicion has been raised as we trained him to be a more observant person. I want that person to call a center in New York State, or if he is in Boston to call a center, you know, in Massachusetts or whatever State, and to put that information into the center which is connected to Washington, all these guys and others that aren't here, and get some real information in the center about the, you know, how important it is that we have this guy on the side of the road. Do we let him go, do we bring him in, do we do something else because of the information that we have so we can make better decisions. And then the flip side of that is in New York State we have got 75,000 cops, and you know a lot of them. They talk to you all the time in Westchester. Mrs. Lowey. I was going to let you finish the sentence because if you could expand on that, because I hear that over and over again. Mr. Kallstrom. Right. And there is about less than 1 percent of them that are part of the three terrorist task forces and that is through no fault--I mean that's the amount of local police, State police, local police we have on the task forces. I ran the one in New York City for 4 years, and it is a very effective, it is a fabulous thing to do. The problem is the other 74,750 that are on the streets were not effectively using their eyes and ears. So we need to train them. We need to enable them. We need a system so we can communicate, you know, right from the street down to Washington and from Washington back again in the counterterrorism business only. You know we are not looking to make cops a new band of intelligence gatherers at political events or any of that stuff. I am talking about countering terrorism. And we can do this. They are ready to do it. In New York State we have hooked up all the cops. We have secure communications with every police chief, every sheriff in the State, and so we are ready. We have got the pipe. And now we want Washington to organize themselves so we can talk to them and, yes, we need archived information. Yes, we need stuff that we can go to Web sites and find stuff. But we also need to pick up the phone and talk to someone that has access to all this information so we can make better decisions. I see the State center as being sort of a tangent to Washington, sort of their guys in the State that are trained, have the right security clearances, understand the sensitivities of this information, understand the legal rules of how we store information, how it is retrievable and we can let cops without top secret clearances, without secret clearances communicate with us with real time information. And guess what? We can all be safer because we have got 700,000 more pairs of eyes and ears out there that are being more effective to protect us against the next act. So, you know, I don't know if I answered your question. Mrs. Lowey. You sure did, Jim. Mr. Kallstrom. But that is what we are trying to do. Mrs. Lowey. You sure did. And rather than my going through more questions I really want to pursue that for a minute, because you know I have been meeting with the police, the firefighters, everybody. Now, I heard that a year ago. I heard it 6 months ago. I am hearing it now. We just appropriated on our committee, on which Sweeney and I--well, we all, many of us serve, $39 billion for Homeland Security. The gentleman--I forgot his name--who appeared before us was telling me on the interoperability issue, which is a little different from the issue you are presenting, that they are going out with an RFP within a year. We will get the equipment so everyone can talk to each other. And I said great. Are you going to have a buyback program because my guys aren't waiting for you to go out with the RFP 6 months from now, a year from now. You will get back the information. How--. Mr. Kallstrom. Just give us some secure phones. Mrs. Lowey. Well, how can we be of help to, I mean, the problem--you and I have talked. This is an issue we have been hearing a long time. Charlie Cole in Yonkers is still complaining about this. How can we help you? Mr. Kallstrom. Congresswoman, I think we are on the verge of making this happen. I think, you know, the Homeland Security Act I think that the House Intelligence Appropriations Act of 2004, with some work, it needs a little bit of work, is a good vehicle for authorizing this type of exchange if we need authorization. I don't see any legal impediments to doing this. I just think we need to get everyone down here to hook this thing up. And if we start off at, you know, if our engine can go 10,000 RPM and we start off at 2000 RPM, that is okay. We can make this thing work and we can develop it along the way. And I think we are ready to go. I really do. Now, are all the States, have they done what New York state has? I don't know. But I mean we are willing in our 10-State consortium--I don't know if you were here when I talked about that. We got all the New England States and New Jersey, Pennsylvania, Delaware and New York, that have formed a group just to share information. They are ready to go and they are ready to use a regional center for this very reason. So I think this is not that hard to do. I think we just have to get everybody in the same room and do it. Mrs. Lowey. I am probably out of time, but I just--I see the red light. I just wanted to thank you very much and thank you all and hope with the efforts of all you good people you can push us and help us move this forward so a year from now we are not still talking about how we can get it through. Mr. Kallstrom. Yeah, and money would be helpful at some point. Mr. Gibbons. Thank you very much, Ms. Lowey. Mr. Meek. Mr. Meek. Thank you, Mr. Chairman. Like I started out in the opening statement, I am glad to be here today because I have been wearing many hats over there the last couple of years in Florida. We followed New York as relates to passing Homeland Security legislation in the legislature there. Also, in my past I have been a first responder, and now I have had an opportunity to serve with these very fine men and women in the Congress. I have been in a lot of circles where folks are saying that they are sharing information and we are all getting along and we are all hugging and carrying on and saying good things about one another. But I think, like I said at the beginning, of some of the events that have recently taken place in the area of intelligence. Is it good or is it bad? Who is sharing it with what and who said what? I watched Director Tenet's body taken from the Senate intelligence chairman over in the Senate, thrown from the train as it relates to who gave what bad. Neither here or there, no one will ever know the prevention that all of you provide every day of being able to seek and find out and inform law enforcement agencies on what they need to know as it relates to potential terrorists in this country. But also I want to direct my question towards the fact that what are we doing as it relates to individuals, especially as it relates to State and local law enforcement and even the FBI who--what I may call home grown terrorists those individuals that are in the heartland and in Miami and in Chicago and these individuals that prey upon us not being prepared? I don't know how they play into this bigger role. Many Americans feel that our counterterrorism efforts are targeted towards individuals from the Middle East or targeted from individuals that may be from a country or a state outside of our homeland here that may bring about a threat to our country. And I think that it is important because when it comes down to homeland security, unfortunately, and folks from New York here, I want to apologize for the events that took place in the city yesterday, but automatically the thought that it was a terrorist attack. So I want to find out how does that play into the role of some of you that are sitting at the table, number one. Number two, as it relates to the front line guy or gal that is in the patrol car like the Oklahoma situation, it was an officer pulling an individual over. How are they getting that information because I guarantee you this committee room may not be full today, but let something happen and someone knew something and someone else didn't know it, and I guarantee you could get members who don't even serve on this committee trying to get into this room because they are looking at who is going to be at the lynching at high noon the next day because they don't want the burden to be on them. So I am saying a lot, but I want to make sure that we are actually talking. I take some comfort in the fact that y'all were able to complete some business while we were on the floor voting, but I want to know outside, and the people that serve under you, is there real communications, you feel comfortable with those communications? Because I don't believe that is something that we can legislate, to be honest with you. We can try, but I don't believe that is something that we can legislate. Historically in law enforcement or any sense of power or even here in the Congress, there is some information that even we don't share with one another, but in this case it is imperative. Mr. Parrish. Let me if I could just open up because in your opening remarks you made a very relevant and germane statement when you said that the information that is provided to the State and local authorities must be relevant. One of the things that we do in the Information Analysis Directorate is we take in volumes of intelligence at the very sensitive level. In reviewing that with our counterparts at the CIA, at the Terrorist Threat Interrogation Center or the FBI, what we are looking for is getting something that is relevant in the hands of a police officer on the street and working with the FBI to get that information to him, something that is relevant to a private sector to enhance their security posture at either a chemical facility or a shopping mall. The intelligence that we get sometimes is very general in nature. What we try to do is to take a look at it and pull out what can be actionable intelligence to get out there to the people to look at. One of the initiatives I have now is to draw upon the successes of our country's great Americans wearing a uniform serving in the military and the captured individuals involved with terrorist organizations from Afghanistan. Also the FBI has made numerous arrests and the CIA has seized many. Our allies in some other countries have picked up significant members of the al Qaeda leadership organization. What the IA is doing right now is reaching out to the CIA, to the FBI and coming together to sit down and analyze the intelligence that is being pulled from these individuals. What I want to be able to do is to assess the capabilities of the threat that they say they have to take down a bridge, to take down a tall building. What were the skill sets taught in the training camps? Did they in fact really have that capability? Did they really analyze and take a look at the amount of resources required to do that? Those to me are the nuggets of information that we can get out to our State, local, and private sector when we put out a threat against a bridge, against a tall building, against an apartment complex. Help them prioritize the expenditure of their minimum resources they have in a prioritization of how to expend that. Working with the FBI, again, their information is getting out to the State and local law enforcement entities. Our customer base is a little bit different, but yet it is important we get that information out there. So we are taking a very close look at this very sensitive, classified information. We must realize we have to protect sources and we are sensitive to that. But we want to get that down to the level that a police officer on the street, a Wackenhut security guard actually understands what this means to him or her in the performance of their duties. And I think probably, Steve, I would turn it to you. Mr. McCraw. Yeah. I think that is a very astute observation. We must be mindful, you know, prior to 9/11 that Oklahoma City took more lives on American soil than any other international terrorist act and that Eric Robert Rudolph was caught by a State and local officer, a local officer in Andrews, or in fact Murphy, North Carolina and not by the Federal Government. You know, point in case why you want to leverage those opportunities. The FBI still has domestic terrorism. The JTTF still works domestic terrorism. We still are focused on the Phineas Priesthood, the Aryan Brotherhood, the ALF, ELF and the myriad of other domestic terrorist organizations that have been documented that are out there that are active and in conducting day-to-day investigations on those. And it has to be done that way and we have to be mindful and we have to infiltrate them as well to prevent the next act of terrorism. So I think that is an outstanding point. And again you do it the same way, you know, working relationships, cop to cops, and what is good for international terrorism in terms of information sharing that the FBI is doing and adopting is also the same for domestic terrorism. It has to be shared to the widest extent possible. And thank you. Mr. Meek. Mr. Chairman, just a closing comment. I know that I am out of time, but I just want to say I think we have two choices here, one, to work together in times of prevention and when the waters are calm, and to work together but somewhat be suspicious of one another in a time of crisis. And after 9/11 a lot happened. This Congress moved in an unprecedented way in passing legislation, authorizing dollars, flying and having special meetings and joint sessions. And I think it is important that we do everything we can do and while the waters are calm to get--pay justice to that individual out in the patrol car, at the same time pay justice to those individuals in State agencies that are trying to do the best they can do to be able to make things happen. And I know that the FBI, CIA, you know, after the joint commission and the 9/11 report and all of that from out of this Congress, from Mr. Porter Goss' committee, that you are now working together. We are all better now. We want to make sure that we get better. One of you made the comment--I am sorry I had to step out for a minute--of the fact that we are better now than we were 6 months ago and hopefully we will be better as we move along. We hope that that is the case. Please let us know if there is anything that we can do to make sure that the line of communications are there. But I think only the people in the law enforcement and prevention agencies that are out there, even within the Department, can even move better than we can because we can't legislate that. That is something that just has to come together on behalf of our country. Thank you, Mr. Chairman. Mr. Cox. [Presiding.] I thank the gentleman. Chairman recognizes himself for 5 minutes. I want to talk about clearances. Mr. Foresman, Mr. Daniels, are you finding that the people at the local level are able to get clearances in a timely fashion? Mr. Foresman. No, sir. Mr. Cox. What has been your direct experience? Mr. Foresman. We have had a multitude of direct experiences and, Mr. Chairman, I would also like to say I don't think clearances are as much the issue as developing an auditable process to share information much the same way we do with our allies on a day-to-day basis because we don't clear our allies to get classified information but we do have an auditable process that allows us to share it with them. But having said that, I think the big challenge that we run into is just the length of time that it takes to clear individuals. We happen to have one-term governors in the Commonwealth of Virginia. We started this process, I had a clearance previous to coming into this Cabinet position. Others who are in this office did not. We are just now getting the first of what are supposed to be seven or eight clearances. We have not cleared our Chief of Staff. We do have a clearance for the Governor. We are doing the Governors much the same way that we do Members of Congress. Mr. Cox. How long did it take the Governor to get cleared? Mr. Foresman. Interestingly enough, Mr. Chairman, we suggested at a hearing up here on the Hill, and this is a prime example of where Congress stepped up to the plate, that if you as Members of Congress could receive classified information by signing a nondisclosure agreement certainly Governors could as well, and DHS moved rapidly to get the Governors to sign nondisclosure agreements. Mr. Cox. And that was all it took? Mr. Foresman. That was all it took. Mr. Cox. But, now, with respect to the seven or eight clearances that are coming to the floor as we speak, how long has that process taken? Mr. Foresman. We have been in the process for over a year, Mr. Chairman. And again, the issue is if you look across the universe of people who have a need to know information in Virginia, it is in the hundreds if not thousands. And the simple fact is developing a process to clear all of those individuals may not be as important as developing a process to sanitize information as appropriate and to rapidly get it into their hands in a form and fashion that they can act on it quickly. Because with even the simple turnover, if it is taking a year or 18 months to clear an individual, we could theoretically start a state police superintendent today and in 18 months have to start over again because he or she has left the job. Mr. Cox. Now, when Secretary Ridge was in California we had a discussion with the California law enforcement officials in Los Angeles. It was suggested, and nobody objected to the notion, that we could democratize the process a bit, share the workload. Obviously it is a Federal function to clear people, but there isn't any reason in the world that we cannot rely on the manpower in the States to do some of this work. If you have got requirements, if not in the hundreds then possibly over a thousand people that have a need to know in Virginia, need to know something, and it would be useful to have access to information at those levels, then surely the Virginia State police or Virginia law enforcement can do some of the knocking on doors and interviewing and so on that comprises a large part of this burden. Has anybody suggested to you that we have a joint Federal-State arrangement for clearances? Mr. Foresman. Mr. Chairman, we have actually suggested that on a number of occasions, but I think what we are finding now is that the background can be done quickly, whether we are using retired FBI agents or other Federal law enforcement personnel, State law enforcement personnel. But then we have to adjudicate the clearances once the background information has been done by the Federal agencies. But this points to a larger issue, Mr. Chairman, that if I get a clearance through the Department of Defense, is it going to be recognized through the Federal Bureau of Investigation and is it going to be recognized by the CIA and is it going to be recognized by the Department of Homeland Security, and I will tell you the simple answer is today still no. Mr. Cox. And so the seven clearances that you have gotten or about to get are valid where and invalid where? Mr. Foresman. It depends. It is in the eye of the beholder, Mr. Chairman. And again that is not an indictment of the fact that we have got a very diffused enterprise across the Federal Government in how we manage the clearance process in much the same way that we have a very diffused enterprise in terms of how we manage the flow and the movement of intelligence and information horizontally or vertically. Mr. Cox. For your purposes and for purposes of the clearances that we are using as examples in this question, who is the Federal agency with which you are dealing? Mr. Foresman. It has transformed over a period of time because in one case, and this is actually a little bit interesting, DHS is on the front of seven of them. For a period of time before the merger and acquisition went through it was the Federal Emergency Management Agency. Those individuals who were associated with our Joint Terrorism Task Forces it is being done through the Federal Bureau of Investigation. Those individuals with--that have to work closely on DOD installations across the Commonwealth on response issues, it is being done by DOD. And the most recent is the U.S. department of Transportation Office of Pipeline Safety is currently in the process of doing some folks. Mr. Cox. Mr. Parrish, let me ask you that. You may not know or you may know precisely the answer to this question. But does the Secretary or his delegate within the Department have the authority to grant clearances to State and local officials? Mr. Parrish. Sir, I will get you a definite answer back to you. We do work the process with Secret Service to coordinate the issuances of clearances. We are looking at that. With regard to Mr. Foresman's comments of different Federal agencies granting clearances, my experience holding a Top Secret/SCI for as long as I can remember, when I was in the military, I worked in the counter drug business with the FBI and DEA. All of that was honored as well as with the CIA, so that is one I think we need to get back to Mr. Foresman and the Commonwealth on, and we will follow up on that. I would like to say if I could, I think Mr. Foresman is exactly right. It is the process of information sharing that goes back to what I commented to Congressman Meek, is one of the things that IA is doing right now, is taking a look at this sensitive information to see what is relevant, what really could a State and local authority do with this piece of information when it is analyzed and assessed. Some of this intelligence at the very sensitive level is so general that it is really when they get it they say what does this mean to me, Patrolman Smith, in Topeka, Kansas. One the things we have in IA's initiative as we are following up is to get a training program to train the intelligence analysts within State and local communities so that when they do get this intelligence they know what the method of looking at it as well as following up and going back and asking for what we call RFIs, requests for information, additional requirements that they may have germane to their mission. The other piece we are looking at is a fellowship program within our, Fusion cell. It will probably become the information fusion cell within IA where we will have DHS law enforcement personnel from the Customs and Border Patrol, Immigration and Customs enforcement, but also a fellowship to bring in analysis from Stat/Local Agencies from around the country to spend perhaps 2 weeks in our operations, than having just rather the fusion cell looking at this intelligence at the classified secret level. We would get them interim secret clearances to come in there to be able to understand our operations. Part of the problem when we deal with this information is analysts have to understand when they look at a report ``they must ask themselves what is it that I know and who needs to know it.'' And that is the essence of information sharing, is getting people trained to understand what it is they are looking at, understand who needs to get this information. Mr. Cox. I want to take us back, although I certainly think that your point about information sharing as against clearances is a transcendent one, is the purpose of today's hearing fact in fact. I want to take us back to this clearance question, because the question that I asked, I don't know the answer to either, a moment ago, about whether the Secretary or his delegate has the authority to grant clearances to the State and local officials. The reason I don't know the answer is that the best we have been able to come up with on the committee is the President's executive order of January 23 of this year, which gives to you, gives to the Secretary--I will read the categories of people: The Secretary of Homeland Security, the Deputy Secretary of Homeland Security, the Under Secretary for Information Analysis Information Protection and the Assistant Secretary for Information Analysis, Department of Homeland Security, each shall be considered a senior official of the Intelligence Community for purposes of Executive Order 12-333, and then you know, on and on. And then it goes on to say that specifically you have the authority to recognize and give effect to and make clearance and access determinations pursuant to Executive Order 12-968 back in 1995 with respect to all employees of the Department of Homeland Security, all applicants for employment at the Department of Homeland Security and all people in the private sector. It doesn't say anything about State and local governments. Now this is an EO and it is not perfect, obviously, but I don't know whether that loophole or that gap is filled somewhere else, whether you think you have the statutory or executive authority to do this. But surely we would like the Department of Homeland Security to be able to address the problem of clearances among State and local law enforcement, public health officials, and the harmonization of those clearances for Federal purposes because we are trying to share here. That is the main purpose of Homeland Security, and it remains a puzzlement to you as you sit here at this hearing and to me as chairman and to our staff, and so it probably requires a little bit of work. Mr. McCraw. Mr. McCraw. Mr. Chairman, if you don't mind, from the local and State law enforcement standpoint the FBI has taken on that responsibility. In fact, if it is not working well, I mean we are the ones that need to be held accountable as it relates to local and State law enforcement specifically and we--I know we have made a number of gains under Assistant Director Senser's leadership. We stood up a unit just specifically to address State and local law enforcement clearances, and I know close to 3,000 have been cleared and another 800 are in background right now. We see for a secret clearance we can make it as quick right now, in terms of setup, 60 days for a secret clearance. And as most of the gentlemen know at this table, the secret clearance will get you to where you need to be most of the time and top secret takes much longer obviously for the JTTFs. Mr. Cox. Would the support of State and local law enforcement assets and resources help speed up the FBI process? Mr. McCraw. I think we are in good shape right now. There are some things that can't go any faster. You can't force it through even with more people, Chairman. However, when we can make that 60-day to 90-day window for the secret clearance for State and locals and the chiefs of police, that works real well. And they have been very vocal. The chiefs of police are not very shy about letting us know when we are falling down on that, on getting their clearances through. And so the good news is it is one clearance for all. I mean whether you are in the Homeland Security, the agency, the military or if you are a Governor given a clearance, that counts across the board. It doesn't matter who got it for you. Mr. Cox. Mr.Markey. Mr. Markey. Thank you, Mr. Chairman. Mr. Lago, the now declassified National Intelligence Estimate said that if we didn't attack Saddam then it is unlikely that he would use biological, chemical, nuclear materials, but if we did attack and we destabilized the government that there would be a significant increase in the likelihood that he would align with al Qaeda, he would align with other terrorist groups. In view of the fact that we have yet to find the chemical, biological, nuclear materials that were reported to be there before our attack upon that country and that the scenario which the National Intelligence Estimate is most concerned about is now in place; that is, that he is not in government, is he telling you, you are not authorized to this question that--have you changed now your recommendation, for example, Mr. Daniels, over here? Have you told him to be on the alert for biological, chemical, and nuclear materials that might be in the hands of al Qaeda? Mr. Lago. Congressman, we should be on the alert today regardless of the information--. Mr. Markey. Have you notified Mr. Daniels that he should be on higher alert because the scenario in the national intelligence estimate has now unfolded? Mr. Lago. No, sir. Mr. Markey. You have not. Why is that? Mr. Lago. Congressman, again, we should be on the alert for those attacks today. We have no specific information, no specific actionable information--. Mr. Markey. The national intelligence estimate said that there would be a significant increase in the threat if we went in and we did--. Mr. Lago. Sir, I understand that. We have no specific actionable information to pass on to Mr. Daniels today. Mr. Markey. You do not. So has there been a change in the national intelligence estimate now in terms of what the threat is that is posed to our country? Was that wrong? Was the information prior to the war wrong? Mr. Lago. Sir, I--. Mr. Markey. You can answer. Mr. Lago. I am not an expert in this field. I will take that back for the record and we can get back to you. Mr. Markey. I think America has a right to know whether or not the national intelligence estimate on that subject was correct; and if it wasn't, then they probably should say that the Intelligence Community has changed its mind, that there is no heightened risk now that the uranium, the biological and chemical materials are not accounted for. Mr. Lago. Sir, as I said, I will take that back for the record. Mr. Markey. Because it seems to me that was the major justification for the war. Colonel Parrish, I am interested in finding out the process by which the Homeland Security Department's information analysis and infrastructure protection unit operates under various scenarios. As you know, 22 percent of all cargo is transported on passenger planes and isn't physically screened at all. In fact, packages and mail weighing less than 16 ounces aren't even subject to the Bush administration's flawed known shipper program which relies on the shipper's paperwork as a guarantee that the cargo was safe. It just goes right on the passenger plane unscreened. As you know, Pan Am Flight 103, which exploded over Lockerbie, was brought down with a small quantity of plastic explosives in an unscreened bag. Richard Reid had 10 ounces of plastic explosives. So let me ask you these questions, if I may, Mr. Parrish. If IAIP received intelligence indicating that there was a credible threat that the terrorist was planning to use the security holes in the cargo screening program to use plastic explosives to blow up a passenger plane, who would IAIP inform? Mr. Parrish. Sir, for intelligence received on that information, we work very closely with the Transportation Security Administration with that regard. At the same time, if there is indication of potential smuggling operations to move those materials in across the borders of our country, this information is conveyed to the Customs and Border Protection. Mr. Markey. So would you inform FBI? Mr. Parrish. Sir, that would be done in coordination with the FBI. Again, the FBI is represented within IAIP at our headquarters. Mr. Markey. If the CIA receives intelligence about a terrorist threat against a commercial airline using an explosive device in the cargo, who would you inform, Mr. Lago? Mr. Lago. Sir, we would use the same mechanism that is set up to inform all members of the community to pass information to the Bureau, to pass information to the Department so they can pass information to the channels that have been established for the necessary individuals to be notified. Mr. Markey. Would you pass it directly to homeland security automatically? Mr. Lago. Absolutely. Mr. Markey. If you were instructed by your CIA supervisors not to share that information, what would you do? Mr. Lago. Sir, that is a hypothetical. I have never been asked not to share information like that. I imagine if I was, I would share it. Mr. Markey. Mr. McCraw, if the FBI received intelligence about an explosive threat against a commercial airline using an explosive device in the cargo, who would you inform? Mr. McCraw. All involved parties, including homeland security, the Agency, the entire Intelligence Community, and certainly the local and State law enforcement officials in that area that have a vested interest in that geography. Mr. Markey. So you automatically, under the law, have to deliver it directly to Homeland Security? Mr. McCraw. Well, I don't know the law, but from the FBI's standpoint, we are going to, whether the law says we are going to or not. We are absolutely going to. In fact, the example used in such specificity, I can absolutely guarantee you that that information would get out to all those individuals, and under that scenario, probably the head of the airline company as well. Mr. Markey. If IAIP received intelligence about an Al Qaeda potential attack against U.S. nuclear facilities, who would IAIP give that information to? Mr. Parrish. That piece of intelligence that comes in would go to the Nuclear Regulatory Commission, which is responsible for the security of the nuclear facilities. At the same time, sir, we would reach out to the private sector within that geographic region. Certainly at the same time all of those communities, if we could narrow down the location, reach out to the governors and the State and local authorities within that region. First would be the Nuclear Regulatory Commission responsible for the security of the nuclear facility to enhance their security posture. Mr. Markey. Would you give it to TTIC as well simultaneously? Mr. Parrish. Yes, sir. That information--and that scenario you present would be coming in simultaneously to all those organizations. They would be assessing it at the same time as IA. Mr. Markey. So there would be no additional screening of the information after you were passing it on to the NRC? If the NRC asks you not to pass it on to others until they had time to investigate, would you wait or would you automatically give it to TTIC and to the FBI and to others? Mr. Parrish. No, sir. That would be automatic. Mr. Markey. You would give it to the governors automatically even if the NRC said wait? Mr. Parrish. No, sir. That would go out to the State and local authorities as well in a timely fashion. The relationship we have with the NRC, I do not see that as a realistic scenario. Mr. Markey. And finally, if I may, on the question of staffers, Mr. McCraw, how many FBI staffers are qualified to administer polygraph tests in Arabic? Mr. McCraw. I don't have that answer for you, but I will find out. Not nearly enough. Mr. Markey. Are we talking about ten or 100? Mr. McCraw. I don't know. I know it is not 100. Mr. Markey. You really don't know the answer to that? Mr. McCraw. I absolutely don't know it. Mr. Markey. How about you, Mr. Lago? How many are trained to conduct those kinds of polygraph tests in Arabic? Mr. Lago. Sir, I don't know the answer to that question. We will take it for the record and get back to you. Mr. Markey. And has there been a damage assessment done to determine how costly our failure to collect information from walk-ins and other sources pre9-11 from Arab sources was in protecting Americans from terrorist attacks? Either one of you. Have you guys done an assessment of that, going through the volume of information. I know that a lot of information was never actually translated, and I am just wondering have you done an assessment now in retrospect of how serious that was as a whole in our intelligence gathering that all of that information remained untranslated? Mr. Lago. Sir, we will take that for the record. Mr. Markey. Mr. McCraw? Mr. McCraw. Obviously we didn't have enough sources to prevent the act, which clearly that is the basis we do all damage now is prevention of the act, not in terms of what we figured it out after the fact, Mr. Markey. Mr. Markey. You haven't determined after the fact that you actually didn't have enough people who can actually speak Arabic in order to actually read all of the translations or to translate all of the information that was being gathered? Mr. McCraw. As it relates to the translations, that has occurred on that. I thought you meant, more importantly, the walk-ins, whether we had source coverage, whether we have infiltrated the particular cells, and the answer is clearly we know right now we did not. Mr. Markey. Thank you, Mr. Chairman. Mr. Cox. Mr. Turner. Mr. Turner. Thank you, Mr. Chairman. One of the things that has been always puzzling to me is why we have had such a difficulty coming up with a single consolidated watchlist. I know the General Accounting Office recently issued a report, and they say we have 12 different terrorist watchlists maintained by nine different Federal agencies. If any of you disagree, please advise me, but I think everyone agrees that we should work from one watchlist. But it appears that there is some confusion about who is supposed to be creating this consolidated, single watchlist. I noted that in July of 2002, the President's national strategy for homeland security stated that the FBI would establish a consolidated terrorist watchlist. Then in February of 2003, the White House issued the fact sheet on the Terrorist Threat Integration Center, and it stated that the center would maintain a database of known and suspected terrorists. And finally, in April of this year, the General Accounting Office report indicated that the Department of Homeland Security had taken the responsibility for creating the consolidated watchlist. Who among you can tell me who is supposed to create the consolidated watchlist, whose responsibility is it: the FBI, the Terrorist Threat Integration Center, or the Department of Homeland Security? It seems totally unacceptable that we can't solve what would appear to be a simple problem. Mr. Parrish, do you want to start? Mr. Parrish. Yes, sir. First, there is the term ``watchlist,'' and then the term ``database.'' The multiple databases that existed by the independent agencies--they had those databases based on their mission of their organization. From these databases, then you could produce the watchlists of the names of the individuals that you were looking for or to be aware of. The Terrorist Threat Integration Center is in the process now of developing the identities tracking database, which will be, if I could I guess, describe as the mother of all databases as we talked about over at TTIC, of integrating all of these databases of the Federal agencies into a single database. Obviously that is resource-intensive. When you start integrating this to maintain this database, one of the things we learned is that people's names got on lists early on, and there needs to be a mechanism to get their names off once it is proven that individuals are not associated with the terrorist nexus. But when you take a look at the resources that are out there to bring these databases together, and once that is done, then the concept of a national watchlist center, which is really kind of the switchboard that people would call into to be able to determine if an individual they have in front of them is someone that they need to be concerned about. This will really fall into alignment with the discussion that Mr. Kallstrom is talking about in these regional operation centers that we are talking about. Using that scenario, when this process is in effect, when that patrolman out there in Lackawanna pulls someone over and calls back into that regional operations center of New York and says, I have in front of me a certain individual by the following name, that center calls into the National Watchlist Center--which currently is under review right now regarding should it reside in the Department of Homeland Security under our umbrella, or is it more appropriate in the FBI, we hope to come to a rapid decision on that in working with the White House. But under that scenario, then this National Watchlist Center would pull that name from this integrated tracking database to say here is the background on this individual. Now, what that does then is give that patrolman on the street a little bit more information of what he should be looking for. Again, to be consistent with the privacy laws, but he may now be able to take a look and gain a little bit more information about this individual that allows us to take a look at connecting the dots. So the database, you are right, sir, it requires the integration. We are looking at databases from State Department and TOPOFF. We are looking at Treasury Enforcement Communication Systems and their database and the FBI database. You are exactly right, but I think there is a process in place, and we are moving fast on this to be able to get this up and running. Mr. Turner. It just seems to me that in the short term, untilthere is a National Watchlist Center, set up in the manner that you suggested, that there should be some entity that you create that everybody goes to. We should be capable of at least having having the same terrorists on all the watchlists. And apparently we don't do that. So I am not sure when you talk about the local patrolman on the beat; I guess he goes to the FBI watchlist. I guess that is where he turns, I would assume. I don't know. Mr. Parrish. His initial entry point would be--and I will let Mr. McCraw talk about that, but as he goes in, it would be through the national criminal index computer system. You are right. If I could, even though it seems there is a disparity here with the databases, there are success stories. You all may recall reading in the paper of an individual by the name of Omar Shishani in Detroit, and I will quickly tell you in January of 2002, when the FBI called me from one of the document exploitation centers and said I have a roster here of about 150 names that was found in the terrorist training camp in Kabul, would you be interested in it? And I said, sure. Bring it over. As we looked at it, very generic names, Al Hindi the Indian, Mohammed the Egyptian, Omar Shishani, the Chechnyan. I said, let's put it in the TECS computer system, the Treasury Enforcement Computer System, with a footnote on the bottom that says, ``name associated with terrorist training camp,'' and as you know how that system works, we then do our advanced passenger information system sweeps on all international flights coming into the United States. In July of 2000, a flight coming in from Tokyo to Detroit ran through that sweep, and on it appeared Omar Shishani. No date of birth, no passport number, but on the bottom was ``name associated with terrorist training camp.'' An astute Customs inspector pulled him aside in a secondary and opened his suitcase, and we found $12 million of counterfeit checks with an individual who has a long history of association with the Russian Mafia and some of the terrorist activities in Chechnya. So there are systems that are working in place. You are right, sir, we need to integrate these databases to become more efficient, and I think the plan is in place to make this happen. Mr. Turner. I think that is an excellent example of why we need watchlists. You mention Omar Shishani and how putting him on the list resulted in something positive occurring. But, my question would be was Omar Shishani on everybody's watchlist, the 12 different watchlists that are maintained by apparently nine different agencies? Mr. McCraw. Congressman, I can go ahead and try to answer your question. First of all, as important it is to improve it-- and there is a plan in place and TTIC is going to play an important part of that plan, the situation is not as bad as it appears on the face. First of all, there is really two actual lists, and everything else are extracts thereof. The no-fly list is an extract of information provided either by the FBI or the intel community that is either maintained in tipoff or vigtoff, which is a file system within NCIC. Is that perfect? No. Clearly there needs to be and they are working towards it, and Mr. Parrish talked about the plans in place for a watchlist center, and I think appropriately briefed you in terms of where we are going. Tipoff right now will be incorporated into TTIC, and they will take over that particular responsibility. And all of that information will go into that particular place, and one of the plans in which needs to happen--although the FBI subjects now appear in NCIC for access to over 600,000 state police officers, that information in tipoff is under review that will also be included so that that state police officer has access not just in terms of the FBI subjects, but in terms of the collective wisdom or about bad guys involved in terrorism by the Intelligence Community and the FBI. Mr. Turner. Mr. Foresman, you might want to weigh in on this. You are down there at the local level. Where would you call if you were trying to identify someone and wanted to look at a watchlist? Where do you go? Mr. Foresman. Congressman, this is probably a bad day to ask me this question, because we just spent the last week trying to get someone off of a watchlist only to find out it wasn't an FBI watchlist but someone else's watchlist that really wasn't a watchlist, and I think that part of the issue here is definitional in nature and centralizing in nature. Right now we would probably go to the Joint Terrorism Task Force through the Bureau as the basis for doing that, but I think what is more important is if I have a trooper who is sitting on the Capital Beltway around Washington who stops a vehicle, he has no way to query the system today, and I think when we critically talk about the 700,000 law enforcement personnel, those at the local level, those at the State level, Federal law enforcement personnel, the bottom line is the beat cop on the street is not having access to the information to be able to do a rapid check against it. And while I understand that we are certainly making progress towards planning for integration, I remain fundamentally concerned we don't understand what we are designing, because we haven't really mapped out the larger strategic picture as of yet. Mr. Turner. Thank you. Thank you, Mr. Chairman. Mr. Cox. Ms. McCarthy. Ms. McCarthy. Thank you very much, Mr. Chairman. Thank you very much, panelists, for sharing your thoughts with us once again today. Mr. Cox. Would you yield for just a moment? Ms. McCarthy. Of course. Mr. Cox. I would like to ask unanimous consent to include my opening statement in the record, and I believe you wanted to make a similar request. Ms. McCarthy. I would like to make that request, Mr. Chairman, that my opening remarks be placed in the record as well. Mr. Cox. Does any other member wish to make a similar request? Mr. Turner. I will make a similar request, Mr. Chairman. Mr. Cox. Without objection, the opening statements of all members shall be included in the record. Thank you for yielding. Ms. McCarthy. Thank you, Mr. Chairman. Mr. Foresman, I very much appreciate your experience at the local and State level, and I testify there is confusion in the movement of information from the Federal Government to the State and the local level, and I wondered if you could share some examples with us and ideas on what needs to be done to clear that up. I know from my own experience with local responders, they are experiencing that in Missouri as well. And I know, Mr. Parrish, based on your testimony and your comments yesterday, and today that you are very sensitive to this need, but the sources aren't quite there yet to enable the training and other things that need to go on. But Mr. Foresman, if you would speak to that. I know in your testimony you indicated there does not appear to be any overall Federal vision and coherent plan across the entire Federal Government that articulates exactly what we are trying to accomplish in terms of information and intelligence fusion, analysis and sharing, especially related to the involvement of State and local governments. How should the Department of Homeland Security and TTIC and any other agency optimize information sharing? Because I am quite concerned and agree with all of you that the people who are going to carry this out are at the State and local level. The knowledge is here in Washington, but the people on the front lines, those homeland security police and fire and ambulance drivers and others are out there all over America. And how best do we get the information to them that they need so they can do the job when called upon? Mr. Foresman. Well, I will come back and do the two examples last and maybe address the latter part of your question first with your indulgence. I think this is very much an issue of empowering the Department of Homeland Security with clear authority and responsibility for bringing all the relevant stakeholders to the table in crafting a national vision, one that includes all those Federal agencies with component pieces in the intelligence enterprise as well as the local stakeholders and the relevant private sector partners. There have been a plethora of efforts, both through the Bureau, through the Central Intelligence Agency and through the Department of Homeland Security, but they still lack that overarching strategic national focus, and I think very much so that whether it is the Department of Homeland Security or any other Federal agency, we very much need to lock ourselves in the room and actually as we talked about earlier, about another 3 hours' worth of break and we may have solved about everything here today. But I think it is critically important that we sit in the room and define expectations, do the education, define the business rules for sharing information that allows the Bureau to protect that information that it feels like it needs to protect, the Agency, State and local governments. There is certain information that State and local governments have that should, because of the provisions of Congress, not be warehouseable at the Federal level. And we all recognize all those things, but we have not sat everybody down and created that vertical and horizontal picture in the most macro of sense. The specific examples I would cite, I would like to go back to the fact that we are very much early in this process of this post September 11th environment, but I still--and the challenge--I have a great deal of faith in the people sitting at this table, whether it is my counterparts in Arizona or New York or the Federal agencies that we work with, but remember, I am just one person and I have to work with a plethora of local officials, whether they are law enforcement, public health, I have to work with elected officials. The two examples that come to mind is the Department of Homeland Security in advance of operation Iraqi Freedom was quite active in providing threat information to all of the States and specific threat information to the Commonwealth of Virginia. They provided that information in rapid fashion and form, and when we attempted to do that level of local level collaboration as we brought our local stakeholders to the table, I will tell you that the level of zeal of security of certain sites was not necessarily represented in the field agents of the various Federal agencies in the affected area, and so we were faced with the conundrum and a legitimate conundrum of a police chief saying what do they know in Richmond that the field offices don't know, or what do they know in Washington and so what is the quality of the intelligence. A second example actually goes back prior to that when we had some credible information that we were dealing with with regard to the Commonwealth of Virginia and to DHS's credit, they went to great pains to get that information to us rapidly and succinctly. They were good about making sure that all those folks that need to be briefed were briefed. The problem end is again that there was good agreement between the principals, i.e., those folks who now make up the TTIC, the Bureau, headquarters in DHS, headquarters offices about the information; but, again, when it went down to the field, the response that we got from the field personnel was that this is old information. This has already been vetted. We sent it to Washington. Someone got excited about something that they shouldn't have gotten excited about. Well, from my standpoint, I am left with the challenge of articulating to a governor and to local officials is this credible quality information that you should act upon and do certain measures? I think in large part, those were early incidentals in this process, and things are beginning to improve, but just as we talked about a number of regional initiatives across the northeast, things that we are doing in Virginia, things that are going on within Federal agencies, who is the air traffic controller for all of these different things, and how are we making sure that we are making this whole effort operate in harmony and in a synchronized fashion? Mr. Parrish. If I could just add, one of the things, an initiative of Under Secretary Libutti is we need to go out and hear from our customer base in a follow-up to Congressman Markey's scenarios that he presented. For example, I know that you have interest with regard to water supplies. On June 23rd, we put out an extensive threat advisory to all States with regard to water safety--water supply threats with some protective measures on what they should be looking for to handle that. It will be valuable for us to get the feedback from Mr. Foresman's office, how did the Commonwealth--how do they use that? Was it valuable to them? Was it a good product? What else, additional information? To Congressman Markey's scenarios, as I mentioned it had other day, the morning following the attack on Riyadh as I was sitting at TTIC looking at the sensitive intelligence traffic going back to TTIC and to the CIA, I said I needed a downgraded product at the unclassified level. IA began writing protective measures against this new tactic and technique employed by Al Qaeda in those attacks. Again, a lengthy document that assessed and analyzed the actual tactics and techniques employed against an installation, breaking through the fence, assault teams coming in, we took that intelligence, got it unclassified the same day, and we put out a product that gave protective measures to State, local and private sectors on things they should consider in enhancing their security posture. So we put products out there like that to the State and locals, but we need feedback to see if that is relevant to them, is it useful to them. So, again, it is an initiative of the Under Secretary. We are going to get out there and find out exactly has needed. Ms. McCarthy. Anyone else wish to comment? I thank you, Mr. Chairman, and I thank the panel. Mr. Cox. Thank you. I want to take the opportunity, Mr. Kallstrom, to ask you prospectively about how the Counterterrorism Center that you describe in your testimony might operate when it opens in August and thereafter. Specifically we heard from Mr. Lago that a CIA source is an IT solution that deliberates finished intelligence products. Is this something that you would expect to take advantage of at that center? Mr. Kallstrom. Sir, I think we would see the center as sort of the filter or the go-between between all the collaborative agencies in Washington and internationally, for that matter. To the myriad of people in the State, probably the law enforcement people first, and then there is obviously other people that need to know things. And we would be in a position at that center, because we would have trained the people, they would have the proper clearances--and I must just divert and tell you something in my view of 28 years in the FBI, I see virtually no reason for but a handful of people in any State to have a top secret clearance, by the way, because the only reason it is top secret is the information is not anything that anyone needs to know. It is--secret is adequate. But the center would then take the information through collaborative efforts between the people in the center in Washington, discussions, phone discussions, summary reports, different types of intelligence that is put out periodically, and we would then put that into real words and real action for the cops in a different form to educate them as to what they should be looking for, what indications might be, what warnings might be so that their eyes and ears work better. That is one thing. The second thing is a point someone made here earlier, I think the gentleman from Texas. A police officer is someone on the side of the road that for whatever reason his level of suspicion is raised. Maybe there is a hidden NCIC, but maybe just because he presents some documentation that looks a little strange or maybe this thing is in plain view or whatever the reason, that police officer just radios in to the center in New York who has connectivity with Washington and says, I have this guy and maybe there is a code word for an all sources check, please give a check on that, and then instantaneously within minutes, you know, our people in New York who are sort of an extension of Homeland Security/FBI/CIA, are looking at databases to see if this person is of any interest. And then the center and Washington together craft what we want that officer to do without divulging the sensitive information. Hold the guy? Let him go? Delay him? You know, whatever it is, make note of whatever is in plain view, blah, blah, blah. And that is how we see the process working. The other point I want to make is I think it is imperative on the part of all of us, particularly in Washington, to break this issue of the protection of us as a people into two categories. Category one, those things we need to do to stop the next event, to not have another event happen on the soil of this country or against American interests elsewhere. Number two, if it does happen, clean up the mess. And those things obviously we have to be prepared. Our first responders need the right equipment. We need the right protocols. They need information. But it is critically important to do a dozen things--maybe it is 14. Maybe it is 10--to add the State and local resources to this problem, this challenge of not having another event happen, and I think we can easily do it, ladies and gentlemen. I think we can do it. I think we need to focus on it, though, and not combine all this stuff into one big pot and call it homeland security. I think we have to talk about those issues we do to stop the event and those issues we do to mitigate if an event happens. I think we would have clearer direction and clearer solutions to it if we looked at it that simple way. Mr. Cox. Well, I couldn't agree with you more on that point. Mr. Lago, when you described a CIA source in your testimony, you had reference to sharing with DHS. Is that system something that on a classified or unclassified basis State and local governments can tap into? Mr. Lago. Today, no. We have nothing in place today. There are some issues that you would have to work, you will have to work on, on getting the CIA process that close with the State and local processes, but as Mr. Kallstrom said--and I think I would echo that--the first thing you need is to be able to translate the needs, the requirements needs on both sides. We could put a box out there and we could give a person a couple weeks training, but I would suggest that it has taken--it probably takes us 4 to 6 years to train an analyst to be proficient in doing the modeling and using the tool to the best of their ability. We have tried to come and work our way around that relationship. We have deployed a CIA officer to New York. We are fairly proud of the information flow that has gone both ways because of that. It clearly has given us more insight into their specific requirements. And quite frankly, we spoke different languages when we started this relationship, today we have an individual to help translate. Now, does that mean to say that we couldn't put some kind of a system in that would allow them the access to those things or maybe send an analyst to help them? There are other ways of doing it. But I am not sure that just sending a system to them would help most of the States. Does that answer your question? Mr. Cox. Well, it certainly raises an important aspect of the question, which is that there is judgment involved in determining what is reasonably likely to require onward passage to State, local, and so on, law enforcement and intelligence. The MOU obviously contemplates this and states that information that is classified or otherwise subjected to restricted dissemination but which reasonably appears likely to require onward passage to State, local or private sector officials, the public or other law enforcement officials goes to DHS with accompanying high-content tear lines suitable for onward passage at the unclassified level. That would certainly--and run a lot of the tougher problems that we have just been talking about. And the question is whether there is an IT solution to that or whether this--how is this being done? Is it being done literally with tear lines where pieces of paper are being faxed, or how does this work? Mr. Parrish. Sir, if I could on the access, the CIA source, CT link, some of those systems, IA has access to that with our analysts. As I say, we go into those systems daily. We receive that information. We analyze those pieces of intelligence to say what do I have here and who needs to know it, what State and local authorities need this, is this regionally oriented to the Northeast sector? Do we need to get that to California? We then go back in through the process to get that tear line if required, and then that information is provided to us. Now, oftentimes we will go back and say we need more information, that this tear line does not meet the needs of our constituents, and we have had success with that with the CIA to go back and get that. Then--and going back to the concept of RISSNET as we implement this, this will be a secure Internet system not at the classified level but it will be password protected. We envision this to be posted on a Web site or we will send it directly via e-mail up to that operations center in New York to convey this information to them. So that is our job. That is our mission in IA to make sure that we are pushing the IC, the Intelligence Community for every piece of information that is there that is classified sensitive at a level that we deem essential to get out into the hands of the State and locals, and right now the system is working. We are working it with TTIC, reaching back through CTC, and I am here to say that so far, Parrish has never been told no. Mr. Cox. Mr. Kallstrom. Mr. Kallstrom. If I can just add one thought to close the loop on it. You know, I think we have a very good vehicle in place now to stop the next attack, and that is the terrorist task forces that comprise all the Federal agencies and some select State and local police. There is just not enough people on these task forces to know what they don't know, and the missing piece as we talked about earlier I think before you came in was we need to find a way from the--I am talking about prevention now. We need to find a way to let State and local resources be more effective eyes and ears for those task forces so we can broaden their knowledge base of what is going on in our communities, our towns, our neighborhoods, you know, some little town up on the northern border where maybe some terrorists are living. The targets may be in New York. They may be in Washington. They may be a few other places. The terrorists aren't necessarily there. So I think we will go a long way. I think the Federal Government appears to be fairly well coordinated now. We have got problems with these watch lists. We have got problems with computers, but if we can figure out a way of harnessing the State and local assets, the law enforcement assets and other assets to be more effective lookouts, watchdogs or listening posts for the task forces we already have, I think we will make a geometric leap in the ability to protect our society. Mr. Cox. Mr. Langevin. Mr. Langevin. Thank you, Mr. Chairman. If I could, another question for Mr. Parrish. I have to admit that many of us I think were surprised when the TTIC was created, because I think many of us had expected and wanted to have that type of an entity, that function performed by the Information Analysis Directorate, but at this point I think many of us are just withholding judgment as to whether that is going to work and we will take a wait and see attitude. I am concerned, though, and just want to touch on the topic of the type of information again that you are receiving, and I know this has been discussed, but I want to look at it again. Are you receiving the raw intelligence or mainly the analyzed product? And if you are receiving analyzed product rather than the raw intelligence, are you concerned that something might be missed that you would have picked up on had your analysts looked at--had direct access to the raw intelligence? And do you feel that the TTIC analysts are looking for the same things that you would be at the Information Analysis Directorate? Mr. Parrish. Yes, sir, and I recognize your concern. First, again, as we mentioned the other day, is that we are a part of TTIC, the Department of Homeland Security. IAIP is a partnership with TTIC. We have Department of Homeland Security analysts, the IAIP analysts working in TTIC that come there with an operational understanding, I should say--or rather, an understanding of the operational environment of the Department of Homeland Security. A TSA analyst is located there. A Customs and Border Protection analyst is there, and Immigration and Customs Enforcement. So they are looking at all of that raw intelligence, all of that information that is filtering through TTIC that is coming from the entire Intelligence Community, looking at it through the lenses of what is relevant to the Department of Homeland Security from the standpoint of what is needed for the State and local and private sector. We are also receiving that information within IA, and we do conduct independent assessments on that intelligence to identify if in fact there are credible threats that we need to get out to the private sector, which is State and local. Mr. Langevin. The raw intelligence as well as analyzed intelligence? Mr. Parrish. Yes, sir. Again as I said the other day, you know what you know. I know that we are getting reports. Again, I have analysts from those agencies of the IC that have access to their systems within IAIP, members of the NSA, from the CIA. So at this point in time, I think your assessment is right, is that TTIC is a force multiplier right now. It is doing what the administration intended. At the same time IAIP is certainly in compliance with those 19 functions of the Homeland Security Act, of which we are charged. Mr. Langevin. Well, thank you. We will be monitoring its progress, and I certainly would hope that you will share with this committee if you have concerns that that arrangement is not working. Mr. Parrish. Sir, if it is not working, I will be right back here to tell you. Mr. Langevin. I yield back. Thank you. Ms. McCarthy. [Presiding] the Chair recognizes Mr. Markey. Mr. Markey. Thank you. Thank the Chair very much. Back to you, Mr. Lago, if I could. Back in October 7th, 3 days before the Congress voted on the resolution authorizing the President to go to the UN and then to use force if necessary, the President said in that speech to the American people and to the Congress at that time--he said that--he said, we have learned that Iraq has trained Al Qaeda members in bomb making and poisons and deadly gases and we know that after September 11th Saddam Hussein's regime gleefully celebrated the terrorist attack on America. Iraq could decide on any given day to provide a biological or chemical weapon to a terrorist group or individual terrorists. Alliance with terrorists could allow the Iraq regime to attack America without ever leaving fingerprints. Then in the State of the Union Address that the President delivered this year, which laid out the case for why we might have to go to war against Saddam Hussein, the President said to the American people as he was concluding the State of the Union address, he says, evidence from intelligence sources, secret communications and statements by people now in custody reveal that Saddam Hussein aids and protects terrorists, including members of Al Qaeda; secretly and without fingerprints he could provide one of his weapons to terrorists or help them develop their own. I am continuing the President's State of the Union Address. This is how he is concluding now. Before September 11th, many in the world believed that Saddam Hussein could be contained, but chemical agents, lethal viruses and shadowy terrorist networks are not easily contained. Imagine those 19 hijackers with other weapons and other plans, at this time armed by Saddam Hussein. It would take only one vial, one canister, one crate slipped into this country to bring a day of horror like none we have ever known. We will do everything in our power to make sure that that day never comes. Now, we know that on Friday a senior White House official-- and we know who that is. We just won't say his name. We know he doesn't want his name mentioned--said that in response to the questions about the National Intelligence Estimate that was revealed on Friday that he publicly released, showed that--and I will read this now from the National Intelligence Estimate: Saddam if sufficiently desperate might decide that only an organization such as al Qaeda, already engaged in a life or death struggle against the United States, could perpetrate the type of terrorist attack that he would hope to conduct. It went on to say that Hussein might decide to take the extreme step of assisting al Qaeda in a terrorist attack against the United States if it, quote, would be his last chance to exact vengeance or by taking a large number of victims with him. So thus far the intelligence assessment that Hussein might be a potentially bigger threat now than before the United States attacked has yet to be retracted if he wasn't captured and if these materials went into the hands of al Qaeda. That being the case, Mr. Lago, again, it is hard for me to understand why a warning hasn't been passed on to Mr. Daniels, Mr. Foresman and others to be on high alert, given the fact that al Qaeda has not been yet captured in that country and the materials are at large, none of them have yet been identified. Can you explain to me why we are not now giving warnings that reflect the National Intelligence Estimate that was used by the President both on October 7th and in the State of the Union as a justification for me? I voted for that resolution, Mr. Lago. So I was relying on the President's holding out. So why isn't it now being communicated to the public that this risk is real, since we haven't identified either al Qaeda or the terrorists which the CIA said was there? Mr. Lago. Mr. Lago. Congressman, again, we do not have specific threat information. If we were to give warnings on every piece of general information that we have, we would be warning people 24 hours a day, 7 days a week. We need specific actionable information to put out those warnings. We don't want to be in a position of spooking people, and we do that without specific actionable intelligence. Mr. Markey. I understand what you are saying, but doesn't this intelligence reflect a greatly heightened sense of concern which we should have? Now we have--the basic intelligence said he is more dangerous if we attack in terms of these materials, and he feels desperate, which obviously he does, and these materials would then be much more likely to be put into the hands of al Qaeda and other terrorist groups. Mr. Lago. Congressman, again, to warn--we are at an elevated level of warning today. To warn specific events, we have to have actionable intelligence. We do not have specific actionable intelligence. Mr. Markey. Mr. Kallstrom. Mr. Kallstrom. I can only speak from New York State, but we are at a high level of alert. New York City is still at Orange. We have done numerous things throughout the State, which I don't want to discuss here, but involving sensors, involving special precautions around special sites. So Congressman, we actually are, and just before we went into Iraq, we went up to Orange, as I am sure you remember. In the New York State, we really have not come down much from that from the standpoint of the potential of somebody actually doing that, so we have taken it very, very seriously, and we continue to. Mr. Markey. See, the problem that I have, Mr. Kallstrom, is this, is that I agree with this conclusion, and of course the reason that I voted for the resolution was that I am from Boston. They took over the two planes in Boston. It was Bostonians who were on those two planes, and now the Bush administration is opposing any attempts to screen cargo that comes onto planes coming out of Logan Airport, and if this biological or chemical or nuclear material tied to an explosive is out there at heightened risk and the administration is still opposing the screening of cargo going onto passenger planes, then that means that the entire intelligence assessment before October 10th, when we voted here in Congress, was wrong and that the information the President was communicating in the State of the Union was in fact wrong. Then the question is was it knowingly wrong, or was it just very bad information which the President was relying upon? But I know that people in my district are still relying upon these representations by the President based upon CIA and other intelligence agencies, but you can't have it both ways. You can't say that it is a greater risk and then at the same time you are saying the very planes that the President said would be at greater threat if 19 terrorists had these greater weapons aren't going to screen the cargo that is going on passenger planes. You can't have it both ways. It is either one or the other, and the very fact that you don't have the specific threat yet doesn't mean that there isn't a plan in place. You know, we still haven't found anybody in Boston helping those terrorists that killed all those people from my district. They haven't found anybody even helping them yet. So wouldn't it be wise for us, Mr. Lago, to take the precaution of screening all cargo that goes on planes that have passengers on them in the United States given the President's representation? Mr. Lago. Congressman Markey, I am not an expert in that area. I do think it is wise for us to be at the elevated state of alert. I do think it is wise for us all to take precautions. Again, if we don't have specific actionable information--. Mr. Markey. I understand that, but I am saying to you--. Mr. Cox. [Presiding.] The gentleman's time has expired, but let him answer the question. Mr. Lago. There is--. Mr. Markey. --if you wait until that point in time, you are going to have a recurrence of September 11th in Boston, okay. That is all I am saying to you. They will put the cargo on the same planes, maybe with the same number on the flight and send it off. We don't screen cargo for biological, chemical or nuclear materials that would go on in the cargo to find an explosive. Mr. Lago. Sir, again, that is out of the scope of my expertise--we don't screen domestic cargo at the CIA, sir. I can't answer that question. Mr. Markey. I understand, but I think your analysis before that the President relied upon is either accurate or inaccurate. I hope the President used accurate information. If he did, there is a natural consequence of that to passengers on domestic planes. Mr. Cox. Mr.Turner. Mr. Turner. Thank you, Mr. Chairman. Mr. Parrish, you have been with us several times. You know where the sentiment of this committee is with regard to the role that the new department should play in information, collection and analysis. I think it is fair to say, at least on the part of the chairman and I, that we have a view based on the reading of the Homeland Security Act that your role is very broad, and I certainly appreciate the fact that we are at a somewhat early stage in the evolution of these relationship. I am glad when I hear Mr. Kallstrom talking about the relationship that he has with the Department. It is based on in many cases longtime friendships with Mr. Libutti, and those kinds of things are important. But with a country as large as we have, we have got to create a system that works for everybody, including Mr. Foresman. I see him shaking his head down there. And I guess what I hope is that at some point we will be able to arrive at such a system, and I hope it is sooner rather than later, because I think it is important to our security. Just a minute ago I was listening to you talk about your relationship to teinnst the threat integration center. You said we have analysts there, and of course when I hear that--and I think my chairman shares this view--I mean, we think maybe those analysts are supposed to be at your shop and what is happening in terms of information flow at TTIC is supposed to be coming to your shop at DHS. You made a comment that you are pushing the agencies for every bit of information when the Homeland Security Act by its very words really shouldn't require you to have to push anybody for information. The statute says you are to get it whether you ask for it or not, and you said a moment ago that when you have made these requests you have never been told no. Under the Homeland Security Act, nobody has the right to ever tell you no, and so I think that we can get there. If somebody says no, no, we went down the wrong road, the Congress passed this legislation, and it gave you this authority, but that was a mistake, then I hope at some point somebody would come to us and say we need to change the law. Because we all come to this table from different perspectives, and many of you have worked on behalf of the people of America for many, many years and you do an outstanding job. We like to think that we come to this table with the same motivation, and our job is oversight, and our job is to read the statute that we pass and see if it is being complied with. I guess many of the frustrations that we probably exchange back and forth relates to that different perspective, because I know each of you are doing the very best you can to get to the desired goal, and that is making America more secure. But I hope you will work with us, because if what we put in the statute is wrong, we need to hear that from you as well. I would welcome your comment with respect to that if you feel I am off base with regard to that observation, I would welcome it now. Mr. Parrish. No, sir. I do not think you are off base. As I said the day before yesterday, it is not a push-pull system at this point. It is still a pull system, but I am telling you that it is working and it is getting much better. In my short tenure as the Acting Assistant Secretary, I have received phone calls from members of the Intelligence Community that have said I need to make sure that you got this message. Again, we are standing up. Some of the IT connectivity is not there. We have the work-around because we have representatives from the other communities. I can tell you that I worked very late last night on some things, and the system was working very well, and it continued to work this morning when I got back into work at 6 o'clock to follow up on where we ended last night. Let the record show, sir, that when I am told no and if I ever am told no, I will be back to this committee to let you know that I was told no. The law is very clear. Under Secretary Libutti has made that very clear to his counterparts within the Intelligence Community, but at this point in time I have to admit I have seen nothing but cooperation from--again, there are personalities involved in this, and I have established some strong relationships with senior leadership in the FBI, senior leadership at the CIA, at the National Security Agency and other agencies which I meet with on a weekly basis, and the system is working right now. I think the legislation that this Congress passed is on target. I think the list of the 19 functions of which we are held responsible for, we are implementing those functions, and I think that legislation as it is written right now is going to be the things that Mr. Kallstrom has alluded to in the preventive measures to stop a terrorist attack. Mr. Turner. Well, let me thank all of you for your patience with us today and for your time. I know it has been a long day. You had to wait for us to go through a series of votes, and we had lengthy questions, even though perhaps we haven't been as well attended in the subcommittee as the panel has, but you have been very generous with your answers to our questions. And, again, each of us greatly appreciates your dedication to our country, your deep sense of patriotism and your devotion to the task that we know is important to the future of the country. Thank you so much. Mr. Cox. Thank you. I want to join my ranking member in thanking each of you, Mr. Daniels, Mr. Foresman, Mr. Kallstrom, Mr. McCraw, Mr. Lago, Mr. Parrish, for your extended duty today. We have benefitted greatly, not only from the time and the resources that you have committed to this hearing but from the fact that you have been here together so that we could learn jointly from your presentation. I think you have inferred from our questions today that the kind of commitment, the full commitment to information sharing that Congress intended in the Homeland Security Act, in our view at least, requires enormous changes in the way the government at all levels does its business, and it may require, for example, that agencies be willing to give up ownership and control of information that they generate and through IT permit not only sharing that information but also its augmentation by government at all levels in a networked environment. These are things that are under construction. It is work in progress. It is a new way of looking at the world, but I think that protecting the American people from attack necessitates these things in this if not strange new world in which we live, difficult new world in which we live. So what you are doing seems to be exactly the right thing. The fact that you are doing it together is more important still. We are going to cut you loose. We know some of you have to go, and, again, thank you very much for your extended stay today. It has been enormously beneficial to this committee. This hearing is adjourned. [Whereupon, at 6:32 p.m., the subcommittee was adjourned.] APPENDIX Questions and Responses for the Record Responses to Questions for the Record by Willam Parrish, Acting Assistant Secretary for Information Analysis, Department of Homeland Security from the Subcommittee on Intelligence and Counterterrorism hearing titled ``Improvements to Department of Homeland Security Information Sharing Capabilities'' held on July 24, 2003 Status of Information Analysis Office Section 201 of the Homeland Security Act requires the Information Analysis and Infrastructure Protection (IAIP) Directorate to disseminate information analyzed by the Department within the Department, to other Federal government agencies, state and local governments, and the private sector, in order to assist in the prevention of, or response to, terrorist attacks against the United States. Question: 1. How many products, and what types of products, has IAIP disseminated to other parts of the Department as of today? To other federal government agencies? To state and local governments? To the private sector? Do you consider this number to be adequate? If not, when will you be able to disseminate the desired number of products? Response: Information Analysis and Infrastructure Protection has disseminated 46 products to other federal government agencies, 48 to state and local governments, and 41 to the private sector. Procedure dictates that a draft of a bulletin or advisory is vetted through twelve internal DHS divisions, as well as through outside sources, for approval. Once the product has been vetted, it is then disseminated to DHS. At no point has the necessary information or a needed product not been distributed. The figures above, therefore, accurately represent the number desired. Question: 2. How frequently does IAIP disseminate intelligence products? Can you give some examples of the products? Will you provide them to the Subcommittee? Response: The Homeland Security Information Summary (HSIS) is briefed and distributed electronically daily to DHS leadership and component intelligence chiefs, as well as to selected members of the intelligence community. Additionally, IAIP compiles the information received from DHS operational elements into the Homeland Security Intelligence Report (HSIR) or into a restricted version (the HSIR-R). IAIP also produces a Spot Report in advance of the daily report when it is necessary to begin processing critical material immediately. Lastly, IAIP produces the Secretary's Morning Brief, a daily compilation of in-depth analytical perspectives on significant recent, and developing, issues affecting homeland security and DHS. Although some products have been provided to Congress in the past, DHS, Office of Legislative Affairs is developing a more formal and automatic process to pass appropriate level products to a variety of committees in Congress. These products will be provided to the Committee as appropriate to their level of classification. Terrorist Threat Integration Center (TTIC) During the joint hearing held on Tuesday on the Terrorist Threat Integration Center, you testified that you hope to have about 150 analysts in your office by next year. Mr. Brennan, the Director of TTIC, testified that TTIC will have about 300 analysts when fully staffed. Question: 3. Will 150 analysts be adequate to carry out all the missions of the Information Analysis office? How did you determine what the correct number should be? How does that mission compare to the Terrorist Threat Integration Center, which will have 300 analysts when fully staffed? If TTIC will have 300, how can IA only have 150 in light of its broad mission? Response: Yes. One hundred and fifty analysts is an adequate number to carry out the missions of Information Analysis. The number was determined by Information Analysis Division Chiefs based on years of experience in the Intelligence Community. The missions of TTIC and Information Analysis differ in that IA deals only in intelligence that involves threats to the Homeland. TTIC deals in all threat-related information and therefore has more information flowing in on a daily basis. Information Analysis also has the added benefit of analysts in other DHS component entities that pass threat-related information to IA. At the hearing on TTIC on July 22, Mr. Brennan testified that an agency, such as the CIA, that has threat information provides it to both TTIC and the Information Analysis office of DHS simultaneously. Question: 4. Can you explain what happens at that point? What does your office do with the information that is distinct from what TTIC does? Response: Information that comes into Information Analysis is independently analyzed and assembled with all domestic threat-related information flowing into the Department. This information is matched with known capabilities and vulnerabilities to produce an overall threat picture that allows IA to issue warning products to other federal government agencies, state and local governments and the private sector. TTIC receives all domestic and international threat- related information and sends reports to IA regarding domestically relevant intelligence, particularly to support its critical infrastructure protection responsibilities. TTIC does not communicate with anyone outside of the Intelligence Community. Question: 5. After TTIC and the Information Analysis office both process the information, what happens then? What is the ``output'' of the Information Analysis office? Who receives this output? How is it different from what the TTIC would do with the same information? Response: The ``output'' of the Information Analysis office is the afore-mentioned warning and intelligence products, based on information from DHS entities and members of the Intelligence Community. IA differs from TTIC in that all IA products deal solely in threats to the Homeland while TTIC deals in the overall threat picture. IA delivers its ``output'' to other federal government agencies, state and local governments and the private sector. TTIC does not communicate with the public. Responsibilities of the Information Analysis Office The Information Analysis office, in particular its Information & Warnings Division, is responsible for administering the Homeland Security Advisory System. Many state and local officials have complained that there is little guidance accompanying changes in the threat level. Question: 6. Can you describe, specifically, what guidance the Information Analysis office provided to state and local officials during the recent changes in the threat level form yellow to orange and back to yellow? Did the office recommend that state and local officials take any specific actions other than be at a higher state of alert? Response: When the threat level was changed from yellow to orange on May 20, 2003, specific protective measures were included in the Advisory that was widely disseminated. Upon deciding to lower the alert level back to yellow on May 30, 2003, DHS/IAIP distributed a product that included an overview of the existing situation and suggested that those receiving the product maintain surveillance of critical locations, assess emergency plans, and provide a visible presence as a viable form of deterrence. The report detailed such actions as the use of random or rolling patrol operations and encouraged individuals to report information concerning suspicious or criminal activity to law enforcement. Specific suggestions regarding what type of threat exists, recommended increased security measures, and as many details regarding suspicious activity as can be reported continue to be included in products issued by IA. Question: 7. Who do you believe your ``customers'' are? Do you intend to develop intelligence products tailored to each type of ``customer'' of the Information Analysis office? Response: Information Analysis is dedicated to sharing information with the Intelligence Community, TTIC, DHS entities, and to serving other federal government agencies, state and local governments and the private sector as is relevant. Information Analysis, through these bodies and through its cooperation with other DHS entities, consequently serves the public at large. Question: 8. Have you met with the officials and agencies that are your ``customers'' to determine what information they need from your office and in what form? Response: Information Analysis receives feedback on its communication with its ``customers'' through a variety of channels. The State and Local and Private Sector Directorates within the Department of Homeland Security convey the feedback they receive from their components and IA is in regular communication with the federal government agencies and Intelligence Community members it works with. In your testimony, you discussed that DHS has operational personnel, such as Border Patrol and Customs inspectors, who are in positions to collect information that could be useful to the rest of the Department and the government as a whole. Question: 9. What systems are in place for regular reporting from those on the front lines to IAIP? Do the personnel on the front lines know what they should report? Can you give some examples of information that has been collected by Border Patrol or Customs that has been reported to IAIP and shared with other agencies? Response: The operational personnel within DHS entities such as Border and Transportation Security operate through their own intelligence components. IA receives threat information from these components. Personnel on the front lines diligently observe and report intelligence and threat-related information such as suspicious activity at the nation's borders and suspect names discovered through daily activity. You testified that there is work being done on a national watchlist center, and that there has not been a final decision on whether it would be at the Department or the FBI. Question: 10. What is the time line for this process? When will the national watchlist be in place? What agencies are working on the problem? The Terrorist Screening Center, now in existence, is a central point at which the Terrorist Screening Database (TSDB) will be consolidated and administered. TSC operations were phased in and became operational 1 December 2003. The TSC, a multi-agency effort, involves the expertise of the FBI, DHS, and State Department. Responses to Questions from Steven C. McCraw, Assistant Director, Federal Bureau of Investigation 1. The FBI has been criticized in the past for its unwillingness to share information. The March, 2003 Memorandum of Understanding between the Attorney General, the Director of Central Intelligence and the Secretary of Homeland Security provides that the FBI is to provide Electronic Communications (ECs) and interview summaries known as ``302s''? Question: Is the FBI currently providing ECs and 302s to the Department of Homeland Security? If not, why not? Response: The Federal Bureau of Investigation (FBI) is sharing a very large amount of information and intelligence with the Department of Homeland Security (DHS), primarily through electronic cable message traffic. The FBI also provides information and intelligence through Electronic Communications (BCs) and FD-302s when these documents can independently fulfill a Request for Information (RFI) without revealing protected sources or methods. In either instance, the intelligence contained in FBI documents/ communications is made available to DHS, as provided for in the Memorandum of Understanding (MOU). To further assist in the flow of information, two FBI Supervisory Special Agents have been posted to DHS since April 2003. Due to the internal structure of DHS, a determination was made to create two parallel RFI channels to ensure the proper sharing of information. The first channel was the RFI process for ``emergent threat'' information. Because of the time sensitivity of this type of RFI, the system calls for direct connectivity between the DHS Homeland Security Operations Center (HSOC) and the FBI Counterterrorism Watch. The majority of these RFIs are either by telephone or by facsimile. The HSOC now assigns a tracking number to all RFIs. The Director of the HSOC has initiated a program whereby a DHS Senior Watch Officer (SWO) is detailed to the Counterterrorism Watch on a 90- day rotating basis. The SWO educates the Counterterrorism Watch on the mission and needs of the HSOC and, by learning how the Counterterrorism Watch defines and manages emergent threat matters, is additionally able to serve as the ``eyes and ears'' of the HSOC. The second channel of information sharing is the method by which all requests for nonemergent (i.e., routine) information, such as investigative updates and analytical products, are processed. Procedurally, these requests are collected and sent via cable from the DHS Information Management and Requirements Division (IMRD) to FBI Headquarters (FBIHQ), where they are received by the Executive Staff of the Counterterrorism Division. Responses are sent by FBIHQ via cable back to IMRD for dissemination to the request's originator. In addition to these RFI processes, information sharing initiatives have included numerous briefings and meetings both at DHS and the FBI, including weekly Intelligence briefings at the FBI's Strategic Information and Operations Center where DHS selects the topic to be covered and the FBI's Counterterrorism Division provides the briefer. The FBI provides to DHS virtually all of its terrorism analytical products that are disseminated externally. 2. The same Memorandum of Understanding indicates that the TTIC and the FBI's Joint Terrorism Task Forces (JTTFs) will have a role in the information sharing. Question: Can you explain what the current roles of TTIC and JTTFs are? Does the FBI share information directly with the Department of Homeland Security, or only through the TTIC and JTTFs? Response: The mission of the Terrorist Threat Integration Center (TTIC) is to enable full integration of terrorist threat information and analysis. It is a multi-agency joint venture that integrates and analyzes terrorist threat-related information collected domestically and abroad, and disseminates information and analysis to appropriate recipients. TTIC sponsors a website that increasingly includes products tailored to the needs of state and local officials and private industry, so that DHS and the FBI (who are the designated conduits of information to these entities) can readily pass this information along. The 84 Joint Terrorism Task Forces (JTTFs) are the United States Government's primary counterterrorism operational entities throughout the United States. The JTTFs team FBI Agents with state and local law enforcement officials, as well as representatives of DHS and other federal agencies, to coordinate counterterrorism investigations and share information. The JTTFs investigate and follow up operationally on leads provided by the Foreign Terrorist Tracking Task Force, the FBI, and other intelligence agencies. The JTTFs also serve as conduits of state and local law enforcement information to the FBI. In accordance with the Homeland Security Act of November 2002 and other statutory requirements and interagency agreements, the FBI furnishes information directly to the Department of Homeland Security, as discussed in response to Question 1. 3. Your office in the FBI is a new one, and was created as a response to the criticism of the FBI's weaknesses in analysis. Question: Can you explain the role of your office in relation to the Information Analysis and Infrastructure Protection Directorate of DHS, and the TTIC? For instance, if a FBI field office has terrorism information, is it reported to your office and then in turn to DHS and TTIC? Response: The Office of Intelligence (OI) is the program manager for the FBI-wide Intelligence Program. As such, the OI manages intelligence requirements, collection tasking, information sharing policy, standards, the analytic cadre, and oversight of the FBI's distributed intelligence production mission. The core principle of the FBI Intelligence program is the integration of intelligence with FBI counterterrorism, counterintelligence, cyber, and criminal operations. The actual intelligence production mission takes place within those FBI investigative programs and in all operational divisions both at Headquarters and in the Field. The OI ensures that intelligence production is accomplished against a common set of priorities and according to a common set of protocols and policies regarding analysis and dissemination. Additionally, the OI develops training and certification standards for intelligence professionals, both analysts and agents. The FBI produces two types of intelligence: 1) raw intelligence in response to intelligence requirements from the National Security and Homeland Security Councils; and 2) assessments to support FBI operations and those of our partners in the larger National Security Community, to include our state, local, and tribal law enforcement partners. Both raw intelligence and assessment reports are passed from 01 elements embedded in HQ divisions and the field to our customers according to a common set of standards and policies. TIIC is an intelligence analysis organization with two core functions. First, it directs the work of raw intelligence producers like the FBI by identifying gaps in our knowledge and issuing requirements for intelligence collection and production with respect to key threat areas. Second, it produces all-source threat analyses for the larger National Security Community. The OI ensures that TIIC intelligence requirements are tasked to FBI collectors and that assessments requested by TIIC are produced in a timely fashion. In addition, the OI manages the FBI analytic cadre embedded in TTIC. FBI analysts bring the authorities and intelligence information produced by the FBI directly to TTIC by virtue of their access to FBI systems and databases from TTIC space. In this way, the FBI is able to apply all its information to TTIC's mission of providing consolidated terrorist threat information to the National Security Community. The Information Analysis and Infrastructure Protection (IAIP) component of DHS is an information and analysis organization with two core functions. First, it overlays threat information from all producers in the United States and proposes countermeasures. Second, through its participation in the larger national intelligence requirements process, it directs raw intelligence producers to provide information based on its analysis of vulnerabilities in the U.S. infrastructure. In addition, like the FBI's OI, DHS IAIP provides a full range of intelligence support to DHS leadership and manages the collection, processing, analysis, and dissemination of DHS information from its operational components (Coast Guard, Secret Service, Transportation Security Administration, Immigration and Customs Enforcemnt, and Customs and Border Protection). DHS has assigned to the FBI a senior representative, who is attached to the FBI's OI. That assignment ensures that all information required by DHS is passed to it expeditiously by the FBI. 4. The FBI has long established relationships with state and local law enforcement. The hearing held on July 22 indicated that state and local officials are receiving information from both the Department of Homeland Security and through the JTTFs. Question: What determines whether a piece of .information from the federal government is shared through DHS or the JTTFs? Are there any protocols or guidance? Response: The JTTFs are the operational and investigative arms of the United States Government in the war on terrorism. Because of this responsibility, the FBI is tasked with dissemination of information on terrorism (including operational and investigative information, as wellas general threat information) to the JTTFs, which utilize the information to conduct investigations and/or cover leads. This information is provided through the JTTF structure to state and local JTTF members who possess the appropriate security clearances. In addition, FBIHQ distributes weekly intelligence bulletins to all law enforcement officials through the National Law Enforcement Telecommunications System, the Law Enforcement Online program, the Regional Information Sharing System, and the National Electronic Alert System. The Special Agent in Charge of each FBI field office is tasked with further disseminating general terrorism threat information to members of the state and local law enforcement community through established methods. These methods may include regularly scheduled briefings, working groups, newsletters, e-mails, and similar vehicles. Terrorism threat information is shared on a daily basis between the FBI and DHS. DHS passes threat information on to their state Homeland Security Directors, who are charged with notifying first responders in each state. Because many of these first responders are members of the law enforcement community, they often receive information from both the FBI and DHS. There is close coordination between the FBI and DHS in the dissemination of terrorism intelligence information. All weekly FBI Intelligence Bulletins are reviewed by DHS prior to release by the FBI. The FBI and DHS have also agreed to protocols requiring coordination of changes made to the Homeland Security threat level. The sharing of information on terrorism intelligence was formalized in the March 2003 MOU referenced above. 5. You testified at the hearing that the FBI still has responsibility for ``domestic terrorism.'' Question: Can you define the term ``domestic terrorism''? For matters that fall in that definition of "domestic terrorism," is the FBI the only agency with responsibilities? Does DHS have any role? Response: As codified at 18 U.S.c. section 2331(5), the term ``domestic terrorism'' means activities that: (A) involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State; (B) appear to be intended (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government by intimidationor coercion; or (iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and (C) occur primarily within the territorial jurisdiction of the United States. While the overall role of the FBI in coordinating the Federal Government's response to a terrorist incident has changed pursuant to Homeland Security Presidential Directive 5 (2/28/03), the FBI still maintains responsibilities regarding domestic terrorism. DHS has assumed responsibility to coordinate the Federal Government's overall response to domestic terrorism incidents, including a major terrorist attack on U.S. soil. The FBI's role in domestic terrorism concentrates on criminal investigative and counterterrorism intelligence missions, tactical resolution of terrorist-related incidents, and the coordination of the law enforcement community's response to a terrorist incident. The creation of DHS in no way alters the FBI's chain of command. The Attorney General continues to have the lead responsibility for criminal investigation of terrorist acts and terrorist threats. The FBI continues to be the lead law enforcement agency to detect, prevent, preempt, and disrupt terrorist acts against the United States. While active coordination with DHS will be maintained, the FBI's investigative role in domestic terrorism will be preserved. FOLLOW-UP QUESTIONS FOR JAMES K. KALLSTROM FROM CHAIRMAN GIBBONS Question: 1. Who provides you with information about terrorist threats? Is it the Department of Homeland Security, the FBI, or another agency? If you receive information from both, can you determine what types of information are being channeled through DHS or the FBI? Is it a problem to receive terrorism information from the federal government through more than one channel? Answer: 1. The NYS Office of Public Security (OPS) receives terrorism threat-related information from a variety of federal sources. DHS and FBI supply frequent informational bulletins regarding current and historical terrorist trends, potential targets for terrorism (in general terms), potential indicators for terrorism, suggested protective measures for critical infrastructure, etc. DHS and FBI normally coordinate the dissemination of such information; both agencies contribute to the content and therefore a specific bulletin/ advisory is only disseminated through one channel. In addition, DHS distributes related press releases, scripts of counter-terrorism related testimonies, and daily incident reports indicating possible terrorist activity nationwide. As discussed in my testimony, shortly after September 11th 2001, OPS created 16 Counter-Terrorism Zones for the purpose of facilitating the dissemination of terror-related information and best practices, while promoting cooperation and collaboration among local, county and state law enforcement agencies on a regional basis. OPS also created the Counter-Terrorism Network, a secure, stand-alone system to distribute counter-terrorism and threat-based information and intelligence. Through these developed methodologies of information sharing, OPS disseminates the above-mentioned advisories from DHS and other federal agencies, as well as information generated by our office and other state and local agencies. Therefore, statewide law enforcement is uniformly kept abreast of current terrorist trends and indicators, enabling them to play a more effective role in the prevention of acts of terror in our state and country. Our office also maintains contacts at other federal agencies, such as the CIA and the DOD, as well as other state homeland security offices and law enforcement agencies, and therefore may receive threat information in a less formal manner (i.e. phone call, fax, etc.) All information classified above "Law Enforcement Sensitive" is generally relayed in person or over a secure phone line. Our office attends meetings and conferences with international intelligence and law enforcement agencies in effort to share information across national borders. We maintain contact with Canadian, British, German and other foreign counterparts. Question: 2. Can you compare the status of information sharing prior to the passage of the Homeland Security Act to the present situation? What, if anything, has changed? Answer: 2. Information sharing between federal, state and local governments has improved significantly since the passage of the Homeland Security Act. The Department of Homeland Security hosts bi- weekly regional conference calls with state homeland security representatives, touching base on local, national and international terrorism issues. DHS formalized a method of sharing terrorism information on a continual and frequent basis by distributing information bulletins and advisories (see AI) to our office so we may further disseminate information to appropriate law enforcement agencies and private sector constituents within New York State. In addition, state and local representatives are invited to attend FBI- Joint Terrorism Task Force (JTTF) meetings held weekly to share and discuss current general and specific threat posture items of concern. The creation of DHS has sparked the creation of federal information sharing centers like the Terrorism Threat Integration Center (TTIC) and the Terrorism Screening Center (TSC). TTIC, designed to serve as a depot and analytical center for all collected foreign and domestic intelligence, will facilitate the flow of raw and analyzed intelligence between federal, state and local law enforcement and intelligence communities. The TSC is designed to allow a state or local law enforcement officer to access federal watch list information in ``real time'' when he/she comes in contact with a suspicious individual during routine traffic stops, etc. This process can potentially help police officers intercept a terrorist and prevent the next attack. However, these federal systems of improved information sharing will be effective only if the process does indeed work in ``real time'' and is unhampered by bureaucracy and interagency cultural differences. In reality, information sharing is often hindered between agencies due to nonequivalence of security clearance levels. Additionally, some federal agencies classify information, which is received at an unclassified level from foreign sources, thus rendering it difficult for us to further ascertain credibility or corroboration with the help of our federal intelligence agencies. New York State and the nine other states comprising the Northeast Homeland Security Agreement have advanced a feasible system of ``one- stop shopping'' to enable the realtime dissemination of relevant counter-terrorism information to law enforcement. As outlined in my testimony, the Northeast Homeland Security Agreement has proposed the implementation of this information-sharing pilot program to the Department of Homeland Security. The currently operational Upstate New York Regional Intelligence Center (UNYRIC) will serve as the central hub of intelligence gathering, analysis and dissemination between law enforcement agencies in these northeastern states. This facilitated flow of counterterrorism information will enable state and locals to assist the efforts of the JTTF's. The proposal has been detailed and pending with the DHS since November 2003. It is our view that the conception and approval of this Northeast Regional information-sharing center, rather than federal intelligence centers, will better serve law enforcement personnel in New York State and the surrounding region. Finally, sensitive threat information and information regarding threat level changes is often prematurely released to the media. This makes it difficult for our office to share such information in a controlled and secure environment, leading law enforcement to discredit the intelligence community's ability to handle and effectively disseminate sensitive information from the federal to local level. Question 3. Can you describe what happened when the threat level was raised or lowered in recent months? How did you find out about the change in the threat level? What guidance did you receive from the Department of Homeland Security at the time the threat levels changed? Answer: 3. The national and New York State alert levels were recently elevated to Orange on December 21,2003. That day, the Department of Homeland Security held several conference calls with our office and other state homeland security representatives. Secretary Ridge and other intelligence community (IC) representatives shared information regarding current threat posture, including intelligence indicators requiring the US to raise its terrorism alert level. Implementing Operation Liberty Shield at the federal level was discussed on the call, thus providing guidance to states for implementing their own deployment plans. The conference call and subsequent DHS advisory provided detailed information on the types of critical infrastructure terrorist groups may attempt to target and supplied guidance on the steps state and local law enforcement should take in protecting such targets. When the alert level was lowered to yellow on January 9,2004, DHS conducted another conference call with state homeland security representatives to explain the lowering of the alert level and suggested reducing resources and security personnel deployed at strategic locals during Orange Alert. Question: 4. Do you have a sense that the information you receive from the Federal Government is coordinated? Do you ever receive conflicting information from different Federal agencies? If so, what examples can you provide to the committee? Answer: 4. Since its inception, OPS has received information from a wide variety of federal agencies. This information usually appears to have been discussed among the various IC agencies prior to its dissemination to state and local authorities and there is clearly some consensus as to the threat/analysis/credibility of the information. However, on occasion, our office has been in receipt of information from one federal agency that has clearly not been coordinated with other appropriate federal agencies prior to dissemination. There has been occasions where federal agencies are completely unaware of this information or if it was aware, it had assessed the credibility of the source or analyzed the intelligence in a drastically different manner. On occasion, we have had federal agencies contact our office for information when it would have been more appropriate to reach out directly to another IC agency. Question: 5. If you run across information during your duties that could indicate potential terrorist activity, where would you report that information at the federal level? Is it the FBI? Do you know if the FBI shares that information with the DHS or with any other federal agencies? Answer: 5. OPS does not have an investigative arm thus the office reports all terrorist threat related info to relevant counter-terrorism agencies. For example, if intelligence reporting indicates an imminent threat, OPS would immediately contact 911 and then the relevant federal, state and local agencies. If the threat does not appear imminent, information is distributed based on jurisdiction. OPS reports information related to New York City to the New York City Terrorism Tip Line-(888) NYC-SAFE that is handled out of the Upstate New York Regional Intelligence Center (UNYRIC). UNYRIC, based in Latham, New York, serves as a regional center to facilitate the collection, analysis. and dissemination of criminal and terrorist intelligence. If the information is specific to another part of New York State, OPS reports information to the New York State Terrorism Tip Line--(866) SAFE-NYS. Both the New York City and the New York State Police evaluate the information and based on initial investigations, either choose to conduct further in-house investigations or pass the intelligence to the FBI Joint Terrorism Task Force (JTTF). On occasion, our office has passed information directly to the JTTF's when it appears very specific in nature to indicate federal jurisdiction. When OPS has been in receipt of threat information pertaining to other states, we have reported said information to the state's respective homeland security office and/or appropriate law enforcement agencies at the federal, state or local level. Question: 6. Has the Information Analysis office ever contacted you to coordinate training for your employees regarding information sharing? If no, does another federal agency provide such training? Answer: 6. Neither the DHS' Information Analysis Office nor any other DHS division has contacted OPS with regard to training our employees or providing training to other relevant officials within New York State. OPS has and will continue to orchestrate and offer counter-terrorism training for state and local law enforcement officers and first responders throughout New York State. Our office has taken the approach that continuing education is essential in this field and has implemented many programs in this regard. OPS welcomes educational and training initiatives provided by DHS and other relevant agencies for both our own staff and other relevant personnel involved in the war on terror. Our office encourages DHS to utilize the resources available in the departments under its command and within the agencies of the Intelligence Community to coordinate training in a variety of areas. New York can benefit from additional training in; analytical skills, the creation of threat matrixes, data mining, first response, chem/bio- terrorism, radiological terrorism, infrastructure protection, general aviation threats/security, fraudulent documents, etc.