[House Hearing, 109 Congress] [From the U.S. Government Publishing Office] THE PROGRESS OF THE DHS CHIEF INTELLIGENCE OFFICER ======================================================================= HEARING before the SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION __________ MAY 24, 2006 __________ Serial No. 109-80 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC] [TIFF OMITTED] TONGRESS.#13 Available via the World Wide Web: http://www.gpoaccess.gov/congress/ index.html __________ U.S. GOVERNMENT PRINTING OFFICE 37-217 WASHINGTON : 2007 _____________________________________________________________________________ For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800 Fax: (202) 512�092104 Mail: Stop IDCC, Washington, DC 20402�0900012007 COMMITTEE ON HOMELAND SECURITY Peter T. King, New York, Chairman Don Young, Alaska Bennie G. Thompson, Mississippi Lamar S. Smith, Texas Loretta Sanchez, California Curt Weldon, Pennsylvania Edward J. Markey, Massachusetts Christopher Shays, Connecticut Norman D. Dicks, Washington John Linder, Georgia Jane Harman, California Mark E. Souder, Indiana Peter A. DeFazio, Oregon Tom Davis, Virginia Nita M. Lowey, New York Daniel E. Lungren, California Eleanor Holmes Norton, District of Jim Gibbons, Nevada Columbia Rob Simmons, Connecticut Zoe Lofgren, California Mike Rogers, Alabama Sheila Jackson-Lee, Texas Stevan Pearce, New Mexico Bill Pascrell, Jr., New Jersey Katherine Harris, Florida Donna M. Christensen, U.S. Virgin Bobby Jindal, Louisiana Islands Dave G. Reichert, Washington Bob Etheridge, North Carolina Michael McCaul, Texas James R. Langevin, Rhode Island Charlie Dent, Pennsylvania Kendrick B. Meek, Florida Ginny Brown-Waite, Florida ______ SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT Rob Simmons, Connecticut, Chairman Curt Weldon, Pennsylvania Zoe Lofgren, California Mark E. Souder, Indiana Loretta Sanchez, California Daniel E. Lungren, California Jane Harman, California Jim Gibbons, Nevada Nita M. Lowey, New York Stevan Pearce, New Mexico Sheila Jackson-Lee, Texas Bobby Jindal, Louisiana James R. Langevin, Rhode Island Charlie Dent, Pennsylvania Kendrick B. Meek, Florida Ginny Brown-Waite, Florida Bennie G. Thompson, Mississippi Peter T. King, New York (Ex (Ex Officio) Officio) (II) C O N T E N T S ---------- Page Statements The Honorable Rob Simmons, a Representative in Congress From the State of Connecticut, and Chairman, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment..................................................... 1 The Honorable Zoe Lofgren, a Representative in Congress From the State of California, and Ranking Member, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment: Prepared Statement............................................. 2 Oral Statement................................................. 2 The Honorable Jim Gibbons, a Representative in Congress From the State of Nevada................................................ 14 The Honorable James R. Langevin, a Representative in Congress From the State of Rhode Island................................. 16 Witness Mr. Charles E. Allen, Chief Intelligence Officer, Officer of Intelligence and Analysis, Department of Homeland Security: Oral Statement................................................. 3 Prepared Statement............................................. 6 THE PROGRESS OF THE DHS CHIEF INTELLIGENCE OFFICER ---------- Wednesday, May 24, 2006 House of Representatives, Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment, Washington, DC. The subcommittee met, pursuant to call, at 4:39 p.m., in Room 311, Cannon House Office Building, Hon. Rob Simmons [chairman of the subcommittee] presiding. Present: Representatives Simmons, Gibbons, Lofgren, and Langevin. Mr. Simmons. [Presiding.] The Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment will come to order. Today, the subcommittee meets to hear testimony on how Mr. Charlie Allen, the DHS chief intelligence officer, has progressed in his efforts to better integrate the DHS intelligence enterprise and strengthen its ability to share intelligence and analysis with state, local, tribal and private sector partners. In October 19, 2005, we held a hearing with Assistant Secretary Allen in the wake of a very public dispute over the New York and Baltimore tele-threat streams. Since that time, I have been assured by Assistant Secretary Allen and officials from New York and Baltimore that the issues related to that dispute have been largely resolved. Coordination has improved, and DHS has begun deploying analysts to state and local fusion centers. And I can say yesterday that 2 days ago, I went to the Maryland fusion center, and we saw firsthand that those improvements have been made. While DHS assistance to states, localities and tribes can and will be improved, the Office of Intelligence and Analysis is taking important steps to integrate with and support state, local and tribal sector information sharing initiatives. In October, we also discussed the secretary's plans for integrating the department's intelligence offices, and he indicated that better integration of operational intelligence components would be a top priority. Mr. Allen, I would be interested in hearing from you today on how this effort has progressed and what the continued challenges are. Seven months ago, you had a lot on your plate. Today's hearing is designed to be an update and progress report on how things are going. I would ask that the remainder of my opening statement be inserted into the record as if read. Mr. Simmons. And I would like to make a brief comment based on a reading of Chapter 13 in the 9/11 Commission report, Page 399: ``As presently configured, the national security institutions of the United States government are still the institutions constructed to win the Cold War. The United States confronts a very different world today. Instead of facing a few very dangerous adversaries, the United States confronts a number of less visible challenges that surpass the boundaries of traditional nation states and call for quick, imaginative and agile responses.'' Mr. Allen, you were instrumental in the fight to win the Cold War. Now, you have been placed in a position of responsibility at the beginning of another kind of war that takes new organizations, one of which you now serve in, new ideas, new responses, new approaches. We wish you all the best in this, but we also wish to be kept up to date on how this process is developing and what progress there is to report. It is an important and it is an exciting challenge, because the safety and security of the American people in this democracy are at stake. So I look forward to hearing your testimony. And at this point, I will yield to the distinguished ranking member of the committee, Ms. Lofgren. Ms. Lofgren. Thank you, Mr. Chairman. And my apologies for being late. I was at another markup. I look forward to continuing to work with you, Mr. Allen. I appreciate your courtesy in keeping us apprised of your progress. And as we all know, the job you have is enormously important for the security of our country, and I thank you for your willingness to take it on. I would just also note that we were able to have a briefing in a classified setting, and I also appreciated. And one concern that I have talked about publicly is the issue of the NSA Warrantless Wiretap Program that the president has discussed. And certainly, the Department of Homeland Security is not a collector of information but a recipient of information and then also a distributor of information. Rather than repeating all of the questions, I would simply say, are there any of the questions they asked you in a classified setting that you are able to answer here in this public setting? And if so, I would welcome those answers. If not, I would respect what you are not able to answer. And with that, I would yield back the balance of my time. And thank you, Mr. Chairman. Prepared Opening Statement of the Honorable Zoe Lofgren I am also very happy that we are meeting with you again, Mr. Allen, to get an update on your progress as the Chief Intelligence Officer. I am certain that the longer you serve in your position, the clearer that both your challenges and resulting mission focus are becoming. This is precisely the type of oversight hearing that this Subcommittee should be having on a regular basis on the Office of Intelligence and Analysis (I&A) to ensure that we are up-to-date on your needs, priorities, and progress, and I look forward to regular briefings and hearings with you in the future. I might add, Mr. Allen, that your May 10th letter to me addressing your progress was very helpful, and I would encourage you to continue such communication with us. While I am pleased to learn that I&A is making progress on many fronts, I do have several concerns--including one that has been a major subject of discussion in recent months. As you know, Mr. Allen, I have been very troubled by reports about the NSA's domestic surveillance program and its implications for privacy and civil liberties. I am particularly concerned about the NSA domestic surveillance program's implications for the Department and your office. Regardless of whether or not I&A has received intelligence information from the NSA's domestic surveillance program, I believe that your office--if it cannot already--should be able to track the origin of intelligence information it receives, segregate out information that it learns has been obtained illegally, and report such instances to the relevant Congressional committees. The Department of Homeland Security must have the public trust. If your office receives ``fruit of the poisoned tree''--intelligence information that has been obtained illegally--that trust understandably will be shaken. Over time, if we don't level with the American people, we are bound to lose their support in the war on terror. I don't think you or anyone else wants to happen, Mr. Allen, and I hope you will share your thoughts on how we can ensure that DHS does not become complicit in activity that trades the liberties and civil rights that make our nation great for a promise of security that-- without those liberties and rights--leaves everyone insecure. I also hope we will be able to revisit with you your progress on developing your IT network architecture. Your staff was kind enough to generate for us a general outline of how you want that architecture to look and a sense of what things might cost. I hope you'll be able to address your current priorities, where this funding should be coming from, and the consequences of your not getting the resources you need to build a seamless system connecting you, the Department's intelligence components, and your intelligence consumers. Finally, Mr. Allen, I remain very interested in the Department's efforts to secure the nation's critical infrastructure. I appreciated Dr. Connell's (CON-L) testimony on HITRAC (HI-TRACK) when we last met in February, and I hope we'll have a chance to discuss your progress there as well. Welcome, again, Mr. Allen. I look forward to our discussions today. Mr. Simmons. The gentlelady, having yielded back, and the chairman of the committee and the ranking member of the full committee not being present to make any statements, I will now recognize Mr. Allen. Please proceed. STATEMENT OF CHARLES E. ALLEN, CHIEF INTELLIGENCE OFFICER, OFFICE OF INTELLIGENCE AND ANALYSIS, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Allen. Thank you, Chairman Simmons, Ranking Member Lofgren, for giving me the opportunity to report on my progress during my first 7 months as the chief intelligence officer of the Department of Homeland Security. I have a brief statement that summarizes my longer statement, and I ask that to be submitted for the record. The mandate of the chief intelligence officer is to lead, to integrate and manage the department's intelligence program. Thanks to the hard work of our employees in the Office of Intelligence Analysis and the department's intelligence components, I believe we have made solid progress towards transforming DHS intelligence, that we are finally beginning to leverage unique capabilities and officers of the DHS intelligence enterprise. The future is promising for DHS intelligence, and with the continued support of Secretary Chertoff and the Congress, we will continue to make significant progress in the next 7 months. Last October, I discussed with you five equally important priorities for Homeland Security intelligence. Today, I will briefly review those and then conclude, speak to some of the challenges that I will have in the next 7 months. First, by all accounts, under the leadership of Dr. Mary Connell, the deputy assistant secretary for intelligence who sits behind me, we have improved the quality of intelligence analysis across the department. Key customers, including the secretary and the deputy secretary, have praised her products, and we have produced analytic products for the ``National Terrorism Bulletin'' and the ``President's Daily Brief.'' We have increased our overall production, applied analytic best practices to distinguish what is known from what is surmised, and to ensure the fair consideration of competing hypotheses. We are aggressively expanding training opportunities for our employees and developing department-wide standards for production and dissemination of homeland intelligence. Substantively, we have broadened our mission to ensure that we are addressing the full scope of homeland security. This includes, not only assessing immediate threats, but also focusing on such issues such as potential threats to U.S. critical infrastructures, security of our borders, use of nonconventional weaponry by terrorists, and the phenomenon of radicalization of American society. Second, to promote the integration of DHS intelligence, I have established a Homeland Security Intelligence Council. This council comprising the leadership of all DHS intelligence components is a decision making body which addresses cross- cutting issues such as recruitment, training, analytic standards, budgetary and programmatic issues. We engage on issues that need a management decision and look to develop enterprise-wise solution in tackling difficult intelligence problems. As part of this integration, I have approved the first ever DHS intelligence enterprise strategic plan. This plan sets in place our strategic vision with clear-cut objectives to address requirements, collection dissemination and information sharing, analysis and warning and to create the overall DHS intelligence culture that is supported by solid business practices. We have conducted the first-ever review of component intelligence programs, a process which not only evaluated component intelligence efforts, but also permitted me to engage in direct dialogue with the heads of the operating components of DHS on ways to strengthen their intelligence programs. In addition, I have initiated a comprehensive intelligence campaign plan in a department-wide strategy for intelligence surveillance and reconnaissance to integrate component and national resources to focus on border security, as well as to support disaster relief. DHS and the intelligence community must come together to support this critical initiative. Finally, we have developed a key enabler, an enterprise information architecture that will accelerate DHS' intelligence integration, ensuring we have the information management systems that provide connectivity to the intelligence elements of the operating components, as well as permitting robust sharing of information with state and local governments and the private sector. To strengthen my office's support to state, local and tribal authorities in the private sector, my principal deputy assistant secretary, Mr. Jack Tomarchio, who is not here today but elsewhere, has traveled extensively to listen to and learn from these important partners and to improve our understanding of their need for intelligence and information sharing. My office also recently prepared a plan, now under review by Secretary Chertoff, to support and engage with state and local fusion centers around the country. We have deployed DHS intelligence officers to New York City, Los Angeles, Maryland and Louisiana. We are running a pilot program with the additional states to widen interaction with their intelligence centers via a homeland security information network, a pilot project, as I stated, which will be far more robust for sharing information in the future. Additionally, we are disseminating a wide range of Homeland Security related products to state and local governments, as well as to the private sector at both classified and unclassified levels. Another of my priorities is to ensure that DHS intelligence takes its full place in the intelligence community. In this respect, we are working closely with Ambassador Negroponte and his deputies in the office of the director of National Intelligence to ensure that budget guidance emphasizes a need of homeland security partners. We are also are enhancing our relationship with the National Counterterrorism Center, the National Counter Proliferation Center, and the Federal Bureau of Investigation. Last but not least, to solidify our relationship with Congress, I and my intelligence officers have maintained a rigorous schedule of intelligence briefings to the congressional leadership and key committees of both chambers. Additionally, we have taken steps to ensure members and staff have access to relevant DHS intelligence products and personnel. I am working to develop a transparent and open relationship with the Congress and so enhance and sustain a close cooperative working relationship with all the committees to which I report. Some of our transformation efforts cut across my five priorities. We have developed an end-to-end strategy to increase significantly the use of open sources in our analysis, and we have developed and are implementing a recruiting program to ensure we hire and develop into all-source analysts a cadre of the best and brightest officers out of America's universities. Serious challenges, however, remain. Looking ahead 6 to 12 months, we will need to strengthen further our analytic capabilities, including accelerated training for analysts. I must work ever more closely with the heads of DHS operating components to ensure that their intelligence elements are strengthened and that they collaborate on threats far more closely than they do today. Above all, we must increase our interaction as you pointed out with state and local fusion centers, as well as the private sector, to ensure that we significantly increase our information sharing with all segments, government and non- government. In many respects, however, our greatest challenge will be implementation of our enterprise architecture, which will be the transmission belt for integrating our DHS intelligence enterprise, as well as the means by which we reach out to state and local governments and to the private sector. Chairman and ranking minority member, we are still at war with an adaptive enemy who mean to do us great harm. We continue to track closely serious threat streams, working closely with Ambassador Negroponte and the rest of the intelligence community. We must stay ahead of these threats, and we plan to increase substantially our analysis in the coming months. I am thankful for the support I receive from the administration, my colleagues in the intelligence community, and from the Congress, including members of this subcommittee. I look forward to your questions and to your recommendations. Thank you. [The statement of Mr. Allen follows:] Prepared Statement of Charles E. Allen Introduction Chairman Simmons, Ranking Member Lofgren, members of the Subcommittee, it is my pleasure to return to report on my progress during my first seven months as Chief Intelligence Officer (CINT) of the Department of Homeland Security (DHS). We are moving rapidly to transform the Office of Intelligence and Analysis (I&A) across a broad front. When I appeared before you last October, I set forth five equally important priorities, which remain unchanged:Improving the quality of intelligence analysis across the Department; Integrating the DHS intelligence enterprise; Strengthening our support to state, local, and tribal authorities, as well as the private sector; Ensuring that DHS intelligence takes its full place in the Intelligence Community; and, Solidifying our relationship with the Congress by improving our transparency and responsiveness. Today I will my report progress on addressing these priorities, as well as outline some specific goals for the next 6 to 12 months. But first, I would like to revisit briefly why the Department has a Chief Intelligence Officer and what my responsibilities are serving in this capacity. You are undoubtedly aware that the guiding principle of intelligence reform since the attacks of September 11, 2001, is integration. Two major commissions--the 9/11 Commission and the WMD Commission--have made integration of the national intelligence community the centerpiece of their recommendations. The principal reason to integrate is to improve intelligence performance, as well as employ our scarce intelligence resources more efficiently. These guiding principles for intelligence integration at the national level apply to integration of DHS intelligence as well. Our Department shares with others the most important mission of all-- protecting the Homeland from terrorist attacks. DHS has a wide range of other critical missions, such as securing our borders and critical infrastructure against all other threats and hazards. A department with so many interconnected missions cannot succeed without a fully integrated intelligence enterprise supporting it. Just as our nation needs an integrated intelligence enterprise, so does DHS. Furthermore, by integrating its own intelligence community, DHS contributes to integration of the national intelligence community. This thinking informed the Secretary's Second Stage Review, which resulted in, among other things, the establishment of the position of CINT. DHS Management Directive 8110, which Secretary Chertoff signed in January, establishes the authorities of the CINT to effectively integrate and manage the Department's intelligence programs. It makes the CINT accountable for designing the DHS intelligence system to optimize the intelligence function, setting standards for functional performance, creating Department-wide policies and processes, and providing automated solutions to yield greater efficiencies. Progress on priorities Improving the quality of analysis We have made significant improvements in our analysis, concentrating on issues that matter to Secretary Chertoff, our DHS leadership, and our nation. Under the leadership of my Deputy Assistant Secretary for Intelligence, Dr. Mary Connell, we have changed the focus and format of key products to make them more relevant and accessible to a wider range of consumers--policymakers, operators, and other analysts--at all levels. We have increased our monthly production. In keeping with best analytic practices, we take pains to distinguish for our readers what is known from what is surmised, and we ensure fair consideration of competing hypotheses--there is no ``groupthink'' among my analysts. A measure of our success in improving our analysis is that we have now begun to submit intelligence articles for the National Terrorism Bulletin and the President's Daily Brief. We continue to improve the quality of our analysis by expanding training opportunities for our analysts within the context of a DHS Intelligence Learning and Development Strategic Plan, completed in January, 2006. We are offering a full range of courses to improve our key analytic skills, including critical thinking, intelligence writing, and briefing, not only for I&A's employees, but across our DHS intelligence enterprise. I look forward to a time when our bench is full enough and deep enough to fully accommodate the need for continuous training and education without compromising our ability to fulfill our day-to-day mission. Through the recently established Content Management Board, we are developing consensus on Department-wide standards for formatting and dissemination of intelligence products, including posting of relevant products for use by state, local, and private-sector partners. We are also recommending enhancements to DHS intelligence production and dissemination standards to achieve the highest possible quality, and we are championing ``write-to-release,'' tearlining, and other practices to ensure the broadest dissemination of DHS intelligence products. Substantively, while terrorist threats and networks remain central concerns, we have broadened our focus to include potential U.S. vulnerabilities such as border and critical infrastructure security, as well as the spread of pandemic disease, which could weaken our ability to secure and protect the Homeland. Beyond these issues, we also are concerned with the proliferation of chemical, biological, radiological, nuclear, and explosive (CBRNE) materials and we are working to understand the growth and spread of extremist ideology, which terrorists could exploit to multiply their resources and capabilities to attack the United States. Border Security: We are taking an aggressive approach to support the securing our nation's borders. We believe the threats to our security must be viewed across a spectrum of concerns--narcotics, terrorism, illegal immigration, human smuggling and trafficking, to name a few--and at the nexus of these threats. We are working tirelessly to support the intelligence and information needs of our frontline border agencies, including Customs and Border Protection, the Coast Guard and Immigration and Customs Enforcement. Critical Infrastructure: Partnering with Robert Stephan, Assistant Secretary for Infrastructure Protection, I have strengthened the Homeland Infrastructure Threat and Risk Analysis Center (HITRAC), the linchpin in our support to the efforts of the Department and the private sector to determine the risk of attack against key infrastructure as well as the protective measures that may be taken. Additionally, at the direction of the Secretary, I&A has begun to provide intelligence support to the Committee on Foreign Investments in the United States (CFIUS)--fulfilling a critical intelligence need to secure our homeland. CBRNE: I&A analysts provide all-source intelligence support to assist DHS customers identify, prevent, disrupt, and prepare for chemical, biological, radiological, nuclear, explosive, and cyber attacks on the Homeland. They assess and forecast adversary capabilities, intent, and methods of terrorists through collaboration with DHS components-- especially the Science and Technology Directorate and the Domestic Nuclear Detection Office (DNDO)--and federal, state, local, tribal, and international partners. Outside of DHS, our analysts work closely with the National Counterterrorism Center (NCTC), the National Counterproliferation Center (NCPC), and the FBI to leverage expertise and information and produce analytic products of the highest quality for the Secretary, DHS components, and governmental partners at all levels. I&A provides a range of support for DNDO and helps link DNDO to the Intelligence Community. On an ongoing basis, I&A gathers and assesses intelligence reporting for situational awareness, analyzes emerging trends, incorporates DNDO's information requirements, and supports the establishment of regional centers for radiation detection support. In addition, I&A supports high-level DNDO Congressional briefs, participates in Nuclear Alarm Assessment Conferences for unresolved radiation alarms, and interfaces with DNDO's Nuclear Assessment Program. Radicalization: We have sharpened and refined our focus on radicalization, viewing it as a strategic warning issue--if we can understand the radicalization phenomenon, we can identify the root of terrorism before it matures and manifests itself in attacks against the Homeland. Working closely with selected state and local government partners across the U.S., we are examining the places where radicalization occurs and the individuals it touches. Our efforts are coordinated with and complement the work being done by the FBI and other Intelligence Community colleagues, as well as international partners who confront similar issues. Together, we intend to develop a comprehensive understanding of the radicalization challenge. Integrating the DHS intelligence enterprise As I said at the outset, the role of the CINT is to integrate the DHS intelligence enterprise. In this respect, I have taken a number of important steps in fulfillment of this role, including: Establishing the Homeland Security Intelligence Council (HSIC), consisting of the heads of the DHS component intelligence offices, to serve as my principal decision-making forum for intelligence issues of Department-wide significance; Developing and approving the first-ever DHS Intelligence Enterprise Strategic Plan, which provides all DHS intelligence components with a strategic context for their operations and investments; Conducting a review of component intelligence programs that will result in my making substantive inputs to the Secretary's Resource Allocation Decisions--the first time this has occurred, and a major step toward treating the budget resources the Department devotes to intelligence as a coherent program; Through the efforts of I&A's Collection and Requirements Division, developing a Department-wide roadmap for intelligence, surveillance, and reconnaissance (ISR), ensuring that the surveillance capabilities of DHS's operating components will be employed with those of the Intelligence Community and the Department of Defense in national crises or natural disasters; and Initiating a comprehensive Intelligence Campaign Plan for Border Security, with an initial emphasis on the Southwest border, bringing the resources of both the national and Departmental intelligence communities to bear on this acute problem. To help weld together the component parts of the DHS intelligence enterprise and bring them closer to both national and local consumers, we are designing an enterprise information architecture. Dr. Carter Morris, Director of I&A's Information Sharing and Knowledge Management Division, has developed a comprehensive assessment of the existing intelligence information technology architecture in DHS, along with recommendations to improve and enhance it. I am now reviewing this assessment. Nothing has higher priority programmatically for DHS intelligence than strengthening our ability to manage our information. Strengthening support to state, local, and tribal authorities and the private sector DHS has a crucial responsibility to serve state, local, and tribal authorities and the private sector. This set of partners is so important that I have given my Principal Deputy Assistant Secretary for Intelligence and Analysis, Mr. Jack Tomarchio, the primary responsibility for enhancing our relations with them. He is my ``Mr. Outside,'' and his extensive travels across the country listening to state, local, tribal, and private-sector officials' need for intelligence and information sharing have greatly enhanced our understanding of their issues, and has provided us with meaningful insights on how to better serve them. Complementing his efforts is the work of I&A's External Relations and Law Enforcement Partners Program. This outreach team, consisting of former law enforcement and public safety officials, attends association conferences and meetings to inform state and local representatives about DHS information-sharing programs and initiatives. Substantively, our analysts and briefers have provided immediate warning and outreach to state homeland security advisers and to other state and local officials on threat reporting. Another important aspect of our plans to serve state, local and tribal authorities and the private sector is our plan to support the state and local fusion centers that many states and large cities are establishing. Our recently developed plan is under review by the Secretary. Meanwhile, we have deployed DHS intelligence personnel to New York, Los Angeles, Maryland, and Louisiana to improve our support in these key regions. We plan to deploy several more officers to a number of fusion centers before the end of the current fiscal year. Additionally, we have initiated a pilot program with six states-- California, Arizona, Illinois, Florida, Virginia, and New York--to widen our interaction with intelligence analysts at their fusion centers via the HSIN-Intelligence portal; after further evaluation, we expect to extend this pilot program to a wider community of fusion centers. We are also taking advantage of information technology to facilitate our outreach. We regularly hold teleconferences with state Homeland Security Advisors and other key officials at the state and local level. We have given new technical direction to the Homeland Security Information Network--Secret (HSIN-S)--which should be operational this quarter. We will extend HSIN-S to state and local fusion cells on an interim basis until a more capable system is available. Finally, we are working hard on the deployment of a more robust information handling system, the Department's Homeland Security Data Network (HSDN). Ensuring that DHS intelligence takes its full place in the Intelligence Community We are also transforming our role in the national intelligence community. DHS I&A engages daily, at all levels, with the Office of the Director of National Intelligence (ODNI) and the individual Intelligence Community departments and agencies. Our collaboration with NCTC is strengthening by leaps and bounds. We have begun to submit articles for production in the National Terrorism Bulletin (NTB) and plan to increase our NTB submissions in coming months. Last month we participated along with other Intelligence Community members in an NCTC-sponsored joint requirements review for open-source intelligence needs to complement the previous joint requirements reviews for the other intelligence collection disciplines. Additionally: We have worked with the ODNI to shape its budget guidance to serve better the unique needs of Homeland Security. As a result of our efforts, departments and agencies with Intelligence Community members received guidance to provide resources for the development of sensitive but unclassified (SBU) intelligence products more readily used by state, local, and tribal authorities and the private sector; We are leading the Intelligence Community's efforts to support border security through the development our comprehensive Intelligence Campaign Plan for border security. We are developing this plan in full partnership with the IC collection agencies and hand in hand with the staff elements of the Deputy Directors of National Intelligence for analysis, collection, and customer outcomes; --I&A analysts have served as the functional lead for the Department's participation in the National Counterterrorism Community Terrorist Threat Warning System, and have provided consistent support to the monthly meetings of the Interagency Intelligence Committee on Terrorism; We are engaged in a continuing and constructive dialogue with the ODNI on a wide range of issues. With DNI oversight, we are refining our roles and responsibilities, authorities, and capabilities vis-a-vis the rest of the Intelligence Community in the domain of homeland security. In particular, we are collaborating with the FBI on DHS's responsibilities for sharing information with state and local governments. Our relationships with other Intelligence Community organizations continue to strengthen measurably, for example, the FBI has added four intelligence analysts to its existing special-agent liaison officer team in our office. This will improve analytic collaboration between FBI and DHS and provide DHS with new and continuing database access to FBI holdings, improving our ability to provide unique information to our customers. In turn, we have announced a DHS liaison officer position to the FBI at a senior leadership level to emphasize the importance we put on this relationship. Solidifying our relationship with Congress Since my arrival, I have initiated briefings with members and senior staff designed to enhance awareness of threats to the Homeland and how we are reinvigorating and strengthening our overall intelligence efforts. The Homeland Threat Stream Matrix is a continuing and high-interest briefing that my Office provides to Congressional officials with a need to know. Additionally, senior intelligence officers from our current analysis division provide regular threat briefings to the leadership and key committees of both chambers, a well as to individual members as required. Finally, we have taken measures to ensure members and staff have access to relevant DHS intelligence products. Cross-cutting accomplishments I want to mention several accomplishments that do not fall neatly into one or another of my priorities but which are crucial enablers to our mission. Open source We have developed a concept of operations for aggressive use of open sources (OSINT) that leverages current activities of the Department, other departments and agencies including the DNI Open Source Center, the private sector, and our state and local partners in order to improve analysis and, when applicable, to protect intelligence sources and methods. We will gather domestic open-source information-- including ``gray literature''--directly, and we will purchase access to value-added collections that complement those already available to DHS through its partner departments and agencies. DHS officers will handle open-source information as a normal part of their everyday routine. Additionally, a cadre of specialists will support the mission needs of the Secretary and DHS components. The value provided by these specialists will include economies of scale, quality control and qualification of sources, and linkages and indexing to related open-source information as well as to intelligence and threat-advisory issuances. Dissemination will be both ``push'' and ``pull.'' We will use existing channels of information dissemination. Additionally, we may offer open-source information ``wholesale'' to authorized organizations and ``retail'' to selected users by direct subscription, and as a service available through a common services architecture. Human capital We developed and implemented a DHS Intelligence Recruitment Strategic Plan to bring onboard the best and brightest people fresh out of America's universities and colleges. We have taken 30 of our positions and converted them to GS-7/9/11 levels to take advantage of the ongoing recruiting efforts and build the foundation for a sustainable DHS intelligence enterprise. We are building a DHS Intelligence Basic Course to train our GS-7/9/11s--not only those hired by DHS I&A but by other Departmental intelligence components--to instill a true DHS intelligence culture at the beginning of our new intelligence professionals' careers. Looking ahead 6-12 months We have made progress but I am determined to move forward even stronger in the coming months. My agenda to continue I&A's transformation includes: Continuing to strengthen the quality of our analysis, focusing on training our analysts in core analytic skills, continuing to extend this training throughout the DHS Intelligence Enterprise, and tailoring our counterterrorism threat warning and assessment products more closely to our customers' requirements; Continuing to build our expertise in the analytic focus areas of border security, critical infrastructure, CBRNE, and radicalization, while also strengthening our intra- Departmental support; Enhancing intelligence support to the Department's principals through enhanced briefing programs, which capitalize on the skills and expertise of our most experienced analysts; Making urgently needed improvements to our I&A facilities to enhance the effectiveness and well-being of our workforce to provide our officers with critically needed information technology and workstations; Achieving key deliverables in our integration of the DHS intelligence enterprise, such as enhanced training efforts, a DHS intelligence officer rotation program, and strengthening our interoperability with DHS our components. Significantly strengthening our growing relationship with state and local authorities and the private sector, especially by increasing the interaction we have with State and Local Fusion Centers and by making more of our production available to our non-federal customers via HSIN and ultimately via HSDN; and Expanding relationships with our international partners, especially our closest allies. We have made progress in this area in the past six months and we must now move quickly to make further gains in our relationships with these close friends. Conclusion Members of the Subcommittee, I want to conclude my testimony as I did six months ago: by reminding you--and the American people you represent--that we are in a war with an adaptive enemy who means to do us grave harm. In addition, we are on watch for possible hazards to the homeland arising from illegal immigration, natural disaster, and pandemic disease, among other things. To stay ahead of these threats, the dedicated employees of I&A have been working long, hard hours to transform the way we do business. We must be resolute in our efforts and we cannot rest. I am grateful for the support and dedication of the men and women of I&A. I am also thankful for the support I have received from the Administration, from my colleagues in the Intelligence Community, and from Congress, including the members of this Subcommittee. Our transformation at I&A is well under way, but much work remains to be completed. I look forward to this challenging work. We owe it to ourselves and we owe it to the American people. I am eager to work with this Subcommittee to continue I&A's transformation, and I look forward to answering your questions. Mr. Simmons. I thank the gentleman. I mentioned that earlier this week, I had the opportunity to visit a fusion center in Maryland. I look forward to visiting a number of additional fusion centers located in different areas of the country. It is my belief that these fusion centers are going to be critically important as sources of information and as locations where responses can be coordinated, not only in the event of a terrorist threat, but also in the event of other natural crises. That being said, the National Governors Association recently surveyed all of the governors of the United States. They placed the state intelligence fusion centers as top priorities, and so I think your concern and my concern coincide with that of the governors. It is my understanding that when you look at the fusion centers, however, they are organized differently in different areas. They have different lead sponsors. Some are sponsored principally by the FBI, others by DHS, others by municipal police. It is my understanding that some federal guidelines on fusion centers have been developed by DHS, but they have not yet been released. I wonder if you could comment on the issue of fusion centers and what we need to do to move those concepts forward. Mr. Allen. Yes, Mr. Chairman. I strongly agree with the need for us to develop this strong relationship with the fusion centers, but they do differ remarkably in many ways. Some states as yet have not formed fusion centers. Others are in the early stages of doing so. And we are, I think, in agreement with you, and I know that the Secretary will want to issue some guidelines, because as we give out grants and as we begin training under legislation, the head of grants and training can actually help provide money so that the fusion centers can hire officers and analysts to come in. So the federal money will be involved with these. We will want to have some general guidelines so that there is a common understanding of roles, missions, functions, the flow of information down as you spoke earlier. One of the things that we know that is very important is to be able to harvest some of the information that has been lawfully obtained by these fusion centers, which deals perhaps with suspicious activities or trends and patterns of things that either states or local law enforcement organizations have detected. So in my view, the federal guidelines is going to be a key way of guiding this. The one thing we do not propose to do is tell any of the states or local governments how they should structure and organize their fusion centers. But we would hope that they would welcome federal guidelines as suggestions on how they can most effectively organize themselves. As you know, there are a number of fusion centers that will be opening. New Jersey will be opening soon a fusion center in Trenton, and, of course, the Regional Intelligence Center in Los Angeles will be opening in mid-July where I will be present to speak on behalf of Secretary Chertoff. Your point, sir, extremely well taken. Mr. Simmons. I thank you for that response. And again, I refer to Page 399 in the 9/11 Commission report which says that current threat calls for quick as well as imaginative and agile responses. So, if, in fact, the department's assessment of its recommendations on fusion centers is stuck on somebody's desk, and I don't mean yours, my inclination is to move forward with some legislative initiatives on the subject, and maybe at some point, that set of recommendations and our legislative initiative can meet. Again, I think it is critically important, and I thank you for the work that you have done in that line. Again, I now recognize the ranking member. Ms. Lofgren. Thank you, Mr. Chairman. As I mentioned in my opening statement, we did have a good opportunity to meet with Mr. Allen in a classified setting yesterday, and just going?I have another question other than the NSA issue. But the concern that I have is that, if there is information that is collected by another agency, not DHS, that in the end is decided was collected in violation of the statute, whether there is an ability to audit where information came and where it went as distributed from DHS. And the question is: Are you able to discuss this in this public setting? And if so, could you talk about that, and if you cannot talk about that, then just tell me that, and I will go to my second question. Mr. Allen. Yes, Congresswoman Lofgren, I can speak to the point of view that we receive information from all of the collection agencies of U.S. intelligence community as well as we receive information, obviously, of a law enforcement nature. We believe that all of the information collected by these other agencies is lawfully obtained. We know of no occasion of information that we have received that was unlawful, because we view that those agencies work with their general councils, with their inspector generals, and we know of absolutely no occasion on which any unlawful information has been received by the Department of Homeland Security. And, obviously, we respect the information of a law enforcement nature. So, I can say that we receive a wide variety of information just like the National Counterterrorism Center receives a wide variety of information. We apply our intelligence to these areas of homeland security, which I spoke about the fact that we analyze intelligence warnings and threats, and we try to be agile and nimble. If there is a threat of any urgency, we do secure borders. We are doing a tremendous amount of work on the critical infrastructures that is working to ensure that the private sectors of U.S. society are protected. We work against unconventional weaponry, and we work very closely with our director of science and technology. And then, of course, there is information from the open domain which come into us as well as that from the collection agencies in the intelligence community. We know of no unlawful information, and we are very confident that the information we have is lawfully obtained as part of our analysis. Ms. Lofgren. If I may, Mr. Allen, certainly, whatever information we have from whatever source, we would use to interrupt an attack on this country. The question really is, if it turned out that your trust in the information coming in was?you were disappointed, if that information became the basis for a law enforcement action and prosecution instead of an interruption issue whether we would be able to track it into light. So I am going to move on to the second question, which really relates to High Track. In February, you and Dr. Mary Connell talked about the progress of the critical infrastructure vulnerability assessment that High Track is doing. And I am worried and, frankly, maybe a little concerned about the private sector participation in these efforts. The GAO report says that only 290 voluntary submissions have been made on critical infrastructure information from the private sector. And they identify some things in their judgment the department should do, that we should define specific government needs for critical infrastructure information, explain how the information will be used, assure the private sector the information will be protected, who will have access to the information, and somehow give an indication of benefit to the owners of the information for sharing. Have you had a chance to think about these suggestions, and do you agree with them, or is there something else that we should be doing? Mr. Allen. I believe that the High Track, which I think is absolutely vital that we further enhance and strength our high track production. Dr. Connell, who is with me, has worked very hard to put additional analysts into High Track. We also have requested substantial increase in the number of sector specialists which have to come from the infrastructure protection directorate so that we can get the synergy that is involved. I understand the anxiety of the private sector, but I think that in the last 6 months, you have seen a true increase in the amount of information we flow to the private sector. I just had a very senior official in the private sector from your state call on his own and compliment the kind of support that he was now receiving, that it was effective. It enabled him to take the kinds of protective measures for his sector that he needed. I am meeting with the--because there is a critical infrastructure security committee, I meet with the heads of each of the 17 U.S. private sectors. They like our new product. We have a lot of work to do there, Congresswoman. You put your finger right on something that we are going to work very hard. We are very proud of what we have done. One of the things that we have started to do is working with the private sector on suspicious activities and reporting out to those sectors things that have been detected either in intelligence or law enforcement channels in order to enable them to understand what might be going on as far as trends and patterns of someone wishing to harm the private sector. We are very pleased with where we are, but in the next 6 months, I want to come back very strongly and tell you that we are a lot better off than we are today. Ms. Lofgren. Mr. Chairman, if I may, I never dreamed that we would start our 3:30 hearing at 4:30, and unfortunately, Chairman Sensenbrenner and I and Mr. Conyers are hosting a members meeting for roughly a hundred people at 5 o'clock. And Jim Sensenbrenner is a very strong chairman, but I don't want to tick him off, so I am thinking that I will rush over to that meeting and then try and come back, leaving the minority in the capable hands of Mr. Langevin for the moment. Mr. Simmons. Good luck with Mr. Sensenbrenner. The chair now recognizes the distinguished gentleman from Nevada, a member of the Intelligence and Armed Services Committee, who has on the distant horizon perhaps the opportunity to be a governor. And so these issues might be of particular interest to him. Mr. Gibbons. Well, they are, Mr. Chairman, and I want to thank you for the lead-in. You are a very good, straight man, and I appreciate that as well. Mr. Allen, it is always a pleasure to see you before our committee, and I know oftentimes that the stress of a rigorous schedule of reporting and briefing Congress oftentimes puts a hardship on the agency to do their job. And for that, we apologize, but there is no over alternative for us but for you to be here. What I am interested in, of course, is the state-federal relationship here. As you have mentioned, there are a number of states that are just beginning or started or are in the early phases of having an analytic center or a fusion center, if you will. I would like you to tell me, if you can, how do you gauge what they are doing correctly or what they are doing incorrectly today? And if you can, tell me which states are doing it right and which ones are doing it wrong. Mr. Gibbons. That is a very good question, how to evaluate and judge the efficacy of the various state fusion centers. And some are so in their early stages, they are just now getting computers and equipment and getting the personnel staff, say, like the state of Virginia. I was with Governor Kaine a few weeks ago, and he is anxious for me to send an analyst down to work in his state fusion center, which is going to be really outstanding, and the Homeland Security adviser there working closely with the governor to ensure that he builds what we want. We go to, I believe, some states out in the far northwest. Montana, Idaho, and others have yet to come online with the state fusion center. But there are some very strong ones. There is some in the south. I know that Georgia has a very strong one. It is obvious that Tennessee is extremely active. New York is very, very active up in Albany. Very pleased with some of the-- Mr. Gibbons. How do you gauge those? Mr. Allen. Based on what they are doing, based on their own content of their own analyses, based on their interactions with us, and we have steady interactions either on--if it is a class-mat matter, on a secure phone or nonsecure phone. I have calls with them or my subordinates on a regular basis. So we can make judgments as to how well they are faring or not faring. They obviously need assistance from our training and grants directorate. They need funding, because they do not necessarily have the funds themselves. So I think the guidelines that Chairman Simmons spoke of are very important. Those are guidelines that are, of course, being worked closely with the Department of Justice so that we ensure that we have the very best guidelines and supporting of intelligence and law enforcement activities that may occur in these fusion centers. Mr. Gibbons. That support and the guidelines, does that include the training of the individuals for these state fusion centers? Mr. Allen. Yes, sir, because under the legislation which the Congress has provided, under grants and training, which I do not control, but obviously, we work closely with grants and training, can give funding for training programs. They can give training--they can actually give funds so they can hire analysts or other officers to staff the fusion centers. Mr. Gibbons. Well, those would presumably already be trained officers, trained analysts that come from some other agency, can which in my view, brings the question of: Do we have enough analysts, trained intelligence officers for this kind of this opportunity that can go and participate in these state functions without short-changing the work of the 10 different offices of the intelligence that you have under your direction. Mr. Allen. That is going to be an issue. We are going to put some analysts and some liaison officers to coordinate relationships. As far as training, we actually, under the law, have been able too bring some of the people, for example, New York and Maryland, some of their analysts into some of my training programs which I initiated. So we are working very closely with the states. Right now, given how stretched we are in the Office of Intelligence and Analysis, deploying additional officers out to the states will be a strain, but we are going to--I have talked to the secretary and the deputy secretary, and they both feel that we need to do this. So we are going to put officers in many of these state fusion centers over the next 2 to 3 years. Mr. Gibbons. One final question, Mr. Allen, and I don't mean to belabor this. Have we improved the long delays that it has been taking to get local and state law enforcement officers certified or cleared for classified information, giving them the classification to receive that? I mean, there have been a number of complaints that we have heard over the last many, many months, that it is just taking too long. Mr. Allen. I have learned of this since my arrival. I am unhappy with the progress that has been made. I am working with the director of office security to clear additional officers with the state fusion centers, local government. For example, I have all but completed clearing 50 officers with the intelligence division of New York state. I just met with Mr. McClary, police chief of Las Vegas. He is putting in a request to clear four of his people. We are going to do that. So, yes, I am very active and working directly with the chiefs of police, with the sheriffs of the major counties to clear some of their people. There is no reason why we should be behind or delay clearing these people, clearing all of them. Compartmenting information will be a little difficult, but we ought to be able to give them secret clearances, and we ought to be able to do it rather rapidly, Congressman. Mr. Gibbons. And what does that rapidly mean? With your influence say, for example, if-- Mr. Allen. Well, we can do it in a matter of weeks once they get the information in. The ones in New York have been cleared very rapidly. We are clearing a number of people. And I am clearing people in the private sector, people who really run security of major private sectors. They need the clearances too. And I have worked directly with the private sector to get them clearances at the secret level. We need to accelerate this. We have not done what should have been done, and I am not too happy with that, by I am doing my level best to improve that. Mr. Gibbons. Well, you sound like you are the right person for the job. You are the first one that has shown any enthusiasm about moving that issue along quickly, and I appreciate it. Thank you, Mr. Chairman. I yield back. Mr. Simmons. I thank the gentleman for his questions. The chair now recognizes the distinguished gentleman from Rhode Island, Mr. Langevin. Mr. Langevin. Thank you Mr. Chairman. Mr. Allen, I want to thank you for being here today and for your testimony. Just on a personal observation and note, I appreciate how accessible you have been. You have been before this committee now several times, and we have had private briefings with you in closed session. In addition, you and I have had one-on-one discussions in my office. I appreciate how accessible you have been. Let me turn to a topic that we have discussed before and builds on the line of this issue of open communication--more effective intelligence sharing with state and local officials. I know one of the times we have had discussion in my office, we talked about RISSNET, Regional Information Sharing Systems Network, that law enforcement already uses right now for communicating with respect to sharing intelligence on criminal activity. And it seems to be a good model that works, and law enforcement is comfortable with it. I know you sent a representative, as I understand it, because you said you would, to RISSNET to evaluate their capabilities and whether that is something the Department of Homeland Security should be using to share information about potential terrorist activity. Can you just report to the committee your assessment of RISSNET and just the information sharing mechanism that you will be using in homeland security? Mr. Allen. Congressman, that is a promising capability. My deputy went up to Massachusetts to talk to officials there. I will get back to you with their assessment. I do not have a final assessment on his visit. We will get back to you on RISSNET with the formal writing, formal question for the record, if I may, sir. Mr. Langevin. I appreciate that. And again, I appreciate the fact that you dispatched one of your deputies so quickly to go and at least evaluate the capability of RISSNET. If I could, you also said that state regional fusion centers obviously are being touted as an important resource to promote information sharing with state and local and tribal law enforcement officers and other entities nationwide. My understanding, though, is that DHS is planning to send I&A representatives to fusion centers--I know you have mentioned that several times here today as well--in order to basically act as liaisons with the DHS. I also understand that the various folks that you will be sending are at different levels of experience, different skill sets and will be playing different roles. So my question is: How will there be a consistent DHS footprint in the fusion centers without some common standards for the people that you are sending into the field? What is your concept of operations implementation plan for the fusion centers initiative being finalized only now after you have already deployed personnel to the field? Basically, what are the key points from your concept of operations and implementation plans? Mr. Allen. That is a good question. I did deploy people with the Secretary's approval before the concept of operation and implementation plan has been fully staffed and all the funding for fiscal year 2006 and fiscal year 2007 have been identified. I did that because when I arrived, I found we had nothing in the field. We had New York, we had Los Angeles, we had other cities that wanted support. So I pressed hard to get some people out on an ad hoc basis. That is no substitute for a plan and for implementation of the plan. And some of the officers I have sent have?and it depends to some degree on the fusion center and their requirements. Out in Los Angeles, we need an officer to help coordinate. Up in New York, particularly in New York City, we need not only a liaison officer, but they also want analysts to help work with the intelligence divisions in New York City and with the Counterterrorism Division to help them shape their analyses and to do mentoring. So it does differ from state to state. Our implementation plan suggests that most of our people will work in liaison and coordinating capacities. But, for example, down in the state of Virginia, because they have a laboratory there with the military with Governor Kaine, I believe he wants to have an analyst down in the state of Virginia. The state of Maryland, we sent one of our finest analysts Dr. Connell has up to Maryland to help with the one that Chairman Simmons met. We have to get all this together, and very candidly, our concept operation has come together since January. And now, we have to get the implementation plan out and approved by the Secretary, and then we have to carefully determine the work and the activities that each will undertake out in the state fusion center. In most cases, I think it will be liaison officers, coordinating officers, but a number of these places really do need analysts. Governor Kaine made that very clear in the state of Virginia. Mr. Langevin. So it is your intent that although this first appointment of individuals from I&A were more of an ad-hoc basis that eventually, there will be a uniform plan for the type of people that is deployed with various capabilities and, skill sets? Mr. Allen. Yes, sir, that is absolutely my intention. My principal deputy, Jack Tomarchio, has been charged with doing the kind of detailed implementation plan. He is a person from the private sector who has worked very closely at the state and local government levels in his career, and I have every confidence that in 6 months from now, we can come back, and we will lay out a plan that will be very satisfactory to you. We will not have a lot of people out in fiscal year 2006, but we hope to put 15 or 20 more out possibly in fiscal year 2007. Mr. Langevin. Thank you very much. Mr. Simmons. I thank the gentleman for his questions, and I would like to do a second round if the gentleman would accommodate me. Thank you very much. I had the opportunity to meet Robert Stephan, the assistant secretary for Infrastructure Protection. He is an impressive guy, Air Force career, retired colonel, I believe, and he filled me in quite a bit on High Track and how that is going. I appreciate your comments that there seems to be more cooperation from the private sector, and I think that is a good sign that we are getting that cooperation. I raised with him one issue that concerns me when it comes to critical infrastructure and protection. And that is passenger rail, particularly Amtrak. I sit on the Railroad Subcommittee of Transportation. I have Amtrak through my district, in fact, through my hometown. Many of my constituents ride on a regular basis. And looking back to the Baltimore tunnel and the New York City tunnel issues, looking to the Spain commuter rail attack, and also the British subway attack, it seems to me that that is a model of attack that has been used by the terrorists in the past. And certainly, with our rail infrastructure, our situation might lend itself to that kind of attack, in particular because Amtrak police are so limited in their numbers. We have three Amtrak police, who are based in New Haven, Connecticut, who cover the Amtrak line from the New York border to Providence. There are another three that operate out of Maryland. Very limited resource, stretch resource. They do not fill all their slots. Their new recruits frequently disappear and go off to work with municipal police. And so I guess my question would be: What effort or what focus has been applied to the issue of passenger rail, in particular Amtrak? And do you share my concern over the lack of numbers and of the Amtrak police? Mr. Allen. Chairman Simmons, I share completely your concern about passenger rail, mass transit. Nothing probably gives us more worries. We obviously work, as Kip Hawley, the head of the Transportation Security Administration, has stated about the passenger rail mass transit, that it is a deep concern to him. We have hardened our aviation security, although there are still risks there, and Mr. Hawley is concentrating particularly on detecting explosives. But passenger rail, you are right. It is a very open society, thousands of miles, either above ground or underground across this great country. And the amount of security is, of course, limited. What we are doing is providing our assessments, providing suggested potential ways that the mass transit sector can mitigate some of these risks. There are more measures being taken, certainly, at the federal level, by Mr. Hawley. I believe in a classified session, he could tell you more specifically some of the very subtle measures that are being taken that may not be totally evident. There are a number of areas. I do agree that based just on what we know about al- Qa'ida's interest in this or affiliated networks, that this gives us--this is the kind of thing that certainly keeps me up at night. And if we get a threat that deals with mass transit, rest assured that that gives heavy scrutiny. We work with the FBI and the National Counterterrorism Center. We get the Homeland Security adviser on secure phone or send secure messages. If it is a classified matter or if it is one that we can just use the official-use only level, we get it to them quickly. This is probably as worrisome a sector as we have, sir. Mr. Simmons. Thank you for that, and I will ask one more question, realizing my time is disappearing. Open-source intelligence--we have talked about it before. That is my understanding that the Oklahoma City National Memorial Institute for the Prevention of Terrorism has a terrorism knowledge base that includes over 30 years of open- source terrorism data. We have a new open-source center that is affiliated with CIA, the FBIS, which I am sure you are familiar with. It is interesting and instructive to look at the recent concern expressed over the National Security Agency surveillance program to understand how Americans are instinctively concerned about secret operations, in particular, those that could possibly involve their own privacy here domestically within the United States. That is one argument among many for a focus on open-source, in particular, for the Department of Homeland Security which has responsibilities primarily within the domestic United States to be using as much information as possible that is derived from openly publicly available sources so Americans are assured or get some assurance that their privacy is not being violated. I know you have testified in favor of open source. I know you are an advocate for it. Over the last 6 months or 7 months, what progress do you see incorporating open source into your analytical product? Mr. Allen. Chairman Simmons, under Dr. Connell here and with the advice of some real specialists in open source, we are now in the early phases of developing a comprehensive open- source strategy, one of things that we have done is, for the first time, the Department of Homeland Security, my office is taking over the open-source information system portal of information that deals with the homeland. This is something that we have just now taken over. We are looking at putting together a cadre of government specialists as well as contractors from my office to work as a virtual satellite bureau of the open source center that is run by CIA to ensure that we meet the requirements, not only of the federal government for Homeland Security open source information, but that we also make available this information we put down to the states. The states also, as you know, have open source things publicly and lawfully acquired that we hope to have push back towards us. One of the things that Dr. Connell has done is to scrub all the requirements for open source. When we came in 6 months ago, 7 months ago, none of that had been done. There was no open source strategy, no open source program. We now have the beginnings--and this is going to be one of my highest priorities. Commercial imagery is something that I feel very strongly about. There are many ways that we can benefit homeland security and through information sharing down and pull information back from state and local government, all of which is open in the public domain, all of which is legal. Mr. Simmons. Thank you. The gentleman from Rhode Island? Mr. Langevin. Thank you, Mr. Chairman. Mr. Allen, I note one of I&A's major concerns is radicalization within the United States and the threat that this phenomenon poses to the homeland. Without disclosing any classified information, of course, what is your assessment of the extent of the radicalization problem today, and what challenges is the intelligence committee facing in this sphere, and what can be done to prevent radicalized individuals, be they violent Jihadists or right-wing extremists, from committing terrorist acts? Mr. Allen. Yes. I appreciate the question, Congressman, because we have formed a radicalization cell within our finest officers under Dr. Connell within the Office of Intelligence and Analysis. They are looking at the very broad aspects of radicalization. They are also looking, not only at what you might call those who are engaged in believing in the Jihad, but we are looking at extremists on the right. We are looking at animal liberation movements, earth liberation movements, people who would use violence or do damage to our infrastructure. Our greatest worry, however, of course, those right now are those involved in starting to believe in the Jihadist message. And as we know, we have this virtual world where we see people connected to the Internet and the Internet culture--there is Internet culture supporting the Jihad, as you are well aware. It is a major driver. We are not trying to get into the work that is done by the National Counterterrorism Center or the Federal Bureau of Investigation. We are working in a complementary way that, because we have found out that states have a great deal of information, a great deal to offer, all the states are looking at radicalization. Your own state, I am sure, as well. We know that California, New York and others are doing a remarkable job, and we hope to work with state and local governments and with the major cities, law enforcement departments to be able to get a better understanding of how perhaps radicalization is spreading across the United States. It is very small, it is very limited, but we know what damage only one or two individuals can do to our society. Mr. Langevin. Thank you. On that point, my understanding is that much of the radicalization in the United States that is of concern to the intelligence community is actually occurring in our federal and state prison systems. From your perspective, how easy is it for the prison authorities to share information about radicalized inmates with the intelligence community and state and local law enforcement authorities? And what areas of improvement are called for in terms of improving information sharing in this area, and what role do you envision your office playing in this regard? Mr. Allen. I believe that we will play a very vital role along with the Federal Bureau of Investigation and with the National Counterterrorism Center. States and local law enforcement agencies can share information that may involve U.S. persons if those persons are engaged in advocating or directing the violent actions against our society. So we believe, though, that we are not looking at individuals as we are looking at how this happens. What is the phenomenon that causes a student from the University of North Carolina to suddenly try to kill students, as he tried to do on the 3rd of March 2006, an individual, that, for all ostensible purposes, was not radical, was not an extremist, but obviously had extremist beliefs and some extremist ties, particularly probably the Internet? So these are things that are very difficult for us to understand. We are partnering with Dr. Maureen McCarthy of the director of the Science and Technology of Homeland Security, which is doing some very interesting research in behavioral sciences in trying to look at this phenomenon of radicalization. I am very pleased with where we are. We have got a long way. Until Dr. Connell put together this team about a couple of months ago, this radicalization studies were not being done in Homeland Security. So we will be doing some assessments, coordinating them with the rest of the intelligence community, including the intelligence elements of the FBI. I think this will help a great deal. Our Secretary is very interested in this phenomenon of radicalization. It troubles him greatly. Mr. Langevin. It certainly concerns me. I know members of the committee as well as other people in law enforcement. Thank you for your answer on that issue. Mr. Chairman, I yield back. Mr. Simmons. I thank the gentleman. My recollection is that President Kennedy said many years ago in reference to some of the activities the intelligence community and the CIA that success has many fathers, but failure is everywhere an orphan. It is particularly difficult in our free and open society for American citizens to have a sense of how their intelligence organizations are doing. Yes, 9/11 was a terrible event for us, and some would say a failure for the intelligence community. Since 9/11, we have not had a similar event, but it is hard to know what that means. Does that mean that we have been supremely successful and we have thwarted hundreds and hundreds of attempts to replicate that day here in the United States? Does it mean we are just simply lucky, and the bad guys aren't trying anymore? I wonder if it would be possible for you to share with us your sense of whether we have had successes in the interim, whether you are aware of successes where attempts have been thwarted. And you may not be able to talk about that in detail, but I think it would be useful to respond to that kind of question in open session. Mr. Allen. Thank you Mr. Chairman. I was a young officer when President Kennedy came to CIA headquarters and what was then a very new building and stood in the quadrangle in front and said those famous words, and I stood about 30 yards from the president. So that stands out vividly. Mr. Simmons. Did I get it right? Mr. Allen. Yes, sir, you certainly did. And he spoke those words. Mr. Simmons. I was not there. Mr. Allen. And it was an emotional moment for all of us after the Bay of Pigs. We had a great director then, John McCone, one of the most famous directors we ever had. So it was a historic moment. There is no question of that. We have serious threats. We have had serious threats since September 11, 2001. We have had extraordinary success, I think, overseas led by intelligence and by the U.S. military. But I think the intelligence operations overseas have been simply nothing short of magnificent. I have been involved in many of them in my previous capacity at the Central Intelligence Agency. I am very proud of what the agency has done and continues to do. In this country, there have been clearly plots disrupted and thwarted. Some of them were in preliminary stages. Others were moving along to a more direct attack upon Americans. And they take place in a number of forms. Some are fairly ambitious, some are rather modest. It is my belief that these threats will not diminish, that even though we have an al-Qa'ida that has weakened and has been battered, it is clear that the leadership of al-Qa'ida still wants to conduct transnational operations. We have heard from Osama bin-Laden in audio tape three times: 19th January; 23 April; and then 23 May just in this year. We have heard from Zawahari, the number-two guy, I believe four times this year. So in my view, we are a country at war and a country under threat. It is going to take all of us. It is going to take all the national intelligence community and all the state and local law enforcement working collaboratively to keep the country safe. That is what I do every day. It is what I have done. Particularly in the last 15 or 20 years in my career, I always go to work thinking, my job is to keep the country safe, and that is what I try to do. Mr. Simmons. Well, I thank you for that, and I thank you for your success thus far. As you recall, after the collapse of the wall and the dissolution of the Soviet Union, the end of the Warsaw Pact, there was a sense in this country that we no longer had any special threats. And we glided through the 1990s defunding our military and defunding our intelligence. Now, we are in a situation where we not only have to refund, but we have to reorganize. What would be the one or two principal hurdles that you face in this refunding and in this reorganization that this subcommittee can be helpful on? Mr. Allen. I think, first of all, is the quality of our people. I think that the U.S. intelligence community drew down by almost 25 percent in personnel in the 1990s. Our military intelligence fell by about 33 percent. There is a big deficit. We are trying to grow analysts now and also intelligence operations officers and the best and brightest technologists. I am out recruiting on college campuses now, and we are getting hundreds and hundreds of applications for, say, a hundred or 120 positions. That is very encouraging to me. We are going to have to grow these analysts. And CIA and FBI are going to have to grow wonderful operatives to help do this. So the first thing we have to do is continue to get support from you, sir, and helping us build and grow and train the best minds in the country, whether they are in operations, whether they are in science, or whether they are all-source analysts. We have a real deficiency. Dr. Connell is trying to build and grow and mentor a lot of officers right now, and we are looking forward to these bright, young Americans coming in to work for our DHS intelligence enterprise. The second thing that has to be done, of course, is to get us out of the 20th century when it comes to information technology and information sharing. We are doing a lot of this. I believe that what has gone on under previous Director Tenet and now under Ambassador Negroponte trying to be able to find ways to lawfully share information far more effectively than we have in the past and to support us in this information technology, what Congressman Langevin talked about, the system up in Massachusetts. Those kinds of tools, we need to have tools like that, which will be very invaluable. It will help us understand what is going on in the country, help us link information quickly. Those things have to be funded. So your continued support and information technology in helping us grow officers, whether they be operations officers or analysts or scientists, we appreciate it. We appreciate it very much. Mr. Simmons. The gentleman from Rhode Island? Mr. Langevin. I may have some questions, but I will submit it for the record at a later time, Mr. Chairman. But at this point, I have no further questions. Mr. Simmons. I thank the gentleman for his participation. Mr. Allen, I thank you and your staff for being here today. We apologize for the late start because of the previous committee activity that kept the room. But we appreciate very much this update. We will have some questions for the record. The members of the committee may have some additional questions for you, and we will ask you to respond to these in writing. The hearing record will be held open for 10 days. And there being no further business, without objection, the subcommittee stands adjourned. [Whereupon, at 5:30 p.m., the subcommittee was adjourned.]